The Rise Of The Tag Nazis

Tag Nazi Meaning

What about it? Consciously or subconsciously, you could be one.

With the increased complexity and size of the infrastructure on AWS, it is difficult for technology and management teams to track accountability of the cloud in terms of cost visibility, asset management, and governance without proper tagging in place.

Increased Cloud Costs

Due to improper tagging practices, there will be lack of visibility into who is spending how much and for what, leading to unidentified cloud costs. This further leads to bill shock. Above all, a lot of time is spent on understanding cloud cost of the cloud infrastructure.

Unaccounted Assets

Non-uniform or poorly tagged resources/services on the cloud also lead to time wastage during critical situations. This further leads to an engineer inefficiently looking for a resource during an incident — meaning more downtime of your services/applications running on the architecture and poor customer experience and loss of revenue.

Lack of Governance

Inconsistent tags can also cause security, compliance and business risks. One of the example being lack of visibility and understanding of resources/services that house critical data, which can be either customer data or internal data.

That is why asset tagging is one of the ways how technology teams get visibility across the cloud infrastructure. AWS provides this service to enable its users to create and manage tags that make it easier to manage, search for, and filter resources in an AWS architecture.

With the issues at hand, some management team has resorted to enforced termination of resources with improper tags or no tags in the AWS environment, destroying the work done by employees.

Solution at hand

The first step is to understand and pinpoint resources that have not been tagged, which can be done through a simple workflow on the Workflow Editor.

Here’s discussion on Reddit about “How do you enforce tagging policies in your AWS account?”

Collaborate

Involve teams to understand how and what problems affect them and collaborate on setting and understanding cloud KPIs that needs to be tracked.

Create Schema for Tags

After understanding the cloud KPIs and affected teams, create a schema for tags which cover all the concerns of the teams as well as of the management.

Here’s a discussion about the tagging scheme on Reddit and some suggestions by AWS.

Enforcing Policies

You can start enforcing the schemas defined earlier and choose from a set of policies which could terminate, suspend, or notify incorrectly tagged resources. This allows you to adjust schemas to match the business needs and limit exposure.

Outcome

If we talk strictly in terms of cloud visibility, you could end up with following advantages depending upon the tagging scheme on which you have decided:

  • Cost Control
  • Asset Accountability
  • Application Tracking
  • Configuration Tracking
  • Security Visibility
  • More based on the tagging scheme

Final Thoughts: It’s great if you have taken measures to collaborate with your Dev team, educated them on the benefits of using standardized tags, created schemas and created policies. Thing again: have you been a “Tag Nazi” all the way long, micromanaging your Dev teams’ code lines??!! In this digital age where tooling and automation have seeped into the DNA of every company, why not standardize as well as regulate tagging principles and automate them too under compliance?

TotalCloud is a visual cloud infrastructure management platform. It enables the user to view the AWS architecture from the tags perspective and gain more infrastructural visibility.

The Rise Of The Tag Nazis

Smart Scheduling at your fingertips

Go from simple to smart, real-time AWS resource scheduling to save cost and increase team productivity.

Learn More
More Posts

You Might Also Like

Product
Introducing the TotalCloud Smart Scheduler
Announcing the launch of the TotalCloud Resource Scheduler! Take complete advantage of AWS's 'pay for what you consume' model by putting a power control for every AWS resource that you use.
January 14, 2020
Sayonee
AWS Use Case Files
Increase EBS Volume Size In Aws
Learn how a simple workflow can auto-remediate and increase the EBS volume size when disk utilization goes beyond 90%
December 2, 2019
Sayonee
AWS Use Case Files
Aws EC2 Instance CPU Utilization Report
Learn how a single workflow can be used to generate a CPU Utilization Report for EC2 Instances and ensure you aren't over or under utilising them.
October 24, 2019
Sayonee
AWS Use Case Files
Aws Lambda Daily Cost Predictor
Learn how a simple workflow can be used to predict daily lambda costs, that can help prevent 'bill-shocks' and optimize your costs better
October 24, 2019
Sayonee
Cloud Automation
Putting Devops On Autopilot With Lego Like Automation
TotalCloud Workflow Editor assists you to do practically anything you want on your AWS infrastructure.
October 24, 2019
Sayonee
AWS Use Case Files
Reporting Security Groups - Tcp Port 22 (Ssh) Public Ip Access
Learn how to use a simple workflow to generate a report of Security Groups with unrestricted Port 22 access from Public IP
October 24, 2019
Sayonee