<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Raghu Reddy</title>
    <description>The latest articles on DEV Community by Raghu Reddy (@raghureddycloud).</description>
    <link>https://dev.to/raghureddycloud</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1189677%2Fce47ce81-071d-432c-a531-c68ec0bf8985.png</url>
      <title>DEV Community: Raghu Reddy</title>
      <link>https://dev.to/raghureddycloud</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/raghureddycloud"/>
    <language>en</language>
    <item>
      <title>AWS Security Hub in Action: Expert Strategies for Threat Detection and Compliance</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Tue, 30 Sep 2025 13:14:57 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/aws-security-hub-in-action-expert-strategies-for-threat-detection-and-compliance-215k</link>
      <guid>https://dev.to/raghureddycloud/aws-security-hub-in-action-expert-strategies-for-threat-detection-and-compliance-215k</guid>
      <description>

</description>
    </item>
    <item>
      <title>Beyond Static Secrets: Automating Kubernetes Secret Management with AWS Secrets Manager and External Secrets Operator</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Thu, 04 Sep 2025 06:08:20 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/beyond-static-secrets-automating-kubernetes-secret-management-with-aws-secrets-manager-and-pn9</link>
      <guid>https://dev.to/raghureddycloud/beyond-static-secrets-automating-kubernetes-secret-management-with-aws-secrets-manager-and-pn9</guid>
      <description>

</description>
    </item>
    <item>
      <title>Amazon VPC now supports idempotency for route table and network ACL creation</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Mon, 29 Jan 2024 14:30:50 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/amazon-vpc-now-supports-idempotency-for-route-table-and-network-acl-creation-3p0n</link>
      <guid>https://dev.to/raghureddycloud/amazon-vpc-now-supports-idempotency-for-route-table-and-network-acl-creation-3p0n</guid>
      <description>&lt;p&gt;Amazon VPC now supports idempotent creation of route tables and network ACLs, allowing you to safely retry creation without additional side effects. Idempotent creation of route tables and network ACLs is intended for customers that use network orchestration systems or automation scripts that create route tables and network ACLs as part of a workflow.&lt;/p&gt;

&lt;p&gt;By adding a client token, you can now ensure that only one route table is created as part of the CreateRouteTable API request, or only one network ACL is created as part of the CreateNetworkAcl API request. With an idempotent request, once a resource is successfully created, any subsequent retries using the same client token will not create any additional resources. You can now build retry mechanisms into your creation workflow and avoid duplicate entries in an event of timeouts or server issues. &lt;/p&gt;

&lt;p&gt;This feature is available in all AWS commercial and the AWS GovCloud (US) Regions. To get started with making idempotent API calls for CreateRouteTable and CreateNetworkACL you can visit the &lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Run_Instance_Idempotency.html"&gt;documentation page&lt;/a&gt; and &lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Welcome.html"&gt;API reference page&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Hashicorp support for this feature - &lt;a href="https://lnkd.in/gPakJwGW"&gt;https://lnkd.in/gPakJwGW&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Securing Digital Frontiers: An In-Depth Analysis of AWS WAF</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Wed, 03 Jan 2024 05:38:03 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/securing-digital-frontiers-an-in-depth-analysis-of-aws-waf-3dkh</link>
      <guid>https://dev.to/raghureddycloud/securing-digital-frontiers-an-in-depth-analysis-of-aws-waf-3dkh</guid>
      <description>&lt;h2&gt;
  
  
  What is AWS WAF
&lt;/h2&gt;

&lt;p&gt;AWS WAF is a web application firewall that lets you monitor the HTTP(S) requests that are forwarded to your protected web application resources and Protect your web applications from common exploits. AWS WAF helps you protect against common web exploits and bots that can affect availability, compromise security, or consume excessive resources.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LcBP2Xzb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k5ijkk64tgy81ojbnefn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LcBP2Xzb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k5ijkk64tgy81ojbnefn.png" alt="AWS WAF" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How AWS WAF Works
&lt;/h2&gt;

&lt;p&gt;You use AWS WAF to control how your protected resources respond to HTTP(S) web requests. You do this by defining a web access control list (ACL) and then associating it with one or more web application resources that you want to protect. The associated resources forward incoming requests to AWS WAF for inspection by the web ACL.&lt;/p&gt;

&lt;p&gt;In your web ACL, you create rules to define traffic patterns to look for in requests and to specify the actions to take on matching requests. The action choices include the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Allow the requests to go to the protected resource for processing and response.&lt;/li&gt;
&lt;li&gt;Block the requests.&lt;/li&gt;
&lt;li&gt;Count the requests.&lt;/li&gt;
&lt;li&gt;Run CAPTCHA or challenge checks against requests to verify human users and standard browser use.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  AWS WAF Components
&lt;/h3&gt;

&lt;p&gt;The following are the central components of AWS WAF:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Web ACLs – You use a web access control list (ACL) to protect a set of AWS resources. You create a web ACL and define its protection strategy by adding rules. Rules define criteria for inspecting web requests and they specify the action to take on requests that match their criteria. You also set a default action for the web ACL that indicates whether to block or allow through any requests that the rules haven't already blocked or allowed. For more information about web ACLs, see Web access control lists (web ACLs).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A web ACL is an AWS WAF resource.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rules – Each rule contains a statement that defines the inspection criteria, and an action to take if a web request meets the criteria. When a web request meets the criteria, that's a match. You can configure rules to block matching requests, allow them through, count them, or run bot controls against them that use CAPTCHA puzzles or silent client browser challenges. For more information about rules, see &lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html"&gt;AWS WAF rules&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A rule is not an AWS WAF resource. It only exists in the context of a web ACL or rule group.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule groups – You can define rules directly inside a web ACL or in reusable rule groups. AWS Managed Rules and AWS Marketplace sellers provide managed rule groups for your use. You can also define your own rule groups. For more information about rule groups, see &lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-groups.html"&gt;Rule groups&lt;/a&gt;.
A rule group is an AWS WAF resource.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Implementing AWS WAF
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Create a WEB ACL
&lt;/h3&gt;

&lt;p&gt;Open WAF service and click on "Create WEB ACL" &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GT_odXqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l105764h1jk3euancg97.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GT_odXqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l105764h1jk3euancg97.png" alt="Image description" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Start filling the details and select the Amazon Cloud front distributions and then select the AWS Resources option.  I have already created cloud front for the demo. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MLDmrFGK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eg1n2dp6jdifu8hckd1k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MLDmrFGK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eg1n2dp6jdifu8hckd1k.png" alt="Image description" width="782" height="849"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Select the Cloud front from the list and click on Add.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_l6U700Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/45n6zoaikosaxwze3459.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_l6U700Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/45n6zoaikosaxwze3459.png" alt="Image description" width="621" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on Next, we will add Rules later.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kntrBAyS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/75ts6hr6qs6m1ess5hr0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kntrBAyS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/75ts6hr6qs6m1ess5hr0.png" alt="Image description" width="776" height="762"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on Next, Will also configure rule priority later. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eoIpgMhB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rojoi49b253rnt5rlf05.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eoIpgMhB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rojoi49b253rnt5rlf05.png" alt="Image description" width="763" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We don't want metrics, will select disable option and proceed with next&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--T3y0ttXe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sh56hc839jhx95uoabfu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--T3y0ttXe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sh56hc839jhx95uoabfu.png" alt="Image description" width="775" height="494"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The final page is for review, at the end of the page select "Create WEB ACL". &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fOpQt3kU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rke42nup8oqj75lh4lhz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fOpQt3kU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rke42nup8oqj75lh4lhz.png" alt="Image description" width="651" height="147"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Add IP with in IP Sets to block IPs
&lt;/h3&gt;

&lt;p&gt;Select IP Set section &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jHn3maa_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4n4d44452xd8ydlz0zec.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jHn3maa_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4n4d44452xd8ydlz0zec.png" alt="Image description" width="800" height="156"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Provide IP Set name and the IP addresses in CIDR format per line&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--okT5UQXZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nn5dkiet8jjygt7216wh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--okT5UQXZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nn5dkiet8jjygt7216wh.png" alt="Image description" width="800" height="827"&gt;&lt;/a&gt;&lt;br&gt;
This will create a rule set kind of database which we will use to either allow or block traffic. &lt;/p&gt;

&lt;h3&gt;
  
  
  Create Rule Group
&lt;/h3&gt;

&lt;p&gt;Select Rule groups and click on "Create Rule Group". &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Gah0migh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u4u3kznmw8ow0ra0a3gh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Gah0migh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u4u3kznmw8ow0ra0a3gh.png" alt="Image description" width="800" height="226"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the following page we need to name the Rule group and click on next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---110Qa6f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5xlydlwsnim34imaw37.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---110Qa6f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5xlydlwsnim34imaw37.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on Add rule&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FNkv40Pk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/91k4nspsp0ptlgzq8gkh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FNkv40Pk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/91k4nspsp0ptlgzq8gkh.png" alt="Image description" width="800" height="522"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the following section(below image) we will be adding the actual rule to either allow, block, count, CAPTHA or challenge. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We are basically creating &lt;br&gt;
regular rule to &lt;br&gt;
&lt;strong&gt;match&lt;/strong&gt; the statement and &lt;br&gt;
if the IP &lt;strong&gt;originates&lt;/strong&gt; &lt;br&gt;
from any of the IP from the &lt;strong&gt;BlacklistedIps IP Set&lt;/strong&gt; &lt;br&gt;
then take Action to &lt;strong&gt;block&lt;/strong&gt;. &lt;br&gt;
Click on Add rule to proceed &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4yxIUrgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/72y1yc0gqb3d21e0kx8e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4yxIUrgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/72y1yc0gqb3d21e0kx8e.png" alt="Image description" width="588" height="791"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will select the rule and click on Next keeping default values.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iRW_vUhP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/30ddpglazlvpf1r08vhl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iRW_vUhP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/30ddpglazlvpf1r08vhl.png" alt="Image description" width="800" height="498"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Since we have only one rule we will simply select the rule and click on Next. If you have multiple rule you can set/manage the rule priority here.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9SEZYpw7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5cle7ffrq8p8r77epfzv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9SEZYpw7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5cle7ffrq8p8r77epfzv.png" alt="Image description" width="800" height="297"&gt;&lt;/a&gt;&lt;br&gt;
Review the steps and click on create rule group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PJsnZhRv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ytezbwjoy8d65y4ncr5e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PJsnZhRv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ytezbwjoy8d65y4ncr5e.png" alt="Image description" width="800" height="549"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So far we have created &lt;strong&gt;IP Set&lt;/strong&gt; - kind of database&lt;/li&gt;
&lt;li&gt;Created &lt;strong&gt;Ruleset&lt;/strong&gt; - what to do and when to do &lt;/li&gt;
&lt;li&gt;and now it is time to &lt;strong&gt;attach this rule&lt;/strong&gt; to the WAF &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Attach rule to WAF
&lt;/h3&gt;

&lt;p&gt;Select the WAF from the dashboard.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8opT_Ott--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rfsfygj24g9zd07ut0jn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8opT_Ott--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rfsfygj24g9zd07ut0jn.png" alt="Image description" width="800" height="570"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click on rule section. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kSrvbZjD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lus81dbcgn11iypbwjld.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kSrvbZjD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lus81dbcgn11iypbwjld.png" alt="Image description" width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will add the rule group that we have already created. Select &lt;strong&gt;"Add my own rules and rule groups"&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VOmEacdx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sggman97c5dhuxnxhxar.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VOmEacdx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sggman97c5dhuxnxhxar.png" alt="Image description" width="800" height="211"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We have different rule types, You can play around the rule type as per your requirements.  For the demo we will go with Rule group, since we already have created one. &lt;br&gt;
Select the Rule group and click on Add rule.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CWYuMU4k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3meslrlk3m8fhw7kxf4f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CWYuMU4k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3meslrlk3m8fhw7kxf4f.png" alt="Image description" width="800" height="734"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Time to test
&lt;/h3&gt;

&lt;p&gt;Go the Web URL or the Cloudfront distrubution domain name to access the site. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZLftGv6Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6oogsk0jb8fto4wne3cr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZLftGv6Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6oogsk0jb8fto4wne3cr.png" alt="Image description" width="800" height="455"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You will get 403: Error and showing request is blocked. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ywz6fwCv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i0ycrrmwv7h0g22g23cx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ywz6fwCv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i0ycrrmwv7h0g22g23cx.png" alt="Image description" width="626" height="221"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Use Cases
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Web Application Protection&lt;/strong&gt;: AWS WAF helps protect web applications from common web exploits, such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Bot Management&lt;/strong&gt;: AWS WAF can be used to detect and block malicious bots, preventing them from causing harm or consuming excessive resources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Content Filtering&lt;/strong&gt;: AWS WAF allows you to control the content that users can access on your web applications by filtering out unwanted or malicious content.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Rate Limiting&lt;/strong&gt;: AWS WAF enables you to set rate-based rules to limit the number of requests from specific IP addresses or user agents, protecting against brute force attacks or excessive traffic.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Compliance and Regulatory Requirements&lt;/strong&gt;: AWS WAF helps meet compliance requirements by providing protection against known vulnerabilities and attacks, ensuring the security of sensitive data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;API Protection&lt;/strong&gt;: AWS WAF can be used to protect APIs from unauthorized access, API abuse, and injection attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Geo-blocking&lt;/strong&gt;: AWS WAF allows you to block or allow traffic based on the geographic location of the requester, helping to prevent attacks from specific regions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Content Security Policy (CSP) Enforcement&lt;/strong&gt;: AWS WAF can enforce CSP headers to control how content is loaded and executed in web applications, preventing cross-site scripting (XSS) attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;References&lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html"&gt;https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html&lt;/a&gt; &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/web-acl.html"&gt;https://docs.aws.amazon.com/waf/latest/developerguide/web-acl.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html"&gt;https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html&lt;/a&gt; &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html"&gt;https://docs.aws.amazon.com/waf/latest/developerguide/waf-rules.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://crishantha.medium.com/aws-web-application-firewall-waf-ef3d46049a66"&gt;https://crishantha.medium.com/aws-web-application-firewall-waf-ef3d46049a66&lt;/a&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>cloud</category>
      <category>waf</category>
    </item>
    <item>
      <title>Elevate Your AWS Security: An in-Depth look at AWS Inspector</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Tue, 02 Jan 2024 11:01:12 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/elevate-your-aws-security-an-in-depth-look-at-aws-inspector-37dp</link>
      <guid>https://dev.to/raghureddycloud/elevate-your-aws-security-an-in-depth-look-at-aws-inspector-37dp</guid>
      <description>&lt;h2&gt;
  
  
  What is Amazon Inspector
&lt;/h2&gt;

&lt;p&gt;Amazon Inspector is a vulnerability management service that continuously scans your AWS workloads for software vulnerabilities and unintended network exposure. Amazon Inspector automatically discovers and scans running Amazon EC2 instances, container images in Amazon Elastic Container Registry (Amazon ECR), and AWS Lambda functions for known software vulnerabilities and unintended network exposure.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--I8_bGOOW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cjfy2t8muorcpkgsrlzq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--I8_bGOOW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cjfy2t8muorcpkgsrlzq.png" alt="Amazon Inspector" width="800" height="349"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Features of Amazon Inspector
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Centrally manage multiple Amazon Inspector accounts&lt;/li&gt;
&lt;li&gt;Continuously scan your environment for vulnerabilities and network exposure&lt;/li&gt;
&lt;li&gt;Assess vulnerabilities accurately with the Amazon Inspector Risk score&lt;/li&gt;
&lt;li&gt;Identify high-impact findings with the Amazon Inspector dashboard&lt;/li&gt;
&lt;li&gt;Manage your findings using customizable views&lt;/li&gt;
&lt;li&gt;Monitor and process findings with other services and systems&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Getting started with Amazon Inspector
&lt;/h2&gt;

&lt;p&gt;Following steps is for activating Amazon Inspector scans for a standalone account or as an Amazon Inspector delegated administrator with AWS Organizations in a multi-account environment.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open the Amazon Inspector console at &lt;a href="https://console.aws.amazon.com/inspector/v2/home"&gt;https://console.aws.amazon.com/inspector/v2/home&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Choose Get Started.&lt;/li&gt;
&lt;li&gt;Choose Activate Amazon Inspector.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--s_s1h7el--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/93n16tfkx8ndkwaezxp3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--s_s1h7el--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/93n16tfkx8ndkwaezxp3.png" alt="Activate" width="800" height="161"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;gt; Amazon Inspector is a Regional service. Any of the configuration procedures that you complete must be repeated in each Region that you want to monitor with Amazon Inspector
&amp;gt; When you activate Amazon Inspector in a standalone account, all scan types are activated by default.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once you activated, you see below dashboard &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--s5LfOc4k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5hk5wsy6pljzf5q0xgav.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--s5LfOc4k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5hk5wsy6pljzf5q0xgav.png" alt="Inspector Dashboard" width="800" height="257"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Managing findings in Amazon Inspector
&lt;/h2&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-managing-viewing.html"&gt;Viewing findings&lt;/a&gt;
&lt;/h4&gt;

&lt;p&gt;Findings can be grouped by the following parameters:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;By vulnerability&lt;/strong&gt; – Lists the most critical vulnerabilities detected in your environment. Choose a vulnerability title from this view to open a details pane with additional information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;By account&lt;/strong&gt; – Lists your accounts, Amazon Inspector scan coverage percent for each account, and the total number of Critical and High severity findings for each account. This grouping is only available to delegated administrators.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;By instance&lt;/strong&gt; – Lists the most vulnerable Amazon EC2 instances in your environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;By container image&lt;/strong&gt; – Lists the most vulnerable Amazon ECR container images in your environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;By container repository&lt;/strong&gt; – Shows the repositories with the most vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;By Lambda function&lt;/strong&gt; – Shows the Lambda functions with the most vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;All findings&lt;/strong&gt; – Shows a complete list of findings for your environment. This is the default view when you navigate to the Findings page. In this view you can filter by active, suppressed, and closed findings.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-managing-filtering.html"&gt;Filtering findings&lt;/a&gt;
&lt;/h4&gt;

&lt;p&gt;A finding filter allows you to view only the findings that match the criteria you specify. Findings that do not match the filter criteria are excluded from your view. You can create finding filters using the Amazon Inspector console.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-managing-supression-rules.html"&gt;Suppression rules&lt;/a&gt;
&lt;/h4&gt;

&lt;p&gt;You can use suppression rules to automatically exclude Amazon Inspector findings that match specified criteria. For example, you can create a rule to suppress all findings with a low vulnerability score. This helps focus your view on only the findings that are the most critical to you.&lt;br&gt;
Suppression rules don't have any impact on the finding itself and don't prevent Amazon Inspector from generating a finding. Suppression rules are only used to filter your list of findings.&lt;br&gt;
If Amazon Inspector generates a new finding that matches a suppression rule, the service automatically sets the status of the finding to Suppressed. The findings that match suppression rule criteria don't appear by default.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-managing-exporting-reports.html"&gt;Exporting findings reports&lt;/a&gt;
&lt;/h4&gt;

&lt;p&gt;In addition to sending findings to Amazon EventBridge and AWS Security Hub, you can optionally export findings to an Amazon Simple Storage Service (Amazon S3) bucket as a findings report. A findings report is a CSV or JSON file that contains the details of findings that you choose to include in the report&lt;/p&gt;

&lt;h2&gt;
  
  
  Amazon Inspector deep inspection for Amazon EC2 Linux instances
&lt;/h2&gt;

&lt;p&gt;With deep inspection Amazon Inspector can detect package vulnerabilities for application programming language packages in your Linux-based Amazon EC2 instances. Amazon Inspector scans default paths for programming language package libraries. You can also configure custom paths in addition to the default ones. For more information, see Custom paths for Amazon Inspector Deep inspection.&lt;/p&gt;

&lt;p&gt;Amazon Inspector performs deep inspection scans using data collected from an Amazon Inspector SSM plugin.&lt;br&gt;
Amazon Inspector collects updated application inventory from instances for deep inspection every 6 hours.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;ℹ️&lt;br&gt;
Deep inspection is not supported for Windows or Mac instances&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  Custom paths for Amazon Inspector Deep inspection
&lt;/h4&gt;

&lt;p&gt;You can configure custom paths for Amazon Inspector to search when it performs Deep inspection of your Linux Amazon EC2 instances. When you add a custom path Amazon Inspector scans for packages in that directory and all sub-directories within it.&lt;/p&gt;

&lt;p&gt;Amazon Inspector scans all custom paths in addition to the following default paths that are scanned for all accounts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;/usr/lib&lt;/li&gt;
&lt;li&gt;/usr/lib64&lt;/li&gt;
&lt;li&gt;/usr/local/lib&lt;/li&gt;
&lt;li&gt;/usr/local/lib64&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Set a custom path in the console&lt;/strong&gt;&lt;br&gt;
Sign in as the Amazon Inspector delegated administrator and follow the steps following to add custom paths for your organization.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open the Amazon Inspector console at &lt;a href="https://console.aws.amazon.com/inspector/v2/home"&gt;https://console.aws.amazon.com/inspector/v2/home&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Using the AWS Region selector in the upper-right corner of the page, select the Region where you want to activate Lambda standard scanning.&lt;/li&gt;
&lt;li&gt;From the side navigation panel, under General settings, select EC2 scanning settings.&lt;/li&gt;
&lt;li&gt;Under Custom paths for your own account , select Edit to add paths for your individual account. If you're the delegated administrator, you can choose Edit in the Custom paths for your organization pane to add custom paths for all accounts within the organization.&lt;/li&gt;
&lt;li&gt;Enter your custom paths in the text boxes.&lt;/li&gt;
&lt;li&gt;Choose Save to save your custom paths. Amazon Inspector will include these paths in its next Deep inspection.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Deactivate Amazon Inspector
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;ℹ️&lt;br&gt;
Before you deactivate Amazon Inspector, we recommend that you export your findings. For more information, see &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-managing-exporting-reports.html"&gt;Exporting findings reports from Amazon Inspector.&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To deactivate Amazon Inspector&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open the Amazon Inspector console at &lt;a href="https://console.aws.amazon.com/inspector/v2/home"&gt;https://console.aws.amazon.com/inspector/v2/home&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;By using the AWS Region selector in the upper-right corner of the page, choose the Region in which you want to deactivate Amazon Inspector.&lt;/li&gt;
&lt;li&gt;In the navigation pane, choose General settings.&lt;/li&gt;
&lt;li&gt;Choose Deactivate Inspector.&lt;/li&gt;
&lt;li&gt;When prompted for confirmation, enter deactivate in the text box, and then choose Deactivate Inspector.&lt;/li&gt;
&lt;li&gt;(Recommended) Repeat these steps in each Region for which you want to deactivate Amazon Inspector.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;Reference: &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html"&gt;https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/inspector/latest/user/findings-understanding.html"&gt;https://docs.aws.amazon.com/inspector/latest/user/findings-understanding.html&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/inspector/latest/user/deactivating-best-practices.html"&gt;https://docs.aws.amazon.com/inspector/latest/user/deactivating-best-practices.html&lt;/a&gt; &lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>awsinspector</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Cultivating Trust and Efficiency: Empowering Applications with Amazon EKS Pod Identity for Secure Access to AWS Services</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Fri, 29 Dec 2023 08:58:09 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/cultivating-trust-and-efficiency-empowering-applications-with-amazon-eks-pod-identity-for-secure-access-to-aws-services-543h</link>
      <guid>https://dev.to/raghureddycloud/cultivating-trust-and-efficiency-empowering-applications-with-amazon-eks-pod-identity-for-secure-access-to-aws-services-543h</guid>
      <description>&lt;h2&gt;
  
  
  Introduction to Amazon EKS Pod Identity
&lt;/h2&gt;

&lt;p&gt;Amazon EKS Pod Identity is a service designed to simplify AWS Identity and Access Management (IAM) permissions for applications deployed on Amazon Elastic Kubernetes Service (EKS) clusters. As a fully managed Kubernetes service, Amazon EKS streamlines the deployment, management, and scaling of containerized applications on AWS. &lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html"&gt;user guide&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;High level Amazon EKS Pod Identity architecture&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jkAddgkJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d3gtfwdviu5i3ivrz1wg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jkAddgkJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d3gtfwdviu5i3ivrz1wg.png" alt="High level Amazon EKS Pod Identity architecture" width="800" height="802"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  The Challenge: IAM Permissions in Kubernetes
&lt;/h2&gt;

&lt;p&gt;In a standard Kubernetes environment, pod applications frequently interact with various AWS services like Amazon S3, AWS RSD, and others. Previously , the only way to achieve this was to hardcode IAM credentials in the cluster, or to use the worker node's IAM role—both being highly dangerous and discouraged practice.&lt;br&gt;
Managing AWS IAM permissions for these applications can be complex.&lt;br&gt;
Amazon EKS Pod Identity addresses this challenge by providing a way to associate AWS IAM roles directly with Kubernetes service accounts. This association allows applications running in Amazon EKS pods to assume AWS IAM roles seamlessly without requiring developers to manage AWS credentials directly within the application code or configuration. &lt;/p&gt;

&lt;h2&gt;
  
  
  How EKS Pod Identity Agent works with a Pod
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    env:
    - name: AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE
      value: "/var/run/secrets/pods.eks.amazonaws.com/serviceaccount/eks-pod-identity-token"
    - name: AWS_CONTAINER_CREDENTIALS_FULL_URI
      value: "http://169.254.170.23/v1/credentials"
    volumeMounts:
    - mountPath: "/var/run/secrets/pods.eks.amazonaws.com/serviceaccount/"
      name: eks-pod-identity-token
  volumes:
  - name: eks-pod-identity-token
    projected:
      defaultMode: 420
      sources:
      - serviceAccountToken:
          audience: pods.eks.amazonaws.com
          expirationSeconds: 86400 # 24 hours
          path: eks-pod-identity-token
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;When Amazon EKS starts a new pod that uses a service account with an EKS Pod Identity association, the cluster adds the following above content(code block) to the Pod manifest&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Kubernetes selects which node to run the pod on. Then, the Amazon EKS Pod Identity Agent on the node uses the AssumeRoleForPodIdentity action to retrieve temporary credentials from the EKS Auth API.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The EKS Pod Identity Agent makes these credentials available for the AWS SDKs that you run inside your containers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You use the SDK in your application without specifying a credential provider to use the default credential chain. Or, you specify the container credential provider. For more information about the default locations used, see the Credential provider chain in the AWS SDKs and Tools Reference Guide.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The SDK uses the environment variables to connect to the EKS Pod Identity Agent and retrieve the credentials.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If your workloads currently use credentials that are earlier in the chain of credentials, those credentials will continue to be used even if you configure an EKS Pod Identity association for the same workload.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Benefits of Using EKS Pod Identity
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Simplified AWS credential management&lt;/strong&gt;: EKS Pod Identity eliminates the need to manage AWS credentials within your application code or container environment variables, streamlining the credential management process.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Enhanced security&lt;/strong&gt;: By leveraging AWS Identity and Access Management (IAM) roles, EKS Pod Identity provides fine-grained access control, reducing the risk of unauthorized access and enhancing the overall security of your applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Seamless integration with AWS services&lt;/strong&gt;: EKS Pod Identity allows your applications running on EKS to seamlessly authenticate and authorize access to various AWS services using IAM roles, eliminating the need for managing access keys or storing sensitive credentials within your application code.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Simplified deployment and management&lt;/strong&gt;: EKS Pod Identity is designed to work seamlessly with EKS clusters, making it easy to deploy and configure. This simplifies the deployment and management process, reducing the operational overhead associated with managing AWS credentials.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Overall, EKS Pod Identity provides a convenient and secure way to manage AWS credentials, enhance security, seamlessly integrate with AWS services, and simplify the deployment and management of your applications on EKS clusters.&lt;/p&gt;

&lt;h2&gt;
  
  
  Real-World Use Cases of EKS Pod Identity
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Serverless Data Processing&lt;/strong&gt;: EKS Pod Identity can be used in conjunction with AWS Lambda to enable serverless data processing pipelines. By assigning IAM roles to Lambda functions, you can securely access and process data stored in AWS services like Amazon S3 or DynamoDB within your EKS cluster.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Microservices Architecture&lt;/strong&gt;: In a microservices architecture, EKS Pod Identity can provide secure and granular access to AWS services for each microservice. Each microservice can have its own IAM role associated with its pods, allowing it to access specific AWS resources independently.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Machine Learning Workloads&lt;/strong&gt;: EKS Pod Identity is valuable in machine learning scenarios. It allows training jobs running on EKS to securely access datasets stored in Amazon S3 or retrieve model artifacts from AWS services like Amazon SageMaker.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Analytics and Business Intelligence&lt;/strong&gt;: EKS Pod Identity can enable data analytics and business intelligence applications to securely access and process data stored in AWS services. Applications can retrieve and analyze data from sources like Amazon Redshift, Amazon Athena, or Amazon QuickSight within the EKS cluster.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cloud-Native CI/CD Pipelines&lt;/strong&gt;: EKS Pod Identity can be integrated into cloud-native CI/CD pipelines to ensure secure and authorized access to AWS services during the build, test, and deployment processes. IAM roles associated with pods can be used to authenticate and authorize interaction with resources like AWS CodeCommit, AWS CodeBuild, or AWS CodeDeploy.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Overview of setting up EKS Pod Identities
&lt;/h2&gt;

&lt;p&gt;Turn on EKS Pod Identities by completing the following procedures:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-id-agent-setup.html"&gt;Setting up the Amazon EKS Pod Identity Agent&lt;/a&gt; – You only complete this procedure once for each cluster.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-id-association.html"&gt;Configuring a Kubernetes service account to assume an IAM role with EKS Pod Identity&lt;/a&gt; – Complete this procedure for each unique set of permissions that you want an application to have.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-id-configure-pods.html"&gt;Configuring Pods to use a Kubernetes service account&lt;/a&gt; – Complete this procedure for each Pod that needs access to AWS services.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-id-minimum-sdk.html"&gt;Using a supported AWS SDK&lt;/a&gt; – Confirm that the workload uses an AWS SDK of a supported version and that the workload uses the default credential chain.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  EKS Pod Identity Restrictions
&lt;/h2&gt;

&lt;p&gt;EKS Pod Identities are available on the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon EKS cluster versions listed below&lt;/li&gt;
&lt;li&gt;Worker nodes in the cluster that are Linux Amazon EC2 instances.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Kubernetes version&lt;/th&gt;
&lt;th&gt;Platform version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.28&lt;/td&gt;
&lt;td&gt;eks.4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.27&lt;/td&gt;
&lt;td&gt;eks.8&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.26&lt;/td&gt;
&lt;td&gt;eks.9&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.25&lt;/td&gt;
&lt;td&gt;eks.10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.24&lt;/td&gt;
&lt;td&gt;eks.13&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;EKS Pod Identities aren't available on the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;China Regions.&lt;/li&gt;
&lt;li&gt;AWS GovCloud (US).&lt;/li&gt;
&lt;li&gt;AWS Outposts.&lt;/li&gt;
&lt;li&gt;Amazon EKS Anywhere.&lt;/li&gt;
&lt;li&gt;Kubernetes clusters that you create and run on Amazon EC2. The EKS Pod Identity components are only available on Amazon EKS.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can't use EKS Pod Identities with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Pods that run anywhere except Linux Amazon EC2 instances. Linux and Windows pods that run on AWS Fargate (Fargate) aren't supported. Pods that run on Windows Amazon EC2 instances aren't supported.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Amazon EKS add-ons that need IAM credentials. The EKS add-ons can only use IAM roles for service accounts instead. The list of EKS add-ons that use IAM credentials include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon VPC CNI plugin for Kubernetes&lt;/li&gt;
&lt;li&gt;AWS Load Balancer Controller&lt;/li&gt;
&lt;li&gt;The CSI storage drivers: EBS CSI, EFS CSI, Amazon FSx for Lustre CSI driver, Amazon FSx for NetApp ONTAP CSI driver, Amazon FSx for OpenZFS CSI driver, Amazon File Cache CSI driver &lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If these controllers, drivers, and plugins are installed as self-managed add-ons instead of EKS add-ons, they support EKS Pod Identities as long as they are updated to use the latest AWS SDKs.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;References&lt;br&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-eks-pod-identity/"&gt;https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-eks-pod-identity/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://aws.amazon.com/blogs/aws/amazon-eks-pod-identity-simplifies-iam-permissions-for-applications-on-amazon-eks-clusters/"&gt;https://aws.amazon.com/blogs/aws/amazon-eks-pod-identity-simplifies-iam-permissions-for-applications-on-amazon-eks-clusters/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://aws.amazon.com/blogs/containers/amazon-eks-pod-identity-a-new-way-for-applications-on-eks-to-obtain-iam-credentials/"&gt;https://aws.amazon.com/blogs/containers/amazon-eks-pod-identity-a-new-way-for-applications-on-eks-to-obtain-iam-credentials/&lt;/a&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>kubernetes</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Demystifying HELM: A Beginner's Guide to Kubernetes Package Management</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Tue, 14 Nov 2023 10:25:00 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/demystifying-helm-a-beginners-guide-to-kubernetes-package-management-4o8e</link>
      <guid>https://dev.to/raghureddycloud/demystifying-helm-a-beginners-guide-to-kubernetes-package-management-4o8e</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fys572dee894zndo98hcj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fys572dee894zndo98hcj.png" alt="HELM_K8s"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Helm?
&lt;/h2&gt;

&lt;p&gt;Kubernetes(k8s) is an open-source platform that automates the deployment, scaling, and management of containerized applications. However, managing complex applications within Kubernetes can be challenging. This is where Helm comes in. Helm is a powerful package manager for Kubernetes, providing a streamlined way to define, install, and upgrade even the most intricate Kubernetes applications through the use of charts.&lt;/p&gt;




&lt;h5&gt;
  
  
  Helm is a graduated project in the CNCF and is maintained by the Helm community.
&lt;/h5&gt;




&lt;h2&gt;
  
  
  How to Install Helm
&lt;/h2&gt;

&lt;p&gt;Installing Helm is a straightforward process. You can download the binary for your specific operating system from the &lt;a href="https://github.com/helm/helm/releases" rel="noopener noreferrer"&gt;official Helm GitHub repository&lt;/a&gt;. Once downloaded, follow the platform-specific installation instructions provided in the documentation.&lt;br&gt;
&lt;a href="https://helm.sh/docs/intro/install/" rel="noopener noreferrer"&gt;https://helm.sh/docs/intro/install/&lt;/a&gt; &lt;/p&gt;
&lt;h2&gt;
  
  
  Why Use Helm?
&lt;/h2&gt;

&lt;p&gt;Helm significantly eases the deployment process on Kubernetes by allowing you to define, install, and upgrade even the most complex Kubernetes applications. It promotes consistency and repeatability in the deployment process, making it an invaluable tool for managing Kubernetes clusters.&lt;/p&gt;
&lt;h2&gt;
  
  
  Pre-requisites
&lt;/h2&gt;

&lt;p&gt;Before you begin using Helm, ensure that you have a running Kubernetes cluster. Additionally, you should have basic knowledge of Kubernetes concepts, such as pods, deployments, and services, to effectively utilize Helm for managing your applications.&lt;/p&gt;
&lt;h2&gt;
  
  
  Key Components
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Charts
&lt;/h3&gt;

&lt;p&gt;Charts are Helm packages that contain pre-configured Kubernetes resources necessary to run a specific application.&lt;/p&gt;
&lt;h3&gt;
  
  
  Releases
&lt;/h3&gt;

&lt;p&gt;Releases are instances of a chart running in a Kubernetes cluster. Each release has a unique release name that is used to identify the deployed resources.&lt;/p&gt;
&lt;h3&gt;
  
  
  Repositories
&lt;/h3&gt;

&lt;p&gt;Helm repositories store and distribute charts. They can be public or private, allowing users to share and discover Kubernetes applications easily.&lt;/p&gt;
&lt;h2&gt;
  
  
  Pre-requisite (We need kubernetes cluster)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://dev.toLink"&gt;Create AWS EKS Cluster&lt;/a&gt; - In Progress&lt;br&gt;
&lt;a href="https://dev.toLink"&gt;Create Azure Kubernetes Cluster&lt;/a&gt; - In Progress&lt;/p&gt;
&lt;h2&gt;
  
  
  Creating a Sample Nginx Helm Chart and Testing It
&lt;/h2&gt;

&lt;p&gt;We will try deploying nginx on k8s cluster. &lt;/p&gt;

&lt;p&gt;To create a sample Nginx Helm chart, you can use the Helm CLI. First, use the helm create command to generate the basic directory structure for the chart.&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;$ &amp;gt; helm create nginx-demo&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;



&lt;p&gt;&lt;code&gt;Creating nginx-demo&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;You can check the content of the folder that got created. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl13knamofoi48henoq7r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl13knamofoi48henoq7r.png" alt="ls -ltr"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will try to inspect the structure and it's content inside.&lt;/p&gt;

&lt;p&gt;The first two files you see—Chart.yaml and values.yaml—define what the chart is and what values will be in it at deployment&lt;/p&gt;

&lt;p&gt;We have values.yaml, in that all the values for nginx deployment can be configured. Declared variables to be passed into your templates at run time. &lt;br&gt;
For example, we have below reference values.yaml file. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkg8xo6c0udt49mx9dg1x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkg8xo6c0udt49mx9dg1x.png" alt="Nginx Values"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After making the necessary changes, use the &lt;code&gt;helm install&lt;/code&gt; command to deploy the Nginx chart to your Kubernetes cluster.&lt;br&gt;
&lt;em&gt;Syntax and Example&lt;/em&gt;&lt;br&gt;
&lt;code&gt;helm install &amp;lt;release name&amp;gt; ./nginx-demo&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ &amp;gt; helm install nginx-dev-rel ./nginx-demo
NAME: nginx-dev-rel
LAST DEPLOYED: Tue Nov  14 15:35:09 2023
NAMESPACE: default
STATUS: deployed
REVISION: 1
NOTES:
1. Get the application URL by running these commands:
  http://chart-example.local/ 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command lists all of the releases for a specified namespace&lt;br&gt;
&lt;code&gt;helm list&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt; $ &amp;gt;  helm list
NAME        NAMESPACE   REVISION    UPDATED                                 STATUS      CHART               APP VERSION
nginx-dev   default     1           2023-11-14 15:35:09.214273 +0530 IST    deployed    nginx-demo-0.1.0    1.16.0 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To display the status of the named release, &lt;br&gt;
&lt;em&gt;Syntax and Example&lt;/em&gt;&lt;br&gt;
&lt;code&gt;helm status &amp;lt;release name&amp;gt;&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ &amp;gt; helm status nginx-dev-rel
NAME: nginx-dev-rel
LAST DEPLOYED: Tue Nov  14 15:35:09 2023
NAMESPACE: default
STATUS: deployed
REVISION: 1
NOTES:
1. Get the application URL by running these commands:
  http://chart-example.local/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Accessing Application&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ &amp;gt; export POD_NAME=$(kubectl get pods --namespace default -l "app.kubernetes.io/name=nginx-chart,app.kubernetes.io/instance=nginx-demo" -o jsonpath="{.items[0].metadata.name}")
$ &amp;gt; kubectl port-forward $POD_NAME 8080:80
Forwarding from 127.0.0.1:8080 -&amp;gt; 80
Forwarding from [::1]:8080 -&amp;gt; 80
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Visit &lt;a href="http://127.0.0.1:8080" rel="noopener noreferrer"&gt;http://127.0.0.1:8080&lt;/a&gt; to use your application&lt;/p&gt;

&lt;h3&gt;
  
  
  Happy Helming. You have deployed Nginx using HELM
&lt;/h3&gt;




&lt;h2&gt;
  
  
  Best Practices
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Version your Helm charts to ensure consistency and traceability.&lt;/li&gt;
&lt;li&gt;Use values files to manage configuration and make your Helm charts configurable.&lt;/li&gt;
&lt;li&gt;Test your Helm charts thoroughly in a staging environment before deploying them to production.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Reference Links
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://helm.sh/docs/" rel="noopener noreferrer"&gt;Official Helm Documentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/helm/helm" rel="noopener noreferrer"&gt;Helm GitHub Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://artifacthub.io/packages/search?kind=0" rel="noopener noreferrer"&gt;Helm Charts Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://helm.sh/docs/topics/chart_best_practices/" rel="noopener noreferrer"&gt;Helm Best Practices&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>helm</category>
      <category>kubernetes</category>
      <category>docker</category>
      <category>devops</category>
    </item>
    <item>
      <title>Amazon CloudWatch Container Insights launches enhanced observability for Amazon EKS</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Tue, 07 Nov 2023 07:05:38 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/amazon-cloudwatch-container-insights-launches-enhanced-observability-for-amazon-eks-9of</link>
      <guid>https://dev.to/raghureddycloud/amazon-cloudwatch-container-insights-launches-enhanced-observability-for-amazon-eks-9of</guid>
      <description>&lt;p&gt;Amazon CloudWatch Container Insights now delivers enhanced observability for Amazon Elastic Kubernetes Service (EKS) with out-of-the-box detailed health and performance metrics, including container level EKS performance metrics, Kube-state metrics and EKS control plane metrics for faster problem isolation and troubleshooting.&lt;/p&gt;

&lt;p&gt;You can get started with Container Insights by installing the CloudWatch observability add-on in your clusters after they are created using the add-ons tab in your cluster info view. Container Insights now delivers overall container health and performance visibility via a landing page where you can navigate to the performance dashboards view for detailed analysis by navigating to View performance dashboards link on the top right.&lt;/p&gt;

&lt;h3&gt;
  
  
  Setting up Container Insights on Amazon EKS and Kubernetes
&lt;/h3&gt;

&lt;p&gt;Container Insights is supported on Amazon EKS versions 1.23 and later. The quick start method of installation is supported only on versions 1.24 and later.&lt;/p&gt;

&lt;p&gt;The overall process for setting up Container Insights on Amazon EKS or Kubernetes is as follows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Verify that you have the necessary prerequisites.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Set up the Amazon CloudWatch Observability EKS add-on, the CloudWatch agent, or AWS Distro for OpenTelemetry on your cluster to send metrics to CloudWatch.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Note&lt;br&gt;
To use Container Insights with enhanced observability for Amazon EKS, you must use the Amazon CloudWatch Observability EKS add-on or the CloudWatch agent. For more information about this version of Container Insights, see Container Insights with enhanced observability for Amazon EKS.&lt;br&gt;
To use Container Insights with Fargate, you must use AWS Distro for OpenTelemetry.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Set up Fluent Bit or Fluentd to send logs to CloudWatch Logs. (This is enabled by default if you install the Amazon CloudWatch Observability EKS add-on.)&lt;/p&gt;

&lt;p&gt;You can perform these steps at once as part of the quick start setup if you are using the CloudWatch agent, or do them separately.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;(Optional) Set up Amazon EKS control plane logging.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;(Optional) Set up the CloudWatch agent as a StatsD endpoint on the cluster to send StatsD metrics to CloudWatch.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;(Optional) Enable App Mesh Envoy Access Logs.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Viewing Container Insights metrics
&lt;/h3&gt;

&lt;p&gt;After you have Container Insights set up and it is collecting metrics, you can view those metrics in the CloudWatch console.&lt;/p&gt;

&lt;p&gt;For Container Insights metrics to appear on your dashboard, you must complete the Container Insights setup. For more information, see Setting up Container Insights.&lt;/p&gt;

&lt;p&gt;This procedure explains how to view the metrics that Container Insights automatically generates from the collected log data. The rest of this section explains how to further dive into your data and use CloudWatch Logs Insights to see more metrics at more levels of granularity.&lt;/p&gt;

&lt;h4&gt;
  
  
  To view Container Insights metrics
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Open the CloudWatch console at &lt;a href="https://console.aws.amazon.com/cloudwatch/"&gt;https://console.aws.amazon.com/cloudwatch/&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In the navigation pane, choose Insights, Container Insights.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In the drop-down box under Container Insights, choose Performance monitoring.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use the drop-down boxes near the top to select the type of resource to view, as well as the specific resource.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Container Insights is available in all public AWS Regions, including the AWS GovCloud (US) Regions, China (Beijing, operated by Sinnet), and China (Ningxia, operated by NWCD). Container Insights with enhanced observability for EKS comes with a new observation-based pricing – see &lt;a href="https://aws.amazon.com/cloudwatch/pricing/"&gt;pricing page&lt;/a&gt; for details. For further information, visit the &lt;a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContainerInsights.html"&gt;Container Insights documentation&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Reference -&lt;br&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-cloudwatch-container-insights-enhanced-observability-eks/"&gt;https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-cloudwatch-container-insights-enhanced-observability-eks/&lt;/a&gt; &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContainerInsights.html"&gt;https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContainerInsights.html&lt;/a&gt; &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Container-Insights-view-metrics.html"&gt;https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Container-Insights-view-metrics.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>eks</category>
      <category>observability</category>
      <category>containers</category>
    </item>
    <item>
      <title>EKS now allows modification of cluster subnets and security groups</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Wed, 25 Oct 2023 17:23:38 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/eks-now-allows-modification-of-cluster-subnets-and-security-groups-n98</link>
      <guid>https://dev.to/raghureddycloud/eks-now-allows-modification-of-cluster-subnets-and-security-groups-n98</guid>
      <description>&lt;p&gt;The recent update from Amazon Elastic Kubernetes Service (EKS) on October 24, 2023, announced a new feature that allows customers to modify the subnets and security groups associated with their existing EKS clusters. This enhancement aims to provide greater flexibility for cluster administrators to synchronize changes made to Amazon Virtual Private Cloud (VPC) resources, simplifying cluster management.&lt;/p&gt;

&lt;p&gt;The problem that this update addresses is the challenge of adapting EKS clusters to changes in the underlying VPC resources, such as modifications or expansions in the VPC subnets. Previously, when changes were made to VPC resources, it necessitated the creation of new EKS clusters, which could be time-consuming and complex, especially for production environments.&lt;/p&gt;

&lt;p&gt;The solution introduced by Amazon EKS is the capability for customers to update the subnets and security groups associated with their existing EKS clusters directly. This means that when changes occur in the VPC resources, such as modifications to the subnets due to VPC expansion, customers can now conveniently update their EKS clusters without the need to create new ones.&lt;/p&gt;

&lt;p&gt;With this new functionality, cluster administrators can easily ensure that their EKS clusters remain synchronized with any changes made to the underlying VPC resources, thus streamlining the management process. This feature is immediately available for use on all existing EKS clusters across all AWS Regions where EKS is accessible. Customers interested in utilizing this feature can refer to the EKS documentation for detailed instructions on getting started.&lt;/p&gt;

&lt;p&gt;Reference: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/10/amazon-eks-modification-cluster-subnets-security/"&gt;https://aws.amazon.com/about-aws/whats-new/2023/10/amazon-eks-modification-cluster-subnets-security/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html"&gt;https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>eks</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Web Shell - Browser-based Shell - AWS CloudShell</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Tue, 24 Oct 2023 04:27:27 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/web-shell-browser-based-shell-aws-cloudshell-25d4</link>
      <guid>https://dev.to/raghureddycloud/web-shell-browser-based-shell-aws-cloudshell-25d4</guid>
      <description>&lt;h3&gt;
  
  
  AWS CloudShell
&lt;/h3&gt;

&lt;p&gt;AWS CloudShell is a browser-based shell that gives you command-line access to your AWS resources in the selected AWS region. AWS CloudShell comes pre-installed with popular tools for resource management and creation. You have the same credentials as you used to log in to the console. &lt;/p&gt;

&lt;p&gt;You can run AWS CLI commands using your preferred shell, such as Bash, PowerShell, or Z shell. And you can do this without downloading or installing command line tools.&lt;/p&gt;

&lt;h3&gt;
  
  
  Getting started
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;First, you sign in to the AWS Management Console and select an AWS Region. You then launch CloudShell
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KmpGxYwE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8pq023rqx7ovls61h4bz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KmpGxYwE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8pq023rqx7ovls61h4bz.png" alt="Login" width="800" height="317"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Or in the Search box, type “CloudShell”, and then choose CloudShell.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EUVZZHgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1ucof6vnr9jlju59avof.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EUVZZHgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1ucof6vnr9jlju59avof.png" alt="Search" width="800" height="341"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When you launch AWS CloudShell, a compute environment that's based on Amazon Linux 2 is created. Within this environment, you can access an &lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/vm-specs.html#pre-installed-software"&gt;extensive range of pre-installed development tools&lt;/a&gt;, 1 GB of Storage free per AWS region(storage persists after the session ends),  options for &lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/getting-started.html#folder-upload"&gt;uploading&lt;/a&gt; and &lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/getting-started.html#download-file"&gt;downloading&lt;/a&gt; files, and &lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/cloudshell-features.html#persistent-storage"&gt;file storage that persists between sessions&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9Kn1UShy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5dgzu05egd1iyxcoy5ap.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9Kn1UShy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5dgzu05egd1iyxcoy5ap.png" alt="What you get" width="800" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Some packages and their list below &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xJEHU6hz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m0lyxxrd7op01fouo0d3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xJEHU6hz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m0lyxxrd7op01fouo0d3.png" alt="list of versions" width="800" height="414"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can also switch your CloudShell session to a full screen by clicking Open in new browser tab.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vtqCK5Sj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eqiiuus5m0jp8yqp5zqx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vtqCK5Sj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/eqiiuus5m0jp8yqp5zqx.png" alt="Full Screen" width="800" height="186"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once you ready with the cloud shell, you can start playing around the shell. &lt;/p&gt;

&lt;h3&gt;
  
  
  Supported browsers for AWS CloudShell
&lt;/h3&gt;

&lt;p&gt;The following table lists the supported browsers for AWS CloudShell.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Browser&lt;/th&gt;
&lt;th&gt;Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Google Chrome&lt;/td&gt;
&lt;td&gt;Latest three major versions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mozilla Firefox&lt;/td&gt;
&lt;td&gt;Latest three major versions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge&lt;/td&gt;
&lt;td&gt;Latest three major versions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Apple Safari for macOS&lt;/td&gt;
&lt;td&gt;Latest two major versions&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Service quotas and restrictions
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With AWS CloudShell, you have persistent storage of 1 GB for each AWS Region at no cos&lt;/li&gt;
&lt;li&gt;There are monthly usage quotas for AWS CloudShell for each AWS Region in your AWS account&lt;/li&gt;
&lt;li&gt;The command size cannot exceed 65412 characters&lt;/li&gt;
&lt;li&gt;You can run up to 10 shells at the same time in each AWS Region for your account&lt;/li&gt;
&lt;li&gt;No Inbound traffic, only outbound traffic is allowed. You can access the public internet.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;CloudShell will migrate from Amazon Linux 2 to Amazon Linux 2023 starting December 4, 2023. For more information, see the User Guide &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/cloudshell-AL2023-migration.html"&gt;CloudShell-AL2023-Migration&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Reference: &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/cloudshell/latest/userguide/welcome.html"&gt;AWS Cloud Shell&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>shell</category>
      <category>cloud</category>
      <category>programming</category>
    </item>
    <item>
      <title>Embarking on my AWS Journey: Exploring AWS global-infrastructure</title>
      <dc:creator>Raghu Reddy</dc:creator>
      <pubDate>Mon, 23 Oct 2023 11:35:23 +0000</pubDate>
      <link>https://dev.to/raghureddycloud/embarking-on-my-aws-journey-exploring-aws-global-infrastructure-28ie</link>
      <guid>https://dev.to/raghureddycloud/embarking-on-my-aws-journey-exploring-aws-global-infrastructure-28ie</guid>
      <description>&lt;p&gt;&lt;em&gt;Dear Readers,&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I am thrilled to embark on this exciting journey to contribute back to the community. As someone passionate about technology and innovation, I am eager to delve deeper into the world of cloud computing and share my learnings and experiences with you all. In this first blog post, I aim to introduce to AWS regions, Availability zones, Local zone and Edge networks along with building blocks of Amazon Web Services.&lt;/p&gt;

&lt;p&gt;Let's begin the journey. &lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding AWS
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Amazon Web Services (AWS)&lt;/strong&gt; is a comprehensive and widely adopted cloud computing platform offered by Amazon. It provides numerous services that enable organizations to build and deploy sophisticated applications with increased flexibility, scalability, and reliability. From computing power to storage solutions, databases to content delivery, AWS offers a vast array of services tailored to meet the diverse needs of businesses and developers worldwide.&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Regions
&lt;/h2&gt;

&lt;p&gt;AWS has the concept of a Region, which is a physical location around the world where data centers are clustered. We call each group of logical data centers an Availability Zone. Each AWS Region consists of a minimum of three, isolated, and physically separate AZs within a geographic area. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pzfcWWUa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/itunlhs3hhw1gbwrhluk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pzfcWWUa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/itunlhs3hhw1gbwrhluk.png" alt="AWS Regions" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Availability Zones (AZs)
&lt;/h2&gt;

&lt;p&gt;An Availability Zone (AZ) is one or more discrete data centers with redundant power, networking, and connectivity in an AWS Region. All AZs in an AWS Region are interconnected with high-bandwidth, low-latency networking, over fully redundant, dedicated metro fiber providing high-throughput, low-latency networking between AZs. All traffic between AZs is encrypted.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_p6wG8Ir--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/696j1snig0fl1nn1jgk9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_p6wG8Ir--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/696j1snig0fl1nn1jgk9.png" alt="Region_AZs" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Local Zones
&lt;/h2&gt;

&lt;p&gt;AWS Local Zones place compute, storage, database, and other select AWS services closer to end-users. With AWS Local Zones, you can easily run highly-demanding applications that require single-digit millisecond latencies to your end-users such as media &amp;amp; entertainment content creation, real-time gaming, reservoir simulations, electronic design automation, and machine learning.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--X6-pkTUg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q0nud944quletw8u3boe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--X6-pkTUg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q0nud944quletw8u3boe.png" alt="AWS Local Zones" width="800" height="406"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Edge Networks
&lt;/h2&gt;

&lt;p&gt;AWS Edge Locations are endpoints for AWS which are used for caching content and accelerating access to AWS services. They are part of the Amazon CloudFront content delivery network (CDN) and are located in most major cities around the world.  AWS edge networking services securely transmit your user-facing data and with improved latency worldwide.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bXaVEV6---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8r2rp1zhe3a01j49punn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bXaVEV6---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8r2rp1zhe3a01j49punn.png" alt="AWS Edge Networks" width="800" height="421"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As of October 2023, &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There are total 32 Launched Regions each with multiple Availability Zones (AZs). &lt;/li&gt;
&lt;li&gt;102 Availability Zones&lt;/li&gt;
&lt;li&gt;35 Local Zones&amp;amp; 29 Wavelength Zones for ultralow latency applications&lt;/li&gt;
&lt;li&gt;550+ Points of Presence and 13 Regional Edge Caches&lt;/li&gt;
&lt;li&gt;245 Countries and Territories Served&lt;/li&gt;
&lt;li&gt;115 Direct Connect Locations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can keep updated yourself by referring below links:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/about-aws/global-infrastructure/regions_az/"&gt;AWS global Infrastructure&lt;/a&gt;&lt;br&gt;
&lt;a href="https://aws.amazon.com/about-aws/global-infrastructure/localzones/locations/"&gt;AWS Local Zone&lt;/a&gt;&lt;br&gt;
&lt;a href="https://aws.amazon.com/products/networking/edge-networking/"&gt;AWS Edge Network&lt;/a&gt;&lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/index.html"&gt;AWS Documentation&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>network</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
