AWS Cloud Operations Blog
Category: AWS Well-Architected
How to use AWS Well-Architected with AWS Trusted Advisor to achieve data-driven cost optimization
Are you looking for ways to optimize your costs on AWS? Are you ensuring that you are taking advantage of all the cost-saving features and services that AWS offers? If not, you should be! In this blog post, we will discuss how to use AWS Well-Architected and AWS Trusted Advisor to achieve data-driven insights that […]
Scale Operational Readiness Reviews with AWS Well-Architected Tool
In this blog post, learn how to scale out an operational readiness review (ORR) in your organization by using the AWS Well-Architected Tool (AWS WA Tool) and its Custom Lens capability. The AWS WA Tool ‘Custom Lens’ feature was launched in Nov 2021 and makes it a single place for you to review and measure best practices across your […]
Console-based access to Windows instances using AWS Systems Manager Fleet Manager
Historically, customers had to choose between security and costs when establishing RDP connections to Windows servers. The newest feature in Fleet Manager provides customers with a simple and secure browser-based method for accessing Windows servers over RDP. Now you can connect to your instances directly from the browser from the AWS Management Console in just […]
Customize Well-Architected Reviews using Custom Lenses and the AWS Well-Architected Tool
The AWS Well-Architected Tool (AWS WA Tool) lets you learn best practices for architecting workloads on the cloud, measure workloads against these best practices, and improve the workload by implementing best practices. These best practices have been curated under the AWS Well-Architected Framework (AWS WA Framework) and Lenses based on our tens of thousands of […]
Why you should develop a correction of error (COE)
Application reliability is critical. Service interruptions result in a negative customer experience, thereby reducing customer trust and business value. One best practice that we have learned at Amazon, is to have a standard mechanism for post-incident analysis. This lets us analyze a system after an incident in order to avoid reoccurrences in the future. These […]
Manage workload risks using the AWS Well-Architected Tool and AWS Systems Manager
You can use the AWS Well-Architected Tool (AWS WA Tool) to identify and remediate risks in your workloads that map to the five pillars of the AWS Well-Architected Framework: operational excellence, security, reliability, performance efficiency, and cost optimization. The AWS WA Tool helps you identify and address vulnerabilities before they negatively impact your business. As […]
Scaling Well-Architected reviews with the AWS Well-Architected Tool
The AWS Well-Architected Framework describes key concepts and architectural best practices that help cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads in the cloud. An AWS Well-Architected Review includes questions around the AWS Well-Architected Framework that can help application owners ensure that their workloads are following best practices. The […]
Use Amazon Athena and Amazon QuickSight to build custom reports of AWS Well-Architected Reviews
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time. You can […]
Monitoring Cisco CSR 1000v VPN tunnel and BGP status using Amazon CloudWatch
Many organizations get access to their AWS resources using a Direct Connect connection or a Site-to-Site VPN. AWS Site-to-Site VPN creates a secure connection between your data center or branch office and your AWS cloud resources. In this post, we will see how to monitor your Cisco CSR VPN tunnel and BGP (Border Gateway Protocol) […]