All Posts in “vDM30in30”

It’s Saturday so let’s talk soccer

The issue with VDM30in30 is you really have to plan out what you are going to blog about for 30 days. Then you have to assume that someone is going to read it and need to make sense of it.

I watched my stats for last year and my weekday posts had significant uptick in viewership but the weekend posts went largely ignored. So this time around I wanted to try something different and post about a non-technology subject on the weekends. This year I am not doing a large number of posts upfront and scheduling them instead I am writing them each the night or day before they need to go live. This adds some stress to be sure but hopefully not too much.

Saturdays for me are about time with my wife and kids and mostly about soccer during 3 out of 4 seasons of the year. As some of you know I coach 2 soccer teams a U13 and a U8 team for my daughter and son. I have played soccer my entire life and love the game. As the sport has grown in popularity I see more and more in the IT world talking about it and asking for drills for their kids.

So I figured this weekend we could take some time to talk soccer coaching! Today’s topic Offense:

It’s important when teaching young players to explain how a field is laid out. I start by describing how we divide a soccer field or pitch into 3rds horizontally. The defensive, midfield, and attacking 3rds.

The Defensive 3rd is where we want to clear the ball away from our goal, the midfield 3rd is the toughest area of the field and is important to win the ball and use controlled passing, the attacking third is all about playing the ball into the box and centering for shots on goal.

For young kids they all want to chase a ball around the field especially at U6-U9. To get them away from the herd mentality it’s good to explain the soccer field with the 3rds and then carve it up again for them vertically. With each wing zone being a 3rd and then a center 3rd for the striker.

Kids understand zones or bases from playing tag so reinforcing that message is easy when using fun drills like wall passing or just cross and shoot with 3 offensive players. Here are some of my favorites.

http://www.soccerxpert.com/soccerdrills/id1213.aspx

http://www.soccerxpert.com/soccerdrills/id1209.aspx

Something that coaches always ask and parents as well is how to work on aggressiveness. “My kid just doesn’t want to get after the ball”, or “they aren’t attacking enough”. Believe me if I had a cure for that I would be the greatest youth coach of all time. The answer is it comes to each kid in their own time. Sometimes it never comes because they are super sweet kids and overly kind (aka my daughter most games). But if you are coaching and need to get the kids to attack on offense more and challenge the ball. I love the 50/50 challenge there is a link below but essentially it’s two lines on either side of the goal 3 ft off the end line. The coach tosses the ball over the goal out onto the field the first two players in line charge out win the ball and each tries to score, an steal the ball from the other player. Play ends with a goal or out of bounds ball is played.

http://www.soccerxpert.com/soccerdrills/1v1-to-goal-team-competition.aspx

Finally a drill I run a lot is the run and cross. I believe firmly that youth soccer should play inside out to outside in. That means you never play a ball into the middle of your own goal always play out to the sidelines, and take the open sidelines to the corner in the attacking 3rd to play the ball into the box where the striker and far wing are waiting. I do this drill until players hate it but honestly its one of the best to teach soccer the way it’s meant to be played on the attack.

So let me know what you think about a non-tech post and if you have some favorite drills for your kids I am all ears.
 

AWS Storage Services

Storage storage storage, ugh it’s like I am unable to escape it in my career. I get it storage is in everything we do but I moved to a cloud company trying to get away. Oh well I guess if I am stuck at least I get to have a portfolio to talk about.

“Cloud storage, is a trap”, “Remember Hotel California by the Eagles, that’s what AWS Storage is”, and the list goes on. I’m not going to get into the FUD part of this save that for the actual customer meetings and let the competition have their hopes and dreams to help them sleep at night.

Before we get too far ahead of ourselves, just like in the world of on-prem storage it’s recommended that all data be encrypted. How do you do this? Well you can use the same encryption and keys that you use in your current data center model, you can use third party encryption, or you can use the Key Management Service (KMS) within AWS itself. Regardless of which you use all keys are owned by you the customer and AWS does not control your data encryption or the keys to decrypt your data under any circumstance.

Now that that’s out of the way what kind of storage do you have in your data center? Most likely you have some block, file, and object, and archive storage right? Well AWS has got you covered.

Simple Storage Service aka S3screen-shot-2016-11-03-at-4-25-47-pm
S3 is one of the first services available on AWS. S3 is object based storage, that is replicated across all
availability zones in a region.

 

screen-shot-2016-11-03-at-9-16-22-pmBut it can also be tied to cross region replication meaning your data can be replicated closer to the point of utilization or simply for disaster recovery purposes.

 

 

 

There are a couple of storage classes for S3 here is a quick chart to explain the difference, each comes with its own cost associated.

 

Standard Standard – IA Amazon Glacier
Designed for Durability 99.999999999% 99.999999999% 99.999999999%
Designed for Availability 99.99% 99.9% N/A
Availability SLA 99.9% 99% N/A
Minimum Object Size N/A 128KB* N/A
Minimum Storage Duration N/A 30 days 90 days
Retrieval Fee N/A per GB retrieved per GB retrieved**
First Byte Latency milliseconds milliseconds 4 hours
Storage Class object level object level object level
Lifecycle Transitions yes yes yes

 

S3 uses buckets and indexes to organize data off of keys. When you create an S3 bucket you give it a name, only use lower case and know that S3 names are screen-shot-2016-11-03-at-4-47-15-pmglobal so make it unique. Permission to buckets are handled via IAM and applied at the bucket level. You can put permissions on objects but if you have more restrictive permissions at the bucket level they will trump whatever you have at the object. S3 has some really great features as well, like logging to track object access, versioning which flags files at change and allows you to roll back to older copies, and lifecycle management. Lifecycle management lets you move objects across classes of S3 storage and even into Glacier which is AWS’ archival storage service, we will get to that in a moment.

Elastic Block Storage aka EBS

EBS is the block storage of the AWS world as the name implies. This one should be familiar for anyone coming from the VMware world. EBS can be used as root or secondary volumes for EC2 instances, or as a shared block volume shared across multiple instances (think web content shared across multiple web servers). EBS volumes can be snapshot, and snapshots can be restored from for point in time restoration.  EBS can also be added to Raid groups on an EC2 instance, check out the Linux guide or the Windows guide for help on how to configure Raid. You can also encrypt EBS volumes of course, see the guidance for that here.

Elastic File Storage aka EFS

This is the File Systems you are used to but now on the cloud. EFS is one of the newer storage services on AWS. Easy to mount to EC2 instances and replicated across availability zones. EFS automatically scales up and down.

So when do you use EBS vs EFS how about a handy chart?

Amazon EFS Amazon EBS PIOPS
Performance Per-operation latency Low, consistent Lowest, consistent
Throughput scale Multiple GBs per second Single GB per second
Characteristics Data
Availability/Durability
Stored redundantly across multiple AZs Stored redundantly in a single AZ
Access 1 to 1000s of EC2 instances, from multiple AZs, concurrently Single EC2 instance in a single AZ
Use Cases Big Data and analytics, media processing workflows, content management, web serving, home directories Boot volumes, transactional and NoSQL databases, data warehousing & ETL

 

Glacier

Glacier is archival storage with 99.999999999% durability, as discussed earlier this is where you lifecycle off S3 data for long term storage. Glacier is by far the cheapest of storage services offered by AWS but it comes with a caveat and that is the time for recovery and availability comes at a cost. There is a 5hr window for data to be available from Glacier. It’s archival storage so treat it as such. There is also a feature called Vault Lock with Glacier that allows you to set policies which turns Glacier storage into WORM capable. No not the awesome dance move from the 80’s Write Once Read Many meaning you can rest assured that the data will not change as such this solves many issues with auditing and can be used for storing logs etc for that purpose.

Storage Gateway

There is a lot that can be said here about Storage Gateway, this is one of the first on-prem offerings from AWS. Storage Gateway is deployed in your datacenter as either a Hyper-V or VMware VM. You get 3 options for configuration cached volume mode where the most used data has a local copy saving on data transfer rates. Stored volume mode this is where storage gateway is the local volume store and asynchronously backs up data to S3 via point in time snapshots. The last option is Virtual Tape Library (VTL) mode this will allow you to use your backup software to treat the storage gateway as a tape library storing data direct to S3 or to a Virtual Tape Shelf (VTS) backed by Glacier which looks like a standard iSCSI connection.

Snowball

I would be remised if I didn’t mention what Snowball is, imagine a world in which physics didn’t
exist. In that world you could push as much data as you wanted across any size pipe day or night, in this world I would also be granted the power of flight cause why not. Wouldn’t that be amazing? Now then back to reality where we live, how do we transfer massive amounts of data from on-premises to S3? The answer comes via FedEx as anyone with Prime already knows. A Snowball is a ruggedized storage appliance that you can order via your AWS console, you specify the bucket that you want the data transferred to, you can move up to 80 TB at a time. There are multiple connection types, and a slick E Ink shipping label that once your data is copied to the appliance flips over and is ready for pick-up from FedEx to be brought to the region of your choice and uploaded.

All of these solutions allow for and strongly encourage data encryption, so be smart and use an encryption key.

Setting up and understanding a VPC

Let’s dig into VPCs or Virtual Private Clouds. Essentially a VPC is a logical boundary, or essentially an encapsulated environment with no default ingress or egress. The thing with cloud is it’s so very network dependent but in AWS cloud everything is defaulted to no access. That’s why we use security groups, NATs, and Internet Gateways (IGWs). VPCs are the construct of how we draw a demarcation around services in a shared resource model. A VPC is a /28 to /16 netmask CiDR block at its core.

Ok that’s a lot of words so how does this look, well when you initially sign up for AWS and log in you are given a default VPC. This is great but not the best to use for building out your actual workloads. Therefor you will want to build a VPC but is just one VPC the answer? Well it depends on your needs and your architecture.

As I mentioned before a VPC is a set of IP addresses in a CiDR block, it is important when designing your VPC to ensure you have enough IP addresses to perform all of the functions that you are planning. Therefor you start with a /16 which gives you 254 /24 subnets. The best practice guidance is to use private IP space to create your VPC, as specified in RFC 1918.

10.0.0.0 – 10.255.255.255 (10/8 prefix)

172.16.0.0 – 172.31.255.255 (172.16/12 prefix)

192.168.0.0 – 192.168.255.255 (192.168/16 prefix)

As mentioned this block of addresses will be carved into subnets with 5 IPs reserved for management activities (the first 4 and last 1 in the range).

x.x.x.0: Network address.

x.x.x.1: Reserved by AWS for the VPC router.

x.x.x.2: Reserved by AWS. The IP address of the DNS server is always the base of the VPC network range plus two; however, we also reserve the base of each subnet range plus two. For more information, seeAmazon DNS Server.

x.x.x.3: Reserved by AWS for future use.

x.x.x.255: Network broadcast address. We do not support broadcast in a VPC, therefore we reserve this address.

Subnets are restricted to a VPC and cannot span across VPCs. We can however create peering points between VPCs, and have a single VPC that peers to two VPCs that contain the same subnet, this could be useful in deployments where we want to reuse the same IPs for Test&Dev/Prod or Blue/Green. There are other variations of how and why to peer VPCs but let’s set that aside for a future post and just get our first VPC stood up.

screen-shot-2016-11-02-at-4-55-05-pmWe can do a custom build, but the AWS console has a sweet little VPC wizard we can use. Let’s use the Wizard cause why not.  So as you can see you have 4 options. We are going to select Option 2: a VPC with one public and one private subnet.

 

 

 

We select which AZs we want each of the subnets to sit in and determine if we want a NAT, screen-shot-2016-11-02-at-8-14-58-pmin this case I am choosing a NAT gateway instead of a NAT instance. There are several reasons to choose one over another, one of the main differences is a NAT gateway will auto-scale whereas a NAT instance screen-shot-2016-11-02-at-8-15-52-pmrequires a script for failover. Compare your options here.

 

 

screen-shot-2016-11-02-at-8-52-23-pmBy using the VPC wizard once it’s completed it’s set up our public subnet is also assigned an internet gateway. This means we now have external connectivity to our public subnet.
screen-shot-2016-11-02-at-8-56-44-pmWith that same setup the Private subnet is behind the NAT. We are ready to start building out our EC2 instances.

 

I highly recommend this video to understand VPC networking even further.


Next up we will discuss storage options in AWS. Feedback on if any of this is useful is helpful for me to make sure I am writing to the correct audience.