AWS Architecture Blog

Category: Compute

architecture for the solution

Real-Time In-Stream Inference with AWS Kinesis, SageMaker, & Apache Flink

As businesses race to digitally transform, the challenge is to cope with the amount of data, and the value of that data diminishes over time. The challenge is to analyze, learn, and infer from real-time data to predict future states, as well as to detect anomalies and get accurate results. In this blog post, we’ll […]

Figure 1 - Architecture, AWS Amplify Console

Serving Content Using a Fully Managed Reverse Proxy Architecture in AWS

With the trends to autonomous teams and microservice style architectures, web frontend tiers are challenged to become more flexible and integrate different components with independent architectures and technology stacks. Two scenarios are prominent: Micro-Frontends, where there is a single page application and components within this page are owned by different teams Web portals, where there […]

Field Notes: Setting Up Disaster Recovery in a Different Seismic Zone Using AWS Outposts

Recovering your mission-critical workloads from outages is essential for business continuity and providing services to customers with little or no interruption. That’s why many customers replicate their mission-critical workloads in multiple places using a Disaster Recovery (DR) strategy suited for their needs. With AWS, a customer can achieve this by deploying multi Availability Zone High-Availability […]

SIH: Emvironment in AWS Cloud-2

Fast and Cost-Effective Image Manipulation with Serverless Image Handler

As a modern company, you most likely have both a web-based and mobile app platform to provide content to customers who view it on a range of devices. This means you need to store multiple versions of images, depending on the device. The resulting image management can be a headache as it can be expensive […]

Snowflake logo

Snowflake: Running Millions of Simulation Tests with Amazon EKS

This post was co-written with Brian Nutt, Senior Software Engineer and Kao Makino, Principal Performance Engineer, both at Snowflake. Transactional databases are a key component of any production system. Maintaining data integrity while rows are read and written at a massive scale is a major technical challenge for these types of databases. To ensure their […]

Figure 1: Architecture of the infrastructure (for Amazon ECS)

Field Notes: Optimize your Java application for Amazon ECS with Quarkus

In this blog post, I show you an interesting approach to implement a Java-based application and compile it to a native image using Quarkus. This native image is the main application, which is containerized, and runs in an Amazon Elastic Container Service and Amazon Elastic Kubernetes Service cluster on AWS Fargate. Amazon ECS is a […]

Cow

The Satellite Ear Tag that is Changing Cattle Management

Most cattle are not raised in cities—they live on cattle stations, large open plains, and tracts of land largely unpopulated by humans. It’s hard to keep connected with the herd. Cattle don’t often carry their own mobile phones, and they don’t pay a mobile phone bill. Naturally, the areas in which cattle live, often do […]

WAF Solution Architecture

Field Notes: How to Identify and Block Fake Crawler Bots Using AWS WAF

In this blog post, we focus on how to identify fake bots using these AWS services: AWS WAF, Amazon Kinesis Data Firehose, Amazon S3 and AWS Lambda. We use fake Google/Bing bots to demonstrate, but the principles can be applied to other popular crawlers like Slurp Bot from Yahoo, DuckDuckBot from DuckDuckGo, Alexa crawler from […]

Scalable modular applications

Architecting for Reliable Scalability

Cloud solutions architects should ideally “build today with tomorrow in mind,” meaning their solutions need to cater to current scale requirements as well as the anticipated growth of the solution. This growth can be either the organic growth of a solution or it could be related to a merger and acquisition type of scenario, where […]

Raspberry PI

Field Notes: Integrating IoT and ITSM using AWS IoT Greengrass and AWS Secrets Manager – Part 2

In part 1 of this blog I introduced the need for organizations to securely connect thousands of IoT devices with many different systems in the hyperconnected world that exists today, and how that can be addressed using AWS IoT Greengrass and AWS Secrets Manager.  We walked through the creation of ServiceNow credentials in AWS Secrets […]