<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: David Colebatch</title>
    <description>The latest articles on DEV Community by David Colebatch (@dcolebatch).</description>
    <link>https://dev.to/dcolebatch</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F451614%2F7e4d21bf-246e-4bd4-991e-ed058872ba28.png</url>
      <title>DEV Community: David Colebatch</title>
      <link>https://dev.to/dcolebatch</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/dcolebatch"/>
    <language>en</language>
    <item>
      <title>Using Zero Trust Networking in Cloud Migrations</title>
      <dc:creator>David Colebatch</dc:creator>
      <pubDate>Thu, 09 Jun 2022 18:21:02 +0000</pubDate>
      <link>https://dev.to/aws-builders/using-zero-trust-networking-in-cloud-migrations-abd</link>
      <guid>https://dev.to/aws-builders/using-zero-trust-networking-in-cloud-migrations-abd</guid>
      <description>&lt;p&gt;Moving workloads to the cloud has many benefits, and one that is often overlooked is the opportunity to modernize your network.&lt;/p&gt;

&lt;p&gt;In a traditional “perimeter-based” architecture, users and devices are authenticated and authorized on a device-by-device basis when connecting remotely via VPN.&lt;/p&gt;

&lt;p&gt;The perimeter approach to securing access worked reasonably well when the majority of data was kept within company walls and accessed by a few employees, but as the past few years have shown us: workers are increasingly remote, probably using their own devices but most definitely increasing their thirst for data and cloud-based services.&lt;/p&gt;

&lt;h2&gt;
  
  
  Something’s gotta give!
&lt;/h2&gt;

&lt;p&gt;The Zero Trust security framework (or architecture) allows you to protect your data without burdening your users with excessive authentication and authorization processes. As companies accelerate their cloud migrations today, mature organizations are seizing the opportunity to holistically rethink how they secure their data and applications. The perimeter network model is often the last to go, but consider this:&lt;/p&gt;

&lt;h2&gt;
  
  
  LIMIT YOUR BLAST RADIUS
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Network and account segmentation reduces the attack surface for workloads in the cloud. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In our data centers, or “on premises”, network segmentation often meant that we would have one production environment and host all of our applications there.  One breach though, and an attacker could often move laterally from one production app to another.  In the cloud, we can cheaply (read: free) segment each production application into its own network, and make the only interface to data via secure APIs.&lt;/p&gt;

&lt;p&gt;Sure, this requires planning and configuration to be properly implemented, but a cloud migration initiative is the perfect time to do this:  You have the skills and resources spun up already, and often the desire to improve the status-quo.&lt;/p&gt;

&lt;h2&gt;
  
  
  YOUR IDENTITIES ARE THE PERIMETER!
&lt;/h2&gt;

&lt;p&gt;With data securely stowed away behind your application layer, the path to access that data is secured via authentication and authorization (IAA).  As technology has evolved, so have our behaviors and expectations.&lt;/p&gt;

&lt;p&gt;Nowadays, we benefit from the more secure Multi-factor authentication (MFA) in a variety of applications from GMail and Microsoft 365, to Facebook and more.  Users are so accustomed to this in their personal computing, that introducing MFA into corporate settings is no longer a change management problem.&lt;/p&gt;

&lt;p&gt;In addition to MFA, modern cloud IAA systems allow you to configure conditional access policies which allow you to provide additional layers of security for sensitive data by requiring additional credentials from users.&lt;/p&gt;

&lt;h2&gt;
  
  
  So What?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;More secure, and more predictable migration timelines.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;With a Zero Trust approach to your cloud architecture, if when a threat actor gains access to one instance of a workload, they are far less likely to then be able to “pivot” or move laterally through the network.  &lt;/p&gt;

&lt;p&gt;Using zero trust networking can help you deal with the complexity of migrating workloads to the cloud, making your migration initiative faster and more predictable. One of the ways this is achieved, is by employing templates and modules of infrastructure code such as terraform and being able to stamp out additional environments more quickly and repeatedly, without having to worry about IP planning, network peering, firewall rules and other traditional networking concerns.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Zero trust’s approach to networking aims to secure applications by assuming that attackers may have already breached other parts of your systems.  It requires you to think about cloud as a different paradigm, and avoid re-creating your on-premises network topologies in the first place.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/davidcolebatch/"&gt;Reach out&lt;/a&gt; if you have stories about how pivoting from hub-and-spoke only networking in the cloud to isolated VPCs and VNETs has improved your performance or opsec.  I’d love to hear.&lt;/p&gt;

&lt;p&gt;-–&lt;br&gt;
David Colebatch is the Chief Migration Hacker at Tidal Migrations. Connect on twitter at &lt;a href="https://twitter.com/dcolebatch"&gt;@dcolebatch&lt;/a&gt; or &lt;a href="https://www.linkedin.com/in/davidcolebatch/"&gt;follow on LinkedIn&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>security</category>
      <category>cloudmigration</category>
    </item>
    <item>
      <title>Discover Database Servers In 3 Steps</title>
      <dc:creator>David Colebatch</dc:creator>
      <pubDate>Thu, 13 Jan 2022 21:11:55 +0000</pubDate>
      <link>https://dev.to/aws-builders/discover-database-servers-in-3-steps-2006</link>
      <guid>https://dev.to/aws-builders/discover-database-servers-in-3-steps-2006</guid>
      <description>&lt;p&gt;I recently had a cloud migration client who was at the beginning stage of their discovery phase and looking to jump straight to “which database platforms should I be using in the cloud?” - a tall ask you might say, but following the three steps below they were able to discover and analyze all of their database servers in just two weeks.&lt;/p&gt;

&lt;p&gt;Stepping back for a moment, let’s review “the why” - Why is database analysis important to perform at the earliest stages of a cloud migration? &lt;/p&gt;

&lt;h3&gt;
  
  
  Why Assess Databases for Cloud?
&lt;/h3&gt;

&lt;p&gt;Increasingly enterprises are coming around to the view that the cloud is more than a datacenter. They frequently tout new drivers such as: unlocking new business capabilities, becoming more agile, and leveraging our data to become more competitive. &lt;/p&gt;

&lt;p&gt;The application-centric and data-led migration initiatives we see today are the new normal, and gone are the days of infrastructure-led, lift-and-shift-only migrations. 😅&lt;/p&gt;

&lt;p&gt;As such, if you are setting a strategy and planning migrations you need answers to questions like (a) which technologies will we use, (b) what skill sets do I need to develop/hire, and (c) how difficult will it be? Those answers are provided by a comprehensive database and application assessment.&lt;/p&gt;

&lt;p&gt;We perform these assessments rapidly using purpose-built discovery and assessment tools, and today I will focus on the three steps you can take today to answer these questions.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 1 - Discovery
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sV -p1433,1521-1525,3306,5432,7474,27017 192.168.2.2/24 -oX databases-on-my-network.xml

tidal sync nmap databases-on-my-network.xml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Leveraging the well known and free &lt;a href="https://nmap.org/"&gt;Nmap&lt;/a&gt;, together with &lt;a href="https://guides.tidalmg.com/host-discovery.html"&gt;Tidal Tools (docs)&lt;/a&gt; we can find all the servers on our network that are listening on default database ports, and obviously, you can tweak these for your environment if you know of other ports that your Ops teams may use in addition to these. &lt;/p&gt;

&lt;p&gt;In the example above these are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;TCP/1433 - Microsoft SQL Server&lt;/li&gt;
&lt;li&gt;TCP/1521-1525 - Oracle Server&lt;/li&gt;
&lt;li&gt;TCP/3306 - MySQL &lt;/li&gt;
&lt;li&gt;TCP/5432 - PostgreSQL &lt;/li&gt;
&lt;li&gt;TCP/7474 - Neo4J&lt;/li&gt;
&lt;li&gt;TCP/27017 - MongoDB&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Running this nmap command is fast, and results in a portable XML file containing the results.  &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note: It’s common practice to have firewalls and IPS devices in enterprise networks to either block or report on this type of discovery. We recommend working collaboratively with your IT Operations and Security teams to determine which networks to run it against, and from what node in the network to begin with.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Once you have your XML file(s) of results, uploading those to the tidal platform is a quick way to bolster your migration inventory with these special servers:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;tidal sync nmap databases-on-my-network.xml&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 2 - Analysis
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;tidal analyze db databases.yml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With your inventory complete, you can now get credentials to be able to query each of these databases. We recommend discovery tools that require read-only access, like the user permissions required in &lt;a href="https://guides.tidalmg.com/analyze-database.html"&gt;this guide&lt;/a&gt; under Getting Started.&lt;/p&gt;

&lt;p&gt;It is worth noting that you do need to analyze the databases you intend to migrate. That is, be sure to analyze your production databases. While it is tempting to claim success after analyzing development or test servers, the reality is that production databases often have (a) different features enabled, but almost always have (b) separate application dependencies and (c) performance requirements.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 3 - Plan
&lt;/h2&gt;

&lt;p&gt;Review the analysis results in your Tidal Migrations workspace for each database, and determine if the cloud-native technologies you would like to adopt will be easy or difficult to migrate to adopt for each database. You’ll uncover database features in your Oracle and SQL databases that require extra work to &lt;a href="https://tidalmigrations.com/6Rs-of-migration/#Replatform"&gt;Replatform&lt;/a&gt; to alternatives like PostgreSQL, MySQL and others, as well as the number of application dependencies, database sizes and IO performance requirements. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1MpBOl7B--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o3jnigfokf4oxo7jbrp7.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1MpBOl7B--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o3jnigfokf4oxo7jbrp7.gif" alt="Database analysis screencap" width="880" height="265"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Having these data points at your fingertips for one database is very useful for the migration teams in later stages, allowing them to migrate with certainty and not waste time in endless meetings, or chasing down precious DBA resources (who has enough of them anyway?).  Getting this information in aggregate across all your databases early on: priceless. Now we can plan effectively, based on our databases and our actual usage requirements.&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;As you can see, at even the earliest stages of cloud migration discovery, migration teams can quickly capture data-driven insights from not only their applications and server infrastructure but their databases too.  Having this comprehensive assessment available early on informs migration strategy, business case formation as well as migration team staffing requirements. More data upfront means less surprises during migration execution and far better outcomes.&lt;/p&gt;

&lt;p&gt;Written By: &lt;br&gt;
&lt;a href="https://www.linkedin.com/in/davidcolebatch/"&gt;David Colebatch&lt;/a&gt;, Chief Migration Hacker, Tidal Migrations&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>database</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>AWS Migration: Lessons from the trenches</title>
      <dc:creator>David Colebatch</dc:creator>
      <pubDate>Mon, 26 Oct 2020 14:52:32 +0000</pubDate>
      <link>https://dev.to/aws-builders/aws-migration-lessons-from-the-trenches-5628</link>
      <guid>https://dev.to/aws-builders/aws-migration-lessons-from-the-trenches-5628</guid>
      <description>&lt;p&gt;It’s been over 12 years that I’ve been on AWS and I’ve seen a lot of cloud adoption initiatives since 2008, lately there’s been an accelerating number of cloud migration projects to AWS, Azure and Google Cloud. It seems only fitting that I share with you a run-down of the top three lessons I’ve learned in this time I’d be &lt;a href="https://twitter.com/intent/tweet?text=.%20%40dcolebatch%20My%20cloud%20migration%20lesson%20learned%20is..."&gt;interested in hearing yours too&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  TOP 3 CLOUD MIGRATIONS LESSONS LEARNED
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Analysis Paralysis
&lt;/h3&gt;

&lt;p&gt;Usually seen when more traditional IT departments take the lead on a cloud migration, analysis paralysis is the problem of spending months and years in abstract architectural planning meetings trying to solve all the problems of the universe. Generally, this comes from a lack of understanding in the new paradigm that AWS provides and trying to shoe-horn existing ITSM process as well as their datacenter architectures into the cloud-box.&lt;/p&gt;

&lt;p&gt;If you find yourself in endless discussions around the perfect landing zone design and playing “what if?” whack-a-mole with your security team, do yourself a favour and spend a few dollars hiring someone who has done it before. Then, start small.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Too Big to (not) Fail
&lt;/h3&gt;

&lt;p&gt;On the other side of the spectrum from #1 is when companies jump in without any thought given to the organizational change that is required to support a technology transformation. This results in customers adopting only EC2 and treating AWS as a giant virtualization provider. Yikes — didn’t that strategy ever miss the point — we’ve just moved our same operational problems elsewhere.&lt;/p&gt;

&lt;p&gt;Thankfully there are now enough case studies of these lift-and-shift mass-migrations which have resulted in sticker shock, and in some cases, reverse migrations, that our current customers aren’t considering the outsourced “migration factory” approach.&lt;/p&gt;

&lt;p&gt;Top trigger term here: “Flash-cut the DC to the cloud.” Yeah, not anymore.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Start small, migrate with purpose
&lt;/h3&gt;

&lt;p&gt;The most successful cloud deployments we have seen start with an application portfolio assessment, to identify the low-hanging fruit of applications that are (a) easiest from a technology perspective and (b) valuable enough to the business that the applications migration yields tangible results for the business.&lt;/p&gt;

&lt;p&gt;Leveraging out-of-the box landing zone automation and reference architectures gets customers a long way in terms of adopting best practices. Having the organization recognize that these architectures will continue to evolve over time through small incremental changes, will remove the need to wait until every man and his dog has “signed off” on the designs.&lt;/p&gt;

&lt;p&gt;It’s a novel approach for most teams, and one that goes against the grain of traditional enterprise architecture gating processes. But it is one that has served us very well in the past, with the right executive leadership to support it.&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Lesson learned: Start small, don’t over-complicate things, and build momentum for your organization. Each migration can feel slow to get going, be it from naysayers, server huggers or lack of confidence from your team itself. If you follow these 3 steps, your migration will snowball and your project sponsor will look like a visionary genius, while your name lives forever as a migration hero.&lt;/p&gt;

&lt;p&gt;It’s that easy. :)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://www.linkedin.com/in/davidcolebatch/"&gt;-David Colebatch&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Chief Migration Hacker, &lt;a href="https://tidalmigrations.com"&gt;Tidal Migrations&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudmigration</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
