{"id":537,"date":"2020-10-07T15:09:09","date_gmt":"2020-10-07T08:09:09","guid":{"rendered":"https:\/\/vticloud-test.tk\/?p=537"},"modified":"2021-09-20T09:33:15","modified_gmt":"2021-09-20T02:33:15","slug":"10-goi-y-trien-khai-aws-disaster-recovery","status":"publish","type":"post","link":"https:\/\/vticloud.io\/en\/10-goi-y-trien-khai-aws-disaster-recovery\/","title":{"rendered":"10 Tips for Developing an AWS Disaster Recovery Plan"},"content":{"rendered":"<p><\/p>\n<p id=\"a376\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Even a minimal interruption of service can mean disaster for an organization, implying thousands of dollars in data loss. A disaster can be caused by a security attack, a natural disaster or human error. Business continuity is critical for any company in the cloud. A solid disaster recovery plan help organizations stay up in the event of failure or attack.<\/span><\/p>\n<p id=\"c9cf\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">One of the leading cloud vendors, Amazon Web Services (AWS), provides its users with features to help them build their own Disaster Recovery Solution. In this article, I aim to cover what is a Disaster Recovery Plan (DRP) for AWS and I\u2019ll offer 10 tips to leverage the functions in your AWS console to prevent and recover from a disaster.<\/span><\/p>\n<h2 id=\"843f\" class=\"io ip ek av iq ir is it iu iv iw ix iy iz ja jb jc jd je jf jg cf\"><span style=\"font-size: 24pt; font-family: BaiJamjuree-Regular, sans-serif;\">AWS Disaster Recovery Plan Overview<\/span><\/h2>\n<h3 id=\"4002\" class=\"hq hr ek hs b ht jh hv hw hx ji hz ia ib jj id ie if jk ih ii ij jl il im in ec cf\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">A Disaster Recovery Plan (DRP) is a structured and detailed set of instructions geared to recover system and networks in the event of failure or attack, with the aim to help the organization back to operational as fast as possible.<\/span><\/h3>\n<p id=\"d6de\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Deploying an on-premises disaster recovery solution usually involves high costs of implementation and maintenance. Therefore, many companies leverage the disaster recovery tools and solutions provided by their cloud vendors, such as\u00a0AWS\u00a0or Azure. These solutions may be offered by third-party vendors \u2014 for example, AWS partners with companies such as N2WS and Cloudberrylab that offer disaster recovery solutions tailored to AWS.<\/span><\/p>\n<p id=\"72c5\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">AWS users can derive several benefits from developing a recovery plan and having it ready such as:<\/span><\/p>\n<ul class=\"\">\n<li id=\"8c99\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Minimize data loss<\/strong>\u00a0\u2014 protects critical data by establishing replication intervals<\/span><\/li>\n<li id=\"43e3\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Quickly restores critical applications<\/strong>\u00a0\u2014 minimizing downtime<\/span><\/li>\n<li id=\"8235\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Distributes the risk<\/strong>\u00a0\u2014 by using AWS cross-region disaster recovery<\/span><\/li>\n<li id=\"fb59\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Quick bounce back<\/strong>\u00a0\u2014 requires minimal time to retrieve files and data, thus restoring operations<\/span><\/li>\n<\/ul>\n<h2 id=\"351c\" class=\"io ip ek av iq ir is it iu iv iw ix iy iz ja jb jc jd je jf jg cf\"><span style=\"font-size: 24pt; font-family: BaiJamjuree-Regular, sans-serif;\">10 Tips For Developing an AWS Disaster Recovery Plan<\/span><\/h2>\n<h3 id=\"0733\" class=\"hq hr ek hs b ht jh hv hw hx ji hz ia ib jj id ie if jk ih ii ij jl il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#1. Identify critical resources and assets<\/strong><\/span><\/h3>\n<p id=\"a4e3\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">What resources compose the core of your business? A Business Impact Analysis (BIA) can help give you a picture of which areas can become more affected in the event of a threat. It also can guide you to preview the potential impact of a disaster in operations.<\/span><\/p>\n<h3 id=\"e0a9\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#2. Define your recovery time objective (RTO) and your recovery point objective (RPO)<\/strong><\/span><\/h3>\n<p id=\"55a3\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">You should know how much system downtime your organization can afford before suffering irreparable monetary losses. Therefore, calculating your recovery time objective is critical for a successful recovery plan. Moreover, you need to calculate how much data loss your organization can absorb before incurring too much damage \u2014 that is the recovery point objective. For example, if losing 4 hours of data will cause too much damage, then you need to account for an RPO of much less than 4 hours.<\/span><\/p>\n<h3 id=\"53ad\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#3. Choose a disaster recovery planning method<\/strong><\/span><\/h3>\n<p id=\"dc9c\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">There are four main recovery methods you can choose according to your organization requirements and preferences:<\/span><\/p>\n<ul class=\"\">\n<li id=\"1a7f\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Backup and restore<\/strong>\u00a0\u2014 you can use a managed solution to backup and restore data on a need-to-do basis. However, the restoration can consume a lot of time and resources as the system does not keep data on standby.<\/span><\/li>\n<li id=\"518b\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Pilot light<\/strong>\u00a0\u2014 keep a core of critical applications and data running to enable quick retrieving in the event of a disaster.<\/span><\/li>\n<li id=\"6ab5\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Warm standby<\/strong>\u00a0\u2014 this involves duplicating the system\u2019s core elements and keeping them running on standby at all times. In the event of a disaster, this duplicate can be promoted to primary to maintain operations.<\/span><\/li>\n<li id=\"e18a\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Hot standby<\/strong>\u00a0\u2014 make a full replica of the data and applications, deploying it in two or more active locations. You can then split the traffic between them, so in the event of a disaster, the system simply reroutes everything to an undamaged region.<\/span><\/li>\n<\/ul>\n<h3 id=\"4fd7\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#4. Define and implement security and corrective measures<\/strong><\/span><\/h3>\n<p id=\"c065\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">For example, you can implement detective measures such as server and network monitoring software. Corrective measures as remediation tools can help restore a system after a disaster.<\/span><\/p>\n<h3 id=\"b120\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#5. Test your plan before implementing it<\/strong><\/span><\/h3>\n<p id=\"836e\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Schedule testing while developing your DRP can help you catch flaws before you need to implement the plan. This can ensure your plan is well oiled before a disaster or threat occurs.<\/span><\/p>\n<h3 id=\"0d0d\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#6. Schedule maintenance<\/strong><\/span><\/h3>\n<p id=\"a1dc\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">You should update your plan on a regular basis, to catch up with system changes. In the aftermath of a threat, this forms part of lessons learned, refining the plan to prevent further attacks or failures.<\/span><\/p>\n<h3 id=\"d902\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#7. Backup your data<\/strong><\/span><\/h3>\n<p id=\"114a\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Scheduling regular backups of what you have stored on Amazon EC2 and EBS volumes could be insufficient to face a disaster. You need to have quick access to the data in the event of a disaster. A detailed and up-to-date\u00a0AWS disaster recovery plan\u00a0can help you recover and restore the backup data from the cloud environment with minimal downtime.<\/span><\/p>\n<h3 id=\"34f8\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#8. Use cross-region backups<\/strong><\/span><\/h3>\n<p id=\"b522\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">While developing your plan you need to decide where the critical data will be stored. To avoid getting your entire system knocked offline, you should distribute the data across different availability zones (AZ) around the world.<\/span><\/p>\n<p id=\"cd6d\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">For example, you can use cross-region replication for S3. S3\u2019s duplicates the data to multiple locations within a region by default, creating high durability. However, this does not eliminate the risk of data loss in a given region. To prevent this, you can use the cross-region replication option, automating the copying of the data to a designated bucket in another region.<\/span><\/p>\n<p id=\"051c\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">You can also use global tables in DynamoDB to deploy a multi-region multi-master database. This spreads the changes across several tables. Since the data is distributed in different regions, minimizes the risk of data loss.<\/span><\/p>\n<h3 id=\"b62f\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#9. Use multi-factor authentication<\/strong><\/span><\/h3>\n<p id=\"f278\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Needless to say, you should keep your root passwords and credentials secure and hidden from non-authorized users, even disabling the programmatic keys once they are used, to prevent internal threats. Setting a multi-factor authentication solution can ensure the administrator and programmatic privileges don\u2019t fall into malicious hands.<\/span><\/p>\n<h3 id=\"27df\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\"><span style=\"font-size: 14pt; font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">#10. Consider a third-party Disaster Recovery-as-a-Service (DRaaS)<\/strong><\/span><\/h3>\n<p id=\"c08a\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">While it may be tempting to implement all steps of a disaster recovery plan in-house, smaller companies lacking a dedicated IT team find it easier to use a third-party solution. Disaster recovery-as-service companies help organizations to develop, implement, and maintain their DRPs, enabling them to focus on growing their businesses.<\/span><\/p>\n<h2 id=\"67c4\" class=\"io ip ek av iq ir is it iu iv iw ix iy iz ja jb jc jd je jf jg cf\"><span style=\"font-size: 24pt; font-family: BaiJamjuree-Regular, sans-serif;\">AWS Disaster Recovery Options<\/span><\/h2>\n<p id=\"fec7\" class=\"hq hr ek hs b ht jh hv hw hx ji hz ia ib jj id ie if jk ih ii ij jl il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Let\u2019s say you migrated to the cloud using the rehosting method and you use EC2 instances for your application. There are several ways to begin leveraging AWS functions to develop a DR plan:<\/span><\/p>\n<ul class=\"\">\n<li id=\"9f50\" class=\"hq hr ek hs b ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">EC2 EBS snapshots<\/strong>\u00a0\u2014 allow you to make incremental backups of an EBS volume.<\/span><\/li>\n<li id=\"d942\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">EC2 AMIs<\/strong>\u00a0\u2014 works similarly to an EBS snapshot, contains metadata for the EC2 instance, and allows the entire EC2 instance to be restored.<\/span><\/li>\n<li id=\"3e1c\" class=\"hq hr ek hs b ht jq hv hw hx jr hz ia ib js id ie if jt ih ii ij ju il im in jm jn jo cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong class=\"hs jp\">Lambda<\/strong>\u00a0\u2014 a serverless product that allows you to run code outside the application environment and at the same time access the AWS resources. You can use Lambda to automate tasks such as EBS snapshots.<\/span><\/li>\n<\/ul>\n<p id=\"5b44\" class=\"io ip ek av iq ir is it iu iv iw ix iy iz ja jb jc jd je jf jg cf\"><span style=\"font-size: 24pt;\"><strong><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Summary<\/span><\/strong><\/span><\/p>\n<p id=\"7d90\" class=\"hq hr ek hs b ht jh hv hw hx ji hz ia ib jj id ie if jk ih ii ij jl il im in ec cf\" data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">Developing and implementing a disaster recovery plan for AWS requires a certain degree of ingenuity since AWS does not offer its own DR solution. However, the platform enables users to build a customized DR solution by repurposing some of the platform\u2019s features and tools. In this article, I\u2019ve aimed to give you some tips and tools to develop your own disaster recovery plan leveraging AWS environment.<\/span><\/p>\n<p data-selectable-paragraph=\"\"><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\"><strong><span style=\"font-size: 24pt;\">Reference<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: BaiJamjuree-Regular, sans-serif;\">https:\/\/medium.com\/@eddies_47682\/10-tips-for-developing-an-aws-disaster-recovery-plan-a708f899a442<\/span><\/p>\n<h2 data-renderer-start-pos=\"2970\"><strong data-renderer-mark=\"true\">About VTI Cloud<\/strong><\/h2>\n<p data-renderer-start-pos=\"6835\"><strong data-renderer-mark=\"true\">VTI Cloud<\/strong>\u00a0is an\u00a0<a class=\"sc-iELTvK jHUAie\" title=\"https:\/\/vticloud.io\/news_events\/vti-cloud-chinh-thuc-tro-thanh-advanced-consulting-partner-cua-aws\/\" href=\"https:\/\/vticloud.io\/news_events\/vti-cloud-chinh-thuc-tro-thanh-advanced-consulting-partner-cua-aws\/\" data-renderer-mark=\"true\">Advanced Consulting Partner<\/a>\u00a0of AWS Vietnam with a team of over 50+ AWS certified solution engineers. With the desire to support customers in the journey of digital transformation and migration to the AWS cloud, VTI Cloud is proud to be a pioneer in consulting solutions, developing software, and deploying AWS infrastructure to customers<strong data-renderer-mark=\"true\">\u00a0in Vietnam<\/strong>\u00a0<strong data-renderer-mark=\"true\">and Japan.<\/strong><\/p>\n<p data-renderer-start-pos=\"7217\">Building safe, high-performance, flexible, and cost-effective architectures for customers is\u00a0<strong data-renderer-mark=\"true\">VTI Cloud\u2019s<\/strong>\u00a0leading mission in enterprise technology mission.<\/p>\n<p>In addition, VTI Cloud supports building<strong>\u00a0VIET-AWS<\/strong>\u00a0community. This group is one of the fast-growing\u00a0<a href=\"https:\/\/aws.amazon.com\/developer\/community\/usergroups\/asia-pacific\/\">AWS User Group<\/a>s\u00a0and officially recognized by Amazon in the Asia Pacific (Vietnam) region.<\/p>\n<p><strong>VIET-AWS<\/strong>\u00a0is a place to connect and exchange support between Solutions Architect, DevOps, SysOps, and budding students with cloud computing services of Amazon Web Services (AWS). Join VTI Cloud to join VIET-AWS:\u00a0<a href=\"https:\/\/www.facebook.com\/groups\/vietawscommunity\">https:\/\/www.facebook.com\/groups\/vietawscommunity<\/a><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Even a minimal interruption of service can mean disaster for an organization, implying thousands of dollars in data loss. A disaster can be caused by a security attack, a natural disaster or human error. Business continuity is critical for any company in the cloud. A solid disaster recovery plan help organizations stay up in the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":651,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[85,86,87],"_links":{"self":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/537"}],"collection":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/comments?post=537"}],"version-history":[{"count":1,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/537\/revisions"}],"predecessor-version":[{"id":3130,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/537\/revisions\/3130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media\/651"}],"wp:attachment":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media?parent=537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/categories?post=537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/tags?post=537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}