AWS Partner Network (APN) Blog

Category: Management Tools

AWS-Config-Rules-1

Integrating Third-Party Solutions to AWS Config Rule Evaluations

AWS Config continuously monitors and records your AWS resource configurations, and allows you to automate the evaluation of recorded configurations against desired configurations. This post aims to assist you on deploying a set of custom AWS Config Rules that leverages third-party REST APIs to evaluate AWS resources in an automated fashion. The AWS Config evaluations represented in this guide show the reporting status of Amazon EC2 instances against TrendMicro and Qualys.

Monitoring Your Palo Alto Networks VM-Series Firewall with a Syslog Sidecar

By hosting a Palo Alto Networks VM-Series firewall in an Amazon VPC, you can use AWS native cloud services—such as Amazon CloudWatch, Amazon Kinesis Data Streams, and AWS Lambda—to monitor your firewall for changes in configuration. This post explains why that’s desirable and walks you through the steps required to do it. You now have a way to monitor your Palo Alto Networks firewall that is very similar to how you monitor your AWS environment with AWS Config.

How to Monitor Amazon CloudWatch Synthetics from Dynatrace

Amazon CloudWatch Synthetics monitors RESTful APIs, URLs, and website content endpoints via synthetic traffic. Dynatrace also offers powerful, integrated synthetic capabilities, but if you use both CloudWatch and Dynatrace you have to switch between their consoles to check status. Now, you can integrate CloudWatch Synthetics into Dynatrace and check for unexpected behavior across both platforms from a single dashboard in your Dynatrace account.

TCS-AWS-Partners-1

How TCS Cloud Exponence Monitors Security and Compliance Across AWS Accounts

The move to primarily cloud-based operations has pushed enterprises to prioritize digital security mechanisms and regulatory compliance controls to safeguard weaknesses and reduce effects of an attack. TCS Cloud Exponence is a multi-cloud operations solution with a focus on a range of critical security operations such as cloud perimeter monitoring, patch management, vulnerability assessment, compliance monitoring, alerting, and reporting.

How Gremlin’s Chaos Engineering Platform Validates AWS Operational Excellence and Reliability

Chaos engineering is the discipline of experimenting on a software system or service to build confidence in its capability to withstand turbulent and unexpected conditions. Its goal is to reveal weaknesses before they break. The AWS Well-Architected Review and chaos engineering go hand-in-hand, and Gremlin’s chaos engineering platform validates your service’s compliance with two pillars of the Well-Architected Framework: operational excellence and reliability.

Cloudsoft-AWS-Partners

Using Terraform to Manage AWS Programmable Infrastructures

Terraform and AWS CloudFormation allow you to express infrastructure resources as code and manage them programmatically. Each has its advantages, but some enterprises already have expertise in Terraform and prefer using it to manage their AWS resources. To accommodate that preference, CloudFormation allows you to use non-AWS resources to manage AWS infrastructure. Learn the steps to create a CloudFormation registry resource type for Terraform and deploy it as an AWS Service Catalog product.

Managing Red Hat Enterprise Linux Systems on AWS with Red Hat Insights

Red Hat Insights helps you manage Red Hat Enterprise Linux (RHEL) Systems on AWS by analyzing physical, virtual, container, and hybrid private and public cloud environments, comparing them to more than 1,000 rules. These rules identify potential threats that could lead to business disruptions. Insights scans your environments daily, summarizes any identified risks in its dashboard, and provides remediation steps for those risks.

Security-8

How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS services to create a pipeline that sends HSM audit logs into Splunk. You’ll also learn how to interpret the audit events and gain specific data insights that enable you to flag critical events taking place on the CloudHSM appliance.

AWS Marketplace-2

Listing Serverless Applications with Your Amazon Machine Images on AWS Marketplace

By using serverless applications alongside existing Amazon Machine Images, ISVs can provide customers with solutions that are easier to use, more elastic, and more scalable. AWS Marketplace recently announced a feature that enables sellers to publish solutions comprised of AMIs and serverless applications that customers can deploy AWS CloudFormation. This makes it easier for customers to deploy software solutions, rather than ISVs packaging AWS Lambda code into an AMI or referencing their own Amazon S3 bucket.

NETSCOUT_AWS-Solutions

Identifying and Resolving Application Performance in Hybrid Environments with NETSCOUT

By using NETSCOUT’s Application Management Solution available in AWS Marketplace, Forte Data Solutions was able to quickly resolve latency issues of web-based statistical applications. NETSCOUT helped the customer gain visibility into load, latency, errors, and dependencies of their application, quickly identify the root cause of latency issues, fix them, and thus eliminate hundreds of redundant daily CloudWatch Alarms.