[Last Week in AWS Extras]: The Lock-In You Don’t See

 

Today's email departs from the past few weeks' "hilarious" vein and drifts back towards a general analysis tone. Today's topic: lock-in!

 

As always, should you wish to link someone else to this post, you can forward it, or else view it on the web.

 

 

Sponsorships are fun sometimes.

 

ParkMyCloud: "Can we have one of our execs do a video chat with you?"

 

Me: "Better idea, how about I talk to one of your customers instead so we can make fun of you on your dime?"

 

It turns out I'm SUUUPER convincing, so that's what's happening! Join me and ParkMyCloud's customer Workfront on July 23rd for a no-holds-barred discussion about how they're optimizing AWS costs, and whatever other fights I can pick before ParkMyCloud realizes what's going on and kills the feed!

 

Register here to catch the fun. Sponsored

 

 

The Lock-In You Don’t See

It’s extremely important to avoid vendor lock-in—according to the way the IT industry has always worked, and (by extension) the vendors who dream of one day prying you away from your primary cloud vendor.

 

This line of argument has been used to justify all kinds of suboptimal positions ranging from “multi-cloud is a good idea” to “let’s build everything in Terraform because migrating it will be super easy” to “the only universal database that doesn’t lock us in remains DNS (specifically its pinnacle of expression in the form of Route 53).”

 

It’s used as an argument against aggressive spend commitments to unlock discounting against any higher-level differentiated service offering that doesn’t transcend providers.

 

Raging against this school of thought is left as the subject for another rant. Today, I’m going to instead talk about three insidious forms of lock-in that you’ll never see coming.

The people

If you call an engineering all-hands today and announce that you’re leaving your primary cloud provider in favor of a migration to IBM “Cloud,” one particularly brash engineer will probably declare that if you go ahead with that move, they’re going to quit.

 

You roll your eyes; that engineer is always making declarations like that.

 

But that engineer is the only one bold enough to say out loud what at least a third of your engineering department is thinking.

 

If you’re already on a single cloud provider, you’ve hired staff who know the ins and outs of that platform. They know how it works and, critically, how it breaks.

 

When they’re told that it’s time to move to another platform—be it a competing top-tier cloud provider, a data center you’ve gotten a killer deal on due to an annoyingly persistent raccoon problem, or virtually any other location—they’re confronted by a choice.

 

They can either stop honing their current well-compensated skillset and become a neophyte again on a completely new platform, or they can take their ever-more-valuable skills down the street to a company that’s using the provider that they’ve specialized in—and almost certainly get a pay raise along the way.

 

When clients ask me what the hardest part of moving their AWS environment to a competitor would be, my answer is always “replacing the full third of your engineering staff that resigns within six months.”

 

If you as an engineer know how AWS is going to hurt you and have plans for how to mitigate it, you don’t want to go through that painful process all over again for GCP or Azure. Once was enough for you.

The access

The second form of lock-in that gets overlooked is whatever your provider is using for Identity and Access Management (IAM).

 

Look at your security policies. Examine your compliance documents. Look at your Terraform code.

 

There’s an awful lot of access management logic baked into your assumptions there. Migrating all of that to another provider requires a revisiting of those assumptions—and a thorough dusting off of issues long since put to rest.

 

Is cross-account role assumption a thing? Are session timeout limits consistent between providers? Does your new provider assume you have an SSO system that will be used but you’re using a bunch of hand-managed IAM users?

 

If we look at AWS as our example—because, let’s face it, it says AWS at the top of this document—you have IAM credentials. You have root account credentials. You have role assumptions. You have managed policies. You have CloudFormation stacks—even if you’re a Terraform shop (go and check out your CloudFormation console; I’ll wait). You have an entire event model that’s set up to reflect these things, and in turn it drives auditing tooling and frameworks like CloudWatch and GuardDuty—and the attestations you’ve made to your compliance folks about how all of these things work.

 

In theory it’s easy to shift. In practice, the theory breaks down.

 

Key management, RBAC, ensuring that only the people who should have access to your data do in fact have that access… It’s an entire department at most large companies. Suddenly, changing the underlying primitives is a herculean effort—and one that’s unlikely to be offset by whatever perceived benefit of a cloud migration is being sold to you.

Data gravity

Does this sound at all familiar to you?

 

Someone at your company says “we’ll have the main app live in AWS and the data science stuff will be in GCP,” and then everyone puts their fingers in their ears and says LA LA LA very loudly, thinking that “well, where does the data live?” is somehow automatically a non-issue.

 

Everyone talks about data gravity being a lock-in factor. But rather than taking positions that help mitigate it, they instead…talk about data gravity being a lock-in concern, and then go ahead and accept that.

 

This, in turn, means that while you may in theory be multi-cloud, your primary cloud vendor emerges (and begins to accrete the rest of your cloud usage) pretty quickly.

 

The way to predict which vendor becomes your primary is simple: It’s the one that holds your data.

 

Let’s ignore DynamoDB vs. Aurora vs. Oracle database arguments here; I’m talking about something more fundamental at play. The numbers change slightly at scale, but “sending a given quantity of data from AWS to another cloud provider” results in an AWS data transfer charge just slightly below the cost of storing that same quantity of data in S3’s standard storage tier for four months. Azure and GCP charge similarly for data egress; this isn’t a problem specific to AWS.

 

Fundamentally, it doesn’t matter that another provider has better APIs for working with data if it costs you a boatload to get it over to their environment for analysis. You become locked in based purely on the economic weight of your own data.

There is no hope

There are a pile of vendors that claim to get around lock-in problems. IInvariably, they do this by introducing such lousy abstractions on top of the cloud providers that working with any of them becomes a similarly awful experience.

 

Please understand: I’m not saying that all companies in all situations should throw caution to the wind and embrace every last API their chosen cloud provider offers.

 

What I’m saying is that—despite some explicit conscious choices that you’ve made to the contrary—you’re already locked in.

 

Disagree with me? Yell at me on Twitter, a platform to which I am hopelessly locked in.

 

 

About 80% of software teams that do not yet practice observability plan to reach an advanced level within the next 2 years. Honeycomb asked your peers to tell us how they're doing.

 

Advanced observability teams are 3X more likely to work in an organization that understands the breadth and impact of their tech debt. A whopping 92% are confident they proactively notice and catch bugs after code is deployed to production.

 

Most teams have just begun their observability journey. See how you compare and let Honeycomb.io help you advance your practice. Sponsored

 
 
 
Corey

I’m Corey Quinn

I help companies address their horrifying AWS bills by both reducing the dollars spent and helping them understanding what they’re paying for.

 
 
The Cloud

Screaming in the Cloud & AWS Morning Brief

In addition to this newsletter, I host two podcasts: Screaming in the Cloud, about the business of cloud computing, featuring me talking to folks who are good at things; and AWS Morning Brief, a show about exclusively AWS with my snark at full-tilt.

 
 
The Cloud

Sponsor an Issue

Reach over 19,000 discerning engineers, managers, and enthusiasts who actually care about the state of Amazon's cloud ecosystems.

 



Want to skip these Last Week in AWS Extras? Click here and you won't receive these Wednesday dispatches anymore.

To make sure you keep getting these emails, please add corey@lastweekinaws.com to your address book or otherwise mark me as a permitted sender.

Want out of the loop completely? Click here to tell me to leave you alone.

 

Duckbill Group

1728 Ocean Ave #307, San Francisco, CA 94112

 
                                                           

Older messages

[Last Week in AWS] Issue #170: AWS Machine Learning Your Business From Inside

Monday, July 13, 2020

Good Morning! Last week saw a bunch of things, from my ridiculous Jeff Barr birthday video to my suggestion for a new AWS service to a bunch of sad things in the news. I'll be keynoting Cloud

[Last Week in AWS Extras]: Introducing AWS Elastic Beanstalker

Wednesday, July 8, 2020

Today's email is half whimsy, half a viable-if-outlandish solution to solve the AWS billing system's problems in one go. Honestly, at this point I can't tell if it's a completely

[Last Week in AWS] Happy 60th Birthday Jeff Barr!

Tuesday, July 7, 2020

Happy birthday to one of our favorite people, AWS Chief Evangelist and VP Jeff Barr. As is our tradition here at the Duckbill Group, we've created a music video to celebrate the equation. Without

[Last Week in AWS] Issue #169: Kicking AWS's ASS Into Space

Monday, July 6, 2020

Good morning! First, last week this newsletter crossed 20000 active subscribers. Thanks; I'm deeply moved by the fact that so many of you read my nonsense every week. Second, tomorrow AWS's

[Last Week in AWS Extras]: Lies, Damned Lies, and Keynotes

Wednesday, July 1, 2020

Before we get into today's newsletter, let's pause for a minute to remember a departed friend. Seven years ago today Google Reader was taken from us. Sorely missed, and gone too soon. Rest

You Might Also Like

DeveloPassion's Newsletter #164 - A Thousand Fans

Sunday, April 28, 2024

Edition 164 of my newsletter, discussing Knowledge Management, Knowledge Work, Zen Productivity, Personal Organization, and more! Sébastien Dubois DeveloPassion's Newsletter DeveloPassion's

Nobody Likes a Know-It-All: Smaller LLMs are Gaining Momentum

Sunday, April 28, 2024

Phi-3 and OpenELM, two major small model releases this week. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Retro Recomendo: Music

Sunday, April 28, 2024

Recomendo - issue #408 ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Your Phone’s Other Number 📱

Saturday, April 27, 2024

Let's talk about your phone's IMEI number. Here's a version for your browser. Hunting for the end of the long tail • April 27, 2024 Today in Tedium: As you may know, Tedium is a blog and/or

🕹️ How to Play Retro Games for Free on iPhone — Why I Can't Live Without an eReader

Saturday, April 27, 2024

Also: Anker MagGo (Qi2) Power Bank Review, and More! How-To Geek Logo April 27, 2024 📩 Get expert reviews, the hottest deals, how-to's, breaking news, and more delivered directly to your inbox by

Weekend Reading — The Bob Ross of programming

Saturday, April 27, 2024

This week we use coffee tasting as our design practice, get as close to and as far away from the metal as possible, find an easier way to write documentation, discover why Google Search is getting so

Issue #538: All the Jam entries, Panthera 2, and Tristram

Saturday, April 27, 2024

Weekly newsletter about HTML5 Game Development. Is this email not displaying correctly? View it in your browser. Issue #538 - April 26th 2024 If you have anything you want to share with the HTML5 game

Daily Coding Problem: Problem #1424 [Easy]

Saturday, April 27, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Microsoft. Implement a URL shortener with the following methods: shorten(url) , which

Charted | Countries That Became More Happy (or Unhappy) Since 2010 😅

Saturday, April 27, 2024

Which countries had the highest happiness gains since 2010? Which became sadder? View Online | Subscribe Presented by Voronoi: The App Where Data Tells the Story FEATURED STORY Countries With the

Noonification: What Is E-Waste Hacking?

Saturday, April 27, 2024

Top Tech Content sent at Noon! The first AI-powered startup unlocking the “billionaire economy” for your benefit How are you, @newsletterest1? 🪐 What's happening in tech this week: The