AWS Marketplace

Category: Monitoring and observability

Automate multi account observability in AWS using Cribl and AWS Control Tower

Automate multi account observability in AWS using Cribl and AWS Control Tower

Having a multi-account strategy is a best practice to achieve higher isolation of resources. It also helps to meet regulatory and compliance needs, track operational costs, and add an extra layer of security. AWS Control Tower uses AWS best practices to establish a well-architected, multi-account baseline and also enables governance across your AWS accounts. Many […]

Read More
observability with moesif and AWS marketplace

How to gain API observability with Amazon API Gateway and Moesif in minutes

API observability, which consists of logging, monitoring, and tracing, is a form of direct observation of a system and requires an agent or SDK to passively log API traffic. This data collection can be done within the application or at different points, such as with an API gateway. API observability can provide your business and […]

Read More
dynatrace aws marketplace aws control tower diagram

Increasing observability in your AWS Control Tower landing zone with Dynatrace

AWS recommends that customers adopt a multi-account strategy as a best practice to achieve higher isolation of resources and help meet security, regulatory, and compliance needs. Customers must address questions around tracking their operational cost, identify security improvements, and ensure reliability and performance efficiency. Full-stack observability offers the troubleshooting tools needed, regardless of where problems […]

Read More
automate multi account permissions CloudKnox

Automate multi account permissions management in AWS using CloudKnox and AWS Control Tower

This blog post was written by Kanishk Mahajan, ISV Solutions Architecture Lead at AWS and guest author Maya Neelakandhan, Head of Customer Success at CloudKnox. Introduction Permissions management in AWS empowers security and cloud infrastructure teams to protect your cloud resources from misuse of identity permissions. Cloud security requires continuous enforcement of least-privilege policies across […]

Read More