Networking & Content Delivery

Category: Networking & Content Delivery

Migrate Amazon ECS service communication to Amazon VPC Lattice

Advanced L7 routing, authentication and authorization using IAM Policies, and deep observability are key capabilities offered by Amazon VPC Lattice. With VPC Lattice now integrated into Amazon Elastic Container Service (Amazon ECS), you can easily migrate service-to-service communication from using internal Elastic Load Balancing (ELB) to VPC Lattice. This allows you to benefit from VPC Lattice […]

Building a global, low-latency NTP services with static IP addresses

Building a global, low-latency NTP service with static IP addresses

As organizations continue to roll out cloud-connected Internet-of-Things (IoT) applications, the need for accurate and reliable time synchronization has become increasingly critical. Although Amazon Web Services (AWS) provides the Amazon Time Sync Service for basic Network Time Protocol (NTP) needs, some IoT scenarios need a custom NTP solution. For example, users want to serve many IoT […]

Amazon VPC Lattice DNS migration strategies and best practices

In this post, we review the most common Domain Name System (DNS) strategies to migrate your applications to Amazon VPC Lattice in a phased approach. These options allow you to reduce downtime, minimize overhead, and maintain consistent DNS resolution for your clients and applications on AWS. VPC Lattice is a fully managed end-to-end application networking […]

Accelerate IPv6

Accelerate IPv6 application migration with AWS PrivateLink and dual stack Network Load Balancers UDP support

This post was co-authored by: Ashish Kumar, Senior Product Manager; Blayze Stefaniak, Senior Solutions Architect; Natti Swaminathan, Senior Solutions Architect; and Yogesh Patel, Senior Solutions Architect In this post, we review how you can leverage AWS PrivateLink support for User Datagram Protocol (UDP) services, and accelerate Internet Protocol version 6 (IPv6) migrations with UDP support […]

Improving security and performance with additional DNS resource record types in Amazon Route 53

DNS is a key component of modern computing, a phone book for IP addresses. It is distinct from other protocols in the application stack. Because it is queried early in the request by a client, DNS is well suited to relay application-specific information back to a client as early as possible. This additional data can […]

Optimizing web application user experiences with AWS WAF JavaScript integrations

Optimizing web application user experiences with AWS WAF JavaScript integrations

AWS WAF Bot Control uses CAPTCHA and Challenge actions to undertake a browser interaction before permitting requests to protected resources. These actions can result in a poor user experience because of application errors or unexpected CAPTCHA completion when AWS WAF unexpectedly blocks requests. The AWS WAF JavaScript integrations give you the ability to control these […]

Unlock self-service, enterprise-grade VPC capabilities with seamless integrations

Introduction Defining and provisioning standardized virtual private cloud (VPC) patterns across an enterprise poses several challenges for many customers. These challenges include ensuring self-service capabilities, meeting security and compliance requirements, and maintaining adherence to those requirements. Traditionally, when an application team wants to provision a VPC in their workload account, it is requested through a […]

Network observability for modern applications

In today’s highly distributed and cloud-based IT environments, network monitoring has become crucial for organizations to maintain the health, performance, and security of their applications and infrastructure. However, as modern application architectures evolve, with multiple layers of abstraction and cloud-native services, many teams look for better ways to collect and use the high-quality network data […]

How to dynamically adapt your response to changing threat levels using AWS WAF

Customers use AWS WAF to protect their web applications and APIs. They typically use a mixture of managed rules and their own custom rules, and then tune them in order to prevent as much undesired traffic as possible from reaching their applications. This implementation and tuning exercise typically produces a web access control list (web ACL) that […]