<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kiran More</title>
    <description>The latest articles on DEV Community by Kiran More (@morekiranp).</description>
    <link>https://dev.to/morekiranp</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3624777%2F5969def6-9f78-40dc-ab43-b3141ae608ef.png</url>
      <title>DEV Community: Kiran More</title>
      <link>https://dev.to/morekiranp</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/morekiranp"/>
    <language>en</language>
    <item>
      <title>Unlocking Real Business Value: My Hands-On Journey</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Thu, 01 Jan 2026 12:40:11 +0000</pubDate>
      <link>https://dev.to/morekiranp/unlocking-real-business-value-my-hands-on-journey-48db</link>
      <guid>https://dev.to/morekiranp/unlocking-real-business-value-my-hands-on-journey-48db</guid>
      <description>&lt;p&gt;Cloud migration stories are everywhere, but every journey is unique. As an AWS Solution Architect, I’ve led multiple migrations from legacy on-premise environments to AWS, and I’ve learned that success isn’t just about moving workloads-it’s about transforming business outcomes.&lt;/p&gt;

&lt;p&gt;Here’s my practical approach, blending AWS’s proven framework with real-world lessons:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Assess: Beyond the Checklist&lt;br&gt;
I start with a deep-dive discovery, not just inventorying assets but mapping dependencies, business priorities, and pain points. This means engaging with stakeholders across IT and business units to uncover hidden risks and opportunities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Mobilize: Building the Right Foundation&lt;br&gt;
Instead of a generic landing zone, I design a tailored AWS environment that aligns with compliance, security, and operational needs. Automation is key-using Infrastructure as Code (IaC) to ensure repeatability and governance from day one.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Migrate: Orchestrating with Precision&lt;br&gt;
I leverage AWS Migration Hub and native tools, but also integrate custom scripts and third-party solutions for complex workloads. My focus: zero business disruption, phased cutovers, and continuous validation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Modernize: Accelerating Innovation&lt;br&gt;
Migration isn’t the finish line. I work with teams to refactor applications, adopt serverless, and implement CI/CD pipelines-unlocking agility and cost savings that weren’t possible on-premise.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What Sets Approach Apart:&lt;br&gt;
Business-first mindset: Every technical decision is tied to measurable business value.&lt;br&gt;
Hands-on leadership: I’m in the trenches with teams, solving problems as they arise.&lt;br&gt;
Continuous improvement: Post-migration, I drive optimization sprints to maximize ROI.&lt;/p&gt;

&lt;p&gt;Conclusion:&lt;br&gt;
Cloud migration is more than a technical project-it’s a catalyst for business transformation. If you’re planning your own journey, focus on outcomes, not just activities. Let’s connect and share insights!&lt;br&gt;
hashtag#AWS hashtag#CloudMigration hashtag#DigitalTransformation hashtag#SolutionArchitect hashtag#Modernization&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w0361m887hh1yusrv0e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w0361m887hh1yusrv0e.png" alt=" " width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>On-Prem Oracle vs. AWS RDS: A Comparison 📊</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Wed, 31 Dec 2025 12:18:10 +0000</pubDate>
      <link>https://dev.to/morekiranp/on-prem-oracle-vs-aws-rds-a-comparison-jf5</link>
      <guid>https://dev.to/morekiranp/on-prem-oracle-vs-aws-rds-a-comparison-jf5</guid>
      <description>&lt;p&gt;I’ve been deep-diving into the architectural impact of migrating On-Premise Oracle databases to AWS RDS. The shift isn't just about changing where &lt;br&gt;
the data lives; it's about fundamentally changing the operational model.&lt;br&gt;
Here are my key takeaways from a recent deep dive:&lt;/p&gt;

&lt;p&gt;⚙️ Database Engine&lt;br&gt;
On-Prem: Full control over versions and patching.&lt;br&gt;
RDS: Managed service. You choose the version, but AWS manages the OS. Options for "License Included" or "Bring Your Own License" (BYOL).&lt;br&gt;
⚡ High Availability (HA)&lt;br&gt;
On-Prem: Complex setup (RAC, manual Data Guard).&lt;br&gt;
RDS: Multi-AZ deployment. Synchronous replication to a standby instance with automatic failover.&lt;br&gt;
📈 Scalability&lt;br&gt;
On-Prem: Limited by physical hardware; lengthy procurement cycles.&lt;br&gt;
RDS: Vertical scaling (push-button instance resizing) and Storage Auto Scaling (up to 64TB) with zero downtime.&lt;br&gt;
🛡 Security &amp;amp; Backups&lt;br&gt;
On-Prem: Physical security + Network firewalls. Manual RMAN scripts for backups.&lt;br&gt;
RDS: VPC Security Groups, IAM integration, and Encryption at Rest (KMS). Automated backups and Point-in-Time Recovery (PITR).&lt;br&gt;
⚙️Maintenance&lt;br&gt;
On-Prem: DBA manages OS patching, DB patching, and hardware.&lt;br&gt;
RDS: AWS handles OS patching. You define a "Maintenance Window" for DB updates.&lt;br&gt;
🔍 Monitoring&lt;br&gt;
On-Prem: OEM (Enterprise Manager).&lt;br&gt;
RDS: CloudWatch metrics + Performance Insights (visualizes load by waits/SQL).&lt;br&gt;
🛠 Migration Tools&lt;br&gt;
The Winners: AWS Schema Conversion Tool (SCT) for heterogenous migrations and AWS DMS (Database Migration Service) for continuous data replication.&lt;br&gt;
The move to RDS isn't just a "lift and shift"—it's a shift from managing infrastructure to managing data value.&lt;br&gt;
hashtag#AWS hashtag#Oracle hashtag#CloudMigration hashtag#DatabaseArchitecture hashtag#SolutionArchitect hashtag#TechTips&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frk1tvhngxpc2uwnk54l6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frk1tvhngxpc2uwnk54l6.jpg" alt=" " width="510" height="806"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvllsboq2amdbn4jgpbw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsvllsboq2amdbn4jgpbw.jpeg" alt=" " width="800" height="702"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>database</category>
    </item>
    <item>
      <title>🌐 Strengthening the Security Pillar of the AWS Well-Architected Framework: Introducing EC2 Instance Attestation</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Mon, 29 Dec 2025 12:32:35 +0000</pubDate>
      <link>https://dev.to/morekiranp/strengthening-the-security-pillar-of-the-aws-well-architected-framework-introducing-ec2-instance-4mcb</link>
      <guid>https://dev.to/morekiranp/strengthening-the-security-pillar-of-the-aws-well-architected-framework-introducing-ec2-instance-4mcb</guid>
      <description>&lt;p&gt;AWS continues to raise the bar on cloud security with the launch of EC2 Instance Attestation - a new feature that allows you to cryptographically verify that your EC2 instance is running a trusted and approved configuration.&lt;/p&gt;

&lt;p&gt;🔒 Security as a Pillar in the AWS Well-Architected Framework&lt;br&gt;
One of the six pillars of the AWS Well-Architected Framework, the Security Pillar, focuses on protecting data, systems, and assets through strong identity management, traceability, and infrastructure protection.&lt;/p&gt;

&lt;p&gt;EC2 Instance Attestation aligns perfectly with this by bringing a new layer of integrity verification to your compute layer.&lt;/p&gt;

&lt;p&gt;🧩 How It Strengthens the Security Pillar&lt;/p&gt;

&lt;p&gt;✅ Identity and Access Management&lt;br&gt;
By using cryptographic proofs tied to the Nitro TPM, you can ensure only attested (trusted) instances are allowed to decrypt secrets or access AWS KMS keys.&lt;br&gt;
This moves your design closer to a Zero Trust model - “never trust, always verify,” even for your own compute resources.&lt;/p&gt;

&lt;p&gt;✅ Infrastructure Protection&lt;br&gt;
Instance attestation validates the integrity of your AMIs and runtime environment.&lt;br&gt;
This ensures that only approved, tamper-free images can run - significantly reducing risks from unauthorized software or image drift.&lt;/p&gt;

&lt;p&gt;✅ Data Protection&lt;br&gt;
When paired with KMS condition keys or a custom certificate authority (CA), you can enforce that only instances verified through attestation can decrypt or access sensitive data.&lt;br&gt;
This creates a chain of trust from infrastructure to application.&lt;/p&gt;

&lt;p&gt;✅ Operational Excellence &amp;amp; Compliance&lt;br&gt;
For regulated workloads, attestation provides strong evidence that the infrastructure remains compliant and unchanged - a valuable control point during audits and reviews.&lt;/p&gt;

&lt;p&gt;💡 Tips &amp;amp; considerations&lt;br&gt;
Start by integrating attestation into non-critical workloads to validate processes before scaling to business-critical systems.&lt;br&gt;
Treat your AMI creation flow like code: versioning, reproducibility, immutability, code reviews.&lt;br&gt;
Think about your CA/PKI strategy early - issuance, rotation, revocation, and how other systems validate certs.&lt;br&gt;
Monitor and log attestation events (successes/failures) in your security telemetry.&lt;br&gt;
Educate stakeholders (DevOps, security, auditors) on what “attested instance” really means in your context.&lt;/p&gt;

&lt;p&gt;💡 Key Takeaway&lt;/p&gt;

&lt;p&gt;The AWS Well-Architected Security Pillar has always emphasized building a strong foundation of identity, traceability, and protection.&lt;br&gt;
With EC2 Instance Attestation, AWS gives architects and security teams a new tool to prove trust at the compute layer - reinforcing defense-in-depth principles.&lt;/p&gt;

&lt;p&gt;💭 How are you planning to integrate attestation into your Well-Architected workloads?&lt;br&gt;
Would love to hear how teams are aligning this feature with their security pillar strategies.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy88h46qelx2romid24bm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy88h46qelx2romid24bm.png" alt=" " width="667" height="212"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>news</category>
      <category>security</category>
    </item>
    <item>
      <title>Optimizing AWS Lambda Performance: Balancing Power and Cost</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Sun, 28 Dec 2025 22:58:58 +0000</pubDate>
      <link>https://dev.to/morekiranp/optimizing-aws-lambda-performance-balancing-power-and-cost-57k2</link>
      <guid>https://dev.to/morekiranp/optimizing-aws-lambda-performance-balancing-power-and-cost-57k2</guid>
      <description>&lt;p&gt;Over the past week, I ran a series of performance tests to fine-tune an AWS Lambda function’s configuration- focusing on finding the right balance between execution speed and cost efficiency.&lt;/p&gt;

&lt;p&gt;Using AWS Lambda Power Tuning, I tested the function with memory allocations of 128 MB, 256 MB, 512 MB, and 1024 MB. Each configuration was then load-tested using Postman’s Performance Testing feature to simulate concurrent requests and measure throughput, latency, and stability.&lt;/p&gt;

&lt;p&gt;Here’s a summary of the results from the Postman reports:&lt;/p&gt;

&lt;p&gt;128 MB: Slowest response times, with average latency exceeding 1 second under load.&lt;br&gt;
256 MB: Noticeable improvement, but still some lag under higher concurrency.&lt;br&gt;
512 MB: Significant performance boost- average response time dropped to around 505 ms, with throughput of 4.09 requests/sec &lt;br&gt;
1024 MB: Best overall performance - average response time reduced further to 295 ms, and throughput increased to 5.03 requests/sec &lt;br&gt;
All tests completed successfully with 0% error rate, confirming stable performance across configurations.&lt;/p&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;Increasing Lambda memory allocation not only boosts available CPU power but also reduces execution time.&lt;br&gt;
However, higher memory means higher cost per invocation - so the goal is to find the “sweet spot” where performance gains justify the additional expense.&lt;br&gt;
In this case, 512 MB offered a strong balance between speed and cost, while 1024 MB delivered maximum performance for latency-sensitive workloads.&lt;br&gt;
By combining AWS Lambda Power Tuning with Postman Load Testing, it’s possible to make data-driven decisions that optimize both performance and cost efficiency in serverless applications.&lt;/p&gt;

&lt;p&gt;hashtag#AWS hashtag#Serverless hashtag#Lambda hashtag#PerformanceTesting hashtag#Postman hashtag#CloudComputing hashtag#Optimization&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4n86pjg7e264k8wn48vd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4n86pjg7e264k8wn48vd.png" alt=" " width="653" height="842"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3x1mql8ktgssdo1z0uzq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3x1mql8ktgssdo1z0uzq.png" alt=" " width="554" height="791"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd27qq1yx5y3mih2djqv8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd27qq1yx5y3mih2djqv8.png" alt=" " width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>performance</category>
      <category>serverless</category>
    </item>
    <item>
      <title>⚡ The AWS Outage: A Reminder That Resilience Is an Architecture, Not an Assumption ⚡</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Sat, 27 Dec 2025 13:27:17 +0000</pubDate>
      <link>https://dev.to/morekiranp/the-aws-outage-a-reminder-that-resilience-is-an-architecture-not-an-assumption-42ef</link>
      <guid>https://dev.to/morekiranp/the-aws-outage-a-reminder-that-resilience-is-an-architecture-not-an-assumption-42ef</guid>
      <description>&lt;p&gt;The recent AWS outage once again reminded us that even the most resilient cloud providers are not immune to failure. Availability zones, regions, and SLAs are not a substitute for a well-designed Disaster Recovery (DR) strategy -&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fasjg6soq8wmjcn18vmpn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fasjg6soq8wmjcn18vmpn.png" alt=" " width="800" height="335"&gt;&lt;/a&gt; they are only the foundation.&lt;/p&gt;

&lt;p&gt;As architects and technology leaders, we must design for failure by intent, not by reaction.&lt;/p&gt;

&lt;p&gt;Let’s revisit two fundamental metrics that drive every effective DR plan:&lt;/p&gt;

&lt;p&gt;🕒 Recovery Time Objective (RTO) – How long can your systems be down?&lt;br&gt;
If your RTO is 3 hours, your system must be restored and operational within that window. Achieving this often means implementing automated failover and multi-zone or multi-region deployments to reduce manual recovery time and ensure continuity.&lt;/p&gt;

&lt;p&gt;💾 Recovery Point Objective (RPO) – How much data can you afford to lose?&lt;br&gt;
If your RPO is 2 hours, you should be able to restore data to a point not older than two hours before the incident. That requires frequent replication, cross-region backups, and robust data synchronization mechanisms.&lt;/p&gt;

&lt;p&gt;A multi-zone or multi-region architecture plays a pivotal role in achieving low RTOs and RPOs. Spreading workloads across availability zones ensures that even if one zone goes down, your applications continue to serve users from another, minimizing disruption.&lt;/p&gt;

&lt;p&gt;However, architecture alone isn’t enough. The real test of resilience lies in execution.&lt;br&gt;
That’s why regular DR testing is non-negotiable for mission-critical business applications. Simulated failovers, backup restoration drills, and chaos engineering exercises help uncover hidden weaknesses long before a real disaster strikes.&lt;/p&gt;

&lt;p&gt;💡 Key Takeaways:&lt;/p&gt;

&lt;p&gt;Design for failure, not perfection.&lt;/p&gt;

&lt;p&gt;Multi-zone and multi-region deployments are essential, not optional.&lt;/p&gt;

&lt;p&gt;An RTO and RPO are only meaningful if they are tested and achieved consistently.&lt;/p&gt;

&lt;p&gt;Downtime costs far more than investment in proactive resilience.&lt;/p&gt;

&lt;p&gt;Outages will happen — but how quickly you recover and how much you lose is entirely within your control.&lt;/p&gt;

&lt;p&gt;hashtag#CloudArchitecture hashtag#AWS hashtag#DisasterRecovery hashtag#Resilience hashtag#DevOps hashtag#RTO hashtag#RPO hashtag#CloudComputing hashtag#HighAvailability hashtag#MultiRegion hashtag#Observability&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>devops</category>
    </item>
    <item>
      <title>When "Good Enough" isn't enough: Why Netflix moved to Amazon Aurora. 🎬☁️</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Fri, 26 Dec 2025 21:05:32 +0000</pubDate>
      <link>https://dev.to/morekiranp/when-good-enough-isnt-enough-why-netflix-moved-to-amazon-aurora-16m8</link>
      <guid>https://dev.to/morekiranp/when-good-enough-isnt-enough-why-netflix-moved-to-amazon-aurora-16m8</guid>
      <description>&lt;p&gt;I just finished reading the AWS deep dive on how Netflix consolidated their relational database infrastructure on Amazon Aurora.&lt;br&gt;
While the headline is the massive 75% improvement in performance, the real architectural takeaway for me was the strategy of Consolidation.&lt;br&gt;
Netflix didn't just migrate; they simplified. By moving from a fragmented landscape of self-managed and legacy databases to a unified Aurora ecosystem, they achieved:&lt;br&gt;
Reduced Operational Toil: Less time patching and managing varied engines.&lt;br&gt;
Scalability: Leveraging Aurora’s storage auto-scaling to handle "Netflix scale" traffic spikes.&lt;br&gt;
Cost Efficiency: Performance improvements often translate directly to fewer instances required.&lt;br&gt;
For Solution Architects, this is a prime example of how modernizing the data layer isn't just a tech upgrade-it's a business efficiency play.&lt;br&gt;
Read the full case study here: &lt;a href="https://lnkd.in/ek2hGZ6D" rel="noopener noreferrer"&gt;https://lnkd.in/ek2hGZ6D&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;💡 Interview Prep Tip:&lt;br&gt;
Question : WHY Aurora is faster ?&lt;br&gt;
Answer: Aurora is faster because it separates Compute from Storage. It writes to a shared, distributed storage volume across 3 Availability Zones (6 copies of data) without the heavy I/O overhead of traditional synchronous replication. This allows the compute nodes to focus purely on query processing.&lt;/p&gt;

&lt;p&gt;hashtag#AWS hashtag#CloudArchitecture hashtag#Netflix hashtag#AmazonAurora hashtag#Database hashtag#SystemDesign&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>database</category>
      <category>aws</category>
      <category>performance</category>
    </item>
    <item>
      <title>I posted about AWS WAF cost savings, and the AWS Product Team shared a game-changer with me...</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Thu, 25 Dec 2025 15:56:34 +0000</pubDate>
      <link>https://dev.to/morekiranp/i-posted-about-aws-waf-cost-savings-and-the-aws-product-team-shared-a-game-changer-with-me-40f6</link>
      <guid>https://dev.to/morekiranp/i-posted-about-aws-waf-cost-savings-and-the-aws-product-team-shared-a-game-changer-with-me-40f6</guid>
      <description>&lt;p&gt;In my last post, I shared a deep dive into architecting AWS WAF for cost efficiency (using scope-down statements and rule prioritization).&lt;br&gt;
But a Principal Product Manager at AWS reached out with a different perspective-one that solves the biggest headache for Solution Architects and FinOps teams: Predictability.&lt;br&gt;
While technical optimization is crucial, sometimes the business just needs a bill that doesn't fluctuate.&lt;br&gt;
They introduced me to the new CloudFront Flat-Rate Pricing model. If you are managing high-traffic workloads, this is a massive shift.&lt;br&gt;
📦 What’s in the bundle?&lt;br&gt;
Instead of paying for every request and rule, you get a single monthly price that includes:&lt;br&gt;
✅ Amazon CloudFront (Content Delivery)&lt;br&gt;
✅ AWS WAF (Web Application Firewall)&lt;br&gt;
✅ AWS Shield (DDoS Protection)&lt;br&gt;
✅ Bot Control (Common Bot Rules)&lt;br&gt;
✅ Route 53 &amp;amp; CloudWatch Logs&lt;br&gt;
✅ S3 Storage Credits&lt;br&gt;
💡 The Hidden Gem:&lt;br&gt;
It waives the costs for regional data transfer to CloudFront. If you’ve ever looked at your "Data Transfer" line item, you know how huge that saving is.&lt;br&gt;
The takeaway:&lt;br&gt;
My previous post helps you reduce the bill. This new model helps you fix the bill.&lt;br&gt;
The cloud is always evolving. Huge thanks to the AWS team for sharing this resource!&lt;/p&gt;

&lt;p&gt;Link to the full breakdown : &lt;a href="https://lnkd.in/eAgX5q9n" rel="noopener noreferrer"&gt;https://lnkd.in/eAgX5q9n&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Huge thanks to Cristian Graziano for pointing this out.&lt;/p&gt;

&lt;p&gt;hashtag#AWS hashtag#CloudFront hashtag#FinOps hashtag#AWSCommunity hashtag#SolutionArchitect hashtag#CloudSecurity&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Stop Overpaying for AWS WAF! (5 Cost Optimization Tips)</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Wed, 24 Dec 2025 20:56:18 +0000</pubDate>
      <link>https://dev.to/morekiranp/stop-overpaying-for-aws-waf-5-cost-optimization-tips-23m7</link>
      <guid>https://dev.to/morekiranp/stop-overpaying-for-aws-waf-5-cost-optimization-tips-23m7</guid>
      <description>&lt;p&gt;As a Solution Architect, I was deep diving into the cost saving of AWS WAF, and I realized we were burning money on "noise."&lt;/p&gt;

&lt;p&gt;Are you looking at the Cost Optimization pillar of the AWS Well-Architected Framework? Don't overlook your Web Application Firewall.&lt;br&gt;
WAF costs can spiral if you treat it as a "set and forget" service. Here is how to align AWS WAF with cost-efficiency best practices:&lt;br&gt;
1️⃣ Use "Scope-Down" Statements 📉&lt;br&gt;
Don't run expensive rules (like Bot Control or Regex patterns) on every single request. Use scope-down statements to only inspect specific paths (like /login or /checkout). This massive reduction in inspected traffic directly lowers your bill.&lt;br&gt;
2️⃣ Optimize Rule Order 🔢&lt;br&gt;
AWS WAF evaluates rules in priority order.Place your "cheap" and high-volume block rules (like IP rate limits or Geo-blocking) at the top. Block the noise early so you don't pay for expensive rule evaluations on junk traffic.[3]&lt;br&gt;
3️⃣ Leverage AWS Shield Advanced 🛡️&lt;br&gt;
If your monthly WAF + Data Transfer bill is high (typically &amp;gt;$3k/mo), switch to AWS Shield Advanced.[4][5] It creates a flat-fee model and waives standard WAF WebACL and Rule fees for protected resources.&lt;br&gt;
4️⃣ Smart Logging 📝&lt;br&gt;
Logging every single request to CloudWatch Logs gets expensive fast.&lt;br&gt;
✅ Use Kinesis Data Firehose for high-volume logs (cheaper ingestion).&lt;br&gt;
✅ Filter logs to only capture "Blocked" requests or specific rule matches to reduce storage costs.&lt;br&gt;
5️⃣ Separation of Concerns 🏗️&lt;br&gt;
Don't put WAF on static assets (images, CSS) unless absolutely necessary. Route static traffic through a separate CloudFront behavior that doesn’t invoke the WAF, or use WAF rules to explicitly ignore those file extensions.&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Review your "Unused Rules" quarterly. If a rule hasn't triggered in 90 days, it's just costing you monthly rental fees. Delete it!&lt;br&gt;
hashtag#AWS hashtag#CloudSecurity hashtag#CostOptimization hashtag#FinOps hashtag#AWSCommunity hashtag#CyberSecurity hashtag#WellArchitected&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fixq1a7qcxuus0t5uim7i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fixq1a7qcxuus0t5uim7i.png" alt=" " width="800" height="493"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3tmg35v8oa2x8n749qol.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3tmg35v8oa2x8n749qol.png" alt=" " width="800" height="279"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbd26reg9e9930zqcge0b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbd26reg9e9930zqcge0b.png" alt=" " width="800" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>security</category>
    </item>
    <item>
      <title>Reliability isn’t about avoiding failure; it’s about how fast you recover. ☁️</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Mon, 22 Dec 2025 22:04:37 +0000</pubDate>
      <link>https://dev.to/morekiranp/reliability-isnt-about-avoiding-failure-its-about-how-fast-you-recover-3o94</link>
      <guid>https://dev.to/morekiranp/reliability-isnt-about-avoiding-failure-its-about-how-fast-you-recover-3o94</guid>
      <description>&lt;p&gt;I’ve been diving deep into the Reliability Pillar of the AWS Well-Architected Framework, specifically focusing on the “Self-Healing” capabilities of distributed systems.&lt;br&gt;
The real magic happens when you couple Application Load Balancer (ALB) health checks with Auto Scaling Groups (ASG).&lt;br&gt;
In the configuration below, I’ve set up a robust detection mechanism:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Granular Detection: Using a specific port override (8080) to check the application process, not just the server status.&lt;/li&gt;
&lt;li&gt;Fast Isolation: With an Unhealthy Threshold of 2, the ALB stops routing traffic to a failing node almost immediately (within ~1 minute given the interval).&lt;/li&gt;
&lt;li&gt;Conservative Recovery: A Healthy Threshold of 5 ensures the new instance is absolutely ready before receiving live traffic, preventing “flapping.”
The result? The ALB isolates the fault, and the ASG automatically replaces the instance. Zero human intervention required.
How do you tune your health check intervals for high-traffic apps?
hashtag#AWS hashtag#SolutionArchitect hashtag#CloudComputing hashtag#DevOps hashtag#Reliability hashtag#WellArchitected
&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5owgfeeus6teqehiwu0x.png" alt=" " width="727" height="440"&gt;
&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1t6t32i9yxa9v6fim7xh.jpg" alt=" " width="787" height="818"&gt;
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>devops</category>
    </item>
    <item>
      <title>IAM Roles, Temporary Credentials &amp; Alerting - AWS Well-Architected Framework (Security Pillar)</title>
      <dc:creator>Kiran More</dc:creator>
      <pubDate>Thu, 18 Dec 2025 21:32:57 +0000</pubDate>
      <link>https://dev.to/morekiranp/iam-roles-temporary-credentials-alerting-aws-well-architected-framework-security-pillar-3afo</link>
      <guid>https://dev.to/morekiranp/iam-roles-temporary-credentials-alerting-aws-well-architected-framework-security-pillar-3afo</guid>
      <description>&lt;p&gt;I recently deep dived on IAM roles, temporary credentials, and proactive alerting through the lens of the AWS Well-Architected Framework - Security Pillar, focusing on how identity, monitoring, and protection work together to reduce risk.&lt;br&gt;
🚀 What I explored:&lt;br&gt;
✅ Strong identity foundations (IAM Roles)&lt;br&gt;
 Designed a least-privilege IAM role for an EC2-based application, granting read-only access to S3 and eliminating long-term static credentials.&lt;br&gt;
✅ Short-lived access with AWS STS&lt;br&gt;
 Used AWS Security Token Service (STS) to assume roles and generate temporary credentials, significantly reducing credential exposure and blast radius.&lt;br&gt;
✅ Explicit trust relationships&lt;br&gt;
 Defined precise trust policies to control who can assume roles-ensuring access is intentional, secure, and auditable.&lt;br&gt;
✅ Continuous monitoring &amp;amp; alerting&lt;br&gt;
 Configured CloudWatch alarms backed by AWS Config metrics to detect IAM user creation, modification, or deletion in near real time.&lt;/p&gt;

&lt;p&gt;IAM &amp;amp; least privilege → Strong identity controls&lt;br&gt;
STS temporary credentials → Reduced blast radius&lt;br&gt;
CloudWatch &amp;amp; AWS Config → Detection and response&lt;br&gt;
Together, these practices form a well-architected, security-first cloud foundation.&lt;br&gt;
🔑 Key takeaway:&lt;br&gt;
Security starts with identity. Short-lived credentials, least privilege, and real-time alerting are core principles of the AWS Well-Architected Security Pillar.&lt;br&gt;
hashtag#AWSWellArchitected hashtag#SecurityPillar hashtag#IAM hashtag#STS hashtag#CloudSecurity&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7177j83n3qu5gw5jttbw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7177j83n3qu5gw5jttbw.jpg" alt=" " width="701" height="492"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>security</category>
    </item>
  </channel>
</rss>
