Over the coming weeks I’m likely to discuss a mix of old and new announcements, mostly so I get a chance to discuss things that happened when I wasn’t writing. This week we start with the great news around EC2 tags and then dive back to an announcement from Cloudflare and how that impacted AWS pricing.
EC2 Tags in Metadata
The first week of January usually isn’t the time where I feel that a release might be one of my favourites of the year. But when AWS announced that you can now get an instance’s tags through it’s metadata endpoint I became very happy. This solves an issue I’ve run into a number of times.
If you haven’t run into this before, the issue with EC2 tags previously was that you can’t see what tags are attached to an instance without using the AWS CLI (or SDK etc). And for that you needed an IAM permission. Unfortunately, there is no way to say in IAM “only allow this action on the instance it’s run from” so unless you create a separate IAM role for every instance you’d end up with a role that lets you read the tags of other instances as well
Of course, the question would then be, why do you need access to the tags in the first place? That can be for a variety of reasons really, but usually it’s because you want to run some software on the instance that needs this information. The exact use case will differ, but an example where I’ve used it is with configuration scripts and security software that reported back to a centralised system and therefore needed the tags to more easily identify where these instances were running.
So, it’s great to see that this is now a possibility. However, it isn’t perfect as it comes with a little caveat. You need to enable it first. If you don’t enable it, when you call the metadata endpoint you just get the same list as always:
$ curl http://169.254.169.254/latest/meta-data/
ami-id
ami-launch-index
ami-manifest-path
block-device-mapping/
events/
hostname
iam/
identity-credentials/
instance-action
instance-id
instance-life-cycle
instance-type
local-hostname
local-ipv4
mac
metrics/
network/
placement/
profile
reservation-id
security-groups
services/
So, you need to enable it. Which you need to do by changing the metadata options. If you use infrastructure as code
$ aws ec2 modify-instance-metadata-options \
--instance-id $YOURINSTANCEID \
--instance-metadata-tags enabled
And then when you call the metadata endpoint you see tags at the end of the list:
$ curl http://169.254.169.254/latest/meta-data/
ami-id
ami-launch-index
ami-manifest-path
block-device-mapping/
events/
hostname
iam/
identity-credentials/
instance-action
instance-id
instance-life-cycle
instance-type
local-hostname
local-ipv4
mac
metrics/
network/
placement/
profile
reservation-id
security-groups
services/
tags/
And calling the tags/
endpoint then gives you an instance endpoint, containing a list of tags which you can go through as always when using the metadata endpoint.
$ curl http://169.254.169.254/latest/meta-data/tags/instance/Name
arjen-demo-Instance
I’m hoping that the fact that it includes instance/
means we can expect more resources in there later on, such as volumes or security groups, but the instance tags are already the most important information so I’m very happy to see this.
Cloudflare R2
Back in September, Cloudflare pre-announced their R2 object storage service. R2 is clearly aimed as an S3 competitor. It’s not the first of its kind, and likely won’t be the last. So, why is this one worth calling out? Because of the pricing model.
To be clear, R2 is not yet available and so we don’t really know if anything about it will change. The main difference however is the price as Cloudflare’s claim is that R2 will be quite a bit cheaper for storage than the standard tier of S3
As a non-commercial example, let’s say you self-host your weekly podcast. If you store a 50MB episode file on S3 and get about 10.000 listeners
AWS' free tier expansion
Without mentioning Cloudflare’s blogpost and therefore completely unrelated
The first reaction for this is obviously “Yay! More free stuff”! We can all see our bills go down! Except, even with my simple example above regarding the podcast hosting it doesn’t actually make that much of a difference. Assuming no other months exist than February, there are 4 releases of the podcast per month which gives a total of 2TB of data traffic. So we now pay 5% less if we serve directly from S3 but a respectable 50% if we instead served it from CloudFront. And obviously if you do anything truly at scale you’ll barely notice the difference.
So, it’s definitely a nice change, but I admit that if I had a podcast with 10.000 listeners I’d switch hosting its files to R2 the moment it becomes available
-
You can add some limitations, but in the end it’s still wider than the current instance. ↩︎
-
As you obviously should. ↩︎
-
Since introducing launch templates, AWS has had the tendency to only add new features for EC2 instances there. So it’s highly recommended to switch to using them, especially for AutoScaling groups but also for standalone instances. ↩︎
-
S3 has a lot of different access tiers, especially if you include Glacier. Always make sure to review your data retrieval requirements to see if you can save money there. ↩︎
-
Again, S3 pricing is complex and there are a bunch of things you do get for free such as egress traffic to an AWS service in the same region. ↩︎
-
Let’s be clear, this is not a number I get on any of mine. ↩︎
-
As it says in the article “as part of our long tradition of AWS price reductions”. The timing is obviously coincidence. ↩︎
-
Yes, the pricing is complicated, which is why I don’t often write about it. I’m also pretty sure that, while you could make the argument this is because it means you only pay for what you need, this complexity isn’t exactly customer friendly. ↩︎
-
Well, honestly I’d just use a service that handles it all for me as that’s easier. ↩︎
Read more like this:
- Week 29, 2019 - Amazon EventBridge; EC2 Access Improvements; AWS CDK
- Week 48, 2018 - AWS Route 53 Resolver; Resource Access Manager; Predictive Scaling
- Week 40, 2018 - Cloudflare Encrypted SNI; AWS Aurora Updates; Azure VM Image Builder
- Week 15, 2018 - Cloudflare DNS Resolver; AWS Secrets Manager
- EC2 Instance Naming Explained
Or always get the latest by subscribing through RSS, Twitter, or email!