Containers

Category: Amazon EC2 Container Registry

Designing a secure container image registry

As organizations move to containers, there can be a sense that they are losing control or visibility of the software that is deployed to their environments. Historically, once a server is in production, a scanning tool runs on a regular basis to detect vulnerabilities on the operating system. Once a vulnerability is detected, an operations […]

Read More

OCI Artifact Support In Amazon ECR

By Shubhra Deshpande and Michael Hausenblas In the container roadmap issue 308 you asked us about making Amazon Elastic Container Registry (ECR) understand artifact types beyond container images. We now launched support for Open Container Initiative (OCI) artifacts, such as Helm charts. In this post we give you some background on OCI artifacts and walk […]

Read More

ICYMI: AWS Cloud Containers Conference

On July 9th, the AWS Containers team hosted the first AWS Cloud Containers Conference (C3). The full day, virtual conference covered deep dives, launches, and demos on Amazon EKS, Amazon ECS, AWS Fargate, Amazon ECR, and AWS App Mesh. As well as, a keynote from GM of Kubernetes, Bob Wise, and closing remarks from Chief […]

Read More

Infosys reimagines technology skill assessments with Wingspan using AWS Fargate

This post has been co-authored by Arpan Patro, Lead Architect at Infosys and Satheesh Kumar, Solutions Architect at AWS Infosys is a global leader in next-generation digital services and consulting. Infosys has a strong workforce of over 240K employees spread across the globe providing business consulting, information technology, and outsourcing services. Challenge: Infosys serves their clients […]

Read More

Streaming logs from Amazon EKS Windows pods to Amazon CloudWatch Logs using Fluentd

Containers are a method of operating system virtualization that allow you to run an application and its dependencies in resource-isolated processes. Containers allow you to easily package an application’s code, configurations, and dependencies into easy-to-use building blocks that deliver environmental consistency, operational efficiency, developer productivity, and version control. Using Windows containers allows you to get […]

Read More

Introducing multi-architecture container images for Amazon ECR

Containers are a de facto standard in cloud application development and deployment. Publishing software in container images provides developers an integrated packaging solution, bundling software and all required dependencies into a portable image format. This image can then be run anywhere, abstracting away the infrastructure-specific aspects of deployment. However, the promise of running anywhere only […]

Read More

Access Logging Made Easy with AWS App Mesh and Fluent Bit

I’ve found that the term microservices can have different meanings and benefits depending on who you talk to. However, the one benefit where I’ve typically found consensus is that microservices allow your teams to have the freedom to choose the best tool for each job. Meaning, microservices architectures shouldn’t follow a “one size fits all” […]

Read More

Game DevOps made easy with AWS Game-Server CD Pipeline

This is a guest post by Anita Buehrle of Weaveworks. The biggest challenge faced by game publishers is the ability to deliver new features to players as quickly as possible. Not only do new features have to arrive quickly and reliably, but they also need to be delivered in a way that optimizes costs and […]

Read More

Results of the 2019 AWS Container Security Survey

Security is a top priority in AWS, and in our service team we naturally focus on container security. In order to better assess where we stand, we conducted an anonymous survey in late 2019 amongst container users on AWS. Overall, we got 68 responses from a variety of roles, from ops folks and SREs to […]

Read More

Scanning images with Trivy in an AWS CodePipeline

This post was contributed by AWS Container Hero, Liz Rice, VP Open Source Engineering at Aqua Security. If you’re working with containers, it’s important to scan your images for known vulnerabilities, so that you don’t deploy code that an attacker can easily exploit. A good way of ensuring that all your deployed images get this […]

Read More