TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

AWS Tagging Best Practices

129 pointsby toeknee123almost 5 years ago

8 comments

acdhaalmost 5 years ago
One really useful tool: setup a tag policy in your account &#x2F; organization and make sure that all of your project teams have the ability to view it so finding non-compliant resources can be self-service without having a human in the loop:<p><a href="https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;organizations&#x2F;latest&#x2F;userguide&#x2F;orgs_manage_policies_tag-policies.html" rel="nofollow">https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;organizations&#x2F;latest&#x2F;userguide&#x2F;o...</a>
评论 #24133393 未加载
评论 #24137791 未加载
评论 #24140190 未加载
kapilvtalmost 5 years ago
one very useful tool for tagging and tag governance, is <a href="https:&#x2F;&#x2F;github.com&#x2F;cloud-custodian&#x2F;cloud-custodian" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;cloud-custodian&#x2F;cloud-custodian</a> you can setup policies to auto tag things with creators, and enforce tag policies, enforce valid vocabularies, and work through remediation and notification workflows. There&#x27;s even a standalone tool to do retro-active tagging on resource creators via cloud trail querying (c7n_trailcreator).<p>disclaimer: maintainer on cloud custodian
评论 #24134370 未加载
mesofilealmost 5 years ago
One thing that I wish I&#x27;d known when I first started to use Cost Allocation Tags in AWS as described in the article -- they won&#x27;t apply to any resources <i>created before the tag was created &amp; activated</i>. Well, you can apply them but they won&#x27;t return data to your cost reports. For some resources this is not a big deal -- any individual EC2 instance I can respawn pretty easily, or I&#x27;m not doing my job right. But there&#x27;s lots of things in the accounts I administrate that would be far less trivial to re-create, due as much to organizational issues as technical ones. Being able to apply CATs to old resources and start getting cost data back would be a huge improvement for my day-to-day work.
评论 #24133833 未加载
bovermyeralmost 5 years ago
I emphatically agree that tagging should be automated. Terraform, CloudFormation, Pulumi, whatever - make it part of the code. It&#x27;s way too easy for someone to miss a tag or misspell a tag if it&#x27;s being done manually.
评论 #24133132 未加载
评论 #24133803 未加载
digitalsushialmost 5 years ago
One of our teams set up a remediation service that does realtime tag analysis by following the Cloudtrail API logs. Anyone at the company who knows about the remediation service can simply log in, filter by aws resource type, and find a note indicating either a better configuration, or why the resource just got nuked from a high orbit.<p>We don&#x27;t have any issues tracking stuff down - if you create something that can&#x27;t be traced back your department, it explodes. I&#x27;ve never seen anything more effective at directing a user configuration.<p>Following through on a threat is essentially magic.
评论 #24134790 未加载
cbb330almost 5 years ago
A couple months ago I released automation in our cloud environment to shutdown&#x2F;startup resources who have been tagged with cron expressionS. It has been an incredibly flexible solution to manage and reduce the cost of resources which charge per time spent operating.<p>Not only do tags fit well into already existing work flows (CI&#x2F;CD, policy), cron expressions give freedom to devs&#x2F;sysadmins to choose whichever schedule they need. Also, this solution allows a central IT team to easily query and calculate duty cycle of any tagged resource, and relate that calculation to money saved.<p>I suggest using cron expression tagging for any scheduled resource automation, as it will likely be more flexible and more easily monitored than anything natively offered by the cloud vendor.
评论 #24133715 未加载
评论 #24135528 未加载
ocdnixalmost 5 years ago
This doesn&#x27;t cover other interesting uses, like tag-based automation. Random examples: Tagging DynamoDB tables to identify which should be backed up and at which frequency (when you don&#x27;t quite trust the built-in backup); tagging dev RDS databases with a shut-down schedule for nights&#x2F;week-ends; tagging Elastic IPs and Auto Scaling Groups with a &quot;IP pool ID&quot;, and a Lambda that re-assigns EIPs to ASG instances as they are recycled; using a &quot;data flow ID&quot; tag on resources that are in the hot-path of data flows that are subject to high-volume bursts, so you can easily list them and scale them up before known events.
评论 #24133094 未加载
评论 #24133049 未加载
dtechalmost 5 years ago
I can echo what this article recommends for business tags. When we migrated to IaC (terraform) we tagged nearly all of our resources and set up quite a few budgets and budget overrun alerts.<p>It gives great insight into infrastructure costs, makes budgeting a lot easier, and saved us a decent chunk of change by letting us know where savings would have the most impact or alerting us when we had unintended cost increases.
评论 #24132889 未加载