6 steps to build a comprehensive cloud tagging strategy

If it is not recognized, it is difficult to manage. In cloud computing, when resources have meaningful names or “tags”, management can be of great help.
Cloud providers usually use non-pronounceable-and hard to remember-tags to mark resources, but user-assigned tags, if properly designed, can organize cloud resources and promote everything from policy changes and billing audits to security and availability everything of.
A label is a combination of a key (category name) and a value (the name of something in that category). An often cited example is the environment as the key and development, testing and production as the value.
User tags help to identify resources more easily and can also provide multiple identities for potential cross-references. For example, resources may be labeled environment-production and organization-financial.
Marking is not a one-time task. Rather, it is a commitment to a way to organize and monitor cloud resources, and this way should be proportional to how serious you take your work for a long time. Use the following steps to build your strategy.
A good tagging strategy starts with a team that should represent all organizations that need or have a reason to cite cloud resource information. The team’s goal is to collect all uses of the data and then decide how to promote those uses through tags.
Some users suggest that the initial team process should focus on general requirements first, rather than defining tags, to avoid making promises before collecting all basic information. As a guide, three specific areas that may benefit from marking are:
After collecting data usage, it’s time to consider tags. Experience tends to be a top-down approach, so first group data usage requirements by organization to ensure that you can separate stakeholder requirements and map all data usage to a label or set of labels. This is the labeled “who knows” dimension, and it can be as simple as creating a set of keys and values ​​to identify the organization that makes the team’s contribution.
The next step is to look at the “what-knowledge” dimension, which is the purpose of the data. Here, it is important not to create dedicated usage labels for each organization. Cost allocation and budget reconciliation, common tasks that tags can facilitate, are usually done in the same way everywhere, so set up a common tag set for these tasks.
Tasks such as access management and application security/compliance constraints create “how to use” dimensions. Like the labeled “what-knowledge” dimension, these activities may cross organizational boundaries. Usually, this set of tasks and related data will be directly related to the role of the worker. Here, it’s important to summarize the role to the maximum, to ensure that you don’t end up with thousands of key/value tags.
First assume that you have only one role-you can use the keyword “role” to represent-and then assign the roles as widely as possible, consistent with your constraints. If necessary, you can add the “JobLevel” keyword to separate worker/supervisor permissions.
Now you are ready to mark. It is best to assign the actual labeling responsibility of resources to the operations group that manages the cloud. The motto “mark everything” applies here. Mark all current resources with each appropriate tag, even if all tag combinations are not currently used. Mark each new resource immediately before use.
Determine the label associated with the resource, send the result to the original planning team for review, and then apply the label from top to bottom. Most companies like to run reports at this stage to understand how the tagging strategy organizes resource data and help optimize tagging if necessary.
The final step is to create a marking plan to record your results. The plan must be kept up to date with the marking or any changes in the marking process. It should record all current labels and the reason for each label, how the resource is labelled and the organization responsible for labeling and review, and examples of how each organization uses the label.
The labeling strategy is all about planning, so it is wise to consider these preliminary steps before you begin. A bad labeling plan, or no plan at all, can cost a lot of business time and money.
Effective deployment and monitoring strategies are essential to make the most of virtual storage. Find out what software,…
This year’s VMworld conference was actually held from October 5th to October 7th. Read the latest news and announcements about…
Laying a Hyper-V knowledge base for successful management is essential. These three frequently asked questions can broaden your Hyper-V…
The VMware home lab requires hardware and software, which can become very complicated. These three frequently asked questions can guide you efficiently and…
VMware introduced NFS and SMB file sharing through vSAN file service. This service allows virtual machines to access any data stored in vSAN…
Hot migration and cold migration move virtual machines in different ways throughout the VMware infrastructure. Hot migration does not require downtime, and…
Thin clients usually do not require the attention of desktop administrators, but sometimes, IT needs to intervene to set up or…
There are many thin client options for RDP environments, but each device has unique characteristics that make it…
How do thin clients and thick clients compare in terms of licensing or flexibility? These two endpoint types are in…
Think you are ready to take the AWS Certified Solutions Architect certification exam? Use these 12 questions to test your knowledge, then…
Amazon said its truck monitoring system is designed for driver safety. But many industry experts are right…
Amazon wants to strengthen its global footprint, but the obstacles and challenges the e-commerce giant faces today are not…
As climate change becomes a more pressing issue, these sustainability best practices can help your data center become more environmentally friendly, which…
IBM has moved closer to achieving a frictionless hybrid cloud model with its first Power10 server. The new system is here…
Certification proves that the administrator has a certain level of expertise. Top training courses and certifications in evaluating software…
Two significant vulnerabilities disclosed before the release of this month’s security update received permanent fixes to replace…
Importing bulk emails to hosted email services in the Microsoft cloud requires some effort-and some help from AzCopy…
After migrating to Microsoft’s hosted email service, Exchange administrators must learn how to customize the integration and supplement…
All rights reserved, Copyright 2010-2021, TechTarget Privacy Policy Cookie Preferences Do not sell my personal information


Post time: Sep-17-2021