AWS Storage Blog
Amazon Elastic Block Store at 15 Years
Just after joining Amazon Web Services in 2009, I met with Andrew Certain, at that time a senior engineer on the Amazon Elastic Block Store (Amazon EBS) team, to get into the details on how EBS was implemented and what plans were looking forward. Andrew took me through the details of this remote block storage […]
Optimizing performance of Apache Spark workloads on Amazon S3
This blog covers performance metrics, optimizations, and configuration tuning specific to OSS Spark running on Amazon EKS. For customers using or considering Amazon EMR on EKS, refer to the service documentation to get started and this blog post for the latest performance benchmark. Performance is top of mind for customers running streaming, extract transform load […]
Sharing data on Amazon FSx for OpenZFS across Linux and Windows clients
Many organizations need a high-performance shared file system that they can access simultaneously from Linux and Windows, despite different permission models across the platforms. For example, a media and entertainment enterprise may render workloads mutually on Linux and Windows clients. These customers may use mechanisms like “User Mapping” to make sure that their Windows clients can […]
Disabling Amazon S3 access control lists with S3 Inventory
Access control lists (ACLs) define user access and the operations users can take on specific resources. Amazon Simple Storage Service (Amazon S3) was launched in 2006 with ACLs as its first authorization mechanism. Since 2011, Amazon S3 has also supported AWS Identity and Access Management (IAM) policies for managing access to S3 buckets, and it recommends […]
Migrating DigitalOcean Spaces to Amazon S3 using AWS DataSync
Organizations may at times have to transfer large amounts of object data from one cloud service provider to another. There can be several reasons for this, including data consolidation, moving workloads, disaster recovery planning, or cost optimization efforts. Completing a successful migration requires several key elements, including full encryption of the data being transferred, the […]
Simplify multicloud data movement wherever data is stored with AWS DataSync
At AWS, we believe that customers get the best experience, performance, and cost when they choose to run their IT operations in the cloud. However, for a variety of reasons, some customers end up in a situation where they’re running their IT operations in a multicloud environment. For example, a customer might have acquired a […]
Introducing AWS Backup logically air-gapped vault
Update: AWS Backup announced the general availability of logically air-gapped vault on August 7, 2024. Please read the associated how-to blog. Data loss events from ransomware or account compromise remain a top concern for customers. One customer need during a service restore is sharing recovery points stored in AWS Backup with other accounts, including cross […]
Reduce recovery time and optimize storage costs with faster restores from Amazon S3 Glacier storage classes and Commvault
Data is the lifeblood of any modern business. Organizations are storing more copies of their application data than ever before to recover from data loss, repair data corruption or ransomware damage, respond to compliance requests, and become more data driven. Storing more data at reduced cost enables businesses to extract more value and insights to […]
Authorize NFS clients outside of AWS with AWS IAM Roles Anywhere
Securely storing and authorizing access to data in the cloud is a top priority. One challenge faced by organizations is developing a consistent authorization experience to grant access to data for hybrid architectures. Workloads running on AWS can access data stored on services like Amazon Elastic File System (Amazon EFS) using AWS Identity and Access […]
Detect malware threats using AWS Transfer Family
Securely sharing files over SFTP, FTP, and FTPS is a staple within many business-to-business (B2B) workflows. Across industries, companies use file transfer to transmit inventory, invoice, and compliance information. It is critical for companies to make sure that shared files do not have any malicious content that could compromise their systems. Guaranteeing the shared files […]