
AWS Morning Brief (Corey Quinn)
Explore every episode of AWS Morning Brief
Pub. Date | Title | Duration | |
---|---|---|---|
31 May 2021 | AWS Compute Optimizer Now Less Crap | 00:06:48 | |
AWS Morning Brief for the week of May 31, 2021, with Corey Quinn.
| |||
14 Oct 2020 | Reader Mailbag: Accounts (AMB Extras) | 00:10:27 | |
| |||
06 Jun 2022 | Googling the AWS CDK V1 | 00:06:31 | |
AWS Morning Brief for the week of June 6, 2022, with Corey Quinn.
| |||
06 Mar 2020 | Whiteboard Confessional: Scaling Databases in a Single Bound | 00:11:35 | |
About Corey Quinn Over the course of my career, I’ve worn many different hats in the tech world: systems administrator, systems engineer, director of technical operations, and director of DevOps, to name a few. Today, I’m a cloud economist at The Duckbill Group, the author of the weekly Last Week in AWS newsletter, and the host of two podcasts: Screaming in the Cloud and, you guessed it, AWS Morning Brief, which you’re about to listen to. Links Transcript Corey: Corey: Welcome to AWS Morning Brief: Whiteboard Confessional. I’m Cloud Economist Corey Quinn. This weekly show exposes the semipolite lie that is whiteboard architecture diagrams. You see, a child can draw a whiteboard architecture, but the real world is a mess. We discuss the hilariously bad decisions that make it into shipping products, the unfortunate hacks the real world forces us to build, and that the best to call your staging environment is “theory”. Because invariably whatever you’ve built works in the theory, but not in production. Let’s get to it. But first… On this show, I talk an awful lot about architectural patterns that are horrifying. Let’s instead talk for a moment about something that isn’t horrifying. CHAOSSEARCH. Architecturally, they do things right. They provide a log analytics solution that separates out your storage from your compute. The data lives inside of your S3 buckets, and you can access it using APIs you’ve come to know and tolerate, through a series of containers that live next to that S3 storage. Rather than replicating massive clusters that you have to care and feed for yourself, instead, you now get to focus on just storing data, treating it like you normally would other S3 data and not replicating it, storing it on expensive disks in triplicate, and fundamentally not having to deal with the pains of running other log analytics infrastructure. Check them out today at CHAOSSEARCH.io. So I’m going to deviate slightly from the format that I’ve established so far on these Friday morning whiteboard confessional stories, and talk instead about a pattern that has tripped me and others up more times than I care to remember. So it’s my naive hope that by venting about this for the next 10 minutes or so, I will eventually be able to encounter an environment where someone hasn’t made this particular mistake. And what mistake am I talking about? Well, as with so many terrifying architectural patterns, it goes back to databases. You decide that you’re going to write a small toy application, You’re probably not going to turn this into anything massive. And in all honesty, baby seals will probably get more hits than whatever application you’re about to build will. So you don’t really think too hard about what your database structure is going to look like. You spin up a database, you define the database endpoint inside the application, and you go about your merry way. Now, that’s great. Everything’s relatively happy, and everything we just described will work. But let’s say that you hit that edge or corner case where this app doesn’t fade away into obscurity. In fact, this turns out to have some legs, the thing that you’re building now has attained business viability or is at least seeing enough user traffic that it now has to worry about load. So you start taking a look at this application because you get the worst possible bug reports six to eight months later; it’s slow. Where do you start looking when something is slow? Well, personally, I start looking at the bar, because that is a terribly obnoxious problem to have to troubleshoot. There are so many different ways that latency can get injected into an application. You discover the person reporting the slowness is on the other side of the world with satellite internet connection that they’re apparently trying to set up to the satellite with a tin can and a piece of very long string. There’s a lot of failure states here that you get to start hunting down. The joys of latency hunting. But in many cases, the answer is going to come down to, oh, that database that you defined is now no longer up to the task. You’re starting to bottleneck on that database. Now, you can generally buy your way out of this problem by scaling up whatever database you’re using. Terrific, great, it turns out that you can just add more hardware, which in a time of cloud, of course, just means more money and a bit of downtime while you scale the thing up, but that gets you a little bit further down the road. Until the cycle begins to rinse and repeat, and it turns out, there are only instances that are so large that you’ll be able to get to power databases. Also, they’re not exactly inexpensive. Now, I would name exact sizes of what those databases might look like. But this is AWS, they’re probably going to release at least five different instance families and sizes, by the time I finish recording this. But it gets published later at the end of the week. So instead, there is an alternative here, and it doesn’t take much from an engineering or design perspective when you’re building out one of these silly toy apps that will never have to scale. What is that fix, you might wonder? Terrific question. Let me tell you in just a minute. In the late 19th and early 20th centuries, democracy flourished around the world. This was good for most folks, but terrible for the log analytics industry because there was now a severe shortage of princesses to kidnap for ransom to pay for their ridiculous implementations. It doesn’t have to be that way. Consider CHAOSSEARCH. The data lives in your S3 buckets in your AWS accounts, and we know what that costs. You don’t have to deal with running massive piles of infrastructure to be able to query that log data with APIs you’ve come to know and tolerate, and they’re just good people to work with. Reach out to CHAOSSEARCH.io. And my thanks to them for sponsoring this incredibly depressing podcast. So this is a pattern that increasingly, modern frameworks are recommending, but a number of them don’t. And I’m not going to name names, because I don’t want to wind up in a slap and tickle fight around which frameworks are good versus which frameworks are crappy. You can all make your own decisions around that. But the pattern that makes sense for this is even when you’re beginning with a toy app, go ahead and define two database endpoints, one for reads, And one for writes. Invariably, this is going to solve a whole host of problems with most database technologies. If you take a look at most applications, and yes, I know there are going to be exceptions to this, they tend to bottleneck on reads. If you have just a single database or database cluster, then all of the read traffic gets in the way of being able to write to that. That includes things that don’t actually need to be in line with the rest of what the application is doing. If you can have a read replica that’s used for business analytics, great. Your internal business teams can beat the living crap out of that database replica without damaging anything that’s in the critical path of serving users. And the writes can then go specifically to the primary node, w... | |||
01 Nov 2021 | The AWS Cwoud Backstowy | 00:10:20 | |
AWS Morning Brief for the week of November 1, 2021 with Corey Quinn.
| |||
15 Nov 2021 | The AWS East West Canada Region | 00:11:02 | |
AWS Morning Brief for the week of November 15, 2021 with Corey Quinn.
| |||
24 Jun 2024 | RDS Hates Its Customers, Financially Speaking | 00:02:57 | |
AWS Morning Brief for the week of Monday, June 24th, 2024, with Corey Quinn. Links: | |||
12 Oct 2023 | Better Late Than Even Later | 00:04:25 | |
Last week in security news: AWS Firewall Manager supports referencing of Security Groups, Secure by Design: AWS to enhance MFA requirements in 2024, You Can't Control Your Data in the Cloud, and more! Links:
| |||
07 Oct 2020 | Reader Mailbag: AWS Services (AMB Extras) | 00:12:02 | |
Links Mentioned
Sponsors
Never miss an episode
| |||
05 Mar 2021 | Tag—You’re It! | 00:17:48 | |
Links:
Transcript Corey: This episode is sponsored in part by LaunchDarkly. Take a look at what it takes to get your code into production. I’m going to just guess that it’s awful because it’s always awful. No one loves their deployment process. What if launching new features didn’t require you to do a full-on code and possibly infrastructure deploy? What if you could test on a small subset of users and then roll it back immediately if results aren’t what you expect? LaunchDarkly does exactly this. To learn more, visit launchdarkly.com and tell them Corey sent you, and watch for the wince. Pete: Hello, and welcome to the AWS Morning Brief: Fridays From the Field. I'm Pete Cheslock. Jesse: I'm Jesse DeRose. Pete: And we're back again, Jesse. We are back. But really have we gone anywhere to begin with? Jesse: We've been making our way slowly but surely through this Unconventional Guide. Lots of really interesting recommendations, lots of really interesting feedback from all of you, which we really, really appreciate. We can't wait to dive into some of those ideas deeper in future episodes. Pete: Yeah. And don't forget, you can give us additional feedback and questions at lastweekinaws.com/QA, feel free to add your name. Or not. Doesn't matter. It can be totally anonymous. That's fine with us. So today, we're talking about a topic that is very near and dear to our hearts. Jesse: Yes. Pete: It is tagging. Jesse: Yes. Pete: Tagging your resources in Amazon, or I mean really any cloud provider; any place you can tag something you probably should. And we're going to talk a little bit about strategies for that, how people use their tags, just all the fun things related to it. Tagging, it's easy to do, right, Jesse? You just tag your resources and all your problems go away. Jesse: Yep. Thanks, everybody, have a good night. Pete: So yeah, if you've enjoyed this podcast, please go to—no, I’m just kidding. Jesse: [laugh]. Pete: Tagging is probably the thing that most companies are doing poorly, simply because it's hard, and it's an afterthought, and if you didn't have a really solid forced strategy to ensure tags and force compliance, you're probably not going back to fix it. Jesse: Yeah. It's not thought about as something that's a first-class citizen in the cloud world. When you think about the things that are important to your business model, you might think about getting your application out the door and running, maybe talking about business requirements for availability, failover, data retention, but tagging is nowhere on that list. That's not something that I think any organization thinks about as part of an MVP, let alone future iterations of their products. Pete: Tagging feels much like the same feeling I get when my doctor says that I should eat more veggies. Jesse: Oof. Pete: I know they're good for me; I know we need to do this. They have vitamins, and fiber, and all these wonderful things. But in order to make those veggies something I want to eat, we have to learn to make it more delicious. Personally, I find duck fat works to make them more delicious. I wish we could apply a duck fat strategy to the tagging problem. Jesse: Yeah, it's not an easy problem to solve. Or rather, I should say it is an easy problem to solve, but it's not something that anybody is quickly incentivized to solve. Tagging, just for the sake of tagging, it doesn't work. Pete: Yeah, it's that there really are no incentives for it. No good incentives. It's usually because someone came over to your desk and said, “Hey, what's this charge for? And who's using it? And what's the deal with this?” And you're going into Cost Explorer, and you're like, “Uh, I don't know. It's in this one account.” And that's as far as you can go to figure out who did what and why that thing is the way it is. Jesse: Yeah. There are so many different tagging strategies that we've seen. We've seen some clients talk about tagging as a way to potentially penalize engineers who aren't tagging or who are spending too much money. We've seen organizations who are tagging to reward teams that are tagging all their spend or keeping their spend optimized. Across the board, there are just so many different ways to go about this. Pete: So let's assume you are like most of the companies that we've seen. Definitely not all: there are some rare gems out there that are making tagging a long term and continual process, which we're actually going to talk about in a future episode, how to do that. But let's say you're just looking at your bill, you're looking at your usage, and you're saying to yourself, “Okay. I need to be better at this.” What do they say, “The journey of a thousand miles starts with a single step?” What is that first step? Jesse: Yeah there's a lot of different ways to go about this. I think there's a couple great places to start. Now, I will say AWS has a thrilling 24-page best practices white paper that we’ll throw a link in the [show notes 00:05:18]. Pete: Have you read that, Jesse? Jesse: I will say that I have read parts of it. I have not read all of it, and so I want to make it very, very clear to all of our listeners, this is not a document that needs to become the holy grail for your organization. I think in the same way that you could read the SRE book from Google and have some good takeaways, you can skim through this white paper, maybe read through a couple of the sections that seem most applicable to your organization, and then start with those ideas, start with those best practices, and then build them over time organically; develop them over time organically. Pete: I like to read it some nights when I'm just having trouble sleeping, and maybe by page two or three I’m just out. Jesse: Yeah. There's a lot of content in there talking about what to tag, why to tag. I think the best place for any organization to start is to think about what are the important things that we need to tag. And that's a conversation that's going to involve not just engineers, but also finance, potentially IT, maybe also security teams, depending on how your organization is built. Because ultimately, what you want to do is understand what are the things that my organization cares about when it comes to our cloud usage?&n... | |||
21 Apr 2021 | S3's Durability Guarantees Aren't What You Think | 00:07:22 | |
Want to give your ears a break and read this as an article? You’re looking for this link. Never miss an episode
Help the show
What's Corey up to? | |||
30 Oct 2023 | AWS Jamming Generative AI Down Our Throats | 00:06:47 | |
AWS Morning Brief for the week of October 30, 2023 with Corey Quinn. Links:
| |||
29 Jun 2022 | 9 Ways AWS Made Me Headdesk When Using The CDK | 00:16:30 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/9-ways-aws-cdk-headdesk Want to watch the full dramatic reenactment of this podcast? Watch the YouTube Video here: https://youtu.be/3Mf3_l6iEtA
Never miss an episode
Help the show
What's Corey up to? | |||
29 Mar 2023 | S3 as an Eternal Service | 00:06:57 | |
AWS Morning Brief Extras edition for the week of March 29, 2023.
Never miss an episode
Help the show
Buy our merch What's Corey up to? | |||
02 Mar 2022 | Status Paging You | 00:12:22 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/status-paging-you Never miss an episode
Help the show
What's Corey up to? | |||
08 Dec 2021 | How AWS Measures Customer Numbers | 00:07:46 | |
Want to give your ears a break and read this as an article? You’re looking for this link. Never miss an episode
Help the show
What's Corey up to? | |||
09 Jan 2023 | The Work of Sober Minds | 00:04:54 | |
Links:
| |||
07 Dec 2020 | Hit by the Conference Trainium | 00:10:40 | |
AWS Morning Brief for the week of December 7, 2020 with Corey Quinn.
| |||
09 Feb 2023 | Wait did you say "Drone Manufacturer?!" | 00:05:01 | |
Links:
| |||
26 May 2022 | Security Model Citizen Development | 00:05:06 | |
Links:
| |||
02 Jun 2021 | Turn That S--- Off | 00:06:29 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/turn-that-sh—-off Never miss an episode
Help the show
What's Corey up to? | |||
27 Feb 2023 | Listening to This Podcast Will Improve Your Hiring Diversity | 00:06:15 | |
AWS Morning Brief for the week of February 27, 2023 with Corey Quinn. Links:
| |||
12 May 2022 | Suddenly Nobody Wants to Build Heroku | 00:05:47 | |
Links:
| |||
08 Jun 2022 | The Strange, Too Familiar Tale of Uncle Suitcase | 00:06:57 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/the-strange-too-familiar-tale-of-uncle-suitcase/
Never miss an episode
Help the show
What's Corey up to?
| |||
16 Sep 2021 | I Azure You This Shall Pass | 00:07:07 | |
Links:
Transcript Corey: This is the AWS Morning Brief: Security Edition. AWS is fond of saying security is job zero. That means it’s nobody in particular’s job, which means it falls to the rest of us. Just the news you need to know, none of the fluff. Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, canarytokens.org, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these are empowered to do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: canary.tools. Take a look at this: what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can even get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are canarytokens.org and canary.tools. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary in the weeks ahead.
[Version three of OpenSSL was released 00:03:19], so expect a few conversations around that. There’s also apparently a Rusttls, which is ostensibly OpenSSL rewritten in Rust for the modern era but is in practice just another talking point for the Rust evangelism strikeforce, who is actively encouraged not to find a way to leave a comment on this episode. Sneak or Snack or Synack raised—however they’re pronounced—[raised a big funding round last week 00:03:19] and still stubbornly refuses to buy a vowel. More interestingly, they report that 50% of security jobs are unfilled. Further, any solution predicated on devs becoming security experts is doomed, which is exactly the point of this podcast. What you need to know about cloud security, minus the fluff and Another week, another [Azure Security failure 00:03:19]. This time a flaw existed that could leak data between users of Azure Container Services. Look, this whole thing is about AWS, so why do I talk about Azure issues like this? Simply put, people are going to bring it up in a cloud isn’t secure context, and you should be aware of what they’re talking about when they do. Azure, please get it together. Stuff like this hurts all cloud providers. Corey: Troy Hunt has a post informing you that despite what your AWS bill may have you believe in the moment, self-immolation is unnecessary. Okay, that’s not actually his point, but specifically, You Don’t Need to Burn off Your Fingertips (and Other Biometric Authentication Myths) doesn’t hit quite the same way. It’s a super handy reminder that for most of you folks, adversaries are not going to steal your fingerprints to get into your systems. They’re either going to bribe you or hit you with a wrench until you tell them your password. From the mouth of AWS horse—or from the horse’s AWS—Amazon Detective offers Splunk integration. Amazon Detective and the Case of the Missing Mountain of Money is apparently this month’s hot comic book. And AWS—motto: “Opinions my own”—has a [security checklist 00:03:19], and it’s worth taking a look at because a few of these items that they issue from time to time are, like, “Use multiple AWS accounts,” directly contravenes older guidance. It’s always good to check on things like this around best practices that AWS is putting out there because even if you don’t make changes to your systems as a result, you should know where AWS’s head is at with respect to where the future of the industry is going. And lastly, there was an interesting tool that came out called IAM Vulnerable. It’s an IAM privilege escalation playground that lets you muck around with exploiting improperly set IAM policies. It’s a good way to kill an hour on an afternoon when you’re not particularly motivated to do other things. Another good ‘I need a distraction’ task is rotating reused or weak passwords that you have in your password manager. And that’s what happened. Announcer: Have you implemented industry best practices for securely accessing SSH servers, databases, or Kubernetes? It takes time and expertise to set up. Teleport makes it easy. It is an identity-aware access proxy that brings automatically expiring credentials for everything you need, including role-based access controls, access requests, and the audit log. It helps prevent data exfiltration and helps implement PCI and FedRAMP compliance. And best of all, Teleport is open-source and a pleasure to use. Download Teleport at | |||
23 Jun 2021 | The Cloud Genie | 00:08:57 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/the-cloud-genie Never miss an episode
Help the show
What's Corey up to? | |||
30 Dec 2021 | Self-Disclosure Heals Many Wounds | 00:06:01 | |
Links:
Transcript Corey: This is the AWS Morning Brief: Security Edition. AWS is fond of saying security is job zero. That means it’s nobody in particular’s job, which means it falls to the rest of us. Just the news you need to know, none of the fluff. Corey: Are you building cloud applications with a distributed team? Check out Teleport, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT: SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor, list and see all of SSH servers, Kubernetes clusters, or databases available to you in one place, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport is open-source and a pleasure to use. Download Teleport at goteleport.com. That’s goteleport.com. Corey: Well, we’re certainly ending 2021 with a whirlwind in the security space. Log4J continues to haunt us, while AWS took not only an But first, the Community. A depressing review of 2021’s “Cloud Security Breaches and Vulnerabilities.” Honestly, it seems like there are just so damned many ways for bad security to set the things we care about on fire. The takeaways are actionable though. Stop using static long-lived credentials and start with the basics before you get fancy. Sennheiser scores itself an S3 Bucket Negligence Award, and of all the countries in which to suffer a data breach, I’ve got to say that Germany is at the bottom of the list. They do not mess around with data protection there.
Corey: This episode is sponsored in part by my friends at Cloud Academy. Something special for you folks: If you missed their offer on Black Friday or Cyber Monday or whatever day of the week doing sales it is, good news, they’ve opened up their Black Friday promotion for a very limited time. Same deal: $100 off a yearly plan, 249 bucks a year for the highest quality cloud and tech skills content. Nobody else is going to get this, and you have to act now because they have assured me this is not going to last for much longer. Go to cloudacademy.com, hit the ‘Start Free Trial’ button on the homepage and use the promo code, ‘CLOUD’ when checking out. That’s C-L-O-U-D. Like loud—what I am—with a C in front of it. They’ve got a free trial, too, so you’ll get seven days to try it out to make sure it really is a good fit. You’ve got nothing to lose except your ignorance about cloud. My thanks to Cloud Academy once again for sponsoring my ridiculous nonsense. A bit off the beaten path, this week’s S3 Bucket Negligence Award goes to the government of Ghana. This one is pretty bad. I mean, you can’t exactly opt out of doing business with your government, you know? Now, AWS has two things I want to talk about. The first is that they offer a way to “Simplify setup of Amazon Detective with AWS Organizations.” I’m actually enthusiastic about this one because there’s a significant lack of security tooling available to folks at the lower end of the market. A bunch of companies seem to start off targeting this segment, but soon realize that there’s a better future in selling things to bigger companies for $200,000 a month instead of $20. Now, “AWSSupportServiceRolePolicy Informational Update.” Now, you heard a minute ago, I was initially extremely unhappy about this mistake. That said, I am such a fan of this notification that I can’t even articulate it without sounding like I’m fanboying. Because mistakes happen and talking about those mistakes and why defense in depth mitigates the harm of those mistakes goes a long way. This affirms my trust in AWS rather than harming it. Meanwhile Azure has absolutely nothing to say about why their tenant separation is aspirational at best.
| |||
23 Nov 2022 | The Feudal Lords of Amazon: AWS' Infinite Service Launches and Counterproductive Culture | 00:08:51 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/the-feudal-lords-of-amazon/
Never miss an episode
Help the show
Buy our merch What's Corey up to?
| |||
10 Jul 2020 | Whiteboard Confessional: The Curious Case of the 9,000% AWS Bill Increase | 00:12:51 | |
About Corey Quinn Over the course of my career, I’ve worn many different hats in the tech world: systems administrator, systems engineer, director of technical operations, and director of DevOps, to name a few. Today, I’m a cloud economist at The Duckbill Group, the author of the weekly Last Week in AWS newsletter, and the host of two podcasts: Screaming in the Cloud and, you guessed it, AWS Morning Brief, which you’re about to listen to. Links
| |||
28 Apr 2022 | AWS Starts the Security Communication Improvement Slog | 00:04:08 | |
03 Feb 2025 | What the Hell is a Zone Group? | 00:06:48 | |
AWS Morning Brief for the week of February 3, with Corey Quinn. Links:
| |||
30 Aug 2021 | Error 500: You Suck At Computers | 00:11:06 | |
AWS Morning Brief for the week of August 30, 2021 with Corey Quinn.
| |||
29 Sep 2021 | The Actual Next 1 Million Cloud Customers | 00:08:45 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/The-Actual-Next-1-Million-Cloud-Customers Never miss an episode
Help the show
What's Corey up to? | |||
27 Mar 2020 | Whiteboard Confessional: Console Recorder: The Thing AWS Should Have Built | 00:12:59 | |
About Corey Quinn Over the course of my career, I’ve worn many different hats in the tech world: systems administrator, systems engineer, director of technical operations, and director of DevOps, to name a few. Today, I’m a cloud economist at The Duckbill Group, the author of the weekly Last Week in AWS newsletter, and the host of two podcasts: Screaming in the Cloud and, you guessed it, AWS Morning Brief, which you’re about to listen to. Links
Transcript Corey Quinn: Welcome to AWS Morning Brief: Whiteboard Confessional. I’m Cloud Economist Corey Quinn. This weekly show exposes the semi-polite lie that is whiteboard architecture diagrams. You see, a child can draw a whiteboard architecture, but the real world is a mess. We discuss the hilariously bad decisions that make it into shipping products, the unfortunate hacks the real-world forces us to build, and that the best to call your staging environment is “theory” because invariably, whatever you’ve built works in the theory, but not in production. Let’s get to it. On this show, I talk an awful lot about architectural patterns that are horrifying. Let’s instead talk for a moment about something that isn’t horrifying. CHAOSSEARCH. Architecturally, they do things right. They provide a log analytics solution that separates out your storage from your compute. The data lives inside of your S3 buckets, and you can access it using APIs you’ve come to know and tolerate, through a series of containers that live next to that S3 storage. Rather than replicating massive clusters that you have to care and feed for yourself, instead, you now get to focus on just storing data, treating it like you normally would other S3 data and not replicating it, storing it on expensive disks in triplicate, and fundamentally not having to deal with the pains of running other log analytics infrastructure. Check them out today at CHAOSSEARCH.io. You’ll notice that I periodically refer to various friends of the show as code terrorists. It’s never been explained, until now, exactly what that means and why I use that term. So, today, I thought I’d go ahead and help shine a little bit of light on that. One of the folks that I refer to most frequently is Ian Mckay, a fine gentleman based out of Australia. And he’s built something that is both amazing and terrible all at the same time, called Console Recorder. But let me back up before I dive into this monstrosity. Let’s talk about how we get things that we build in AWS into production. There are basically four tiers. Tier one is using the AWS web console itself, we click around and we build things. Great. Tier two is we use CloudFormation like sensible folks. Tier three is Terraform with all of its various attendant tooling, and then there’s the ultra tier four that I do, which is we use the AWS console and then we lie about it. Some folks are gonna play around here and say that oh, you should use the CDK, or something like that, or custom scripts that wind up spinning up production. And all of those are well and good, but only recently did CloudFormation release the ability to import existing resources. And even then, much like Terraform import, it’s pretty gnarly and not at all terrific. So, what do you wind up generally doing? Well, if you’re like me, you’ll stand up production resources inside of an AWS account. You will click around in the console—I always start with the console, not because I don’t know how these other tools work, that’s a side point, but rather because that helps me get a sense for how these services are imagined by the teams building them. They tend to assume that everyone who interacts with them is going to go through the console at some point, or at least they should. So, it gives me access and exposure to what their vision of this service is. Then once you’ve built something up, it often finds its way into production, if you at all like me, where I’ll spin something up just to test something and it works, and oh my stars, and suddenly you just want to get it out and not worry about it, so you don’t go back and rebuild it properly. So, now you’re left with this hand-built thing that’s just flapping around out there in production. What are you supposed to do? Well, according to the AWS experts, if we’re allowed to use that term to describe them, you’re supposed to smack yourself on the forehead, be convinced that you’re fundamentally missing the boat here, throw everything you’ve just built away and go back and do it properly. Which admittedly seems a little bit on the nose for those of us who’ve done exactly this far more times over the course of our career than we would care to count. So, today, however, I posit that there’s an alternate approach that doesn’t require support from AWS, which, to be honest, long ago seems to have given up on solving this particular problem in a way that human beings can understand. And I’d like to tell you about that, after this brief message from our sponsor.
... | |||
09 Jun 2022 | Azure's Nightmare Year | 00:05:00 | |
Links:
| |||
11 Nov 2020 | Why AWS Announces Regions in Advance | 00:06:45 | |
Want to give your ears a break and read this as an article? You’re looking for this link.
Never miss an episode
| |||
30 Nov 2022 | The Releases are Coming Fast and Furious Now | 00:04:08 | |
Links: Stay Up To Date with re:Quinnvent
Help the show
What's Corey up to? | |||
24 Feb 2025 | Mortgaging the new AWS Trust Center | 00:06:53 | |
AWS Morning Brief for the week of February 24, with Corey Quinn. Links:
| |||
01 Aug 2022 | Crappy Clone of a Fast Database | 00:06:54 | |
AWS Morning Brief for the week of August 1, 2022 with Corey Quinn.
| |||
19 Apr 2021 | AOS Engineering | 00:06:57 | |
AWS Morning Brief for the week of April 19, 2021 with Corey Quinn.
| |||
03 Feb 2020 | Lies, Damned Lies, and Sponsored Benchmarks | 00:10:52 | |
AWS Morning Brief for the week of February 3, 2020.
| |||
08 Nov 2023 | How to Stop Feeding AWS’s AI with Your Data | 00:06:19 | |
AWS Morning Brief Extras edition for the week of November 8, 2023.
Help the show
Buy our merch What's Corey up to? | |||
16 Oct 2023 | Cloud Institute for the Criminally Underpaid | 00:06:27 | |
AWS Morning Brief for the week of October 16, 2023 with Corey Quinn.
| |||
10 Jun 2024 | Grandpa AWS Talks About the "GitHub Cloud" | 00:04:09 | |
AWS Morning Brief for the week of Monday, June 10th, with Corey Quinn. Links:
| |||
11 Jun 2021 | Cloud Cost Management Team Starter Kit | 00:15:48 | |
Transcript Corey: This episode is sponsored in part byLaunchDarkly. Take a look at what it takes to get your code into production. I’m going to just guess that it’s awful because it’s always awful. No one loves their deployment process. What if launching new features didn’t require you to do a full-on code and possibly infrastructure deploy? What if you could test on a small subset of users and then roll it back immediately if results aren’t what you expect? LaunchDarkly does exactly this. To learn more, visitlaunchdarkly.com and tell them Corey sent you, and watch for the wince. Jesse: Hello, and welcome to AWS Morning Brief: Fridays From the Field. I’m Jesse DeRose. Amy: I’m Amy Negrette. Jesse: This is the podcast within a podcast where we talk about all the ways that we have seen AWS used and abused in the wild, with a healthy dose of complaining about AWS for good measure. I feel like it’s just kind of always necessary. There always has to be just that little bit of something extra; it’s the spice that really makes the dish. Today we’re going to be talking about the ‘Cloud Cost Management Team Starter Kit.’ Now, in a previous episode, we talked about the ‘Cloud Cost Management Starter Kit,’ which was a little bit more generalized, and one of the things that we talked about, ultimately, was building a team that is responsible for some of this work, some of this cloud cost management work. So today, we’re going to take that one step further; we’re going to talk about all of the things that your cloud cost management team should ultimately be responsible for, what it should look like, how you might want to start building that team within your organization. So, I’m going to kick us off. I think one of the first things that is so, so critical for any team that is going to be doing any work is buy-in at the executive leadership level. You need to make sure that engineering leadership, the C-suite leadership has your back in everything that you’re doing. You need to make sure that the work that you’re doing has been signed off at the highest level so that that leadership can help empower you to do your work. Amy: And we’ve referenced this before, and really, every time we talk about things like what makes a successful project is that as the one executing that project, you probably need the authority and actionable goals in order to do that, and the leadership is going to be the ones to lay that out for you. Jesse: Absolutely. If you don’t have the backing of leadership, whether it is your boss, whether it is the C-suite, whether it’s a VP suite, you’re not going to get other people to listen to what you have to say; you’re not going to get other people to, broadly speaking, generally speaking, care about the work that you’re trying to do, the work that you’re trying to incentivize and empower other people in the organization to do. Amy: And that kind of leads us into the next portion of it where you need to know what the responsibilities are and have that clear delineation so that you understand the things that is expected of you, what the engineering teams, what they’re expected to do, and product teams, and finance teams. Everyone has to have a pretty much fenced-in idea of what they’re allowed to do and what they are expected to deliver, just like in any project. Jesse: Absolutely. It’s so critical for me to understand what I’m responsible for, you to understand what you’re responsible for. I can’t tell you how many times I’ve been in a meeting where somebody will say something generally like, “We should do X,” and then everyone nods and goes, “Oh, yeah, yeah, yeah. We should do X.” And then everybody leaves the meeting and thinks that somebody else is responsible for it, and nobody’s been clearly assigned that work, or nobody knows that work is ultimately their responsibility. Amy: And if you don’t assign it, people are going to assume that this is going to be a thing that if they have time to, they’ll get to it. And we harp on it enough that whenever work is not prioritized, it is automatically deprioritized. That’s just the way task lists shake out, especially at the end of sprint meetings. Jesse: Absolutely. And I think that’s one of the other things that’s so important, too, is that it’s not just about assigning the work, but it’s about making sure that everybody who is involved in the conversation, everybody who’s involved in the work agrees on what those boundaries are, agrees on who is responsible for what actions, more specifically speaking from a task responsibility perspective. Because at the end of the day, I want my team, whether that is my individual team or a cross-functional team, to all be bought into who’s responsible for what parts of the project. We all need to be on the same page in terms of, “Yes, this is my responsibility. This part of the work is my responsibility. I will take ownership over this,” so that we can all help each other. Get that project goal together. One of the other big ideas that is so critical to starting a cloud cost management team is identifying and socializing your business KPI metrics. Now, this is something that some engineering teams already think about day-to-day. They might have ideas of service-level agreements, metrics, maybe service-level objective metrics, but there might be other business metrics that indirectly—or directly—relate to engineering work. It could be number of users using your SaaS platform, it could be number of API requests, it could be the amount of storage that customers are storing on your platform. You want to identify what these metrics are, and start measuring your cloud spend against these metrics. Amy: And as far as cost optimization projects go, the KPIs may not line up directly against how many servers you’re standing up, or how many users are coming through. They’ll be very indicative because you are spending money per user and per resource, but perhaps your business goals are different. Maybe you’re not looking at trying to save money, but better understand where that money is going. Jesse: Absolutely. It’s not just about how many instances are running per hour, it’s not just about how many servers are running per hour, or how many users per server. It’s really about understanding what are the core driving indicators of your business? What are the things that ultimately influence and impact how your workloads, and servers, and API functions, and everything, flow and grow and change over time? Amy: These metrics also can be influenced by things that are not architecturally specific, like savings plans, or the saving you would get through reservations, or some other contractual deal you get from your provider. Jesse: Yeah, that’s one of the hard things, too, that we always hear from our clients. There is this idea that they think that they are spending a certain amount of money because they’re getting discounts from savings plans, or from reserved instances or from an enterprise discount program, and maybe their usage is a lot higher than that, but because they get these discounts, they think that they’re actually using a lot less than they actually are. And while this is not something we’re talking about specifically or directly in this conversation, it is something to be mindful of because there definitely can be a difference between your usage and your overall spend if your company is investing in thin... | |||
28 Nov 2022 | Pre:Invent Edition | 00:07:23 | |
Links:
Stay Up To Date with re:Quinnvent Help the show
What's Corey up to? | |||
16 Jul 2021 | AWS Application Cost Profiler | 00:14:57 | |
Transcript Corey: This episode is sponsored in part byLaunchDarkly. Take a look at what it takes to get your code into production. I’m going to just guess that it’s awful because it’s always awful. No one loves their deployment process. What if launching new features didn’t require you to do a full-on code and possibly infrastructure deploy? What if you could test on a small subset of users and then roll it back immediately if results aren’t what you expect? LaunchDarkly does exactly this. To learn more, visitlaunchdarkly.com and tell them Corey sent you, and watch for the wince. Jesse: Hello, and welcome to AWS Morning Brief: Fridays From the Field. I’m Jesse DeRose. Amy: I’m Amy Negrette. Tim: And I’m Tim Banks.
Tim: But hold on for a second, Jesse, because AWS Application Cost Profiler we can get to; that’s rather unremarkable. I really want to talk about how impressed I am with AWS InfiniDash. I’ve been benchmarking this thing, and it is fan… tastic. It’s so good. And we could probably talk about for a while, but suffice to say that I am far more impressed with AWS InfiniDash than I am with AWS Application Cost Profiler.
Amy: It is [unintelligible 00:01:54] in a trench coat. Jesse: [laugh].
Jesse: That is a lot of buzzwords. Amy: A lot of words there. Jesse: Yeah. Looking at the documentation, the sales page, “AWS Application Cost Profiler is a managed service that helps us separate your AWS billing and costs by the tenants of your service.” That has a lot of buzzwords.
Amy: And we’ve had clients that have had this very explicit problem and our findings have been that it’s very difficult to accurately splice usage and spend against what’s essentially consumption-based metrics—which is how much a user or request is using all the way along your pipeline—if they’re not using dedicated resources. Jesse: Yeah, when we talk about cost allocation, generally speaking, we talk about cost allocation from the perspective of tagging resources, broadly speaking, and moving resources into linked accounts and separating spend by linked accounts, or allocating spend by linked accounts. But if you’ve got a shared compute cluster, a shared database, any kind of shared resources where multiple tenants are using that infrastructure, slapping one tag on it isn’t going to solve the issue. Even putting all of those shared resources in a single linked account isn’t going to solve that issue. So, the problem of cost allocation for shared resource is real; it is a valid problem. So, let’s talk specifically about AWS Application Cost Profiler as a solution for this problem. As I mentioned, we kicked the tires on this solution earlier this week and we have some thoughts to share. Tim: I think one of the main things around this AWS Application Profiler like I said, there’s some problems that can be solved there, there’s some insights that people really want to gain here, but the problem is people don’t want to do a lot more work or rewrite their observability stack to do it. The problem is, that’s exactly what AWS Cost Profiler seems to be doing or seems to want you to do. It doesn’t get data from, I think it only gets data from certain EC2 services, and it’s just, it’s doing things that you can already do in other tools to do aggregation. And if I’m going to do all the work to rewrite that stack, to be able to use the Profiler, am I going to want to spend that time doing something else? I mean, that kind of comes to the bottom line about it. Jesse: Yeah, the biggest thing that I ran into, or that I experienced when we were setting up the Cost Profiler, is that documentation basically said, “Okay, configure Cost Profiler and then submit your data.” And [unintelligible 00:05:54] stop, like wait, what? Wait, what do you mean, ‘submit data?’ And it said, “Okay, well now that you’ve got Cost Profiler as a service running, you need to upload all of the data that Cost Profiler is going to profile for you.” It boggles my mind. Tim: And it has to be in this format, and it has to have these specific fields. And so if you’re not already emitting data in that format with those fields, now you have to go back and do that. And it’s not really solving any problems, but it offers to create more problems. Amy: And also, if you’re going to have to go through the work of instrumenting and managing all that data anyway, you could send it anywhere you wanted to. You could send it to your own database to your own visualization. You don’t need Profiler after that.
Amy: If you were going to instrument things to that level, and let’s say you were using third-party services, you could normalize your... | |||
22 Feb 2023 | Amazon's Snowball Edge Frustrates This User | 00:08:27 | |
AWS Morning Brief Extras edition for the week of February 22, 2023. Want to give your ears a break and read this as an article? You’re looking for this link.https://www.lastweekinaws.com/blog/amazons-snowball-edge-frustrates-this-user Never miss an episode
Help the show
Buy our merch What's Corey up to? | |||
15 Dec 2022 | Censoring Myself Out of Pure Self-Interest | 00:04:35 | |
21 Dec 2020 | Some Cloud Shells Take Years to Form | 00:07:52 | |
AWS Morning Brief for the week of December 21, 2020 with Corey Quinn.
| |||
22 Feb 2021 | The World Thinks I'm Funny, AWS Disagrees and Commits | 00:06:08 | |
AWS Morning Brief for the week of February 22, 2021. with Corey Quinn.
| |||
20 Jan 2021 | The Various Billing Philosophies of AWS | 00:08:21 | |
Want to give your ears a break and read this as an article? You’re looking for this link.
| |||
28 Sep 2023 | Cheating on your CI Tests | 00:03:34 | |
Last week in security news: Accelerating development with AWS CDK plugin – CfnGuardValidator, This week's S3 Bucket Negligence Award is brought to you by PwC Nigeria, The volkswagen open source tool, and more! Links:
| |||
17 Oct 2022 | Blame Steven Postmortems | 00:07:26 | |
Links:
| |||
19 Oct 2023 | Delegate, Delegate, Delegate... | 00:03:06 | |
Last week in security news: Delegating permission set management and account assignment in AWS IAM Identity Center, How AWS protects customers from DDoS events, The Tip of the Week, and more! Links:
| |||
06 Mar 2023 | Happy Fun Podcast That Tells It Like It Is | 00:06:25 | |
AWS Morning Brief for the week of March 6, 2023 with Corey Quinn. Links:
| |||
10 Feb 2025 | CloudFormation Salvation At Last | 00:05:29 | |
AWS Morning Brief for the week of February 10, with Corey Quinn. Links:
| |||
26 Aug 2019 | Amazon Fivecast | 00:07:46 | |
AWS Morning Brief for the week of August 26th, 2019.
| |||
21 Sep 2023 | Longer Sessions Are All Right By Me | 00:03:30 | |
Last week in security news: AWS IAM Identity Center session duration limit increases from 7 to 90 days, Access accounts with AWS Management Console PrivatAccess, A dive through using Amazon Athena in Incident Response, and more! Links:
| |||
29 Jul 2024 | Amazon Basics Corey Quinn | 00:03:41 | |
AWS Morning Brief for the week of Monday, July 29th, with Mike Julian.
| |||
25 May 2022 | An AWS Free Tier Bill Shock: Your Next Steps | 00:09:35 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/an-aws-free-tier-bill-shock-your-next-steps Never miss an episode
Help the show
What's Corey up to? | |||
19 May 2021 | New CEO Onboarding at AWS | 00:07:38 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/New-CEO-Onboarding-at-AWS Never miss an episode
Help the show
What's Corey up to? | |||
30 Nov 2023 | re:Quinnvent Day 4 | 00:02:12 | |
AWS Morning Brief for November 30th, 2023 with Corey Quinn.
Help the show
What's Corey up to?
| |||
02 Oct 2023 | Incrementally Making Massive Improvements | 00:03:14 | |
AWS Morning Brief for the week of October 2, 2023, with Corey Quinn. Links:
| |||
20 Apr 2022 | Shitposting as a Learning Style | 00:08:08 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/shitposting-as-a-learning-style Never miss an episode
Help the show
What's Corey up to? | |||
01 Feb 2023 | S3 Encryption at Rest Does NOT Solve for Bucket Negligence | 00:08:31 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/s3-encryption-at-rest-does-not-solve-for-bucket-negligence/ Never miss an episode
Help the show
Buy our merch What's Corey up to? | |||
29 Aug 2022 | The Root Beer Conference | 00:07:24 | |
AWS Morning Brief for the week of August 29, 2022 with Corey Quinn.
| |||
15 Feb 2021 | I Hope I'm Failing the "AWS CFO Sniff Test" | 00:08:23 | |
AWS Morning Brief for the week of February 15, 2021 with Corey Quinn.
| |||
19 Jan 2023 | Wait Did You Say Root API Keys? | 00:04:53 | |
Links:
| |||
26 Jun 2023 | Amazon Calls Down Regulatory Lightning | 00:05:41 | |
AWS Morning Brief for the week of June 26, 2023 with Corey Quinn. Links:
| |||
24 Apr 2020 | Whiteboard Confessional: Don’t Run a Database on Top of NFS | 00:11:48 | |
About Corey Quinn Over the course of my career, I’ve worn many different hats in the tech world: systems administrator, systems engineer, director of technical operations, and director of DevOps, to name a few. Today, I’m a cloud economist at The Duckbill Group, the author of the weekly Last Week in AWS newsletter, and the host of two podcasts: Screaming in the Cloud and, you guessed it, AWS Morning Brief, which you’re about to listen to. Links Transcript Corey: Welcome to AWS Morning Brief: Whiteboard Confessional. I’m Cloud Economist Corey Quinn. This weekly show exposes the semi-polite lie that is whiteboard architecture diagrams. You see, a child can draw a whiteboard architecture, but the real world is a mess. We discuss the hilariously bad decisions that make it into shipping products, the unfortunate hacks the real-world forces us to build, and that the best to call your staging environment is “theory”. Because invariably whatever you’ve built works in the theory, but not in production. Let’s get to it.
| |||
21 Apr 2022 | gimme-aws-creds, Possibly Okta's AWS Creds | 00:05:31 | |
| |||
23 Sep 2019 | NoSQL Workbench Gets Rapid Sequel | 00:09:56 | |
AWS Morning Brief for the week of September 23rd, 2019.
| |||
19 Oct 2022 | A Brief History of Kubernetes, Its Use Cases, and Its Problems | 00:08:27 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/a-brief-history-of-kubernetes-its-use-cases-and-its-problems Want to watch the full dramatic reenactment of this podcast? Watch the YouTube Video here: https://youtu.be/StlZwvsq9tc Never miss an episode
Help the show
Buy our merch What's Corey up to? | |||
15 Jun 2020 | AWS Graviton2 Clock Speeds Broadly Non-Competitive | 00:07:28 | |
AWS Morning Brief for the week of June 15, 2020
| |||
10 Feb 2021 | What the Hell is Amazon Web Services | 00:11:13 | |
Want to give your ears a break and read this as an article? You’re looking for this link. Never miss an episode
Help the show
What's Corey up to? | |||
11 Dec 2020 | The Kinesis Outage | 00:27:32 | |
Links
Transcript Pete: Hello, everyone. Welcome to the AWS Morning Brief. It's Pete Cheslock again— Jesse: And Jesse DeRose. Pete: We are back to talk about ‘The Kinesis Outage.’ Jesse: [singing] bom bom bum. Pete: So, at this point, as you're listening to this, it's been a couple of weeks since the Kinesis outage has happened, and I'm sure there are many, many armchair sysadmins out there speculating at all the reasons why Amazon should not have had this outage. And guess what? You have two more system administrators here to armchair quarterback this as well. Jesse: We are happy to discuss what happened, why it happened. I will try to put on my best announcer voice, but I think I normally fall more into the golf announcer voice than the football announcer voice, so I'm not really sure if that's going to play as well into our story here. Pete: It's going, it's going, it's gone. Jesse: It’s—and it's just down. It's down— Pete: It's just— Jesse: —and it's gone. Pete: No, but seriously, we're not critiquing it. That is not the purpose of this talk today. We're not critiquing the outage because you should never critique other people's outages; never throw shade at another person's outage. That's not only crazy to do because you have no context into their world. It's just, it's not nice either, so just try to be nice out there. Jesse: Yeah, nobody wants to get critiqued when their company has an outage and when they're under pressure to fix something. So, we're not here to do that. We don't want to point any fingers. We're not blaming anyone. We just want to talk about what happened because honestly, it's a fascinating, complex conversation. Pete: It is so fascinating and honestly, loved the detail, a far cry from the early years of Amazon outages that were just, “We had a small percentage of instances have some issues.” This was very detailed. This gave out a lot of information. And the other thing too is that, when it comes to critiquing outages, you have to imagine that there are unlikely to be more than a handful of people even inside Amazon Web Services that fully understand the scope of the size and the interactions of all these different services. There may not even be a single person who truly understands how these dozens of services interact with each other. I mean, it takes teams and teams of people working together to build these things and to have these understandings. So, that being said, let's dive in. So, the Wednesday before Thanksgiving, Kinesis decided to take off early. You know, long weekend coming up, right? But really, what happened was is that there was an addition of capacity to Kinesis, and it caused it to hit an operating system limit causing an outage. But interestingly enough—and what we'll talk about today—are the interesting and downstream effects that occurred via CloudWatch, Cognito, even the status page, and the Personal Health Dashboard. I mean, that's a really interesting contributing factor or a correlating outage. I don't know the words here, but it's interesting to hear that both CloudWatch goes down and the Personal Health Dashboard goes down. Jesse: That's when somebody from the product side says, “Oh, that's a feature, definitely not a bug.” Pete: But the outage to CloudWatch then even affected some of the downstream services to CloudWatch—such as Lambda—which also included auto-scaling events. It even included EventBridge, which was impacted, and that even caused some ECS and EKS delays with provisioning new clusters and scaling of existing clusters. Jesse: So, right out of the bat, I just want to say huge kudos to AWS for dogfooding all of their services within AWS itself: not just providing the services to its customers, but actually using Kinesis internally for other things like CloudWatch and Cognito. They called that out in the write-up and said, “Kinesis is leveraged for CloudWatch, and Cognito, and for other things, for various different use cases.” That's fantastic. That's definitely what you want from your service provider. Pete: Yeah, I mean, it's a little amazing to hear, and also a little terrifying, that all of these services are built based on all of these other services. So, again, the complexity of the dependencies is pretty dramatic. But at the end of the day, it's still software underneath it; it's still humans. And I don't want to say that I am happy that Amazon had this outage at all, but watching a company of this stature, of this operational expertise, have an outage, it's kind of like watching the Masters when Tiger Woods duffs one into the water or something like that. It's just—it's a good reminder that—listen, we're all human, we're all working under largely the same constraints, and this stuff happens to everyone; no one is immune. Jesse: And I think it's also a really great opportunity—after the write-up is released—to see how the Masters go about doing what they do. Because everybody at some point is going to have to troubleshoot some kind of technology problem, and we get to see firsthand from this, how they go about troubleshooting these technology problems. Pete: Exactly. So, of course, one of the first things that I saw everywhere is everyone is, on mass, moving off of Amazon, right? They had an outage, so we're just going to turn off all our servers and just move over to GCP, or Azure, right? Jesse: Because GCP is a hundred percent uptime. Azure is a hundred percent uptime. They're never going to have any kind of outages like this. Google would never do something to maybe turn off a service, or sunset something. Pete: Yeah, exactly. So, with the whole talk about hybrid-cloud and multi-cloud strategies, you got to know that there's a whole slew of people out there, probably some executive at some business, who says, “Well, we need to engineer for this type of durability, this type of thing to happen again,” but could you even imagine the complexity... | |||
08 Feb 2021 | Andy Jassy Ascends to Sea Level | 00:07:11 | |
AWS Morning Brief for the week of February 8, 2021 with Corey Quinn.
| |||
10 Apr 2023 | Your Network Bill is Now Diamonds | 00:05:43 | |
AWS Morning Brief for the week of April 10, 2023 with Corey Quinn. Links:
| |||
06 Oct 2021 | The Compelling Economics of Cloudflare R2 | 00:14:02 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/The-Compelling-Economics-of-Cloudflare-R2 Never miss an episode
Help the show
What's Corey up to? | |||
20 Oct 2021 | The Turbotax of AWS Billing | 00:06:37 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/The-Turbotax-of-AWS-Billing Never miss an episode
Help the show
What's Corey up to? | |||
01 Jun 2023 | The Wages of TLS | 00:03:30 | |
Last week in security news: Faster AWS cloud connections with TLS 1.3, Belkin is crappy in many ways, the Tool of the Week, and more! Links:
| |||
07 Sep 2020 | Amazon Repeatedly Stomps on Own Schmeckel | 00:08:11 | |
AWS Morning Brief for the week of September 7, 2020.
| |||
03 Nov 2021 | The Unfulfilled Promise of Serverless | 00:06:14 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/The-Unfulfilled-Promise-of-Serverless Never miss an episode
Help the show
What's Corey up to? | |||
22 Jul 2019 | Elastic Fabric Adapters and the Suspenders of Disbelief | 00:07:59 | |
AWS Morning Brief for the week of July 22, 2019.
| |||
13 Jul 2023 | Avoiding a Git Landmine | 00:02:38 | |
Last week in security news: A deep dive into the DomainNetworks Snail Mail Scam by Krebs on Security, Tailscale is putting their terms and conditions on GitHub, The Tool/ Lesson of the Week, and more! Links:
| |||
21 Jan 2025 | 2025's AWS Release of the Year | 00:05:17 | |
AWS Morning Brief for the week of January 21, with Corey Quinn. Links:
| |||
19 Jan 2022 | Orca Security, AWS, and the Killer Whale of a Problem | 00:13:01 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/orca-security-aws-and-the-killer-whale-of-a-problem Never miss an episode
Help the show
What's Corey up to? | |||
13 Nov 2020 | AWS Storage Day 2020 | 00:19:57 | |
Links
Transcript Corey: This episode is sponsored in part by Catchpoint. Look, 80 percent of performance and availability issues don’t occur within your application code in your data center itself. It occurs well outside those boundaries, so it’s difficult to understand what’s actually happening. What Catchpoint does is makes it easier for enterprises to detect, identify, and of course, validate how reachable their application is, and of course, how happy their users are. It helps you get visibility into reachability, availability, performance, reliability, and of course, absorbency, because we’ll throw that one in, too. And it’s used by a bunch of interesting companies you may have heard of, like, you know, Google, Verizon, Oracle—but don’t hold that against them—and many more. To learn more, visit www.catchpoint.com, and tell them Corey sent you; wait for the wince. Pete: Hello, and welcome to AWS Morning Brief. I am Pete Cheslock. Corey, while being back from his paternity leave, is still not here. We are having too much fun. And by we, I mean I'm joined again with Jesse DeRose. Hey, Jesse. Jesse: Thanks as always for having me, Pete. Pete: It's so much fun to again chat with people outside of my little family unit, that we've just decided not to give this back to Corey. And luckily, Corey has many other podcasts that he does, he was pretty happy to give it away. Jesse: I feel like you should never talk about your children that way, but he's got a plethora at this point. So, he's willing to kind of share the wealth. Pete: Exactly. And if you notice, we have a new theme song that came out, I think it was last week was the first week that we brought in the new theme song, which is I think much in line with a previous episode where we talked about ’80s breakdancing movies that the new theme song kind of has that vibe to it. Jesse: I hope you're wearing the Members Only jean jacket that I sent you, along with the shades to match the uniform. Pete: Yeah. I mean, I was born in ’80, so the ’80s for me, I was very young. I'm kind of waiting for the ’90s movies to come around again because I want to rock out my JNCO jeans and my wallet chain. Jesse: [laugh], yes. Pete: And all that good stuff. Jesse: I am ready. Pete: Exactly. Well, what are we talking about today? Well, earlier this week, AWS Storage Day 2020 happened on Tuesday. If you were a part of that, it was a free online event. As Amazon called it, a full day online event. Except it was only about four hours long, so kind of mailing it in on that one, huh? Jesse: Can we start discussing that with our boss and say that a full day of work is technically just four hours? Can we just start working with that going forward? Pete: Yeah, we'll just say it right now. So, hey, Corey, we're done for the day. Put in the old college four. Jesse: [laugh]. That's what you say, “I put in the old college try. I just did my full day of four hours, according to AWS. So, this has been great. I'll talk to you tomorrow.” Pete: Exactly. Well, Storage Day this year—it's the second year in a row if I'm remembering it correctly. 2019 was the last year they did that—and I feel like this kind of ties into the fact that there's just so many announcements that happened around re:Invent, that leading up into re:Invent, you have a lot of announcements to maybe soften the blow for a lot of folks. And Storage Day, really is just this whole day—well, four hours worth of a whole day—talking about everything related to storage. And we're talking about things like S3, EBS, EFS, FSx, for the five huge enterprises that probably use FSx. Although if you actually do use FSx, I'd be curious to hear about how you like it and what you think of it because we don't really hear a lot of people using it. But these are all the services, plus many more, that Amazon talked about as part of its Storage Day. Jesse: Yeah, it was a really interesting discussion. I greatly appreciate that AWS broke out this discussion prior to AWS re:Invent, but they dropped a lot of knowledge on us all at once, and in, like, rapid-fire succession, I was really, kind of… not necessarily surprised, but there's a lot of information that they shared all at once. And I have to admit that after sitting through this presentation, I now have a greater appreciation for Apple's slow presentation style. As much as I hate it; as much as I hate sitting for an hour and a half for one announcement while they toot their own horn, I have to say that the buildup and getting me involved in the story and bringing me along with them. It works, it absolutely works. And it was kind of hard for me to pick up on all the things that went on during AWS Storage Day this year because there was a lot of things going on. Pete: And honestly, the fact they give so much information is really amazing in, I guess, both their ability to tout, in many cases, minor feature changes that most SaaS businesses would just turn on and maybe blog about. But this is—obviously the engine of AWS is so good at discussing their wins. But you're right, it's just a huge amount. On Monday, Jeff Barr of course, wrote the blog post with a lot of these details, linking to countless other blog posts. And I think it really speaks to just how, probably every, or nearly every Amazon service ties into storage in some way. It's a huge, huge part of this ecosystem. Jesse: Absolutely. Pete: So, as you can imagine, there were so many new features that we're not even going to be able to cover them all throughout the course, but we did want to call out some of the big ones, or at least what we thought were the biggest ones, the most interesting new features, new product announcements that came out, and also just touch on some of the other things that we thought were pretty interesting as well. And yeah, there was a lot of fun stuff. I think the biggest one that was announced was the S3 Intelligent-Tiering, which is a class storage tier within S3, adds additional levels of archive access. So, if you imagine Intelligent-Tiering, you know, you have the automatic tiering of data from frequently accessed to infrequently accessed as things age out, they essentially automate that for you. So, as things are not accessed, you just start automatically paying less for them. And anything automatic in a cost savings world is going to help you save money. If you don't have to think about it and it just does it for you, it's fantastic. Well, Intelligent-Tiering added in these additional tiers—which they are Glacier—level tiers. They are additional places that your data can eventually move to as they start aging out based on a whole series of criteria. But there's caveats. There's more caveats now. Before, one of the interesting things that we actually learned as part of this—because it was buried in a pricing page footnote—is that when you store something into Intelligent-Tiering, there is a minimum storage time period that you will get charge... | |||
08 May 2023 | Digital Home Depot | 00:06:12 | |
AWS Morning Brief for the week of May 8, 2023 with Corey Quinn. Links:
| |||
07 Jul 2021 | The Lessons of AWS Infinidash | 00:06:17 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/the-lessons-aws-infinidash Never miss an episode
Help the show
What's Corey up to? | |||
01 Jul 2024 | Amazon Kindle Fire Steven | 00:04:10 | |
AWS Morning Brief for the week of Monday, July 1st, with Corey Quinn. Links:
| |||
05 May 2021 | Developer Portals are an Anti-Pattern | 00:07:08 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/Developer-Portals-are-an-Anti-Pattern Never miss an episode
Help the show
What's Corey up to? | |||
13 Jan 2025 | And we're back! | 00:04:57 | |
AWS Morning Brief for the week of January 13, with Corey Quinn. Links:
Sponsor | |||
13 Jan 2020 | Your Database Will Explode in Sixty Seconds | 00:12:43 | |
AWS Morning Brief for the week of January 13th, 2020.
| |||
16 Mar 2022 | My Mental Model of AWS Regions | 00:08:46 | |
Want to give your ears a break and read this as an article? You’re looking for this link. https://www.lastweekinaws.com/blog/my-mental-model-of-aws-regions Never miss an episode
Help the show
What's Corey up to? | |||
20 Jun 2023 | Guest Host for re:Inforce Week - Scott Piper! | 00:04:01 | |
AWS Morning Brief for the week of June 20th, 2023 with Scott Piper filling in for Corey Quinn. Links:
| |||
02 Jun 2022 | RSA Prelude | 00:04:26 | |
07 Aug 2023 | EC2's Weird Flex | 00:06:10 | |
AWS Morning Brief for the week of August 7, 2023 with Corey Quinn.
| |||
26 Feb 2024 | S3: Jetsons Era Technology, Flintstones Era Billing Transparency | 00:03:48 | |
AWS Morning Brief for the week of February 26, 2024 with Corey Quinn. Links:
|