AWS Partner Network (APN) Blog
Category: Technical How-to
How to Use Matillion Data Loader for Batch Loading Data to Amazon Redshift Serverless
Amazon Redshift Serverless makes it easier to run and scale analytics without the burden of managing infrastructure. Learn how you can use Matillion Data Loader to extract data from source systems and load it to Amazon Redshift Serverless without having to worry about coding or managing infrastructure. Matillion Data Loader enables organizations that have data coming in from an ever-increasing number of sources and need faster, simpler access to insights and analytics.
Automate AWS Architecture Reviews Using CloudCheckr’s Well-Architected Readiness Advisor
SMBs with limited resources are often challenged with time and resource constraints to perform AWS Well-Architected Reviews on a regular basis. CloudCheckr CMx gives you the visibility and intelligence you need to lower costs, maintain security and compliance, and optimize resources in single or multi-cloud infrastructure. CloudCheckr’s Well-Architected Readiness Advisor report leverages the AWS Well-Architected Tool to map CloudCheckr’s best practice checks to the 6 pillars of AWS Well-Architected.
DXC Technology Enables End-to-End Tracing for Microservice Architecture Using AWS X-Ray
When a DXC Technology customer wanted a complete view of requests traveling through an application so they could compare trace sets with different conditions, DXC deployed distributed tracing using AWS X-Ray. This helped monitor and debug distributed applications within the workflow to aid in swift identification of performance issues or errors. Explore the solution’s reference architecture and follow a step-by-step how to enable AWS X-Ray for different AWS products.
SaaS Data Isolation with Dynamic Credentials Using HashiCorp Vault in Amazon EKS
Tenant data isolation is a core SaaS concept, verifying that tenant resources remain in isolated environments. There are a number of ways to achieve this isolation, and one common approach is to use a token vending machine that issues tenant-scoped credentials at runtime. Explore an alternate approach to vending tokens that uses Amazon EKS and open-source HashiCorp Vault, simplifying access to the credentials and streamlining the overall management of tenant-scoped policies.
Using OpsWatch to Create a Single Pane of Prometheus Metrics from Multiple Non-Native Sources
Prometheus is an open-source systems monitoring and alerting toolkit which many companies and organizations have adopted. OpsWatch from Arvato Systems helps to bridge the gap between Prometheus native and non-native Amazon CloudWatch metrics and Amazon GuardDuty events. OpsWatch does this by consuming metrics, transforming and enriching them. They can be displayed in dashboards and/or trigger alerts. This gives the operator a single pane of Prometheus with powerful monitoring capabilities.
Building a Solution for China Cross-Border VPC Connection
Many customers want to connect commercial regions to the China regions, but China’s compliance and infrastructure requirements are different than other countries. It requires isolation between VPCs in the China regions and VPCs in the other global regions. Learn about a solution that enables cross-border connectivity between six AWS commercial regions and China regions using a third-party marketplace solution that relies on AWS Direct Connect partners.
Best Practices from Innovative Solutions for Migrating Databases in AWS Amplify Deployments
Learn how to implement database software development lifecycle (SDLC) automation when leveraging the AWS Amplify framework to quickly create a three-tier web application following cloud engineering best practices. This approach from AWS Premier Partner Innovative Solutions leverages the AWS Code suite coupled with the Amplify CLI to integrate database migrations against an Aurora Serverless V1 PostgreSQL cluster with deployment of an Amplify project.
Implementing a True Passwordless Authentication with Amazon Cognito and Transmit Security
Learn how AWS customers can use Amazon Cognito for their application authentication and leverage Transmit Security to provide end users with a passwordless authentication experience. Amazon Cognito lets you easily add user sign-up and authentication to your mobile and web apps. Transmit Security is an AWS Partner that provides advanced authentication and risk management solutions to the largest enterprises in the world.
Using HashiCorp Consul Service Mesh with AWS Lambda
As companies grow, they often find themselves needing to migrate applications to new architectures that fit their needs. HashiCorp Consul is a service networking solution to automate network configurations, discover services, and enable secure connectivity across any cloud or runtime. With Consul, you can control traffic to and from services across different platforms from a single interface. In this post, explore a solution for routing service request from Amazon ECS to AWS Lambda using Consul.
Read/Write Capability Enhancements in Amazon Aurora with Apache ShardingSphere-Proxy
Learn how to use ShardingSphere-Proxy to build database clusters, covering aspects such as sharding, read/write splitting, and dynamic configuration. Apache ShardingSphere is an ecosystem of open-source distributed database solutions, including JDBC and Proxy products, which can be deployed either independently or in combination. The commercial edition provides additional data security and data sharding features from AWS Partner SphereEx.