AWS Storage Blog

Category: Technical How-to

Amazon S3

Changing your Amazon S3 encryption from S3-Managed to AWS KMS

Customers who use Amazon Simple Storage Service (Amazon S3) often take advantage of S3-managed encryption keys (SSE-S3) for server-side object encryption (SSE). For many customers, the decision to use SSE-S3 meets their security requirements, as it protects their data at rest. However, for some other customers, SSE-S3 may have met their requirements initially, but their […]

Read More
Amazon S3

Replicating existing objects between S3 buckets

UPDATE (8/25/2021): The walkthrough in this blog post for setting up a replication rule in the Amazon S3 console has changed to reflect the updated Amazon S3 console. Customers commonly have business requirements or enterprise policies that call for additional copies of their existing Amazon S3 objects. While Amazon S3 Replication is widely used to […]

Read More
Amazon S3

How to manage retention periods in bulk using Amazon S3 Batch Operations

Amazon S3 Batch Operations now supports S3 Object Lock. In this post, I share ways you can use these two Amazon S3 features together to address common data protection needs. S3 Batch Operations is a feature that lets you perform repetitive or bulk actions like copying or updating tag sets across millions of objects with […]

Read More

Deploying a LAMP-based multi-tier web application on AWS Snowball Edge

Imagine you are building an application at a remote location where you must process and make decisions based on locally generated data, say from surveillance cameras or from detection systems. If there is high network latency, you cannot run these applications in the cloud and process data in real time. Other times, you may be […]

Read More
Amazon S3

Managing delete marker replication in Amazon S3

UPDATE: You can now replicate delete markers in V2 configuration and no longer need V1 configuration. Please refer to the announcement from November, 2020. Customers use Amazon S3 Replication to create a copy of their data within the same AWS Region or in another AWS Region for compliance, lower latency, or sharing data across accounts. In […]

Read More

AWS Identity and Access Management on AWS Snowball Edge

Many of our customers use AWS Snowball Edge devices for secure data transfer and edge computing applications. Recently, AWS announced support for AWS Identity and Access Management (IAM) on Snowball Edge. Before the introduction of IAM on Snowball Edge, IT administrators shared a single access key/secret key combination with all the users who wanted to […]

Read More

Building a Linux edge-computing solution with AWS Snowball Edge and Amazon EC2

There are many situations where you must run data inference close to the data sources. Often times these are located at remote, disconnected locations. Let’s consider the following examples: A remote oil drilling platform has numerous sensors that generate data. Critical components have to be monitored for wear and tear, or failure, and replacements must […]

Read More
Amazon S3

Encrypting existing Amazon S3 objects with the AWS CLI

Encryption of data at rest is increasingly required by industry protocols, government regulations, and internal organizational security standards. Encryption helps you protect your stored data against unauthorized access and other security risks. Amazon S3’s default encryption can be used to automate the encryption of new objects in your bucket, but default encryption does not change […]

Read More

Persistent storage for high-performance workloads using Amazon FSx for Lustre

High-performance file systems are often divided into two types: scratch and persistent. Scratch file systems provide temporary storage with high-performance characteristics such as submillisecond latency, up to hundreds of gigabytes per second of throughput, and millions of IOPS for short-term workloads. By contrast, persistent file systems are designed to combine the performance levels of their […]

Read More
CloudEndure-AWS-Storage-Blog

Increasing application resilience with CloudEndure Disaster Recovery

UPDATE: For a more in-depth look at this topic, please visit the blog post “Configuring Cross-Region DR of your Amazon EC2 workloads with CloudEndure.” If there is an IT disaster, you must get your workloads back up and running quickly to ensure business continuity. For business-critical applications, the priority is keeping your recovery time and […]

Read More