<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/mobycast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Mobycast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/mobycast</itunes:new-feed-url>
    <description>A Podcast About Cloud Native Software Development, AWS, and Distributed Systems</description>
    <copyright>© 2020 Kelsus, Inc</copyright>
    <podcast:guid>6b9a5bfb-8944-5cf9-b64b-59d3ab128fef</podcast:guid>
    <podcast:locked owner="jon@mobycast.fm">no</podcast:locked>
    <podcast:trailer pubdate="Sun, 08 Mar 2020 20:00:00 +0000" url="https://pdcn.co/e/media.transistor.fm/6814346a/f815814a.mp3" length="2211896" type="audio/mpeg">Learn cloud native software development by podcast</podcast:trailer>
    <language>en-us</language>
    <pubDate>Wed, 23 Jul 2025 14:35:59 +0000</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 20:28:10 +0000</lastBuildDate>
    <link>https://mobycast.fm</link>
    <image>
      <url>https://img.transistor.fm/Z_gt6R_io2WrspA_0HRg0_WR4u2-Vy_ZQfdA-I5suBk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQyMDcvMTU2ODA0/MzY1My1hcnR3b3Jr/LmpwZw.jpg</url>
      <title>Mobycast</title>
      <link>https://mobycast.fm</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="How To"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Mobycast.fm</itunes:author>
    <itunes:image href="https://img.transistor.fm/Z_gt6R_io2WrspA_0HRg0_WR4u2-Vy_ZQfdA-I5suBk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQyMDcvMTU2ODA0/MzY1My1hcnR3b3Jr/LmpwZw.jpg"/>
    <itunes:summary>A Podcast About Cloud Native Software Development, AWS, and Distributed Systems</itunes:summary>
    <itunes:subtitle>A Podcast About Cloud Native Software Development, AWS, and Distributed Systems.</itunes:subtitle>
    <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jon Christensen</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Hands On AWS - Massively Scalable Image Hosting Using S3 and CloudFront - Part 2</title>
      <itunes:episode>110</itunes:episode>
      <podcast:episode>110</podcast:episode>
      <itunes:title>Hands On AWS - Massively Scalable Image Hosting Using S3 and CloudFront - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66cfb193-5360-44ab-81e1-354617dc1c9a</guid>
      <link>https://share.transistor.fm/s/d0a3c3f5</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We discuss the features and limitations of serving files directly from S3.</li><li>We then talk about how CloudFront can address many of S3's limitations. In particular, CloudFront is performant, inexpensive and allows us to use custom CNAMEs with TLS encryption.</li><li>How to create a secure CloudFront distribution for files hosted in S3.</li><li>What is OAI (Origin Access Identity), why we need it and how to set it up.</li><li>We show how you can configure your CloudFront distribution to use TLS and redirect HTTP to HTTPS.</li><li>We finish up by discussing "byte-range requests" and how to enable them for our image hosting solution.</li></ul><p>Detailed Show Notes</p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p>End Song</p><p><a href="https://makemistakes.bandcamp.com/album/beauty-in-rhythm">Beauty in Rhythm by Roy England</a></p><p>More Info</p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/110">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We discuss the features and limitations of serving files directly from S3.</li><li>We then talk about how CloudFront can address many of S3's limitations. In particular, CloudFront is performant, inexpensive and allows us to use custom CNAMEs with TLS encryption.</li><li>How to create a secure CloudFront distribution for files hosted in S3.</li><li>What is OAI (Origin Access Identity), why we need it and how to set it up.</li><li>We show how you can configure your CloudFront distribution to use TLS and redirect HTTP to HTTPS.</li><li>We finish up by discussing "byte-range requests" and how to enable them for our image hosting solution.</li></ul><p>Detailed Show Notes</p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p>End Song</p><p><a href="https://makemistakes.bandcamp.com/album/beauty-in-rhythm">Beauty in Rhythm by Roy England</a></p><p>More Info</p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/110">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Jul 2020 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d0a3c3f5/54318510.mp3" length="39651817" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/75C5HiC2vsJN20G_3dUUeqdVERrTGzeEQQBR0F5hkEU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI5MTI1My8x/NTk0MTgyMDE2LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2473</itunes:duration>
      <itunes:summary>In episode #109 of Mobycast, we started our discussion on how to build a massively scalable image hosting service.  We talked about the general architecture and then dove deep on how to handle image uploads.

But uploading is only half the solution. We also need to allow downloads of the images. Turns out, downloading is a totally different game.

In this episode of Mobycast, Jon and Chris finish their two-part series on building an image hosting solution. We discuss in detail how to enable downloads of files with the help of CloudFront, a global network of edge locations that makes it easy to achieve massive scale.</itunes:summary>
      <itunes:subtitle>In episode #109 of Mobycast, we started our discussion on how to build a massively scalable image hosting service.  We talked about the general architecture and then dove deep on how to handle image uploads.

But uploading is only half the solution. We </itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, Amazon S3, CloudFront, CDN, image hosting, image upload, massively scalable</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hands On AWS - Massively Scalable Image Hosting Using S3 and CloudFront - Part 1</title>
      <itunes:episode>109</itunes:episode>
      <podcast:episode>109</podcast:episode>
      <itunes:title>Hands On AWS - Massively Scalable Image Hosting Using S3 and CloudFront - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27bb47db-ee77-43ce-9f80-8333eb7d9553</guid>
      <link>https://share.transistor.fm/s/d518f15c</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>A common feature for web apps is image upload. And we all know the "best practices" for how to build this feature. But getting it right can be tricky.</li><li>We start off by discussing the problem space, and what we want to solve. A key goal is to have a solution that is massively scalable while being cost-effective.</li><li>We outline the general architecture of the solution, with separate techniques for handling image uploading and downloading.</li><li>We then dive deep into how to handle image uploading, highlighting various techniques for controlling access over who can perform uploads.</li><li>Two common techniques for securing uploads when using AWS are presigned URLs and presigned POSTs. We discuss how each works and when to use one over the other.</li><li>We finish up by putting everything together and detailing the steps involved with uploading an image.</li></ul><p>Detailed Show Notes</p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p>Support Mobycast</p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>End Song</p><p><a href="https://makemistakes.bandcamp.com/album/silver-linings">Lazy Sunday by Roy England</a></p><p>More Info</p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/109">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>A common feature for web apps is image upload. And we all know the "best practices" for how to build this feature. But getting it right can be tricky.</li><li>We start off by discussing the problem space, and what we want to solve. A key goal is to have a solution that is massively scalable while being cost-effective.</li><li>We outline the general architecture of the solution, with separate techniques for handling image uploading and downloading.</li><li>We then dive deep into how to handle image uploading, highlighting various techniques for controlling access over who can perform uploads.</li><li>Two common techniques for securing uploads when using AWS are presigned URLs and presigned POSTs. We discuss how each works and when to use one over the other.</li><li>We finish up by putting everything together and detailing the steps involved with uploading an image.</li></ul><p>Detailed Show Notes</p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p>Support Mobycast</p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>End Song</p><p><a href="https://makemistakes.bandcamp.com/album/silver-linings">Lazy Sunday by Roy England</a></p><p>More Info</p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/109">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 Jul 2020 08:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d518f15c/900d3e13.mp3" length="41757027" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/whXLVT_x8YZeYKYD41JlPJ4yYFIsjcgOrfcLus9b8jE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI4Nzc2My8x/NTkzNTY1ODUyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2605</itunes:duration>
      <itunes:summary>If you are building software apps, at some point you will likely need to build an image hosting service (let's be honest, probably more than once!). Image hosting is a core feature of many apps, and it's important to get right.

We all know the best practices for building image hosting in the cloud. Start with Amazon S3 for the uploads. Then serve them up with a CDN like CloudFront. Easy, right? Well, as usual, the devil's in the details.

In this episode of Mobycast, Jon and Chris kick off a two-part series detailing how to build a massively scalable image hosting service. We share hard-won tips and tricks so you can avoid common pitfalls when building your own solution.</itunes:summary>
      <itunes:subtitle>If you are building software apps, at some point you will likely need to build an image hosting service (let's be honest, probably more than once!). Image hosting is a core feature of many apps, and it's important to get right.

We all know the best pra</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, Amazon S3, CloudFront, CDN, image hosting, image upload, massively scalable</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 43 -  The Birth of NoSQL and DynamoDb – Part 5</title>
      <itunes:episode>108</itunes:episode>
      <podcast:episode>108</podcast:episode>
      <itunes:title>Replay of Ep 43 -  The Birth of NoSQL and DynamoDb – Part 5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">de6848bb-1197-4440-aa9e-95b3241e12df</guid>
      <link>https://share.transistor.fm/s/b1d2fd4d</link>
      <description>
        <![CDATA[<p><strong>Show Details</strong></p><p>Jon Christensen and Chris Hickman of Kelsus and Rich Staats of Secret Stache conclude their series on the birth of NoSQL and DynamoDB. They compare the NoSQL database, Leviathan, created by Chris’s startup in the late 1990s to today’s DynamoDB. A lot of things haven’t changed, even though technology has evolved. It’s cyclical. There are patterns and problems that continue to dominate.</p><p>  </p><p>Some of the highlights of the show include:</p><ul><li>Reason for Creation of NoSQL Database: How to scale database with Internet-scale applications to have a virtual pool of infinite storage that can be scaled out</li><li>Main Architecture Components of Leviathan:<ul><li>API client</li><li>Update distributor (UD)</li><li>Base server (storage node)</li><li>Shepherd (housekeeping management system)  </li></ul></li><li>Additional core components included smart IP and storage abstraction layer (SAL)</li><li>Leviathan mostly used C code and minimal Java code to support users</li><li>Big difference between DynamoDB and Leviathan is request router and partition metadata system living on the server vs. living on the edge</li><li>Leviathan was a closed system with an instance for every network or data center; not designed to run as a software as a service, like DynamoDB</li><li>Leviathan was strongly consistent, unlike DynamoDB’s eventually consistent model</li><li>Definition and Different Types of Transactions</li><li>Shepherd was used to identify and address consistency, synchronous, and timing issues </li><li>Rather than using a file system, Leviathan used relational databases </li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://www.microsoft.com/en-us/sql-server/default.aspx">Microsoft SQL</a></p><p><a href="https://www.oracle.com/database/">Oracle DB</a></p><p><a href="https://aws.amazon.com/greengrass/">AWS IoT Greengrass</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p> </p><p><strong>Quotes:</strong></p><p>“We had the same kind of problems that DynamoDB had - how do you scale your database dealing with Internet-scale applications and have this virtual pool of infinite storage that can be scaled out.” Chris Hickman</p><p> </p><p>“This system and this technology went through many iterations.” Chris Hickman</p><p> </p><p>“You can’t have a 100% consistent state across everything. It’s just impossible. How do you do the right thing?” Chris Hickman</p><p> </p><p>“The big difference between DynamoDB and Leviathan...is the request router and partition metadata system living on the server vs. living out at the edge.” Jon Christen </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Show Details</strong></p><p>Jon Christensen and Chris Hickman of Kelsus and Rich Staats of Secret Stache conclude their series on the birth of NoSQL and DynamoDB. They compare the NoSQL database, Leviathan, created by Chris’s startup in the late 1990s to today’s DynamoDB. A lot of things haven’t changed, even though technology has evolved. It’s cyclical. There are patterns and problems that continue to dominate.</p><p>  </p><p>Some of the highlights of the show include:</p><ul><li>Reason for Creation of NoSQL Database: How to scale database with Internet-scale applications to have a virtual pool of infinite storage that can be scaled out</li><li>Main Architecture Components of Leviathan:<ul><li>API client</li><li>Update distributor (UD)</li><li>Base server (storage node)</li><li>Shepherd (housekeeping management system)  </li></ul></li><li>Additional core components included smart IP and storage abstraction layer (SAL)</li><li>Leviathan mostly used C code and minimal Java code to support users</li><li>Big difference between DynamoDB and Leviathan is request router and partition metadata system living on the server vs. living on the edge</li><li>Leviathan was a closed system with an instance for every network or data center; not designed to run as a software as a service, like DynamoDB</li><li>Leviathan was strongly consistent, unlike DynamoDB’s eventually consistent model</li><li>Definition and Different Types of Transactions</li><li>Shepherd was used to identify and address consistency, synchronous, and timing issues </li><li>Rather than using a file system, Leviathan used relational databases </li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://www.microsoft.com/en-us/sql-server/default.aspx">Microsoft SQL</a></p><p><a href="https://www.oracle.com/database/">Oracle DB</a></p><p><a href="https://aws.amazon.com/greengrass/">AWS IoT Greengrass</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p> </p><p><strong>Quotes:</strong></p><p>“We had the same kind of problems that DynamoDB had - how do you scale your database dealing with Internet-scale applications and have this virtual pool of infinite storage that can be scaled out.” Chris Hickman</p><p> </p><p>“This system and this technology went through many iterations.” Chris Hickman</p><p> </p><p>“You can’t have a 100% consistent state across everything. It’s just impossible. How do you do the right thing?” Chris Hickman</p><p> </p><p>“The big difference between DynamoDB and Leviathan...is the request router and partition metadata system living on the server vs. living out at the edge.” Jon Christen </p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Apr 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/b1d2fd4d/65bcb613.mp3" length="42623247" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2562</itunes:duration>
      <itunes:summary>This is the fifth and final episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode, we compare Viathan’s pre-cloud architecture to that of DynamoDB. They’re less different than you might expect!</itunes:summary>
      <itunes:subtitle>This is the fifth and final episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode, we compare Viathan’s pr</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 42 -  The Birth of NoSQL and DynamoDb – Part 4</title>
      <itunes:episode>107</itunes:episode>
      <podcast:episode>107</podcast:episode>
      <itunes:title>Replay of Ep 42 -  The Birth of NoSQL and DynamoDb – Part 4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">beb79d85-fa92-4396-913d-448711d6afa2</guid>
      <link>https://share.transistor.fm/s/4aa50225</link>
      <description>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>What’s under the hood of Amazon’s DynamoDB? Jon Christensen and Chris Hickman of Kelsus continue their discussion on DynamoDB, specifically about it’s architecture and components. They utilize a presentation from re:Invent titled, <em>Amazon DynamoDB Under the Hood: How we built a hyper-scale database</em>.</p><p>  </p><p>Some of the highlights of the show include:</p><ul><li>Partition keys and global secondary indexes determine how data is partitioned across a storage node; allows you to scale out, instead of up</li><li>Understand how a database is built to make architecture/component definitions less abstract</li><li>DynamoDB has four components:</li></ul><p>          1.   Request Router: Frontline service that receives and handles requests<br>          2.   Storage Node: Services responsible for persisting and retrieving data<br>          3.   Partition Metadata System: Keeps track of where data is located<br>          4.   Auto Admin: Handles housekeeping aspects to manage system</p><ul><li>What level of uptime availability do you want to guarantee?</li><li>Replication: Strongly Consistent vs. Eventually Consistent</li><li>Walkthrough of Workflow: What happens when, what does it mean when…</li><li>DynamoDB architecture and components are designed to improve speed and scalability</li><li>Split Partitions: Longer times that your database is up and the more data you put into it, the more likely you’re going to get a hot partition or partitions that are too big </li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://www.youtube.com/watch?v=yvBR71D0nAQ">Amazon DynamoDB Under the Hood: How we built a hyper-scale database</a></p><p><a href="https://en.wikipedia.org/wiki/Paxos_(computer_science)">Paxos Algorithm</a></p><p><a href="https://aws.amazon.com/s3/">Amazon S3</a></p><p><a href="https://aws.amazon.com/rds/">Amazon Relational Database Service (RDS)</a></p><p><a href="https://www.mongodb.com/">MongoDB</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p><p><strong>Quotes:</strong></p><p>“Keep in mind that data is partitioned across storage node, and that’s a key feature of being able to scale out, as opposed to scaling up.” Jon Christensen</p><p><br></p><p>“Amazon was opening up the kimono...how DynamoDB has been architected and constructed and how it works.” Chris Hickman</p><p><br></p><p>“Managed Service - they get to decide how it’s architected...because they also have to keep it up and live up to their SLA.” Chris Hickman</p><p><br></p><p>“The longer the time that your database is up and the more data you put into it, the more likely that you’re going to get a hot partition or partitions are just going to get too big.” Chris Hickman</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>What’s under the hood of Amazon’s DynamoDB? Jon Christensen and Chris Hickman of Kelsus continue their discussion on DynamoDB, specifically about it’s architecture and components. They utilize a presentation from re:Invent titled, <em>Amazon DynamoDB Under the Hood: How we built a hyper-scale database</em>.</p><p>  </p><p>Some of the highlights of the show include:</p><ul><li>Partition keys and global secondary indexes determine how data is partitioned across a storage node; allows you to scale out, instead of up</li><li>Understand how a database is built to make architecture/component definitions less abstract</li><li>DynamoDB has four components:</li></ul><p>          1.   Request Router: Frontline service that receives and handles requests<br>          2.   Storage Node: Services responsible for persisting and retrieving data<br>          3.   Partition Metadata System: Keeps track of where data is located<br>          4.   Auto Admin: Handles housekeeping aspects to manage system</p><ul><li>What level of uptime availability do you want to guarantee?</li><li>Replication: Strongly Consistent vs. Eventually Consistent</li><li>Walkthrough of Workflow: What happens when, what does it mean when…</li><li>DynamoDB architecture and components are designed to improve speed and scalability</li><li>Split Partitions: Longer times that your database is up and the more data you put into it, the more likely you’re going to get a hot partition or partitions that are too big </li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://www.youtube.com/watch?v=yvBR71D0nAQ">Amazon DynamoDB Under the Hood: How we built a hyper-scale database</a></p><p><a href="https://en.wikipedia.org/wiki/Paxos_(computer_science)">Paxos Algorithm</a></p><p><a href="https://aws.amazon.com/s3/">Amazon S3</a></p><p><a href="https://aws.amazon.com/rds/">Amazon Relational Database Service (RDS)</a></p><p><a href="https://www.mongodb.com/">MongoDB</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p><p><strong>Quotes:</strong></p><p>“Keep in mind that data is partitioned across storage node, and that’s a key feature of being able to scale out, as opposed to scaling up.” Jon Christensen</p><p><br></p><p>“Amazon was opening up the kimono...how DynamoDB has been architected and constructed and how it works.” Chris Hickman</p><p><br></p><p>“Managed Service - they get to decide how it’s architected...because they also have to keep it up and live up to their SLA.” Chris Hickman</p><p><br></p><p>“The longer the time that your database is up and the more data you put into it, the more likely that you’re going to get a hot partition or partitions are just going to get too big.” Chris Hickman</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Apr 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4aa50225/0d8871b5.mp3" length="41074843" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2465</itunes:duration>
      <itunes:summary>Welcome to Mobycast! This is the fourth episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode we finish our deep dive into the technical details of how AWS’s Dynamo DB works. If you’re just joining us at Mobycast, thanks for sticking with us through this five part series. By the end, you’ll be ready to join us on any of our other technical deep dives.</itunes:summary>
      <itunes:subtitle>Welcome to Mobycast! This is the fourth episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode we finish ou</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 41 -  The Birth of NoSQL and DynamoDb – Part 3</title>
      <itunes:episode>106</itunes:episode>
      <podcast:episode>106</podcast:episode>
      <itunes:title>Replay of Ep 41 -  The Birth of NoSQL and DynamoDb – Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e29f7daf-4afc-4920-931c-a3bb155977b2</guid>
      <link>https://share.transistor.fm/s/d880cb26</link>
      <description>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>Jon Christensen and Chris Hickman of Kelsus and Rich Staats of Secret Stache continue their discussion on the birth of NoSQL and DynamoDB. They examine DynamoDB’s architecture and popularity as a solution for Internet-scale databases. </p><p><br></p><p>Some of the highlights of the show include:</p><ul><li>Challenges, evolution, and reasons associated with Internet-scale data</li><li>DynamoDB has been around a long time, but people are finally using it</li><li>DynamoDB and MongoDB are document or key value stores that offer scalability and event-driven programming to reduce complexity</li><li>Techniques for keeping NoSQL database’s replicated data in sync</li><li>Importance of indexes to understand query patterns</li><li>DynamoDB’s Table Concept: Collection of documents/key value items; must have partition key to uniquely identify items in table and determine data distribution</li><li>Sort keys create indexes (i.e. global/local secondary index) to support items within partitioning </li><li>Query a DynamoDB database based on what’s being stored and using keys; conduct analysis on queries to determine their effectiveness</li></ul><p><br></p><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://en.wikipedia.org/wiki/NoSQL">NoSQL</a></p><p><a href="https://www.mongodb.com/">MongoDB</a></p><p><a href="https://www.groupon.com/">Groupon</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://www.postgresql.org/">PostgreSQL</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p><p>Quotes:</p><p><br></p><p>“Kind of what drove this evolution from SQL to NoSQL - realizing that the constraints were now different, the economics of the resources that were being used.” Chris Hickman</p><p><br></p><p>“People are realizing that Dynamo is not an ugly stepchild.” Jon Christensen</p><p><br></p><p>“Event-driven programming...it’s very popular, and it’s going to become even more popular.” Chris Hickman</p><p><br></p><p><strong>End Song</strong></p><p><a href="https://nofussrecords.bandcamp.com/album/benirr-s-nights">Benirrás Nights by Roy England ft. Dovetracks</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>Jon Christensen and Chris Hickman of Kelsus and Rich Staats of Secret Stache continue their discussion on the birth of NoSQL and DynamoDB. They examine DynamoDB’s architecture and popularity as a solution for Internet-scale databases. </p><p><br></p><p>Some of the highlights of the show include:</p><ul><li>Challenges, evolution, and reasons associated with Internet-scale data</li><li>DynamoDB has been around a long time, but people are finally using it</li><li>DynamoDB and MongoDB are document or key value stores that offer scalability and event-driven programming to reduce complexity</li><li>Techniques for keeping NoSQL database’s replicated data in sync</li><li>Importance of indexes to understand query patterns</li><li>DynamoDB’s Table Concept: Collection of documents/key value items; must have partition key to uniquely identify items in table and determine data distribution</li><li>Sort keys create indexes (i.e. global/local secondary index) to support items within partitioning </li><li>Query a DynamoDB database based on what’s being stored and using keys; conduct analysis on queries to determine their effectiveness</li></ul><p><br></p><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://en.wikipedia.org/wiki/NoSQL">NoSQL</a></p><p><a href="https://www.mongodb.com/">MongoDB</a></p><p><a href="https://www.groupon.com/">Groupon</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://www.postgresql.org/">PostgreSQL</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p><p>Quotes:</p><p><br></p><p>“Kind of what drove this evolution from SQL to NoSQL - realizing that the constraints were now different, the economics of the resources that were being used.” Chris Hickman</p><p><br></p><p>“People are realizing that Dynamo is not an ugly stepchild.” Jon Christensen</p><p><br></p><p>“Event-driven programming...it’s very popular, and it’s going to become even more popular.” Chris Hickman</p><p><br></p><p><strong>End Song</strong></p><p><a href="https://nofussrecords.bandcamp.com/album/benirr-s-nights">Benirrás Nights by Roy England ft. Dovetracks</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Apr 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d880cb26/125e88be.mp3" length="30103184" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>1780</itunes:duration>
      <itunes:summary>Welcome to Mobycast! This is the third episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode we start to dive into the technical details of how AWS’s Dynamo DB works. If you’re just joining us at Mobycast, this will be your first taste of getting technical with us as we ease you into our library of curated, important cloud-native development topics.</itunes:summary>
      <itunes:subtitle>Welcome to Mobycast! This is the third episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. In this episode we start to d</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 40 -  The Birth of NoSQL and DynamoDb – Part 2</title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>Replay of Ep 40 -  The Birth of NoSQL and DynamoDb – Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ec664c63-e1fa-470f-9d6b-eb2d9da6e720</guid>
      <link>https://share.transistor.fm/s/34e4e86e</link>
      <description>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>Jon Christensen and Rich Staats learn about Chris Hickman’s first venture-backed startup (circa 1998) and its goal to build a database for Internet-scale applications. His story highlights what software is all about – history repeating itself because technology/software is meant to solve problems via new tools, techniques, and bigger challenges at bigger scales.</p><p><strong>Some of the highlights of the show include:</strong></p><ul><li>Why Chris left Microsoft and how much it cost him; yet, he has no regrets</li><li>Chris’s concept addressed how to build a scalable database layer; how to partition, chart, and cluster; and how to make it highly available and a completely scale-out architecture</li><li>Chris couldn’t use the code he had created for it while at Microsoft; but from that, he  learned what he wouldn’t do again</li><li>Chris let the file system be the database at Microsoft, and the project was named, Internet File Store (IFS); it used backend code and was similar to S3</li><li>Chris named his startup Viathan; had to do copyright, trademark, and domain name searches</li><li>Data for the Microsoft project could be stored in files/XML documents; Viathan took a different approach and used relational databases instead of a file system</li><li>Companies experienced problems at the beginning of the Internet; rest of ecosystem wasn’t developed and there weren’t enough people needing Internet solutions yet</li><li>Viathan went through several iterations that led to patents being issued and being considered as Prior art</li><li>Viathan’s technology couldn’t just be plugged in and turned on, applications had to be modified – a tough sell</li><li>Chris did groundbreaking work for what would become DynamoDB<p></p></li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://www.youtube.com/watch?v=femopq3JWJg">AWS re:Invent 2018 – Keynote with Werner Vogels</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/deepracer/">DeepRacer</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://americanliterature.com/author/herman-melville/book/moby-dick-or-the-whale/summary">Moby Dick</a></p><p><a href="https://www.mongodb.com/blog/post/multi-document-transactions-in-mongodb">MongoDB Acid Compliance</a></p><p><a href="https://en.wikipedia.org/wiki/Prior_art">Prior Art</a></p><p><a href="https://kelsus.com/">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Show Details<br></strong><br></p><p>Jon Christensen and Rich Staats learn about Chris Hickman’s first venture-backed startup (circa 1998) and its goal to build a database for Internet-scale applications. His story highlights what software is all about – history repeating itself because technology/software is meant to solve problems via new tools, techniques, and bigger challenges at bigger scales.</p><p><strong>Some of the highlights of the show include:</strong></p><ul><li>Why Chris left Microsoft and how much it cost him; yet, he has no regrets</li><li>Chris’s concept addressed how to build a scalable database layer; how to partition, chart, and cluster; and how to make it highly available and a completely scale-out architecture</li><li>Chris couldn’t use the code he had created for it while at Microsoft; but from that, he  learned what he wouldn’t do again</li><li>Chris let the file system be the database at Microsoft, and the project was named, Internet File Store (IFS); it used backend code and was similar to S3</li><li>Chris named his startup Viathan; had to do copyright, trademark, and domain name searches</li><li>Data for the Microsoft project could be stored in files/XML documents; Viathan took a different approach and used relational databases instead of a file system</li><li>Companies experienced problems at the beginning of the Internet; rest of ecosystem wasn’t developed and there weren’t enough people needing Internet solutions yet</li><li>Viathan went through several iterations that led to patents being issued and being considered as Prior art</li><li>Viathan’s technology couldn’t just be plugged in and turned on, applications had to be modified – a tough sell</li><li>Chris did groundbreaking work for what would become DynamoDB<p></p></li></ul><p><strong>Links and Resources</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://www.youtube.com/watch?v=femopq3JWJg">AWS re:Invent 2018 – Keynote with Werner Vogels</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/deepracer/">DeepRacer</a></p><p><a href="https://www.json.org/">JSON</a></p><p><a href="https://americanliterature.com/author/herman-melville/book/moby-dick-or-the-whale/summary">Moby Dick</a></p><p><a href="https://www.mongodb.com/blog/post/multi-document-transactions-in-mongodb">MongoDB Acid Compliance</a></p><p><a href="https://en.wikipedia.org/wiki/Prior_art">Prior Art</a></p><p><a href="https://kelsus.com/">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Mar 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/34e4e86e/673fcc53.mp3" length="32101981" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2003</itunes:duration>
      <itunes:summary>Welcome to Mobycast! This is the second episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. You’ll get to see how his work in the early 2000’s/late 90’s was instrumental to what later became the databases that we count on today. Anyway, the reason that you should listen to this is not because it’s a fun story but because we’re asking you to trust us here at Mobycast when we tell you what we think is the best way to do distributed systems and cloud-native development, and what better way to learn to trust us than to listen to how Chris got started in this whole world…</itunes:summary>
      <itunes:subtitle>Welcome to Mobycast! This is the second episode that we’re re-releasing from back when we told Chris’s personal story of starting Viathan, which was a software startup built to create one of the first internet scale databases. You’ll get to see how his wo</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 39 -  The Birth of NoSQL and DynamoDB</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>Replay of Ep 39 -  The Birth of NoSQL and DynamoDB</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6c5e579a-79e8-4492-bb6c-c4430dad4a51</guid>
      <link>https://share.transistor.fm/s/4ca7dbc7</link>
      <description>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache offer a history lesson on the unique challenges of data at “Internet scale” that gave birth to NoSQL and DynamoDB. How did AWS get to where it is with DynamoDB? And, what is AWS doing now? </p><p><br></p><p>Some of the highlights of the show include:</p><ul><li>Werner’s Worst day at Amazon: Database system crashes during Super Saver Shipping</li><li>Amazon strives to prevent problems that it knows will happen again by realizing relational database management systems aren’t built/designed for the Internet/Cloud</li><li>Internet: Scale up vs. scale out via databases or servers; statefulness of databases prevents easy scalability</li><li>Need sharding and partitioning of data to have clusters that can be scaled up individually</li><li>Amazon’s Aha Moment: Realization that 90% of data accessed was simplistic, rather than relational; same thing happened at Microsoft - recall the Internet Tidal Wave memo?</li><li>Challenge of building applications using CGI bin when Internet was brand new</li><li>Solution: Build your own Internet database; optimize for scalability </li></ul><p><strong>Links</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://en.wikipedia.org/wiki/NoSQL">NoSQL</a></p><p><a href="https://www.youtube.com/watch?v=ZOIkOnW640A">AWS re:Invent 2018 - Keynote with Andy Jassy</a></p><p><a href="https://www.youtube.com/watch?v=femopq3JWJg">AWS re:Invent 2018 - Keynote with Werner Vogels</a></p><p><a href="https://www.oracle.com/database/technologies/">Oracle Database</a></p><p><a href="http://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/">Bill Gates’ Internet Tidal Wave</a></p><p><a href="https://en.wikipedia.org/wiki/Common_Gateway_Interface">CGI Bin</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br><strong><br>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/album/whisper-in-a-dream-feat-fatima-lily">Whisper in a Dream by Uskmatu</a></p><p><br></p><p><strong>More Info</strong></p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache offer a history lesson on the unique challenges of data at “Internet scale” that gave birth to NoSQL and DynamoDB. How did AWS get to where it is with DynamoDB? And, what is AWS doing now? </p><p><br></p><p>Some of the highlights of the show include:</p><ul><li>Werner’s Worst day at Amazon: Database system crashes during Super Saver Shipping</li><li>Amazon strives to prevent problems that it knows will happen again by realizing relational database management systems aren’t built/designed for the Internet/Cloud</li><li>Internet: Scale up vs. scale out via databases or servers; statefulness of databases prevents easy scalability</li><li>Need sharding and partitioning of data to have clusters that can be scaled up individually</li><li>Amazon’s Aha Moment: Realization that 90% of data accessed was simplistic, rather than relational; same thing happened at Microsoft - recall the Internet Tidal Wave memo?</li><li>Challenge of building applications using CGI bin when Internet was brand new</li><li>Solution: Build your own Internet database; optimize for scalability </li></ul><p><strong>Links</strong></p><p><a href="https://aws.amazon.com/">AWS</a></p><p><a href="https://reinvent.awsevents.com/">re:Invent</a></p><p><a href="https://aws.amazon.com/dynamodb/">DynamoDB</a></p><p><a href="https://en.wikipedia.org/wiki/NoSQL">NoSQL</a></p><p><a href="https://www.youtube.com/watch?v=ZOIkOnW640A">AWS re:Invent 2018 - Keynote with Andy Jassy</a></p><p><a href="https://www.youtube.com/watch?v=femopq3JWJg">AWS re:Invent 2018 - Keynote with Werner Vogels</a></p><p><a href="https://www.oracle.com/database/technologies/">Oracle Database</a></p><p><a href="http://thisdayintechhistory.com/05/26/bill-gates-internet-tidal-wave/">Bill Gates’ Internet Tidal Wave</a></p><p><a href="https://en.wikipedia.org/wiki/Common_Gateway_Interface">CGI Bin</a></p><p><a href="https://kelsus.com">Kelsus</a></p><p><a href="https://www.secretstache.com/">Secret Stache Media</a></p><p><br><strong><br>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/album/whisper-in-a-dream-feat-fatima-lily">Whisper in a Dream by Uskmatu</a></p><p><br></p><p><strong>More Info</strong></p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Mar 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4ca7dbc7/500204b4.mp3" length="33321300" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/OyOUS2iRwV3bZxNJWG2FaQAdbCJZSyUV_KkWBqo3_Ek/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzIyMDA0MS8x/NTg0NDc0NjI3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1981</itunes:duration>
      <itunes:summary>We present to you a remastered and re-released version of one of our early shows from 2018. It was one of our most popular shows of all time, and in it, Chris Hickman recounts his story of being a Microsoft employee dealing with issues of internet scaling in the late 90s to becoming one of the pioneers of NoSQL. Listen to this series to get to know Chris. These are the formative years of the guy who made Mobycast possible with his incredible depth and breadth of development experience.</itunes:summary>
      <itunes:subtitle>We present to you a remastered and re-released version of one of our early shows from 2018. It was one of our most popular shows of all time, and in it, Chris Hickman recounts his story of being a Microsoft employee dealing with issues of internet scaling</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replay of Ep 14. Stop Worrying About Cloud Lock-in</title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Replay of Ep 14. Stop Worrying About Cloud Lock-in</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c1a29f5-06d7-46f8-b763-3c9229a5a560</guid>
      <link>https://share.transistor.fm/s/ddf63d6d</link>
      <description>
        <![CDATA[<p><strong>Original Show Notes:</strong><br>At the recent Gluecon event, a popular topic centered around how to prevent Cloud Lock-in. Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss why you your time is better spent focusing on one cloud provider. If/when Cloud Lock-in becomes an issue, you will have the resources to deal with it.</p><p><strong>Some of the highlights of the show include:</strong></p><ul><li>AWS Fargate is ‘serverless ECS’. You don’t need to manage your own cluster nodes. This sounds great, but we’ve found the overhead of managing your own cluster to be minimal. Fargate is more expensive than ECS, and you have greater control if you manage your own cluster.</li><li>Cloud lock-in was a huge concern among people at Gluecon 2018. People from large companies talked about ‘being burned’ in the past with vendor lock-in. The likely risks are (1) price gouging and (2) vendors going out of business.</li><li>Cloud allows people to deploy faster and more cheaply than running their own hardware, as long as you don’t have huge scale. Few businesses get large enough to need their own data center on-prem to save money.</li><li>Small and startup companies often start off in the Cloud. Big companies often have their own data centers and they are now migrating to the Cloud.</li><li>AWS does allow you to run their software in your own data center, but this ties you to AWS.</li><li>There is huge complication and risk to architecting a system to run in multiple cloud environments, and it almost certainly wouldn’t run optimally in all clouds.</li><li>We think the risk of AWS hiking prices drastically, or going out of business, is essentially zero.</li><li>If you were building a microservice-based multi-cloud system, some of the difficulties include: Which cloud hosts the database? How do I spread my services across 2 clouds? What about latency between cloud providers networks? How do I maintain security? How do I staff people who are experts at operating in both clouds?</li><li>It’s clear that lock-in is a real fear for many companies, regardless of our opinion that it shouldn’t be such a concern.</li><li>Jon thinks the fear of lock-in may drive cloud providers toward standardization; Chris thinks AWS doesn’t have a compelling reason to standardize since they’re the industry leader.</li><li>Our advice: as a small or medium size company, don’t worry about cloud lock in. If you get big enough that it’s really a concern, we recommend building abstractions for the provider-specific parts of your system, and having a backup of your system ready to run in a 2nd cloud provider, but don’t try to run them concurrently.</li></ul><p><strong>Links and Resources</strong></p><ul><li><a href="https://kelsus.com/">Kelsus</a></li><li><a href="https://www.secretstache.com/">Secret Stache Media</a></li><li><a href="https://aws.amazon.com/fargate/">AWS Fargate</a></li><li><a href="https://reinvent.awsevents.com/">re:Invent</a></li><li><a href="http://gluecon.com/">Gluecon</a></li><li><a href="https://kubernetes.io/">Kubernetes</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Original Show Notes:</strong><br>At the recent Gluecon event, a popular topic centered around how to prevent Cloud Lock-in. Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss why you your time is better spent focusing on one cloud provider. If/when Cloud Lock-in becomes an issue, you will have the resources to deal with it.</p><p><strong>Some of the highlights of the show include:</strong></p><ul><li>AWS Fargate is ‘serverless ECS’. You don’t need to manage your own cluster nodes. This sounds great, but we’ve found the overhead of managing your own cluster to be minimal. Fargate is more expensive than ECS, and you have greater control if you manage your own cluster.</li><li>Cloud lock-in was a huge concern among people at Gluecon 2018. People from large companies talked about ‘being burned’ in the past with vendor lock-in. The likely risks are (1) price gouging and (2) vendors going out of business.</li><li>Cloud allows people to deploy faster and more cheaply than running their own hardware, as long as you don’t have huge scale. Few businesses get large enough to need their own data center on-prem to save money.</li><li>Small and startup companies often start off in the Cloud. Big companies often have their own data centers and they are now migrating to the Cloud.</li><li>AWS does allow you to run their software in your own data center, but this ties you to AWS.</li><li>There is huge complication and risk to architecting a system to run in multiple cloud environments, and it almost certainly wouldn’t run optimally in all clouds.</li><li>We think the risk of AWS hiking prices drastically, or going out of business, is essentially zero.</li><li>If you were building a microservice-based multi-cloud system, some of the difficulties include: Which cloud hosts the database? How do I spread my services across 2 clouds? What about latency between cloud providers networks? How do I maintain security? How do I staff people who are experts at operating in both clouds?</li><li>It’s clear that lock-in is a real fear for many companies, regardless of our opinion that it shouldn’t be such a concern.</li><li>Jon thinks the fear of lock-in may drive cloud providers toward standardization; Chris thinks AWS doesn’t have a compelling reason to standardize since they’re the industry leader.</li><li>Our advice: as a small or medium size company, don’t worry about cloud lock in. If you get big enough that it’s really a concern, we recommend building abstractions for the provider-specific parts of your system, and having a backup of your system ready to run in a 2nd cloud provider, but don’t try to run them concurrently.</li></ul><p><strong>Links and Resources</strong></p><ul><li><a href="https://kelsus.com/">Kelsus</a></li><li><a href="https://www.secretstache.com/">Secret Stache Media</a></li><li><a href="https://aws.amazon.com/fargate/">AWS Fargate</a></li><li><a href="https://reinvent.awsevents.com/">re:Invent</a></li><li><a href="http://gluecon.com/">Gluecon</a></li><li><a href="https://kubernetes.io/">Kubernetes</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Mar 2020 14:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ddf63d6d/c357a009.mp3" length="28012420" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/WHUPDTnywEh53l8wloG21NCXIFpfQKAeUunrHv41pts/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzIxNjU4Mi8x/NTgzOTM3Nzc3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1649</itunes:duration>
      <itunes:summary>Cloud lock-in is always fun to talk about. Conversations abound on Twitter, at conferences, and by the water cooler. This week we replay an early episode from June 13, 2018 to see if our opinions on cloud lock-in have changed in the past two years.  Spoiler alert: they haven't.</itunes:summary>
      <itunes:subtitle>Cloud lock-in is always fun to talk about. Conversations abound on Twitter, at conferences, and by the water cooler. This week we replay an early episode from June 13, 2018 to see if our opinions on cloud lock-in have changed in the past two years.  Spoil</itunes:subtitle>
      <itunes:keywords>aws, ecs, fargate, cloud, lock-in</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Learn cloud native software development by podcast</title>
      <itunes:title>Learn cloud native software development by podcast</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">1f4ea56c-2a15-4041-baaa-41632927a0ff</guid>
      <link>https://share.transistor.fm/s/6814346a</link>
      <description>
        <![CDATA[<p>Start with <a href="https://mobycast.fm/episode/the-birth-of-nosql-and-dynamodb/"><strong>39. The Birth of NoSQL and DynamoDB – Part 1</strong></a><strong>.</strong></p><p>If you like that one, finish the five part series. </p><p>If you still want more? Ask me for advice. I'll tell you what are the next best ones at jon@mobycast.fm.<strong><br></strong><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Start with <a href="https://mobycast.fm/episode/the-birth-of-nosql-and-dynamodb/"><strong>39. The Birth of NoSQL and DynamoDB – Part 1</strong></a><strong>.</strong></p><p>If you like that one, finish the five part series. </p><p>If you still want more? Ask me for advice. I'll tell you what are the next best ones at jon@mobycast.fm.<strong><br></strong><br></p>]]>
      </content:encoded>
      <pubDate>Sun, 08 Mar 2020 20:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/6814346a/f815814a.mp3" length="2211896" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>135</itunes:duration>
      <itunes:summary>You can learn how to be a great software developer by listening to this podcast. Get to know Chris and Jon by listening to our personal story, and continue from there into topics ranging from serverless to Docker to networking, encryption, and purpose built databases. We cover all the concepts great web application developers are expected to know.</itunes:summary>
      <itunes:subtitle>You can learn how to be a great software developer by listening to this podcast. Get to know Chris and Jon by listening to our personal story, and continue from there into topics ranging from serverless to Docker to networking, encryption, and purpose bui</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Automate all the things - Updating container secrets using CloudWatch Events + Lambda</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>Automate all the things - Updating container secrets using CloudWatch Events + Lambda</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">18ed553e-2de5-4b0b-8ece-917f4d0f62de</guid>
      <link>https://share.transistor.fm/s/c9a1108b</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Developing a system for automatically updating containers when secrets are updated is a two-part solution. First, we need to be notified when secrets are updated. Then, we need to trigger an action to update the ECS service.</li><li>CloudWatch Events can be used to receive notifications when secrets are updated. We explain CloudWatch Events and its primary components: events, rules and targets.</li><li>Event patterns are used to filter for the specific events that the rule cares about. We discuss how to write event patterns and the rules of matching events.</li><li>The event data structure will be different for each type of emitter. We detail a handy tip for determining the event structure of an emitter.</li><li>We discuss EventBridge and how it relates to CloudWatch Events.</li><li>We explain how to create CloudWatch Event rules for capturing update events emitted by both Systems Manager Parameter Store and AWS Secrets Manager.</li><li>AWS Lambda can be leveraged as a trigger of CloudWatch Events. We explain how to develop a Lambda function that invokes the ECS API to recycle all containers.</li><li>We finish up by showing how this works for a common use case: using the automatic credential rotation feature of AWS Secrets Manager with a containerized app running on ECS that connects to a RDS database.</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/night-sea-journey">Night Sea Journey by Derek Russo<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/102">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Developing a system for automatically updating containers when secrets are updated is a two-part solution. First, we need to be notified when secrets are updated. Then, we need to trigger an action to update the ECS service.</li><li>CloudWatch Events can be used to receive notifications when secrets are updated. We explain CloudWatch Events and its primary components: events, rules and targets.</li><li>Event patterns are used to filter for the specific events that the rule cares about. We discuss how to write event patterns and the rules of matching events.</li><li>The event data structure will be different for each type of emitter. We detail a handy tip for determining the event structure of an emitter.</li><li>We discuss EventBridge and how it relates to CloudWatch Events.</li><li>We explain how to create CloudWatch Event rules for capturing update events emitted by both Systems Manager Parameter Store and AWS Secrets Manager.</li><li>AWS Lambda can be leveraged as a trigger of CloudWatch Events. We explain how to develop a Lambda function that invokes the ECS API to recycle all containers.</li><li>We finish up by showing how this works for a common use case: using the automatic credential rotation feature of AWS Secrets Manager with a containerized app running on ECS that connects to a RDS database.</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/night-sea-journey">Night Sea Journey by Derek Russo<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/102">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Mar 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/c9a1108b/c4416a07.mp3" length="65577000" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>4095</itunes:duration>
      <itunes:summary>Back in episode #94 of Mobycast, we showed how Amazon Elastic Container Service (or ECS) makes it easy to inject sensitive data into your containers.

However, ECS only injects secrets at container startup. It's up to you to ensure that the container is restarted if secrets are updated. But who wants to manually restart containers?

In this episode of Mobycast, Jon and Chris are back to provide an automated solution to this problem. We show you step-by-step how to leverage CloudWatch Events and Lambda to automatically update your container secrets. After listening, you'll be able to "automate all things". Well... at least for updating container secrets :-).</itunes:summary>
      <itunes:subtitle>Back in episode #94 of Mobycast, we showed how Amazon Elastic Container Service (or ECS) makes it easy to inject sensitive data into your containers.

However, ECS only injects secrets at container startup. It's up to you to ensure that the container is</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, containers, Elastic Container Service, ECS, Secrets Manager, Systems Manager, Parameter Store, CloudWatch, CloudWatch events</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Database Soup - Explaining ACID, BASE, CAP - Part 3</title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Database Soup - Explaining ACID, BASE, CAP - Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4df4ede3-db59-4eeb-8337-e253e64b727e</guid>
      <link>https://share.transistor.fm/s/a48d7744</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act III: Eventual consistency saves the web (circa early 2000s)".</li><li>We explain eventual consistency and the motivation behind the philosophy.</li><li>The BASE acronym stands for three key properties of a distributed system that utilizes eventual consistency. We define and explain these BASE attributes:</li><li>Basically available</li><li>Soft state</li><li>Eventual consistency</li><li>We share the story of Werner Vogel's keynote at re:Invent 2018, where he outlined the reasons why DynamoDB was created. In particular, DynamoDB allows for an eventual consistency data model.</li><li>Interestingly, the DynamoDB story closely parallels what happened when Chris was at Microsoft. It just happened at least 6 years earlier.</li><li>We then wrap up everything we have learned about ACID, CAP, and BASE by providing some guidelines on when to choose ACID vs. BASE systems.</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/whisper-in-a-dream-feathericci-remix">Whisper In A Dream (Feathericci Remix) by Uskmatu<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/101">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act III: Eventual consistency saves the web (circa early 2000s)".</li><li>We explain eventual consistency and the motivation behind the philosophy.</li><li>The BASE acronym stands for three key properties of a distributed system that utilizes eventual consistency. We define and explain these BASE attributes:</li><li>Basically available</li><li>Soft state</li><li>Eventual consistency</li><li>We share the story of Werner Vogel's keynote at re:Invent 2018, where he outlined the reasons why DynamoDB was created. In particular, DynamoDB allows for an eventual consistency data model.</li><li>Interestingly, the DynamoDB story closely parallels what happened when Chris was at Microsoft. It just happened at least 6 years earlier.</li><li>We then wrap up everything we have learned about ACID, CAP, and BASE by providing some guidelines on when to choose ACID vs. BASE systems.</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/whisper-in-a-dream-feathericci-remix">Whisper In A Dream (Feathericci Remix) by Uskmatu<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/101">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Feb 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a48d7744/7db09297.mp3" length="47431056" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2961</itunes:duration>
      <itunes:summary>This week on Mobycast, Jon and Chris conclude their multi-part series on "database soup", where we make sense of the jumbled acronyms of consistency models.

In this episode, we learn about eventual consistency and the BASE properties. Eventual consistency may sound like a beer guy meme - "I am not always consistent, but when I am, I get there eventually.". But it's no joke - eventual consistency is a key technique for scaling systems, and it's important to know what it is and when to use it.

We finish up by summarizing what we have learned about ACID and BASE and knowing the tradeoffs each makes. Afterwards, you'll no longer confuse consistency models with the pH scale of your high school chemistry class.</itunes:summary>
      <itunes:subtitle>This week on Mobycast, Jon and Chris conclude their multi-part series on "database soup", where we make sense of the jumbled acronyms of consistency models.

In this episode, we learn about eventual consistency and the BASE properties. Eventual consiste</itunes:subtitle>
      <itunes:keywords>database consistency model, ACID, BASE, CAP theorem, eventual consistency </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Database Soup - Explaining ACID, BASE, CAP - Part 2</title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>Database Soup - Explaining ACID, BASE, CAP - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e217ccdc-2c19-427e-a795-f742a6934d17</guid>
      <link>https://share.transistor.fm/s/d48fbb63</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act II: The arrival of the Internet creates new challenges (circa 1998)".</li><li>Problems with building large scale-out systems led to the "discovery" of the CAP theorem (by Eric Brewer of Inktomi). We explain what the CAP theorem postulates and break it down in understandable terms.</li><li>The three properties of the CAP theorem are consistency, availability and partition tolerance. What exactly is meant by "partition tolerance"?</li><li>A key implication of the CAP theorem is that must choose your priorities. As a system scales, it cannot be both available and consistent.</li><li>We discuss Physalia, a technology developed by AWS for making Elastic Block Service (EBS) more resilient. The design of Physalia was inspired by the principles of the CAP theorem.</li><li>We then take a personal story detour that is (mostly) related to the CAP theorem. It turns out, Eric Brewer and Chris share a common experience during the first Internet bubble.</li></ul><p><strong>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><br><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/disruption">Disruption by Miquel Salla<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/100">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act II: The arrival of the Internet creates new challenges (circa 1998)".</li><li>Problems with building large scale-out systems led to the "discovery" of the CAP theorem (by Eric Brewer of Inktomi). We explain what the CAP theorem postulates and break it down in understandable terms.</li><li>The three properties of the CAP theorem are consistency, availability and partition tolerance. What exactly is meant by "partition tolerance"?</li><li>A key implication of the CAP theorem is that must choose your priorities. As a system scales, it cannot be both available and consistent.</li><li>We discuss Physalia, a technology developed by AWS for making Elastic Block Service (EBS) more resilient. The design of Physalia was inspired by the principles of the CAP theorem.</li><li>We then take a personal story detour that is (mostly) related to the CAP theorem. It turns out, Eric Brewer and Chris share a common experience during the first Internet bubble.</li></ul><p><strong>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><br><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/disruption">Disruption by Miquel Salla<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/100">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Feb 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d48fbb63/1e43ff9d.mp3" length="43686779" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2727</itunes:duration>
      <itunes:summary>This is part 2 of our three-part series where we make sense of the alphabet soup of acronyms for database consistency models.

In this episode of Mobycast, we learn how the explosion of the Internet created new challenges for strongly consistent systems, leading to the "discovery" of the CAP theorem. The CAP theorem reminds us that as systems scale, errors will become more likely, forcing us to choose our priorities.

We also learn what Chris shares in common with Eric Brewer, the creator of the CAP theorem. It's a roller coaster ride that comes to a crashing halt.</itunes:summary>
      <itunes:subtitle>This is part 2 of our three-part series where we make sense of the alphabet soup of acronyms for database consistency models.

In this episode of Mobycast, we learn how the explosion of the Internet created new challenges for strongly consistent systems</itunes:subtitle>
      <itunes:keywords>Database consistency model, ACID, CAP, BASE, CAP theorem, consistency, availability, partition tolerance network partition, Eric Brewer, Inkomi </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Database Soup - Explaining ACID, BASE, CAP - Part 1 </title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>Database Soup - Explaining ACID, BASE, CAP - Part 1 </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60c99b07-123c-4ca2-93a2-b55ff9696e91</guid>
      <link>https://share.transistor.fm/s/72ef2153</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act I: Transaction processing (circa 1973)".</li><li>We start with the motivation behind talking about database soup - why are ACID, CAP, and BASE important to understand?</li><li>We define transaction processing and its origins. What exactly is a "transaction"?</li><li>Transactions are governed by ACID semantics. We define and explain the four characteristics of the ACID acronym::</li><li>Atomicity</li><li>Consistency</li><li>Isolation</li><li>Durability</li><li>The computer scientist, Jim Gray, came up with the idea of ACID semantics in the late 1970's. We discuss some of the history behind this, along with a bizarre and tragic ending to his story.</li><li>We also share a personal story about another important player in transaction processing, Phil Bernstein.</li></ul><p><strong>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><br><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/talcum">Talcum by Lost Lake<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/99">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>In this new series, we are discussing database consistency models explained in three acts. This episode is "Act I: Transaction processing (circa 1973)".</li><li>We start with the motivation behind talking about database soup - why are ACID, CAP, and BASE important to understand?</li><li>We define transaction processing and its origins. What exactly is a "transaction"?</li><li>Transactions are governed by ACID semantics. We define and explain the four characteristics of the ACID acronym::</li><li>Atomicity</li><li>Consistency</li><li>Isolation</li><li>Durability</li><li>The computer scientist, Jim Gray, came up with the idea of ACID semantics in the late 1970's. We discuss some of the history behind this, along with a bizarre and tragic ending to his story.</li><li>We also share a personal story about another important player in transaction processing, Phil Bernstein.</li></ul><p><strong>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><br><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/talcum">Talcum by Lost Lake<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/99">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/72ef2153/496be279.mp3" length="41293787" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2479</itunes:duration>
      <itunes:summary>Databases are one of the fundamental building blocks for cloud-native apps. And with so many types of databases to choose from, it's important to understand their consistency models so that we can make smart choices.

But with acronyms such as ACID and BASE, making sense of them can feel like swimming in a big bowl of database soup. Spoiler alert, they have nothing to do with high school chemistry class.

In this episode of Mobycast, Jon and Chris kick off a three-part series where we dive deep on this database soup. In part 1, we learn about transaction processing, the ACID acronym and say hello to strong consistency.</itunes:summary>
      <itunes:subtitle>Databases are one of the fundamental building blocks for cloud-native apps. And with so many types of databases to choose from, it's important to understand their consistency models so that we can make smart choices.

But with acronyms such as ACID and </itunes:subtitle>
      <itunes:keywords>Database consistancy model, ACID, CAP, BASE, transaction processing, strong consistency, relational database, atomicity, Jim Gray, Phil Bernstein</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Your Most Important Skill</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>Your Most Important Skill</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">082d592e-f4e7-4473-8ea0-7b717b9383cd</guid>
      <link>https://share.transistor.fm/s/2a2c706c</link>
      <description>
        <![CDATA[<p>Oh by the way, buy girl scout cookies from my daughter here! <a href="https://digitalcookie.girlscouts.org/scout/alana218283?fbclid=IwAR2hYWVhMOVMSojF7PUTyC0IH78nNsKTTQSyVhIWn3Su6-bOSu2vjNuWHfU">GIRL SCOUT COOKIEEEEES!</a></p><p>In this episode, we cover the following topics:</p><ul><li>Technology is changing at an increasing rate, with a constant stream of new things to learn. We discuss how innovation has changed the rules of the game.</li><li>"Life moves pretty fast. If you don't stop and look around once in a while, you could miss it." - Ferris Bueller</li><li>Chris recounts a personal story that emphasizes the importance of continual learning and growth.</li><li>During preparation for a previous Mobycast mini-series, he relies on a trusted solution pattern for accessing private subnets.</li><li>But during final fact checking, he discovers entirely new options that may be better/easier solutions.</li><li>We break down some important lessons learned from this experience.</li><li>Why do we think the following Stephen King quote is sage advice for all of us?</li><li>"Kill your darlings, kill your darlings, even when it breaks your egocentric little scribbler’s heart, kill your darlings."</li><li>We then turn our attention to discussing what is your most important skill.</li><li>What is it?</li><li>How can you cultivate it?</li><li>Why does this matter?</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://royengland.bandcamp.com/album/disco-pigs">Disco Pigs (Rave Mix) by Roy England<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/98">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Oh by the way, buy girl scout cookies from my daughter here! <a href="https://digitalcookie.girlscouts.org/scout/alana218283?fbclid=IwAR2hYWVhMOVMSojF7PUTyC0IH78nNsKTTQSyVhIWn3Su6-bOSu2vjNuWHfU">GIRL SCOUT COOKIEEEEES!</a></p><p>In this episode, we cover the following topics:</p><ul><li>Technology is changing at an increasing rate, with a constant stream of new things to learn. We discuss how innovation has changed the rules of the game.</li><li>"Life moves pretty fast. If you don't stop and look around once in a while, you could miss it." - Ferris Bueller</li><li>Chris recounts a personal story that emphasizes the importance of continual learning and growth.</li><li>During preparation for a previous Mobycast mini-series, he relies on a trusted solution pattern for accessing private subnets.</li><li>But during final fact checking, he discovers entirely new options that may be better/easier solutions.</li><li>We break down some important lessons learned from this experience.</li><li>Why do we think the following Stephen King quote is sage advice for all of us?</li><li>"Kill your darlings, kill your darlings, even when it breaks your egocentric little scribbler’s heart, kill your darlings."</li><li>We then turn our attention to discussing what is your most important skill.</li><li>What is it?</li><li>How can you cultivate it?</li><li>Why does this matter?</li></ul><p><strong><br>Detailed Show Notes</strong></p><p>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast</strong></p><p><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a></p><p><strong>End Song</strong></p><p><a href="https://royengland.bandcamp.com/album/disco-pigs">Disco Pigs (Rave Mix) by Roy England<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/98">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 05 Feb 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/2a2c706c/e2df535d.mp3" length="59103905" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3592</itunes:duration>
      <itunes:summary>Technology is changing rapidly and it is a major investment to learn a new skill, technique or technology. Our knowledge gained is so hard fought that it is only natural to rely on it dearly.

But it's a mistake to hold on to this knowledge for too long - you must be open to new ideas.

In this episode of Mobycast, Chris shares with Jon a personal story about learning and growth. After being blindsided by relying on a familiar pattern, a valuable lesson is learned, one summed up well by author Stephen King when he implores us to "kill your darlings".</itunes:summary>
      <itunes:subtitle>Technology is changing rapidly and it is a major investment to learn a new skill, technique or technology. Our knowledge gained is so hard fought that it is only natural to rely on it dearly.

But it's a mistake to hold on to this knowledge for too long</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, technology, cloud software, personal development, growth mindset, continuous learning </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Future of Containers - Part 3 - Unikernels</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>The Future of Containers - Part 3 - Unikernels</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">054082ea-9f05-46e2-af63-c5be22698cc5</guid>
      <link>https://share.transistor.fm/s/5cd43bd9</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We continue our discussion of microVMs with a look at Kata Containers.</li><li>Kata Containers formed by the merger of two projects: Intel Clear Containers and Hyper runV.</li><li>How does Kata Containers integrate with existing container tooling?</li><li>How mature are Kata Containers - are they ready for production?</li><li>We then take a look at unikernels, which take a dramatically different approach to solving the problem of providing high security with blazing performance.</li><li>The benefits of unikernels along with a comparison on how they differ from containers.</li><li>We discuss some of the most popular unikernel implementations, including OSv and MirageOS.</li><li>Does the future point to a deathmatch between containers and unikernels, or will there be a need for both approaches to cloud-native apps?</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/palm-of-your-hand">Palm of Your Hand by Blynkwth<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/97">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We continue our discussion of microVMs with a look at Kata Containers.</li><li>Kata Containers formed by the merger of two projects: Intel Clear Containers and Hyper runV.</li><li>How does Kata Containers integrate with existing container tooling?</li><li>How mature are Kata Containers - are they ready for production?</li><li>We then take a look at unikernels, which take a dramatically different approach to solving the problem of providing high security with blazing performance.</li><li>The benefits of unikernels along with a comparison on how they differ from containers.</li><li>We discuss some of the most popular unikernel implementations, including OSv and MirageOS.</li><li>Does the future point to a deathmatch between containers and unikernels, or will there be a need for both approaches to cloud-native apps?</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/palm-of-your-hand">Palm of Your Hand by Blynkwth<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/97">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 29 Jan 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/5cd43bd9/6b95a4e7.mp3" length="56786863" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3447</itunes:duration>
      <itunes:summary>What is the future of containers? In this three-part series, we are exploring the promising technologies aiming to make our cloud-native apps more secure without giving up performance.

Previously, we learned all about microVMs, taking a deep dive on the most talked about microVM - AWS Firecracker.

This week on Mobycast, we finish looking at microVMs with a discussion of Kata Containers. Then we explore the world of unikernels, which promise the same benefits as microVMs but with a dramatically different approach. Oh... and somewhere along the way, Chris accidentally invents a new technology - "conternels".</itunes:summary>
      <itunes:subtitle>What is the future of containers? In this three-part series, we are exploring the promising technologies aiming to make our cloud-native apps more secure without giving up performance.

Previously, we learned all about microVMs, taking a deep dive on th</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, Docker, containerization, virtual machine, VM, containers, hypervisor, Firecracker, unikernel, virtualization</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Future of Containers - Part 2 - Making Sense of MicroVMs (continued)</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>The Future of Containers - Part 2 - Making Sense of MicroVMs (continued)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">885c41cf-0a02-4ee8-85eb-123806d60c61</guid>
      <link>https://share.transistor.fm/s/e4762573</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We revisit a misunderstanding from last week's show to find out exactly what the Firecracker team means when they list "Single VM per Firecracker process" as a security benefit.</li><li>We discuss what's next on the Firecracker product roadmap, with particular emphasis on support for snapshot/restore.</li><li>We learn how AWS uses Firecracker in production today with AWS Lambda.</li><li>AWS is currently working on updating Fargate to use Firecracker. We look at why they are doing this and the design details of updating Fargate to use Firecracker.</li><li>We finish by looking at how you can use Firecracker for your own containers, by incorporating Firecracker-aware tooling into your container infrastructure. Specifically, we look at firecracker-containerd and Weave Ignite.</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/thing-is">Thing Is by Public Address<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/96">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We revisit a misunderstanding from last week's show to find out exactly what the Firecracker team means when they list "Single VM per Firecracker process" as a security benefit.</li><li>We discuss what's next on the Firecracker product roadmap, with particular emphasis on support for snapshot/restore.</li><li>We learn how AWS uses Firecracker in production today with AWS Lambda.</li><li>AWS is currently working on updating Fargate to use Firecracker. We look at why they are doing this and the design details of updating Fargate to use Firecracker.</li><li>We finish by looking at how you can use Firecracker for your own containers, by incorporating Firecracker-aware tooling into your container infrastructure. Specifically, we look at firecracker-containerd and Weave Ignite.</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/thing-is">Thing Is by Public Address<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/96">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Jan 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/e4762573/8dfd7207.mp3" length="60057675" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3652</itunes:duration>
      <itunes:summary>Maybe you've heard some of the buzzwords everyone seems to be talking about when discussing the future of containers. Strange words like "microVMs"... "unikernels"... "sandboxes".

Have you wondered what these things are and how you can use them? Or, for that matter, should you use them?

In this episode of Mobycast, Jon and Chris continue their three-part series on the future of containers. We go deep on the most talked about microVM - AWS Firecracker. We learn how Amazon uses Firecracker and its tremendous benefits. We then discuss how to use Firecracker for your own containers and get the same great results.</itunes:summary>
      <itunes:subtitle>Maybe you've heard some of the buzzwords everyone seems to be talking about when discussing the future of containers. Strange words like "microVMs"... "unikernels"... "sandboxes".

Have you wondered what these things are and how you can use them? Or, fo</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, Docker, containerization, virtual machine, VM, containers, hypervisor, Firecracker, unikernel, Kata Containers, virtualization </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Future of Containers - Part 1 - Making Sense of MicroVMs</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>The Future of Containers - Part 1 - Making Sense of MicroVMs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3ee825a-79ad-44bf-9de9-b681fed7f6f3</guid>
      <link>https://share.transistor.fm/s/1853bfc3</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We review virtual machines (full virtualization) and their benefits and tradeoffs.</li><li>We then revisit containers (OS-level virtualization) and briefly recap how they use OS kernel features to enable virtualization.</li><li>Containers provide great performance and resource efficiency, but at the cost of losing strong isolation. Can we have the performance and efficiency benefits of containers but with the strong isolation of VMs? There are some promising technologies that aim to combine the best of both VM and container worlds: microVMs, unikernels and container sandboxes.</li><li>What are microVMs?</li><li>What are unikernels?</li><li>What are container sandboxes?</li><li>AWS Firecracker is one of the most talked about microVMs. We discuss what it is, and the key benefits of using Firecracker.</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/smooth-modulator">Smooth Modulator by aMIGAaMIGO<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/95">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>We review virtual machines (full virtualization) and their benefits and tradeoffs.</li><li>We then revisit containers (OS-level virtualization) and briefly recap how they use OS kernel features to enable virtualization.</li><li>Containers provide great performance and resource efficiency, but at the cost of losing strong isolation. Can we have the performance and efficiency benefits of containers but with the strong isolation of VMs? There are some promising technologies that aim to combine the best of both VM and container worlds: microVMs, unikernels and container sandboxes.</li><li>What are microVMs?</li><li>What are unikernels?</li><li>What are container sandboxes?</li><li>AWS Firecracker is one of the most talked about microVMs. We discuss what it is, and the key benefits of using Firecracker.</li></ul><p><br></p><p><strong>DETAILED SHOW NOTES<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/</a></p><p><strong>SUPPORT MOBYCAST<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><strong>END SONG<br></strong><a href="https://makemistakes.bandcamp.com/track/smooth-modulator">Smooth Modulator by aMIGAaMIGO<br></a><br></p><p><strong>MORE INFO<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/95">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 15 Jan 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1853bfc3/614087d6.mp3" length="67276758" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>4103</itunes:duration>
      <itunes:summary>With cloud computing, we started with virtual machines. They allow us to virtualize an entire server, while providing strong isolation and security.

Then containers came along. They allow us to virtualize just our applications, making containers faster and less resource intensive than VMs. But with these gains we lose strong isolation.

What if we could have the speed and resource efficiency of containers coupled with the enhanced security and isolation of VMs?

In this episode of Mobycast, Jon and Chris kick off a three-part series on the future of containers. We dive deep on microVMs, unikernels and container sandboxes, understanding what they are, how they work, and how well they combine the best of both VM and container worlds.</itunes:summary>
      <itunes:subtitle>With cloud computing, we started with virtual machines. They allow us to virtualize an entire server, while providing strong isolation and security.

Then containers came along. They allow us to virtualize just our applications, making containers faster</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, Docker, containerization, virtual machine, VM, containers, hypervisor, Firecracker, unikernel, Kata Containers, virtualization</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Psst... Secrets Handling for Cloud-Native Apps - Part 2</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Psst... Secrets Handling for Cloud-Native Apps - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5d4b8e8-e345-479e-b2fb-5cd7439171e6</guid>
      <link>https://share.transistor.fm/s/345ae5b0</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>AWS offers not one, but two, managed services for secrets management. Systems Manager Parameter Store and AWS Secrets Manager have similar functionality, making it sometimes confusing to know which to use. We compare and contrast the two services to help guide your choice.</li><li>The three types of sensitive data injection supported by Elastic Container Service (ECS).</li><li>Understanding when sensitive data is injected into the container and how to handle updates to secrets (such as credential rotation).</li><li>The required configuration changes and IAM permissions you need to enable ECS integration with Parameter Store and Secrets Manager.</li><li>A walkthrough of the specific steps you need to take to update your ECS application to support secrets integration.</li></ul><p><br><strong>Detailed Show Notes<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/straddling">Straddling by Derek Russo<br></a><br></p><p><strong>More Info<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/94">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>AWS offers not one, but two, managed services for secrets management. Systems Manager Parameter Store and AWS Secrets Manager have similar functionality, making it sometimes confusing to know which to use. We compare and contrast the two services to help guide your choice.</li><li>The three types of sensitive data injection supported by Elastic Container Service (ECS).</li><li>Understanding when sensitive data is injected into the container and how to handle updates to secrets (such as credential rotation).</li><li>The required configuration changes and IAM permissions you need to enable ECS integration with Parameter Store and Secrets Manager.</li><li>A walkthrough of the specific steps you need to take to update your ECS application to support secrets integration.</li></ul><p><br><strong>Detailed Show Notes<br></strong>Want the complete episode outline with detailed notes? Sign up here: <a href="https://mobycast.fm/show-notes/">https://mobycast.fm/show-notes/<br></a><br></p><p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/straddling">Straddling by Derek Russo<br></a><br></p><p><strong>More Info<br></strong>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/94">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Jan 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/345ae5b0/ab579529.mp3" length="46459473" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2802</itunes:duration>
      <itunes:summary>In episode #93 of Mobycast, we discussed secrets management for our cloud-native applications. We learned why we need secrets management and some of the possible solutions available to us.

Now that we know the "theory", it's time to put that knowledge into practice.

In this episode of Mobycast, Jon and Chris finish their two-part series on handling secrets with cloud-native apps. We show you how to easily implement secrets management for a containerized application running on Amazon Elastic Container Service (or ECS). After this episode, you'll be a pro at keeping a secret!</itunes:summary>
      <itunes:subtitle>In episode #93 of Mobycast, we discussed secrets management for our cloud-native applications. We learned why we need secrets management and some of the possible solutions available to us.

Now that we know the "theory", it's time to put that knowledge </itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, secrets management, secrets handling, containers, Elastic Container Service, ECS, Secrets Manager, Systems Manager, Parameter Store</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Psst... Secrets Handling for Cloud-Native Apps - Part 1</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Psst... Secrets Handling for Cloud-Native Apps - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4bcaea0-c05c-4204-9d0e-5ffbddda2fb0</guid>
      <link>https://share.transistor.fm/s/518bf571</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>What is secrets management and why we need it for our cloud-native applications.</li><li>Guidelines for best practices when handling secrets.</li><li>We walkthrough a simple, roll-your-own approach to secrets management using encryption (KMS) and an object store (S3).<ul><li>Although this is a simple technique, it does provide a very secure (and auditable) approach to secrets handling.</li></ul></li><li>But, for most situtations, you'll want to leverage an off-the-shelf secrets management solution. We discuss 3 popular choices, including Hashicorp Vault, AWS Systems Manager Parameter Store and Amazon Secrets Manager.</li><li>What are the features you should expect from a secrets management solution.</li><li>We take a closer look at Vault, Parameter Store and Secrets Manager, and discuss the features that each provides.</li><li>We finish with some guidance on how to make the right choice of secrets management solution for your applications.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://upstart.chrishic.com/secrets-management-for-cloud-native-applications/">Secrets Management for Cloud-Native Applications</a></li><li><a href="https://www.hashicorp.com/resources/unlocking-the-cloud-operating-model-security">Vault - Unlocking the Cloud Operating Model: Security</a></li><li><a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html">AWS Systems Manager Parameter Store</a></li><li><a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-parameter-store.html">How AWS Systems Manager Parameter Store Uses AWS KMS</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2018/04/introducing-aws-secrets-manager/">Introducing AWS Secrets Manager</a></li><li><a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html">AWS Secrets Manager</a></li><li><a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-secrets-manager.html">How AWS Secrets Manager Uses AWS KMS</a></li><li><a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets.html">Rotating Your AWS Secrets Manager Secrets</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/specifying-sensitive-data-tutorial.html">Tutorial: Specifying Sensitive Data Using Secrets Manager Secrets</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2019/07/AWS-Secrets-Manager-now-supports-VPC-endpoint-policies/">AWS Secrets Manager now supports VPC endpoint policies</a></li><li><a href="https://aws.amazon.com/blogs/security/how-to-manage-secrets-for-amazon-ec2-container-service-based-applications-by-using-amazon-s3-and-docker/">How to Manage Secrets for Amazon EC2 Container Service–Based Applications by Using Amazon S3 and Docker<br></a><br></li></ul><p><strong><br>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/warming-trend">Warming Trend by Aphreaq</a></p><p><strong>More Info</strong></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/93">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>What is secrets management and why we need it for our cloud-native applications.</li><li>Guidelines for best practices when handling secrets.</li><li>We walkthrough a simple, roll-your-own approach to secrets management using encryption (KMS) and an object store (S3).<ul><li>Although this is a simple technique, it does provide a very secure (and auditable) approach to secrets handling.</li></ul></li><li>But, for most situtations, you'll want to leverage an off-the-shelf secrets management solution. We discuss 3 popular choices, including Hashicorp Vault, AWS Systems Manager Parameter Store and Amazon Secrets Manager.</li><li>What are the features you should expect from a secrets management solution.</li><li>We take a closer look at Vault, Parameter Store and Secrets Manager, and discuss the features that each provides.</li><li>We finish with some guidance on how to make the right choice of secrets management solution for your applications.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://upstart.chrishic.com/secrets-management-for-cloud-native-applications/">Secrets Management for Cloud-Native Applications</a></li><li><a href="https://www.hashicorp.com/resources/unlocking-the-cloud-operating-model-security">Vault - Unlocking the Cloud Operating Model: Security</a></li><li><a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html">AWS Systems Manager Parameter Store</a></li><li><a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-parameter-store.html">How AWS Systems Manager Parameter Store Uses AWS KMS</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2018/04/introducing-aws-secrets-manager/">Introducing AWS Secrets Manager</a></li><li><a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html">AWS Secrets Manager</a></li><li><a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-secrets-manager.html">How AWS Secrets Manager Uses AWS KMS</a></li><li><a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets.html">Rotating Your AWS Secrets Manager Secrets</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/specifying-sensitive-data-tutorial.html">Tutorial: Specifying Sensitive Data Using Secrets Manager Secrets</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2019/07/AWS-Secrets-Manager-now-supports-VPC-endpoint-policies/">AWS Secrets Manager now supports VPC endpoint policies</a></li><li><a href="https://aws.amazon.com/blogs/security/how-to-manage-secrets-for-amazon-ec2-container-service-based-applications-by-using-amazon-s3-and-docker/">How to Manage Secrets for Amazon EC2 Container Service–Based Applications by Using Amazon S3 and Docker<br></a><br></li></ul><p><strong><br>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/warming-trend">Warming Trend by Aphreaq</a></p><p><strong>More Info</strong></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/93">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 Jan 2020 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/518bf571/5f7f7147.mp3" length="55215340" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3349</itunes:duration>
      <itunes:summary>Applications frequently need access to sensitive data, such as database credentials, API keys, passwords and tokens.

Of course, we can't just store these secrets in plain text or hard-coded into our applications. Rather, we need to securely protect this sensitive information to ensure that only those with a "need to know" basis can access it.

In this episode of Mobycast, Jon and Chris kick off a two-part series on handling secrets for your cloud-native applications. We discuss various approaches to secrets management, ranging from basic roll-your-own techniques to fully managed solutions. We explore some of the most popular options out there and help you decide which one is best for you.</itunes:summary>
      <itunes:subtitle>Applications frequently need access to sensitive data, such as database credentials, API keys, passwords and tokens.

Of course, we can't just store these secrets in plain text or hard-coded into our applications. Rather, we need to securely protect thi</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, secrets management, secrets handling, containers, Secrets Manager, Parameter Store, Hashicorp Vault</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>VPC Ninja - Part 3 - Moving an ECS Application to Private Subnets </title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>VPC Ninja - Part 3 - Moving an ECS Application to Private Subnets </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9694acb7-251d-461b-9005-b0ab05353721</guid>
      <link>https://share.transistor.fm/s/e7f81202</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we explain how to move an existing ECS application to private subnets. We cover the following topics:</p><ul><li>We describe the existing application, which is a typical two-tier web application, with a web service fronted by an Application Load Balancer (ALB) and database hosted on MySQL using RDS.<ul><li>The current application is containerized and running under ECS.</li><li>Everything (the load balancer, ECS cluster, RDS instance) is running on public subnets.</li></ul></li><li>The goal is to leave only the ALB public-facing, with all other resources protected on private subnets.</li><li>There are two phases to moving the application to private subnets. First, we need to move the ECS cluster to private subnets. Then, we can move the RDS instance to private subnets.</li><li>We detail step-by-step two deployment approaches for moving our ECS cluster to private subnets, both of which involve zero downtime.<ul><li>Rolling deployment, which updates the existing cluster in-place.</li><li>Blue/green deployment, which creates a new cluster to replace the existing one.</li></ul></li><li>We discuss the steps on moving the database instance to private subnets, including application downtime considerations.</li><li>As a bonus, we explain how to add encryption-at-rest to the RDS instance during the migration.<p></p></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/change-launch-config.html">Changing the Launch Configuration for an Auto Scaling Group</a></li><li><a href="https://upstart.chrishic.com/add-encryption-to-an-unencrypted-rds-database/">Add Encryption to an Unencrypted RDS DB Instance</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-optimized_AMI.html">Amazon ECS-optimized AMIs<br></a><br></li></ul><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/the-runner-lost-lake-remix">The Runner (Lost Lake Remix) by Fax<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/92">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we explain how to move an existing ECS application to private subnets. We cover the following topics:</p><ul><li>We describe the existing application, which is a typical two-tier web application, with a web service fronted by an Application Load Balancer (ALB) and database hosted on MySQL using RDS.<ul><li>The current application is containerized and running under ECS.</li><li>Everything (the load balancer, ECS cluster, RDS instance) is running on public subnets.</li></ul></li><li>The goal is to leave only the ALB public-facing, with all other resources protected on private subnets.</li><li>There are two phases to moving the application to private subnets. First, we need to move the ECS cluster to private subnets. Then, we can move the RDS instance to private subnets.</li><li>We detail step-by-step two deployment approaches for moving our ECS cluster to private subnets, both of which involve zero downtime.<ul><li>Rolling deployment, which updates the existing cluster in-place.</li><li>Blue/green deployment, which creates a new cluster to replace the existing one.</li></ul></li><li>We discuss the steps on moving the database instance to private subnets, including application downtime considerations.</li><li>As a bonus, we explain how to add encryption-at-rest to the RDS instance during the migration.<p></p></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/change-launch-config.html">Changing the Launch Configuration for an Auto Scaling Group</a></li><li><a href="https://upstart.chrishic.com/add-encryption-to-an-unencrypted-rds-database/">Add Encryption to an Unencrypted RDS DB Instance</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-optimized_AMI.html">Amazon ECS-optimized AMIs<br></a><br></li></ul><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/the-runner-lost-lake-remix">The Runner (Lost Lake Remix) by Fax<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/92">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Dec 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/e7f81202/eef777aa.mp3" length="53278304" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3228</itunes:duration>
      <itunes:summary>In the first two episodes of this series, we learned how to build a VPC with public and private subnets. We did a deep dive on NAT, or network address translation, and then setup a software-only VPN for secure access to the private subnets.

Now, it's time to put everything together and earn our cloud networking black belt.

This week on Mobycast, Jon and Chris conclude their three-part series on how to incorporate private subnets for your cloud network. We finish by explaining step-by-step how to move an existing ECS application onto our new private subnets. Now... go build, ninja!</itunes:summary>
      <itunes:subtitle>In the first two episodes of this series, we learned how to build a VPC with public and private subnets. We did a deep dive on NAT, or network address translation, and then setup a software-only VPN for secure access to the private subnets.

Now, it's t</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, VPC, virtual private cloud, VPN, virtual private network, private subnet, containers, Elastic Container Service, ECS</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>That's a Wrap - AWS re:Invent 2019 Takeaways - Part 2</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>That's a Wrap - AWS re:Invent 2019 Takeaways - Part 2</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">e5397926-cb8f-4c2d-a301-5ba31a20014b</guid>
      <link>https://share.transistor.fm/s/ca03be94</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>Recap and analysis of Andy Jassy's keynote, including:<ul><li>The theme of this year's keynote is <em>transformation</em>, presented via 6 theme songs.</li><li>"The hunger keeps on growing" (Dave Matthews Band, "Too Much")<ul><li>Storage performance is growing much faster than compute/memory (6x faster since 2012). This is enabling new innovations like AQUA for Redshift, making it 10x faster than any other cloud data warehouse.</li><li>How the new Ultrawarm for Elasticsearch tier reduces cost by 90%.</li><li>AWS helps again with undifferentiated heavy lifting by offering a managed Cassandra service.</li></ul></li><li>"I would walk 500 miles" (The Proclaimers, "I'm Gonna Be (500 Miles)")<ul><li>AWS is one of the best places for AI/ML across all layers of the stack.</li><li>SageMaker is a vibrant ML platform that is rapidly evolving into the next generation developer desktop.</li><li>Can AWS really automate code reviews with its new Code Guru service?</li><li>Using the power of AI to search for enterprise data with Kendra.</li></ul></li><li>"Break on through to the other side" (The Doors, "Break on Through")<ul><li>If you can't come to AWS, AWS is coming to you! AWS infrastructure is everywhere with VMware Cloud on AWS, AWS Outposts, AWS Local Zones and AWS Wavelength.</li></ul></li></ul></li><li>Recap and analysis of Werner Vogel's keynote, including:<ul><li>The problems and limitations of classic virtualization (Xen-based).</li><li>How the Nitro System takes a microservices approach to computer system design.</li><li>The importance of Firecracker as a next generation VM.</li><li>A case-study of the Elastic Block Service (EBS) architecture and how AWS is using a new technology called Physalia to battle the CAP theorem.</li><li>You can now learn more about how AWS designs and develops software with the new Amazon Builders' Library.</li></ul></li><li>Key takeaways<ul><li>The Nitro System is a key technology that is enabling AWS to break through barriers. It will provide us with powerful new capabilities to tackle previously unsolvable problems.</li><li>AWS is everywhere, extending all the way out to the edge with IoT/Greengrass, and everywhere in between with on-premise (AWS Outposts), near-premise (Local Zones) and even integrated on the 5G network with AWS Wavelength.</li><li>AWS is a leader in AI/ML, with Sagemaker becoming a next generation developer platform.</li><li>Analytics is a big priority, with focus on Redshift and data lakes.</li><li>Quantum computing is no longer the stuff of science fiction. It will be here sooner than you think.<p></p></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://www.youtube.com/channel/UCdoadna9HFHsxXWhafhNvKw/playlists">AWS re:Invent 2019 Session Videos</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://aws.amazon.com/hpc/efa/">Elastic Fabric Adapter</a></li><li><a href="https://firecracker-microvm.github.io/">Firecracker</a></li><li><a href="https://github.com/firecracker-microvm/firecracker-containerd">firecracker-containerd</a></li><li><a href="https://aws.amazon.com/builders-library/">The Amazon Builders' Library</a></li><li><a href="https://aws.amazon.com/braket/">Amazon Braket</a></li><li><a href="https://aws.amazon.com/blogs/aws/amazon-braket-get-started-with-quantum-computing/">Amazon Braket – Get Started with Quantum Computing</a></li></ul><p><br></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/walking-dub-for-black-queens">Walking Dub For Black Queens, by Place<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/episode/91-thats-a-wrap-aws-reinvent-2019-takeaways-part-2/">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>Recap and analysis of Andy Jassy's keynote, including:<ul><li>The theme of this year's keynote is <em>transformation</em>, presented via 6 theme songs.</li><li>"The hunger keeps on growing" (Dave Matthews Band, "Too Much")<ul><li>Storage performance is growing much faster than compute/memory (6x faster since 2012). This is enabling new innovations like AQUA for Redshift, making it 10x faster than any other cloud data warehouse.</li><li>How the new Ultrawarm for Elasticsearch tier reduces cost by 90%.</li><li>AWS helps again with undifferentiated heavy lifting by offering a managed Cassandra service.</li></ul></li><li>"I would walk 500 miles" (The Proclaimers, "I'm Gonna Be (500 Miles)")<ul><li>AWS is one of the best places for AI/ML across all layers of the stack.</li><li>SageMaker is a vibrant ML platform that is rapidly evolving into the next generation developer desktop.</li><li>Can AWS really automate code reviews with its new Code Guru service?</li><li>Using the power of AI to search for enterprise data with Kendra.</li></ul></li><li>"Break on through to the other side" (The Doors, "Break on Through")<ul><li>If you can't come to AWS, AWS is coming to you! AWS infrastructure is everywhere with VMware Cloud on AWS, AWS Outposts, AWS Local Zones and AWS Wavelength.</li></ul></li></ul></li><li>Recap and analysis of Werner Vogel's keynote, including:<ul><li>The problems and limitations of classic virtualization (Xen-based).</li><li>How the Nitro System takes a microservices approach to computer system design.</li><li>The importance of Firecracker as a next generation VM.</li><li>A case-study of the Elastic Block Service (EBS) architecture and how AWS is using a new technology called Physalia to battle the CAP theorem.</li><li>You can now learn more about how AWS designs and develops software with the new Amazon Builders' Library.</li></ul></li><li>Key takeaways<ul><li>The Nitro System is a key technology that is enabling AWS to break through barriers. It will provide us with powerful new capabilities to tackle previously unsolvable problems.</li><li>AWS is everywhere, extending all the way out to the edge with IoT/Greengrass, and everywhere in between with on-premise (AWS Outposts), near-premise (Local Zones) and even integrated on the 5G network with AWS Wavelength.</li><li>AWS is a leader in AI/ML, with Sagemaker becoming a next generation developer platform.</li><li>Analytics is a big priority, with focus on Redshift and data lakes.</li><li>Quantum computing is no longer the stuff of science fiction. It will be here sooner than you think.<p></p></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://www.youtube.com/channel/UCdoadna9HFHsxXWhafhNvKw/playlists">AWS re:Invent 2019 Session Videos</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://aws.amazon.com/hpc/efa/">Elastic Fabric Adapter</a></li><li><a href="https://firecracker-microvm.github.io/">Firecracker</a></li><li><a href="https://github.com/firecracker-microvm/firecracker-containerd">firecracker-containerd</a></li><li><a href="https://aws.amazon.com/builders-library/">The Amazon Builders' Library</a></li><li><a href="https://aws.amazon.com/braket/">Amazon Braket</a></li><li><a href="https://aws.amazon.com/blogs/aws/amazon-braket-get-started-with-quantum-computing/">Amazon Braket – Get Started with Quantum Computing</a></li></ul><p><br></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/track/walking-dub-for-black-queens">Walking Dub For Black Queens, by Place<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/episode/91-thats-a-wrap-aws-reinvent-2019-takeaways-part-2/">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 19 Dec 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ca03be94/3a7003b4.mp3" length="44086022" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2752</itunes:duration>
      <itunes:summary>Last episode of Mobycast, we began our post-coverage analysis of AWS re:Invent 2019. With a major theme of "transformation", we walked through some of the key advancements being made by AWS to drive innovation now and into the future. From supercomputing to networking to AI and ML, AWS is proof that there is "no compression algorithm for experience."

In this episode of Mobycast, Jon and Chris conclude their special two-part mini-series on this year's re:Invent conference. We finish recapping the big keynote sessions and highlight the major themes of this year's show. We close it all out by sharing our most important takeways that you need to know.</itunes:summary>
      <itunes:subtitle>Last episode of Mobycast, we began our post-coverage analysis of AWS re:Invent 2019. With a major theme of "transformation", we walked through some of the key advancements being made by AWS to drive innovation now and into the future. From supercomputing </itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, re:Invent, reinvent, Andy Jassy, Werner Vogels, Nitro System, Nitro hypervisor</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>That's a Wrap - AWS re:Invent 2019 Takeaways - Part 1 </title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>That's a Wrap - AWS re:Invent 2019 Takeaways - Part 1 </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c9300d4-1940-471b-89d4-ab10fd9603f9</guid>
      <link>https://share.transistor.fm/s/b4870799</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>re:Invent 2019 by the numbers: 65,000 attendees, 3,000+ sessions, 4 keynotes, 6 venues.</li><li>Recap and analysis of Monday Night Live keynote with Peter DeSantis, including:<ul><li>What is high performance computing (HPC)?</li><li>How AWS is reinventing the supercomputer.</li><li>Why everyone should care about HPC, not just the scientists.</li><li>How networking advancements are paving the way forward for cluster computing and enabling entirely new types of problem solving.</li><li>A discussion of the Elastic Fabric Adapter (EFA) and the new Scalable Reliable Datagram (SRD) networking protocol as a replacement for TCP for high performance networking.</li><li>Using the Nitro System to enable new instance types for machine learning infrastructure, such as the P3dn, G4dn and Inf1 instance types.</li><li>Utilizing custom silicon to make the "Inferentia" processor, which is a high-performance ML inference chip.</li></ul></li><li>Recap and analysis of Andy Jassy's keynote, including:<ul><li>The theme of this year's keynote is <em>transformation</em>, presented via 6 theme songs.</li><li>"Don't wait until tomorrow" (Van Halen, "Right Now")<ul><li>Your transformation needs to start today. The problems will only get harder, deeper tomorrow.</li></ul></li><li>"Don't stop me now, I'm having such a good time" (Queen, "Don't Stop Me Now")<ul><li>Developers love AWS and its capabilities (175+ services, breadth &amp; depth).</li><li>AWS is rapidly innovating its compute capabilities with new instance types (driven by Nitro System) and new ways of running containers (including the just announced Fargate for EKS).</li></ul></li><li>"Is that all you get for your money?" (Billy Joel, "Movin' Out (Anthony's Song)")<ul><li>You need to modernize your technology stack. Get off mainframes, migrate away from the old guard databases with their licensing tricks, and switching from Windows to Linux.</li></ul></li><li>"The hunger keeps on growing" (Dave Matthews Band, "Too Much")<ul><li>Data is exploding, and customers are moving from data silos to data lakes, with S3 the most popular choice for data lakes.</li><li>New feature, Amazon S3 Access Points, helps make giving access to S3 data easier on a per user/application basis.</li><li>AWS is a leader in analytics infrastructure with Athena, EMR, Redshift, ElastiSearch, Kinesis, and QuickSight.</li><li>AWS is investing heavily in its Redshift platform, with many new features announced including the ability to now manage compute and storage separately using the new Redshift RA3 instances.</li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://www.youtube.com/channel/UCdoadna9HFHsxXWhafhNvKw/playlists">AWS re:Invent 2019 Session Videos</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://aws.amazon.com/hpc/efa/">Elastic Fabric Adapter</a></li><li><a href="https://aws.amazon.com/machine-learning/inferentia/">AWS Inferentia</a></li></ul><p><br></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/album/you-just-cant">You Just Can’t, by Roy England<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/91">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast</strong><br>-&gt; <a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a> &lt;-</p><p>In this episode, we cover the following topics:</p><ul><li>re:Invent 2019 by the numbers: 65,000 attendees, 3,000+ sessions, 4 keynotes, 6 venues.</li><li>Recap and analysis of Monday Night Live keynote with Peter DeSantis, including:<ul><li>What is high performance computing (HPC)?</li><li>How AWS is reinventing the supercomputer.</li><li>Why everyone should care about HPC, not just the scientists.</li><li>How networking advancements are paving the way forward for cluster computing and enabling entirely new types of problem solving.</li><li>A discussion of the Elastic Fabric Adapter (EFA) and the new Scalable Reliable Datagram (SRD) networking protocol as a replacement for TCP for high performance networking.</li><li>Using the Nitro System to enable new instance types for machine learning infrastructure, such as the P3dn, G4dn and Inf1 instance types.</li><li>Utilizing custom silicon to make the "Inferentia" processor, which is a high-performance ML inference chip.</li></ul></li><li>Recap and analysis of Andy Jassy's keynote, including:<ul><li>The theme of this year's keynote is <em>transformation</em>, presented via 6 theme songs.</li><li>"Don't wait until tomorrow" (Van Halen, "Right Now")<ul><li>Your transformation needs to start today. The problems will only get harder, deeper tomorrow.</li></ul></li><li>"Don't stop me now, I'm having such a good time" (Queen, "Don't Stop Me Now")<ul><li>Developers love AWS and its capabilities (175+ services, breadth &amp; depth).</li><li>AWS is rapidly innovating its compute capabilities with new instance types (driven by Nitro System) and new ways of running containers (including the just announced Fargate for EKS).</li></ul></li><li>"Is that all you get for your money?" (Billy Joel, "Movin' Out (Anthony's Song)")<ul><li>You need to modernize your technology stack. Get off mainframes, migrate away from the old guard databases with their licensing tricks, and switching from Windows to Linux.</li></ul></li><li>"The hunger keeps on growing" (Dave Matthews Band, "Too Much")<ul><li>Data is exploding, and customers are moving from data silos to data lakes, with S3 the most popular choice for data lakes.</li><li>New feature, Amazon S3 Access Points, helps make giving access to S3 data easier on a per user/application basis.</li><li>AWS is a leader in analytics infrastructure with Athena, EMR, Redshift, ElastiSearch, Kinesis, and QuickSight.</li><li>AWS is investing heavily in its Redshift platform, with many new features announced including the ability to now manage compute and storage separately using the new Redshift RA3 instances.</li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://www.youtube.com/channel/UCdoadna9HFHsxXWhafhNvKw/playlists">AWS re:Invent 2019 Session Videos</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://aws.amazon.com/hpc/efa/">Elastic Fabric Adapter</a></li><li><a href="https://aws.amazon.com/machine-learning/inferentia/">AWS Inferentia</a></li></ul><p><br></p><p><strong>End Song</strong></p><p><a href="https://makemistakes.bandcamp.com/album/you-just-cant">You Just Can’t, by Roy England<br></a><br></p><p><strong>More Info</strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/91">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/b4870799/027f3a1b.mp3" length="49536423" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3092</itunes:duration>
      <itunes:summary>We're happy to report that we are back and survived AWS re:Invent. As promised, re:Invent is a heavyweight of a conference and this year did not disappoint!

With 4 keynotes, over 3,000 sessions, and hundreds of new product and feature announcements, we've got a lot of ground to cover. In fact, we have so much to share with you, that we are splitting this into a special two-part mini-series.

In this episode of Mobycast, we start by recapping some of the big keynote sessions and discuss the new products and technologies that we are most excited about.</itunes:summary>
      <itunes:subtitle>We're happy to report that we are back and survived AWS re:Invent. As promised, re:Invent is a heavyweight of a conference and this year did not disappoint!

With 4 keynotes, over 3,000 sessions, and hundreds of new product and feature announcements, we</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, re:Invent, reinvent, Andy Jassy, Monday Night Live, Nitro System, Nitro hypervisor</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>VPC Ninja - Part 2 - Private subnets with VPN (continued)</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>VPC Ninja - Part 2 - Private subnets with VPN (continued)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c48e60e-0e5a-4335-a76c-8088666a5926</guid>
      <link>https://share.transistor.fm/s/0d264505</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Before we get started, a CAVEAT. There are other (potentially BETTER) ways of accessing resources on private subnets. <ul><li>We'll talk about these (such as AWS Client VPN or AWS Systems Manager Session Manager) in future episodes. </li><li>But a great choice (with the most flexibility/power) remains our current choice: a third-party software-only VPN solution. </li></ul></li><li>There are many options for third-party software VPNs, both commercial and open source. Some of the options we considered include: <ul><li>SoftEther </li><li>Openswan </li><li>OpenVPN (* our choice) </li></ul></li><li>Discussion of the different flavors and pricing models for OpenVPN Access Server.</li><li>Step-by-step walkthrough of installing OpenVPN Access Server via the AWS Marketplace. <ul><li>Including how to setup TLS for your VPN server. </li></ul></li><li>We detail the process of how to create private subnets within a VPC. <ul><li>Create new subnets to be used as private subnets, keeping in mind a multi-AZ design. </li><li>Routing table considerations. </li><li>Setting up a NAT gateway to forward Internet traffic for private subnets. </li></ul></li><li>Some pro tips to keep in mind when building out your cloud network. <ul><li>CIDR block considerations (the "Goldilocks" approach to sizing). </li><li>Did you know that NAT gateways are SPOFs? We discuss how to improve availability. </li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/software-vpn-network-to-amazon.html">Software VPN</a></li><li><a href="https://openvpn.net/">OpenVPN</a></li><li><a href="https://www.softether.org/">SoftEther</a></li><li><a href="https://www.openswan.org/">Openswan</a></li><li><a href="https://openvpn.net/vpn-server-resources/amazon-web-services-ec2-byol-appliance-quick-start-guide/">Amazon Web Services EC2 BYOL appliance quick start guide</a></li><li><a href="https://aws.amazon.com/certificate-manager/">AWS Certificate Manager</a></li><li><a href="https://zerossl.com/">ZeroSSL</a></li></ul><p><br></p><p><strong>End Song</strong><a href="https://makemistakes.bandcamp.com/track/tachyon"><br>Tachyon, by Roy England<br></a><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/90">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Before we get started, a CAVEAT. There are other (potentially BETTER) ways of accessing resources on private subnets. <ul><li>We'll talk about these (such as AWS Client VPN or AWS Systems Manager Session Manager) in future episodes. </li><li>But a great choice (with the most flexibility/power) remains our current choice: a third-party software-only VPN solution. </li></ul></li><li>There are many options for third-party software VPNs, both commercial and open source. Some of the options we considered include: <ul><li>SoftEther </li><li>Openswan </li><li>OpenVPN (* our choice) </li></ul></li><li>Discussion of the different flavors and pricing models for OpenVPN Access Server.</li><li>Step-by-step walkthrough of installing OpenVPN Access Server via the AWS Marketplace. <ul><li>Including how to setup TLS for your VPN server. </li></ul></li><li>We detail the process of how to create private subnets within a VPC. <ul><li>Create new subnets to be used as private subnets, keeping in mind a multi-AZ design. </li><li>Routing table considerations. </li><li>Setting up a NAT gateway to forward Internet traffic for private subnets. </li></ul></li><li>Some pro tips to keep in mind when building out your cloud network. <ul><li>CIDR block considerations (the "Goldilocks" approach to sizing). </li><li>Did you know that NAT gateways are SPOFs? We discuss how to improve availability. </li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/software-vpn-network-to-amazon.html">Software VPN</a></li><li><a href="https://openvpn.net/">OpenVPN</a></li><li><a href="https://www.softether.org/">SoftEther</a></li><li><a href="https://www.openswan.org/">Openswan</a></li><li><a href="https://openvpn.net/vpn-server-resources/amazon-web-services-ec2-byol-appliance-quick-start-guide/">Amazon Web Services EC2 BYOL appliance quick start guide</a></li><li><a href="https://aws.amazon.com/certificate-manager/">AWS Certificate Manager</a></li><li><a href="https://zerossl.com/">ZeroSSL</a></li></ul><p><br></p><p><strong>End Song</strong><a href="https://makemistakes.bandcamp.com/track/tachyon"><br>Tachyon, by Roy England<br></a><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/90">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p> </p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Dec 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/0d264505/3def68db.mp3" length="59322977" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3704</itunes:duration>
      <itunes:summary>In episode #89 of Mobycast, we introduced using private subnets for your cloud network. We learned about the differences between public and private subnets, as well as some of the key technologies they depend upon such as NAT, or network address translation.

We also learned that using private subnets comes with a new problem - how to access these private resources? We discussed three primary approaches, before settling on VPN as our choice.

In this episode of Mobycast, Jon and Chris continue their three-part series on using private subnets with your cloud network. We finish our network design by guiding you step-by-step in setting up a software-based VPN and building out private subnets. We also share some inside tips that will make you look like a cloud networking pro.</itunes:summary>
      <itunes:subtitle>In episode #89 of Mobycast, we introduced using private subnets for your cloud network. We learned about the differences between public and private subnets, as well as some of the key technologies they depend upon such as NAT, or network address translati</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, VPC, virtual private cloud, VPN, virtual private network, private subnet, OpenVPN, Open VPN</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>VPC Ninja - Part 1 - Private Subnets with VPN</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>VPC Ninja - Part 1 - Private Subnets with VPN</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb446ac1-a766-4213-8f67-78ec7f00c894</guid>
      <link>https://share.transistor.fm/s/556b83e6</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a><br><strong><br>Show Details<br></strong><br></p><p>In this episode, we cover the following topics:</p><ul><li>Subnet 101<ul><li>Public subnets<ul><li>Used for public facing resources which allow inbound connections from the public Internet</li></ul></li><li>Private subnets<ul><li>What are they?<ul><li>Used for resources that should <em>not</em> be exposed to open Internet</li><li>Do not allow direct access from open Internet</li><li>Require use of network address translation (NAT) for egress-only Internet access</li></ul></li><li>Why use private subnets?<ul><li>Protect your cloud servers from script kiddies</li><li>Limit exposure</li></ul></li></ul></li><li>Security groups and routing tables allow resources on public subnets to communicate with private subnets</li></ul></li><li>NAT (network address translation) deep dive<ul><li>What is NAT?<ul><li>Remaps one IP address space into another<ul><li>Done by modifying network address information in IP header of packets while in transit across routing device</li></ul></li><li>Tool to deal with IPv4 address exhaustion<ul><li>Only need single public IP address for NAT, which hides entire private network behind it</li></ul></li><li>Note: Actual role of NAT device is both address translation and port address translation</li></ul></li><li>How does it work?<ul><li>IP header consists of:<ul><li>Source IP</li><li>Source port</li><li>Destination IP</li><li>Destination port</li></ul></li><li>Routing device modifies IP address in packets<ul><li>Outgoing packets (from private-to-public)<ul><li>Source IP and port changed to NAT values<ul><li>I.e. packets appear to originate from NAT (instead of private IP itself)</li></ul></li></ul></li><li>Incoming packets (public-to-private)<ul><li>Dest IP and port changes to private values</li></ul></li></ul></li><li>For TCP/UDP<ul><li>NAT keeps in memory table that maps traffic to private IPs<ul><li>Table includes each active connection (particularly the destination address and port)</li><li>When reply comes back to router, uses table to determine private IP that reply should be forwarded to</li><li>Port numbers are changed so combination of IP and port on returned packet can be unambiguously mapped to corresponding private destination</li><li>Note: conversation to open Internet has to originate in private network!<ul><li>This is because initial message establishes required information in translation table</li></ul></li></ul></li></ul></li></ul></li></ul></li><li>How can a single computer have both public and private IP addresses?<ul><li>A quick primer on IP addresses and network interface cards<ul><li>MAC (media access control) address<ul><li>Physical address</li><li>Unique ID assigned to NIC</li></ul></li><li>IP address<ul><li>Logical address</li></ul></li><li>Network switches maintain Address Resolution Protocol (ARP) tables that map IP addresses to MAC addresses<ul><li>ARP table used to know which MAC address to attach to packet</li></ul></li><li>Single NIC can have multiple IP addresses</li></ul></li></ul></li><li>Alas, private subnets are less convenient than public subnets.<ul><li>Instances on private subnet won't be publicly accessible, they can only be accessed from inside the network.</li><li>This leads to the problem of how to connect to an instance on a private subnet from a remote location?<ul><li>Three broad categories of solutions:<ul><li>Direct Connect<ul><li>Dedicated network connection over private lines straight into AWS backbone</li><li>Requires network equipment on customer side</li><li>Cons:<ul><li>Requires dedicated hardware</li><li>Expensive</li><li>Applicable only when you have an on-prem location that needs to be physically connected to VPC</li></ul></li></ul></li><li>Bastion host (jump host)<ul><li>Public-facing server running SSH daemon<ul><li>Once connected to bastion host, users can then ssh to machines on private subnet</li></ul></li><li>Typically have a single instance on public subnet<ul><li>Minimizes surface area to be protected</li></ul></li><li>Cons:<ul><li>Adds an extra layer of indirection</li><li>ssh key management is more complicated</li><li>SPOF</li><li>Security risk of protecting the bastion host</li></ul></li></ul></li><li>VPN (virtual private network)<ul><li>Many different options, ranging in cost and equipment requirements</li><li>For both connecting on-prem location, as well as general remote user access</li></ul></li></ul></li></ul></li></ul></li><li>VPN<ul><li>Available options<ul><li>Managed VPN<ul><li>Managed IPsec VPN connection over existing internet</li><li>Quick and usually simple method for making secure connection to VPC</li><li>Can be used as redundant link for Direct Connect</li><li>Supports static routes or BGP peering/routing</li><li>How to setup:<ul><li>Designate an appliance to act as your customer gateway (usually the on-prem router)</li><li>Create VPN connection in AWS and download config file for your customer gateway</li><li>Configure customer gateway with config file</li></ul></li></ul></li><li>VPN CloudHub<ul><li>Connect locations in hub and spoke manner using Virtual Private Gateway</li><li>Allows remote locations to communicate with each other via the hub (Virtual Private Gateway in AWS)</li><li>Each remote location uses Site-to-Site VPN connection to connect to hub</li><li>Reuses existing internet connection</li><li>Supports BGP routes to direct traffic<ul><li>e.g. use MPLS first then CloudHub VPN as backup</li></ul></li><li>How to setup:<ul><li>Assign multiple Customer Gateways to a Virtual Private Gateway, each with their own BGP ASN and unique IP ranges</li></ul></li></ul></li><li>Third-party software VPN<ul><li>You provide your own VPN endpoint/software</li><li>Use this option if you must manage both ends of VPN connection</li><li>How to setup:<ul><li>Install VPN software via Marketplace appliance or on EC2 instance</li></ul></li></ul></li></ul></li><li>TIL... AWS has increased the options<ul><li>Managed VPN is now known as "AWS Site-to-Site VPN"</li><li>New option: "AWS Client VPN"<ul><li>Fully managed, highly available software-only VPN</li><li>Supports OpenVPN-based clients</li></ul></li><li>We'll discuss "AWS Client VPN" in-depth in a future episode</li></ul></li><li>Our choice for this episode: let's setup a third-party software VPN solution<ul><li>Rationale:<ul><li>Not too much $$$</li><li>Pretty sophisticated solution that's easy to manage</li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/network-to-amazon-vpc-connectivity-options.html">Network-to-Amazon VPC Connectivity Options</a></li><li><a href="https://en.wikipedia.org/wiki/Network_address_translation">Network address translation</a></li><li><a href="http://www.faqs.org/rfcs/rfc1631.html">RFC 1631 - The IP Network Address Translator (NAT)</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/MultipleIP.html">Multiple IP Addresses</a></li><li><a href="https://aws.amazon.com/vpn/">AWS VPN</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2018/12/introducing-aws-client-vpn-to-securely-access-aws-and-on-premises-resources/">Introducing AWS Client VPN to Securely Access AWS and On-Premises Resources</a></li></ul><p><strong>End Song<br></strong><a href="https://royengland.bandcamp.com/album/zero-gravity-remixes">Zero Gravity by Roy England<br></a><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/89">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a></a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a><br><strong><br>Show Details<br></strong><br></p><p>In this episode, we cover the following topics:</p><ul><li>Subnet 101<ul><li>Public subnets<ul><li>Used for public facing resources which allow inbound connections from the public Internet</li></ul></li><li>Private subnets<ul><li>What are they?<ul><li>Used for resources that should <em>not</em> be exposed to open Internet</li><li>Do not allow direct access from open Internet</li><li>Require use of network address translation (NAT) for egress-only Internet access</li></ul></li><li>Why use private subnets?<ul><li>Protect your cloud servers from script kiddies</li><li>Limit exposure</li></ul></li></ul></li><li>Security groups and routing tables allow resources on public subnets to communicate with private subnets</li></ul></li><li>NAT (network address translation) deep dive<ul><li>What is NAT?<ul><li>Remaps one IP address space into another<ul><li>Done by modifying network address information in IP header of packets while in transit across routing device</li></ul></li><li>Tool to deal with IPv4 address exhaustion<ul><li>Only need single public IP address for NAT, which hides entire private network behind it</li></ul></li><li>Note: Actual role of NAT device is both address translation and port address translation</li></ul></li><li>How does it work?<ul><li>IP header consists of:<ul><li>Source IP</li><li>Source port</li><li>Destination IP</li><li>Destination port</li></ul></li><li>Routing device modifies IP address in packets<ul><li>Outgoing packets (from private-to-public)<ul><li>Source IP and port changed to NAT values<ul><li>I.e. packets appear to originate from NAT (instead of private IP itself)</li></ul></li></ul></li><li>Incoming packets (public-to-private)<ul><li>Dest IP and port changes to private values</li></ul></li></ul></li><li>For TCP/UDP<ul><li>NAT keeps in memory table that maps traffic to private IPs<ul><li>Table includes each active connection (particularly the destination address and port)</li><li>When reply comes back to router, uses table to determine private IP that reply should be forwarded to</li><li>Port numbers are changed so combination of IP and port on returned packet can be unambiguously mapped to corresponding private destination</li><li>Note: conversation to open Internet has to originate in private network!<ul><li>This is because initial message establishes required information in translation table</li></ul></li></ul></li></ul></li></ul></li></ul></li><li>How can a single computer have both public and private IP addresses?<ul><li>A quick primer on IP addresses and network interface cards<ul><li>MAC (media access control) address<ul><li>Physical address</li><li>Unique ID assigned to NIC</li></ul></li><li>IP address<ul><li>Logical address</li></ul></li><li>Network switches maintain Address Resolution Protocol (ARP) tables that map IP addresses to MAC addresses<ul><li>ARP table used to know which MAC address to attach to packet</li></ul></li><li>Single NIC can have multiple IP addresses</li></ul></li></ul></li><li>Alas, private subnets are less convenient than public subnets.<ul><li>Instances on private subnet won't be publicly accessible, they can only be accessed from inside the network.</li><li>This leads to the problem of how to connect to an instance on a private subnet from a remote location?<ul><li>Three broad categories of solutions:<ul><li>Direct Connect<ul><li>Dedicated network connection over private lines straight into AWS backbone</li><li>Requires network equipment on customer side</li><li>Cons:<ul><li>Requires dedicated hardware</li><li>Expensive</li><li>Applicable only when you have an on-prem location that needs to be physically connected to VPC</li></ul></li></ul></li><li>Bastion host (jump host)<ul><li>Public-facing server running SSH daemon<ul><li>Once connected to bastion host, users can then ssh to machines on private subnet</li></ul></li><li>Typically have a single instance on public subnet<ul><li>Minimizes surface area to be protected</li></ul></li><li>Cons:<ul><li>Adds an extra layer of indirection</li><li>ssh key management is more complicated</li><li>SPOF</li><li>Security risk of protecting the bastion host</li></ul></li></ul></li><li>VPN (virtual private network)<ul><li>Many different options, ranging in cost and equipment requirements</li><li>For both connecting on-prem location, as well as general remote user access</li></ul></li></ul></li></ul></li></ul></li><li>VPN<ul><li>Available options<ul><li>Managed VPN<ul><li>Managed IPsec VPN connection over existing internet</li><li>Quick and usually simple method for making secure connection to VPC</li><li>Can be used as redundant link for Direct Connect</li><li>Supports static routes or BGP peering/routing</li><li>How to setup:<ul><li>Designate an appliance to act as your customer gateway (usually the on-prem router)</li><li>Create VPN connection in AWS and download config file for your customer gateway</li><li>Configure customer gateway with config file</li></ul></li></ul></li><li>VPN CloudHub<ul><li>Connect locations in hub and spoke manner using Virtual Private Gateway</li><li>Allows remote locations to communicate with each other via the hub (Virtual Private Gateway in AWS)</li><li>Each remote location uses Site-to-Site VPN connection to connect to hub</li><li>Reuses existing internet connection</li><li>Supports BGP routes to direct traffic<ul><li>e.g. use MPLS first then CloudHub VPN as backup</li></ul></li><li>How to setup:<ul><li>Assign multiple Customer Gateways to a Virtual Private Gateway, each with their own BGP ASN and unique IP ranges</li></ul></li></ul></li><li>Third-party software VPN<ul><li>You provide your own VPN endpoint/software</li><li>Use this option if you must manage both ends of VPN connection</li><li>How to setup:<ul><li>Install VPN software via Marketplace appliance or on EC2 instance</li></ul></li></ul></li></ul></li><li>TIL... AWS has increased the options<ul><li>Managed VPN is now known as "AWS Site-to-Site VPN"</li><li>New option: "AWS Client VPN"<ul><li>Fully managed, highly available software-only VPN</li><li>Supports OpenVPN-based clients</li></ul></li><li>We'll discuss "AWS Client VPN" in-depth in a future episode</li></ul></li><li>Our choice for this episode: let's setup a third-party software VPN solution<ul><li>Rationale:<ul><li>Not too much $$$</li><li>Pretty sophisticated solution that's easy to manage</li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html">VPC with Public and Private Subnets (NAT)</a></li><li><a href="https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/network-to-amazon-vpc-connectivity-options.html">Network-to-Amazon VPC Connectivity Options</a></li><li><a href="https://en.wikipedia.org/wiki/Network_address_translation">Network address translation</a></li><li><a href="http://www.faqs.org/rfcs/rfc1631.html">RFC 1631 - The IP Network Address Translator (NAT)</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/MultipleIP.html">Multiple IP Addresses</a></li><li><a href="https://aws.amazon.com/vpn/">AWS VPN</a></li><li><a href="https://aws.amazon.com/about-aws/whats-new/2018/12/introducing-aws-client-vpn-to-securely-access-aws-and-on-premises-resources/">Introducing AWS Client VPN to Securely Access AWS and On-Premises Resources</a></li></ul><p><strong>End Song<br></strong><a href="https://royengland.bandcamp.com/album/zero-gravity-remixes">Zero Gravity by Roy England<br></a><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/89">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a></a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Dec 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/556b83e6/2464c8a9.mp3" length="55575455" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3470</itunes:duration>
      <itunes:summary>You may know that it is best practice to use private subnets for your cloud network. But, have you actually implemented them?

They can be challenging to setup, especially if you have an existing VPC. And using private subnets creates a new dilemma... how do you even connect to these resources?

Jon sometimes complains that Mobycast makes him eat his "security broccoli". Well, its time we add "networking cauliflower" to the mix to ensure that he (and you!) have a well-balanced cloud-native diet.

In this episode of Mobycast, we kick off a three-part series detailing step-by-step how to incorporate private subnets for your cloud network. After listening to these episodes, you'll be able to setup your VPC like a true networking ninja!</itunes:summary>
      <itunes:subtitle>You may know that it is best practice to use private subnets for your cloud network. But, have you actually implemented them?

They can be challenging to setup, especially if you have an existing VPC. And using private subnets creates a new dilemma... h</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Services, VPC, virtual private cloud, VPN, virtual private network, NAT, network address translation, public subnet, private subnet, bastion host </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AWS re:Invent 2019 - A Preview Show</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>AWS re:Invent 2019 - A Preview Show</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f370092f-c354-4ae9-abd6-28029270fb85</guid>
      <link>https://share.transistor.fm/s/f98c50ea</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>AWS re:Invent general overview<ul><li>December 2nd thru December 6th</li><li>2,500+ sessions, spread over 6 venues, spanning 2.5 miles of the Las Vegas Strip</li></ul></li><li>Discuss the 4 primary types of content and the pros/cons of each<ul><li>Sessions, chalk talks, workshops and builders sessions</li></ul></li><li>Our general observations of themes to expect this year<ul><li>Hint: Kubernetes is <em>hot</em></li></ul></li><li>We point out some of the sessions we are particularly looking forward to</li><li>re:Invent is not all work, you get to play too<ul><li>re:play</li><li>Other parties and where to find them</li></ul></li><li>Our predictions for new product/service announcements at re:Invent 2019</li><li>We also talk about Apple's recent launch of a new MacBook Pro (goodbye butterfly keyboard!)</li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://twitter.com/awsreinvent">AWS re:Invent Twitter feed</a></li><li><a href="https://www.youtube.com/playlist?list=PLhr1KZpdzukfC79FEHDHXUvSh8d_j4MZ2">AWS re:Invent 2019 - How to re:Invent YouTube channel</a></li><li><a href="https://aws.amazon.com/blogs/startups/startup-central-is-headed-to-reinvent/">Startup Central is Headed to re:Invent!</a></li><li><a href="https://read.acloud.guru/the-ultimate-guide-to-aws-re-invent-2019-ddf65f2a0a42">A Cloud Guru Guide to re:Invent</a></li><li><a href="https://linuxacademy.com/blog/amazon-web-services-2/complete-guide-to-aws-reinvent-2019/">Linux Academy Guide to re:Invent</a></li><li><a href="https://www.lvmonorail.com/">Las Vegas Monorail</a></li><li><a href="https://twitter.com/reinventparties">Unofficial - re:Invent Parties Twitter feed</a></li><li><a href="http://conferenceparties.com/reinvent2019/">Unofficial - List of AWS re:Invent Conference and Vendor Parties</a></li><li><a href="https://mashable.com/article/macbook-pro-16-inch/">Apple launches 16-inch MacBook Pro with 6 speakers and 'Magic Keyboard'</a></li></ul><p><strong>End Song<br></strong><br></p><p><a href="https://makemistakes.bandcamp.com/album/flowerchild">Flowerchild (Lost Lake Remix) by Owen Ni</a><strong><br> </strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/88">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>AWS re:Invent general overview<ul><li>December 2nd thru December 6th</li><li>2,500+ sessions, spread over 6 venues, spanning 2.5 miles of the Las Vegas Strip</li></ul></li><li>Discuss the 4 primary types of content and the pros/cons of each<ul><li>Sessions, chalk talks, workshops and builders sessions</li></ul></li><li>Our general observations of themes to expect this year<ul><li>Hint: Kubernetes is <em>hot</em></li></ul></li><li>We point out some of the sessions we are particularly looking forward to</li><li>re:Invent is not all work, you get to play too<ul><li>re:play</li><li>Other parties and where to find them</li></ul></li><li>Our predictions for new product/service announcements at re:Invent 2019</li><li>We also talk about Apple's recent launch of a new MacBook Pro (goodbye butterfly keyboard!)</li></ul><p><strong>Links</strong></p><ul><li><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></li><li><a href="https://twitter.com/awsreinvent">AWS re:Invent Twitter feed</a></li><li><a href="https://www.youtube.com/playlist?list=PLhr1KZpdzukfC79FEHDHXUvSh8d_j4MZ2">AWS re:Invent 2019 - How to re:Invent YouTube channel</a></li><li><a href="https://aws.amazon.com/blogs/startups/startup-central-is-headed-to-reinvent/">Startup Central is Headed to re:Invent!</a></li><li><a href="https://read.acloud.guru/the-ultimate-guide-to-aws-re-invent-2019-ddf65f2a0a42">A Cloud Guru Guide to re:Invent</a></li><li><a href="https://linuxacademy.com/blog/amazon-web-services-2/complete-guide-to-aws-reinvent-2019/">Linux Academy Guide to re:Invent</a></li><li><a href="https://www.lvmonorail.com/">Las Vegas Monorail</a></li><li><a href="https://twitter.com/reinventparties">Unofficial - re:Invent Parties Twitter feed</a></li><li><a href="http://conferenceparties.com/reinvent2019/">Unofficial - List of AWS re:Invent Conference and Vendor Parties</a></li><li><a href="https://mashable.com/article/macbook-pro-16-inch/">Apple launches 16-inch MacBook Pro with 6 speakers and 'Magic Keyboard'</a></li></ul><p><strong>End Song<br></strong><br></p><p><a href="https://makemistakes.bandcamp.com/album/flowerchild">Flowerchild (Lost Lake Remix) by Owen Ni</a><strong><br> </strong></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/88">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 27 Nov 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/f98c50ea/95f76b4d.mp3" length="60530662" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3681</itunes:duration>
      <itunes:summary>Let's get ready to rumble! It's that time of year when we head to Las Vegas with 50,000 of our closest friends for the biggest AWS event of the year: re:Invent.

Five days long, with more than 2,500 sessions, taking place in 6 huge venues spread over 2.5 miles, re:Invent is a heavyweight of a conference. If you don't plan ahead, re:Invent will take you down in a TKO.

In this episode of Mobycast, Jon and Chris are in your corner, breaking down this year's event with the tips, tricks and secrets you need to make the most of re:Invent.</itunes:summary>
      <itunes:subtitle>Let's get ready to rumble! It's that time of year when we head to Las Vegas with 50,000 of our closest friends for the biggest AWS event of the year: re:Invent.

Five days long, with more than 2,500 sessions, taking place in 6 huge venues spread over 2.</itunes:subtitle>
      <itunes:keywords>AWS re:Invent, re:Invent, reinvent, AWS conference, AWS, Amazon Web Services, Amazon</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Serverless Containers with ECS Fargate - Part 3</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Serverless Containers with ECS Fargate - Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33087736-d933-4acb-b042-37f85a7b8ac7</guid>
      <link>https://share.transistor.fm/s/aaf8f788</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Container networking<ul><li>ECS networking mode<ul><li>Configures the Docker networking mode to use for the containers in the task<ul><li>Specified as part of the task definition</li></ul></li><li>Valid values:<ul><li>none<ul><li>Containers do not have external connectivity and port mappings can't be specified in the container definition</li></ul></li><li>bridge<ul><li>Utilizes Docker's built-in virtual network which runs inside each container instance<ul><li>Containers on an instance are connected to each other using the docker0 bridge</li><li>Containers use this bridge to communicate with endpoints outside of the instance using primary ENI of instance they are running on</li><li>Containers share networking properties of the primary ENI, including the firewall rules and IP addressing</li><li>Containers are addressed by combination of IP address of primary ENI and host port to which they are mapped</li></ul></li><li>Cons:<ul><li>You cannot address these containers with the IP address allocated by Docker<ul><li>It comes from pool of locally scoped addresses</li></ul></li><li>You cannot enforce finely grained network ACLs and firewall rules</li></ul></li></ul></li><li>host<ul><li>Bypass Docker's built-in virtual network and maps container ports directly to the EC2's NIC directly</li><li>You can't run multiple instantiations of the same task on a single container instance when port mappings are used</li></ul></li><li>awsvpc<ul><li>Each task is allocated its own ENI and IP address<ul><li>Multiple applications (including multiple copies of same app) can run on same port number without conflict</li></ul></li><li>You must specify a NetworkConfiguration when you create a service or run a task with the task definition</li></ul></li></ul></li><li>Default networking mode is bridge</li><li>host and awsvpc network modes offer the highest networking performance<ul><li>They use the Amazon EC2 network stack instead of the virtualized network stack provided by the bridge mode</li><li>Cannot take advantage of dynamic host port mappings</li><li>Exposed container ports are mapped directly...<ul><li>host: to corresponding host port</li><li>awsvpc: to attached elastic network interface port</li></ul></li></ul></li></ul></li><li>Task networking (aka awsvpc mode networking)<ul><li>Benefits<ul><li>Each task has its own attached ENI<ul><li>With primary private IP address and internal DNS hostname</li></ul></li><li>Simplifies container networking<ul><li>No host port specified<ul><li>Container port is what is used by task ENI</li><li>Container ports must be unique in a single task definition</li></ul></li></ul></li><li>Gives more control over how tasks communicate<ul><li>With other tasks<ul><li>Containers share a network namespace</li><li>Communicate with each other over localhost interface<ul><li>e.g. curl 127.0.0.1:8080</li></ul></li></ul></li><li>With other services in VPC</li><li>Note: containers that belong to the same task can communicate over the localhost interface</li></ul></li><li>Take advantage of VPC Flow Logs</li><li>Better security through use of security groups<ul><li>You can assign different security groups to each task, which gives you more fine-grained security</li></ul></li></ul></li><li>Limitations<ul><li>The number of ENIs that can be attached to EC2 instances is fairly small<ul><li>E.g. c5.large EC2 may have up to 3 ENIs attached to it<ul><li>1 primary, and 2 for task networking</li><li>Therefore, you can only host 2 tasks using awsvpc mode networking on a c5.large</li></ul></li></ul></li><li>However, you can increase ENI density using "VPC trunking"</li></ul></li></ul></li><li>VPC trunking<ul><li>Allows for overcoming ENI density limits</li><li>Multiplexes data over shared communication link</li><li>How it works<ul><li>Two ENIs are attached to the instance<ul><li>Primary ENI</li><li>Trunk ENI<ul><li>Note that enabling trunking consumes an additional IP address per instance</li></ul></li></ul></li><li>Your account, IAM user, or role <em>must</em> opt in to the awsvpcTrunking account setting</li></ul></li><li>Benefits<ul><li>Up to 5x-17x more ENIs per instance</li><li>E.g. with trunking, c5.large goes from 3 to 12 ENIs<ul><li>1 primary, 1 trunk, and 10 for task networking</li></ul></li></ul></li></ul></li></ul></li><li>Migrating a container from EC2 to Fargate<ul><li>IAM roles<ul><li>Roles created automatically by ECS<ul><li>Amazon ECS service-linked IAM role, AWSServiceRoleForECS<ul><li>Gives permission to attach ENI to instance</li></ul></li><li>Task Execution IAM Role (ecsTaskExecutionRole)<ul><li>Needed for:<ul><li>Pulling images from ECR</li><li>Pushing logs to CloudWatch</li></ul></li></ul></li></ul></li><li>Create a task-based IAM role<ul><li>Required because we don't have an ecsInstanceRole anymore</li><li>Create a IAM policy that gives minimal privileges needed by task<ul><li>Remember two categories of policies:<ul><li>AWS Managed</li><li>Customer Managed</li></ul></li><li>We are going to create a new customer managed policy that contains only the permissions our app needs<ul><li>KMS Decrypt, S3 GETs from specific bucket</li></ul></li><li>IAM -&gt; Policies -&gt; Create Policy -&gt; JSON<ul><li>See <a>IAM Policy</a> example below</li></ul></li></ul></li><li>Create role based on "Elastic Container Service Task" service role<ul><li>This service role gives permission to ECS to use STS to assume role (sts:AssumeRole) and perform actions on its behalf</li><li>IAM -&gt; Roles -&gt; Create Role<ul><li>"Select type of trusted entity": AWS Service</li><li>Choose "Elastic Container Service", and then "Elastic Container Service Task" use case</li><li>Next, then attach IAM policy we created to the role and save</li></ul></li></ul></li></ul></li></ul></li><li>Task definition file changes<ul><li>Task-level parameters<ul><li>Add FARGATE for requiredCompatibilities</li><li>Use awsvpc as the network mode</li><li>Specify cpu and memory limits at the task level</li><li>Specify Task Execution IAM Role (executionRoleARN)<ul><li>Allows task to pull images from ECR and send logs to CloudWatch Logs</li></ul></li><li>Specify task-based IAM role (taskDefinitionArn)<ul><li>Needed to give task permissions to perform AWS API calls (such as S3 reads)</li></ul></li></ul></li><li>Container-level parameters<ul><li>Only specify containerPort (do not specify hostPort)</li></ul></li><li>See <a>Task Definition</a> example below</li></ul></li><li>Create ECS service<ul><li>Choose cluster</li><li>Specify networking<ul><li>VPC, subnets</li><li>Create a security group for this task<ul><li>Security group is attached to the ENI</li><li>Allow inbound port 80 traffic</li></ul></li><li>Auto-assign public IP</li></ul></li><li>Attach to existing application load balancer<ul><li>Specify production listener (port/protocol)</li><li>Create a new target group<ul><li>When creating target group, you specify "target type"<ul><li>Instance</li><li>IP</li><li>Lambda function</li></ul></li><li>For awsvpc mode (and by default, Fargate), you must use the IP target type</li></ul></li><li>Specify path pattern for ALB listener, health check path<ul><li>Note: you cannot specify host-based routing through the console<ul><li>You can update that after creating the service through the ALB console</li></ul></li></ul></li></ul></li></ul></li><li>Update security groups<ul><li>Security group for ALB<ul><li>Allow outbound port 80 to the security group we attached to our ENI</li></ul></li><li>Security group for RDS<ul><li>Allow inbound port 3306 from the security group for our ENI</li></ul></li></ul></li><li>Create Route 53 record<ul><li>ALIAS pointing to our ALB</li></ul></li><li>Log integration with SumoLogic<ul><li>Update task to send logs to stdout/...</li></ul></li></ul></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast<br></a><br></p><p><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Container networking<ul><li>ECS networking mode<ul><li>Configures the Docker networking mode to use for the containers in the task<ul><li>Specified as part of the task definition</li></ul></li><li>Valid values:<ul><li>none<ul><li>Containers do not have external connectivity and port mappings can't be specified in the container definition</li></ul></li><li>bridge<ul><li>Utilizes Docker's built-in virtual network which runs inside each container instance<ul><li>Containers on an instance are connected to each other using the docker0 bridge</li><li>Containers use this bridge to communicate with endpoints outside of the instance using primary ENI of instance they are running on</li><li>Containers share networking properties of the primary ENI, including the firewall rules and IP addressing</li><li>Containers are addressed by combination of IP address of primary ENI and host port to which they are mapped</li></ul></li><li>Cons:<ul><li>You cannot address these containers with the IP address allocated by Docker<ul><li>It comes from pool of locally scoped addresses</li></ul></li><li>You cannot enforce finely grained network ACLs and firewall rules</li></ul></li></ul></li><li>host<ul><li>Bypass Docker's built-in virtual network and maps container ports directly to the EC2's NIC directly</li><li>You can't run multiple instantiations of the same task on a single container instance when port mappings are used</li></ul></li><li>awsvpc<ul><li>Each task is allocated its own ENI and IP address<ul><li>Multiple applications (including multiple copies of same app) can run on same port number without conflict</li></ul></li><li>You must specify a NetworkConfiguration when you create a service or run a task with the task definition</li></ul></li></ul></li><li>Default networking mode is bridge</li><li>host and awsvpc network modes offer the highest networking performance<ul><li>They use the Amazon EC2 network stack instead of the virtualized network stack provided by the bridge mode</li><li>Cannot take advantage of dynamic host port mappings</li><li>Exposed container ports are mapped directly...<ul><li>host: to corresponding host port</li><li>awsvpc: to attached elastic network interface port</li></ul></li></ul></li></ul></li><li>Task networking (aka awsvpc mode networking)<ul><li>Benefits<ul><li>Each task has its own attached ENI<ul><li>With primary private IP address and internal DNS hostname</li></ul></li><li>Simplifies container networking<ul><li>No host port specified<ul><li>Container port is what is used by task ENI</li><li>Container ports must be unique in a single task definition</li></ul></li></ul></li><li>Gives more control over how tasks communicate<ul><li>With other tasks<ul><li>Containers share a network namespace</li><li>Communicate with each other over localhost interface<ul><li>e.g. curl 127.0.0.1:8080</li></ul></li></ul></li><li>With other services in VPC</li><li>Note: containers that belong to the same task can communicate over the localhost interface</li></ul></li><li>Take advantage of VPC Flow Logs</li><li>Better security through use of security groups<ul><li>You can assign different security groups to each task, which gives you more fine-grained security</li></ul></li></ul></li><li>Limitations<ul><li>The number of ENIs that can be attached to EC2 instances is fairly small<ul><li>E.g. c5.large EC2 may have up to 3 ENIs attached to it<ul><li>1 primary, and 2 for task networking</li><li>Therefore, you can only host 2 tasks using awsvpc mode networking on a c5.large</li></ul></li></ul></li><li>However, you can increase ENI density using "VPC trunking"</li></ul></li></ul></li><li>VPC trunking<ul><li>Allows for overcoming ENI density limits</li><li>Multiplexes data over shared communication link</li><li>How it works<ul><li>Two ENIs are attached to the instance<ul><li>Primary ENI</li><li>Trunk ENI<ul><li>Note that enabling trunking consumes an additional IP address per instance</li></ul></li></ul></li><li>Your account, IAM user, or role <em>must</em> opt in to the awsvpcTrunking account setting</li></ul></li><li>Benefits<ul><li>Up to 5x-17x more ENIs per instance</li><li>E.g. with trunking, c5.large goes from 3 to 12 ENIs<ul><li>1 primary, 1 trunk, and 10 for task networking</li></ul></li></ul></li></ul></li></ul></li><li>Migrating a container from EC2 to Fargate<ul><li>IAM roles<ul><li>Roles created automatically by ECS<ul><li>Amazon ECS service-linked IAM role, AWSServiceRoleForECS<ul><li>Gives permission to attach ENI to instance</li></ul></li><li>Task Execution IAM Role (ecsTaskExecutionRole)<ul><li>Needed for:<ul><li>Pulling images from ECR</li><li>Pushing logs to CloudWatch</li></ul></li></ul></li></ul></li><li>Create a task-based IAM role<ul><li>Required because we don't have an ecsInstanceRole anymore</li><li>Create a IAM policy that gives minimal privileges needed by task<ul><li>Remember two categories of policies:<ul><li>AWS Managed</li><li>Customer Managed</li></ul></li><li>We are going to create a new customer managed policy that contains only the permissions our app needs<ul><li>KMS Decrypt, S3 GETs from specific bucket</li></ul></li><li>IAM -&gt; Policies -&gt; Create Policy -&gt; JSON<ul><li>See <a>IAM Policy</a> example below</li></ul></li></ul></li><li>Create role based on "Elastic Container Service Task" service role<ul><li>This service role gives permission to ECS to use STS to assume role (sts:AssumeRole) and perform actions on its behalf</li><li>IAM -&gt; Roles -&gt; Create Role<ul><li>"Select type of trusted entity": AWS Service</li><li>Choose "Elastic Container Service", and then "Elastic Container Service Task" use case</li><li>Next, then attach IAM policy we created to the role and save</li></ul></li></ul></li></ul></li></ul></li><li>Task definition file changes<ul><li>Task-level parameters<ul><li>Add FARGATE for requiredCompatibilities</li><li>Use awsvpc as the network mode</li><li>Specify cpu and memory limits at the task level</li><li>Specify Task Execution IAM Role (executionRoleARN)<ul><li>Allows task to pull images from ECR and send logs to CloudWatch Logs</li></ul></li><li>Specify task-based IAM role (taskDefinitionArn)<ul><li>Needed to give task permissions to perform AWS API calls (such as S3 reads)</li></ul></li></ul></li><li>Container-level parameters<ul><li>Only specify containerPort (do not specify hostPort)</li></ul></li><li>See <a>Task Definition</a> example below</li></ul></li><li>Create ECS service<ul><li>Choose cluster</li><li>Specify networking<ul><li>VPC, subnets</li><li>Create a security group for this task<ul><li>Security group is attached to the ENI</li><li>Allow inbound port 80 traffic</li></ul></li><li>Auto-assign public IP</li></ul></li><li>Attach to existing application load balancer<ul><li>Specify production listener (port/protocol)</li><li>Create a new target group<ul><li>When creating target group, you specify "target type"<ul><li>Instance</li><li>IP</li><li>Lambda function</li></ul></li><li>For awsvpc mode (and by default, Fargate), you must use the IP target type</li></ul></li><li>Specify path pattern for ALB listener, health check path<ul><li>Note: you cannot specify host-based routing through the console<ul><li>You can update that after creating the service through the ALB console</li></ul></li></ul></li></ul></li></ul></li><li>Update security groups<ul><li>Security group for ALB<ul><li>Allow outbound port 80 to the security group we attached to our ENI</li></ul></li><li>Security group for RDS<ul><li>Allow inbound port 3306 from the security group for our ENI</li></ul></li></ul></li><li>Create Route 53 record<ul><li>ALIAS pointing to our ALB</li></ul></li><li>Log integration with SumoLogic<ul><li>Update task to send logs to stdout/...</li></ul></li></ul></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 20 Nov 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/aaf8f788/c8ef7475.mp3" length="57863345" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3514</itunes:duration>
      <itunes:summary>You may not be an expert on container networking, but wouldn't you like to impress guests at your next party by explaining the difference between "host" and "bridge" networking?

This week on Mobycast, Jon and Chris conclude their three-part series on serverless containers with AWS Fargate. We wrap our heads around container networking and its various networking modes, with particular emphasis on task networking (aka "awsvpc" mode).

We finish by pulling together everything we learned over these 3 episodes to walk step-by-step through the migration of a container from EC2 to Fargate. After this episode, you'll be the life of the party!</itunes:summary>
      <itunes:subtitle>You may not be an expert on container networking, but wouldn't you like to impress guests at your next party by explaining the difference between "host" and "bridge" networking?

This week on Mobycast, Jon and Chris conclude their three-part series on s</itunes:subtitle>
      <itunes:keywords>AWS, Docker, Containers, ECS, VPC, Kubernetes</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Bonus Episode! Docker Is Kind of Acquired By ... Who Is Mirantis?</title>
      <itunes:title>Bonus Episode! Docker Is Kind of Acquired By ... Who Is Mirantis?</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">9a22987f-e72b-4d78-8fad-2481682e6ddf</guid>
      <link>https://share.transistor.fm/s/708ced52</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><strong>Links</strong></p><ul><li><a href="https://techcrunch.com/2019/11/13/mirantis-acquires-docker-enterprise/">Techcrunch article</a></li><li><a href="https://www.mirantis.com/">Mirantis</a></li><li><a href="https://www.docker.com/">Docker</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://royengland.bandcamp.com/album/konesans">La Place by Iwa</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/episode/bonus-episode-docker-is-kind-of-acquired-by-who-is-mirantis/">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm/">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><strong>Links</strong></p><ul><li><a href="https://techcrunch.com/2019/11/13/mirantis-acquires-docker-enterprise/">Techcrunch article</a></li><li><a href="https://www.mirantis.com/">Mirantis</a></li><li><a href="https://www.docker.com/">Docker</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://royengland.bandcamp.com/album/konesans">La Place by Iwa</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/episode/bonus-episode-docker-is-kind-of-acquired-by-who-is-mirantis/">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm/">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Sat, 16 Nov 2019 15:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/708ced52/741f5e66.mp3" length="22238554" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/6LQkKQ-gkwC6CCP8ihPQP69vks_FRfCPexHwygMlEuI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNTEyOC8x/NTczOTQyNTUzLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1386</itunes:duration>
      <itunes:summary>Docker sold its Docker Enterprise business to Mirantis last week. The internet has been abuzz with hot takes and laments for the once high flying unicorn. 

In this short bonus episode of Mobycast, Jon and Chris discuss what this really means for Docker, we use some logic to calculate what the likely sale price was, and we make a prediction for what will happen to what is left of Docker within the next year.

Chris has been taking careful notes on Docker as a business for a few years now, so he has absolutely brilliant insight into what this sale means not just for Docker but for the cloud industry as a whole. 

Give this bonus episode a listen and wow your colleagues with your expert analysis on Monday when you roll into the office.</itunes:summary>
      <itunes:subtitle>Docker sold its Docker Enterprise business to Mirantis last week. The internet has been abuzz with hot takes and laments for the once high flying unicorn. 

In this short bonus episode of Mobycast, Jon and Chris discuss what this really means for Docker</itunes:subtitle>
      <itunes:keywords>Docker, cloud, AWS, GCP, Hashicorp, Azure, Microsoft</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Serverless Containers with ECS Fargate - Part 2</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Serverless Containers with ECS Fargate - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a33e3a4-368a-49e3-86d1-16c2ac8ee739</guid>
      <link>https://share.transistor.fm/s/7dbcfd48</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Identity and access management for ECS<ul><li>Primary roles<ul><li>ECS Container Instance IAM Role<ul><li>ecsInstanceRole</li><li>IAM policy and role required by ECS agent to make ECS API calls on your behalf</li></ul></li><li>ECS Service Scheduler IAM Role<ul><li>ecsServiceRole</li><li>ECS service scheduler makes calls to EC2 and ELB APIs on your behalf<ul><li>Register/deregister container instances with load balancers</li></ul></li></ul></li><li>ECS Task Execution IAM Role<ul><li>ecsTaskExecutionRole</li><li>Also used by ECS agent to make AWS API calls on your behalf</li><li>Typical use cases<ul><li>Your task uses Fargate and is...<ul><li>pulling a container image from Amazon ECR</li><li>uses the awslogs log driver</li></ul></li><li>Your tasks uses either Fargate or EC2 launch type and...<ul><li>pulls images from private registry</li><li>the task definition is referencing sensitive data using Secrets Manager or Parameter Store</li></ul></li></ul></li></ul></li></ul></li><li>Secondary roles<ul><li>ECS Service Auto Scaling IAM Role<ul><li>ecsAutoscaleRole</li><li>Used by Application Auto Scaling service to describe CloudWatch alarms and registered services<ul><li>Updates ECS services's desired count</li></ul></li></ul></li><li>CloudWatch Events IAM Role<ul><li>ecsEventsRole</li><li>Required role when you have ECS scheduled tasks</li><li>Interacts with CloudWatch Events rules and targets</li><li>This IAM policy and role gives CloudWatch permissions to run ECS tasks on your behalf</li></ul></li><li>ECS CodeDeploy IAM Role<ul><li>ecsCodeDeployRole</li><li>Required when doing blue/green deployments (powered by CodeDeploy)</li></ul></li></ul></li><li>Best practice: Using task-based IAM roles<ul><li>IAM role for Amazon ECS tasks<ul><li>Allows you to specify an IAM role that can be used by the containers in a task</li><li>IAM role for task is specified using the taskRoleArn setting in task definition</li></ul></li><li>Prefer more granular task-based IAM roles over instance roles</li><li>Each specific task definition or service should have its own role</li><li>Benefits of task-based IAM roles<ul><li>Least privilege<ul><li>By specifying access at the task-level (instead of at the instance-level), we can have fine-grained control</li><li>Only give the minimum required permissions for the tasks to operate</li></ul></li><li>Credential isolation<ul><li>Container can only use credentials assigned to it</li></ul></li><li>Auditability<ul><li>Access and event logging available via CloudTrail</li><li>CloudTrail logs show taskArn</li></ul></li></ul></li><li>Creating a task-based IAM role<ul><li>First create IAM policy that specifies the minimal permissions needed by your containers<ul><li>Or use an existing managed policy</li></ul></li><li>Next create an IAM role for your task<ul><li>Create role based on Amazon Elastic Container Service Task Role service role</li></ul></li><li>Then attach your IAM policy to the task role</li><li>Example: Container needs to make S3 calls<ul><li>Create a new IAM role for the task, and attach the "AmazonS3ReadOnlyAccess" policy to the role</li><li>Then use the role ARN in task definition</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/ecs/">Amazon Elastic Container Service</a></li><li><a href="https://aws.amazon.com/fargate/">AWS Fargate - Product Page</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/AWS_Fargate.html">ECS Fargate - Developer Guide</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html">IAM Roles for Tasks</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/album/beauty-in-rhythm">Beauty in Rhythm (Fredy Grogan Remix) - Roy England</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/86">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Identity and access management for ECS<ul><li>Primary roles<ul><li>ECS Container Instance IAM Role<ul><li>ecsInstanceRole</li><li>IAM policy and role required by ECS agent to make ECS API calls on your behalf</li></ul></li><li>ECS Service Scheduler IAM Role<ul><li>ecsServiceRole</li><li>ECS service scheduler makes calls to EC2 and ELB APIs on your behalf<ul><li>Register/deregister container instances with load balancers</li></ul></li></ul></li><li>ECS Task Execution IAM Role<ul><li>ecsTaskExecutionRole</li><li>Also used by ECS agent to make AWS API calls on your behalf</li><li>Typical use cases<ul><li>Your task uses Fargate and is...<ul><li>pulling a container image from Amazon ECR</li><li>uses the awslogs log driver</li></ul></li><li>Your tasks uses either Fargate or EC2 launch type and...<ul><li>pulls images from private registry</li><li>the task definition is referencing sensitive data using Secrets Manager or Parameter Store</li></ul></li></ul></li></ul></li></ul></li><li>Secondary roles<ul><li>ECS Service Auto Scaling IAM Role<ul><li>ecsAutoscaleRole</li><li>Used by Application Auto Scaling service to describe CloudWatch alarms and registered services<ul><li>Updates ECS services's desired count</li></ul></li></ul></li><li>CloudWatch Events IAM Role<ul><li>ecsEventsRole</li><li>Required role when you have ECS scheduled tasks</li><li>Interacts with CloudWatch Events rules and targets</li><li>This IAM policy and role gives CloudWatch permissions to run ECS tasks on your behalf</li></ul></li><li>ECS CodeDeploy IAM Role<ul><li>ecsCodeDeployRole</li><li>Required when doing blue/green deployments (powered by CodeDeploy)</li></ul></li></ul></li><li>Best practice: Using task-based IAM roles<ul><li>IAM role for Amazon ECS tasks<ul><li>Allows you to specify an IAM role that can be used by the containers in a task</li><li>IAM role for task is specified using the taskRoleArn setting in task definition</li></ul></li><li>Prefer more granular task-based IAM roles over instance roles</li><li>Each specific task definition or service should have its own role</li><li>Benefits of task-based IAM roles<ul><li>Least privilege<ul><li>By specifying access at the task-level (instead of at the instance-level), we can have fine-grained control</li><li>Only give the minimum required permissions for the tasks to operate</li></ul></li><li>Credential isolation<ul><li>Container can only use credentials assigned to it</li></ul></li><li>Auditability<ul><li>Access and event logging available via CloudTrail</li><li>CloudTrail logs show taskArn</li></ul></li></ul></li><li>Creating a task-based IAM role<ul><li>First create IAM policy that specifies the minimal permissions needed by your containers<ul><li>Or use an existing managed policy</li></ul></li><li>Next create an IAM role for your task<ul><li>Create role based on Amazon Elastic Container Service Task Role service role</li></ul></li><li>Then attach your IAM policy to the task role</li><li>Example: Container needs to make S3 calls<ul><li>Create a new IAM role for the task, and attach the "AmazonS3ReadOnlyAccess" policy to the role</li><li>Then use the role ARN in task definition</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/ecs/">Amazon Elastic Container Service</a></li><li><a href="https://aws.amazon.com/fargate/">AWS Fargate - Product Page</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/AWS_Fargate.html">ECS Fargate - Developer Guide</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html">IAM Roles for Tasks</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/album/beauty-in-rhythm">Beauty in Rhythm (Fredy Grogan Remix) - Roy England</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/86">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Nov 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/7dbcfd48/09396b2e.mp3" length="56748554" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3445</itunes:duration>
      <itunes:summary>In episode #85 of Mobycast, we introduced AWS Fargate, which brings the serverless concept to running containers on ECS. We discussed the features and benefits of Fargate, as well as how it differs from normal EC2 launch types.

Now it's time to dive deeper into some of the details you need to know to successfully run your containers on Fargate.

In this episode of Mobycast, Jon and Chris continue their three-part series on serverless containers with an in-depth discussion of identity and access management for ECS. We learn about the various roles you will encounter, why they are needed and how to use them. We also share a best practice that will make you look like a security pro!</itunes:summary>
      <itunes:subtitle>In episode #85 of Mobycast, we introduced AWS Fargate, which brings the serverless concept to running containers on ECS. We discussed the features and benefits of Fargate, as well as how it differs from normal EC2 launch types.

Now it's time to dive de</itunes:subtitle>
      <itunes:keywords>AWS, Docker, Containers, ECS, VPC, Kubernetes</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Serverless Containers with ECS Fargate - Part 1</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Serverless Containers with ECS Fargate - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d71bb13-56c8-4574-84eb-500d334f6541</guid>
      <link>https://share.transistor.fm/s/51eacef4</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Amazon Elastic Container Service (ECS) basics<ul><li>Orchestration system for containers</li><li>Well integrated with all the other Amazon services – More bang for your buck</li><li>ECS components<ul><li>Cluster<ul><li>Logical grouping of tasks or services</li><li>For EC2 launch type, set of EC2 instances that are defined and managed by:<ul><li>Launch Configuration</li><li>Auto Scale Group</li></ul></li></ul></li><li>Service<ul><li>Allows you to run and maintain a specified number of instances of a task definition simultaneously</li><li>For long-running applications</li></ul></li><li>Task<ul><li>Defines a collection of containers that you want to run together</li><li>Specifies resource quotas needed to run (e.g. memory, CPU, disk volumes)</li></ul></li></ul></li><li>Simple deployment with ECS<ul><li>Build image, publish image, create task definition revision, update ECS service</li></ul></li></ul></li><li>Running containers<ul><li>Three methods<ul><li>Create a long running task<ul><li>ECS service, service scheduler, integration with ELB</li></ul></li><li>Run a single task</li><li>Create a scheduled task</li></ul></li><li>We are going to focus on the most typical use case - ECS services<ul><li>You have to choose a launch type<ul><li>EC2 or Fargate</li></ul></li></ul></li></ul></li><li>Fargate<ul><li>Announced at re:Invent 2017<ul><li>Generally available since 2018</li></ul></li><li>What is it?<ul><li>Allows you to run containers without having to manage servers or clusters of EC2s<ul><li>Don't need to choose server types, decide when to scale your clusters, or optimize cluster packing</li><li>You get complete control over task placement within your own VPC<ul><li>But underlying infrastructure is managed by Fargate</li></ul></li></ul></li></ul></li><li>Benefits<ul><li>No clusters to manage</li><li>Seamless scaling</li><li>Only pay for when you are running tasks<ul><li>Ideal for batch jobs, cron jobs and other on-and-off workloads</li><li>Running cluster of instances constantly incurs costs, but Fargate stops billing when containers stop</li></ul></li></ul></li><li>Specifics<ul><li>Each Fargate task has its own isolation boundary<ul><li>It does <em>not</em> share the underlying kernel, CPU resources, memory resources, or ENI<ul><li>Leverages Firecracker microVM</li><li>Increases efficiency (e.g. approximately 50% price cut for Fargate in January 2019 due to Firecracker)</li></ul></li></ul></li><li>Tasks must be launched into a cluster<ul><li>Cluster is logical infrastructure and permissions boundary for isolating groups of tasks</li><li>Clusters support running both EC2 and Fargate launch types (mix-n-match)</li></ul></li><li>Fargate tasks require awsvpc network mode<ul><li>Provides each task with an ENI<ul><li>You must specify one or more subnets</li><li>You must specify one or more security groups</li></ul></li><li>Decide on whether to assign public IP address to ENI<ul><li>If on public subnet, you must assign public IP to pull images</li><li>If on private subnet, just requires NAT gateway</li></ul></li></ul></li><li>You must specify CPU and memory at the task level<ul><li>You can also optionally specify CPU and memory at container level</li></ul></li><li>Only supports the following log drivers<ul><li>awslogs<ul><li>Sends log information to CloudWatch Logs</li></ul></li><li>splunk</li></ul></li></ul></li><li>Pricing<ul><li>Based on amount of CPU and memory used</li><li>Charged by the second, with minimum charge of 1 minute</li><li>Example costs for running a blog server 24x7<ul><li>Note: costs for us-west-2 region</li><li>Fargate, 0.25 VCPU, 0.5GB memory<ul><li>per vCPU per hour: $0.04048</li><li>per GB per hour: $0.004445</li><li>Memory = $1.60 (30 days * 24 hours * 0.5 GB * 0.004445)</li><li>CPU = $7.29 (30 days * 24 hours * 0.25VCPU * 0.04048)</li><li>Total = $8.89 / month</li></ul></li><li>t2.micro, 1 VCPU, 1GB memory<ul><li>per hour: $0.0116</li><li>Total = $8.35 (30 days * 24 hours * 0.0116)</li></ul></li><li>t3.nano, 2 VCPU, 0.5GB memory<ul><li>per hour: $0.0052</li><li>Total = $3.74 (30 days * 24 hours * 0.0052)</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/ecs/">Amazon Elastic Container Service</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/AWS_Fargate.html">ECS Fargate</a></li><li><a href="https://aws.amazon.com/blogs/compute/aws-fargate-price-reduction-up-to-50/">AWS Fargate Price Reduction – Up to 50%</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/album/lamictal">ERRE - Lamictal</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/85">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p>In this episode, we cover the following topics:</p><ul><li>Amazon Elastic Container Service (ECS) basics<ul><li>Orchestration system for containers</li><li>Well integrated with all the other Amazon services – More bang for your buck</li><li>ECS components<ul><li>Cluster<ul><li>Logical grouping of tasks or services</li><li>For EC2 launch type, set of EC2 instances that are defined and managed by:<ul><li>Launch Configuration</li><li>Auto Scale Group</li></ul></li></ul></li><li>Service<ul><li>Allows you to run and maintain a specified number of instances of a task definition simultaneously</li><li>For long-running applications</li></ul></li><li>Task<ul><li>Defines a collection of containers that you want to run together</li><li>Specifies resource quotas needed to run (e.g. memory, CPU, disk volumes)</li></ul></li></ul></li><li>Simple deployment with ECS<ul><li>Build image, publish image, create task definition revision, update ECS service</li></ul></li></ul></li><li>Running containers<ul><li>Three methods<ul><li>Create a long running task<ul><li>ECS service, service scheduler, integration with ELB</li></ul></li><li>Run a single task</li><li>Create a scheduled task</li></ul></li><li>We are going to focus on the most typical use case - ECS services<ul><li>You have to choose a launch type<ul><li>EC2 or Fargate</li></ul></li></ul></li></ul></li><li>Fargate<ul><li>Announced at re:Invent 2017<ul><li>Generally available since 2018</li></ul></li><li>What is it?<ul><li>Allows you to run containers without having to manage servers or clusters of EC2s<ul><li>Don't need to choose server types, decide when to scale your clusters, or optimize cluster packing</li><li>You get complete control over task placement within your own VPC<ul><li>But underlying infrastructure is managed by Fargate</li></ul></li></ul></li></ul></li><li>Benefits<ul><li>No clusters to manage</li><li>Seamless scaling</li><li>Only pay for when you are running tasks<ul><li>Ideal for batch jobs, cron jobs and other on-and-off workloads</li><li>Running cluster of instances constantly incurs costs, but Fargate stops billing when containers stop</li></ul></li></ul></li><li>Specifics<ul><li>Each Fargate task has its own isolation boundary<ul><li>It does <em>not</em> share the underlying kernel, CPU resources, memory resources, or ENI<ul><li>Leverages Firecracker microVM</li><li>Increases efficiency (e.g. approximately 50% price cut for Fargate in January 2019 due to Firecracker)</li></ul></li></ul></li><li>Tasks must be launched into a cluster<ul><li>Cluster is logical infrastructure and permissions boundary for isolating groups of tasks</li><li>Clusters support running both EC2 and Fargate launch types (mix-n-match)</li></ul></li><li>Fargate tasks require awsvpc network mode<ul><li>Provides each task with an ENI<ul><li>You must specify one or more subnets</li><li>You must specify one or more security groups</li></ul></li><li>Decide on whether to assign public IP address to ENI<ul><li>If on public subnet, you must assign public IP to pull images</li><li>If on private subnet, just requires NAT gateway</li></ul></li></ul></li><li>You must specify CPU and memory at the task level<ul><li>You can also optionally specify CPU and memory at container level</li></ul></li><li>Only supports the following log drivers<ul><li>awslogs<ul><li>Sends log information to CloudWatch Logs</li></ul></li><li>splunk</li></ul></li></ul></li><li>Pricing<ul><li>Based on amount of CPU and memory used</li><li>Charged by the second, with minimum charge of 1 minute</li><li>Example costs for running a blog server 24x7<ul><li>Note: costs for us-west-2 region</li><li>Fargate, 0.25 VCPU, 0.5GB memory<ul><li>per vCPU per hour: $0.04048</li><li>per GB per hour: $0.004445</li><li>Memory = $1.60 (30 days * 24 hours * 0.5 GB * 0.004445)</li><li>CPU = $7.29 (30 days * 24 hours * 0.25VCPU * 0.04048)</li><li>Total = $8.89 / month</li></ul></li><li>t2.micro, 1 VCPU, 1GB memory<ul><li>per hour: $0.0116</li><li>Total = $8.35 (30 days * 24 hours * 0.0116)</li></ul></li><li>t3.nano, 2 VCPU, 0.5GB memory<ul><li>per hour: $0.0052</li><li>Total = $3.74 (30 days * 24 hours * 0.0052)</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/ecs/">Amazon Elastic Container Service</a></li><li><a href="https://docs.aws.amazon.com/AmazonECS/latest/developerguide/AWS_Fargate.html">ECS Fargate</a></li><li><a href="https://aws.amazon.com/blogs/compute/aws-fargate-price-reduction-up-to-50/">AWS Fargate Price Reduction – Up to 50%</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/album/lamictal">ERRE - Lamictal</a><strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/85">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 Nov 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/51eacef4/fa4269bf.mp3" length="63747784" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3882</itunes:duration>
      <itunes:summary>The Amazon Elastic Container Service (or ECS) is the container orchestration system built by AWS. ECS features tight integration with many AWS services, and is a powerful choice for running containers in the cloud.

We first discussed ECS back in episode 3 of Mobycast. But so much has changed in the 18 months since then, bringing many major improvements. One new feature is Fargate, which brings the serverless concept to containers.

With Fargate, you no longer need to manage servers. You don't pay for idle CPU. And there is the promise of seamless scaling. Sounds perfect, right? Well, as with most things that sound too good to be true, there are some limitations and gotchas.

In this episode of Mobycast, Jon and Chris kick off a three-part series where we dive deep into Fargate. We learn the ins and outs of running containers without managing servers and discuss the trade-offs we make when ditching those servers.</itunes:summary>
      <itunes:subtitle>The Amazon Elastic Container Service (or ECS) is the container orchestration system built by AWS. ECS features tight integration with many AWS services, and is a powerful choice for running containers in the cloud.

We first discussed ECS back in episod</itunes:subtitle>
      <itunes:keywords>AWS, Docker, Containers, ECS, VPC, Kubernetes </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Virtual Machines vs. Containers Revisited - Part 4</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Virtual Machines vs. Containers Revisited - Part 4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fd7d32d-ea14-4213-9ac0-a1897db82ba2</guid>
      <link>https://share.transistor.fm/s/ffd19de8</link>
      <description>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><br></p><p>In this episode, we cover the following topics:</p><ul><li>Container runtimes <ul><li>Responsible for: <ul><li>Setting up namespaces and cgroups for containers </li><li>Running commands inside those namespaces and cgroups </li></ul></li><li>Types of runtimes <ul><li>Low-level <ul><li>Handles tasks related to containers such as: <ul><li>Creating a container </li><li>Attaching a process to an existing container </li></ul></li></ul></li><li>High-level <ul><li>Handles "high level" tasks such as: <ul><li>Image creation </li><li>Image management </li></ul></li><li>Defers container tasks to "low level" runtime </li></ul></li></ul></li></ul></li><li>Container standards <ul><li>Open Container Initiative (OCI) <ul><li>Established in June 2015 by Docker and others </li><li>Contains two specifications: <ul><li>Runtime Specification (runtime-spec) <ul><li>runc is an implementation of OCI runtime-spec </li></ul></li><li>Image Specification (image-spec) </li></ul></li></ul></li></ul></li><li>Runc <ul><li>Low-level container runtime </li><li>CLI tool for spawning and running containers according to the OCI specification </li><li>Container runtime originally developed as part of Docker <ul><li>Later lifted out as separate open source project </li></ul></li></ul></li><li>Containerd <ul><li>High-level container runtime </li><li>Provides abstraction layer for the syscalls and OS-specific functionality required to run container <ul><li>Platforms can build on top of abstraction layer without having to drop down to kernel </li><li>Much nicer to work with abstractions (Container, Task, Snapshot) than to manage calls to clone() and mount() </li></ul></li><li>Available as daemon for Linux and Windows </li><li>Designed to be embedded into a larger system (like Docker) <ul><li>Used by container platforms like Docker and Kubernetes </li></ul></li><li>Under the hood, containerd uses runc </li><li>Only deals with core container management <ul><li>Push/pull functionality </li><li>Image management </li><li>Container lifecycle APIs <ul><li>Create, execute and manage containers and their tasks </li></ul></li><li>Snapshot management </li></ul></li><li>Out of scope <ul><li>Networking <ul><li>Very complicated, much more platform specific than abstracting Linux calls </li><li>Instead, containerd exposes events so consumers can subscribe to events they care about <ul><li>E.g. hook events to add interfaces to network namespace </li></ul></li></ul></li></ul></li><li>Exposes functionality via GRPC API <ul><li>Listens on Linux socket </li></ul></li></ul></li><li>Runtime platforms <ul><li>Docker <ul><li>Uses containerd, plus shim </li><li>Shim allows for daemon-less containers <ul><li>e.g. You can upgrade Docker daemon without restarting containers </li></ul></li></ul></li><li>rkt <ul><li>Application container engine, part of CoreOS (RedHat) </li><li>rkt has no centralized "init" daemon <ul><li>Instead it launches containers directly from client commands </li></ul></li><li>Was part of CNCF, but archived in August 2019 <ul><li>Reasons cited by CNCF: <ul><li>"end user adoption has severely declined" </li><li>"project activity and the number of contributors has also steadily declined over time" </li></ul></li><li>containerd and CRI-O are now the CNCF container runtime projects </li></ul></li></ul></li><li>CRI-O <ul><li>Implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI runtimes </li><li>Lightweight alternative to using Docker, Moby or rkt as the runtime for k8s </li><li>Allows k8s to use any OCI-compliant runtime as the container runtime for running pods </li><li>Supports runc and Kata Containers </li></ul></li></ul></li><li>Revisit pseudo code example of creating a container <ul><li>Steps: <ul><li>Create root filesystem for container <ul><li>Spin up busybox in Docker container, and then export filesystem </li></ul></li><li>Run "launcher" process that sets up "child" namespace </li><li>Launcher process forks new child process (now under new namespaces) <ul><li>Child process then forks new process for container <ul><li>chroot (to our root filesystem) </li><li>mount any other FS </li><li>set cgroups (e.g. apply CPU constraints) </li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.opencontainers.org/">Open Container Initiative - OCI</a></li><li><a href="https://github.com/opencontainers/runc">runc</a></li><li><a href="https://containerd.io/">containerd</a></li><li><a href="https://blog.docker.com/2017/08/what-is-containerd-runtime/">What is containerd?</a></li><li><a href="https://coreos.com/rkt/">CoreOS rkt</a></li><li><a href="https://coreos.com/rkt/docs/latest/rkt-vs-other-projects.html#rkt-vs-docker">rkt vs Docker</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/all-is-coming-back-focalist-remix">Miquel Salla - All is Coming Back (Focalist Remix)</a> <strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/84">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li></ul><p><br><strong>Support Mobycast:</strong><br><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Support Mobycast<br></strong><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><br></p><p>In this episode, we cover the following topics:</p><ul><li>Container runtimes <ul><li>Responsible for: <ul><li>Setting up namespaces and cgroups for containers </li><li>Running commands inside those namespaces and cgroups </li></ul></li><li>Types of runtimes <ul><li>Low-level <ul><li>Handles tasks related to containers such as: <ul><li>Creating a container </li><li>Attaching a process to an existing container </li></ul></li></ul></li><li>High-level <ul><li>Handles "high level" tasks such as: <ul><li>Image creation </li><li>Image management </li></ul></li><li>Defers container tasks to "low level" runtime </li></ul></li></ul></li></ul></li><li>Container standards <ul><li>Open Container Initiative (OCI) <ul><li>Established in June 2015 by Docker and others </li><li>Contains two specifications: <ul><li>Runtime Specification (runtime-spec) <ul><li>runc is an implementation of OCI runtime-spec </li></ul></li><li>Image Specification (image-spec) </li></ul></li></ul></li></ul></li><li>Runc <ul><li>Low-level container runtime </li><li>CLI tool for spawning and running containers according to the OCI specification </li><li>Container runtime originally developed as part of Docker <ul><li>Later lifted out as separate open source project </li></ul></li></ul></li><li>Containerd <ul><li>High-level container runtime </li><li>Provides abstraction layer for the syscalls and OS-specific functionality required to run container <ul><li>Platforms can build on top of abstraction layer without having to drop down to kernel </li><li>Much nicer to work with abstractions (Container, Task, Snapshot) than to manage calls to clone() and mount() </li></ul></li><li>Available as daemon for Linux and Windows </li><li>Designed to be embedded into a larger system (like Docker) <ul><li>Used by container platforms like Docker and Kubernetes </li></ul></li><li>Under the hood, containerd uses runc </li><li>Only deals with core container management <ul><li>Push/pull functionality </li><li>Image management </li><li>Container lifecycle APIs <ul><li>Create, execute and manage containers and their tasks </li></ul></li><li>Snapshot management </li></ul></li><li>Out of scope <ul><li>Networking <ul><li>Very complicated, much more platform specific than abstracting Linux calls </li><li>Instead, containerd exposes events so consumers can subscribe to events they care about <ul><li>E.g. hook events to add interfaces to network namespace </li></ul></li></ul></li></ul></li><li>Exposes functionality via GRPC API <ul><li>Listens on Linux socket </li></ul></li></ul></li><li>Runtime platforms <ul><li>Docker <ul><li>Uses containerd, plus shim </li><li>Shim allows for daemon-less containers <ul><li>e.g. You can upgrade Docker daemon without restarting containers </li></ul></li></ul></li><li>rkt <ul><li>Application container engine, part of CoreOS (RedHat) </li><li>rkt has no centralized "init" daemon <ul><li>Instead it launches containers directly from client commands </li></ul></li><li>Was part of CNCF, but archived in August 2019 <ul><li>Reasons cited by CNCF: <ul><li>"end user adoption has severely declined" </li><li>"project activity and the number of contributors has also steadily declined over time" </li></ul></li><li>containerd and CRI-O are now the CNCF container runtime projects </li></ul></li></ul></li><li>CRI-O <ul><li>Implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI runtimes </li><li>Lightweight alternative to using Docker, Moby or rkt as the runtime for k8s </li><li>Allows k8s to use any OCI-compliant runtime as the container runtime for running pods </li><li>Supports runc and Kata Containers </li></ul></li></ul></li><li>Revisit pseudo code example of creating a container <ul><li>Steps: <ul><li>Create root filesystem for container <ul><li>Spin up busybox in Docker container, and then export filesystem </li></ul></li><li>Run "launcher" process that sets up "child" namespace </li><li>Launcher process forks new child process (now under new namespaces) <ul><li>Child process then forks new process for container <ul><li>chroot (to our root filesystem) </li><li>mount any other FS </li><li>set cgroups (e.g. apply CPU constraints) </li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.opencontainers.org/">Open Container Initiative - OCI</a></li><li><a href="https://github.com/opencontainers/runc">runc</a></li><li><a href="https://containerd.io/">containerd</a></li><li><a href="https://blog.docker.com/2017/08/what-is-containerd-runtime/">What is containerd?</a></li><li><a href="https://coreos.com/rkt/">CoreOS rkt</a></li><li><a href="https://coreos.com/rkt/docs/latest/rkt-vs-other-projects.html#rkt-vs-docker">rkt vs Docker</a></li></ul><p><br></p><p><strong>End Song<br></strong><a href="https://makemistakes.bandcamp.com/track/all-is-coming-back-focalist-remix">Miquel Salla - All is Coming Back (Focalist Remix)</a> <strong><br></strong><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/84">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li></ul><p><br><strong>Support Mobycast:</strong><br><a href="https://glow.fm/mobycast">https://glow.fm/mobycast</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Oct 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ffd19de8/488b5c1e.mp3" length="56128606" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3406</itunes:duration>
      <itunes:summary>In episode #83 of Mobycast, we learned that containers are normal Linux processes. But they take advantage of powerful operating system functionality that gives these processes their container superpowers. In particular, we learned about namespaces and control groups and how these features give rise to containers.

This week on Mobycast, Jon and Chris wrap up their four-part series by discussing the runtimes and platforms used to run containers in production. We dive deep on ContainerD and RunC, arguably the most important container runtime out there. We also revisit our pseudo code example of how to build a container from scratch, bringing us full circle on our quest to understand the differences between virtual machines and containers.</itunes:summary>
      <itunes:subtitle>In episode #83 of Mobycast, we learned that containers are normal Linux processes. But they take advantage of powerful operating system functionality that gives these processes their container superpowers. In particular, we learned about namespaces and co</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, docker, containers, vms, virtual machines, hypervisors, virtualization</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Virtual Machines vs. Containers Revisited - Part 3</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Virtual Machines vs. Containers Revisited - Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e08ad86f-c9f3-4406-bfc8-4aecd751e7f1</guid>
      <link>https://share.transistor.fm/s/3bac1965</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Operating-system-level virtualization = containers<ul><li>Allows the resources of a computer to be partitioned <em>via the kernel</em><ul><li>All containers share <em>single kernel</em> with each other AND the host system</li></ul></li><li>Depend on their host OS to do all the communication and interaction with the physical machine<ul><li>Containers don't need a hypervisor; they run directly within the host machine's kernel</li></ul></li><li>Containers are using the underlying operational system resources and drivers<ul><li>This is why you cannot run different OSes on the same host system<ul><li>i.e. Windows containers can run on Windows only, and Linux Containers can run on Linux only</li></ul></li><li>What we think of different OSes (RHEL, CentOS, SUSE, Debian, Ubuntu) are not really different...<ul><li>They are all same core OS (Linux), they just differ in apps/files</li></ul></li></ul></li><li>Based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernel<ul><li>namespaces</li><li>cgroups</li></ul></li></ul></li><li>Container history<ul><li>FreeBSD Jails (2000)<ul><li>BSD userland software that runs on top of the <a href="https://www.freebsd.org/cgi/man.cgi?chroot(2)">chroot(2)</a> system call<ul><li>chroot is used to change the root directory of a set of processes</li></ul></li><li>Processes created in the chrooted environment cannot access files or resources outside of it</li><li>Jails virtualize access to the file system, the set of users, and the networking subsystem</li><li>A jail is characterized by four elements:<ul><li>Directory subtree: the starting point from which a jail is entered<ul><li>Once inside the jail, a process is not permitted to escape outside of this subtree</li></ul></li><li>Hostname</li><li>IP address</li><li>Command: the path name of an executable to run inside the jail</li></ul></li><li>Configured via jail.conf file</li></ul></li><li>LXC containers (2008)<ul><li>Userspace interface for the Linux kernel features to contain processes, including:<ul><li>Kernel namespaces (ipc, uts, mount, pid, network and user)</li><li>Apparmor and SELinux profiles</li><li>Seccomp policies</li><li>Chroots (using pivot_root)</li><li>Kernel capabilities</li><li>CGroups (control groups)</li></ul></li></ul></li><li>Docker containers (2014)<ul><li>Early versions of Docker used LXC as the container runtime</li><li>LXC was made optional in <a href="https://github.com/moby/moby/blob/v0.9.0/CHANGELOG.md">v0.9</a> (March 2014)<ul><li>Replaced by libcontainer)</li><li>libcontainer became the core of runC</li></ul></li><li>LXC was dropped in <a href="https://github.com/moby/moby/releases/tag/v1.10.0">v1.10</a> (February 2016)</li></ul></li></ul></li><li>Container technology<ul><li>Containers are just processes. So what makes them special?</li><li>Namespaces<ul><li>Restrict what you can <em>SEE</em></li><li>Virtualize system resources, like the file system or networking<ul><li>Makes it appear to processes within the namespace that they have their own isolated instance of resource</li><li>Changes to the global resource only visible to processes that are members of the namespace</li></ul></li><li>Processes inherit from parent</li><li>Linux provides the following namespaces:<ul><li>IPC (interprocess communications)<ul><li>CLONE_NEWIPC: Isolates System V IPC, POSIX message queues</li></ul></li><li>Network<ul><li>CLONE_NEWNET: Isolates network devices, stacks, ports, etc</li></ul></li><li>Mount<ul><li>CLONE_NEWNS: Isolates mount points</li></ul></li><li>PID<ul><li>CLONE_NEWPID: Isolates process IDs</li></ul></li><li>User<ul><li>CLONE_NEWUSER: Isolates user and group IDs</li></ul></li><li>UTS (Unix Timesharing System)<ul><li>CLONE_NEWUTS: Isolates hostname and NIS domain name</li></ul></li><li>Cgroup<ul><li>CLONE_NEWCGROUP: Isolates cgroup root directory</li></ul></li></ul></li><li>Syscall interface<ul><li>System call is the fundamental interface between an app and the Linux kernel<ul><li>i.e. Linux kernel calls to create/enter namespaces for processes</li></ul></li></ul></li></ul></li><li>Control groups (cgroups)<ul><li>Restrict what you can <em>DO</em></li><li>Limits an application (container) to a specific set of resources like CPU and memory</li><li>Allow containers to share available hardware resources and optionally enforce limits and constraints</li><li>Creating, modifying, using cgroups is done through the cgroup virtual filesystem</li><li>Processes inherit from parent</li><li>Can be reassigned to different cgroups<ul><li>Memory</li><li>CPU / CPU cores</li><li>Devices</li><li>I/O</li><li>Processes</li></ul></li><li>Using cgroups<ul><li>To see mounted cgroups:<ul><li>mount | grep cgroup</li></ul></li><li>To create a new cgroup:<ul><li>mkdir /sys/fs/cgroup/cpu/chris</li></ul></li><li>To set "cpu.shares" to 512:<ul><li>echo 512 &gt; /sys/fs/cgroup/cpu/chris/cpu.shares</li></ul></li><li>Now add a process to this cgroup:<ul><li>echo &lt;get_pid&gt; &gt; /sys/fs/cgroup/cpu/chris/cgroup.procs</li></ul></li></ul></li></ul></li></ul></li><li>Pseudo code: Creating a container<ul><li>Steps:<ul><li>Create root filesystem for container<ul><li>Spin up busybox in Docker container, and then export filesystem</li></ul></li><li>Run "launcher" process that sets up "child" namespace</li><li>Launcher process forks new child process (now under new namespaces)<ul><li>Child process then forks new process for container<ul><li>chroot (to our root filesystem)</li><li>mount any other FS</li><li>set cgroups (e.g. apply CPU constraints)</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.freebsd.org/doc/handbook/jails.html">FreeBSD Jails</a></li><li><a href="https://linuxcontainers.org/">Linux Container Project - LXC, LXD, LXCFS</a></li><li><a href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - overview of Linux namespaces</a></li><li><a href="https://www.kernel.org/doc/Documentation/cgroup-v1/cgroups.txt">cgroups kernel documentation</a></li><li><a href="https://youtu.be/MHv6cWjvQjM">What Have Namespaces Done For You Lately? - YouTube video<br></a><br></li></ul><p><strong>End Song</strong><br><a href="https://makemistakes.bandcamp.com/album/the-golden-years">Bettie Black &amp; Sophia - Something Beautiful</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/83">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Operating-system-level virtualization = containers<ul><li>Allows the resources of a computer to be partitioned <em>via the kernel</em><ul><li>All containers share <em>single kernel</em> with each other AND the host system</li></ul></li><li>Depend on their host OS to do all the communication and interaction with the physical machine<ul><li>Containers don't need a hypervisor; they run directly within the host machine's kernel</li></ul></li><li>Containers are using the underlying operational system resources and drivers<ul><li>This is why you cannot run different OSes on the same host system<ul><li>i.e. Windows containers can run on Windows only, and Linux Containers can run on Linux only</li></ul></li><li>What we think of different OSes (RHEL, CentOS, SUSE, Debian, Ubuntu) are not really different...<ul><li>They are all same core OS (Linux), they just differ in apps/files</li></ul></li></ul></li><li>Based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernel<ul><li>namespaces</li><li>cgroups</li></ul></li></ul></li><li>Container history<ul><li>FreeBSD Jails (2000)<ul><li>BSD userland software that runs on top of the <a href="https://www.freebsd.org/cgi/man.cgi?chroot(2)">chroot(2)</a> system call<ul><li>chroot is used to change the root directory of a set of processes</li></ul></li><li>Processes created in the chrooted environment cannot access files or resources outside of it</li><li>Jails virtualize access to the file system, the set of users, and the networking subsystem</li><li>A jail is characterized by four elements:<ul><li>Directory subtree: the starting point from which a jail is entered<ul><li>Once inside the jail, a process is not permitted to escape outside of this subtree</li></ul></li><li>Hostname</li><li>IP address</li><li>Command: the path name of an executable to run inside the jail</li></ul></li><li>Configured via jail.conf file</li></ul></li><li>LXC containers (2008)<ul><li>Userspace interface for the Linux kernel features to contain processes, including:<ul><li>Kernel namespaces (ipc, uts, mount, pid, network and user)</li><li>Apparmor and SELinux profiles</li><li>Seccomp policies</li><li>Chroots (using pivot_root)</li><li>Kernel capabilities</li><li>CGroups (control groups)</li></ul></li></ul></li><li>Docker containers (2014)<ul><li>Early versions of Docker used LXC as the container runtime</li><li>LXC was made optional in <a href="https://github.com/moby/moby/blob/v0.9.0/CHANGELOG.md">v0.9</a> (March 2014)<ul><li>Replaced by libcontainer)</li><li>libcontainer became the core of runC</li></ul></li><li>LXC was dropped in <a href="https://github.com/moby/moby/releases/tag/v1.10.0">v1.10</a> (February 2016)</li></ul></li></ul></li><li>Container technology<ul><li>Containers are just processes. So what makes them special?</li><li>Namespaces<ul><li>Restrict what you can <em>SEE</em></li><li>Virtualize system resources, like the file system or networking<ul><li>Makes it appear to processes within the namespace that they have their own isolated instance of resource</li><li>Changes to the global resource only visible to processes that are members of the namespace</li></ul></li><li>Processes inherit from parent</li><li>Linux provides the following namespaces:<ul><li>IPC (interprocess communications)<ul><li>CLONE_NEWIPC: Isolates System V IPC, POSIX message queues</li></ul></li><li>Network<ul><li>CLONE_NEWNET: Isolates network devices, stacks, ports, etc</li></ul></li><li>Mount<ul><li>CLONE_NEWNS: Isolates mount points</li></ul></li><li>PID<ul><li>CLONE_NEWPID: Isolates process IDs</li></ul></li><li>User<ul><li>CLONE_NEWUSER: Isolates user and group IDs</li></ul></li><li>UTS (Unix Timesharing System)<ul><li>CLONE_NEWUTS: Isolates hostname and NIS domain name</li></ul></li><li>Cgroup<ul><li>CLONE_NEWCGROUP: Isolates cgroup root directory</li></ul></li></ul></li><li>Syscall interface<ul><li>System call is the fundamental interface between an app and the Linux kernel<ul><li>i.e. Linux kernel calls to create/enter namespaces for processes</li></ul></li></ul></li></ul></li><li>Control groups (cgroups)<ul><li>Restrict what you can <em>DO</em></li><li>Limits an application (container) to a specific set of resources like CPU and memory</li><li>Allow containers to share available hardware resources and optionally enforce limits and constraints</li><li>Creating, modifying, using cgroups is done through the cgroup virtual filesystem</li><li>Processes inherit from parent</li><li>Can be reassigned to different cgroups<ul><li>Memory</li><li>CPU / CPU cores</li><li>Devices</li><li>I/O</li><li>Processes</li></ul></li><li>Using cgroups<ul><li>To see mounted cgroups:<ul><li>mount | grep cgroup</li></ul></li><li>To create a new cgroup:<ul><li>mkdir /sys/fs/cgroup/cpu/chris</li></ul></li><li>To set "cpu.shares" to 512:<ul><li>echo 512 &gt; /sys/fs/cgroup/cpu/chris/cpu.shares</li></ul></li><li>Now add a process to this cgroup:<ul><li>echo &lt;get_pid&gt; &gt; /sys/fs/cgroup/cpu/chris/cgroup.procs</li></ul></li></ul></li></ul></li></ul></li><li>Pseudo code: Creating a container<ul><li>Steps:<ul><li>Create root filesystem for container<ul><li>Spin up busybox in Docker container, and then export filesystem</li></ul></li><li>Run "launcher" process that sets up "child" namespace</li><li>Launcher process forks new child process (now under new namespaces)<ul><li>Child process then forks new process for container<ul><li>chroot (to our root filesystem)</li><li>mount any other FS</li><li>set cgroups (e.g. apply CPU constraints)</li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.freebsd.org/doc/handbook/jails.html">FreeBSD Jails</a></li><li><a href="https://linuxcontainers.org/">Linux Container Project - LXC, LXD, LXCFS</a></li><li><a href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - overview of Linux namespaces</a></li><li><a href="https://www.kernel.org/doc/Documentation/cgroup-v1/cgroups.txt">cgroups kernel documentation</a></li><li><a href="https://youtu.be/MHv6cWjvQjM">What Have Namespaces Done For You Lately? - YouTube video<br></a><br></li></ul><p><strong>End Song</strong><br><a href="https://makemistakes.bandcamp.com/album/the-golden-years">Bettie Black &amp; Sophia - Something Beautiful</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/83">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 23 Oct 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/3bac1965/43fbf132.mp3" length="57640963" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3501</itunes:duration>
      <itunes:summary>Containers are just lightweight virtual machines, right? No, not really. There's much more to the story than that, so we decided to do a four-part series on virtual machines versus containers.

In parts 1 and 2, we discussed virtual machines in detail and how they work. Now, in parts 3 and 4, we turn our attention to containers. Turns out, containers are not very complicated. They are just normal Linux processes with some isolation superpowers.

In today's episode of Mobycast, Jon and Chris go into depth on containers, their history and the underlying operating system technologies that make them possible. If you ever wondered why you can't run Windows containers on a Linux host, this episode will clear up the mystery.</itunes:summary>
      <itunes:subtitle>Containers are just lightweight virtual machines, right? No, not really. There's much more to the story than that, so we decided to do a four-part series on virtual machines versus containers.

In parts 1 and 2, we discussed virtual machines in detail a</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, docker, containers, vms, virtual machines, hypervisors, virtualization</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Virtual Machines vs. Containers Revisited - Part 2</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Virtual Machines vs. Containers Revisited - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">97344372-0e08-471f-a49d-0f84683f304d</guid>
      <link>https://share.transistor.fm/s/89625545</link>
      <description>
        <![CDATA[<p><strong>Sponsors</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br></p><p><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Hypervisor implementations <ul><li>Hyper-V <ul><li>Type 1 hypervisor from Microsoft </li><li>Architecture <ul><li>Implements isolation of virtual machines in terms of a partition <ul><li>Partition is logical unit of isolation in which each guest OS executes </li></ul></li><li>Parent partition <ul><li>Virtualization software runs in parent partition and has direct access to hardware <ul><li>Requires supported version of Windows Server </li></ul></li><li>There must be at least one parent partition </li><li>Parent partition creates child partitions which host the guest OSes <ul><li>Done via Hyper-V "hypercall" API </li></ul></li><li>Parent partitions run a Virtualization Service Provider (VSP) which connects to the VMBus <ul><li>Handles device access requests from child partition </li></ul></li></ul></li><li>Child partition <ul><li>Does <em>not</em> have direct access to hardware <ul><li>Has virtual view of processor and runs in Guest Virtual Address (not necessarily the entire virtual address space) </li></ul></li><li>Hypervisor handles interrupts to processor, and redirects to respective partition </li><li>Any request to the virtual devices is redirected via the VMBus to the devices in the parent partition </li></ul></li><li>VMBus <ul><li>Logical channel which enables inter-partition communication </li></ul></li></ul></li></ul></li><li>KVM (Kernel-based Virtual Machine) <ul><li>Virtualization module in Linux kernel <ul><li>Turns Linux kernel into hypervisor </li><li>Available in mainline Linux since 2007 </li></ul></li><li>Can run multiple VMs running unmodified Linux or Windows images </li><li>Leverages hardware virtualization <ul><li>Via CPU virtualization extensions (Intel VT or AMD-V) </li></ul></li><li>But also provides paravirtualization support for Linux/FreeBSD/NetBSD/Windows using VirtIO API </li><li>Architecture <ul><li>Kernel component <ul><li>Consists of: <ul><li>Loadable kernel module, kvm.ko, that provides the core virtualization infrastructure </li><li>Processor specific module, kvm-intel.ko or kvm-amd.ko </li></ul></li></ul></li><li>Userspace component <ul><li>QEMU (Quick Emulator) <ul><li>Userland program that does hardware emulation </li><li>Used by KVM for I/O emulations </li></ul></li></ul></li></ul></li></ul></li></ul></li><li>AWS hypervisor choices &amp; history <ul><li>AWS uses custom hardware for faster EC2 VM performance </li><li>Original EC2 technology ran highly customized version of Xen hypervisor <ul><li>VMs can run using either paravirtualization (PV) or hardware virtual machine (HVM) </li><li>HVM guests are fully virtualized <ul><li>VMs on top of hypervisor are not aware they are sharing with other VMs </li></ul></li><li>Memory allocated to guest OSes is scrubbed by hypervisor when it is de-allocated </li><li>Only AWS admins have access to hypervisors </li></ul></li><li>AWS found that Xen has many limitations that impede their growth <ul><li>Engineers improved performance by moving parts of software stack to purpose-built hardware components </li></ul></li><li>C3 instance family (2013) <ul><li>Debut of custom chips in Amazon EC2 <ul><li>Custom network interface for faster bandwidth and throughput </li></ul></li></ul></li><li>C4 instance family (2015) <ul><li>Offload network virtualization to custom hardware with ASIC optimized for storage services </li></ul></li><li>C5 instance family (2017) <ul><li>Project Nitro <ul><li>Traditional hypervisors do everything <ul><li>Protect the physical hardware and bios, virtualize the CPU, storage, networking, management tasks </li></ul></li><li>Nitro breaks apart those functions, offloading to dedicated hardware and software </li><li>Replace Xen with a highly optimized KVM hypervisor tightly coupled with an ASIC </li><li>Very fast VMs approaching performance of bare metal server </li></ul></li></ul></li><li>Amazon EC2 – Bare metal instances (2017) <ul><li>Use Project Nitro </li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://xenproject.org/">Xen Project</a></li><li><a href="https://www.linux-kvm.org/page/Main_Page">Kernel Virtual Machine</a></li><li><a href="https://en.wikipedia.org/wiki/QEMU">QEMU</a></li><li><a href="https://www.amazon.com/Mastering-Virtualization-Humble-Devassy-Chirammal/dp/1784399051">Mastering KVM Virtualization</a></li><li><a href="https://en.wikipedia.org/wiki/Hyper-V">Hyper-V</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://www.youtube.com/watch?v=e8DVmwj3OEs">AWS re:Invent 2018: Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System</a></li><li><a href="https://www.youtube.com/watch?v=LabltEXk0VQ">AWS re:Invent 2017: C5 Instances and the Evolution of Amazon EC2 Virtualization</a></li></ul><p><br><strong>End Song</strong><br><a href="https://makemistakes.bandcamp.com/album/stages">Fax - Stages</a></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/82">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Sponsors</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br></p><p><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Hypervisor implementations <ul><li>Hyper-V <ul><li>Type 1 hypervisor from Microsoft </li><li>Architecture <ul><li>Implements isolation of virtual machines in terms of a partition <ul><li>Partition is logical unit of isolation in which each guest OS executes </li></ul></li><li>Parent partition <ul><li>Virtualization software runs in parent partition and has direct access to hardware <ul><li>Requires supported version of Windows Server </li></ul></li><li>There must be at least one parent partition </li><li>Parent partition creates child partitions which host the guest OSes <ul><li>Done via Hyper-V "hypercall" API </li></ul></li><li>Parent partitions run a Virtualization Service Provider (VSP) which connects to the VMBus <ul><li>Handles device access requests from child partition </li></ul></li></ul></li><li>Child partition <ul><li>Does <em>not</em> have direct access to hardware <ul><li>Has virtual view of processor and runs in Guest Virtual Address (not necessarily the entire virtual address space) </li></ul></li><li>Hypervisor handles interrupts to processor, and redirects to respective partition </li><li>Any request to the virtual devices is redirected via the VMBus to the devices in the parent partition </li></ul></li><li>VMBus <ul><li>Logical channel which enables inter-partition communication </li></ul></li></ul></li></ul></li><li>KVM (Kernel-based Virtual Machine) <ul><li>Virtualization module in Linux kernel <ul><li>Turns Linux kernel into hypervisor </li><li>Available in mainline Linux since 2007 </li></ul></li><li>Can run multiple VMs running unmodified Linux or Windows images </li><li>Leverages hardware virtualization <ul><li>Via CPU virtualization extensions (Intel VT or AMD-V) </li></ul></li><li>But also provides paravirtualization support for Linux/FreeBSD/NetBSD/Windows using VirtIO API </li><li>Architecture <ul><li>Kernel component <ul><li>Consists of: <ul><li>Loadable kernel module, kvm.ko, that provides the core virtualization infrastructure </li><li>Processor specific module, kvm-intel.ko or kvm-amd.ko </li></ul></li></ul></li><li>Userspace component <ul><li>QEMU (Quick Emulator) <ul><li>Userland program that does hardware emulation </li><li>Used by KVM for I/O emulations </li></ul></li></ul></li></ul></li></ul></li></ul></li><li>AWS hypervisor choices &amp; history <ul><li>AWS uses custom hardware for faster EC2 VM performance </li><li>Original EC2 technology ran highly customized version of Xen hypervisor <ul><li>VMs can run using either paravirtualization (PV) or hardware virtual machine (HVM) </li><li>HVM guests are fully virtualized <ul><li>VMs on top of hypervisor are not aware they are sharing with other VMs </li></ul></li><li>Memory allocated to guest OSes is scrubbed by hypervisor when it is de-allocated </li><li>Only AWS admins have access to hypervisors </li></ul></li><li>AWS found that Xen has many limitations that impede their growth <ul><li>Engineers improved performance by moving parts of software stack to purpose-built hardware components </li></ul></li><li>C3 instance family (2013) <ul><li>Debut of custom chips in Amazon EC2 <ul><li>Custom network interface for faster bandwidth and throughput </li></ul></li></ul></li><li>C4 instance family (2015) <ul><li>Offload network virtualization to custom hardware with ASIC optimized for storage services </li></ul></li><li>C5 instance family (2017) <ul><li>Project Nitro <ul><li>Traditional hypervisors do everything <ul><li>Protect the physical hardware and bios, virtualize the CPU, storage, networking, management tasks </li></ul></li><li>Nitro breaks apart those functions, offloading to dedicated hardware and software </li><li>Replace Xen with a highly optimized KVM hypervisor tightly coupled with an ASIC </li><li>Very fast VMs approaching performance of bare metal server </li></ul></li></ul></li><li>Amazon EC2 – Bare metal instances (2017) <ul><li>Use Project Nitro </li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://xenproject.org/">Xen Project</a></li><li><a href="https://www.linux-kvm.org/page/Main_Page">Kernel Virtual Machine</a></li><li><a href="https://en.wikipedia.org/wiki/QEMU">QEMU</a></li><li><a href="https://www.amazon.com/Mastering-Virtualization-Humble-Devassy-Chirammal/dp/1784399051">Mastering KVM Virtualization</a></li><li><a href="https://en.wikipedia.org/wiki/Hyper-V">Hyper-V</a></li><li><a href="https://aws.amazon.com/ec2/nitro/">AWS Nitro System</a></li><li><a href="https://www.youtube.com/watch?v=e8DVmwj3OEs">AWS re:Invent 2018: Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System</a></li><li><a href="https://www.youtube.com/watch?v=LabltEXk0VQ">AWS re:Invent 2017: C5 Instances and the Evolution of Amazon EC2 Virtualization</a></li></ul><p><br><strong>End Song</strong><br><a href="https://makemistakes.bandcamp.com/album/stages">Fax - Stages</a></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/82">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Oct 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/89625545/d433f94f.mp3" length="49160921" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2971</itunes:duration>
      <itunes:summary>Cloud computing would not be possible if not for virtual machines. They are the fundamental resource for cloud-native applications. Then along came Docker with its containers, and the virtualization scene got a bit more complicated and confusing.

So, we kicked off a new series where we go deep on virtual machines and containers, aiming to clear up any confusion between these important technologies.

In episode #81 of Mobycast, we discussed full virtualization, also known as virtual machines. We explained hypervisors, the fundamental technology that enables virtual machines. And then we took a detailed look at how Type 1 hypervisors work.

In today's episode of Mobycast, Jon and Chris bring these concepts to life by examining several popular hypervisor implementations.</itunes:summary>
      <itunes:subtitle>Cloud computing would not be possible if not for virtual machines. They are the fundamental resource for cloud-native applications. Then along came Docker with its containers, and the virtualization scene got a bit more complicated and confusing.

So, w</itunes:subtitle>
      <itunes:keywords>AWS, Amazon Web Service, Docker, containerization, virtual machine, VM, containers, hypervisor, KVM, Hyper-V, Xen</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Virtual Machines vs. Containers Revisited - Part 1</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Virtual Machines vs. Containers Revisited - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4726c2f4-d860-4321-b55a-bc2a1f2355e9</guid>
      <link>https://share.transistor.fm/s/1d9185b8</link>
      <description>
        <![CDATA[<p><strong>Sponsor</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>VMs vs containers - why revisit?<ul><li>Originally talked about this in episode 1<ul><li>Got most of it right, but some inconsistencies/holes</li><li>Let's revisit to fill in the gaps, and dive a whole LOT deeper this time around</li></ul></li></ul></li><li>Types of virtualization<ul><li>Full virtualization ("virtual machines")<ul><li>Simulates enough hardware to allow an unmodified "guest" OS to be run in isolation</li><li>Resources of computer are partitioned via hypervisor</li><li>Examples:<ul><li>VMWare, Parallels, VirtualBox, Hyper-V</li></ul></li></ul></li><li>Operating-system-level virtualization ("containers")<ul><li>Resources of computer are partitioned via the kernel<ul><li>"Guest" OSes share same running instance of OS as the host system</li></ul></li><li>Based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernel<ul><li>namespaces and cgroups</li></ul></li><li>Examples:<ul><li>Docker, LXC, FreeBSD jails</li></ul></li></ul></li></ul></li><li>Hypervisors<ul><li>Also known as a Virtual Machine Manager (VMM)</li><li>Creates and runs virtual machines<ul><li>It is a process that separates OS and apps from underlying physical hardware</li><li>Multiple VMs share virtualized hardware resources</li></ul></li><li>When you create a new VM, the following happens:<ul><li>Hypervisor allocates memory and CPU space for VMs exclusive use</li><li>Complete OS is installed onto the VM</li><li>The VM's OS communicates with the hypervisor to perform tasks</li></ul></li><li>Host OS is able to see all physical hardware, whereas guest OS (VM) can only see hardware to which hypervisor has granted access</li><li>Two types of hypervisors<ul><li>Type 1 (also called "native" or "bare metal" hypervisors)<ul><li>Run directly on the host’s hardware to control the hardware and manage the guest VMs<ul><li>runs in ring 0</li></ul></li><li>Are an OS themselves (simple OS on top of which you run VMs)<ul><li>the physical machine the hypervisor is running on serves only for virtualization purposes<ul><li>Exceptions: Hyper-V, KVM</li></ul></li></ul></li><li>Examples<ul><li>Xen, Microsoft Hyper-V, VMware ESX/ESXi</li></ul></li></ul></li><li>Type 2 (also called "hosted" hypervisors)<ul><li>Run on conventional OS, just like other apps</li><li>Guest OS runs as a process on the host</li><li>Hypervisor separates the guest OS from the host OS</li><li>Examples<ul><li>VirtualBox, Parallels</li></ul></li></ul></li></ul></li><li>Protection levels (rings)<ul><li>x86 family of CPUs provide a range of protection levels also known as rings<ul><li>Ring 0 has the highest level privilege (kernel/supervisor)</li><li>Ring 3 lowest level (applications)</li></ul></li><li>Hypervisor occupies ring 0 of CPU</li><li>Kernels for any guest operating systems running on the system must run in less privileged CPU rings<ul><li>But most OS kernels are written explicitly to run in ring 0</li><li>Techniques to deal with this:<ul><li>Full virtualization<ul><li>hypervisor provides CPU emulation to handle ring 0 operations made by unmodified guest OS kernels</li><li>emulation process requires both time and system resources<ul><li>inferior performance</li></ul></li></ul></li><li>Paravirtualization<ul><li>Technique in which hypervisor provides an API and the OS of the guest VM calls that API</li><li>Requires guest OS to be modified (to make API calls)<ul><li>Replace any privileged operations that will only run in ring 0 of the CPU with calls to the hypervisor ("hypercalls")</li></ul></li><li>Allows tasks to run in host OS (instead of in guest OS where performance would be worse)</li></ul></li><li>Hardware virtualization<ul><li>Requires a CPU with hardware virtualization extensions, such as Intel VT or AMD-V<ul><li>Intel virtualization (VT-x)<ul><li>Virtual Machine Extensions</li><li>Adds ten new instructions<ul><li>VMPTRLD, VMPTRST, VMCLEAR, VMREAD, VMWRITE, VMCALL, VMLAUNCH, VMRESUME, VMXOFF, and VMXON.</li><li>These instructions permit entering and exiting a virtual execution mode where the guest OS perceives itself as running with full privilege (ring 0), but the host OS remains protected.</li></ul></li></ul></li></ul></li><li>Reduces/eliminates any OS modifications in guest OS</li><li>Provides an additional privilege mode above ring 0 in which the hypervisor can operate<ul><li>essentially leaving ring 0 available for unmodified guest OSes</li></ul></li><li>Better performance than paravirtualization</li></ul></li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://en.wikipedia.org/wiki/Virtual_machine">Virtual machine</a></li><li><a href="https://en.wikipedia.org/wiki/Hypervisor">Hypervisor</a></li><li><a href="https://www.networkworld.com/article/3243262/what-is-a-hypervisor.html">What is a hypervisor?</a></li><li><a href="https://phoenixnap.com/kb/what-is-hypervisor-type-1-2">What Is A Hypervisor? Types Of Hypervisors 1 &amp; 2<br></a><br></li></ul><p>End Song<br><a href="https://makemistakes.bandcamp.com/track/sad-livin-in-the-new-york-city-david-lasts-remix">Time for Trees - Sad Livin in the (New York) City - (David Last Remix)</a></p><p><br></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/81">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Sponsor</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>VMs vs containers - why revisit?<ul><li>Originally talked about this in episode 1<ul><li>Got most of it right, but some inconsistencies/holes</li><li>Let's revisit to fill in the gaps, and dive a whole LOT deeper this time around</li></ul></li></ul></li><li>Types of virtualization<ul><li>Full virtualization ("virtual machines")<ul><li>Simulates enough hardware to allow an unmodified "guest" OS to be run in isolation</li><li>Resources of computer are partitioned via hypervisor</li><li>Examples:<ul><li>VMWare, Parallels, VirtualBox, Hyper-V</li></ul></li></ul></li><li>Operating-system-level virtualization ("containers")<ul><li>Resources of computer are partitioned via the kernel<ul><li>"Guest" OSes share same running instance of OS as the host system</li></ul></li><li>Based on the virtualization, isolation, and resource management mechanisms provided by the Linux kernel<ul><li>namespaces and cgroups</li></ul></li><li>Examples:<ul><li>Docker, LXC, FreeBSD jails</li></ul></li></ul></li></ul></li><li>Hypervisors<ul><li>Also known as a Virtual Machine Manager (VMM)</li><li>Creates and runs virtual machines<ul><li>It is a process that separates OS and apps from underlying physical hardware</li><li>Multiple VMs share virtualized hardware resources</li></ul></li><li>When you create a new VM, the following happens:<ul><li>Hypervisor allocates memory and CPU space for VMs exclusive use</li><li>Complete OS is installed onto the VM</li><li>The VM's OS communicates with the hypervisor to perform tasks</li></ul></li><li>Host OS is able to see all physical hardware, whereas guest OS (VM) can only see hardware to which hypervisor has granted access</li><li>Two types of hypervisors<ul><li>Type 1 (also called "native" or "bare metal" hypervisors)<ul><li>Run directly on the host’s hardware to control the hardware and manage the guest VMs<ul><li>runs in ring 0</li></ul></li><li>Are an OS themselves (simple OS on top of which you run VMs)<ul><li>the physical machine the hypervisor is running on serves only for virtualization purposes<ul><li>Exceptions: Hyper-V, KVM</li></ul></li></ul></li><li>Examples<ul><li>Xen, Microsoft Hyper-V, VMware ESX/ESXi</li></ul></li></ul></li><li>Type 2 (also called "hosted" hypervisors)<ul><li>Run on conventional OS, just like other apps</li><li>Guest OS runs as a process on the host</li><li>Hypervisor separates the guest OS from the host OS</li><li>Examples<ul><li>VirtualBox, Parallels</li></ul></li></ul></li></ul></li><li>Protection levels (rings)<ul><li>x86 family of CPUs provide a range of protection levels also known as rings<ul><li>Ring 0 has the highest level privilege (kernel/supervisor)</li><li>Ring 3 lowest level (applications)</li></ul></li><li>Hypervisor occupies ring 0 of CPU</li><li>Kernels for any guest operating systems running on the system must run in less privileged CPU rings<ul><li>But most OS kernels are written explicitly to run in ring 0</li><li>Techniques to deal with this:<ul><li>Full virtualization<ul><li>hypervisor provides CPU emulation to handle ring 0 operations made by unmodified guest OS kernels</li><li>emulation process requires both time and system resources<ul><li>inferior performance</li></ul></li></ul></li><li>Paravirtualization<ul><li>Technique in which hypervisor provides an API and the OS of the guest VM calls that API</li><li>Requires guest OS to be modified (to make API calls)<ul><li>Replace any privileged operations that will only run in ring 0 of the CPU with calls to the hypervisor ("hypercalls")</li></ul></li><li>Allows tasks to run in host OS (instead of in guest OS where performance would be worse)</li></ul></li><li>Hardware virtualization<ul><li>Requires a CPU with hardware virtualization extensions, such as Intel VT or AMD-V<ul><li>Intel virtualization (VT-x)<ul><li>Virtual Machine Extensions</li><li>Adds ten new instructions<ul><li>VMPTRLD, VMPTRST, VMCLEAR, VMREAD, VMWRITE, VMCALL, VMLAUNCH, VMRESUME, VMXOFF, and VMXON.</li><li>These instructions permit entering and exiting a virtual execution mode where the guest OS perceives itself as running with full privilege (ring 0), but the host OS remains protected.</li></ul></li></ul></li></ul></li><li>Reduces/eliminates any OS modifications in guest OS</li><li>Provides an additional privilege mode above ring 0 in which the hypervisor can operate<ul><li>essentially leaving ring 0 available for unmodified guest OSes</li></ul></li><li>Better performance than paravirtualization</li></ul></li></ul></li></ul></li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://en.wikipedia.org/wiki/Virtual_machine">Virtual machine</a></li><li><a href="https://en.wikipedia.org/wiki/Hypervisor">Hypervisor</a></li><li><a href="https://www.networkworld.com/article/3243262/what-is-a-hypervisor.html">What is a hypervisor?</a></li><li><a href="https://phoenixnap.com/kb/what-is-hypervisor-type-1-2">What Is A Hypervisor? Types Of Hypervisors 1 &amp; 2<br></a><br></li></ul><p>End Song<br><a href="https://makemistakes.bandcamp.com/track/sad-livin-in-the-new-york-city-david-lasts-remix">Time for Trees - Sad Livin in the (New York) City - (David Last Remix)</a></p><p><br></p><p><br>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/81">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Oct 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1d9185b8/90a42aba.mp3" length="47674522" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2878</itunes:duration>
      <itunes:summary>Back in January 2018, Jon, Rich and Chris were having lunch together in Denver. The subject of virtualization came up, and Rich said he was confused on the difference between containers and virtual machines. As we answered Rich's question, we realized that explaining a complicated technical concept in a straight-forward manner would make for a great podcast format. And thus the idea of Mobycast was formed.
When we first discussed "Virtual Machines vs. Containers" in episode 1, we got most of it right, but there were some inconsistencies and holes. We didn't prepare as well as we should have for that first episode, and frankly, it shows. Now, more than 80 episodes later, we have learned a lot and expect more of ourselves. So, it's time for a "do over" on episode 1.
In this episode of Mobycast, Jon and Chris kick off a four-part series on virtual machines, containers and how they compare. We revisit this important subject to fill in the gaps, and dive a whole LOT deeper this time around.</itunes:summary>
      <itunes:subtitle>Back in January 2018, Jon, Rich and Chris were having lunch together in Denver. The subject of virtualization came up, and Rich said he was confused on the difference between containers and virtual machines. As we answered Rich's question, we realized tha</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, docker, containers, vms, virtual machines, hypervisors, virtualization</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Are You Well Architected? The Well-Architected Framework - Part 3</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Are You Well Architected? The Well-Architected Framework - Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6c7ed266-9bbb-4a07-8ece-279d4c0b2de7</guid>
      <link>https://share.transistor.fm/s/0dca16dd</link>
      <description>
        <![CDATA[<p><strong>Sponsor</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Pillars in depth<ul><li>Performance Efficiency<ul><li>"Ability to use resources efficiently to meet system requirements and maintain that efficiency as demand changes and technology evolves"</li><li>Design principles<ul><li>Easy to try new advanced technologies (by letting AWS manage them, instead of standing them up yourself)</li><li>Go global in minutes</li><li>Use serverless architectures</li><li>Experiment more often</li><li>Mechanical sympathy (use the technology approach that aligns best to what you are trying to achieve)</li></ul></li><li>Key service: CloudWatch</li><li>Focus areas<ul><li>Selection<ul><li>Services: EC2, EBS, RDS, DynamoDB, Auto Scaling, S3, VPC, Route53, DirectConnect</li></ul></li><li>Review<ul><li>Services: AWS Blog, AWS What's New</li></ul></li><li>Monitoring<ul><li>Services: CloudWatch, Lambda, Kinesis, SQS</li></ul></li><li>Tradeoffs<ul><li>Services: CloudFront, ElastiCache, Snowball, RDS (read replicas)</li></ul></li></ul></li><li>Best practices<ul><li>Selection<ul><li>Choose appropriate resource types<ul><li>Compute, storage, database, networking</li></ul></li></ul></li><li>Trade Offs<ul><li>Proximity and caching</li></ul></li></ul></li></ul></li><li>Cost Optimization<ul><li>"Ability to run systems to deliver business value at the lowest price point"</li><li>Design principles<ul><li>Adopt a consumption model (only pay for what you use)</li><li>Measure overall efficiency</li><li>Stop spending money on data center operations</li><li>Analyze and attribute expenditures</li><li>Use managed services to reduce TCO</li></ul></li><li>Key service: AWS Cost Explorer (with cost allocation tags)</li><li>Focus areas<ul><li>Expenditure awareness<ul><li>Services: Cost Explorer, AWS Budgets, CloudWatch, SNS</li></ul></li><li>Cost-effective resources<ul><li>Services: Reserved Instances, Spot Instances, Cost Explorer</li></ul></li><li>Matching supply and demand<ul><li>Services: Auto Scaling</li></ul></li><li>Optimizing over time<ul><li>Services: AWS Blog, AWS What's New, Trusted Advisor</li></ul></li></ul></li><li>Key points<ul><li>Use <em>Trusted Advisor</em> to find ways to save $$$</li></ul></li></ul></li></ul></li><li>The Well-Architected Review<ul><li>Centered around the question "Are you well architected?"</li><li>The Well-Architected review provides a consistent approach to review workload against current AWS best practices and gives advice on how to architect for the cloud</li><li>Benefits of the review<ul><li>Build and deploy faster</li><li>Lower or mitigate risks</li><li>Make informed decisions</li><li>Learn AWS best practices</li></ul></li></ul></li><li>The AWS Well-Architected Tool<ul><li>Cloud-based service available from the AWS console</li><li>Provides consistent process for you to review and measure your architecture using the AWS Well-Architected Framework</li><li>Helps you:<ul><li>Learn</li><li>Measure</li><li>Improve</li></ul></li><li>Improvement plan<ul><li>Based on identified high and medium risk topics</li><li>Canned list of suggested action items to address each risk topic</li></ul></li><li>Milestones<ul><li>Makes a read-only snapshot of completed questions and answers</li></ul></li><li>Best practices<ul><li>Save milestone after initially completing workload review</li><li>Then, whenever you make large changes to your workload architecture, perform a subsequent review and save as a new milestone</li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected</a></li><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://aws.amazon.com/well-architected-tool/">AWS Well-Architected Tool</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking.html">Enhanced Networking</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSOptimized.html">Amazon EBS-optimized instance</a></li><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-endpoints.html">VPC Endpoint</a></li><li><a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/transfer-acceleration.html">Amazon S3 Transfer Acceleration</a></li><li><a href="https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/">AWS Billing and Cost Management</a></li></ul><p><strong>Whitepapers</strong></p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br></p><p><strong>End Song:</strong><br><a href="http://www.smarturl.it/r127r2">The Shadow Gallery by Roy England<br></a><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/80">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm/">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Sponsor</strong></p><ul><li><a href="https://circleci.com/">Circle CI</a></li><li><a href="https://mobycast.fm/episode/the-ci-cd-pipeline/">Episode on CI/CD with Circle CI</a></li></ul><p><br><strong>Show Details</strong></p><p>In this episode, we cover the following topics:</p><ul><li>Pillars in depth<ul><li>Performance Efficiency<ul><li>"Ability to use resources efficiently to meet system requirements and maintain that efficiency as demand changes and technology evolves"</li><li>Design principles<ul><li>Easy to try new advanced technologies (by letting AWS manage them, instead of standing them up yourself)</li><li>Go global in minutes</li><li>Use serverless architectures</li><li>Experiment more often</li><li>Mechanical sympathy (use the technology approach that aligns best to what you are trying to achieve)</li></ul></li><li>Key service: CloudWatch</li><li>Focus areas<ul><li>Selection<ul><li>Services: EC2, EBS, RDS, DynamoDB, Auto Scaling, S3, VPC, Route53, DirectConnect</li></ul></li><li>Review<ul><li>Services: AWS Blog, AWS What's New</li></ul></li><li>Monitoring<ul><li>Services: CloudWatch, Lambda, Kinesis, SQS</li></ul></li><li>Tradeoffs<ul><li>Services: CloudFront, ElastiCache, Snowball, RDS (read replicas)</li></ul></li></ul></li><li>Best practices<ul><li>Selection<ul><li>Choose appropriate resource types<ul><li>Compute, storage, database, networking</li></ul></li></ul></li><li>Trade Offs<ul><li>Proximity and caching</li></ul></li></ul></li></ul></li><li>Cost Optimization<ul><li>"Ability to run systems to deliver business value at the lowest price point"</li><li>Design principles<ul><li>Adopt a consumption model (only pay for what you use)</li><li>Measure overall efficiency</li><li>Stop spending money on data center operations</li><li>Analyze and attribute expenditures</li><li>Use managed services to reduce TCO</li></ul></li><li>Key service: AWS Cost Explorer (with cost allocation tags)</li><li>Focus areas<ul><li>Expenditure awareness<ul><li>Services: Cost Explorer, AWS Budgets, CloudWatch, SNS</li></ul></li><li>Cost-effective resources<ul><li>Services: Reserved Instances, Spot Instances, Cost Explorer</li></ul></li><li>Matching supply and demand<ul><li>Services: Auto Scaling</li></ul></li><li>Optimizing over time<ul><li>Services: AWS Blog, AWS What's New, Trusted Advisor</li></ul></li></ul></li><li>Key points<ul><li>Use <em>Trusted Advisor</em> to find ways to save $$$</li></ul></li></ul></li></ul></li><li>The Well-Architected Review<ul><li>Centered around the question "Are you well architected?"</li><li>The Well-Architected review provides a consistent approach to review workload against current AWS best practices and gives advice on how to architect for the cloud</li><li>Benefits of the review<ul><li>Build and deploy faster</li><li>Lower or mitigate risks</li><li>Make informed decisions</li><li>Learn AWS best practices</li></ul></li></ul></li><li>The AWS Well-Architected Tool<ul><li>Cloud-based service available from the AWS console</li><li>Provides consistent process for you to review and measure your architecture using the AWS Well-Architected Framework</li><li>Helps you:<ul><li>Learn</li><li>Measure</li><li>Improve</li></ul></li><li>Improvement plan<ul><li>Based on identified high and medium risk topics</li><li>Canned list of suggested action items to address each risk topic</li></ul></li><li>Milestones<ul><li>Makes a read-only snapshot of completed questions and answers</li></ul></li><li>Best practices<ul><li>Save milestone after initially completing workload review</li><li>Then, whenever you make large changes to your workload architecture, perform a subsequent review and save as a new milestone</li></ul></li></ul></li></ul><p><strong>Links</strong></p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected</a></li><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://aws.amazon.com/well-architected-tool/">AWS Well-Architected Tool</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking.html">Enhanced Networking</a></li><li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSOptimized.html">Amazon EBS-optimized instance</a></li><li><a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-endpoints.html">VPC Endpoint</a></li><li><a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/transfer-acceleration.html">Amazon S3 Transfer Acceleration</a></li><li><a href="https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/">AWS Billing and Cost Management</a></li></ul><p><strong>Whitepapers</strong></p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br></p><p><strong>End Song:</strong><br><a href="http://www.smarturl.it/r127r2">The Shadow Gallery by Roy England<br></a><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/80">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm/">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast<br></a><br></li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Oct 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/0dca16dd/bc55777a.mp3" length="54639767" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Px7_tg1N-IzjgaFvatWaXD6orcxt-LszE1_7r8fU1Rs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzM4Ny8x/NTY5OTQ2NDU0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>3313</itunes:duration>
      <itunes:summary>Previously on Mobycast...
In episodes #78 and #79, we broke down the AWS Well-Architected Framework, and covered the first three pillars of excellence: "Operational Excellence", "Security" and "Reliability".
This week on Mobycast, Jon and Chris wrap up their three-part series and discuss the last two pillars of excellence, "Performance Efficiency" and "Cost Optimization". We then bring it all together by explaining how to perform a Well-Architected Review. Spoiler alert: the Well-Architected Tool is a fabulous resource that you need to have in your toolkit.</itunes:summary>
      <itunes:subtitle>Previously on Mobycast...
In episodes #78 and #79, we broke down the AWS Well-Architected Framework, and covered the first three pillars of excellence: "Operational Excellence", "Security" and "Reliability".
This week on Mobycast, Jon and Chris wrap up </itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, sre, well architected framework</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Are You Well Architected?  The Well-Architected Framework - Part 2</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Are You Well Architected?  The Well-Architected Framework - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c80ecae9-81fc-4966-9c85-5bdf2140aa60</guid>
      <link>https://share.transistor.fm/s/959e2c16</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Pillars in depth<ul><li>Security<ul><li>"Ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies"</li><li>Design principles<ul><li>Implement strong identity foundation</li><li>Enable traceability</li><li>Security at all layers</li><li>Automate security best practices</li><li>Protect data in transit and at rest</li><li>Keep people away from data</li><li>Prepare for security events</li></ul></li><li>Key service: AWS IAM</li><li>Focus areas<ul><li>Identity and access management<ul><li>Services: IAM, AWS Organizations, MFA</li></ul></li><li>Detective controls<ul><li>Services: CloudTrail, CloudWatch, AWS Config, GuardDuty</li></ul></li><li>Infrastructure protection<ul><li>Services: VPC, Shield, WAF</li></ul></li><li>Data protection<ul><li>Services: KMS, ELB (encryption), Macie (detect sensitive data)</li></ul></li><li>Incident response<ul><li>Services: IAM, CloudFormation</li></ul></li></ul></li><li>Best practices<ul><li>Identity and access management<ul><li>AWS Cognito<ul><li>Act as broker between login providers</li><li>Securely access any AWS service from mobile device</li></ul></li></ul></li><li>Data protection<ul><li>Encrypt<ul><li>Encryption at rest</li><li>Encryption in transit</li><li>Encrypted backups</li></ul></li><li>Versioning</li><li>Storage resiliency</li><li>Detailed logging</li></ul></li><li>Incident response<ul><li>Employ strategy of templated "clean rooms"<ul><li>Create new trusted environment to conduct investigation</li><li>Use CloudFormation to easily create the "clean room" environment</li></ul></li></ul></li></ul></li></ul></li><li>Reliability<ul><li>"Ability to recover from failures, dynamically acquire resources to meet demand and mitigate disruptions such as network issues"</li><li>Design principles<ul><li>Test recovery procedures</li><li>Auto recover from failures</li><li>Scale horizontally to increase availability</li><li>Stop guessing capacity</li><li>Manage change with automation</li></ul></li><li>Key service: CloudWatch</li><li>Focus areas<ul><li>Foundations<ul><li>Services: IAM, VPC, Trusted Advisor (visibility into service limits), Shield (protect from DDoS)</li></ul></li><li>Change management<ul><li>Services: CloudTrail, AWS Config, CloudWatch, Auto Scaling</li></ul></li><li>Failure management<ul><li>Services: CloudFormation, S3, Glacier, KMS</li></ul></li></ul></li><li>Best practices<ul><li>Foundations<ul><li>Take into account physical and service limits</li><li>High availability<ul><li>No single points of failure (SPOF)</li><li>Multi-AZ design</li><li>Load balancing</li><li>Auto scaling</li><li>Redundant connectivity</li><li>Software resilience</li></ul></li></ul></li><li>Failure management<ul><li>Backup and disaster recovery<ul><li>RPO, RTO</li></ul></li><li>Inject failures to test resiliency</li></ul></li></ul></li><li>Key points<ul><li>Plan network topology</li><li>Manage your AWS service and rate limits</li><li>Monitor your system</li><li>Automate responses to demand</li><li>Backup</li></ul></li></ul></li></ul></li><li>In the next episode, we'll cover the remaining 2 pillars and discuss how to perform a Well-Architected Review.<p></p></li></ul><p>Links</p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected</a></li><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://www.youtube.com/watch?v=swQbA4zub20">AWS re:Invent 2018: How AWS Minimizes the Blast Radius of Failures - ARC338</a></li><li><a href="https://aws.amazon.com/blogs/architecture/shuffle-sharding-massive-and-magical-fault-isolation/">Shuffle Sharding: Massive and Magical Fault Isolation<br></a><br></li></ul><p>Whitepapers</p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br></p><p>End song:<br><a href="https://makemistakes.bandcamp.com/album/the-runner">The Runner (David Last Remix) - Fax</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/79">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li>Pillars in depth<ul><li>Security<ul><li>"Ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies"</li><li>Design principles<ul><li>Implement strong identity foundation</li><li>Enable traceability</li><li>Security at all layers</li><li>Automate security best practices</li><li>Protect data in transit and at rest</li><li>Keep people away from data</li><li>Prepare for security events</li></ul></li><li>Key service: AWS IAM</li><li>Focus areas<ul><li>Identity and access management<ul><li>Services: IAM, AWS Organizations, MFA</li></ul></li><li>Detective controls<ul><li>Services: CloudTrail, CloudWatch, AWS Config, GuardDuty</li></ul></li><li>Infrastructure protection<ul><li>Services: VPC, Shield, WAF</li></ul></li><li>Data protection<ul><li>Services: KMS, ELB (encryption), Macie (detect sensitive data)</li></ul></li><li>Incident response<ul><li>Services: IAM, CloudFormation</li></ul></li></ul></li><li>Best practices<ul><li>Identity and access management<ul><li>AWS Cognito<ul><li>Act as broker between login providers</li><li>Securely access any AWS service from mobile device</li></ul></li></ul></li><li>Data protection<ul><li>Encrypt<ul><li>Encryption at rest</li><li>Encryption in transit</li><li>Encrypted backups</li></ul></li><li>Versioning</li><li>Storage resiliency</li><li>Detailed logging</li></ul></li><li>Incident response<ul><li>Employ strategy of templated "clean rooms"<ul><li>Create new trusted environment to conduct investigation</li><li>Use CloudFormation to easily create the "clean room" environment</li></ul></li></ul></li></ul></li></ul></li><li>Reliability<ul><li>"Ability to recover from failures, dynamically acquire resources to meet demand and mitigate disruptions such as network issues"</li><li>Design principles<ul><li>Test recovery procedures</li><li>Auto recover from failures</li><li>Scale horizontally to increase availability</li><li>Stop guessing capacity</li><li>Manage change with automation</li></ul></li><li>Key service: CloudWatch</li><li>Focus areas<ul><li>Foundations<ul><li>Services: IAM, VPC, Trusted Advisor (visibility into service limits), Shield (protect from DDoS)</li></ul></li><li>Change management<ul><li>Services: CloudTrail, AWS Config, CloudWatch, Auto Scaling</li></ul></li><li>Failure management<ul><li>Services: CloudFormation, S3, Glacier, KMS</li></ul></li></ul></li><li>Best practices<ul><li>Foundations<ul><li>Take into account physical and service limits</li><li>High availability<ul><li>No single points of failure (SPOF)</li><li>Multi-AZ design</li><li>Load balancing</li><li>Auto scaling</li><li>Redundant connectivity</li><li>Software resilience</li></ul></li></ul></li><li>Failure management<ul><li>Backup and disaster recovery<ul><li>RPO, RTO</li></ul></li><li>Inject failures to test resiliency</li></ul></li></ul></li><li>Key points<ul><li>Plan network topology</li><li>Manage your AWS service and rate limits</li><li>Monitor your system</li><li>Automate responses to demand</li><li>Backup</li></ul></li></ul></li></ul></li><li>In the next episode, we'll cover the remaining 2 pillars and discuss how to perform a Well-Architected Review.<p></p></li></ul><p>Links</p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected</a></li><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://www.youtube.com/watch?v=swQbA4zub20">AWS re:Invent 2018: How AWS Minimizes the Blast Radius of Failures - ARC338</a></li><li><a href="https://aws.amazon.com/blogs/architecture/shuffle-sharding-massive-and-magical-fault-isolation/">Shuffle Sharding: Massive and Magical Fault Isolation<br></a><br></li></ul><p>Whitepapers</p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br></p><p>End song:<br><a href="https://makemistakes.bandcamp.com/album/the-runner">The Runner (David Last Remix) - Fax</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/79">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast<br></a><br></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Sep 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/959e2c16/f486db4d.mp3" length="63713192" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/pEHIsdlGe4sEQYrlZSE59HR_SC5H0RYxum3r9hrKeq8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMDc5OC8x/NTY5MzUwNTY0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>3880</itunes:duration>
      <itunes:summary>In episode #78 of Mobycast, we introduced the AWS Well-Architected Framework, an indispensable resource of best practices when running workloads in the cloud. We explained that the framework defines five pillars of excellence, and we dug deep on the first pillar, "Operational Excellence".

If you missed that episode, hit pause now and go listen to that one first. It's ok, we'll wait for you.
Now, in this episode of Mobycast, Jon and Chris continue their three-part series on the AWS Well-Architected Framework and discuss the next two pillars of excellence: "Security" and "Reliability".</itunes:summary>
      <itunes:subtitle>In episode #78 of Mobycast, we introduced the AWS Well-Architected Framework, an indispensable resource of best practices when running workloads in the cloud. We explained that the framework defines five pillars of excellence, and we dug deep on the first</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, sre, well architected framework</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Are You Well Architected? The Well-Architected Framework - Part 1</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Are You Well Architected? The Well-Architected Framework - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07210dc9-f438-49c9-9817-bec1e74ede54</guid>
      <link>https://share.transistor.fm/s/83cc731b</link>
      <description>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected Framework</a><ul><li>Provides consistent approach to evaluating systems against cloud best practices</li><li>Helps advise changes necessary to make specific architecture align with best practices</li><li>Comprised of 3 components:<ul><li>Design Principles</li><li>Pillars<ul><li>Operational Excellence</li><li>Security</li><li>Reliability</li><li>Performance Efficiency</li><li>Cost Optimization</li></ul></li><li>Questions</li></ul></li></ul></li><li>General design principles<ul><li>Cloud-native has changed everything. In cloud, you can:<ul><li>Stop guessing capacity needs</li><li>Test at scale</li><li>Automate all the things to make experimentation easier</li><li>Allow for evolutionary architectures (you are never <em>stuck</em> with a particular technology)</li><li>Drive architectures using data (allows you to make fact based decisions on how to improve your workload)</li><li>Improve through game days</li></ul></li></ul></li><li>Pillars in depth<ul><li>Operational Excellence<ul><li>"Ability to run and monitor systems to deliver business value and to continuously improve supporting processes and procedures"</li><li>Design principles<ul><li>Perform operations as code</li><li>Annotate documentation</li><li>Make frequent, small, reversible changes</li><li>Refine operations procedures frequently</li><li>Anticipate failure</li><li>Learn from all operational failures</li></ul></li><li>Key service: CloudFormation</li><li>Focus areas<ul><li>Prepare<ul><li>Services: AWS Config, AWS Config Rules</li></ul></li><li>Operate<ul><li>Services: CloudWatch, X-Ray, CloudTrail, VPC Flow Logs</li></ul></li><li>Evolve<ul><li>Services: Elasticsearch (for searching log data to gain insights), CloudWatch Insights</li></ul></li></ul></li><li>Best practices<ul><li>Prepare<ul><li>Implement telemetry for:<ul><li>Application</li><li>Workload</li><li>User activity</li><li>Dependencies</li></ul></li><li>Implement transaction traceability</li></ul></li><li>Operate<ul><li>Any event for which you raise an alert should have associated runbook<ul><li>Runbook defines triggers for escalations</li></ul></li><li>Users should be notified when system is impacted</li><li>Communicate status through dashboards<ul><li>Provide dashboards to communicate the current operating status of the business and provide metrics of interest</li></ul></li></ul></li><li>Evolve<ul><li>Feedback loops<ul><li>Identify areas for improvement</li><li>Gauge impact of changes to the system (i.e. did it make an improvement?)</li><li>Perform operations metrics reviews<ul><li>Retrospective analysis of operations metrics<ul><li>Use these reviews to identify opportunities for improvement, potential courses of action, and share lessons learned</li></ul></li></ul></li></ul></li></ul></li></ul></li><li>Key points<ul><li>Runbooks, playbooks</li><li>Document environments</li><li>Make small changes through automation</li><li>Monitor workload with business metrics</li><li>Exercise your response to failures</li><li>Have well-defined escalation management</li></ul></li></ul></li></ul></li><li>In future episodes, we'll cover the remaining 4 pillars</li></ul><p><br><strong>Links</strong></p><ul><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://aws.amazon.com/blogs/aws/are-you-well-architected/">Are You Well-Architected?</a></li><li><a href="https://www.youtube.com/watch?v=ZDScBNahsL4">AWS re:Invent 2016 Keynote: Werner Vogels</a><ul><li>See: 25:45 through 31:25</li></ul></li><li><a href="https://wa.aws.amazon.com/wat.concept.runbook.en.html">Runbooks</a></li><li><a href="https://wa.aws.amazon.com/wat.concept.playbook.en.html">Playbooks</a></li><li><a href="https://status.aws.amazon.com/">AWS Service Health Dashboard</a></li><li><a href="https://aws.amazon.com/premiumsupport/technology/personal-health-dashboard/">AWS Personal Health Dashboard<br></a><br></li></ul><p><strong>Whitepapers</strong></p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br>End Song:<br><a href="https://makemistakes.bandcamp.com/album/in-the-land-of-dreams">30 Days &amp; 30 Nights by Fortune Finder</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/78">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we cover the following topics:</p><ul><li><a href="https://aws.amazon.com/architecture/well-architected/">AWS Well-Architected Framework</a><ul><li>Provides consistent approach to evaluating systems against cloud best practices</li><li>Helps advise changes necessary to make specific architecture align with best practices</li><li>Comprised of 3 components:<ul><li>Design Principles</li><li>Pillars<ul><li>Operational Excellence</li><li>Security</li><li>Reliability</li><li>Performance Efficiency</li><li>Cost Optimization</li></ul></li><li>Questions</li></ul></li></ul></li><li>General design principles<ul><li>Cloud-native has changed everything. In cloud, you can:<ul><li>Stop guessing capacity needs</li><li>Test at scale</li><li>Automate all the things to make experimentation easier</li><li>Allow for evolutionary architectures (you are never <em>stuck</em> with a particular technology)</li><li>Drive architectures using data (allows you to make fact based decisions on how to improve your workload)</li><li>Improve through game days</li></ul></li></ul></li><li>Pillars in depth<ul><li>Operational Excellence<ul><li>"Ability to run and monitor systems to deliver business value and to continuously improve supporting processes and procedures"</li><li>Design principles<ul><li>Perform operations as code</li><li>Annotate documentation</li><li>Make frequent, small, reversible changes</li><li>Refine operations procedures frequently</li><li>Anticipate failure</li><li>Learn from all operational failures</li></ul></li><li>Key service: CloudFormation</li><li>Focus areas<ul><li>Prepare<ul><li>Services: AWS Config, AWS Config Rules</li></ul></li><li>Operate<ul><li>Services: CloudWatch, X-Ray, CloudTrail, VPC Flow Logs</li></ul></li><li>Evolve<ul><li>Services: Elasticsearch (for searching log data to gain insights), CloudWatch Insights</li></ul></li></ul></li><li>Best practices<ul><li>Prepare<ul><li>Implement telemetry for:<ul><li>Application</li><li>Workload</li><li>User activity</li><li>Dependencies</li></ul></li><li>Implement transaction traceability</li></ul></li><li>Operate<ul><li>Any event for which you raise an alert should have associated runbook<ul><li>Runbook defines triggers for escalations</li></ul></li><li>Users should be notified when system is impacted</li><li>Communicate status through dashboards<ul><li>Provide dashboards to communicate the current operating status of the business and provide metrics of interest</li></ul></li></ul></li><li>Evolve<ul><li>Feedback loops<ul><li>Identify areas for improvement</li><li>Gauge impact of changes to the system (i.e. did it make an improvement?)</li><li>Perform operations metrics reviews<ul><li>Retrospective analysis of operations metrics<ul><li>Use these reviews to identify opportunities for improvement, potential courses of action, and share lessons learned</li></ul></li></ul></li></ul></li></ul></li></ul></li><li>Key points<ul><li>Runbooks, playbooks</li><li>Document environments</li><li>Make small changes through automation</li><li>Monitor workload with business metrics</li><li>Exercise your response to failures</li><li>Have well-defined escalation management</li></ul></li></ul></li></ul></li><li>In future episodes, we'll cover the remaining 4 pillars</li></ul><p><br><strong>Links</strong></p><ul><li><a href="https://wa.aws.amazon.com/index.html">AWS Well-Architected Framework - Online/HTML version</a><ul><li>includes drill down pages for each review question, with recommended action items to address that issue</li></ul></li><li><a href="https://aws.amazon.com/blogs/aws/are-you-well-architected/">Are You Well-Architected?</a></li><li><a href="https://www.youtube.com/watch?v=ZDScBNahsL4">AWS re:Invent 2016 Keynote: Werner Vogels</a><ul><li>See: 25:45 through 31:25</li></ul></li><li><a href="https://wa.aws.amazon.com/wat.concept.runbook.en.html">Runbooks</a></li><li><a href="https://wa.aws.amazon.com/wat.concept.playbook.en.html">Playbooks</a></li><li><a href="https://status.aws.amazon.com/">AWS Service Health Dashboard</a></li><li><a href="https://aws.amazon.com/premiumsupport/technology/personal-health-dashboard/">AWS Personal Health Dashboard<br></a><br></li></ul><p><strong>Whitepapers</strong></p><ul><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf">AWS Well-Architected Framework</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Operational-Excellence-Pillar.pdf">Operational Excellence Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf">Security Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Reliability-Pillar.pdf">Reliability Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Performance-Efficiency-Pillar.pdf">Performance-Efficiency Pillar</a></li><li><a href="https://d1.awsstatic.com/whitepapers/architecture/AWS-Cost-Optimization-Pillar.pdf">Cost Optimization Pillar</a></li></ul><p><br>End Song:<br><a href="https://makemistakes.bandcamp.com/album/in-the-land-of-dreams">30 Days &amp; 30 Nights by Fortune Finder</a></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/78">episode webpage</a>.</p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Sep 2019 13:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/83cc731b/ef367f77.mp3" length="54747252" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3320</itunes:duration>
      <itunes:summary>Just as the Twelve-Factor App methodology was born from real world experience of deploying successful apps at Heroku, architects at AWS created the Well-Architected Framework to document best practices they observed when running workloads in the cloud.

Originally announced as a whitepaper in October 2015, the Well-Architected Framework got center stage treatment at re:Invent 2016 during Werner Vogels' keynote address. Since then, it has evolved to become an indispensable resource when building and running workloads in AWS.

But the Well-Architected Framework is massive, consisting of 6 core whitepapers that total over 400 pages. It would be easy to dismiss it as just another boring set of documents. But doing so would be a big mistake. There is a lot of gold to be found if you are willing to do some digging.

In this episode of Mobycast, Jon and Chris kick off a three-part series where we grab our shovels and dig deep into the Well-Architected Framework and explain how you can best take advantage of this important resource.</itunes:summary>
      <itunes:subtitle>Just as the Twelve-Factor App methodology was born from real world experience of deploying successful apps at Heroku, architects at AWS created the Well-Architected Framework to document best practices they observed when running workloads in the cloud.
</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, software architecture, sre, well architected framework</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Twelve-Factor App: 12 Best Practices for Microservices</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>The Twelve-Factor App: 12 Best Practices for Microservices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87f6ec4d-df28-4faf-baec-33d9debd6b03</guid>
      <link>https://share.transistor.fm/s/7d279f2b</link>
      <description>
        <![CDATA[<ul><li><a href="https://12factor.net/">The Twelve-Factor App methodology</a> <ul><li>Drafted by developers at Heroku based upon their observations of what made good apps </li><li>First presented by Adam Wiggins circa 2011 (then published in 2012) </li></ul></li><li>The Factors <ul><li>1 - Codebase: one codebase tracked in revision control, many deploys </li><li>2 - Dependencies: explicitly declare and isolate dependencies </li><li>3 - Config: strict separation of config from code </li><li>4 - Backing services: foster loose coupling by treating backing services as attached resources </li><li>5 - Build, release, run: strictly separate build and run stages </li><li>6 - Processes: processes are stateless and share-nothing </li><li>7 - Port binding: export services via port binding </li><li>8 - Concurrency: scale out via the process model </li><li>9 - Disposability: processes are disposable, they can be started or stopped at a moment’s notice </li><li>10 - Dev/prod parity: Keep development, staging, and production as similar as possible </li><li>11 - Logs: treat logs as event streams, don't manage log files </li><li>12 - Admin processes: admin and utility code ships with app code to avoid synchronization issues </li></ul></li><li>What's Missing? <ul><li>7 years since first being published, what changes should be made to make it more relevant for today? <ul><li><a href="https://www.oreilly.com/library/view/beyond-the-twelve-factor/9781492042631/">Some have argued</a> for adding 3 additional factors: <ul><li>Telemetry </li><li>Security </li><li>"API First"-philosophy </li></ul></li></ul></li></ul></li></ul><p><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/77">episode webpage</a>.</p><p>End song:<br><a href="https://makemistakes.bandcamp.com/track/flowerchild-roy-england-remix">Flowerchild (Roy England Remix) by Owen Ni - Make Mistakes</a></p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<ul><li><a href="https://12factor.net/">The Twelve-Factor App methodology</a> <ul><li>Drafted by developers at Heroku based upon their observations of what made good apps </li><li>First presented by Adam Wiggins circa 2011 (then published in 2012) </li></ul></li><li>The Factors <ul><li>1 - Codebase: one codebase tracked in revision control, many deploys </li><li>2 - Dependencies: explicitly declare and isolate dependencies </li><li>3 - Config: strict separation of config from code </li><li>4 - Backing services: foster loose coupling by treating backing services as attached resources </li><li>5 - Build, release, run: strictly separate build and run stages </li><li>6 - Processes: processes are stateless and share-nothing </li><li>7 - Port binding: export services via port binding </li><li>8 - Concurrency: scale out via the process model </li><li>9 - Disposability: processes are disposable, they can be started or stopped at a moment’s notice </li><li>10 - Dev/prod parity: Keep development, staging, and production as similar as possible </li><li>11 - Logs: treat logs as event streams, don't manage log files </li><li>12 - Admin processes: admin and utility code ships with app code to avoid synchronization issues </li></ul></li><li>What's Missing? <ul><li>7 years since first being published, what changes should be made to make it more relevant for today? <ul><li><a href="https://www.oreilly.com/library/view/beyond-the-twelve-factor/9781492042631/">Some have argued</a> for adding 3 additional factors: <ul><li>Telemetry </li><li>Security </li><li>"API First"-philosophy </li></ul></li></ul></li></ul></li></ul><p><br></p><p>For a full transcription of this episode, please visit the <a href="https://mobycast.fm/77">episode webpage</a>.</p><p>End song:<br><a href="https://makemistakes.bandcamp.com/track/flowerchild-roy-england-remix">Flowerchild (Roy England Remix) by Owen Ni - Make Mistakes</a></p><p>We'd love to hear from you! You can reach us at:</p><ul><li>Web: <a href="https://mobycast.fm">https://mobycast.fm</a></li><li>Voicemail: 844-818-0993</li><li>Email: <a href="mailto:ask@mobycast.fm">ask@mobycast.fm</a></li><li>Twitter: <a href="https://twitter.com/hashtag/mobycast">https://twitter.com/hashtag/mobycast</a></li><li>Reddit: <a href="https://reddit.com/r/mobycast">https://reddit.com/r/mobycast</a></li></ul><p><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Sep 2019 07:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/7d279f2b/5bc0e999.mp3" length="51297125" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3104</itunes:duration>
      <itunes:summary>The 12 factor app methodology was created by developers at Heroku after their experience working with hundreds of thousands of apps on the Heroku platform. They noticed that successful apps shared a core set of things in common. First published in 2012, the 12 Factor App attempts to distill these commonalities into 12 principals. But the 12 Factor App is now over 7 years old which is several lifetimes in the technology world.  Is it still applicable to today’s modern, cloud-native applications? In this episode of Mobycast, Jon and Chris go through the 12 factors explaining each one in detail and debating its relevance to today’s cloud-native applications.</itunes:summary>
      <itunes:subtitle>The 12 factor app methodology was created by developers at Heroku after their experience working with hundreds of thousands of apps on the Heroku platform. They noticed that successful apps shared a core set of things in common. First published in 2012, t</itunes:subtitle>
      <itunes:keywords>software, aws, cloud</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>An Encryption Deep Dive - Part Four</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>An Encryption Deep Dive - Part Four</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://mobycast.castos.com/podcasts/44/episodes/an-encryption-deep-dive-part-four-1</guid>
      <link>https://share.transistor.fm/s/66554a69</link>
      <description>
        <![CDATA[<p>In Episode 76 of Mobycast, Jon and Chris finish our series on encryption by digging into AWS’ encryption services. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 76 of Mobycast, Jon and Chris finish our series on encryption by digging into AWS’ encryption services. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Sep 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/66554a69/d053e17a.mp3" length="50550783" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/-CF-RC4Dgja87Hy5mwxnDH6-c06t5Qp0bipkxCFU3vI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzUyLzE1/NjgwNDM4ODgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>3156</itunes:duration>
      <itunes:summary>In Episode 76 of Mobycast, Jon and Chris finish our series on encryption by digging into AWS’ encryption services. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 76 of Mobycast, Jon and Chris finish our series on encryption by digging into AWS’ encryption services. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>An Encryption Deep Dive - Part Three</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>An Encryption Deep Dive - Part Three</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87eae491-5aca-4deb-a6e9-5627020fd14e</guid>
      <link>https://share.transistor.fm/s/1782fbb3</link>
      <description>
        <![CDATA[<p>In Episode 75 of Mobycast, we continue with part three of our series on encryption. In particular, we discuss end-to-end encryption in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 75 of Mobycast, we continue with part three of our series on encryption. In particular, we discuss end-to-end encryption in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems. </p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Aug 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1782fbb3/fcef6164.mp3" length="31465076" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/dLbTclisXjIj-KiKALUk1PFJItLIFQ_TxdhGKrKfrP8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzUxLzE1/NjgwNDM4ODMtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1963</itunes:duration>
      <itunes:summary>In Episode 75 of Mobycast, we continue with part three of our series on encryption. In particular, we discuss end-to-end encryption in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 75 of Mobycast, we continue with part three of our series on encryption. In particular, we discuss end-to-end encryption in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed syste</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>An Encryption Deep Dive - Part Two</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>An Encryption Deep Dive - Part Two</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">13be8dd8-88d9-4e6e-8f47-ee71626c35cb</guid>
      <link>https://share.transistor.fm/s/c038eb01</link>
      <description>
        <![CDATA[<p>In episode 74 of Mobycast, we continue with part two of our series on encryption. In particular, we'll discuss Transport Layer Security in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 74 of Mobycast, we continue with part two of our series on encryption. In particular, we'll discuss Transport Layer Security in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Aug 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/c038eb01/b1c87c27.mp3" length="35318160" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/IS4vesV4ZoKc6jGuEOwIu-OeqFwHfX8WBAOgHM8ugk8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzUwLzE1/NjgwNDM4NzctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2204</itunes:duration>
      <itunes:summary>In episode 74 of Mobycast, we continue with part two of our series on encryption. In particular, we'll discuss Transport Layer Security in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 74 of Mobycast, we continue with part two of our series on encryption. In particular, we'll discuss Transport Layer Security in practice. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed s</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>An Encryption Deep Dive - Part One</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>An Encryption Deep Dive - Part One</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b65d7af-fc6c-4aea-9fe9-82c7ff2224d9</guid>
      <link>https://share.transistor.fm/s/5b2e1e08</link>
      <description>
        <![CDATA[<p>In episode 73 of Mobycast, we start a new series on encryption and dive into the essentials. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 73 of Mobycast, we start a new series on encryption and dive into the essentials. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Aug 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/5b2e1e08/a02ccac6.mp3" length="40742384" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/zzZLpGfHRiNUw6sgU4gqEWStQcgE9hdrieLSQp-LRls/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ5LzE1/NjgwNDM4NzEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2543</itunes:duration>
      <itunes:summary>In episode 73 of Mobycast, we start a new series on encryption and dive into the essentials. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 73 of Mobycast, we start a new series on encryption and dive into the essentials. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Growth Hacking for Remote and International Developers - Part 2</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Growth Hacking for Remote and International Developers - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">052db150-ab36-432e-9f00-17076867dc97</guid>
      <link>https://share.transistor.fm/s/8a98769e</link>
      <description>
        <![CDATA[<p>In Episode 72 of Mobycast, we dive into part two of our discussion on growing high performing remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 72 of Mobycast, we dive into part two of our discussion on growing high performing remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 07 Aug 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/8a98769e/8c350905.mp3" length="41058201" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/nSxWO3crAmVCIosUIALYh1IOqSmOPHhGO9Rc8tkwNwY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ4LzE1/NjgwNDM4NjUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2563</itunes:duration>
      <itunes:summary>In Episode 72 of Mobycast, we dive into part two of our discussion on growing high performing remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 72 of Mobycast, we dive into part two of our discussion on growing high performing remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Growth Hacking for Remote and International Developers - Part 1</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Growth Hacking for Remote and International Developers - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6498b92-5208-4521-94b4-907374e010b1</guid>
      <link>https://share.transistor.fm/s/267fe138</link>
      <description>
        <![CDATA[<p>In episode 71 of Mobycast, Jon and Chris discuss lessons learned while working with remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 71 of Mobycast, Jon and Chris discuss lessons learned while working with remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jul 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/267fe138/86d47e63.mp3" length="29174932" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/9GhUiSYmnppkAh8ejtsmVXjM6JoLpBzunAkw2SVoQXw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ3LzE1/NjgwNDM4NTgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1820</itunes:duration>
      <itunes:summary>In episode 71 of Mobycast, Jon and Chris discuss lessons learned while working with remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 71 of Mobycast, Jon and Chris discuss lessons learned while working with remote and international engineering teams. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Microservices Bootcamp 3 - Micro Frontends</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Microservices Bootcamp 3 - Micro Frontends</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92e21bf3-827e-4df3-8d70-c74afd43b3f8</guid>
      <link>https://share.transistor.fm/s/f5a52ce1</link>
      <description>
        <![CDATA[<p>In Episode 70 of Mobycast, we wrap up our bootcamp on Microservices with the discussion on Micro Frontends. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 70 of Mobycast, we wrap up our bootcamp on Microservices with the discussion on Micro Frontends. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jul 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/f5a52ce1/afdc3c81.mp3" length="35822247" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Ulo1zEL9fgaInNw58iiO6QiMKM9QcqBzV3sPkZhSReg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ2LzE1/NjgwNDM4NTItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2235</itunes:duration>
      <itunes:summary>In Episode 70 of Mobycast, we wrap up our bootcamp on Microservices with the discussion on Micro Frontends. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 70 of Mobycast, we wrap up our bootcamp on Microservices with the discussion on Micro Frontends. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Microservices Part 2: Sizing, Decomposition, and Dismantling the Monolith</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Microservices Part 2: Sizing, Decomposition, and Dismantling the Monolith</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3ae5747-c9a4-46cb-bf16-aedfd7bcccce</guid>
      <link>https://share.transistor.fm/s/bf1fdd98</link>
      <description>
        <![CDATA[<p>In Episode 69 of Mobycast, we get hands-on with part two of our Microservices bootcamp and discuss sizing, decomposition, and dismantling monolith. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 69 of Mobycast, we get hands-on with part two of our Microservices bootcamp and discuss sizing, decomposition, and dismantling monolith. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Jul 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/bf1fdd98/3ec89f8b.mp3" length="39936094" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Etd1V8atVlAEagcR2oVnnnjNvTLxRcgQsjeH202hzQ0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ1LzE1/NjgwNDM4NDYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2493</itunes:duration>
      <itunes:summary>In Episode 69 of Mobycast, we get hands-on with part two of our Microservices bootcamp and discuss sizing, decomposition, and dismantling monolith. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 69 of Mobycast, we get hands-on with part two of our Microservices bootcamp and discuss sizing, decomposition, and dismantling monolith. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed sy</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Microservices Boot Camp Part 1</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Microservices Boot Camp Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36bf2ed8-d8c5-40ba-97a0-57748fc4b1fa</guid>
      <link>https://share.transistor.fm/s/2e2c82e1</link>
      <description>
        <![CDATA[<p>In episode 68 of Mobycast, Jon and Chris kick off part one of our Microservices bootcamp, answering the essential questions of what, why, and how. Welcome to Mobycast, a weekly conversation about Cloud native development, AWS, and building distributed systems. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 68 of Mobycast, Jon and Chris kick off part one of our Microservices bootcamp, answering the essential questions of what, why, and how. Welcome to Mobycast, a weekly conversation about Cloud native development, AWS, and building distributed systems. </p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jul 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/2e2c82e1/18efb68d.mp3" length="35762670" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/pfYA1Q1VuQdBdHJ2PNpZ7XifKRRwxkUr_tGCTb4IOco/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQ0LzE1/NjgwNDM4MzktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2232</itunes:duration>
      <itunes:summary>In episode 68 of Mobycast, Jon and Chris kick off part one of our Microservices bootcamp, answering the essential questions of what, why, and how. Welcome to Mobycast, a weekly conversation about Cloud native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 68 of Mobycast, Jon and Chris kick off part one of our Microservices bootcamp, answering the essential questions of what, why, and how. Welcome to Mobycast, a weekly conversation about Cloud native development, AWS, and building distributed sys</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Real World AWS - Using Custom CloudWatch Metrics to Monitor Disk Space</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Real World AWS - Using Custom CloudWatch Metrics to Monitor Disk Space</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">24713c88-b2d3-4c57-8834-a178838602cf</guid>
      <link>https://share.transistor.fm/s/f7c28c1d</link>
      <description>
        <![CDATA[<p>In Episode 67 of Mobycast, Jon and Chris discuss using custom CloudWatch metrics to monitor disk space. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 67 of Mobycast, Jon and Chris discuss using custom CloudWatch metrics to monitor disk space. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Jul 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/f7c28c1d/49d6f12a.mp3" length="34178898" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/9Fs9G-ZjWD-B_vAcC5zU7Plq7vm6XthJjCukBkTajrs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQzLzE1/NjgwNDM4MzUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2133</itunes:duration>
      <itunes:summary>In Episode 67 of Mobycast, Jon and Chris discuss using custom CloudWatch metrics to monitor disk space. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 67 of Mobycast, Jon and Chris discuss using custom CloudWatch metrics to monitor disk space. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Using Feature Flags to Increase Velocity and Decrease Risk in a Modern CI:CD Delivery Pipeline</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Using Feature Flags to Increase Velocity and Decrease Risk in a Modern CI:CD Delivery Pipeline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19711740-b87b-4c5a-8c50-1117b5de812e</guid>
      <link>https://share.transistor.fm/s/e11810dc</link>
      <description>
        <![CDATA[<p>In Episode 66 of Mobycast, Jon and Chris discuss using feature flags to increase velocity and decrease risk in your CI/CD pipeline. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 66 of Mobycast, Jon and Chris discuss using feature flags to increase velocity and decrease risk in your CI/CD pipeline. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Jun 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/e11810dc/5853372e.mp3" length="30517742" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/oJMJXbOgiPClKJcnrdKz7mJUMqP6kYu3VDqPH_qUhyM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQyLzE1/NjgwNDM4MzItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1904</itunes:duration>
      <itunes:summary>In Episode 66 of Mobycast, Jon and Chris discuss using feature flags to increase velocity and decrease risk in your CI/CD pipeline. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 66 of Mobycast, Jon and Chris discuss using feature flags to increase velocity and decrease risk in your CI/CD pipeline. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Practical AWS - Hosting a Personal Blog the Hard Way, Then the Easy Way</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Practical AWS - Hosting a Personal Blog the Hard Way, Then the Easy Way</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87cfb53f-4d9e-476e-be52-6334334ea8f9</guid>
      <link>https://share.transistor.fm/s/4a3ee6d5</link>
      <description>
        <![CDATA[<p>In Episode 65 of Mobycast, Chris walks us through the setup of his personal blog using Ghost. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 65 of Mobycast, Chris walks us through the setup of his personal blog using Ghost. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Jun 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4a3ee6d5/d2f5df64.mp3" length="28948866" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/YtXfAT1Fr7i5meu_j9kUyiPH-ifgC6Blvojdgt8o5DE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQxLzE1/NjgwNDM4MzAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1806</itunes:duration>
      <itunes:summary>In Episode 65 of Mobycast, Chris walks us through the setup of his personal blog using Ghost. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 65 of Mobycast, Chris walks us through the setup of his personal blog using Ghost. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Post Gluecon Thoughts and How Aurora Serverless Works</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Post Gluecon Thoughts and How Aurora Serverless Works</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34ea769a-39d9-4cab-b2be-50c7efc434d3</guid>
      <link>https://share.transistor.fm/s/ab25421d</link>
      <description>
        <![CDATA[<p>In Episode 64 of Mobycast, Jon shares his thoughts on Gluecon 2019 and then dives into one of his favorite sessions which focused on AWS’ Aurora Serverless. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 64 of Mobycast, Jon shares his thoughts on Gluecon 2019 and then dives into one of his favorite sessions which focused on AWS’ Aurora Serverless. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Jun 2019 12:04:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ab25421d/fee11368.mp3" length="29894712" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/ntf6HsG8DrAjKKfaOb_gls2yi-9gZ-78FE-WPqfvyBc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzQwLzE1/NjgwNDM4MjgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1865</itunes:duration>
      <itunes:summary>In Episode 64 of Mobycast, Jon shares his thoughts on Gluecon 2019 and then dives into one of his favorite sessions which focused on AWS’ Aurora Serverless. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 64 of Mobycast, Jon shares his thoughts on Gluecon 2019 and then dives into one of his favorite sessions which focused on AWS’ Aurora Serverless. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distr</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Service-to-Service Authentication for Microservice APIs</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Service-to-Service Authentication for Microservice APIs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0ceb940-08f1-4bd7-b94b-90a8eed22a50</guid>
      <link>https://share.transistor.fm/s/df22b3bb</link>
      <description>
        <![CDATA[<p>In Episode 63 of Mobycast, Jon and Chris discuss service-to-service authentication for microservice APIs. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 63 of Mobycast, Jon and Chris discuss service-to-service authentication for microservice APIs. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Jun 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/df22b3bb/4acac340.mp3" length="41282467" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/8adg_16n655Px1m3Qji-IPizoAVaZGGRqA5CgYzf39I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM5LzE1/NjgwNDM4MjUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2577</itunes:duration>
      <itunes:summary>In Episode 63 of Mobycast, Jon and Chris discuss service-to-service authentication for microservice APIs. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 63 of Mobycast, Jon and Chris discuss service-to-service authentication for microservice APIs. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Practical Istio (A Dockercon 2019 Recap)</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Practical Istio (A Dockercon 2019 Recap)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22e64d92-a9a0-43c9-ae3d-8c0915687185</guid>
      <link>https://share.transistor.fm/s/6afc4486</link>
      <description>
        <![CDATA[<p>In episode 62 of Mobycast, we recap another DockerCon 2019 session. This one focuses on Practical Istio by Zack Butcher. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 62 of Mobycast, we recap another DockerCon 2019 session. This one focuses on Practical Istio by Zack Butcher. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 29 May 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/6afc4486/3a093254.mp3" length="32626381" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/tm5abrvs1HKeqCmsuazTSgO8l3rTS1Le4-PrRk_eB48/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM4LzE1/NjgwNDM4MjItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2036</itunes:duration>
      <itunes:summary>In episode 62 of Mobycast, we recap another DockerCon 2019 session. This one focuses on Practical Istio by Zack Butcher. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 62 of Mobycast, we recap another DockerCon 2019 session. This one focuses on Practical Istio by Zack Butcher. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Just What is a "Service Mesh", and If I Get One Will It Make Everything OK? (A Dockercon 2019 Recap)</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Just What is a "Service Mesh", and If I Get One Will It Make Everything OK? (A Dockercon 2019 Recap)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b130035-3261-4daf-b4ed-5e0dcfabd4ef</guid>
      <link>https://share.transistor.fm/s/b8471019</link>
      <description>
        <![CDATA[<p>In episode 61 of Mobycast, we recap another DockerCon 2019 session titled "Just What Is A 'Server Mesh,' And If I Get One Will It Make Everything OK?" by Elton Stoneman. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 61 of Mobycast, we recap another DockerCon 2019 session titled "Just What Is A 'Server Mesh,' And If I Get One Will It Make Everything OK?" by Elton Stoneman. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 May 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/b8471019/cd55b5d0.mp3" length="29560815" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/MAbYk55WrNVplcr3MEzjzUeL19NQFLwESSK1nyJvnGw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM3LzE1/NjgwNDM4MTktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1844</itunes:duration>
      <itunes:summary>In episode 61 of Mobycast, we recap another DockerCon 2019 session titled "Just What Is A 'Server Mesh,' And If I Get One Will It Make Everything OK?" by Elton Stoneman. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 61 of Mobycast, we recap another DockerCon 2019 session titled "Just What Is A 'Server Mesh,' And If I Get One Will It Make Everything OK?" by Elton Stoneman. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and b</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Node.js Rocks in Docker for Dev and Ops (Part 2)</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Node.js Rocks in Docker for Dev and Ops (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86619687-8f49-45a6-982e-18f11f653bb8</guid>
      <link>https://share.transistor.fm/s/fa737cf4</link>
      <description>
        <![CDATA[<p>In episode 60 of Mobycast, we conclude our series on Bret Fisher's DockerCon session, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 60 of Mobycast, we conclude our series on Bret Fisher's DockerCon session, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 May 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/fa737cf4/eb28b9e9.mp3" length="30527648" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/YEYosJANGk8rQXERTf4W9azMKZ_nNM2IDIuQEtJZdrw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM2LzE1/NjgwNDM4MTctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1905</itunes:duration>
      <itunes:summary>In episode 60 of Mobycast, we conclude our series on Bret Fisher's DockerCon session, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 60 of Mobycast, we conclude our series on Bret Fisher's DockerCon session, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Node.js Rocks in Docker for Dev and Ops (A Dockercon 2019 Recap)</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Node.js Rocks in Docker for Dev and Ops (A Dockercon 2019 Recap)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">11d390d8-ddbc-452a-be9c-9cffb5d95060</guid>
      <link>https://share.transistor.fm/s/33fb9b9e</link>
      <description>
        <![CDATA[<p>In Episode 59 of Mobycast, Jon and Chris break down Bret Fisher’s DockerCon 2019 session which was titled, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 59 of Mobycast, Jon and Chris break down Bret Fisher’s DockerCon 2019 session which was titled, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 May 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/33fb9b9e/856b2b49.mp3" length="24752689" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/sgFxURCc_R5N6PKftO-wYvJJfeIx4mB9unZ-uRdPG2g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM1LzE1/NjgwNDM4MTQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1544</itunes:duration>
      <itunes:summary>In Episode 59 of Mobycast, Jon and Chris break down Bret Fisher’s DockerCon 2019 session which was titled, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 59 of Mobycast, Jon and Chris break down Bret Fisher’s DockerCon 2019 session which was titled, Node.js Rocks in Docker for Dev and Ops. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed sy</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Practical Issues with RDS Replicas</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Practical Issues with RDS Replicas</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f0a447f-1244-4584-8924-30614f490897</guid>
      <link>https://share.transistor.fm/s/507a126d</link>
      <description>
        <![CDATA[<p>In episode 58 of Mobycast, Jon and Chris discuss the practical issues with RDS replicas. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 58 of Mobycast, Jon and Chris discuss the practical issues with RDS replicas. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 01 May 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/507a126d/1f248982.mp3" length="22830558" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/7QFk2Fm4vR1JCaHP-v9WZyf_da_-fbv-GLCORzDO0-o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzM0LzE1/NjgwNDM4MTEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1423</itunes:duration>
      <itunes:summary>In episode 58 of Mobycast, Jon and Chris discuss the practical issues with RDS replicas. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 58 of Mobycast, Jon and Chris discuss the practical issues with RDS replicas. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>DockerCon 2019 - A Preview Show</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>DockerCon 2019 - A Preview Show</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b72e3c63-52b7-4d51-94bb-241d716b428b</guid>
      <link>https://share.transistor.fm/s/4c120558</link>
      <description>
        <![CDATA[<p>In episode 57 of Mobycast, we look ahead towards DockerCon 2019, discuss what to expect and throw down a few predictions. Welcome to Mobycast, a weekly conversation about cloud native development, AWS, and building distributed systems. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 57 of Mobycast, we look ahead towards DockerCon 2019, discuss what to expect and throw down a few predictions. Welcome to Mobycast, a weekly conversation about cloud native development, AWS, and building distributed systems. </p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Apr 2019 12:07:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4c120558/a9353d99.mp3" length="23529927" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/ZoEZd5Nmnr0OFx9OZ_auo-P8yKQ1LdthjxxFZ2ZKCRo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzMzLzE1/NjgwNDM4MDgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1467</itunes:duration>
      <itunes:summary>In episode 57 of Mobycast, we look ahead towards DockerCon 2019, discuss what to expect and throw down a few predictions. Welcome to Mobycast, a weekly conversation about cloud native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 57 of Mobycast, we look ahead towards DockerCon 2019, discuss what to expect and throw down a few predictions. Welcome to Mobycast, a weekly conversation about cloud native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Become a Great Software Developer (Part 2)</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>How to Become a Great Software Developer (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dae373bd-6dd7-48e5-b8a3-b70b91f0cb84</guid>
      <link>https://share.transistor.fm/s/30a9619c</link>
      <description>
        <![CDATA[<p>In Episode 56 of Mobycast, we conclude our mini series on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 56 of Mobycast, we conclude our mini series on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 17 Apr 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/30a9619c/32ab3e98.mp3" length="22768477" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/GP89cf9FqZvMYslHwrnJ6kxFsPAo7DPPTJn2DZfv64M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzMyLzE1/NjgwNDM4MDYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1420</itunes:duration>
      <itunes:summary>In Episode 56 of Mobycast, we conclude our mini series on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 56 of Mobycast, we conclude our mini series on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Become a Great Software Developer (Part 1)</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>How to Become a Great Software Developer (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">175dd2a9-a4c9-4073-9468-c6c14d766568</guid>
      <link>https://share.transistor.fm/s/fab18f38</link>
      <description>
        <![CDATA[<p>In Episode 55 of Mobycast, we start a new miniseries on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 55 of Mobycast, we start a new miniseries on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Apr 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/fab18f38/da299b1a.mp3" length="29137731" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/PsdVhJL-vG_EH1iyz6rUDSiyUW6vEWKNoklcCvpu6i8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzMxLzE1/NjgwNDM4MDMtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1818</itunes:duration>
      <itunes:summary>In Episode 55 of Mobycast, we start a new miniseries on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 55 of Mobycast, we start a new miniseries on how to become a great software developer. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>DNS 101</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>DNS 101</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6e488e0c-811f-4891-9eb7-324ff237fae1</guid>
      <link>https://share.transistor.fm/s/57e2923c</link>
      <description>
        <![CDATA[<p>In Episode 54 of Mobycast, Jon and Chris teach a primer on DNS and explain exactly what happens when you type the URL into the browser. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 54 of Mobycast, Jon and Chris teach a primer on DNS and explain exactly what happens when you type the URL into the browser. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Apr 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/57e2923c/6556679c.mp3" length="24553642" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/qcgbjhfZaUdemdSAPLwRenc3GnlbxkngA9nBoMrTlVQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzMwLzE1/NjgwNDM4MDAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1531</itunes:duration>
      <itunes:summary>In Episode 54 of Mobycast, Jon and Chris teach a primer on DNS and explain exactly what happens when you type the URL into the browser. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In Episode 54 of Mobycast, Jon and Chris teach a primer on DNS and explain exactly what happens when you type the URL into the browser. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Health Checks for Services, Containers and Daemons</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Health Checks for Services, Containers and Daemons</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76fa8463-a4da-43fc-8d74-14b63a30ef0c</guid>
      <link>https://share.transistor.fm/s/781cbd0b</link>
      <description>
        <![CDATA[
In episode 53 of Mobycast, Jon and Chris discuss health checks for services, containers, 


and daemons. Welcome to Mobycast, a weekly conversation about cloud-native development, 


AWS, and building distributed systems.
]]>
      </description>
      <content:encoded>
        <![CDATA[
In episode 53 of Mobycast, Jon and Chris discuss health checks for services, containers, 


and daemons. Welcome to Mobycast, a weekly conversation about cloud-native development, 


AWS, and building distributed systems.
]]>
      </content:encoded>
      <pubDate>Wed, 27 Mar 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/781cbd0b/3fc4311e.mp3" length="28608773" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/3k8czzgikQKV5zIeg46y_tSojEPfpmf7HxcA8dWIusg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI5LzE1/NjgwNDM3OTgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1784</itunes:duration>
      <itunes:summary>In episode 53 of Mobycast, Jon and Chris discuss health checks for services, containers, 


and daemons. Welcome to Mobycast, a weekly conversation about cloud-native development, 


AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 53 of Mobycast, Jon and Chris discuss health checks for services, containers, 


and daemons. Welcome to Mobycast, a weekly conversation about cloud-native development, 


AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Real World Architecture in the Cloud Using Event-Driven Techniques to Build a PDF Rendering Pipeline</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Real World Architecture in the Cloud Using Event-Driven Techniques to Build a PDF Rendering Pipeline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b01284b6-fcee-45d4-87db-e76b2b28ccc7</guid>
      <link>https://share.transistor.fm/s/568a7305</link>
      <description>
        <![CDATA[<p>In episode 52 of Mobycast, we discuss a real world example of using event-driven techniques to add a new feature to an existing application. Welcome to Mobycast, a weekly conversation about cloud native developments, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 52 of Mobycast, we discuss a real world example of using event-driven techniques to add a new feature to an existing application. Welcome to Mobycast, a weekly conversation about cloud native developments, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Mar 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/568a7305/a3e1e40d.mp3" length="25891159" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/TEdAPW_rnMt9aUQaf7IMq2QLaPtngn12kik2aT6MUMg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI4LzE1/NjgwNDM3OTUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1615</itunes:duration>
      <itunes:summary>In episode 52 of Mobycast, we discuss a real world example of using event-driven techniques to add a new feature to an existing application. Welcome to Mobycast, a weekly conversation about cloud native developments, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 52 of Mobycast, we discuss a real world example of using event-driven techniques to add a new feature to an existing application. Welcome to Mobycast, a weekly conversation about cloud native developments, AWS, and building distributed systems.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Evolve or Die - The Importance of Continuous Learning</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Evolve or Die - The Importance of Continuous Learning</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b725be23-4756-4c99-b0be-8342b5e57d00</guid>
      <link>https://share.transistor.fm/s/d71921ad</link>
      <description>
        <![CDATA[<p>In episode 51 of Mobycast, we talk about the importance of continuous learning for both the software developer as well as the organization in general. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 51 of Mobycast, we talk about the importance of continuous learning for both the software developer as well as the organization in general. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Mar 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d71921ad/39254fe0.mp3" length="24298560" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/TRL504RQpYUo0cfYC_cBz9pST9jVi-j1Une9w5XD_6M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI3LzE1/NjgwNDM3OTItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1515</itunes:duration>
      <itunes:summary>In episode 51 of Mobycast, we talk about the importance of continuous learning for both the software developer as well as the organization in general. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed systems.</itunes:summary>
      <itunes:subtitle>In episode 51 of Mobycast, we talk about the importance of continuous learning for both the software developer as well as the organization in general. Welcome to Mobycast, a weekly conversation about cloud-native development, AWS, and building distributed</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Open Source Tension - Who Should Profit?</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Open Source Tension - Who Should Profit?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">90f19bb7-9362-4c97-b4b2-fd7e525932cd</guid>
      <link>https://share.transistor.fm/s/ca51b97f</link>
      <description>
        <![CDATA[<p>In Episode 50 of Mobycast, we discuss the tension between creators of open-source projects and those that use the software commercially. Welcome to Mobycast, a weekly conversation about cloud-native development.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 50 of Mobycast, we discuss the tension between creators of open-source projects and those that use the software commercially. Welcome to Mobycast, a weekly conversation about cloud-native development.</p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Mar 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ca51b97f/f1bb3a30.mp3" length="33601698" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/mlc5KEdRKeELZir_GDc0NAoxJypBTgVa6qMnat-db5o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI2LzE1/NjgwNDM3OTAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2097</itunes:duration>
      <itunes:summary>In Episode 50 of Mobycast, we discuss the tension between creators of open-source projects and those that use the software commercially. Welcome to Mobycast, a weekly conversation about cloud-native development.</itunes:summary>
      <itunes:subtitle>In Episode 50 of Mobycast, we discuss the tension between creators of open-source projects and those that use the software commercially. Welcome to Mobycast, a weekly conversation about cloud-native development.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building RESTful APIs (Part 2)</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Building RESTful APIs (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">46fa7d67-edf3-4f64-9710-b9ef9acc837c</guid>
      <link>https://share.transistor.fm/s/166a089f</link>
      <description>
        <![CDATA[<p>In episode 49 of Mobycast, we continue our conversation on building RESTful APIs. In particular, we discuss authentication and error handling. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 49 of Mobycast, we continue our conversation on building RESTful APIs. In particular, we discuss authentication and error handling. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Feb 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/166a089f/4887a615.mp3" length="40528124" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/a8SIggziDGl_-hohijMbjqhZBP80ik-sQiNoprfAY3w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI1LzE1/NjgwNDM3ODctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2530</itunes:duration>
      <itunes:summary>In episode 49 of Mobycast, we continue our conversation on building RESTful APIs. In particular, we discuss authentication and error handling. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 49 of Mobycast, we continue our conversation on building RESTful APIs. In particular, we discuss authentication and error handling. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Microservice RESTful APIs - Tips &amp; Guidelines for Crafting Beautiful, Simple APIs</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Microservice RESTful APIs - Tips &amp; Guidelines for Crafting Beautiful, Simple APIs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a94b2956-c91f-426d-97c0-23dcd268788f</guid>
      <link>https://share.transistor.fm/s/d2232c9b</link>
      <description>
        <![CDATA[<p>In Episode 48 of Mobycast, we discuss tips and guidelines for creating beautiful simple APIs. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 48 of Mobycast, we discuss tips and guidelines for creating beautiful simple APIs. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Feb 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d2232c9b/6c708bad.mp3" length="19158127" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/dTnw9A_kS2fyW40rVQpccDtU_1bC_q991KshKOf-v9s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzI0LzE1/NjgwNDM3ODUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1194</itunes:duration>
      <itunes:summary>In Episode 48 of Mobycast, we discuss tips and guidelines for creating beautiful simple APIs. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 48 of Mobycast, we discuss tips and guidelines for creating beautiful simple APIs. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Evaluating AWS Cognito For Your Architecture</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Evaluating AWS Cognito For Your Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63792422-9b28-45b4-843e-af575e1b8a8b</guid>
      <link>https://share.transistor.fm/s/fa1a66fd</link>
      <description>
        <![CDATA[<p>In episode 47 of Mobycast, we take a high level look at AWS Cognito and discuss when it's a good option for your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 47 of Mobycast, we take a high level look at AWS Cognito and discuss when it's a good option for your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Feb 2019 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/fa1a66fd/75d0f757.mp3" length="17977169" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/TCb3yXgXfogUNDduQjvz7EZII8JxntGZlOG5K1-hqag/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzIzLzE1/NjgwNDM3ODItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1120</itunes:duration>
      <itunes:summary>In episode 47 of Mobycast, we take a high level look at AWS Cognito and discuss when it's a good option for your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 47 of Mobycast, we take a high level look at AWS Cognito and discuss when it's a good option for your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Revisiting the Serverless Holy War</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Revisiting the Serverless Holy War</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c54849aa-e849-4cf8-baa3-c9ba5e8490a1</guid>
      <link>https://share.transistor.fm/s/beb31a83</link>
      <description>
        <![CDATA[<p>In episode 46 of Mobycast, we revisit the holy war of serverless API development, whether or not it's a good idea for real-load projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 46 of Mobycast, we revisit the holy war of serverless API development, whether or not it's a good idea for real-load projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Feb 2019 12:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/beb31a83/ad64e871.mp3" length="24102075" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Gxja2pqEhfTE36qx0JYt0HFzumnH2pxdRljlEoqDw-8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzIyLzE1/NjgwNDM3NzktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1503</itunes:duration>
      <itunes:summary>In episode 46 of Mobycast, we revisit the holy war of serverless API development, whether or not it's a good idea for real-load projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 46 of Mobycast, we revisit the holy war of serverless API development, whether or not it's a good idea for real-load projects. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Serverless Made More Modular - Lambda Layers and Runtime API</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Serverless Made More Modular - Lambda Layers and Runtime API</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92b7de07-544f-42b9-b06b-659207666fb0</guid>
      <link>https://share.transistor.fm/s/ea66c69a</link>
      <description>
        <![CDATA[<p>In episode 45 of Mobycast, we discuss Lambda Layers, the Runtime API, and how to make serverless more modular. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 45 of Mobycast, we discuss Lambda Layers, the Runtime API, and how to make serverless more modular. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Jan 2019 12:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ea66c69a/4c1f387f.mp3" length="49262602" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/4Mk_OfcVg_rR02V-vQWvQWzD3mYHqPqj5kvecBo-bKw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzIxLzE1/NjgwNDM3NzYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>3075</itunes:duration>
      <itunes:summary>In episode 45 of Mobycast, we discuss Lambda Layers, the Runtime API, and how to make serverless more modular. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 45 of Mobycast, we discuss Lambda Layers, the Runtime API, and how to make serverless more modular. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Birth of NoSQL and DynamoDB - Part 5</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>The Birth of NoSQL and DynamoDB - Part 5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45880e7e-e728-4f21-810a-5bc435095c97</guid>
      <link>https://share.transistor.fm/s/1a15e944</link>
      <description>
        <![CDATA[<p>In episode 43 of Mobycast, we conclude our series on the birth of NoSQL and DynamoDB. In particular, we take a deeper look at Leviathan, the NoSQL database created by Chris’ startup in the late 90s and we compare it to DynamoDB today. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 43 of Mobycast, we conclude our series on the birth of NoSQL and DynamoDB. In particular, we take a deeper look at Leviathan, the NoSQL database created by Chris’ startup in the late 90s and we compare it to DynamoDB today. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Jan 2019 12:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1a15e944/de449fb0.mp3" length="31567415" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/eh0M3s8I1LvSLDl4vdmqcOtaBeQUfsJfyNb4y6QOvlI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzIwLzE1/NjgwNDM3NzQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1970</itunes:duration>
      <itunes:summary>In episode 43 of Mobycast, we conclude our series on the birth of NoSQL and DynamoDB. In particular, we take a deeper look at Leviathan, the NoSQL database created by Chris’ startup in the late 90s and we compare it to DynamoDB today. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 43 of Mobycast, we conclude our series on the birth of NoSQL and DynamoDB. In particular, we take a deeper look at Leviathan, the NoSQL database created by Chris’ startup in the late 90s and we compare it to DynamoDB today. Welcome to Mobycast,</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AWS Launches DocumentDB - Should Mongo Be Worried?</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>AWS Launches DocumentDB - Should Mongo Be Worried?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25b2722f-8860-4f40-a206-19ffdc0ee731</guid>
      <link>https://share.transistor.fm/s/b043dbb7</link>
      <description>
        <![CDATA[<p>In episode 44 of Mobycast, we discuss AWS's launch of DocumentDB, and whether or not Mongo should be worried.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 44 of Mobycast, we discuss AWS's launch of DocumentDB, and whether or not Mongo should be worried.</p>]]>
      </content:encoded>
      <pubDate>Wed, 16 Jan 2019 12:01:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/b043dbb7/059c7654.mp3" length="35154422" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/F-Exv99T55jyikULcMno8ACjJ2aD2EQBJNxA2HIDZr0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE5LzE1/NjgwNDM3NzEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2194</itunes:duration>
      <itunes:summary>In episode 44 of Mobycast, we discuss AWS's launch of DocumentDB, and whether or not Mongo should be worried.</itunes:summary>
      <itunes:subtitle>In episode 44 of Mobycast, we discuss AWS's launch of DocumentDB, and whether or not Mongo should be worried.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Birth of NoSQL and Dynamo DB - Part 4</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>The Birth of NoSQL and Dynamo DB - Part 4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23add968-ab0f-4645-b9a2-2d93c622aeaf</guid>
      <link>https://share.transistor.fm/s/0389ec77</link>
      <description>
        <![CDATA[<p>In episode 42 of Mobycast, we continue our conversation on DynamoDB, this time diving deep into its architecture and components. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 42 of Mobycast, we continue our conversation on DynamoDB, this time diving deep into its architecture and components. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Jan 2019 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/0389ec77/c63cef65.mp3" length="29953832" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/prY0-iBo3_OQganQ3TQK5YvC6BDQTE7BvhU2eRsgfZ8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE4LzE1/NjgwNDM3NjktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1869</itunes:duration>
      <itunes:summary>In episode 42 of Mobycast, we continue our conversation on DynamoDB, this time diving deep into its architecture and components. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 42 of Mobycast, we continue our conversation on DynamoDB, this time diving deep into its architecture and components. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Birth of NoSQL and DynamoDB - Part 3</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>The Birth of NoSQL and DynamoDB - Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab6af5ab-69db-44dc-9674-029838d1b4e7</guid>
      <link>https://share.transistor.fm/s/06a5fffc</link>
      <description>
        <![CDATA[<p>In episode 41 of Mobycast, we continue our conversation on the birth of NoSQL and DynamoDB. In particular, we pull back the covers on DynamoDB, examine its architecture and discuss why it’s such a popular solution for internet-scale databases.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 41 of Mobycast, we continue our conversation on the birth of NoSQL and DynamoDB. In particular, we pull back the covers on DynamoDB, examine its architecture and discuss why it’s such a popular solution for internet-scale databases.</p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Jan 2019 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/06a5fffc/c403436a.mp3" length="19766536" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/6b395IVwrbFTXkhvq9IYRzyaphWyJ6Flle3c5zlBaMM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE3LzE1/NjgwNDM3NjYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1232</itunes:duration>
      <itunes:summary>In episode 41 of Mobycast, we continue our conversation on the birth of NoSQL and DynamoDB. In particular, we pull back the covers on DynamoDB, examine its architecture and discuss why it’s such a popular solution for internet-scale databases.</itunes:summary>
      <itunes:subtitle>In episode 41 of Mobycast, we continue our conversation on the birth of NoSQL and DynamoDB. In particular, we pull back the covers on DynamoDB, examine its architecture and discuss why it’s such a popular solution for internet-scale databases.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Birth of NoSQL and DynamoDB - Part 2</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>The Birth of NoSQL and DynamoDB - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb8ef05f-728e-4c07-a0cb-9fbccbb0e817</guid>
      <link>https://share.transistor.fm/s/a8b258c8</link>
      <description>
        <![CDATA[<p>In episode 40 of Mobycast, we learn about Chris's first venture-backed  startup circa 1998 and their goal to build a database for internet scale applications. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 40 of Mobycast, we learn about Chris's first venture-backed  startup circa 1998 and their goal to build a database for internet scale applications. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Dec 2018 12:10:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a8b258c8/a6fae502.mp3" length="25486200" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/GEdvrH456pmRVkwsMHqIOilba-jdc1b02EtQm8JA-NM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE2LzE1/NjgwNDM3NjMtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1589</itunes:duration>
      <itunes:summary>In episode 40 of Mobycast, we learn about Chris's first venture-backed  startup circa 1998 and their goal to build a database for internet scale applications. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 40 of Mobycast, we learn about Chris's first venture-backed  startup circa 1998 and their goal to build a database for internet scale applications. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software d</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Birth of NoSQL and DynamoDB - Part 1</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>The Birth of NoSQL and DynamoDB - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ca6edee2-f851-4734-8d20-159605f522cd</guid>
      <link>https://share.transistor.fm/s/1c623c3a</link>
      <description>
        <![CDATA[<p>In episode 39 of Mobycast, we lead a history lesson on the unique challenges of data at "internet scale" and how this gave rise to NoSQL.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 39 of Mobycast, we lead a history lesson on the unique challenges of data at "internet scale" and how this gave rise to NoSQL.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Dec 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1c623c3a/37cdc14f.mp3" length="26455820" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/E55-WK6g28vUeTSkEkp7AhP5vBMAhbVkCRh-jrBA6og/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE1LzE1/NjgwNDM3NjAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1650</itunes:duration>
      <itunes:summary>In episode 39 of Mobycast, we lead a history lesson on the unique challenges of data at "internet scale" and how this gave rise to NoSQL.</itunes:summary>
      <itunes:subtitle>In episode 39 of Mobycast, we lead a history lesson on the unique challenges of data at "internet scale" and how this gave rise to NoSQL.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>When (and When Not) to use Open Source Libraries </title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>When (and When Not) to use Open Source Libraries </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1db3e7d1-3ecb-4d38-a6de-a0b442729d71</guid>
      <link>https://share.transistor.fm/s/d8692be5</link>
      <description>
        <![CDATA[<p>In episode 38 of Mobycast, we discuss when and when not to use open source libraries in your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 38 of Mobycast, we discuss when and when not to use open source libraries in your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Dec 2018 12:05:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d8692be5/a00b28ba.mp3" length="29427662" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/lY5rb9AXUBwuvZPkqyWn4sGtnne28irP7IkowkyrTzA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzE0LzE1/NjgwNDM3NTgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1836</itunes:duration>
      <itunes:summary>In episode 38 of Mobycast, we discuss when and when not to use open source libraries in your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 38 of Mobycast, we discuss when and when not to use open source libraries in your projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Path to AWS Certification</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>The Path to AWS Certification</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c81cb49d-e1d0-4e12-ad64-c7e522803171</guid>
      <link>https://share.transistor.fm/s/40a501f1</link>
      <description>
        <![CDATA[<p>In episode 37 of Mobycast, we discuss the process of becoming AWS certified. Including a few tips on how to prepare and pass the exam. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 37 of Mobycast, we discuss the process of becoming AWS certified. Including a few tips on how to prepare and pass the exam. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Dec 2018 12:07:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/40a501f1/d51b4d3d.mp3" length="30434132" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/j1OsqJ-9ivaNpI7clx7ZgVyJRJpcMW5knRgYYconX70/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzEzLzE1/NjgwNDM3NTUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1899</itunes:duration>
      <itunes:summary>In episode 37 of Mobycast, we discuss the process of becoming AWS certified. Including a few tips on how to prepare and pass the exam. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 37 of Mobycast, we discuss the process of becoming AWS certified. Including a few tips on how to prepare and pass the exam. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Preparing for Re:Invent 2018</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Preparing for Re:Invent 2018</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6d0e05d8-244e-42bc-9cf8-4e4363879bc9</guid>
      <link>https://share.transistor.fm/s/7b05d276</link>
      <description>
        <![CDATA[<p>In episode 36 of Mobycast, we look ahead to re:Invent 2018, discuss what to expect as well as offer a few practical tips to get the most value. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 36 of Mobycast, we look ahead to re:Invent 2018, discuss what to expect as well as offer a few practical tips to get the most value. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Nov 2018 12:11:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/7b05d276/ab106f9a.mp3" length="41951850" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/CdqZpci-OuBuSclDkZAyXdKYd1RLcWkKegNdKESbVls/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzEyLzE1/NjgwNDM3NTEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2619</itunes:duration>
      <itunes:summary>In episode 36 of Mobycast, we look ahead to re:Invent 2018, discuss what to expect as well as offer a few practical tips to get the most value. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 36 of Mobycast, we look ahead to re:Invent 2018, discuss what to expect as well as offer a few practical tips to get the most value. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Mobycast Retrospective</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>A Mobycast Retrospective</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">78d2bc72-f276-4ae7-9ef6-2c178c5a3282</guid>
      <link>https://share.transistor.fm/s/22db2c19</link>
      <description>
        <![CDATA[<p>In episode 35 of Mobycast, we’ll talk about the original goals for this podcast and where we plan to take it in the future. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment. Let’s jump right in.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 35 of Mobycast, we’ll talk about the original goals for this podcast and where we plan to take it in the future. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment. Let’s jump right in.</p>]]>
      </content:encoded>
      <pubDate>Wed, 07 Nov 2018 12:55:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/22db2c19/0b253826.mp3" length="21009164" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/KKalrIQlHYGpMvZhLjKcZr5e7MsHYn07wHVo-xw3jUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzExLzE1/NjgwNDM3NDktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1310</itunes:duration>
      <itunes:summary>In episode 35 of Mobycast, we’ll talk about the original goals for this podcast and where we plan to take it in the future. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment. Let’s jump right in.</itunes:summary>
      <itunes:subtitle>In episode 35 of Mobycast, we’ll talk about the original goals for this podcast and where we plan to take it in the future. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment. Let’s jump right in.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Event-Driven Architecture (Part 2)</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Event-Driven Architecture (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5ab42a1-3d50-4882-9420-4a9c45597f40</guid>
      <link>https://share.transistor.fm/s/7a7c10bf</link>
      <description>
        <![CDATA[<p>In episode 34 of Mobycast, we dive into part 2 of our micro-series on Event-Driven Architecture. In particular, we discuss a few practical examples used at Kelsus. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 34 of Mobycast, we dive into part 2 of our micro-series on Event-Driven Architecture. In particular, we discuss a few practical examples used at Kelsus. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Oct 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/7a7c10bf/b8d7b164.mp3" length="18622675" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/rFTmqP5MaSP9uKtFmX-JrkMMlBewB8yO3BLVtMk-j0Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzEwLzE1/NjgwNDM3NDYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1160</itunes:duration>
      <itunes:summary>In episode 34 of Mobycast, we dive into part 2 of our micro-series on Event-Driven Architecture. In particular, we discuss a few practical examples used at Kelsus. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 34 of Mobycast, we dive into part 2 of our micro-series on Event-Driven Architecture. In particular, we discuss a few practical examples used at Kelsus. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern softw</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Event-Driven Architecture (Part 1)</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Event-Driven Architecture (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c901cf6-4bb5-47ba-8670-c11a8ca57b22</guid>
      <link>https://share.transistor.fm/s/ba3fb526</link>
      <description>
        <![CDATA[<p>In episode 33 of Mobycast, we begin a new micro-series on Event-Driven Architecture. In<br>particular, we discuss the how and the why as well as the Pub/Sub design pattern. Welcome to<br>Mobycast, a weekly conversation about containerization, Docker and modern software<br>deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 33 of Mobycast, we begin a new micro-series on Event-Driven Architecture. In<br>particular, we discuss the how and the why as well as the Pub/Sub design pattern. Welcome to<br>Mobycast, a weekly conversation about containerization, Docker and modern software<br>deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Oct 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ba3fb526/5bc8afd2.mp3" length="20231404" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/lKXGFW_tjp7Em-W9GkzCZDiNPe5W5mpjltOqHhMPZVQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA5LzE1/NjgwNDM3NDMtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1261</itunes:duration>
      <itunes:summary>In episode 33 of Mobycast, we begin a new micro-series on Event-Driven Architecture. Inparticular, we discuss the how and the why as well as the Pub/Sub design pattern. Welcome toMobycast, a weekly conversation about containerization, Docker and modern softwaredeployment.</itunes:summary>
      <itunes:subtitle>In episode 33 of Mobycast, we begin a new micro-series on Event-Driven Architecture. Inparticular, we discuss the how and the why as well as the Pub/Sub design pattern. Welcome toMobycast, a weekly conversation about containerization, Docker and modern so</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Logging A-to-Z for Containerized Microservices (Part 3)</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Logging A-to-Z for Containerized Microservices (Part 3)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e13c4d2d-a9d0-457a-bd69-698eac19bb14</guid>
      <link>https://share.transistor.fm/s/c9ab5869</link>
      <description>
        <![CDATA[<p>In Episode 32 of Mobycast, we finished our series on application logging. In particular, we discuss how Kelsus leverages Sumo Logic to manage the logs of their projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 32 of Mobycast, we finished our series on application logging. In particular, we discuss how Kelsus leverages Sumo Logic to manage the logs of their projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 17 Oct 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/c9ab5869/4cb2b5d9.mp3" length="23420063" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/rRGmBYzNYpdZPmwwIW5XySzhgngbBXKnb8HOvtHSfRk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA4LzE1/NjgwNDM3NDAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1460</itunes:duration>
      <itunes:summary>In Episode 32 of Mobycast, we finished our series on application logging. In particular, we discuss how Kelsus leverages Sumo Logic to manage the logs of their projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 32 of Mobycast, we finished our series on application logging. In particular, we discuss how Kelsus leverages Sumo Logic to manage the logs of their projects. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern </itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Logging A-to-Z for Containerized Microservices (Part 2)</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Logging A-to-Z for Containerized Microservices (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">24ea7750-dc86-4eb6-8502-6ecabe396b84</guid>
      <link>https://share.transistor.fm/s/a2393e5b</link>
      <description>
        <![CDATA[<p>In Episode 31 of Mobycast, we dive into Part 2 of our series on application logging. In particular, we discuss best practices as well as how to forward logs from your containers to other services. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 31 of Mobycast, we dive into Part 2 of our series on application logging. In particular, we discuss best practices as well as how to forward logs from your containers to other services. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Oct 2018 12:58:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a2393e5b/2729e434.mp3" length="24593746" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/_N9AU4fdkyBAKvogNzX7XLlEq056LVhVv355ZWSw-1E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA3LzE1/NjgwNDM3MzctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1534</itunes:duration>
      <itunes:summary>In Episode 31 of Mobycast, we dive into Part 2 of our series on application logging. In particular, we discuss best practices as well as how to forward logs from your containers to other services. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 31 of Mobycast, we dive into Part 2 of our series on application logging. In particular, we discuss best practices as well as how to forward logs from your containers to other services. Welcome to Mobycast, a weekly conversation about container</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Logging A-to-Z for Containerized Microservices</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Logging A-to-Z for Containerized Microservices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">853d00fa-0eb0-431c-8f7a-c25ac09511c2</guid>
      <link>https://share.transistor.fm/s/a9a174d4</link>
      <description>
        <![CDATA[<p>In episode 30 of Mobycast, Jon and Chris talk about how Kelsus handles application-level logging for the microservices running on ECS. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 30 of Mobycast, Jon and Chris talk about how Kelsus handles application-level logging for the microservices running on ECS. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Oct 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a9a174d4/81f0c6f3.mp3" length="24429348" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/QuhbKinkH0hkoFAuygiuoEiqsXjlYTmHS3vDFysbwzI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA2LzE1/NjgwNDM3MzUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1523</itunes:duration>
      <itunes:summary>In episode 30 of Mobycast, Jon and Chris talk about how Kelsus handles application-level logging for the microservices running on ECS. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 30 of Mobycast, Jon and Chris talk about how Kelsus handles application-level logging for the microservices running on ECS. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>VPC on AWS (Part 3)</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>VPC on AWS (Part 3)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b0111840-78e9-4e7d-a169-2bc45294318a</guid>
      <link>https://share.transistor.fm/s/26874b26</link>
      <description>
        <![CDATA[<p>In episode 29 of Mobycast, we conclude our series on how to setup your VPC to run ECS workloads. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 29 of Mobycast, we conclude our series on how to setup your VPC to run ECS workloads. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Sep 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/26874b26/bf1bc515.mp3" length="21056288" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/9s17MXxBBgqQobsDwSfM25QkgWXfCAbxojQ8vgEZRzo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA1LzE1/NjgwNDM3MzItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1313</itunes:duration>
      <itunes:summary>In episode 29 of Mobycast, we conclude our series on how to setup your VPC to run ECS workloads. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 29 of Mobycast, we conclude our series on how to setup your VPC to run ECS workloads. Welcome of Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Setting up Virtual Private Clouds on AWS (Part 2)</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Setting up Virtual Private Clouds on AWS (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">312ef117-ab82-42c1-a192-dffa3013288f</guid>
      <link>https://share.transistor.fm/s/d0fb61cf</link>
      <description>
        <![CDATA[<p>In Episode 28 of Mobycast, we continue our conversation on VPC setup on AWS. In particular, we discuss availability and security considerations. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 28 of Mobycast, we continue our conversation on VPC setup on AWS. In particular, we discuss availability and security considerations. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Sep 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d0fb61cf/9f67de47.mp3" length="22999116" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/TOeq6BqsqliRTTSEj7OvVeBKksLz0CCzUVbW5wvceK4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzA0LzE1/NjgwNDM3MzAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1434</itunes:duration>
      <itunes:summary>In Episode 28 of Mobycast, we continue our conversation on VPC setup on AWS. In particular, we discuss availability and security considerations. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 28 of Mobycast, we continue our conversation on VPC setup on AWS. In particular, we discuss availability and security considerations. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Setting up Virtual Private Clouds on AWS (Part 1)</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Setting up Virtual Private Clouds on AWS (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ae1246a3-d641-4e72-b1b8-bd825a0f5bd9</guid>
      <link>https://share.transistor.fm/s/395001d5</link>
      <description>
        <![CDATA[<p>In Episode 27 of Mobycast, we start a new micro-series discussing the setup of virtual private clouds on AWS. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 27 of Mobycast, we start a new micro-series discussing the setup of virtual private clouds on AWS. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Sep 2018 11:35:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/395001d5/dc7e0e7a.mp3" length="24297645" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Bol-CLKMSw6ipKE0Lw0q63WG4-bjl50rbYh2NOBBhas/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzAzLzE1/NjgwNDM3MjctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1515</itunes:duration>
      <itunes:summary>In Episode 27 of Mobycast, we start a new micro-series discussing the setup of virtual private clouds on AWS. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 27 of Mobycast, we start a new micro-series discussing the setup of virtual private clouds on AWS. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Docker Tips &amp; Tricks (Part 3)</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Docker Tips &amp; Tricks (Part 3)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb84dbb0-c633-48f3-83f8-27ac7ad5a73a</guid>
      <link>https://share.transistor.fm/s/13629820</link>
      <description>
        <![CDATA[<p>In episode 26 of Mobycast, we conclude our micro series on Docker tips and tricks. In particular, we discuss security and pruning. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 26 of Mobycast, we conclude our micro series on Docker tips and tricks. In particular, we discuss security and pruning. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Sep 2018 11:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/13629820/9f650ea7.mp3" length="19028437" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/oTPYdCwqG7Y5LKruJbs0z58tD3_lBGKobC9CzI4KWDw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzAyLzE1/NjgwNDM3MjQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1186</itunes:duration>
      <itunes:summary>In episode 26 of Mobycast, we conclude our micro series on Docker tips and tricks. In particular, we discuss security and pruning. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 26 of Mobycast, we conclude our micro series on Docker tips and tricks. In particular, we discuss security and pruning. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Docker Tips &amp; Tricks (Part 2)</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Docker Tips &amp; Tricks (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c79d4e16-e467-401b-9e6e-25391f24212f</guid>
      <link>https://share.transistor.fm/s/997e512a</link>
      <description>
        <![CDATA[<p>In Episode 25 of Mobycast, we continue our micro-series on Docker Tips and Tricks. In particular, we discuss how to start up containers dependably and shut them down gracefully. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 25 of Mobycast, we continue our micro-series on Docker Tips and Tricks. In particular, we discuss how to start up containers dependably and shut them down gracefully. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Aug 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/997e512a/301ffe56.mp3" length="20506433" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/hqNWrhwnYdFBEicL-TQTCxKHKceFgaUoozAoLU39xK8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzAxLzE1/NjgwNDM3MjEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1278</itunes:duration>
      <itunes:summary>In Episode 25 of Mobycast, we continue our micro-series on Docker Tips and Tricks. In particular, we discuss how to start up containers dependably and shut them down gracefully. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 25 of Mobycast, we continue our micro-series on Docker Tips and Tricks. In particular, we discuss how to start up containers dependably and shut them down gracefully. Welcome to Mobycast, a weekly conversation about containerization, Docker and</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Docker Tips &amp; Tricks (Part 1)</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Docker Tips &amp; Tricks (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3fa7e24b-ed76-48e1-a6f2-57b96021fbbc</guid>
      <link>https://share.transistor.fm/s/ab3b506f</link>
      <description>
        <![CDATA[<p>In episode 24 of Mobycast, we dive into a new micro series on Docker tips and tricks. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 24 of Mobycast, we dive into a new micro series on Docker tips and tricks. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Aug 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ab3b506f/b8af343a.mp3" length="16983691" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/SFdHMs95CP5Q-Fmyxc0NgbJOwwevwyNs8AIt5awC0a4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMzAwLzE1/NjgwNDM3MTktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1058</itunes:duration>
      <itunes:summary>In episode 24 of Mobycast, we dive into a new micro series on Docker tips and tricks. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 24 of Mobycast, we dive into a new micro series on Docker tips and tricks. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Case Study: Troubleshooting Container Disk Space</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Case Study: Troubleshooting Container Disk Space</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f40f2e5-2a7d-441f-a6c7-ef9fed197f69</guid>
      <link>https://share.transistor.fm/s/843b6276</link>
      <description>
        <![CDATA[<p> In episode 23 of Mobycast, Jon and Chris will dive into another Kelsus case study. This time, we chat about troubleshooting container disk space. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> In episode 23 of Mobycast, Jon and Chris will dive into another Kelsus case study. This time, we chat about troubleshooting container disk space. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Aug 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/843b6276/e2346bbf.mp3" length="31852748" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/FnrrxClorthvBjZPOepsm9IBbDcAp_JM2xTVw_0oUEs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk5LzE1/NjgwNDM3MTctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1987</itunes:duration>
      <itunes:summary>In episode 23 of Mobycast, Jon and Chris will dive into another Kelsus case study. This time, we chat about troubleshooting container disk space. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 23 of Mobycast, Jon and Chris will dive into another Kelsus case study. This time, we chat about troubleshooting container disk space. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Adventures in AWS Certification</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Adventures in AWS Certification</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9a0b33d4-b5c3-4d82-a369-ba451753a675</guid>
      <link>https://share.transistor.fm/s/ef0b7edc</link>
      <description>
        <![CDATA[<p>In episode 22 of Mobycast, Chris recaps his experience attending a rare, and privileged workshop at the AWS offices in San Francisco. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 22 of Mobycast, Chris recaps his experience attending a rare, and privileged workshop at the AWS offices in San Francisco. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Aug 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/ef0b7edc/af78b678.mp3" length="26960895" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/3MvrAJP_k_u1PgLPR1HQz5jsGpzQwVssa2Zrdk-5_hg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk4LzE1/NjgwNDM3MTQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1682</itunes:duration>
      <itunes:summary>In episode 22 of Mobycast, Chris recaps his experience attending a rare, and privileged workshop at the AWS offices in San Francisco. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 22 of Mobycast, Chris recaps his experience attending a rare, and privileged workshop at the AWS offices in San Francisco. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Effective Container Images (Part 2)</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Effective Container Images (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b0fb801-ff91-4569-ae2b-d199bcace542</guid>
      <link>https://share.transistor.fm/s/74ef6e9c</link>
      <description>
        <![CDATA[<p>In episode 21 of Mobycast, we picked around last week's conversation with part two of how to create effective container images. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 21 of Mobycast, we picked around last week's conversation with part two of how to create effective container images. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Aug 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/74ef6e9c/508e7d06.mp3" length="27844039" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/xpLLH_Uvx8odRZ0_OX2xF6gbZhGXgGkUWll4erAV0i4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk3LzE1/NjgwNDM3MTEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1737</itunes:duration>
      <itunes:summary>In episode 21 of Mobycast, we picked around last week's conversation with part two of how to create effective container images. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 21 of Mobycast, we picked around last week's conversation with part two of how to create effective container images. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Effective Container Images (Part 1)</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Effective Container Images (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5269ec3-37b4-4351-9f1b-add405dc09a3</guid>
      <link>https://share.transistor.fm/s/76f4ec06</link>
      <description>
        <![CDATA[<p>In episode 20 of Mobycast, Chris recaps another DockerCon 2018 session, how to create effective container images by Abby Fuller. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 20 of Mobycast, Chris recaps another DockerCon 2018 session, how to create effective container images by Abby Fuller. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Jul 2018 12:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/76f4ec06/f5fd3d26.mp3" length="26582222" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/c8KrDrbtNTbxNaHZkf0mwoJE72hlBVQmeP4BtOsLkn8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk2LzE1/NjgwNDM3MDgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1658</itunes:duration>
      <itunes:summary>In episode 20 of Mobycast, Chris recaps another DockerCon 2018 session, how to create effective container images by Abby Fuller. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 20 of Mobycast, Chris recaps another DockerCon 2018 session, how to create effective container images by Abby Fuller. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing Containerized Deployments (Part 2)</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Securing Containerized Deployments (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c7215d8-d8bf-45ac-bb55-9708534139aa</guid>
      <link>https://share.transistor.fm/s/1ac1adaa</link>
      <description>
        <![CDATA[<p>In episode 19 of Mobycast, Chris leads part two of a discussion about securing containerized deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 19 of Mobycast, Chris leads part two of a discussion about securing containerized deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Jul 2018 13:30:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/1ac1adaa/b9054fc3.mp3" length="27390525" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/46eS8nb21mF2urvopHLtC6w85mHOr8P5TpSiKvBArWA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk1LzE1/NjgwNDM3MDYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1708</itunes:duration>
      <itunes:summary>In episode 19 of Mobycast, Chris leads part two of a discussion about securing containerized deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 19 of Mobycast, Chris leads part two of a discussion about securing containerized deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Securing Containerized Deployments (Part One)</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Securing Containerized Deployments (Part One)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c62901b-d0e6-40fc-9f07-1324e5ebba21</guid>
      <link>https://share.transistor.fm/s/df7695a1</link>
      <description>
        <![CDATA[<p>In episode 18 of Mobycast, Chris leads a DockerCon session roll up. In particular, we discussed securing container-based deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 18 of Mobycast, Chris leads a DockerCon session roll up. In particular, we discussed securing container-based deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Jul 2018 00:22:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/df7695a1/cfb8da90.mp3" length="22398063" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/DEffLVEpWRt4wgqiKfynhIC-tEYHrU3lQi6bKwKt1y4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjk0LzE1/NjgwNDM3MDMtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1396</itunes:duration>
      <itunes:summary>In episode 18 of Mobycast, Chris leads a DockerCon session roll up. In particular, we discussed securing container-based deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 18 of Mobycast, Chris leads a DockerCon session roll up. In particular, we discussed securing container-based deployments. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Takeaways from Dockercon 2018</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Takeaways from Dockercon 2018</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42cf2214-f963-40c0-b211-e050e9ba5f45</guid>
      <link>https://share.transistor.fm/s/279b838b</link>
      <description>
        <![CDATA[<p>In episode 17 of Mobycast, Chris provides his main takeaways from dockercon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 17 of Mobycast, Chris provides his main takeaways from dockercon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Jul 2018 12:51:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/279b838b/78913eec.mp3" length="24459301" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/NRDTejRk4VYqZPwNj7JC8orltS3pt-F-COgvOtlzxXY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjkzLzE1/NjgwNDM3MDAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1525</itunes:duration>
      <itunes:summary>In episode 17 of Mobycast, Chris provides his main takeaways from dockercon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 17 of Mobycast, Chris provides his main takeaways from dockercon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Troubleshooting Distributed Systems: A Case Study</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Troubleshooting Distributed Systems: A Case Study</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0dcbbfe8-8e20-43a0-9042-f654cf6cfee7</guid>
      <link>https://share.transistor.fm/s/a5c2cbc3</link>
      <description>
        <![CDATA[<p>In episode 16 of Mobycast, Jon and Chris discuss how they recently troubleshot a client’s distributed system. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 16 of Mobycast, Jon and Chris discuss how they recently troubleshot a client’s distributed system. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Jun 2018 06:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a5c2cbc3/812e22ec.mp3" length="29460279" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/uxNwuuYIEhcr02qo5Vn54oXOGLxu3iljPf9srbJNSCw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjkyLzE1/NjgwNDM2OTgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1838</itunes:duration>
      <itunes:summary>In episode 16 of Mobycast, Jon and Chris discuss how they recently troubleshot a client’s distributed system. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 16 of Mobycast, Jon and Chris discuss how they recently troubleshot a client’s distributed system. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>All About Docker Compose</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>All About Docker Compose</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1df5a337-e538-4540-a98e-418ca7b9c24d</guid>
      <link>https://share.transistor.fm/s/bb82ddc6</link>
      <description>
        <![CDATA[<p>In episode 15 of Mobycast, Jon and Chris teach me all about Docker Compose. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 15 of Mobycast, Jon and Chris teach me all about Docker Compose. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Jun 2018 06:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/bb82ddc6/a34e9375.mp3" length="24663661" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Pi2iDfGLAWJav4fBvR-gRa7SYbaHtCLLk-DDPfbd4hA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjkxLzE1/NjgwNDM2OTUtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1538</itunes:duration>
      <itunes:summary>In episode 15 of Mobycast, Jon and Chris teach me all about Docker Compose. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 15 of Mobycast, Jon and Chris teach me all about Docker Compose. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Stop Worrying About Cloud Lock-in</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Stop Worrying About Cloud Lock-in</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b5c42493-8bd6-406d-b3db-8d9833947c86</guid>
      <link>https://share.transistor.fm/s/4035b961</link>
      <description>
        <![CDATA[<p>In Episode 14 of Mobycast, Jon and Chris explained why you should stop worrying about cloud lock-in. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 14 of Mobycast, Jon and Chris explained why you should stop worrying about cloud lock-in. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Jun 2018 06:52:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4035b961/4ea1d778.mp3" length="23330438" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/_y02qLEPgl4NqIkGHsxCwWi0Zyw60Ft_lnXIBTb_xrA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjkwLzE1/NjgwNDM2OTItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1455</itunes:duration>
      <itunes:summary>In Episode 14 of Mobycast, Jon and Chris explained why you should stop worrying about cloud lock-in. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 14 of Mobycast, Jon and Chris explained why you should stop worrying about cloud lock-in. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Future of Serverless</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>The Future of Serverless</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27a48bb9-1858-4071-9e82-339b986e0099</guid>
      <link>https://share.transistor.fm/s/9d310a4b</link>
      <description>
        <![CDATA[<p>In episode 13 of Mobycast, Jon and Chris discussed the future of serverless. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 13 of Mobycast, Jon and Chris discussed the future of serverless. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Jun 2018 00:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/9d310a4b/d95b9f94.mp3" length="25020183" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/c9aBpySua2Jd0_BB9qH2t7nl4VzyIyjfQDjjTvGBZ4g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg5LzE1/NjgwNDM2ODktYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1560</itunes:duration>
      <itunes:summary>In episode 13 of Mobycast, Jon and Chris discussed the future of serverless. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 13 of Mobycast, Jon and Chris discussed the future of serverless. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Key Takeaways from Gluecon 2018</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Key Takeaways from Gluecon 2018</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">659f0577-7488-4f85-a237-d9cac64aea48</guid>
      <link>https://share.transistor.fm/s/e609556b</link>
      <description>
        <![CDATA[<p>In episode 12 of Mobycast, John discusses his key takeaways from GlueCon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 12 of Mobycast, John discusses his key takeaways from GlueCon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 30 May 2018 07:30:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/e609556b/6a7d20bd.mp3" length="25091252" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/JnHklzlxjnUPj93FJ6epcHaU_Xz6q8ZG6fTbniXojTM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg4LzE1/NjgwNDM2ODctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1565</itunes:duration>
      <itunes:summary>In episode 12 of Mobycast, John discusses his key takeaways from GlueCon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 12 of Mobycast, John discusses his key takeaways from GlueCon 2018. Welcome to Mobycast, a weekly conversation about containerization, Docker and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Will AWS be Crushed Under it's Own Weight? (Part 02)</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Will AWS be Crushed Under it's Own Weight? (Part 02)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b9714978-73c2-4c1e-b8e4-9aab761188e4</guid>
      <link>https://share.transistor.fm/s/7d7b9f8d</link>
      <description>
        <![CDATA[<p>In Episode 11 of Mobycast, we continue last week’s conversation regarding the negative implications of AWS’ rapid growth. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 11 of Mobycast, we continue last week’s conversation regarding the negative implications of AWS’ rapid growth. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 May 2018 01:53:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/7d7b9f8d/761dd53f.mp3" length="20240129" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/9dPHEzjMWSeh-Ph5Rxcj_IF92Tf3GYP5u3w-PK0qNNs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg3LzE1/NjgwNDM2ODQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1262</itunes:duration>
      <itunes:summary>In Episode 11 of Mobycast, we continue last week’s conversation regarding the negative implications of AWS’ rapid growth. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In Episode 11 of Mobycast, we continue last week’s conversation regarding the negative implications of AWS’ rapid growth. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Will AWS Be Crushed Under it’s Own Weight? (Part 01)</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Will AWS Be Crushed Under it’s Own Weight? (Part 01)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e3d4008-d9cf-437f-ac18-4f2e3e215e6d</guid>
      <link>https://share.transistor.fm/s/4ed03e94</link>
      <description>
        <![CDATA[<p>In episode 10 of Mobycast, Jon and Chris consider a reality where AWS crushes under its own weight. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 10 of Mobycast, Jon and Chris consider a reality where AWS crushes under its own weight. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</p>]]>
      </content:encoded>
      <pubDate>Wed, 16 May 2018 00:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/4ed03e94/78044f80.mp3" length="22298952" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/3HJV1Iwiy1uYX5C9urTXGzfrZP46eRAAmoygTtOhbqs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg2LzE1/NjgwNDM2ODEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1390</itunes:duration>
      <itunes:summary>In episode 10 of Mobycast, Jon and Chris consider a reality where AWS crushes under its own weight. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:summary>
      <itunes:subtitle>In episode 10 of Mobycast, Jon and Chris consider a reality where AWS crushes under its own weight. Welcome to Mobycast, a weekly conversation about containerization, Docker, and modern software deployment.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AWS Services We're Evaluating</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>AWS Services We're Evaluating</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c9d9590b-5db2-443c-84c6-ed26b87f28c0</guid>
      <link>https://share.transistor.fm/s/f30656ac</link>
      <description>
        <![CDATA[<p>In episode 9 of Mobycast, Jon and Chris discuss a few of the AWS services they’re currently evaluating.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 9 of Mobycast, Jon and Chris discuss a few of the AWS services they’re currently evaluating.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 May 2018 06:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/f30656ac/5fbddc7b.mp3" length="55248512" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/c2pU-RrIAXGw3-LSZ0NUwyznNRs77US3duUABLfAO3Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg1LzE1/NjgwNDM2NzgtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>3450</itunes:duration>
      <itunes:summary>In episode 9 of Mobycast, Jon and Chris discuss a few of the AWS services they’re currently evaluating.</itunes:summary>
      <itunes:subtitle>In episode 9 of Mobycast, Jon and Chris discuss a few of the AWS services they’re currently evaluating.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Core AWS Services</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Core AWS Services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">846fb492-c7aa-4e33-9ab4-44f3af9bc2f3</guid>
      <link>https://share.transistor.fm/s/9ef5ac0a</link>
      <description>
        <![CDATA[<p>In episode 8 of Mobycast, Jon and Chris discussed the core AWS services they use regularly.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 8 of Mobycast, Jon and Chris discussed the core AWS services they use regularly.</p>]]>
      </content:encoded>
      <pubDate>Wed, 02 May 2018 07:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/9ef5ac0a/d4b72780.mp3" length="49430472" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/9xk5qUnccH0xKg1dfWY9XHdUWLqhs7Qfmzswz2rsPHk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjg0LzE1/NjgwNDM2NzQtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>3086</itunes:duration>
      <itunes:summary>In episode 8 of Mobycast, Jon and Chris discussed the core AWS services they use regularly.</itunes:summary>
      <itunes:subtitle>In episode 8 of Mobycast, Jon and Chris discussed the core AWS services they use regularly.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Create Containers (Part 2)</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>How to Create Containers (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c2c7755c-62d6-4e7b-b9ab-5cbf0ef605af</guid>
      <link>https://share.transistor.fm/s/0f2f5299</link>
      <description>
        <![CDATA[<p>In episode 7 of Mobycast, we continue with part 2 of a technical series around the creation of Containers. Specifically, Jon and Chris dive deep into Docker networking. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 7 of Mobycast, we continue with part 2 of a technical series around the creation of Containers. Specifically, Jon and Chris dive deep into Docker networking. </p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Apr 2018 07:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/0f2f5299/36f18436.mp3" length="40902620" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/ZRBa1B-DLG-cyKc25n13Q2jLAIMqaENzXcZbOphLrDI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjgzLzE1/NjgwNDM2NzAtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2553</itunes:duration>
      <itunes:summary>In episode 7 of Mobycast, we continue with part 2 of a technical series around the creation of Containers. Specifically, Jon and Chris dive deep into Docker networking. </itunes:summary>
      <itunes:subtitle>In episode 7 of Mobycast, we continue with part 2 of a technical series around the creation of Containers. Specifically, Jon and Chris dive deep into Docker networking. </itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Create Containers (Part 1)</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>How to Create Containers (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">069d8f21-f151-4e61-b304-135b978a5199</guid>
      <link>https://share.transistor.fm/s/d1bd8041</link>
      <description>
        <![CDATA[<p>In episode six of Mobycast, we introduce Part 1 of a technical series around the creation of containers. Specifically Jon and Chris teach me about base images and volume mounts.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode six of Mobycast, we introduce Part 1 of a technical series around the creation of containers. Specifically Jon and Chris teach me about base images and volume mounts.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Apr 2018 00:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/d1bd8041/eff6dcfa.mp3" length="31961235" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/5xm6CmvHKvIw3mGDi8gCecn0vJtg_28YL64c_fjpE9k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjgyLzE1/NjgwNDM2NjYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1994</itunes:duration>
      <itunes:summary>In episode six of Mobycast, we introduce Part 1 of a technical series around the creation of containers. Specifically Jon and Chris teach me about base images and volume mounts.</itunes:summary>
      <itunes:subtitle>In episode six of Mobycast, we introduce Part 1 of a technical series around the creation of containers. Specifically Jon and Chris teach me about base images and volume mounts.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Making the Business Case for Docker</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Making the Business Case for Docker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d55df8b4-6f8c-4781-b4ab-be238a6abaca</guid>
      <link>https://share.transistor.fm/s/f5504f20</link>
      <description>
        <![CDATA[<p>Episode 5 of Mobycast focuses on building a business case for transitioning to Docker.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Episode 5 of Mobycast focuses on building a business case for transitioning to Docker.</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Apr 2018 09:00:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/f5504f20/42395a42.mp3" length="42303751" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/Z0n_ZVdHGblzG7gNEoYvB_Xak8HflWKpF0T8L_YskrU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjgxLzE1/NjgwNDM2NjItYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>2641</itunes:duration>
      <itunes:summary>Episode 5 of Mobycast focuses on building a business case for transitioning to Docker.</itunes:summary>
      <itunes:subtitle>Episode 5 of Mobycast focuses on building a business case for transitioning to Docker.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The CI/CD Pipeline</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>The CI/CD Pipeline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3edf8870-2410-47a3-b38d-9426089a310b</guid>
      <link>https://share.transistor.fm/s/9775ffd3</link>
      <description>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus discuss the company’s CI/CD toolchain - continuous integration (CI) and deployment (CD) - when it comes to containerization. Your CI/CD pipeline will look completely different after being dockerized.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus discuss the company’s CI/CD toolchain - continuous integration (CI) and deployment (CD) - when it comes to containerization. Your CI/CD pipeline will look completely different after being dockerized.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Apr 2018 17:28:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/9775ffd3/b060037b.mp3" length="55509994" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:image href="https://img.transistor.fm/7fWTF-WR77tsTggaTu64KDuJCC2csudRGv80hBxe8rY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyMjgwLzE1/NjgwNDM2NTctYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>3466</itunes:duration>
      <itunes:summary>Chris Hickman and Jon Christensen of Kelsus discuss the company’s CI/CD toolchain - continuous integration (CI) and deployment (CD) - when it comes to containerization. Your CI/CD pipeline will look completely different after being dockerized.</itunes:summary>
      <itunes:subtitle>Chris Hickman and Jon Christensen of Kelsus discuss the company’s CI/CD toolchain - continuous integration (CI) and deployment (CD) - when it comes to containerization. Your CI/CD pipeline will look completely different after being dockerized.</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>An Introduction to Elastic Container Service (ECS)</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>An Introduction to Elastic Container Service (ECS)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41e49ac2-1504-44c9-96e4-5c02724656e6</guid>
      <link>https://share.transistor.fm/s/75c8cdc0</link>
      <description>
        <![CDATA[<p>Jon Christensen and Chris Hickman of Kelsus discuss Amazon’s Elastic Container Service (ECS) – how it works and why they use it. The term “container” comes from stacking containers on ships, and containers offer several advantages. But how does containerization relate to scaling on a large application?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jon Christensen and Chris Hickman of Kelsus discuss Amazon’s Elastic Container Service (ECS) – how it works and why they use it. The term “container” comes from stacking containers on ships, and containers offer several advantages. But how does containerization relate to scaling on a large application?</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Mar 2018 19:17:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/75c8cdc0/4f6b587c.mp3" length="57953568" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3619</itunes:duration>
      <itunes:summary>Jon Christensen and Chris Hickman of Kelsus discuss Amazon’s Elastic Container Service (ECS) – how it works and why they use it. The term “container” comes from stacking containers on ships, and containers offer several advantages. But how does containerization relate to scaling on a large application?</itunes:summary>
      <itunes:subtitle>Jon Christensen and Chris Hickman of Kelsus discuss Amazon’s Elastic Container Service (ECS) – how it works and why they use it. The term “container” comes from stacking containers on ships, and containers offer several advantages. But how does containeri</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Transitioning Legacy Applications to Docker</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Transitioning Legacy Applications to Docker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c4dc3f22-f978-4a26-91f3-37156a5d1494</guid>
      <link>https://share.transistor.fm/s/3cafd4ad</link>
      <description>
        <![CDATA[<p>What goes on inside an organization when it decides to make the switch to Docker? What does a team and company go through? Chris Hickman and Jon Christensen of Kelsus discuss transitioning legacy applications to Docker. About two-three years ago, Chris joined a company that was in the midst of transitioning to Docker to handle its Amazon Web loads. He was tasked with learning how to dockerize all of the microservices deployed by the company inside AWS.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What goes on inside an organization when it decides to make the switch to Docker? What does a team and company go through? Chris Hickman and Jon Christensen of Kelsus discuss transitioning legacy applications to Docker. About two-three years ago, Chris joined a company that was in the midst of transitioning to Docker to handle its Amazon Web loads. He was tasked with learning how to dockerize all of the microservices deployed by the company inside AWS.</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Mar 2018 19:15:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/3cafd4ad/cc4ff079.mp3" length="51445399" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>3212</itunes:duration>
      <itunes:summary>What goes on inside an organization when it decides to make the switch to Docker? What does a team and company go through? Chris Hickman and Jon Christensen of Kelsus discuss transitioning legacy applications to Docker. About two-three years ago, Chris joined a company that was in the midst of transitioning to Docker to handle its Amazon Web loads. He was tasked with learning how to dockerize all of the microservices deployed by the company inside AWS.</itunes:summary>
      <itunes:subtitle>What goes on inside an organization when it decides to make the switch to Docker? What does a team and company go through? Chris Hickman and Jon Christensen of Kelsus discuss transitioning legacy applications to Docker. About two-three years ago, Chris jo</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Virtual Machines vs. Containers</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Virtual Machines vs. Containers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ff4f911-d47c-4606-b107-2b363d23fa0c</guid>
      <link>https://share.transistor.fm/s/a3aaa17f</link>
      <description>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss the differences between virtual machines (VMs) and containers. What are the pros? Cons? Similarities? Differences?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss the differences between virtual machines (VMs) and containers. What are the pros? Cons? Similarities? Differences?</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Mar 2018 19:12:00 +0000</pubDate>
      <author>Mobycast.fm</author>
      <enclosure url="https://pdcn.co/e/media.transistor.fm/a3aaa17f/307eec3d.mp3" length="41945070" type="audio/mpeg"/>
      <itunes:author>Mobycast.fm</itunes:author>
      <itunes:duration>2618</itunes:duration>
      <itunes:summary>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss the differences between virtual machines (VMs) and containers. What are the pros? Cons? Similarities? Differences?</itunes:summary>
      <itunes:subtitle>Chris Hickman and Jon Christensen of Kelsus and Rich Staats from Secret Stache discuss the differences between virtual machines (VMs) and containers. What are the pros? Cons? Similarities? Differences?</itunes:subtitle>
      <itunes:keywords>aws, cloud, software, development, programming</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
