AWS Compute Blog

CDK construct library for the serverless LAMP stack

Introducing the CDK construct library for the serverless LAMP stack

Update: The complete blog series and supporting GitHub repository is now available: Part 1: Introducing the new Serverless LAMP stack Part 2: Scaling relational databases Part 3: Replacing the web server Part 4: Building a serverless Laravel application Part 5: The CDK construct library for the serverless LAMP stack Part 6: From MVC to serverless […]

Migrating AWS Lambda functions to Amazon Linux 2

July 26, 2023 update: Information in this post has been superseded by Migrating AWS Lambda functions from the Go1.x runtime to the custom runtime on Amazon Linux 2. You can now use the latest version of any of the AWS Lambda runtimes on Amazon Linux 2 (AL2). End-of-life of standard support for Amazon Linux (AL1 […]

ICYMI: Season one of Sessions with SAM

February 12, 2024: Amazon Kinesis Data Firehose has been renamed to Amazon Data Firehose. Read the AWS What’s New post to learn more. Developers tell us they want to know how to easily build and manage their serverless applications. In 2017 AWS announced AWS Serverless Application Model (SAM) to help with just that. To help […]

AWS Lambda service VPC with VPC-to-VPT NAT to customer VPC

Using AWS Lambda IAM condition keys for VPC settings

You can now control the Amazon Virtual Private Cloud (VPC) settings for your AWS Lambda functions using AWS Identity and Access Management (IAM) condition keys. IAM condition keys enable you to further refine the conditions under which an IAM policy statement applies. You can use the new condition keys in IAM policies when granting permissions […]

A screenshot of the frontend application running in a desktop browser.

Building a Pulse Oximetry tracker using AWS Amplify and AWS serverless

This guide demonstrates an example solution for collecting, tracking, and sharing pulse oximetry data for multiple users. It’s built using AWS serverless technologies, enabling reliable scalability and security. The frontend application is written in VueJS and uses the Amplify Framework. It takes oxygen saturation measurements as manual input or a BerryMed pulse oximeter connected to […]

TensorFlow Serving on Kubernetes with Amazon EC2 Spot Instances

This post is contributed by Kinnar Sen – Sr. Specialist Solutions Architect, EC2 Spot TensorFlow (TF) is a popular choice for machine learning research and application development. It’s a machine learning (ML) platform, which is used to build (train) and deploy (serve) machine learning models. TF Serving is a part of TF framework and is […]

architecture of the wavelength zone

Deploying your first 5G enabled application with AWS Wavelength

This post was written by Mike Coleman, Senior Developer Advocate, Twitter handle: @mikegcoleman Today, AWS released AWS Wavelength. Wavelength allows you to deploy applications and services at the edge of a mobile carrier’s 5G network. By combining the benefits of 5G, such as high bandwidth and low latency, with the ability to use AWS tools […]

Serverless Laravel App with Lambda

The serverless LAMP stack part 4: Building a serverless Laravel application

Update: The complete blog series and supporting GitHub repository is now available: Part 1: Introducing the new Serverless LAMP stack Part 2: Scaling relational databases Part 3: Replacing the web server Part 4: Building a serverless Laravel application Part 5: The CDK construct library for the serverless LAMP stack Part 6: From MVC to serverless […]

View API Gateway Method Request using Amazon Cognito authorization

Building well-architected serverless applications: Controlling serverless API access – part 3

This series of blog posts uses the AWS Well-Architected Tool with the Serverless Lens to help customers build and operate applications using best practices. In each post, I address the nine serverless-specific questions identified by the Serverless Lens along with the recommended best practices. See the Introduction post for a table of contents and explanation of the example application. Security question […]