Most businesses depend on a portfolio of technology solutions to operate and be successful every day. How do you know if you and your team are following best practice, or what the risks in your architectures might be? This session will show how the AWS Well-Architected framework provides prescriptive architectural advice, and how the AWS Well-Architected Tool allows you to measure and improve your technology portfolio. We will explain how other customers are using AWS Well-Architected in their business, and we’ll share insights into what we have learned from reviewing tens of thousands of architectures across Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.
19. There are more than 20
billion connected devices
today.
Less than 1% of 1% of us
can understand and
influence them.
Kano believes in a future
where anyone can.
20.
21. “As we hit a period of growth and are on the cusp of the change from Startup to Scaleup we
took a moment to pause and put our AWS estate in order
(Russell Ormes, Principal Engineer, Kano computing)
22. “As we hit a period of growth and are on the cusp of the change from Startup to Scaleup we
took a moment to pause and put our AWS estate in order, and
that’s how we got to Steamhaus … their impact has been wholly positive. Their openness
about the decisions they make not only inspires confidence in the platform … but allows us to
learn and take ownership of our infrastructure at whatever level we are comfortable with. This
fits well with our core mission to demystify technology for everyone, even ourselves.”
(Russell Ormes, Principal Engineer, Kano computing)
23. 95% increase IN unique active
users across all the Kano
products from 2017 to 2018
24.
25. Security Reliability Performance
Efficiency
Cost
Optimization
Operational
Excellence
Unified approach
• Automate
• Remove risk
• Speed up delivery
• Onboard staff
Move from manual
provisioning to
managed services
ease management of
security and
authentication
• K8S inherits IAM
policies. EKS uses
IAM for Cluster
authentication
Istio for egress filtering
and mutual TLS
between workloads
K8S scheduler ensures
required number of
workload replicas are
present, healthy and
scale in line with
demand
Automated termination
and replacement of
unhealthy pods
ability to scale more
fluidly and rapidly due
to inheriting the
benefits of lightweight
containers.
Bootstrapping is
minimal or non-existent
K8S on EKS enables
higher infrastructure
density and less
wastage.
Current estimate of
cost saving from this is
20% to 30%.
use of RIs expected to
achieve ~15% saving
26. “we are excited to see where this journey will take us
and Steamhaus is helping us pave the way for a more
efficient journey.”
(Russell Ormes, Principal Engineer, Kano computing)