AWS Storage Blog

Category: AWS Well-Architected

Amazon FSx for NetApp ONTAP

Automating Amazon FSx for NetApp ONTAP password rotation with AWS Lambda

Data security is a top priority for customers using AWS cloud services. Based on customer input, AWS has “designed-in” methods enabling customers to automate common security workflows such as password rotation. The principals of this automation follows the AWS Well-Architected Framework which helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for a variety […]

AWS Elastic Disaster Recovery

Building a disaster recovery site on AWS for workloads on Microsoft Azure

Some enterprises run their IT operations using a multi-cloud environment, often for compliance, cost, or redundancy reasons. At times, these enterprises may be required to host a copy of their data, or even a full disaster recovery (DR) solution, on another cloud provider to provide an additional layer of protection. In this post, we show […]

AWS Elastic Disaster Recovery

Ensure workload resilience with AWS Elastic Disaster Recovery and Arpio

Planning for disaster recovery (DR) is a critical component of any IT operations practice. Applications that run on AWS benefit from the reliability that is built into the platform. However, they can still be impacted by from natural disasters, technical failures, and accidental or malicious human actions. Consequently, implementing best practices around disaster recovery is […]

AWS Elastic Disaster Recovery

Building a disaster recovery site on AWS for workloads on Google Cloud (Part 2)

One of the design principles to build reliable workloads is to test your recovery procedures. While this is a challenging task in traditional environments (i.e., on-premises), it’s much easier on the cloud because you can predict how your application fails and simulate a failure. You can then validate how your people, technology, and processes work […]

AWS Elastic Disaster Recovery

Securely installing AWS Replication Agent using AWS Security Token Service

UPDATE (7/7/2022): We’ve revised this blog post to align with the latest AWS security best practices. We’ve removed the step of adding an AWS Identity and Access Management (IAM) user, and replaced it with using an EC2 instance profile when the source server is an EC2 instance (the AWS Replication Agent also retrieves credentials automatically from […]