AWS Cloud Operations Blog
Delete Amazon CloudWatch Synthetics dependent resources when you delete a CloudFormation stack
Amazon CloudWatch Synthetics allows you to monitor application endpoints more easily. It runs tests on your endpoints every minute, and alerts you if your application endpoints don’t behave as expected. These tests can be customized to check for availability, latency, transactions, broken or dead links, page load errors, load latencies for UI assets, complex wizard […]
How to create an Amazon EC2 Auto Scaling policy based on a memory utilization metric (Linux)
This is the first in a two-part series about how to create an Amazon EC2 Auto Scaling policy based on memory utilization metric. This post covers Linux OS. In part 2 I’ll cover how to create an Amazon EC2 Auto Scaling policy based on a memory utilization metric in Windows OS. Amazon EC2 Auto Scaling […]
How to create an Amazon EC2 Auto Scaling policy based on a memory utilization metric (Windows)
In the first of this two-part series, I showed you how to create an Amazon EC2 Auto Scaling policy based on a memory utilization metric for Linux OS. In this second post, I walk through how to create Amazon EC2 Auto Scaling policy based on memory utilization metric for Windows OS. I will use a […]
Customize Amazon CloudWatch alarm notifications to your local time zone – Part 2
In part 1 of this series, I cover how to customize Amazon CloudWatch alarm notifications using CloudWatch Events rule. For more information, see the Customize Amazon CloudWatch alarm notifications to your local time zone – Part 1 blog post. In this part, I walk through the process of using Amazon Simple Notification Service (Amazon SNS) […]
Customize Amazon CloudWatch alarm notifications to your local time zone – Part 1
This two-part series discusses how to customize Amazon CloudWatch alarm notifications to your local time zone. Part 1 covers customizing using CloudWatch Events rule. Part 2 covers customizing using Amazon SNS. You can use Amazon CloudWatch to set alarms and automate actions based on predefined thresholds or machine learning algorithms that identify anomalous behavior in […]




