<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Endah Bongo-Awah</title>
    <description>The latest articles on DEV Community by Endah Bongo-Awah (@bongoe).</description>
    <link>https://dev.to/bongoe</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1063626%2F9bf82b8d-d8b1-4051-a4a0-c9a673c48d20.png</url>
      <title>DEV Community: Endah Bongo-Awah</title>
      <link>https://dev.to/bongoe</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bongoe"/>
    <language>en</language>
    <item>
      <title>A Cost-Effective Guide to prepare and pass the KCNA</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Tue, 31 Dec 2024 00:45:24 +0000</pubDate>
      <link>https://dev.to/bongoe/a-cost-effective-guide-to-prepare-and-pass-the-kcna-3fge</link>
      <guid>https://dev.to/bongoe/a-cost-effective-guide-to-prepare-and-pass-the-kcna-3fge</guid>
      <description>&lt;p&gt;If you're reading this, you're likely interested in Kubernetes or just curious about my journey—either way, thanks for stopping by!&lt;/p&gt;

&lt;p&gt;I recently embarked on my certification journey with Kubernetes and decided to make it as cost-efficient as possible. Starting with the Kubernetes Cloud Native Associate (KCNA) certification, I discovered that with the right resources and strategies, you don’t need to break the bank to succeed. Here’s how I did it.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Preparation Timeline and Resources&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The average preparation time for the KCNA certification is 3–6 months, depending on your prior experience with Kubernetes and cloud technologies.&lt;/p&gt;

&lt;p&gt;Here’s the curriculum path I followed, which is well-structured and affordable:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Introduction to Linux (LFS101) - Free&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Linux basics are crucial for working with Kubernetes, and this course covers the fundamentals.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://training.linuxfoundation.org/training/introduction-to-linux/" rel="noopener noreferrer"&gt;Register here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Introduction to Cloud Infrastructure Technologies (LFS151) - Free&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
This course gives an overview of cloud technologies, which sets the stage for understanding Kubernetes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://training.linuxfoundation.org/training/introduction-to-cloud-infrastructure-technologies/" rel="noopener noreferrer"&gt;Register here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Introduction to Kubernetes (LFS158) - Free&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
A comprehensive introduction to Kubernetes, perfect for beginners.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://training.linuxfoundation.org/training/introduction-to-kubernetes/" rel="noopener noreferrer"&gt;Register here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Kubernetes and Cloud Native Essentials (LFS250) - $99&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
This paid course dives deeper into Kubernetes concepts and cloud-native practices. It’s a great investment for serious learners.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://training.linuxfoundation.org/training/kubernetes-and-cloud-native-essentials-lfs250/" rel="noopener noreferrer"&gt;Register here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These resources were sufficient to equip me for the KCNA certification.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Practice Makes Perfect&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Studying is one thing, but practicing under exam conditions is equally important. Here are the practice resources I used, all of which are free or offer free samples:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;ExamPro by Andrew Brown&lt;/em&gt;&lt;br&gt;
Huge thanks to Andrew Brown for his free content and the complete practice exam. This resource alone boosted my confidence significantly.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Tutorial Dojo&lt;/em&gt;&lt;br&gt;
Provides 20 free sample exam questions with detailed explanations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;ExamTopics&lt;/em&gt;&lt;br&gt;
Offers 30 free KCNA practice questions. Beyond 30, there’s a paid option, but the free content is a great start.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;ITExams&lt;/em&gt;&lt;br&gt;
Similar to ExamTopics, with different questions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;VMExams&lt;/em&gt;&lt;br&gt;
Features 10 sample questions per session. While many repeat, they’re still helpful for reinforcing key concepts.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Registering for the KCNA Exam  - $250&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;&lt;br&gt;
When you feel ready to take the KCNA exam, you can register here: KCNA Exam Registration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pro Tip:&lt;/strong&gt; Keep an eye out for sales on the Linux Foundation website! They often offer discounts of up to 60%, which can make certification significantly more affordable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Key Takeaways&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Follow a structured path:&lt;/em&gt; The Linux Foundation’s resources are a reliable and affordable starting point.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Practice consistently:&lt;/em&gt; Use free materials to test your knowledge and get a feel for the exam format.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Stay cost-conscious:&lt;/em&gt; By leveraging free resources and only spending on essentials, you can prepare for KCNA without overspending.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;I hope my experience inspires and helps you on your own certification journey. Kubernetes is a fascinating and valuable skill, and earning the KCNA certification is a fantastic first step into the world of cloud-native technologies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What comes next?&lt;/strong&gt; Consider showing off your Kubernetes &amp;amp; cloud native security skills by earning your Kubernetes and Cloud Native Security Associate (KCSA) or go next level with the Certified Kubernetes Administrator (CKA) certification, Certified Kubernetes Security (CKS) and Certified Kubernetes Application Developer (CKAD)&lt;/p&gt;

&lt;p&gt;Feel free to connect with me or share your thoughts in the comments. Best of luck on your Kubernetes journey!&lt;/p&gt;

</description>
      <category>cloudnative</category>
      <category>linuxfoundation</category>
      <category>kubernetes</category>
      <category>certification</category>
    </item>
    <item>
      <title>A Journey of GenAI with AWS Bedrock based sample Images</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Mon, 30 Dec 2024 15:41:38 +0000</pubDate>
      <link>https://dev.to/bongoe/a-journey-of-genai-with-aws-bedrock-based-sample-images-24i5</link>
      <guid>https://dev.to/bongoe/a-journey-of-genai-with-aws-bedrock-based-sample-images-24i5</guid>
      <description>&lt;p&gt;In the not-so-distant past, machines were relegated to mere calculation and automation. Today machines can create, innovate, and even rival human imagination!  Is GenAI slowly dissolving the lines between human creativity and artificial intelligence?  Let's journey through the early days of Generative AI...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Before that, here is a little back story of "how I met Bangaly"&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have known and admired Bangaly's professional accomplishments for more than a year now. He has over 1000 Badges, a CNCF Kubestronaut, a AWS Golden Jacket , 17xAWS, 14xGCP, 17xMicrosoft, 6xComptia, 4xHashicorp, 4xGithub, 3xOCI, and many more. I couldn't comprehend how he achieved that, so I did the only logical thing, &lt;em&gt;&lt;strong&gt;ask him&lt;/strong&gt;&lt;/em&gt;! &lt;/p&gt;

&lt;p&gt;The answer wasn't anything we all haven't heard before. There was the irritating &lt;em&gt;&lt;strong&gt;consistency&lt;/strong&gt;&lt;/em&gt;, the annoying &lt;em&gt;&lt;strong&gt;hardwork&lt;/strong&gt;&lt;/em&gt;, never missing &lt;em&gt;&lt;strong&gt;curiosity&lt;/strong&gt;&lt;/em&gt; and a the magical &lt;em&gt;&lt;strong&gt;kindness&lt;/strong&gt;&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;View the crazy things he has accomplished here ☞&lt;a href="https://www.linkedin.com/in/bangaly-kaba-phd-6aa51925/" rel="noopener noreferrer"&gt;Bangaly's LinkedIn&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are kind of an odd duo, with a shared passion to encourage, empower and share knowledge with our community. We shall be creating series of content surrounding the realm of AI, ML and all the fun stuff around Cloud Computing.&lt;/p&gt;

&lt;p&gt;Let's start from the beginning.....&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Artificial Intelligence has been lingering around since 1941!&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In 1950, &lt;strong&gt;Alan Turing&lt;/strong&gt; published a paper titled &lt;em&gt;"Computing Machinery and Intelligence"&lt;/em&gt; in which he proposed the imitation game. &lt;br&gt;
The game involves: Three participants: &lt;em&gt;a human interrogator, a human respondent, and a machine&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The interrogator's goal is to determine which of the other two participants is the human and which is the machine.&lt;br&gt;
Communication is limited to text-only exchanges. &lt;/p&gt;

&lt;p&gt;The machine aims to fool the interrogator into thinking it is human. Turing argued that if the machine could consistently fool human interrogators, it should be considered to exhibit intelligent behavior. The term Artificial Intelligence was officially coined on august 31, 1955. &lt;a href="http://jmc.stanford.edu/articles/dartmouth.html" rel="noopener noreferrer"&gt;Here is the link to the article&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;What then is machine learning?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Machine Learning is a subset of Artificial intelligence. The idea behind machine learning is to feed large amounts of data into algorithms, which can then identify patterns and relationships in the data, and use that knowledge to make predictions or decisions without relying on hard-coded rules. Arthur Samuel, an IBM researcher, is credited with coining the term "Machine Learning" in 1959.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;and Deep Learning is...&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Deep Learning is a specific type of machine learning that gained widespread attention in the 21st century. It is inspired by the structure and function of the human brain and involves the use of &lt;strong&gt;&lt;em&gt;artificial neural networks (ANNs)&lt;/em&gt;&lt;/strong&gt;, which are computational models that mimic the interconnected neurons in the brain. &lt;/p&gt;

&lt;p&gt;Deep learning algorithms can automatically learn complex patterns and representations from raw data, making them highly effective for tasks like image recognition, natural language processing, and speech recognition. While the fundamental concepts of neural networks date back to the 1940s and 1950s, with pioneers like Warren McCulloch and Walter Pitts, deep learning only became practically viable in the late 2000s due to advances in computing power, availability of large datasets, and algorithmic improvements.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;In summary,&lt;/em&gt;&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;AI&lt;/em&gt;&lt;/strong&gt; is the overarching field, &lt;strong&gt;&lt;em&gt;machine learning&lt;/em&gt;&lt;/strong&gt; is a subset of AI that focuses on learning from data, and &lt;strong&gt;&lt;em&gt;deep learning&lt;/em&gt;&lt;/strong&gt; is a specific type of machine learning that uses artificial neural networks. &lt;/p&gt;

&lt;p&gt;These fields have evolved over time, with each advancement building upon the foundations laid by previous researchers and breakthroughs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;A Question we should ask ourselves is, if AI has been around for this long, why is it gaining popularity decades after?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Early AI researchers faced several significant challenges as they worked to develop artificial intelligence in the 1950s and 1960s. These included:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Limited Computing Power:&lt;/em&gt; Early computers lacked the processing power and memory needed for complex AI algorithms and large data processing.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Unrealistic Expectations:&lt;/em&gt; Early AI pioneers were overly optimistic about achieving human-level AI quickly, leading to disappointment when progress was slower.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Lack of Understanding of Intelligence:&lt;/em&gt; Researchers underestimated the complexity of human cognition, thinking it could be easily replicated in machines.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Narrow Focus:&lt;/em&gt; Early AI research focused on specific tasks like chess, which didn’t translate well to general intelligence or common sense reasoning.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Funding Challenges:&lt;/em&gt; AI research experienced cycles of enthusiasm and funding, followed by “AI winters” where interest and financial support dried up.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Software Limitations:&lt;/em&gt; The bottleneck in AI development was often software, as creating programs that mimicked human reasoning was very difficult.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Lack of Data:&lt;/em&gt; Early researchers didn’t have access to the large datasets needed for effective AI training, limiting their models’ effectiveness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How have we overcomed these challenges?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Access to Artificial Intelligence has been democratized and its capabilities are continuously advancing. It has also led to generative AI, a game-changing technology.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Generative AI&lt;/strong&gt;&lt;/em&gt; refers to artificial intelligence models that can generate new data, such as texts, images, audios, or videos, based on the patterns and relationships learned from training data, and it is still evolving. &lt;/p&gt;

&lt;p&gt;One of the key players in democratizing access to generative AI is &lt;strong&gt;AWS Bedrock&lt;/strong&gt;, a comprehensive platform developed by Amazon Web Services (AWS) that provides developers and researchers with the tools, infrastructure, and resources needed to build and deploy generative AI models. &lt;/p&gt;

&lt;p&gt;AWS Bedrock leverages the power of cloud computing, offering scalable and cost-effective solutions that enable users to train and run large-scale generative AI models without the need for expensive on-premises hardware. By removing barriers to entry, AWS Bedrock has empowered individuals and organizations of all sizes to explore and leverage the capabilities of generative AI.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;AWS Bedrock use-case.&lt;/em&gt;&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Let's illustrate one of the capability of AWS Bedrock using AWS management console.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How to create an Image on AWS Bedrock&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
 This can be done in 3 simple steps&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Step 1&lt;/em&gt;&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;You require an AWS Account, which is free. Be aware that most of the models are third party tools and will be charged separately, even though you have AWS Credits. We learned the hard way 🙃💸&lt;br&gt;
Log into the account and move to the AWS  Bedrock UI. &lt;/p&gt;

&lt;p&gt;AWS Bedrock UI and its functionalities&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqrdkc2teugp1zo18i5cx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqrdkc2teugp1zo18i5cx.png" width="800" height="409"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Step 2&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Request for access from the desired model&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6dvb20how7yrjseppkfe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6dvb20how7yrjseppkfe.png" alt="Image description" width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Step 3&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Image generated from desired image&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv8g6qflf1v6p5v2uu072.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv8g6qflf1v6p5v2uu072.png" alt="Image description" width="800" height="367"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/aws-samples/amazon-bedrock-samples" rel="noopener noreferrer"&gt;AWS Samples&lt;/a&gt; contains pre-built examples to help customers get started with the Amazon Bedrock service.&lt;/p&gt;

&lt;p&gt;We shall be exploring more of them in our next content. &lt;/p&gt;

&lt;p&gt;Stay tuned.... &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Bangaly and Endah&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>machinelearning</category>
      <category>genai</category>
      <category>awsbedrock</category>
    </item>
    <item>
      <title>Organizing a virtual AWS re:Invent@home: A Behind-the-Scenes Look</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Thu, 19 Dec 2024 23:31:33 +0000</pubDate>
      <link>https://dev.to/bongoe/organizing-a-virtual-aws-reinventhome-a-behind-the-scenes-look-5f9h</link>
      <guid>https://dev.to/bongoe/organizing-a-virtual-aws-reinventhome-a-behind-the-scenes-look-5f9h</guid>
      <description>&lt;p&gt;Planning and organizing a virtual global event like &lt;em&gt;reInvent@Home&lt;/em&gt; comes with feelings such as &lt;em&gt;excitement&lt;/em&gt;, &lt;em&gt;anxiety&lt;/em&gt;, &lt;em&gt;stress&lt;/em&gt;, &lt;em&gt;relief&lt;/em&gt;, and the best of all &lt;em&gt;satisfaction&lt;/em&gt; and &lt;em&gt;reward&lt;/em&gt;. &lt;br&gt;
Last year, in 2023, AWS introduced the concept to bring a percentage of the energy and excitement of re:Invent to those who couldn’t attend in person. &lt;br&gt;
This year, a small but passionate team, comprising of Annem Shah, Oluwasegun Adedigba, Andreas Rütten and myself organized a first ever community led &lt;em&gt;re:Invent@home&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Our intention was to create a welcoming and engaging virtual space for attendees around the world. &lt;br&gt;
Here’s how we brought it all to life, the lessons we learned, and tips for anyone looking to organize a similar event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Start: Turning an Idea into Action&lt;/strong&gt; 💡📙 📝&lt;/p&gt;

&lt;p&gt;The idea to organize &lt;em&gt;reInvent@Home&lt;/em&gt; started with a shared enthusiasm for connecting with the global AWS community. Some of us had attended last year’s &lt;em&gt;re:Invent@home&lt;/em&gt;, others had been to Las Vegas for the live re:Invent experience, and a few were simply inspired to try something new.&lt;/p&gt;

&lt;p&gt;Once we assembled a like-minded group, we rolled up our sleeves and got to work. Our first step? Establishing a central meeting point where everyone involved could collaborate seamlessly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Planning Across Borders: Navigating Time Zones and Busy Schedules&lt;/strong&gt; ⏲ ⏳ &lt;/p&gt;

&lt;p&gt;Planning an event of this magnitude meant overcoming logistical challenges. With team members spread across different time zones, we were fortunate that the differences were minimal, just two hours apart.&lt;/p&gt;

&lt;p&gt;To make the most of our time, we set a regular meeting schedule:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Three months before the event&lt;/strong&gt;: Weekly meetings to brainstorm and outline the event structure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;One month out&lt;/strong&gt;: Increased to three meetings per week to refine details and tackle action items.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every meeting started with updates on designated tasks, ensuring accountability and progress. Of course, there were days when someone couldn’t attend, but our mantra was simple: &lt;strong&gt;&lt;em&gt;the show must go on!&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Laying the Foundation: Tools and Strategies&lt;/strong&gt; ✍🏻💻🗂&lt;/p&gt;

&lt;p&gt;We relied on a variety of tools and strategies to streamline the planning process:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Collaboration Tools&lt;/strong&gt;: A shared spreadsheet became our central hub for brainstorming, tracking ideas, and assigning tasks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Participant Outreach&lt;/strong&gt;: To gauge interest, we created a Google Form for attendees and potential speakers, setting clear timelines for submissions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Communication Channels&lt;/strong&gt;: We combined all community members interested in the planning into a Slack channel, which became our event’s heartbeat.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Slack, we shared event updates, fostered daily conversations, and created excitement leading up to the event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Making It Interactive: The Event Blueprint&lt;/strong&gt; 🎡👨‍👩‍👧‍👦&lt;/p&gt;

&lt;p&gt;To keep attendees engaged, we designed a mix of live sessions, watch-alongs, and interactive discussions. Key elements included:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Keynotes&lt;/strong&gt;: Keynotes are huge!! We scheduled watch-alongs for the major keynotes, starting meetings five minutes early for networking and running discussions afterward.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Daily Sessions&lt;/strong&gt;: Inorder to enforce collaboration, knowledge sharing and networking within the community, we offered a range of 45–60-minute talks/presentations based on AWS services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Daily Recaps and Previews&lt;/strong&gt;: Each day began with an agenda and ended with highlights, ensuring everyone stayed informed and involved.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Swag and Fun&lt;/strong&gt;: Thanks to the incredible support from AWS, we distributed swag to all speakers and selected daily winners to add an extra layer of excitement.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Lessons Learned: Tips for Future Organizers&lt;/strong&gt; 🧠🙌🏻&lt;br&gt;
Reflecting on the experience, here are some key takeaways for organizing a virtual event:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Engage Early and Often&lt;/strong&gt;: Start building momentum well in advance with consistent communication.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Leverage Technology&lt;/strong&gt;: Use platforms like Zoom or WebEx for live sessions and Slack for ongoing discussions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Stay Flexible&lt;/strong&gt;: Have backup plans for no-shows or technical glitches.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Prioritize Fun&lt;/strong&gt;: While structure is important, creating an enjoyable and memorable experience should always be the goal.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlxnxm00esth73v0mh7h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlxnxm00esth73v0mh7h.png" alt="Enjoying a networking session" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Swag: A Token of Appreciation&lt;/strong&gt; ✨🎁&lt;br&gt;
No event is complete without swag! As a small token of appreciation, we received some amazing AWS swag for our efforts, which added to the joy of organizing. Sharing a photo of my swag haul feels like the perfect way to celebrate the journey and the connections we made along the way:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedh25tx5blm4dlow9ga9.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedh25tx5blm4dlow9ga9.jpeg" alt="Always a pleasure to receive swag" width="800" height="1066"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I received:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; A builders big bag of adventure (In black). Optimal for AWS events and meetups. It can contain a 16 inch laptop and other items.&lt;/li&gt;
&lt;li&gt;A white building T-Shirt&lt;/li&gt;
&lt;li&gt;A think big notebook and&lt;/li&gt;
&lt;li&gt;AWS BuildersCards Resilience Expansion&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;I love my package.Thank you AWS Community.&lt;/em&gt; 🥰🥰&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Looking Ahead: What’s Next for &lt;em&gt;reInvent@Home&lt;/em&gt;?&lt;/strong&gt; &lt;br&gt;
Organizing &lt;em&gt;reInvent@Home&lt;/em&gt; was a rewarding experience that demonstrated the power of collaboration and shared passion. For those seeking inspiration to organize similar events, I hope our journey serves as a helpful guide.&lt;/p&gt;

&lt;p&gt;The question now is: how will you create your next big virtual event? Let’s continue to innovate, connect, and grow as a global community.&lt;br&gt;
Looking forward to the &lt;em&gt;re:invent@home2025&lt;/em&gt; What new ideas do you suggest we engage in next year?&lt;/p&gt;

</description>
      <category>awscommunitybuilder</category>
      <category>eventplanning</category>
      <category>reinventathome2024</category>
      <category>awscommunity</category>
    </item>
    <item>
      <title>Life in KubeCity- How it all began</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Sat, 20 Jul 2024 09:15:12 +0000</pubDate>
      <link>https://dev.to/bongoe/life-in-kubecity-how-it-all-began-bpf</link>
      <guid>https://dev.to/bongoe/life-in-kubecity-how-it-all-began-bpf</guid>
      <description>&lt;p&gt;I don’t know about you, but whenever someone starts a story with the words..Imagine that….They got my undivided attention. I am a sucker for storytelling teaching methodology.&lt;br&gt;
I struggled to understand the fundamentals of &lt;a href="https://kubernetes.io/docs/concepts/overview/" rel="noopener noreferrer"&gt;kubernetes&lt;/a&gt; and once I did, I thought that I would have understood it faster if it were told to me as a story.&lt;/p&gt;

&lt;p&gt;So if you are new to the concept of kubernetes (which by the way is 10 years old, so no pressure!), this story might just polish up some  concepts you needed help understanding (as i did) or ease your understanding of the fundamentals of kubernetes.&lt;/p&gt;

&lt;p&gt;At the end of this story;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You should have a better understanding overview of kubernetes object in a fun way.&lt;/li&gt;
&lt;li&gt;Understand the functions of the common objects of kubernetes.&lt;/li&gt;
&lt;li&gt;Understand the essential objects that come together to create a stable secure Kubernetes cluster.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let us start with a classical introduction.....&lt;br&gt;
Me: Arabian nights…. You: Entertainments&lt;br&gt;
Me: Boys and girls are you ready to hear my story…. You: Yes we are, what is the story about.....&lt;/p&gt;

&lt;p&gt;10 years ago, in the vibrant and bustling city of Kubernetes, where &lt;a href="https://microservices.io/" rel="noopener noreferrer"&gt;microservices&lt;/a&gt; and &lt;a href="https://www.docker.com/resources/what-container/" rel="noopener noreferrer"&gt;containers&lt;/a&gt; thrived, there lived many remarkable residents, each with a unique role to play. Admired all across the universe, tasked with control and orchestration, ensuring everything moved like a well-choreographed cosmic ballet, kubernetes was the talk of the town.&lt;br&gt;
Before the city Kubernetes became too famous and organized, Kubernetes lived only with its containers and wished for companionship and help in orchestrating its vast responsibility of managing its containers.&lt;/p&gt;

&lt;p&gt;From the wish sprang forth &lt;a href="https://kubernetes.io/docs/concepts/workloads/pods/" rel="noopener noreferrer"&gt;Pods&lt;/a&gt;, the smallest, most elemental creators in the universe. Kubernetes found companionship in these Pods, who were always ready to host containers, acting as individual performers in the orchestrated ballet, dancing gracefully to Kubernetes' tune. &lt;/p&gt;

&lt;p&gt;Next, came &lt;a href="https://kubernetes.io/docs/concepts/services-networking/service/" rel="noopener noreferrer"&gt;Services&lt;/a&gt;. In the grand cosmos, they acted like the messengers between Pods and the outside universe—charming, consistent, and buoyantly helpful. Services held hands with Pods, helping them communicate, and won Kubernetes' affection&lt;/p&gt;

&lt;p&gt;It was realized that, information from the activities needed storage, so &lt;a href="https://kubernetes.io/docs/concepts/storage/volumes/" rel="noopener noreferrer"&gt;Volumes&lt;/a&gt; was hired. These were the loyal librarians, remembering and storing every important detail. Their persistence and memory were like a warm blanket on a cold night for Kubernetes, providing comfort and a level of security.&lt;/p&gt;

&lt;p&gt;Kubernetes was in need of some order in its kingdom, the pods needed to be managed and who else than our powerful and flexible manager &lt;a href="https://kubernetes.io/docs/concepts/workloads/controllers/deployment/" rel="noopener noreferrer"&gt;deployments&lt;/a&gt;. Kubernetes then met Deployments and &lt;a href="https://kubernetes.io/docs/concepts/workloads/controllers/replicaset/" rel="noopener noreferrer"&gt;ReplicaSets&lt;/a&gt; who were twins. Deployments were like the caring managers, ensuring the desired state of applications, whereas ReplicaSets were like the diligent generals, securing the required number of Pods. Together, they added balance and stability, making Kubernetes’ heart flutter. However deployments always left things in a temporal state, causing chaos and instability&lt;/p&gt;

&lt;p&gt;One day, Deployment wandered into a Kubernetes meetup and met &lt;a href="https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/" rel="noopener noreferrer"&gt;StatefulSet&lt;/a&gt;. Deployment was immediately captivated by StatefulSet's grace and stability. They began to spend more time together, and Deployment quickly realized how much they complemented each other. Here are some of the qualities that made StatefulSet irresistible:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Its reliable Identity. This was like having a partner who never changed their phone number or email address – always reachable and reliable.&lt;/li&gt;
&lt;li&gt;Persistent Storage:  it was like being with someone who never lost their keys or forgot important dates.&lt;/li&gt;
&lt;li&gt;Graceful Updates: Pods were updated one at a time ensuring stability and minimal disruption&lt;/li&gt;
&lt;li&gt;Ordered Deployment: Methodical approach to deploying and scaling pods&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As the Deployment and StatefulSet’s relationship blossomed, they were often joined by their steadfast friend, &lt;a href="https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/" rel="noopener noreferrer"&gt;DaemonSet&lt;/a&gt;. DaemonSet ensured that essential services, like logging agents and monitoring tools, ran on every node in the cluster. DaemonSet’s thoroughness and dedication was admired by all.&lt;/p&gt;

&lt;p&gt;Deployment hired &lt;a href="https://kubernetes.io/docs/concepts/workloads/controllers/job/" rel="noopener noreferrer"&gt;Job&lt;/a&gt;, a diligent servant, responsible for running specific tasks to completion. They ensured that batch processing and other time-bound tasks were executed successfully.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://kubernetes.io/docs/concepts/configuration/secret/" rel="noopener noreferrer"&gt;Secrets&lt;/a&gt; was a confidant, keeping sensitive information, such as passwords and API keys, secure. They ensured that this data was stored securely and accessed only by those who needed it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://kubernetes.io/docs/concepts/configuration/configmap/" rel="noopener noreferrer"&gt;ConfigMaps&lt;/a&gt; became Deployment’s organizational friends, providing configuration data to Pods. They ensured that applications could be configured dynamically without the need to rebuild images.&lt;/p&gt;

&lt;p&gt;With the city of Kubernetes growing, order needed to be maintained. &lt;a href="https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/" rel="noopener noreferrer"&gt;Namespaces&lt;/a&gt; were hired to create multitudes of realities within the city. They isolated applications in their own virtual realms. &lt;/p&gt;

&lt;p&gt;With this attained achievement, kubernetes organized a housewarming party. Invited guests came from far and wide. Kubernetes needed to prepare for them. So security officers called &lt;a href="https://kubernetes.io/docs/concepts/services-networking/network-policies/" rel="noopener noreferrer"&gt;Networkpolicy&lt;/a&gt;, which ensure that only selected, authorized guests talked with the pods, fostering a secure environment for all in the city. &lt;/p&gt;

&lt;p&gt;A gatekeeper called &lt;a href="https://kubernetes.io/docs/concepts/services-networking/ingress/" rel="noopener noreferrer"&gt;Ingress&lt;/a&gt; was also hired, a devoted traffic manager, effectively controlling in and outbound traffic. Ingress mapped guests to their respective services, ensuring a smooth and efficient flow of traffic. &lt;/p&gt;

&lt;p&gt;As the party grew and the communication between guest increased, services needed assistance, so &lt;a href="https://kubernetes.io/docs/concepts/services-networking/service/#endpoints" rel="noopener noreferrer"&gt;Endpoints&lt;/a&gt; were hired! They acted like dynamic telephone operators. They facilitated communication by routing calls from services to the relevant pods.&lt;/p&gt;

&lt;p&gt;To ensure the no one at the party was overwhelmed, needs are met and no wastage of resources, the twin brothers &lt;a href="https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits" rel="noopener noreferrer"&gt;Limits and requests&lt;/a&gt; were hired. While requests kept a check on how much each quest could consume to remain entertained, limits made sure the overall consumption stayed within the agreed upon amount.&lt;/p&gt;

&lt;p&gt;There were invited guests referred to as &lt;a href="https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/" rel="noopener noreferrer"&gt;service accounts&lt;/a&gt; with designated tasks. &lt;a href="https://kubernetes.io/docs/reference/access-authn-authz/rbac/" rel="noopener noreferrer"&gt;Roles and rolebinding&lt;/a&gt; were hired to manage access control and permissions into various party locations in an organized and secure manner.&lt;br&gt;
&lt;a href="https://kubernetes.io/docs/reference/access-authn-authz/rbac/" rel="noopener noreferrer"&gt;Clusterrole and clusterrolebinding&lt;/a&gt; assumed the same governing principle and expanded it citywide&lt;/p&gt;

&lt;p&gt;In the ever-evolving city of Kubernetes, the residents were content with the structures and systems in place. But as time passed, the citizens dreamed of new and unique buildings that could serve purposes beyond what was currently possible.&lt;/p&gt;

&lt;p&gt;From this desire, the &lt;a href="https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/" rel="noopener noreferrer"&gt;Custom Resource Definitions (CRDs)&lt;/a&gt; emerged, the visionary architects of Kubernetes City. They brought with them the ability to design new types of buildings—structures that were not originally part of the city’s blueprints but were now essential for its growth and diversity.&lt;/p&gt;

&lt;p&gt;These CRDs allowed the inhabitants to define their own types of Pods, Services, and Controllers—each with its own special features and behaviors. They were like custom-made homes and offices, tailored to the specific needs of their owners, yet seamlessly integrated into the city’s landscape.&lt;/p&gt;

&lt;p&gt;As the sun sets on Kubernetes City, all the objects gather to enjoy  the power of collaboration and innovation.&lt;/p&gt;

&lt;p&gt;But this is not just the end of our tale; it’s the beginning of your journey in Kubernetes City. As you wander through its streets, you’ll discover more secrets, encounter new challenges, and perhaps, contribute to its legacy.&lt;/p&gt;

&lt;p&gt;Now, dear reader, it’s your turn to share your thoughts. Did you find a favorite character in our story? Is there a concept that you’d like to explore further? Your insights and questions are the bricks and mortar that will help build the next chapter of Kubernetes City.&lt;/p&gt;

&lt;p&gt;Please, step into the town square and voice your ideas:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What did you enjoy the most about our Kubernetes narrative?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Which Kubernetes object would you like to hear more about?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you have suggestions for new characters or features to add to the story?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Your feedback is invaluable, and together, we can continue to demystify the world of Kubernetes, making it accessible and enjoyable for all.&lt;/p&gt;

&lt;p&gt;Thank you for joining me on this adventure. I look forward to hearing your tales and experiences in Kubernetes City. Until next time, keep exploring and innovating!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzd9aheqay28xcxk5k5jg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzd9aheqay28xcxk5k5jg.png" alt="Image description" width="800" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>makinglearningfun</category>
      <category>beginners</category>
      <category>microservices</category>
    </item>
    <item>
      <title>How EKS Pod Identity provides a more secure and optimized AWS services -Applications connectivity.</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Wed, 31 Jan 2024 22:43:50 +0000</pubDate>
      <link>https://dev.to/bongoe/how-eks-pod-identity-provides-a-more-secure-and-optimized-aws-services-applications-connectivity-2j2</link>
      <guid>https://dev.to/bongoe/how-eks-pod-identity-provides-a-more-secure-and-optimized-aws-services-applications-connectivity-2j2</guid>
      <description>&lt;p&gt;Every AWS Re-Invent new releases are awaited with high expectation. One of my highlights of the reinvent 2023 was the simplified application access to AWS service with EKS pod Identity. My  Kubernetes journey started sometime in 2021 and I have grown to love it, not only because it is greatly leveraged at my job, but also because of its extremely improving power as a micro-service. If all of this is new to you, check-out the link below on getting starting with Kubernetes on AWS.&lt;sup id="fnref1"&gt;1&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Amazon EKS Pod Identity?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Amazon EKS Pod Identity is a feature within Amazon Elastic Kubernetes Service (EKS) that simplifies the process of managing AWS Identity and Access Management (IAM) permissions for Kubernetes applications running on Amazon EKS clusters. It allows you to assign specific IAM roles to individual Kubernetes pods, ensuring granular and secure access to AWS resources and APIs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How was this managed prior to EKS Pod Identity?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before the introduction of EKS Pod Identity, the primary way to manage IAM permissions for Kubernetes pods was through solutions such as:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Kube2iam&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An open-source solution that assigns IAM roles to Kubernetes pods running in an Amazon EKS cluster. It creates a secure and controlled way of managing pod-level IAM access. The mechanism behind kube2iam is to intercept AWS metadata API requests from pods, check their attributes, and provide the appropriate IAM credentials based on a pod's annotation or Kubernetes namespace.&lt;br&gt;
While kube2iam has been helpful in securing pod-level access to AWS resources, it has certain challenges:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Additional component to manage:&lt;/em&gt; As kube2iam operates as a separate component, it increases overall management overhead.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Complex configuration:&lt;/em&gt; Setting up and configuring kube2iam can be complex, requiring multiple steps and in-depth knowledge about AWS networking and IAM.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Limited support for new features and improvements:&lt;/em&gt; kube2iam is a community-supported project, potentially making it slower to introduce new features or bug fixes compared to AWS managed services.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;kiam&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Another open-source solution that provides a secure way to manage pod-level AWS IAM roles in Kubernetes clusters. It intercepts AWS metadata API calls from the pods and responds with the appropriate IAM credentials based on annotations. Kiam has a more robust security model than kube2iam, achieved by separating the roles of a metadata agent and a server, with strict communication policies enforced using TLS and gRPC.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;AWS Security Token Service (STS)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Using the AWS STS, you can create short-lived credentials to manage access to AWS resources from within Kubernetes. This method works by assuming an IAM role in a pod and using the aws sts assume-role command to obtain temporary credentials. While STS is a useful mechanism for providing temporary access to AWS resources, it can be cumbersome to maintain and less flexible when compared to kube2iam or kiam.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;AWS IAM Roles for Service Accounts (IRSA)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Amazon introduced AWS IAM Roles for Service Accounts (IRSA) as an official AWS solution that streamlines pod-level IAM access within EKS clusters. IRSA allows you to associate an IAM role directly with a Kubernetes service account, so that applications running within a pod can use the role without sharing any credentials in the process. This automation simplifies and enhances security in managing pod-level AWS access.&lt;br&gt;
While there are several alternatives available for managing IAM permissions in Kubernetes, EKS Pod Identity seeks to provide a robust and easy-to-use native solution for Amazon EKS users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What makes Amazon EKS Pod Identity a more powerful tool?&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Amazon EKS Pod Identity offers several advantages for managing IAM permissions in EKS clusters:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Simplified permissions&lt;/em&gt;&lt;/strong&gt;: With EKS Pod Identity, you can assign specific IAM roles at the pod level. This granular control allows each pod to have the required permissions to access only the necessary AWS resources, simplifying the permissions management process and ensuring a more organized cluster.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Enhanced security&lt;/em&gt;&lt;/strong&gt;: By following the principle of least privilege, EKS Pod Identity enables enhanced security measures for the applications running in the EKS cluster. It limits each pod's access to only the permitted resources, reducing the potential surface area for exploitation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Native integration&lt;/em&gt;&lt;/strong&gt;: EKS Pod Identity is designed to work natively with Amazon EKS and AWS SDKs. This seamless integration ensures a more efficient developer experience while managing IAM access for their applications in the cluster.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Ease of management&lt;/em&gt;&lt;/strong&gt;: Compared to third-party solutions like kube2iam or kiam, EKS Pod Identity provides a more streamlined, native approach to IAM management. It eliminates the need for additional components and simplifies the overall management process, making it easier for administrators to maintain a secure and organized EKS environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Automatic credential provisioning&lt;/em&gt;&lt;/strong&gt;: EKS Pod Identity automates the process of providing temporary security credentials to pods when they make AWS API requests. This automation not only keeps the environment secure but also minimizes the complexity involved in credential management and IAM role assumption.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Hands-On Demo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let's experience the power of &lt;strong&gt;&lt;em&gt;EKS Pod Identity&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Requirements:&lt;br&gt;
&lt;strong&gt;&lt;em&gt;An AWS Service (s3 bucket):&lt;/em&gt;&lt;/strong&gt; We shall create an s3 bucket, upload an image and later on access it.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;An Application:&lt;/em&gt;&lt;/strong&gt; As we know applications are housed in Containers and containers resides in pods. These pods are managed by Kubernetes, so we need an EKS Cluster.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;IAM Permission:&lt;/em&gt;&lt;/strong&gt; For Identity and Access management. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F643kjhmt86aiyqtkmvj6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F643kjhmt86aiyqtkmvj6.png" alt="AWS S3-bucket" width="800" height="586"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;An S3 bucket named myeksbucket-01 was created and an image uploaded into it.&lt;/p&gt;

&lt;p&gt;I created an IAM Role called eksClusterRole and attached a permission policy so as to get access to the created s3 bucket.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwduqwua84ifur3zp4mky.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwduqwua84ifur3zp4mky.png" alt="Image description" width="800" height="821"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next to the permission, we need a Trust Relationship with a principal labelled pod.eks.amazonaws.com.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7dnbdr1funpun2aj030.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7dnbdr1funpun2aj030.png" alt="Image description" width="800" height="727"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next we need the pod identity agent, which will reside in the EKS Cluster. We need to create a cluster. The default setting will suffice. For the add-ons stage, It is important to chose amazon EKS Pod Identity agent as an extra add-on&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqjxiwefpgfwemf2gw5uq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqjxiwefpgfwemf2gw5uq.png" alt="Image description" width="512" height="336"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh39l01msmkzww8r8ghd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh39l01msmkzww8r8ghd.png" alt="Image description" width="800" height="774"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We need create a pod identity association. The Kubernetes namespace and service account can be created on the fly, if you don't already have in your cluster. Just enter the desired names in the field.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyym5el66hmtbdnid6fa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyym5el66hmtbdnid6fa.png" alt="Image description" width="512" height="502"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Cluster creating process might take up to 15 minutes.&lt;/p&gt;

&lt;p&gt;After the successful creation the cluster, we need to access it through the AWS-CLI on the same browser with the following command:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nzhf0zboxyceg97b6w5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nzhf0zboxyceg97b6w5.png" alt="Image description" width="512" height="29"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next we access the service as shown below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkv642mz9toqj3rd3t4n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkv642mz9toqj3rd3t4n.png" alt="Image description" width="512" height="74"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The following commands can be used to map the IAM role to the Kubernetes pod:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;$ aws eks create-pod-identity-association \&lt;br&gt;
  --cluster-name  \&lt;br&gt;
  --namespace  \&lt;br&gt;
  --service-account  \&lt;br&gt;
  --role-arn &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The following command can be used to install the EKS Pod Identity Agent into the cluster:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;aws eks create-addon \&lt;br&gt;
--cluster-name  \&lt;br&gt;
--addon-name eks-pod-identity-agent \&lt;br&gt;
--addon-version &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;These are further steps on achieving the required results.  &lt;sup id="fnref2"&gt;2&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;I hope these blog was helpful. I look forward to feedback and collaborations.&lt;/p&gt;




&lt;ol&gt;

&lt;li id="fn1"&gt;
&lt;p&gt;&lt;a href="https://aws.amazon.com/eks/getting-started/" rel="noopener noreferrer"&gt;Getting started with Kubernetes on AWS&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn2"&gt;
&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/aws/amazon-eks-pod-identity-simplifies-iam-permissions-for-applications-on-amazon-eks-clusters/" rel="noopener noreferrer"&gt;Amazon EKS Pod Identity simplifies tutorials&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

</description>
      <category>kubernetes</category>
      <category>podsecurity</category>
      <category>eks</category>
      <category>iam</category>
    </item>
    <item>
      <title>10 Best Practices for securing a kubernetes cluster with AWS</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Fri, 12 Jan 2024 22:11:05 +0000</pubDate>
      <link>https://dev.to/bongoe/10-best-practices-for-securing-a-kubernetes-cluster-with-aws-3m6</link>
      <guid>https://dev.to/bongoe/10-best-practices-for-securing-a-kubernetes-cluster-with-aws-3m6</guid>
      <description>&lt;p&gt;In this article, we will discuss Kubernetes security best practices and explore various solutions provided by Amazon Web Services (AWS).&lt;/p&gt;

&lt;p&gt;As more organizations adopt microservices architecture, securing Kubernetes clusters becomes increasingly important. Kubernetes security comprises multiple levels - the underlying infrastructure, the Kubernetes platform itself, and the applications running within the clusters. Setting up a kubernetes cluster and configuring the deployment is already challenging enough and the security part is frequently left for after.&lt;/p&gt;

&lt;p&gt;Important questions to ask when considering securing your kubernetes cluster:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How is a kubernetes cluster secured by default? &lt;/li&gt;
&lt;li&gt;If i dont do anything, how secure are my resources?&lt;/li&gt;
&lt;li&gt;What are the security vulnerability gaps?&lt;/li&gt;
&lt;li&gt;What are the security best practices to close those gaps?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security is a combination of multiple things at multiple levels. It is not just one or 2 things.&lt;/p&gt;

&lt;p&gt;There are several security issues and vulnerabilities that could be encountered while building and deploying applications. To prevent these vulnerabilities, we can implement best practices.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Access Control &amp;amp; Privilege Escalation&lt;/li&gt;
&lt;li&gt;Insufficient Logging &amp;amp; Monitoring&lt;/li&gt;
&lt;li&gt;Security Misconfigurations &amp;amp; Default Configurations&lt;/li&gt;
&lt;li&gt;Improper Secrets Management...just to name a few_&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  1. Image Scanning
&lt;/h3&gt;

&lt;p&gt;The first step in building an application is building a secure image in the cicd pipeline. What security issues do we have here?&lt;br&gt;
Here are 3 possibiliites:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Code from untrusted repositories&lt;/strong&gt;: Code or Libraries in our application from untrusted registries/source. These may include virus or backdoors that grant access to an attacker.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Vulnerabilities in the operating system or libraries&lt;/strong&gt;: We may also be using some packages in the operating system in our docker Image. These dependencies and tools may also have some vulnerabilities. Or the base Image we are using, may have some vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Unnecessary dependencies&lt;/strong&gt;: Choose leaner and smaller images, with less tools inside required to build the application image. An attacker can use a vulnerability in the container to break out and have access to the host or the kubernetes worker node&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To mitigate such vulnerabilities, Scan container images using tools like AWS signer, which is a fully managed code-signing service to ensure the trust and integrity of your code. AWS also offers the Elastic Container Registry (ECR) image scanning solution. Regularly scanning images in the cicd pipeline before pushing it into the repository can help prevent vulnerabilities. &lt;sup id="fnref1"&gt;1&lt;/sup&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1kh9a3ttb8ve4q7ulewh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1kh9a3ttb8ve4q7ulewh.png" alt="Sample mTLS" width="800" height="240"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Avoid Root-Users in Containers and Run as Non-Root
&lt;/h3&gt;

&lt;p&gt;Create service users and run applications with non-root users. Running containers with limited privileges will help harden security.&lt;br&gt;
AWS provides Amazon Inspector which uses the service-linked role named AWSServiceRoleForAmazonInspector2. This service-linked role trusts the inspector2.amazonaws.com service to assume the role.  &lt;sup id="fnref2"&gt;2&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Use RBAC for User and Permission Management
&lt;/h3&gt;

&lt;p&gt;Role-Based Access Control (RBAC) allows defining user roles and their permissions in Kubernetes. Make sure to adopt the least-privilege approach when assigning permissions.&lt;br&gt;
AWS offers Attribute-based access control (ABAC), which is an authorization strategy that defines permissions based on attributes. In AWS, these attributes are called tags. &lt;br&gt;
These tags can be attached to users, roles or resources. &lt;sup id="fnref3"&gt;3&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb6tr5eyqvwaw0rdsnert.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb6tr5eyqvwaw0rdsnert.png" alt="Image description" width="800" height="503"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Implement Network Policies
&lt;/h3&gt;

&lt;p&gt;Use Network Policies to define which pods can communicate with each other and how traffic is distributed among them. As the name implies, network policy configures communication rules at a network level, if we want to define these rules at  service level or an application level, which is a  more logical level for cluster communication. We can use service mesh such as Istio. Calico or Weave are popular Kubernetes network plugins for implementing network policies. &lt;sup id="fnref4"&gt;4&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Encrypt Communication with mTLS
&lt;/h3&gt;

&lt;p&gt;By default all communication between pods is unencrypted So if an attacker gets into a cluster, they will be able to see all the communication.. in plain text!! Make use of service meshes like Istio to enable mutual Transport Layer Security (mTLS) to encrypt communication between pods. &lt;sup id="fnref5"&gt;5&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvd34nsznzb78mq5vgm9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvd34nsznzb78mq5vgm9.png" alt="Image description" width="800" height="293"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Secure Secret Data with AWS KMS Or HashiCorp Vault
&lt;/h3&gt;

&lt;p&gt;Another thing which is not secure by default is the secret. They are base 64 encoded, so anyone who wants to view the secrets, can simply decode it with base64 –decode and see them in plain text. Use EncryptionConfiguration to enable encryption of Kubernetes secrets or adopt third-party solutions like AWS Key Management Service (KMS) and HashiCorp Vault to manage secret data. &lt;sup id="fnref6"&gt;6&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  7. Secure the etcd Data Store
&lt;/h3&gt;

&lt;p&gt;Secrets and all other k8s configuration data are stored in etcd, which is k8s backing store for all cluster data. Etcd resides in the control plane, having access to this will mean having access to the whole cluster. It is best to secure this… but how?&lt;br&gt;
Protect the etcd data store by placing it behind a firewall and implementing proper authentication and encryption. In addition to that, the data can be encrypted, such that even if the attacker gets access to it, they won't be able to read it. RBAC as well as kubernetes best practice. &lt;sup id="fnref7"&gt;7&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  8. Regularly Backup and Restore Data
&lt;/h3&gt;

&lt;p&gt;Attackers are known for infiltrating systems, stealing data and asking for ransom (Huge sums of money). This is a nightmare to every organization.&lt;br&gt;
Automate backups and implement an immutable storage system using tools like velero. Velero is a popular open-source tool that can back up Kubernetes cluster resources and persistent volumes to externally supported storage backend on demand or by schedule. AWS customers can leverage this solution to centrally back up and restore Kubernetes objects and applications from and to EKS. &lt;sup id="fnref8"&gt;8&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  9. Configure Security Policies
&lt;/h3&gt;

&lt;p&gt;Let's say as a Kubeadmin, you know and apply the above best practices and try to protect data and cluster. Clusters are usually used by developers. How do we make sure that these developers also apply these best practices when deploying their applications? Rules, such as pods that run privilege containers or containers with root-user cannot be deployed.The rules should also define network policy for every pod. The Kubernetes Pod security policy admission controller validates Pod creation and update requests against a set of rules.&lt;br&gt;
Use third-party tools such as Open Policy Agent (OPA) or Caverno to automate the validation of security configurations and avoid misconfigurations. &lt;sup id="fnref9"&gt;9&lt;/sup&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  10. Implement Disaster Recovery
&lt;/h3&gt;

&lt;p&gt;Applying all of these best security practices is no 100%  guarantee that an attack won’t occur. Ensure that there is a disaster recovery plan in place and tools are in use for automating cluster recovery.&lt;br&gt;
AWS  implements backup and recovery approaches for on-premises, cloud-native, and hybrid architectures. These approaches offer lower costs, higher scalability, and more durability to meet recovery time objective (RTO), recovery point objective (RPO), and compliance requirements.&lt;br&gt;
&lt;sup id="fnref10"&gt;10&lt;/sup&gt;&lt;br&gt;
By following these best practices and leveraging AWS solutions for Kubernetes security, you can protect your Kubernetes clusters and applications from potential vulnerabilities and build a robust infrastructure.&lt;/p&gt;




&lt;ol&gt;

&lt;li id="fn1"&gt;
&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/security/best-practices-to-help-secure-your-container-image-build-pipeline-by-using-aws-signer/" rel="noopener noreferrer"&gt;Read about AWS Signer&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn2"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/inspector/latest/user/using-service-linked-roles.html" rel="noopener noreferrer"&gt;More on Amazon Inspect&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn3"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction_attribute-based-access-control.html" rel="noopener noreferrer"&gt;RBAC with AWS&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn4"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/cni-network-policy.html" rel="noopener noreferrer"&gt;Configure your cluster for Kubernetes network policies - Amazon EKS&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn5"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/configure-mutual-tls-authentication-for-applications-running-on-amazon-eks.html" rel="noopener noreferrer"&gt;Configure mTLS&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn6"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/secure-sensitive-data-secrets-manager-terraform/introduction.html" rel="noopener noreferrer"&gt;Secure sensitive Data&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn7"&gt;
&lt;p&gt;&lt;a href="https://kubernetes.io/docs/concepts/security/secrets-good-practices/" rel="noopener noreferrer"&gt;Securing Kubernetes Secrets&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn8"&gt;
&lt;p&gt;&lt;a href="https://aws.amazon.com/de/blogs/containers/backup-and-restore-your-amazon-eks-cluster-resources-using-velero/" rel="noopener noreferrer"&gt;Restore with Velero&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn9"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-security-policy.html" rel="noopener noreferrer"&gt;Securing Pods&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;li id="fn10"&gt;
&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/backup-recovery/welcome.html" rel="noopener noreferrer"&gt;Disaster Recovery&lt;/a&gt; ↩&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>devops</category>
      <category>kubernetes</category>
      <category>security</category>
    </item>
    <item>
      <title>My First AWS Event Experience: AWS Summit Berlin 2023</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Wed, 27 Dec 2023 23:04:12 +0000</pubDate>
      <link>https://dev.to/bongoe/my-first-aws-event-experience-aws-summit-berlin-2023-1795</link>
      <guid>https://dev.to/bongoe/my-first-aws-event-experience-aws-summit-berlin-2023-1795</guid>
      <description>&lt;p&gt;Some might be wondering why a post about the AWS Summit Berlin that happened in Mai (about 7 months ago) is being posted in December. I was going through my yearly activities and documentations, and discovered I didn't post about my first ever event as an &lt;strong&gt;awscommunitybuilder&lt;/strong&gt;.&lt;br&gt;
I would have led this slide, but the series of events before and during which were meant to stop me from attending the vent, didn't succeed in stopping me.&lt;/p&gt;

&lt;p&gt;I'm excited to share my experience from earlier this year, back in May, when I attended the AWS Summit in Berlin. It was a rollercoaster of emotions leading up to the event, but I am so glad I pushed through and made it there! Here's a recount of my first-ever AWS event.&lt;/p&gt;

&lt;h2&gt;
  
  
  Overcoming Obstacles to Attend 🙅🏾‍♀️ 🥷🏽
&lt;/h2&gt;

&lt;p&gt;Joining the AWS Community Builder program was a fantastic opportunity, and I'd promised myself to attend all AWS-related events I could. AWS Summit Berlin was the first on my list. However, the days leading up to the event were challenging. My husband was hospitalized, finances were tight, my kids' activities increased, and my 80-year-old mother-in-law, who lives with us, fell sick with a toothache and I had to accompany her on the series of hospital visits. It seemed like everything was conspiring against my attendance.&lt;/p&gt;

&lt;p&gt;Despite these challenges, I knew I didn't want to miss the summit. The flights and trains to Berlin became increasingly expensive, so I opted for a Flixbus (an 8 hour journey) to save on costs and arrived two hours later than planned , but I was not deterred! &lt;/p&gt;

&lt;h2&gt;
  
  
  Hitting the Ground Running 🏃🏽‍♀️🏃🏽‍♀️
&lt;/h2&gt;

&lt;p&gt;I arrived at the summit full of energy and ready to network, but my appearance didn't look the part. I quickly applied some makeup at the entrance and wasn't bothered about my surroundings. I entered the venue, and  it took me a minute to let everything sink-in. The energy was encouraging, entertaining, welcoming and inspiring to say the least. I collected my batch and contemplated on the next best action.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Exploring the Summit and Networking 👩🏾‍💻 🔍
&lt;/h2&gt;

&lt;p&gt;Once I met most of the community builders in person at the AWS Community Lounge, I set off to explore the event. I attempted to go visit every stand. This wasn't possible at the first try.The summit offered a wealth of insights and innovative ideas, showcasing efficient new ways to optimize cloud services.&lt;/p&gt;

&lt;p&gt;Networking with cloud enthusiasts and colleagues was an incredible experience. Sharing my own journey in cloud computing and discussing real-life problem-solving made me feel empowered.&lt;/p&gt;

&lt;h2&gt;
  
  
  Swags, Stickers, and More! 😎 🤩
&lt;/h2&gt;

&lt;p&gt;I finally got to "pimp" my laptop with all sorts of AWS and cloud computing stickers. The community builders were all invited for dinner and beer. Thanks to the management of AWS communitybuilders. We socialized and had some great conversations with our leaders and heroes.&lt;/p&gt;

&lt;p&gt;The event swag was another highlight: I received an AWS hoodie, mug, bags in various colors, a T-shirt and socks from Reply, and several pens, office supplies, and souvenirs from different cloud providers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Inspiring Keynote Speakers ♘
&lt;/h2&gt;

&lt;p&gt;The keynote speakers were fantastic, featuring people I never thought I'd meet in person, such as  &lt;a href="https://www.linkedin.com/in/semaan/" rel="noopener noreferrer"&gt;Viktoria Seeman&lt;/a&gt; and &lt;a href="https://www.linkedin.com/in/taylorjacobsen/" rel="noopener noreferrer"&gt;Taylor Jacobsen&lt;/a&gt;. She shared inspiring words for women in the field, and you can find more information on my LinkedIn &lt;a href="https://www.linkedin.com/in/endah-bongo-awah/" rel="noopener noreferrer"&gt;here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The AWS Summit Berlin was an unforgettable experience, and I encourage all cloud enthusiasts to attend an AWS event if you can. I missed my bus back home and had to spend 6 hours at the train station. I met an amazing young lady at the station who missed her train to Paris as well. She was in tears, so i consoled her with some of my swag. We cheered each other and ended up laughing over our mishaps. &lt;br&gt;
&lt;strong&gt;Things always workout if we don't give up!&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Don't be discouraged!&lt;/strong&gt;&lt;br&gt;
I'm looking forward to the next one! &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fncyamcrfv0ys1dn621hg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fncyamcrfv0ys1dn621hg.png" alt="Happy me" width="800" height="1066"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>awscommunitybuilder</category>
      <category>womenintech</category>
      <category>devops</category>
    </item>
    <item>
      <title>AWS re:Invent 2023@home - An AWS Community Builder's Experience</title>
      <dc:creator>Endah Bongo-Awah</dc:creator>
      <pubDate>Mon, 04 Dec 2023 22:54:51 +0000</pubDate>
      <link>https://dev.to/bongoe/aws-reinvent-2023home-an-aws-community-builders-experience-1pga</link>
      <guid>https://dev.to/bongoe/aws-reinvent-2023home-an-aws-community-builders-experience-1pga</guid>
      <description>&lt;p&gt;As an AWS Community Builder, I had high hopes to attend AWS re:Invent 2023, which has been consistently taking place in Las Vegas on a yearly(usually in November) basis since 2012. Like many others, I counted heavily on the "AWS All Builders Welcome Grant" to cover my costs. The grant comes with prerequisites,which I met, and by no means was a gaurantee that I will get it. However, my plans changed when I didn't receive the grant. Left without a plan B, I was left wondering how things might unfold...🤔&lt;/p&gt;

&lt;p&gt;Fortunately, AWS surprised us all by launching &lt;strong&gt;re:Invent at Home&lt;/strong&gt; for the very first time! This virtual experience allowed AWS Community Builders, Community Heroes, and AWS enthusiasts from around the world to attend, watch keynote speakers live,network, hangout,co-work and share their views on favorite announcements. In this post, I share my experience attending re:Invent 2023 from the comfort of my home.&lt;/p&gt;

&lt;h2&gt;
  
  
  Accessible to All 💻💻
&lt;/h2&gt;

&lt;p&gt;One of the biggest perks of re:Invent at Home was that it made the event much more accessible. No longer did you need to worry about travel expenses or the grant to participate. The announcements, insights, and advice from these influential speakers were invaluable and motivating. This virtual format allowed AWS fans to enjoy all the insightful content from anywhere in the world.Yes I know, being there would have been mermerizing 🤩🤩&lt;/p&gt;

&lt;h2&gt;
  
  
  Interactive Sessions and Networking Opportunities ⌨👨🏻‍💻
&lt;/h2&gt;

&lt;p&gt;A major concern for virtual conferences is whether they provide engaging activities and networking opportunities. I am happy to report that re:Invent at Home excelled in this regard. For instance, there were daily &lt;strong&gt;Happy Hours&lt;/strong&gt; that featured trivia games and opportunities for attendees to bond with one another.&lt;br&gt;
There were also &lt;strong&gt;Show and Tell&lt;/strong&gt; sessions where fellow builders and AWS enthusiasts presented their projects and thoughts on a variety of AWS-related topics. As a result, I learned a lot from their experiences.&lt;/p&gt;

&lt;h2&gt;
  
  
  Exciting exclusive reinvent Swags 😎😎
&lt;/h2&gt;

&lt;p&gt;Who doesn't love swag? AWS re:Invent at Home didn't let us down on this aspect either. Special (reinvent exclusive) swag was up for grabs, and fortunately, everybody and interacted in one way or the other won something. To make things even more exciting, AWS announced a daily &lt;strong&gt;re:Invent at Home winner&lt;/strong&gt; – and I was the lucky winner on Day 1!💃💃 It's moments like these that make participating in such events truly memorable.&lt;/p&gt;

&lt;h2&gt;
  
  
  My Experience 👩‍🏫👩‍🏫
&lt;/h2&gt;

&lt;p&gt;Attending AWS re:Invent 2023 virtually was a unique and rewarding experience. I gained valuable insights into AWS services and advancements, interacted with like-minded individuals, and expanded my knowledge and potential. This was all possible without even stepping foot in Las Vegas.&lt;/p&gt;

&lt;p&gt;AWS re:Invent at Home has shown that even when circumstances hinder us from meeting in person, the learnings and connections can still go on. As our world adapts and changes, the virtual format of re:Invent has proven that we can continue to gain invaluable insights and connections from the comfort of our homes.&lt;/p&gt;

&lt;p&gt;Now that you know my experience, I encourage you to consider attending virtual conferences like re:Invent at Home in the future, if your "plan A" doesn’t work out or you intentionally want to express something different. This may provide you with the knowledge, community, and motivation you seek, all without the need to travel or obtain a grant.&lt;/p&gt;

&lt;h2&gt;
  
  
  Useful Links for Informative Content 🕵️‍♂️🕵️‍♂️
&lt;/h2&gt;

&lt;p&gt;For those who missed the live event or want more in-depth information, here are some links to the keynote speakers, AWS announcements, and blogs.&lt;br&gt;
Missed the keynotes? Click here 👉 &lt;a href="https://reinvent.awsevents.com/" rel="noopener noreferrer"&gt;https://reinvent.awsevents.com/&lt;/a&gt;&lt;br&gt;
Interested in reinvent2023 announcements? &lt;br&gt;
Click here 👉 &lt;a href="https://aws.amazon.com/de/blogs/aws/top-announcements-of-aws-reinvent-2023/" rel="noopener noreferrer"&gt;https://aws.amazon.com/de/blogs/aws/top-announcements-of-aws-reinvent-2023/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I really enjoyed Dr. Werner Vogel's keynote on cost optimization and sustainability. Check on the 7 laws of a frugal architecture here 👉&lt;a href="https://thefrugalarchitect.com/" rel="noopener noreferrer"&gt;https://thefrugalarchitect.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How was your reinvent2023? Where did you experience it? Which was/were highlights?&lt;/p&gt;

</description>
      <category>awsreinvent2023</category>
      <category>awscommunitybuilder</category>
      <category>nowgobuild</category>
      <category>aws</category>
    </item>
  </channel>
</rss>
