AWS Partner Network (APN) Blog

AWS Admin

Author: AWS Admin

Amazon Web Services

Cloudwiry_AWS Solutions

Increasing Savings and Mitigating Risks with Amazon EC2 Convertible Reserved Instances

When managing AWS spending, you want to mitigate risks and costs wherever possible. One way to do this is to increase your coverage of Amazon EC2 Reserved Instances, which can result in significant discounts and increased savings. However, constantly improving technology and the evolving needs of your company can render your committed Reserved Instances obsolete. Cloudwiry’s cost management platform specializes in this cost-recovery practice by optimizing Reserved Instance coverage for ROI.

Read More
AWS Partner Network

Promoting Your Capabilities and Driving Demand with the APN Partner Pipeline Builder Framework

AWS is committed to supporting APN Partners’ go-to-market (GTM) strategies and drive demand for their services and solutions. The new APN Partner Pipeline Builder Framework will help APN Partners build new, or enhance existing, processes that support sales pipeline development. This framework acts as a key resource to help APN Partners build GTM plans that aid in the development of their AWS-focused services or solutions.

Read More

Deploying a High-Volume Application on AWS with Kubernetes

Learn how Mission Cloud Services helped Your Call Football (YCF) scale their application by building out the infrastructure as code, determining the right instance type for the job, prepping the load balancers, and employing Amazon EKS. By leveraging Kubernetes to optimize the speed and performance of YCF’s cloud environment, the app successfully provides thousands of football fans with a fun, unique, and issue-free gaming experience—all in real-time.

Read More
KernelCare-Logo-1

Live Patching Linux Kernel Vulnerabilities with AWS and KernelCare

Automatic software patching is not yet seen as a security benefit, even though out-of-date software is the cause of many recent cybersecurity failures. As companies and their staff become more security-aware and, in some cases, legally accountable for security breaches, system administrators are starting to see automated Linux kernel live patching as the missing link in their system security profiles. Despite the disadvantages, a system with live patching is safer than one without.

Read More
DevOps-2

Calculating SaaS Cost Per Tenant: A PoC Implementation in an AWS Kubernetes Environment

In a SaaS environment, the compute, storage, and bandwidth resources are often shared among tenants, but this makes it challenging to deduce per tenant cost. A SaaS application running on a Kubernetes cluster on AWS adds a layer of further complexity as far as calculating the per tenant cost. Kubernetes is great at abstracting away the underlying pool of hardware. It almost gives us an illusion of having access to a single large compute resource.

Read More
Heimdall Data_AWS Solutions

Improving Application Performance with No Code Changes Using Heimdall’s Database Proxy for Amazon Redshift

Rewriting an application code for performance optimization generally requires a significant amount of effort. Also, IT and development groups using third-party applications like Tableau may not have access to the application code. Heimdall’s database proxy solution offers a flexible and cost-effective alternative to rewriting your application for performance and scale. Heimdall transparently provides SQL control and visibility to the application owner without (re)writing a single line of code.

Read More
AWS Security

Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage

DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.

Read More
Security-8

How to Benchmark and Prioritize Security Threats in Amazon GuardDuty Using Sumo Logic

Users looking for enhanced security operations within their AWS environment can utilize Sumo Logic Global Intelligent Service (GIS) for Amazon GuardDuty. This solution allows organizations to separate the signal from the noise within your security alerts, helping to more accurately pinpoint investigations and resources. This comparison data allows companies to bolster their security efforts by proactively identifying and remediating threats.

Read More

Driving Continuous Security and Configuration Checks for Amazon EKS with Alcide Advisor

The inherent complexities for running cloud-native applications such as Kubernetes, especially in a multi-cluster environment, are growing. Alcide Advisor creates a snapshot of your cluster’s security and compliance posture with actionable recommendations to ensure no security drifts are detected only in runtime. Alcide Advisor allows DevOps and security teams to discover misplaced secrets or secret access, identify Kubernetes vulnerabilities and perform Amazon EKS cluster checks.

Read More
AWS Marketplace-2

Enhancing AWS Marketplace Reporting with Tackle.io and Commerce Analytics Service

For AWS Marketplace Sellers, your sales operations, finance, and marketing teams all need to carefully consider how sales originating from AWS Marketplace might affect existing processes. AWS Marketplace Commerce Analytics Service allows you to programmatically access sales data from AWS Marketplace. This post describes how Tackle.io developed an innovative solution using the AWS Fargate compute engine to make Commerce Analytics Service data more accessible for business owners.

Read More