AWS Storage Blog

Amazon S3 featured image - new

Optimizing performance of Apache Spark workloads on Amazon S3

This blog covers performance metrics, optimizations, and configuration tuning specific to OSS Spark running on Amazon EKS. For customers using or considering Amazon EMR on EKS, refer to the service documentation to get started and this blog post for the latest performance benchmark. Performance is top of mind for customers running streaming, extract transform load […]

Amazon FSx for OpenZFS

Sharing data on Amazon FSx for OpenZFS across Linux and Windows clients

Many organizations need a high-performance shared file system that they can access simultaneously from Linux and Windows, despite different permission models across the platforms. For example, a media and entertainment enterprise may render workloads mutually on Linux and Windows clients. These customers may use mechanisms like “User Mapping” to make sure that their Windows clients can […]

Amazon S3 featured image - new

Disabling Amazon S3 access control lists with S3 Inventory

Access control lists (ACLs) define user access and the operations users can take on specific resources. Amazon Simple Storage Service (Amazon S3) was launched in 2006 with ACLs as its first authorization mechanism. Since 2011, Amazon S3 has also supported AWS Identity and Access Management (IAM) policies for managing access to S3 buckets, and it recommends […]

AWS DataSync Featured Image 2020

Migrating DigitalOcean Spaces to Amazon S3 using AWS DataSync

Organizations may at times have to transfer large amounts of object data from one cloud service provider to another. There can be several reasons for this, including data consolidation, moving workloads, disaster recovery planning, or cost optimization efforts. Completing a successful migration requires several key elements, including full encryption of the data being transferred, the […]

AWS DataSync Featured Image 2020

Simplify multicloud data movement wherever data is stored with AWS DataSync

At AWS, we believe that customers get the best experience, performance, and cost when they choose to run their IT operations in the cloud. However, for a variety of reasons, some customers end up in a situation where they’re running their IT operations in a multicloud environment. For example, a customer might have acquired a […]

AWS Backup 2021 blog image

Introducing AWS Backup logically air-gapped vault

Update: AWS Backup announced the general availability of logically air-gapped vault on August 7, 2024. Please read the associated how-to blog. Data loss events from ransomware or account compromise remain a top concern for customers. One customer need during a service restore is sharing recovery points stored in AWS Backup with other accounts, including cross […]

Amazon S3 Glacier Storage Classes

Reduce recovery time and optimize storage costs with faster restores from Amazon S3 Glacier storage classes and Commvault

Data is the lifeblood of any modern business. Organizations are storing more copies of their application data than ever before to recover from data loss, repair data corruption or ransomware damage, respond to compliance requests, and become more data driven. Storing more data at reduced cost enables businesses to extract more value and insights to […]

Authorize NFS clients outside of AWS with AWS IAM Roles Anywhere

Securely storing and authorizing access to data in the cloud is a top priority. One challenge faced by organizations is developing a consistent authorization experience to grant access to data for hybrid architectures. Workloads running on AWS can access data stored on services like Amazon Elastic File System (Amazon EFS) using AWS Identity and Access […]

AWS Transfer Family Featured Image

Detect malware threats using AWS Transfer Family

Securely sharing files over SFTP, FTP, and FTPS is a staple within many business-to-business (B2B) workflows. Across industries, companies use file transfer to transmit inventory, invoice, and compliance information. It is critical for companies to make sure that shared files do not have any malicious content that could compromise their systems. Guaranteeing the shared files […]