AWS Developer Tools Blog
Category: Compute
Run an Active-Passive, multi region API using Aurora RDS Global Cluster
Increasingly enterprises and customers run and manage applications at a global scale that need to be resilient and highly available. In order to deliver the best possible experience to their end consumers, these applications need to safeguard against risks of service disruptions and downtime. Risks due to service downtime, due to natural disasters, hardware failures, […]
New: AWS CLI v2 Docker images available on Amazon ECR Public
We are excited to announce that official Docker images of the AWS Command Line Interface (AWS CLI) v2 are now available on Amazon Elastic Container Registry Public (Amazon ECR Public) gallery. Customers will now be able to pull all past and future images of the AWS CLI v2 from Amazon ECR Public. Previously, official AWS […]
Faster iteration experience for AWS SAM applications in the AWS Toolkits for JetBrains and VS Code
Today, the AWS Toolkits for JetBrains and VS Code released a faster code iteration experience for developing AWS SAM applications. The AWS Toolkits are open source plugins for JetBrains and VS Code IDEs that provide an integrated experience for developing Serverless applications, including assistance for getting started and local step-through debugging capabilities for Serverless applications. […]
Why and how you should use AWS SDK for JavaScript (v3) on Node.js 18
The Node.js 18.x runtime was promoted to Active Long Term Support (LTS) on October 25th, 2022, and is now available in AWS Lambda. The AWS SDK for JavaScript (v3) is included by default in AWS Lambda Node.js 18 runtime as a convenience for developers building simpler functions. You can read about features in Node.js 18 […]
Using Amazon Corretto (OpenJDK) for lean, fast, and efficient AWS Lambda Applications
Using Amazon Corretto (OpenJDK) for lean, fast, and efficient AWS Lambda By Guest Blogger Adam Bien In this post, I will discuss how you can launch large, monolithic applications on top of AWS Lambda, and I’ll show that they perform well and are cost effective. You’ll learn that the same application you develop for Lambda […]
Tuning Apache Kafka and Confluent Platform for Graviton2 using Amazon Corretto
Tuning Apache Kafka and Confluent Platform for Graviton2 using Amazon Corretto By Guest Blogger Liz Fong-Jones, Principal Developer Advocate, Honeycomb.io Background Honeycomb is a leading observability platform used by high-performance engineering teams to quickly visualize, analyze, and improve cloud application quality and performance. We utilize the OpenTelemetry standard to ingest data from our clients, including […]
Introducing .NET Annotations Lambda Framework (Preview)
Recently we released the .NET 6 managed runtime for Lambda. Along with the new Lambda runtime we have also been working on a new framework for writing .NET 6 Lambda functions called Lambda Annotations. The Annotations framework makes the experience of writing Lambda feel more natural in C#. It also takes care of synchronizing the […]
.NET at re:Invent 2021
Running .NET applications on AWS has never been better and our sessions at re:Invent this year reflect that excitement. All our sessions are for builders who want real-world insights and coding examples they can immediately apply in their applications. We also have a virtual option for those who cannot make it to Las Vegas. This […]
AWS Batch Application Orchestration using AWS Fargate
Many customers prefer to use Docker images with AWS Batch and AWS Cloudformation for cost-effective and faster processing of complex jobs. To run batch workloads in the cloud, customers have to consider various orchestration needs, such as queueing workloads, submitting to a compute resource, prioritizing jobs, handling dependencies and retries, scaling compute, and tracking utilization […]
Virus scan S3 buckets with a serverless ClamAV based CDK construct
Edit: March 10th 2022 – Updated post to use AWS Cloud Development Kit (CDK) v2. Protecting systems from malware is an essential part of a systems protection strategy. It is important to both scan binaries and other files before introducing them into your system boundary and appropriately respond to potential threats in accordance to your […]