Networking & Content Delivery
Category: Networking & Content Delivery
Integrating AWS Verified Access with device trust providers
In this post, we discuss how to architect Zero Trust based remote connectivity on AWS. Specifically, we will be exploring how to integrate Verified Access with CrowdStrike, a device trust provider. This solution builds upon the Okta-based identity provider integration previously published in this AWS post. Zero Trust is a conceptual model, and an associated […]
Deploying hybrid networks using AWS Cloud WAN and AWS Direct Connect
AWS Cloud WAN is a managed wide-area networking (WAN) service for building, managing, and monitoring a unified global network, as well as connecting resources running across your cloud and on-premises environments. We work with many customers to build hybrid networks that connect their on-premises environments to Cloud WAN using AWS Direct Connect. This extends their […]
Set up end-to-end tracing with Amazon CloudFront using OpenTelemetry
In a modern distributed system, identifying where a problem has occurred is not a trivial task. In fact, it’s a key capability that an organization must master to maintain its competitiveness. Tracing is a great methodology to be used for this purpose. It creates a series of formatted logs with an identifier called Trace ID, which […]
Removing Unassociated Elastic IPs
Have you ever wondered why your Elastic IP (EIP) count is growing, and what’s behind the “ElasticIP:IdleAddress” line item on your AWS bill? This could be because there is an hourly charge for EIP addresses that are not associated with a running instance, when an EIP is associated with a stopped instance, or when there […]
Improving Performance on AWS and Hybrid Networks
In this post, we provide recommendations to improve network performance on AWS and hybrid networks. In today’s enterprise networking environment, it is becoming common for customers to have multi-gigabit connectivity to AWS either through AWS Direct Connect or over the Internet. Although network bandwidth is fundamental, several other factors come into play for network performance, […]
Using AWS WAF intelligent threat mitigations with cross-origin API access
AWS WAF offers advanced features for filtering undesired web application traffic, such as Bot Control and Fraud Control. These intelligent threat mitigations include techniques such as client-side interrogations using JavaScript challenges or CAPTCHA, as well as client-side behavioral analysis. Implementing these techniques on a web page with a same-origin access is simple. When a cross-domain […]
External Connectivity to Amazon VPC Lattice
In this blog post, we discuss how to connect on-premises and external services to Amazon VPC Lattice. We will go over architectural considerations and requirements for connecting services from trusted locations (on-premises), non-trusted locations (3rd party), and across AWS Regions. Then, we provide a solution that builds out a capability to facilitate this using AWS […]
Ataccama: Building our global network with AWS Cloud WAN
Ataccama is a global software company with a unified platform for automating data quality, MDM, and metadata management – Ataccama ONE. We specialize in complex enterprise data governance solutions that provide sustainable, long-term value. At Ataccama, we migrated our global wide area network to AWS Cloud WAN to simplify configuration and management. In this post, […]
Segmenting hybrid networks with AWS Transit Gateway connect
Virtual Routing and Forwarding (VRF) is a traditional network feature which uses isolated logical routing domains (route tables/VRFs) to keep network traffic separated within the same physical infrastructure. Customers ask us how to combine the segmentation provided by AWS Cloud WAN and AWS Transit Gateway with VRF isolation when connecting their on-premises networks to AWS. […]
Using load balancer target group health thresholds to improve availability
Introduction AWS recently added features to our Elastic Load Balancers (ELB) that give you control over when they take measures to shift traffic between targets. In this blog, we will explore these new capabilities and review how you can use them to improve the availability and resiliency of your applications. Two types of Elastic Load […]