AWS Cloud Operations Blog
Getting started with myApplications for Terraform-managed applications
AWS customers often operate hundreds of applications and have to monitor and manage individual resources to make sure their applications are available, secure, cost-optimized, and performing optimally. In this blog post, we will walk through how to use Terraform to create an application for use with myApplications, add resources to new and existing applications, and strategies for scaling application management using Terraform.
Event Driven Architecture using Amazon EventBridge – Part 2
This post is co-authored with Andy Suarez and Kevin Breton (from KnowBe4). This blog post continues the discussion from Event-Driven Architecture using Amazon EventBridge – Part 1. The previous post covered the adoption and design of an event-driven architecture by KnowBe4, a leading security awareness training provider. In this post, we highlight the development and […]
Assess secure Windows Servers for TCO analysis using Migration Evaluator
Summary In this blog post, we explore an approach that leverages Windows operating system tools to extract critical metric data directly from Windows Servers. At Amazon Web Services (AWS), we offer the Migration Evaluator agentless collector and AWS Application Discovery Service to facilitate workload discovery. However, some customers run highly secure workloads where deploying assessment tools, enabling […]
Centralize observability with Amazon Managed Grafana Enterprise plugins
Observability is a critical aspect for maintaining the health and performance of any distributed system. Organizations rely on data from diverse sources, including AWS services as well as third-party ISVs (independent software vendor) to gain insights into their system’s health. Establishing secure connections to these diverse data sources enables visualization and analysis of observability data […]
Using Permissions to Unlock Resilience with AWS Resilience Hub
AWS customers come to AWS Resilience Hub for the ability to assess their application against their Recovery Time Objectives (RTO), the maximum acceptable time an application can be in a disrupted state, and Recovery Point Objectives (RPO), the maximum amount of data that can be lost due to disruption. Although customers come for the assessment […]
Understanding AWS High Availability and Replication for vSphere Administrators
Introduction vSphere HA is a fundamental and frequently used feature of vSphere. If any of several failure scenarios occur, it restarts a virtual machine. The failure scenarios range from VM or host crashes to unresponsive hosts (for example, due to network isolation or outage). Translating vSphere High Availability (HA) to the public cloud can be […]
Configuring machine to machine Authentication with Amazon Cognito and Amazon API Gateway – Part 2
This blog is the second part to a 2 part series on how to secure your Amazon API Gateway with Amazon Cognito, in machine to machine (M2M) communication use cases. In the previous blog post, we dove deep into the different use cases involving M2M communication and how it contributes to business modernization, and why […]
Configuring machine to machine Authentication with Amazon Cognito and Amazon API Gateway – Part 1
Introduction When we think about modernization, we’re used to think about the process of breaking down a monolithic application, or moving to a microservices architecture. But let’s think for a moment on the business side. For example, think about the challenges and risks involved in moving information over phone calls or emails. We want to […]
Empowering Manufacturing Innovation: How AI & GenAI Centers of Excellence can drive Modernization
Introduction Technologies such as machine learning (ML), artificial intelligence (AI), and Generative AI (GenAI) unlock a new era of efficient and sustainable manufacturing while empowering the workforce. Areas where AI can be applied in manufacturing include predictive maintenance, defect detection, supply chain visibility, demand forecasting, product design, and many more. Benefits include improving uptime and […]
Optimize your cloud deployments with Prioritized Trusted Advisor recommendations in your operational workflows
AWS Trusted Advisor Priority helps you focus on the most important recommendations for optimizing your cloud deployments, improving resilience, and addressing security gaps. As an AWS Enterprise Support customer, you gain access to prioritized and context-driven recommendations, curated both by your AWS account team and machine-generated checks from AWS services. Note: AWS Trusted Advisor Priority […]