AWS Partner Network (APN) Blog
Category: Compute
Implementing Zero-Trust Workload Security on Amazon EKS with Calico
Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.
Building Serverless SaaS Microservices with AWS Lambda Layers
Building multi-tenant systems can represent a major effort for some teams. This post focuses on introducing strategies that allow developers to write their day-to-day code without having to think about how tenancy might influence their implementation. AWS Lambda Layers allow SaaS architects to centralize tenant-aware libraries without impacting the size or load-time of your application’s functions.
How Tech Mahindra’s InfoWise Accelerates the AWS Cloud Journey Through Data Modernization
Lack of a modernization strategy can result in unwanted downtime, excess investment, poor quality service, and dead-weight assets into the modernized platform. This post talks about how InfoWise, a Tech Mahindra solution, accelerates the first two stages of the cloud data migration and modernization journey: search and discover and plan and strategy. InfoWise also helps recommend the migration priority by running various dependency intelligence across all the metadata objects.
Build and Deploy a Secure Container Image with AWS and Snyk
Learn how to build a Java application in a Docker container and push the container image to Amazon ECR orchestrated by AWS CodePipeline. We’ll use Snyk to scan your code, build a container image, and display the results in both Snyk and Amazon ECR. We’ll also show you how Amazon Inspector utilizes Snyk open source to provide insight into your software security vulnerabilities. All of this functionality is available from the AWS Management Console.
Deploy Accelerated ML Models to Amazon Elastic Kubernetes Service Using OctoML CLI
Deploying machine learning (ML) models as a packaged container with hardware-optimized acceleration, without compromising accuracy and while being financially feasible, can be challenging. As machine learning models become the brains of modern applications, developers need a simpler way to deploy trained ML models to live endpoints for inference. This post explores how a ML engineer can take a trained model, optimize and containerize the model using OctoML CLI, and deploy it to Amazon EKS.
How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance
Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.
Future Proof Cost Optimization with Attribute-Based Instance Type Selection and Amazon EC2 Spot
As part of its SaaS platform, Druva runs containerized applications with microservices architecture using Auto Scaling groups and Amazon Amazon ECS. Explore the cost optimization journey of Druva using Spot instances with Auto Scaling groups, challenges faced by them during this journey, and how attribute-based instance type selection (ABS) came to the rescue in addressing those challenges in optimizing costs.
Data Warehousing and Business Intelligence for VMware Cloud on AWS
One of the biggest advantages of VMware Cloud on AWS is that it can readily integrate with other AWS services. That gives you countless ways to elevate your workloads. If you’re amassing data in your databases over time and are looking for novel ways to glean fresh insights out of it, using Amazon Redshift and Amazon QuickSight is an easy and accessible way to achieve it. This post describes how to get more out of existing data residing inside your databases running in VMware Cloud on AWS.
Adding F5 BIG-IP Virtual Edition Load Balancing for Container Network Functions in Amazon EKS
The F5 BIG-IP Virtual Edition (VE) load balancer deployment adds new Layer 4 application capabilities and added visibility to those applications inside an Amazon EKS cluster to ensure a successful deployment in a containerized environment. This post presents a step-by-step guide for using the F5 BIG-IP VE on AWS as a load balancer for EKS clusters by using additional components, including the F5 Container Ingress Service (CIS) and F5 IPAM Controller (FIC).
Manage Multi-Tenant Remote Access with Cisco Secure Firewall Cloud Native on Amazon EKS
Cisco Secure Firewall Cloud Native (SFCN) is a lightweight network firewall in a cloud-native form factor. Offering granular control and massive throughput potential, SFCN enables security at the speed of business. It offers an easy way to deploy scalable remote access VPN architecture as its primary use case. The solution utilizes Amazon Amazon EKS and other cloud-native services including Amazon ElastiCache for Redis and Amazon Amazon EFS.