Host Commentary

This week’s episode really came together around one idea: the platform layer keeps absorbing work teams used to treat as background plumbing. AWS Interconnect going generally available is a good example of that. AWS is taking private connectivity, both multicloud and last mile, and trying to make it feel more like a managed cloud primitive than a long networking project full of vendor handoffs and waiting. That is a real shift in expectation, especially when AWS is openly positioning it around simpler private connectivity and faster deployment through partners like Lumen. (Amazon Web Services, Inc.)

Cloudflare Mesh feels like the same trend from a different angle. What stood out to me there is not just “private networking, but newer.” It is that Cloudflare is explicitly saying the private network now needs to work for users, nodes, Workers, and autonomous AI agents on the same fabric. That is a much more modern framing of what the client even is. Private access is not just about humans on laptops anymore. It is about workloads and semi-autonomous systems reaching private APIs and databases with policy wrapped around them from the start. (The Cloudflare Blog)

GitLab 19.0 is where that broader theme turns into migration pressure. This is the kind of story platform teams actually feel in real life. GitLab is moving Self-Managed Helm installs away from bundled NGINX Ingress and toward Gateway API with Envoy Gateway by default because NGINX Ingress reached end-of-life in March 2026. On top of that, GitLab is also removing bundled PostgreSQL, Redis, and MinIO from the Helm chart path. That is not flashy, but it is exactly how platforms grow up. Old convenience defaults get harder to justify, and eventually they stop being the road forward. (about.gitlab.com)

AWS is making a similar argument with EKS Auto Mode networking, just from the managed-cloud side. The message there is basically that cluster networking should stop feeling so handmade for teams that do not actually want to own every knob. AWS says Auto Mode sets up the VPC CNI automatically, gives pods VPC IPs directly, keeps traffic on normal VPC route tables, and handles networking components like DNS caching and load balancing more natively. That will not be everybody’s preferred trade, but it is definitely AWS pushing the idea that a lot of cluster networking glue should become provider-owned instead of half-owned by stressed platform teams. (Amazon Web Services, Inc.)

And then OpenTelemetry declarative config is the quieter version of the same story. It is not as headline-friendly as cloud networking or GitLab breaking changes, but it might age really well. Key parts of the declarative config spec are now stable, including the schema, YAML representation, parsing model, and OTEL_CONFIG_FILE. That is the kind of boring progress that usually matters a lot later, because it pushes observability setup toward something more consistent across languages and environments instead of every team reinventing its own telemetry setup philosophy. (OpenTelemetry)

So my takeaway from this week is pretty simple. A lot of teams say they want less toil and safer defaults, but they also want to keep every escape hatch they have gotten used to over the years. The industry does not always let you keep both. Sometimes the platform just moves on. Private connectivity becomes a managed service. Ingress migrations stop being optional. Cluster networking gets more opinionated. Config standards finally harden. That can feel like relief or loss of control depending on where you sit, but either way it is usually a sign that the default architecture is changing underneath you. (Amazon Web Services, Inc.)

Show Notes

This episode of Ship It Weekly is about networking, ingress, and private access moving further up into the platform layer. Brian covers AWS Interconnect going generally available, Cloudflare Mesh, GitLab 19.0 breaking changes around Gateway API and bundled services, EKS Auto Mode networking, and OpenTelemetry declarative config reaching stability. He also hits containerd security patches, GitHub’s new Code Security risk assessment, and AWS guidance on securing AI agents with MCP. (Amazon Web Services, Inc.)

Links

AWS Interconnect GA and last mile connectivity https://aws.amazon.com/blogs/aws/aws-interconnect-is-now-generally-available-with-a-new-option-to-simplify-last-mile-connectivity/

Cloudflare Mesh https://blog.cloudflare.com/mesh/

GitLab 19.0 breaking changes https://about.gitlab.com/blog/a-guide-to-the-breaking-changes-in-gitlab-19-0/

EKS Auto Mode networking https://aws.amazon.com/blogs/containers/navigating-enterprise-networking-challenges-with-amazon-eks-auto-mode/

OpenTelemetry declarative config reaches stability https://opentelemetry.io/blog/2026/stable-declarative-config/

containerd security releases https://github.com/containerd/containerd/releases

GitHub Code Security risk assessment for organizations https://github.blog/changelog/2026-04-08-code-security-risk-assessment-available-for-organizations/

AWS secure AI agent access patterns using MCP https://aws.amazon.com/blogs/security/secure-ai-agent-access-patterns-to-aws-resources-using-model-context-protocol/

This week’s On Call Brief https://www.tellerstech.com/on-call-brief/2026-W16/

More episodes and show notes https://shipitweekly.fm/