<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shweta Vohra</title>
    <description>The latest articles on Forem by Shweta Vohra (@shweta_vohra).</description>
    <link>https://forem.com/shweta_vohra</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F742096%2Fef7f2455-4d48-4824-9506-f63e3036730a.png</url>
      <title>Forem: Shweta Vohra</title>
      <link>https://forem.com/shweta_vohra</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/shweta_vohra"/>
    <language>en</language>
    <item>
      <title>Service Mesh and Enterprise Scale Design</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Fri, 06 Jan 2023 03:23:34 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/service-mesh-and-enterprise-scale-design-4a58</link>
      <guid>https://forem.com/shweta_vohra/service-mesh-and-enterprise-scale-design-4a58</guid>
      <description>&lt;p&gt;Service mesh is a low latency networking and infrastructure layer which is highly configurable to make service-to-service communication possible.&lt;/p&gt;

&lt;p&gt;In this article let's look at following aspects for Service Mesh:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Introduction, features and architecture&lt;/li&gt;
&lt;li&gt;Enterprise level service mesh - What and why?&lt;/li&gt;
&lt;li&gt;Approach for - enterprise level service mesh implementation&lt;/li&gt;
&lt;li&gt;An enterprise - case study&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Services Interaction without useing Service Mesh:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HAvYTtxQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vv5fq9svze5xa9uxsc9x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HAvYTtxQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vv5fq9svze5xa9uxsc9x.png" alt="a" width="880" height="760"&gt;&lt;/a&gt;&lt;br&gt;
There were many technology specific libraries/tools in use to make above complex interactions possible. For example:&lt;br&gt;
&lt;strong&gt;Python:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenTracing Flask&lt;/li&gt;
&lt;li&gt;OpenCensus&lt;/li&gt;
&lt;li&gt;Zipkin&lt;/li&gt;
&lt;li&gt;Kingpin&lt;/li&gt;
&lt;li&gt;Lemur&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Java:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Spring&lt;/li&gt;
&lt;li&gt;OpenTracing&lt;/li&gt;
&lt;li&gt;OpenSSL&lt;/li&gt;
&lt;li&gt;Customer libraries&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Nodejs&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Jaegar&lt;/li&gt;
&lt;li&gt;Zoologist&lt;/li&gt;
&lt;li&gt;Express RL&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Its quite evident the problem of handling polyglot libraries, discovery of services, specific use of tools and most importantly  lack of easy interoperability of these solutions makes maintianing services life cycle a mammoth task. &lt;br&gt;
Now let's look at how Service Mesh helps save these efforts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Services Interaction after using service mesh:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XDahUf4a--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/665pio50t9wlfeju8rnq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XDahUf4a--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/665pio50t9wlfeju8rnq.png" alt="b" width="880" height="759"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Service Mesh Features
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xBgX1wai--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/52zkgn6a2eup7uo5zgbf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xBgX1wai--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/52zkgn6a2eup7uo5zgbf.png" alt="c" width="739" height="478"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Service Mesh Architecture
&lt;/h2&gt;

&lt;p&gt;A service mesh comprises of two main logical components - a data plane and a control plane:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The data plane&lt;/strong&gt; is composed of a set of intelligent proxies deployed as sidecars. These proxies mediate and control all network communication between microservices. They also collect and report telemetry on all mesh traffic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The control plane&lt;/strong&gt; manages and configures the proxies to route traffic.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--20pz9bl5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/opkb3ivot78mg2he678u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--20pz9bl5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/opkb3ivot78mg2he678u.png" alt="d" width="844" height="459"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Service Mesh At Enterprise Scale
&lt;/h2&gt;

&lt;p&gt;In practical there are complex environments. Heterogenous cloud, application stacks, and platforms. Service mesh required for strong deployment and control over Dev and Ops across hybrid cloud environment.&lt;/p&gt;

&lt;p&gt;For example consider application spread across various clusters in hybrid cloud environment such as one shown in diagram below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nvDMsbgq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ts2fdy5g3hhhzkrdsbk6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nvDMsbgq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ts2fdy5g3hhhzkrdsbk6.png" alt="e" width="636" height="471"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  ## `How would you plan such type of complex service mesh?`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Let's make it little more complicated with real case study&lt;/p&gt;

&lt;h2&gt;
  
  
  Use Case from Telecom Domain
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bvpljln9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wzyve34hjfoehlouc7fg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bvpljln9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wzyve34hjfoehlouc7fg.png" alt="f" width="880" height="452"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In order to design such kind of complex service mesh you need systematic framework to decide and plan for your service mesh architecture, features and implementation.&lt;br&gt;
We will look at details in the upcoming article. Watch this space for more.&lt;/p&gt;

</description>
      <category>servicemesh</category>
      <category>aws</category>
      <category>enterprise</category>
      <category>scalability</category>
    </item>
    <item>
      <title>AWS Landing Zone and Control Tower</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Fri, 06 Jan 2023 01:12:36 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/aws-landing-zone-and-control-tower-2afo</link>
      <guid>https://forem.com/shweta_vohra/aws-landing-zone-and-control-tower-2afo</guid>
      <description>&lt;p&gt;Client is looking to get into AWS for the first time, they may know a bit about platform architecture such as Regions, Availability Zones, EC2, S3, VPN's etc. But they may not know that there is a whole other space around procurement, billing, and AWS accounts, organization and sub organization structure, network, security infrastructure and many more things that needs to be considered as part of any enterprise-grade setup, especially at scale. That’s where you need Landing Zone.&lt;/p&gt;

&lt;p&gt;Landing zone can provide following things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A landing zone is a well-architected, multi-account AWS environment that’s based on security and compliance best practices&lt;/li&gt;
&lt;li&gt;It provides a baseline to get started with multi-account architecture&lt;/li&gt;
&lt;li&gt;Fundamental aspects for any complex hybrid cloud such as access control, governance, data security, network design, and shared services such as logging/ monitoring etc.&lt;/li&gt;
&lt;li&gt;Automating and setting up cloud using AWS control tower for faster pace and repeatability&lt;/li&gt;
&lt;li&gt;Setting up right set of policies and compliances for the your Industry&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Landing Zone Benefits
&lt;/h2&gt;

&lt;p&gt;The Landing Zone solution provides users with a few key benefits designed to allow easy control of multiple accounts. Here’s a quick overview of all the benefits you can expect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automatic AWS environment setup&lt;/li&gt;
&lt;li&gt;Saves a lot of time and effort&lt;/li&gt;
&lt;li&gt;AVM or Account Vending Machine&lt;/li&gt;
&lt;li&gt;Managing multiple accounts&lt;/li&gt;
&lt;li&gt;Automatic baseline security feature setup&lt;/li&gt;
&lt;li&gt;Account management&lt;/li&gt;
&lt;li&gt;Centralized logging&lt;/li&gt;
&lt;li&gt;The setup is done according to the best practices&lt;/li&gt;
&lt;li&gt;Efficient governance and operation&lt;/li&gt;
&lt;li&gt;Creates a flexible business environment&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to create Landing Zone?
&lt;/h2&gt;

&lt;p&gt;When we start thinking about AWS and what customers want to do on AWS, we need to first think about requirements to better understand what the customers need. For example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Which is the right service/tool to use? &lt;/li&gt;
&lt;li&gt;What about security, governance, and baseline? &lt;/li&gt;
&lt;li&gt;How many accounts should I create for my customer based on use cases? &lt;/li&gt;
&lt;li&gt;How many users, groups, and what permissions should they have?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let me also introduce you to the concept of a Landing Zone and Control Tower with respect to when they work well together.&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Landing Zone vs. Control Tower
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;AWS Control Tower&lt;/strong&gt; is an AWS managed service able to control all the resources that are part of: AWS Organizations, Identity and Access Management, Guardrails, Service Catalog and multi AWS accounts. Through the Service Catalog, you can create as many accounts as you want and apply to them the rules based on the requirements. Control Tower sets up a Landing zone in easy and secure way.&lt;br&gt;
&lt;code&gt;vs.&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Landing Zone&lt;/strong&gt; is a solution provided by AWS Control Tower or you can create your own solution based on your requirements. Your own CloudFormation or Terraform stacks across AWS accounts.&lt;/p&gt;

&lt;p&gt;Both Control Tower and Landing Zone help set up and manage secure multi-account AWS environments. Now the question comes which one should customers use? Let's take a closer look and figure out.&lt;/p&gt;

&lt;p&gt;Three different ways to create landing zones are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A landing zone based on services using AWS Control Tower&lt;/li&gt;
&lt;li&gt;A CloudFormation solution build within the AWS Landing Zone&lt;/li&gt;
&lt;li&gt;A Custom landing zone you build manually&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;More details in upcoming article. Watch this space for more.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>platformsetup</category>
      <category>network</category>
    </item>
    <item>
      <title>Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Thu, 05 Jan 2023 17:12:49 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/must-know-container-security-constructs-namespace-seccomp-control-groups-selinux-53ac</link>
      <guid>https://forem.com/shweta_vohra/must-know-container-security-constructs-namespace-seccomp-control-groups-selinux-53ac</guid>
      <description>&lt;h2&gt;
  
  
  SELinux
&lt;/h2&gt;

&lt;p&gt;SELinux (Security-Enhanced Linux) is a mandatory access control system for processes. Linux kernel uses SELinux to protect processes from each other and to protect the host system from its running processes. Processes run as a confined SELinux type that has limited access to host system resources.&lt;/p&gt;

&lt;p&gt;Condition that brings SELINUX into action. Check or configure file /etc/selinux/config for possible SELINUX values:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SELINUX=disabled or&lt;/li&gt;
&lt;li&gt;SELINUX=enforcing or&lt;/li&gt;
&lt;li&gt;SELINUX=permissive&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Seccomp
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Seccomp stands for secure computing mode.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The seccomp() system call operates on the Secure Computing&lt;br&gt;
       (seccomp) state of the calling process.&lt;br&gt;
*Man page definition&lt;/p&gt;

&lt;p&gt;Seccomp limits how processes could use system calls. Seccomp defines a security profile for processes, whitelisting the system calls, parameters and file descriptors they are allowed to use. SecComp defines which system calls should and should not be allowed to be executed by a container. It restricts the calls a process/continer able to make from userspace into the kernel.&lt;/p&gt;

&lt;h2&gt;
  
  
  Namespaces
&lt;/h2&gt;

&lt;p&gt;The kernel can isolate specific system resources, usually visible to all processes. This is done by placing the resources within a namespace. Inside a namespace, only processes that are members of that namespace can see or utilize those resources. Namespces help apply security restrictions to containers. Below mentioned are major 7 namespaces that help achieve boundaries and restrictions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cgroup — Cgroup root directory&lt;/li&gt;
&lt;li&gt;IPC — Inter Process Communication, POSIX message queues&lt;/li&gt;
&lt;li&gt;Network — Network devices, stacks, ports, etc.&lt;/li&gt;
&lt;li&gt;Mount — Mount points&lt;/li&gt;
&lt;li&gt;PID — Process IDs&lt;/li&gt;
&lt;li&gt;User — User and group IDs&lt;/li&gt;
&lt;li&gt;UTS — Hostname and NIS domain name&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Control groups (cgroups)
&lt;/h2&gt;

&lt;p&gt;Control groups partition sets of processes and their children into groups to manage and limit the resources they consume. Control groups place restrictions on the amount of system resources that processes can use. Those restrictions keep one process/container from using too many resources on the host.&lt;/p&gt;

&lt;p&gt;CGroups Examples:&lt;br&gt;
— cpu-shares&lt;br&gt;
— cpuset-cpus&lt;br&gt;
— memory-reservation&lt;br&gt;
— kernel-memory&lt;br&gt;
— blkio-weight (block IO)&lt;br&gt;
— device-read-iops&lt;br&gt;
— device-write-iops&lt;/p&gt;

&lt;p&gt;For more information on this topic listen recorded session &lt;a href="https://www.youtube.com/watch?v=tpTes7IgRJ4"&gt;here&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Thankfully AWS EKS and other AWS container services are security hardened and therefore cannot be mis-used by essential container constructs.&lt;/p&gt;

</description>
      <category>containers</category>
      <category>aws</category>
      <category>security</category>
    </item>
    <item>
      <title>EFS vs. FSx for ONTAP</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Sun, 19 Jun 2022 17:08:45 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/efs-vs-fsx-for-ontap-m25</link>
      <guid>https://forem.com/shweta_vohra/efs-vs-fsx-for-ontap-m25</guid>
      <description>&lt;p&gt;EFS vs. FSx for ONTAP - I did this comparison for some client scenario recently and found some interesting attributes where these two services have their own merits and distinctions. Hope you find this useful!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Xv1ufz-E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gv1h2ytzmw6yn3u3zfi3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Xv1ufz-E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gv1h2ytzmw6yn3u3zfi3.png" alt="EFS vs. FSx for ONTAP" width="762" height="531"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Amazon EFS lock limits are recently increased. Do read here for more details: &lt;br&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2022/05/amazon-efs-larger-number-concurrent-file-locks/"&gt;EFS Lock Limits News&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>filesystem</category>
      <category>aws</category>
      <category>storag</category>
      <category>communitybuilder</category>
    </item>
    <item>
      <title>How to conduct AWS WAF review efficiently?</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Sun, 29 May 2022 14:00:00 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/how-to-conduct-aws-waf-review-efficiently-2791</link>
      <guid>https://forem.com/shweta_vohra/how-to-conduct-aws-waf-review-efficiently-2791</guid>
      <description>&lt;p&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Shweta Vohra, Siddhartha Sood, Balakrishnan Sreenivasan&lt;/p&gt;

&lt;p&gt;With experience utilizing WAF reviews, we have built the systematic guidance and checklist based on our own experiences to help teams undergoing Well Architected Framework Reviews. This is starting point for Reviewers, Architects and Developers to plan for AWS WAF Review.&lt;/p&gt;

&lt;h3&gt;
  
  
  Pre-requisites For Review
&lt;/h3&gt;

&lt;p&gt;To use this framework efficiently there is preparation required for each of the six fundamental pillars. In case you are new to AWS WAF Review then &lt;a href="https://dev.to/shweta_vohra/aws-well-architecture-framework-review-guidance-tool-usage-and-trainings-4l57"&gt;What is AWS WAF?&lt;/a&gt;. The team or individual architect performing this well architected review should be thorough and qualified in following aspects:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;First and foremost - Reviewer must be an &lt;em&gt;"AWS Solution Architect - Professional Certified"&lt;/em&gt; and even better if person is &lt;em&gt;"AWS WAF Certified Reviewer"&lt;/em&gt; for well architected framework (Check AWS Well-Architected Partner Bootcamp if you have access). In any case reviewer should be well versed with all assistive AWS services and tool.&lt;/li&gt;
&lt;li&gt;One should know all six pillars and should have read whitepapers as mentioned below. This is by far the most comprehensive yet best guidance about these pillars:&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/operational-excellence-pillar/wellarchitected-operational-excellence-pillar.pdf"&gt;Operational Excellence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/wellarchitected-security-pillar.pdf#welcome"&gt;Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/wellarchitected-reliability-pillar.pdf#welcome"&gt;Reliability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/performance-efficiency-pillar/wellarchitected-performance-efficiency-pillar.pdf#welcome"&gt;Performance Efficiency&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/wellarchitected-cost-optimization-pillar.pdf#welcome"&gt;Cost Optimization&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/sustainability-pillar/cloud-sustainability.html"&gt;Sustainability&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Get accustomed with Well architected framework Tool through AWS Console. Reviewer should know the tool and its features, and different reports that it can produce. One should also complete AWS well architected comprehensive Labs to get acquainted to various aspects linked with each pillar.&lt;/li&gt;
&lt;li&gt;Define the workload or in other words logical group of resources that needs to be reviewed. It can be one application, resources in one account or vpc, group of accounts or any other organization centric criteria. Additionally, Reviewer also need to know the organization, requirements and prioritize in advance workload for which review needs to be conducted.&lt;/li&gt;
&lt;li&gt;Bring all required stakeholders together for efficient review. These should be representative/s who can support all facets of organization such as developer, architects, governance, operational, Security, business, and strategy.&lt;/li&gt;
&lt;li&gt;Involve domain or industry specialist if AWS Well Architected Industry specific lens review required. Refer section on Industry lenses for more details.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Review Tool and Guidance
&lt;/h3&gt;

&lt;p&gt;Steps to Follow:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Open AWS WAF Tool&lt;/em&gt;&lt;/strong&gt; -&amp;gt; Open your AWS account and navigate to space (Region, VPC, Workload etc.) where review needs to be performed for upcoming or already present workload/Software. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Search&lt;/em&gt;&lt;/strong&gt; -&amp;gt; "AWS Well-Architected Tool" on AWS console&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Define&lt;/em&gt;&lt;/strong&gt;-&amp;gt; workload on same AWS account, different account, or upcoming design&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Document the Workload State&lt;/em&gt;&lt;/strong&gt; -&amp;gt; Review an architecture by answering a set of Questions. Choose answers grouped into Six Pillars. Review screen on AWS console looks like as specified in below image for your reference.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Review the Improvement Plan&lt;/em&gt;&lt;/strong&gt; after review completion &amp;amp;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Make Improvements and Measure Progress&lt;/em&gt;&lt;/strong&gt;
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MPzaR1w3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bduivypzlpczhu8y6o2y.png" alt="AWS WAF Tool UI" width="880" height="394"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Example Process Involved:&lt;/em&gt;&lt;br&gt;
Below table gives high level guidance on operational excellence pillar (as an example) for how to systematically prepare for each pillar review during AWS Well Architected Framework Review:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rRYpM9t1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/re09ig4338a25jsmqo5n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rRYpM9t1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/re09ig4338a25jsmqo5n.png" alt="Sample Operation Pillar Excellence" width="850" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As mentioned in above table, reviewer should prepare customized review guidelines, processes and services that are applicable to workload and client organization for which review is being planned.&lt;/p&gt;

&lt;h3&gt;
  
  
  After Review - Outcomes, Reports and Plan
&lt;/h3&gt;

&lt;p&gt;Review report gives outcomes in form of two types of Risk items:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;High Risks Items (HRIs) and Medium Risk Items (MRIs)&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Tool also provides prioritized improvement plan for each prioritized pillars based on high-risk items. Reviewer should help client priortize the High and Medium Risk items to incorporate in their AWS Cloud, services and applications. Both reviewer and reviewee team (client) should agree on creating further milestone reviews. This helps in continuous evolving workloads and ensuring that review feedback is incorporated.&lt;br&gt;
For example, milestones can be design time, pre Go-Live, version 1 release, new feature release, architecture board continuous reviews etc. On AWS tool sample milestones appear as given below in snapshot:&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4r6fAbK6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/epswduuc64ayu5emx5d2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4r6fAbK6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/epswduuc64ayu5emx5d2.png" alt="Report" width="880" height="277"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Post Review - Evolve
&lt;/h3&gt;

&lt;p&gt;Architecture on cloud is not one time activity. Therefore, reviewer should be reviewing workloads with continuous milestones and frequent reviews as per frequency decided mutually with client. Ideally it should be done every quarter so to overcome all high and medium risks associated with reviewed workload and enforcing best practices to the maximum. However timelines should be adopted as per client and reviewers mutual agreement.&lt;/p&gt;

&lt;p&gt;Watch out for articles:&lt;br&gt;
&lt;a href="https://dev.tourl"&gt;Specific Example Guidance - Will be added soon!&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>architecture</category>
      <category>evolvingarchitecture</category>
      <category>awswaf</category>
    </item>
    <item>
      <title>AWS Well Architecture Framework - Review Guidance, Tool Usage and Trainings</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Sun, 29 May 2022 13:44:00 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/aws-well-architecture-framework-review-guidance-tool-usage-and-trainings-4l57</link>
      <guid>https://forem.com/shweta_vohra/aws-well-architecture-framework-review-guidance-tool-usage-and-trainings-4l57</guid>
      <description>&lt;p&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Shweta Vohra, Siddhartha Sood, Balakrishnan Sreenivasan&lt;/p&gt;

&lt;h3&gt;
  
  
  A. Document Scope
&lt;/h3&gt;

&lt;p&gt;This document gives AWS Well Architected Framework (WAF) introduction and subsequent linked articles for utilizing this framework efficiently. &lt;br&gt;
Not trying to replicate vast information and documentation available for AWS WAF framework. However, this document serves as the Introduction as well as guidance for new or experienced architects to conduct Well architechted reviews efficiently and continuously. &lt;/p&gt;

&lt;h3&gt;
  
  
  B. Introduction - AWS WAF
&lt;/h3&gt;

&lt;p&gt;Cloud based systems and solutions brings agility for organizations. With agility comes continuous changes and evolution of business capability and architecture maturity. As architecture is not one time activity on cloud and at the same time does include decisions and trade-offs that best represent the architected system and can still evolve. Therefore, AWS provides this guidance, tool &amp;amp; APIs in form of AWS Well Architected Framework. This framework provides a highly stable and consistent approach for customers and partners to evaluate architectures and provides prescriptive guidance to help implement designs that are scalable, secure, performant, reliable, sustainable, and optimized. Popular AWS Well Architected Framework is practical step by step guidance from AWS for creation, review, and continuous assessment of cloud-based workloads/ software&lt;/p&gt;

&lt;p&gt;The AWS Well-Architected Framework is based on six pillars as mentioned below:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Operational Excellence&lt;/strong&gt; - Infrastructure and other resources efficient operationalization. This includes IaC (Infrastructure as Code), monitoring, and ease of continuous use.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security&lt;/strong&gt; - This pillar ensures guidance in form of areas where security should be investigated and how to seal it wholistically&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reliability&lt;/strong&gt; - Differentiating on cloud by proactively building and designing reliable systems with reliable components and services so that resources are always available, can scale as per demand and resilient. This pillar guides on this aspect&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Performance Efficiency&lt;/strong&gt; - This pillar guides on computing requirements and how to efficiently utilize them&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost Optimization&lt;/strong&gt; - Guidance on how to continuously benefit from cloud services still get optimal price point&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Sustainability&lt;/strong&gt; - This newly introduced pillar has been announced in 2021 AWS Re:Invent to take care of long term environmental impacts, especially energy consumption and resources efficiency&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For all above pillars this framework defines following:&lt;br&gt;
&lt;strong&gt;- Design Principles&lt;/strong&gt;- These principles give basic sense and fundamental coverage around each of the pillars&lt;br&gt;
&lt;strong&gt;- Best Practices -&lt;/strong&gt; Best practices provides pillar wise questionnaire and supporting ideal state for the best practice to support and gauge the current state of client workload and&lt;br&gt;
&lt;strong&gt;- Resources&lt;/strong&gt; - Additional resources for each pillar to get in-depth information based on relevant domain and work area&lt;/p&gt;

&lt;h3&gt;
  
  
  C. How to use this framework efficiently for review?
&lt;/h3&gt;

&lt;p&gt;With experience utilizing WAF reviews, we have built the systematic guidance and checklist based on our own experiences to help teams undergoing Well Architected Framework Reviews. Check out this article to know more: &lt;a href="https://dev.to/shweta_vohra/how-to-conduct-aws-waf-review-efficiently-2791"&gt;How to conduct AWS WAF reviews efficiently?&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  D. AWS Well-Architected Lenses
&lt;/h3&gt;

&lt;p&gt;AWS is in process of enhancing the Well Architected Framework. As part of enhancements AWS is releasing domain specific or technology centric WAF guidance. For example for IOT type of workload there is IOT Lens, for serverless kind of workloads where resources are primarily running on a serverless approach/design there is serverless lens. &lt;br&gt;
Lenses provide a way to consistently measure architectures against best practices in that domain or technology and identify areas for improvement. The AWS Well-Architected Framework Lens is automatically applied when a workload is defined in addition to additional lens that you might have included at the time of review on tool. A workload can have one or more lenses applied. Each lens has its own set of questions, best practices, notes, and improvement plan. Based on selection and applicability of review resources, reviewer should refer lens specific checklist that are available as part of documentation and mentioned in Appendix section of this document.&lt;/p&gt;

&lt;p&gt;At the time of writing of this document 3 lenses have been integrated on tool. Please refer below image for lenses that are integrated with AWS Well Architected Tool.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4m00hmc2nqf4r4xc41rt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4m00hmc2nqf4r4xc41rt.png" alt="WAF Lenses"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  E. AWS WAF Training Path
&lt;/h3&gt;

&lt;p&gt;To gain insights into AWS WAF process as reviewer you can attend following trainings and follow path to become AWS Certified WAF Reviewer:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.credly.com/badges/2b8a9162-ff94-416d-a711-19dada7630e7" rel="noopener noreferrer"&gt;Well Architect Proficient Badge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Class-Room Trainings (Available to AWS Patner Connects):&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;AWS Partner: Well-Architected Best Practices&lt;/li&gt;
&lt;li&gt;AWS Partner: Advanced AWS Well-Architected Best Practices&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  F. Appendix - Links and References
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html" rel="noopener noreferrer"&gt;AWS Well Architected Framework - Documentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/userguide/lenses.html" rel="noopener noreferrer"&gt;AWS Well Architected Lenses - Domain Specific&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/operational-excellence-pillar/wellarchitected-operational-excellence-pillar.pdf" rel="noopener noreferrer"&gt;Operation Excellence Pillar - AWS Well Architected Framework
&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>wellarchitected</category>
      <category>aws</category>
      <category>architecture</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Wed, 25 May 2022 06:14:31 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/must-know-container-security-constructs-namespace-seccomp-control-groups-selinux-5d2g</link>
      <guid>https://forem.com/shweta_vohra/must-know-container-security-constructs-namespace-seccomp-control-groups-selinux-5d2g</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GBcvdeaS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gbykxkady2n7a4erd3o7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GBcvdeaS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gbykxkady2n7a4erd3o7.png" alt="Container Security Constructs" width="658" height="451"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SELinux
&lt;/h2&gt;

&lt;p&gt;SELinux (Security-Enhanced Linux) is a mandatory access control system for processes. Linux kernel uses SELinux to protect processes from each other and to protect the host system from its running processes. Processes run as a confined SELinux type that has limited access to host system resources.&lt;/p&gt;

&lt;p&gt;Condition that brings SELINUX into action. Check or configure file /etc/selinux/config for possible SELINUX values:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SELINUX=disabled or&lt;/li&gt;
&lt;li&gt;SELINUX=enforcing or&lt;/li&gt;
&lt;li&gt;SELINUX=permissive&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Seccomp
&lt;/h2&gt;

&lt;p&gt;Seccomp stands for secure computing mode.&lt;/p&gt;

&lt;h5&gt;
  
  
  The seccomp() system call operates on the Secure Computing       (seccomp) state of the calling process.
&lt;/h5&gt;

&lt;p&gt;&lt;em&gt;*Man page definition&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Seccomp limits how processes could use system calls. Seccomp defines a security profile for processes, whitelisting the system calls, parameters and file descriptors they are allowed to use. SecComp defines which system calls should and should not be allowed to be executed by a container. It restricts the calls a process/continer able to make from userspace into the kernel.&lt;/p&gt;

&lt;h2&gt;
  
  
  Namespaces
&lt;/h2&gt;

&lt;p&gt;The kernel can isolate specific system resources, usually visible to all processes. This is done by placing the resources within a namespace. Inside a namespace, only processes that are members of that namespace can see or utilize those resources. Namespces help apply security restrictions to containers. Below mentioned are major 7 namespaces that help achieve boundaries and restrictions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cgroup — Cgroup root directory&lt;/li&gt;
&lt;li&gt;IPC — Inter Process Communication, POSIX message queues&lt;/li&gt;
&lt;li&gt;Network — Network devices, stacks, ports, etc.&lt;/li&gt;
&lt;li&gt;Mount — Mount points&lt;/li&gt;
&lt;li&gt;PID — Process IDs&lt;/li&gt;
&lt;li&gt;User — User and group IDs&lt;/li&gt;
&lt;li&gt;UTS — Hostname and NIS domain name&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Control groups (cgroups)
&lt;/h2&gt;

&lt;p&gt;Control groups partition sets of processes and their children into groups to manage and limit the resources they consume. Control groups place restrictions on the amount of system resources that processes can use. Those restrictions keep one process/container from using too many resources on the host.&lt;/p&gt;

&lt;p&gt;CGroups Options(Examples):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;— cpu-shares&lt;/li&gt;
&lt;li&gt;— cpuset-cpus&lt;/li&gt;
&lt;li&gt;— memory-reservation&lt;/li&gt;
&lt;li&gt;— kernel-memory&lt;/li&gt;
&lt;li&gt;— blkio-weight (block IO)&lt;/li&gt;
&lt;li&gt;— device-read-iops&lt;/li&gt;
&lt;li&gt;— device-write-iops&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>containersecurity</category>
      <category>security</category>
      <category>eks</category>
      <category>aws</category>
    </item>
    <item>
      <title>Is Kubernetes- Boring or Boon?</title>
      <dc:creator>Shweta Vohra</dc:creator>
      <pubDate>Mon, 06 Dec 2021 10:08:42 +0000</pubDate>
      <link>https://forem.com/shweta_vohra/is-kubernetes-boring-or-boon-n1a</link>
      <guid>https://forem.com/shweta_vohra/is-kubernetes-boring-or-boon-n1a</guid>
      <description>&lt;p&gt;Is Kubernetes boring, tedious or boon? I have heard both sides of arguments in favour and many a times not so much in favour of K8S. Kubernetes is a popular technology these days. Every IT company is promoting it, end users/customers either using it or talking about it or evolving with it, Open-source users and contributors love it and there are so many jobs in market that require this skill set (both JD and package wise 😉). Certainly, there is time to check what is clicking and what is not?&lt;br&gt;
This article presents an independent view and reality check on what makes Kubernetes tick and what it is failing to give? &lt;br&gt;
&lt;strong&gt;Read on and please do share your constructive views/likes/comments.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let's first understand few basics and background to set the context right:&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Kubernetes? 
&lt;/h2&gt;

&lt;p&gt;In simplest words it is Container Orchestration Platform. This technology is created to take care of containers lifecycle management with ease and for maximum containerization benefits. &lt;br&gt;
It was an internal project developed and used by Google initially and then donated the project to The Cloud Native Computing Foundation (CNCF) at the time of CNCF inception. Since Kubernetes adopted by CNCF this has grown in leaps and bounds and still growing with loads of contributions from open-source community. There are many managed Kubernetes services/ platform flavours that have been laid out on top of native Kubernetes by companies like Red Hat, IBM, Google, AWS, Azure, VMWare and many more.&lt;/p&gt;

&lt;h2&gt;
  
  
  CNCF Philosophy - Maintainer of Kubernetes
&lt;/h2&gt;

&lt;p&gt;CNCF is always working on adoption of various cloud native technology paradigm by fostering and sustaining an ecosystem of open-source in most vendor-neutral way. Their philosophy is to democratize the technology patterns to make those innovations accessible for everyone. This also includes Kubernetes which is one of the most popular and already graduated projects of CNCF. We also need to note, as per CNCF charter, they value fast is better than slow, open code, conduct and technology, fair, strong technical identity, clear boundaries, scalable, platform agnostic.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1qU4Iyiy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/juoo7vcioqr7ddftqh26.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1qU4Iyiy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/juoo7vcioqr7ddftqh26.png" alt="Image description" width="602" height="324"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Picture source: Released by CNCF in 2020&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now given this background let's evaluate this technology based on two major criterias:&lt;/p&gt;

&lt;h2&gt;
  
  
  Adoption vs. Ease of Adoption
&lt;/h2&gt;

&lt;p&gt;How far this technology actually adopted by organizations, techies and how easy it is to use and adopt by business. Both these parameters are important to understand for successful adoption of any technology and so is true for Kubernetes.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes it Popular?
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Open-Source Superpower&lt;/strong&gt; - Kubernetes being CNCF maintained project it has got super power of development and nurturing by open-source community which means best of all open minds shaping the future in very systematic way.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Most Vendor Neutral Technology&lt;/strong&gt;- Due to Open-source power this technology is not locked and blocked by any vendor or cloud provider. There is no dependencies on any specific people or organizations. All can use it and shape it up further. In fact features like operator framework makes it possible to add customized functionalities to the Kubernetes and help extend it faster.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pace of Innovation&lt;/strong&gt; - Kubernetes and relative set of technologies are keeping everyone on their toes be it individuals, organizations, and end users by the way of number of super charged advancements and releases that CNCF gives.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;End User Beneficial&lt;/strong&gt; - Important aspect of Kubernetes is that it weaves many things together that promote cloud adoption and cloud native applications and therefore helping end user to innovate for new challenging situations and provide more and more tools to use by developers and Operations as well as exceptional benefits to their customers.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What makes it difficult and tedious?
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Designing and implementing a production grade application &lt;/strong&gt;- To reap benefits of K8S one needs to put lot of efforts in collating all required application life cycle elements such as application sizing, converting them to containers, storing them to registry, using proper services communication or mesh, observability, version management, deploying security solutions, setting up access, continuous integration, performance etc. All this and much more needs to be taken care before application starts reaping benefits of Kubernetes features and be production ready.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Architectural complexity&lt;/strong&gt; -Kubernetes architecture comes with few mandatory components that are provided for working of Kubernetes cluster and container orchestration features. Rest all features gets bundled either through other CNCF projects or Vendor services. There are also standards and interfaces that kubernetes provides such container runtime interface (CRI), container networking interface (CNI), container storage interface (CSI), Infrastructure options, container engines options (docker, CRI-O, RKT etc.), service mesh options (Istio, Linkerd, AWS AppMesh etc.) and many more. These choices come with burden of selection, installation and maintaining such custom cluster configuration. This all makes bringing up and maintaining a "Well Architected Kubernetes Ready Platform" complex.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hard for Developers and SysOps&lt;/strong&gt; -Due to all above reasons it's hard for developers, it lacks the development agility and takes long ramp-up curve to understand and utilize it in entirety. Not just for developers even administrators or Ops need to know lot of things to maintain such a cluster and its run time issues with  CLI tools such as kubectl, etcdctl, systemctl, YAML/JSON, helm charts and what not? &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Based on above &lt;em&gt;&lt;strong&gt;let's summarise for Adoption vs. Ease of Adoption&lt;/strong&gt;&lt;/em&gt;. Its clear that adoption is tough due to continuous evolution and variety of options to choose from that comes with Kubernetes. Even though there are products like RedHat OpenShift in market that have overcome many shortcomings by bundling developer centric platforms with packaging of services that makes it complete. However, such options do come with cost involved and licensing etc. So, the big question is Simplification of Native Kubernetes: Shall we attempt or not? - When I asked this question about simplification during a panel discussion to CNCF stalwarts during one of the KubeCon. The answer I got, "Its left to managed service providers to address the gaps (as areas mentioned above in pros and cons)". &lt;/p&gt;

&lt;p&gt;In my view (independent view) we need to balance between Adoption and Ease of Adoption &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Adoption:&lt;/u&gt;&lt;/strong&gt; &lt;br&gt;
a) Organizations need to catch up fast on adopting the new and creating their eco-system that is agile and learning/ improving continuously. There is no two ways about the same. b) There was a time when similar kind of critiquing and confusion was around Linux (Linux vs. Windows days). Linux was not easy. It had multiple flavours, CLI, open-source contributions, less of developer centricity and mostly similar questions and doubts as we have today with Kubernetes. However, we all know what is Linux today and still advancing in technology and strengthening year on year. While both popular OS exists today that is linux as well as windows. We are widely using Linux everywhere and windows has learnt to be compatible with Linux in so many ways c) Hence instead of missing the wave of Kubernetes, its favourable learning/leveraging it in whatever capacity individuals or organizations can do that.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Ease of Adoption:&lt;/u&gt;&lt;/strong&gt; &lt;br&gt;
While we understand companies/individuals need to learn and constantly adapt. But.. a) There are many business problems that take priority rather than every company turns into an IT company (in a way it's happening already 😉). b) On other hand as there is great emphasis on reducing carbon footprint by CNCF and many open-source contributors. Imagine how much efforts and resources would be saved across platforms, cloud providers, customers, developers, administrators -  if Kubernetes bundling and maintenance is simplified. c) This is an area that should be relooked into by CNCF to make the native kubernetes releases to be adopted faster, updated with ease and for faster application setup/development management. Focus should be there to simplifying Kubernetes packaging and architecture. There can be complete bundling for all required application lifecycle features (minimal bundle/s) to choose from while taking care of container lifecycle features. Therefore, even if Kubernetes is mature or maturing further, it would be great to see CNCF addressing these aspect for everyone.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>kubernetes</category>
      <category>eks</category>
      <category>thoughtleadership</category>
    </item>
  </channel>
</rss>
