<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Osman</title>
    <description>The latest articles on DEV Community by Osman (@rachcorp).</description>
    <link>https://dev.to/rachcorp</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F668327%2Febda2435-5bed-4ad9-9901-30b67bd6b10a.png</url>
      <title>DEV Community: Osman</title>
      <link>https://dev.to/rachcorp</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rachcorp"/>
    <language>en</language>
    <item>
      <title>You Need Context for Cloud Governance. Not Tagging</title>
      <dc:creator>Osman</dc:creator>
      <pubDate>Fri, 10 Apr 2026 04:12:32 +0000</pubDate>
      <link>https://dev.to/rachcorp/you-need-context-for-cloud-governance-not-tagging-45k8</link>
      <guid>https://dev.to/rachcorp/you-need-context-for-cloud-governance-not-tagging-45k8</guid>
      <description>&lt;p&gt;There is the cloud environment you think you have: the pristine, perfectly organized architecture living in your Terraform repository.&lt;/p&gt;

&lt;p&gt;And then there is the cloud environment you actually have.&lt;/p&gt;

&lt;p&gt;The real world situation  is usually a tangled web of undocumented Lambda functions, orphaned staging environments, and untagged EC2 instances. When leadership asks, "What exactly is running in our cloud right now?", very few teams can give a confident, accurate answer.&lt;/p&gt;

&lt;p&gt;This is the workload discovery problem. Until you solve it and map the reality of your infrastructure, everything downstream from cost optimization, compliance, security posture, to incident response is built on guesswork.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Infrastructure Sprawl Problem
&lt;/h3&gt;

&lt;p&gt;Cloud environments grow organically. A dev spins up an EC2 instance for a quick test. A contractor deploys a Lambda function that nobody documents. An old staging environment keeps running because nobody remembers who owns it or what depends on it.&lt;/p&gt;

&lt;p&gt;Six months later, your AWS account has 340 resources across 12 services, and the only person who understood the full topology left the company in January.&lt;/p&gt;

&lt;p&gt;This is common. In our experience working with cloud platform teams, most organizations discover 20-30% more running resources than they expected once they actually run a comprehensive discovery audit. Those are resources consuming budget, expanding attack surface, and living entirely outside your governance model.&lt;/p&gt;

&lt;p&gt;The challenge compounds in 2026 because infrastructure has evolved far beyond standard web apps. We are now in the era of AI sprawl. Today, a single generative AI workload might string together managed LLM endpoints (like Amazon Bedrock), incredibly expensive GPU instances, vector databases for RAG, S3 buckets full of unstructured training data, Lambda functions for inference routing, and the complex IAM roles tying them all together. Developers are spinning up experimental AI pipelines at record speed, and often leaving them running. Understanding what constitutes a modern "workload" and mapping this complex dependency chain requires far more than a flat resource list. It requires context.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Spreadsheets and CMDBs Fall Short
&lt;/h2&gt;

&lt;p&gt;The traditional answer is a CMDB (Configuration Management Database) or, more commonly for smaller teams, a spreadsheet. Both share the same flaw: they are static artifacts in a dynamic environment.&lt;/p&gt;

&lt;p&gt;A spreadsheet captures a snapshot of what someone &lt;em&gt;thought&lt;/em&gt; was running when they filled it in. By the next sprint, it is already drifting from reality. Resources get created, modified, or deleted. Unless someone manually updates the sheet (and they rarely do), the gap between documented state and actual state widens every day.&lt;/p&gt;

&lt;p&gt;CMDBs are better in theory, but they create a different burden in practice: maintenance overhead. The tooling exists to auto-populate them, but configuring and maintaining those integrations becomes yet another ops task for a team that is already stretched thin. For a 15-person engineering team with no dedicated IT operations, a CMDB is overhead that rarely pays for itself.&lt;/p&gt;

&lt;p&gt;Both approaches also miss the relationship layer. Knowing you have an EC2 instance is marginally useful. Knowing that the instance runs your payment processing service, depends on a specific RDS cluster, sits behind an ALB, and is only accessible through a particular security group: that's what you actually need when something breaks at 2am.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Trap of "Asset Discovery"
&lt;/h2&gt;

&lt;p&gt;When teams realize their spreadsheets and CMDBs are failing, they usually buy an automated "Asset Discovery" scanner. This solves the visibility problem, but it still fails to answer then next basic question: "How are these assets interconnected logically and physically?" &lt;/p&gt;

&lt;p&gt;Asset discovery gives you a flat list of parts. It tells you that you have 400 EC2 instances, 50 S3 buckets, and 120 Lambda functions.&lt;/p&gt;

&lt;p&gt;But a list of car parts is still not a car.&lt;/p&gt;

&lt;p&gt;An isolated list of assets is useless when you are trying to figure out why the "Checkout Application" is throwing 500 errors or why your production AWS bill jumped by $5,000.&lt;/p&gt;

&lt;p&gt;You don't need a cloud asset inventory; you need &lt;strong&gt;workload discovery&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Asset discovery tells you what is there. Workload discovery maps the relationships between them. It looks at network traffic, IAM roles, and configuration data to prove that EC2 Instance A connects to RDS Database B, and together, they form the Checkout Application.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Good Workload Discovery Actually Looks Like
&lt;/h2&gt;

&lt;p&gt;Effective workload discovery builds a living, queryable map of your cloud environment that answers three questions continuously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What exists?&lt;/strong&gt; Every resource, across every service, in every region. Compute, storage, networking, identity, databases, serverless functions, managed services. The full picture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What belongs together?&lt;/strong&gt; Resources rarely exist in isolation. A "workload" is a logical grouping: the collection of resources that together deliver a business capability. Your checkout service is a set of instances, a load balancer, a database, a cache layer, DNS entries, SSL certificates, and the IAM policies that tie them together. Discovery needs to surface these relationships automatically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus: It should automatically draw the architecture diagram for you.&lt;/strong&gt; A true workload discovery tool translates those mapped relationships into an interactive, auto-updating architecture diagram. When the environment changes, the diagram updates with it. No manual drawing will keep up because it will be obsolete in no time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's the current state?&lt;/strong&gt; The state right now, today. Configuration drift, resource changes, new deployments, decommissioned services. A workload map that is stale is dangerous to rely on for your security posture management.&lt;/p&gt;

&lt;p&gt;When these three questions are answered reliably, everything else gets easier. Cost attribution becomes possible because you know which resources belong to which service. Security reviews become meaningful because you can scope them to actual workload boundaries. Compliance audits move from weeks-long archaeology projects to queries you run on demand.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Downstream Payoff: Why Discovery Comes First
&lt;/h2&gt;

&lt;p&gt;Seasoned cloud architects insist on workload discovery before any optimization or security initiative. The reason is straightforward: every subsequent effort depends on complete data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost optimization depends on discovery.&lt;/strong&gt; You can spot an oversized instance, sure. But you can't attribute costs to business units or services if you don't know what those services actually are. Worse, you might terminate a "wasteful" resource that turns out to be a critical dependency for a workload nobody cataloged. Teams that run discovery first routinely find that 20-35% of their cloud spend is tied to resources that are orphaned, oversized, or duplicated. You can only act on that finding safely when you have workload context.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security depends on discovery.&lt;/strong&gt; You can run vulnerability scans all day, but if you're scanning an incomplete inventory, you're protecting an incomplete perimeter. Shadow resources (the ones nobody documented) are exactly where misconfigurations live longest, because they're invisible to your security tooling. An open security group you know about is a risk you can manage. An open security group you don't know about is a breach waiting to happen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance depends on discovery.&lt;/strong&gt; Auditors ask "show me all resources handling PII" or "which systems are in scope for SOC 2." If your answer starts with "well, we think..." you've already failed the audit in spirit, even if you manage to pass on paper. Real compliance starts with a complete, accurate inventory of what's in scope, kept current automatically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Incident response depends on discovery.&lt;/strong&gt; When something breaks, the first question is always "what's affected?" If answering that takes 30 minutes of console-clicking and Slack-channel archaeology, your MTTR (Mean Time to Recovery) has a floor that no runbook optimization will fix. Teams with automated workload discovery and dependency mapping answer "what's in the blast radius" in seconds.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tags Were Supposed to Fix This. They Didn't.
&lt;/h2&gt;

&lt;p&gt;In theory, consistent tagging gives you cost attribution, ownership tracking, environment classification, and compliance scoping. In practice, tagging policies are defined once, followed for two months, and then gradually abandoned as teams move fast and skip the metadata step.&lt;/p&gt;

&lt;p&gt;The result is a partially tagged environment, and that's worse than an untagged one because it creates false confidence. You filter by &lt;code&gt;environment:production&lt;/code&gt; and see 40 resources. But there are actually 67 production resources. Twenty-seven of them were never tagged correctly. Your "production inventory" is 40% incomplete, and you're making security and cost decisions based on it.&lt;/p&gt;

&lt;p&gt;Automated workload discovery sidesteps this by inferring relationships from actual infrastructure state: network connections, IAM policies, resource dependencies. Tags remain valuable as a supplementary signal, but they stop being the single point of truth your entire governance model rests on.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Changes When You Get This Right
&lt;/h2&gt;

&lt;p&gt;Teams that implement continuous, automated workload discovery tend to see the same set of outcomes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Onboarding goes from weeks to hours.&lt;/strong&gt; A new engineer can query the workload map and understand the environment in an afternoon instead of spending their first two weeks asking "who owns this?" in Slack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud reviews become proactive.&lt;/strong&gt; Instead of waiting for the quarterly cost review or the annual audit, teams can continuously monitor for drift, waste, and misconfiguration. Problems surface when they're small and cheap to fix.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ownership becomes clear.&lt;/strong&gt; When every resource is mapped to a workload and every workload has an owner, the "who's responsible for this?" question has an answer. That alone eliminates a surprising amount of operational friction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Decommissioning becomes safe.&lt;/strong&gt; The reason old resources linger is fear. Nobody deletes something when they're unsure what depends on it. A dependency map makes decommissioning decisions data-driven instead of prayer-driven.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Take Away: Discovery Is a Forcing Function
&lt;/h2&gt;

&lt;p&gt;Here's what remains true: the act of discovering and cataloging your infrastructure forces organizational clarity that has value far beyond the inventory itself.&lt;/p&gt;

&lt;p&gt;When you map workloads, you surface questions that teams have been avoiding. Who owns this service? Is this still in use? Why are we running two copies of the same thing? What's our actual production footprint versus what we think it is?&lt;/p&gt;

&lt;p&gt;These are questions a growing company &lt;em&gt;should&lt;/em&gt; answer regularly but rarely does until forced. A surprise bill or a failed audit forces them reactively. Workload discovery forces them proactively, and on your timeline.&lt;/p&gt;

&lt;p&gt;For regulated companies in fintech or healthtech, this is especially powerful. The discovery output doubles as audit evidence. A continuously maintained workload inventory with dependency mapping is exactly what auditors want to see when they ask about your asset management controls.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;CloudAgent's Discover Workloads feature automates this entire process.&lt;/strong&gt; Connect your AWS account, and within minutes you have a living catalog of every workload, its dependencies, its cost footprint, and its security posture, all kept current automatically. No tagging prerequisites. No spreadsheet maintenance. No CMDB configuration. It's the foundation that makes everything else (cost optimization, compliance, security) actually reliable.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://cloudagent.io?utm_source=blog&amp;amp;utm_medium=content&amp;amp;utm_campaign=workload-discovery" rel="noopener noreferrer"&gt;Try it free at cloudagent.io →&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;CloudAgent provides autonomous agents to run your cloud, handling security, compliance, and infrastructure with governance built in. &lt;a href="https://cloudagent.io" rel="noopener noreferrer"&gt;Learn more →&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>aws</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
    <item>
      <title>Meet CloudAdvisor – The first Virtual AWS Assistant</title>
      <dc:creator>Osman</dc:creator>
      <pubDate>Fri, 11 Aug 2023 17:00:33 +0000</pubDate>
      <link>https://dev.to/rachcorp/meet-cloudadvisor-the-first-virtual-aws-assistant-1d3g</link>
      <guid>https://dev.to/rachcorp/meet-cloudadvisor-the-first-virtual-aws-assistant-1d3g</guid>
      <description>&lt;p&gt;Ever found yourself lost in the AWS documentation or clicking through multiple Google search results, looking for something that shouldn't take time?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--R7iIrFz0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2l5orgfi3kxczx7vqkxr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--R7iIrFz0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2l5orgfi3kxczx7vqkxr.jpg" alt="Don't get lost in AWS documention, use CloudAdvisor by ASecureCloud" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, ASecureCloud has built &lt;a href="https://asecure.cloud/ai-cloudadvisor/"&gt;CloudAdvisor&lt;/a&gt;, a chatbot you can use to interact with AWS directly and save time!&lt;br&gt;
But what can it do for you and how is different from things like ChatGPT? Let's dive right in!&lt;/p&gt;

&lt;h2&gt;
  
  
  Get to the answer straight – You know what you want !
&lt;/h2&gt;

&lt;p&gt;Whether you're a seasoned cloud architect wanting a refresher or a newbie taking your first steps into the AWS cloud, sometimes you j ust want to extract key details without having to search through lengthy documentations.&lt;/p&gt;

&lt;p&gt;Suppose you would like to explore AWS RDS capabilities for an upcoming project and would like to . Just ask CloudAdvisor, "What should i know about RDS?" The bot will respond with a complete, concise, user-friendly explanation, directly sourced from the official AWS documentation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--V0v6tyBi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jvg9vxt1eha8k17h4ldv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--V0v6tyBi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jvg9vxt1eha8k17h4ldv.png" alt="CloudAdvisor output of should i know about RDS" width="800" height="1011"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Notice how it provided a definition for the acronym as well as other importants considerations with respect to security, monitoring, High availability etc... without any further context. There lies the power of fine-tuned models 😎&lt;/p&gt;

&lt;p&gt;Naturally, you may have follow-up questions or just want to verify the information provided with the AWS documentation directly.&lt;/p&gt;

&lt;p&gt;Ask further questions here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jWNvj_Eq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yoiz9mo3g5hu4uf2okfv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jWNvj_Eq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yoiz9mo3g5hu4uf2okfv.png" alt="Ask questions and follow ups in simple English" width="800" height="70"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Every answer comes with a source citation, ensuring the information's credibility and allowing quick and easy verification. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8VS_u2hu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1gsn80m2tj85htoa99oc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8VS_u2hu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1gsn80m2tj85htoa99oc.png" alt="Showing links to sources used to generate the answer" width="800" height="590"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Troubleshooting – Simplified and Streamlined
&lt;/h2&gt;

&lt;p&gt;How many times have you stumbled upon an error message while working with AWS services, and wished you had someone to bounce ideas off by your side? CloudAdvisor is that expert!&lt;/p&gt;

&lt;p&gt;CloudAdvisor provides instant help to troubleshoot common issues that you might encounter. For instance, if you're getting an 'Access Denied' error when trying to access your S3 bucket, you can simply ask CloudAdvisor, "I am getting an 'Access Denied' error when trying to access my S3 bucket. What should I do?" CloudAdvisor will pull the solution directly from trusted AWS troubleshooting guides and provide you a step-by-step resolution method. &lt;/p&gt;

&lt;p&gt;This AI-powered chatbot doesn't just spit out the resolution; it simplifies and humanizes the interaction, making complex troubleshooting feel like a conversation with a friend. &lt;/p&gt;

&lt;h2&gt;
  
  
  How is this different from chatGPT
&lt;/h2&gt;

&lt;p&gt;CloudAdvisor has been fine-tuned with official documentation and expert hand-curated sources only. You can rest assured that the answer does not come from a random reddit post!&lt;br&gt;
Both the input query and output are sanitized to ensure that no sensitive information is leaked to the chatbot but also that only safe results are displayed.&lt;br&gt;
It has also undergone extensive testing and validation to constrain the output to high-quality, high-confidence answers only.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Future is Now
&lt;/h2&gt;

&lt;p&gt;While we've touched upon a few capabilities of CloudAdvisor, this is just the tip of the iceberg!&lt;br&gt;
With CloudAdvisor, you can connect your cloud account(s) and interact with it in natural language. You can ask questions like "Show me public resources in my account"&lt;br&gt;
You can also get code assistance for building new cloud environment by just prompting it in English... &lt;/p&gt;

&lt;p&gt;In the forthcoming blog posts, I will unravel more exciting features of CloudAdvisor, helping you unlock new levels of productivity and efficiency in your cloud operations. Stay tuned to learn more, and until then, please share your experience and feedback below.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
