AWS Architecture Blog

Category: Amazon Simple Storage Service (S3)

Figure 1. Connect data streaming automation workflow

Automate Amazon Connect Data Streaming using AWS CDK

Many customers want to provision Amazon Web Services (AWS) cloud resources quickly and consistently with lifecycle management, by treating infrastructure as code (IaC). Commonly used services are AWS CloudFormation and HashiCorp Terraform. Currently, customers set up Amazon Connect data streaming manually, as the service is not available under CloudFormation resource types. Customers may want to […]

Figure 2. Control plane architecture

How Ribbon Built a Scalable, Resilient Robocall Mitigation Platform

Ribbon provides communications software, and IP and optical networking end-to-end solutions that deliver innovation, unparalleled scale, performance, and agility to service providers and enterprise. Ribbon is helping customers modernize their networks. In today’s data-hungry, 24/7 world, this equates to improved competitive positioning and business outcomes. Companies are migrating from on-premises equipment for telephony services and looking […]

Building an application with AWS multi-Region services using services covered in Part 1

Creating a Multi-Region Application with AWS Services – Part 2, Data and Replication

Data is at the center of stateful applications. Data consistency models will vary when choosing in-Region vs. multi-Region. In this post, part 2 of 3, we continue to filter through AWS services to focus on data-centric services with native features to help get your data where it needs to be in support of a multi-Region […]

Figure 4. High-level architecture pattern for discovering public IPs

Find Public IPs of Resources – Use AWS Config for Vulnerability Assessment

Systems vulnerability management is a key component of your enterprise security program. Its goal is to remediate OS, software, and applications vulnerabilities. Scanning tools can help identify and classify these vulnerabilities to keep the environment secure and compliant. Typically, vulnerability scanning tools operate from internal or external networks to discover and report vulnerabilities. For internal […]

Figure 2. Modernized queuing architecture using Amazon SQS

Modernized Database Queuing using Amazon SQS and AWS Services

This blog post was last reviewed/updated August, 2022. The updated version shown below is based on working backwards from a customer need to ensure data consistency post migration, to a modernized microservice architecture. A queuing system is composed of producers and consumers. A producer enqueues messages (writes messages to a database) and a consumer dequeues […]

Figure 2. Network Mapper scanner task workflow

Modernize your Penetration Testing Architecture on AWS Fargate

Organizations in all industries are innovating their application stack through modernization. Developers have found that modular architecture patterns, serverless operational models, and agile development processes provide great benefits. They offer faster innovation, reduced risk, and reduction in total cost of ownership. Security organizations must evolve and innovate as well. But security practitioners often find themselves […]

Multi-Region security, identity, and compliance services

Creating a Multi-Region Application with AWS Services – Part 1, Compute, Networking, and Security

Many AWS services have features to help you build and manage a multi-Region architecture, but identifying those capabilities across 200+ services can be overwhelming. In this 3-part blog series, we filter through those 200+ services and focus on those that have specific features to assist you in building multi-Region applications. In Part 1, we’ll build […]

Field Notes: Building On-Demand Disaster Recovery for IBM DB2 on AWS

With the increased adoption of critical applications running in the cloud, customers often find themselves revisiting traditional strategies that were adopted for on-premises workloads. When it comes to IBM DB2, one of the first decisions to make is to decide what backup and restore method will be used. In this blog post, we will show […]

Figure 1. PI Connector architecture

Ingesting PI Historian data to AWS Cloud using AWS IoT Greengrass and PI Web Services

In process manufacturing, it’s important to fetch real-time data from data historians to support decisions-based analytics. Most manufacturing use cases require real-time data for early identification and mitigation of manufacturing issues. A limited set of commercial off-the-shelf (COTS) tools integrate with OSIsoft’s PI Historian for real-time data. However, each integration requires months of development effort, […]

Figure 2. Extending the solution

Scale Up Language Detection with Amazon Comprehend and S3 Batch Operations

Organizations have been collecting text data for years. Text data can help you intelligently address a range of challenges, from customer experience to analytics. These mixed language, unstructured datasets can contain a wealth of information within business documents, emails, and webpages. If you’re able to process and interpret it, this information can provide insight that […]