AWS Storage Blog
Category: Technical How-to
Allowing external users to securely and directly upload files to Amazon S3
Organizations are often required to store files, images, and other digital assets in a repository. In many cases, the source of these files are partners or individuals who are not connected to internal systems and requires corporate authentication in order to upload the files. Customers traditionally use servers to handle file uploads, which can use […]
5 ways to simplify backup plans using AWS Backup resource assignment rules
Prior to the announcement of new resource assignment capabilities in AWS Backup, customers could assign resources to a backup plan in two ways. They could either select a specific resource using its resource ID or define a specific selection tag, which helps the service identify resources to be backed up by the backup plan. While […]
Creating a scalable disaster recovery plan with AWS Elastic Disaster Recovery
IT disruptions can occur for many reasons, including human error, weather, or a cyber attack. Enterprises need to have a solution in place that will get them up and running quickly with minimal downtime. When orchestrating disaster recovery at scale, it is important to automate recovery plans as much as possible. This allows for a […]
Using AWS DataSync to move data from Hadoop to Amazon S3
You want to leverage cloud scalability, increase cost efficiency by paying only for utilized storage, decouple big data storage from processing, and increase capabilities for data analytics and machine learning using AWS. But how do you move your Hadoop cluster? To accelerate this transition, AWS DataSync recently launched support for moving data between Hadoop Distributed […]
Restoring on-premises applications to AWS from Amazon EBS Snapshots created by EBS direct APIs
Incremental, point-in-time copies of data can be a secure and cost effective tool anchoring disaster recovery, data migration, and compliance solutions. Amazon EBS Snapshots are how EBS customers leverage point-in-time copies of their data stored on AWS, and you can use Snapshots on premises too. In December 2019, AWS introduced Amazon EBS direct APIs, providing […]
Running WordPress on Amazon EKS with Amazon EFS Intelligent-tiering
A large percentage of websites today rely on Content Management Systems (CMS) which provide content creators, who may have little to no experience in web development, with the ability to easily publish their content to a website for distribution to their end users. By far, the most popular CMS platform today is WordPress. More developers […]
How to securely share application log files with third parties
What do we do when our applications fail, and we must provide instance-level log data to external entities for troubleshooting purposes? It’s best to limit direct human interaction with our production resources, so we often see temporary access provided for a fixed period. For highly regulated industries, the approval process for production access can be […]
Automate visibility of backup findings using AWS Backup and AWS Security Hub
Centralizing and automating data protection helps you support your business continuity and regulatory compliance goals. Backup compliance includes the ability to define and enforce backup policies to encrypt your backups, protect them from manual deletion, prevent changes to your backup lifecycle settings, and audit and report on backup activity from a centralized console. A common […]
Customization and field maintenance with AWS Snowball Edge – sideloading AMIs
When the AWS Snowball Edge launched in 2016, if you wanted to run Amazon Elastic Compute Cloud (Amazon EC2) instances on the device, you were required to specify an Amazon Machine Image (AMI) to be installed on it at time of ordering. You were then able to launch Amazon EC2 instances on the device based […]
Monitor Amazon S3 activity using S3 server access logs and Pandas in Python
Monitoring and controlling access to data is often essential for security, cost optimization, and compliance. For these reasons, customers want to know what data of theirs is being accessed, when it is being accessed, and who is accessing it. With more data to monitor, large amounts of data can make it more challenging to granularly […]