AWS Architecture Blog

Category: HAQM Route 53

From virtual machine to Kubernetes to serverless: How dacadoo saved 78% on cloud costs and automated operations

In this post, we walk you step-by-step through dacadoo’s journey of embracing managed services, highlighting their architectural decisions as we go.

Top 10

Top Architecture Blog Posts of 2024

Well, it’s been another historic year! We’ve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the Architecture Blog happily participated, we also made every effort to stay true to our channel’s original scope, and your readership this last year has proven that decision was […]

The Pilot Light scenario for a 3-tier application that has application servers and a database deployed in two Regions

How an insurance company implements disaster recovery of 3-tier applications

A good strategy for resilience will include operating with high availability and planning for business continuity. It also accounts for the incidence of natural disasters, such as earthquakes or floods and technical failures, such as power failure or network connectivity. AWS recommends a multi-AZ strategy for high availability and a multi-Region strategy for disaster recovery. […]

Top-10

Top Architecture Blog Posts of 2023

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. As we move into 2024 and all of the new technologies we could see, we want to take a moment to highlight the brightest stars from 2023. As always, thanks to our […]

Unified API architecture

How Sonar built a unified API on AWS

SonarCloud, a software-as-a-service (SaaS) product developed by Sonar, seamlessly integrates into developers’ CI/CD workflows to increase code quality and identify vulnerabilities. Over the last few months, Sonar’s cloud engineers have worked on modernizing SonarCloud to increase the lead time to production. Following Domain Driven Design principles, Sonar split the application into multiple business domains, each […]

Example of a stateless architecture

Converting stateful application to stateless using AWS services

Designing a system to be either stateful or stateless is an important choice with tradeoffs regarding its performance and scalability. In a stateful system, data from one session is carried over to the next. A stateless system doesn’t preserve data between sessions and depends on external entities such as databases or cache to manage state. […]

Oracle with cascading standby databases across regions

Disaster Recovery for Oracle Database on HAQM EC2 with Fast-Start Failover

High availability is non-negotiable for organizations today to prevent business-critical application disruptions. Enterprises must prioritize database scalability and availability to avoid downtime in their databases, network, servers, or storage environments. For organizations that want to avoid required application changes, Oracle Real Application Clusters (RAC) is an option for providing high availability and scalability to the […]

Figure 1. Solution architecture

Enable transparent connectivity to Oracle Data Guard environments using HAQM Route 53 CNAME records

Customers choose AWS for running their Oracle database workload to help increase resiliency, performance, and scalability of the database layer. A high availability (HA) solution for the database stack is an important aspect to consider when migrating or deploying Oracle databases in AWS to help ensure that the architecture can meet the service level agreement […]

Razorpay Edge request flow for DDoS handling

Mitigating DDoS with data science using AWS Shield Advanced and AWS WAF

This blog post helps customers in mitigating distributed denial-of-service (DDoS) using AWS Shield Advanced, AWS WAF, and data science. We explore how to use these services along with machine learning (ML) to detect and mitigate DDoS attacks. Bad actors conduct DDoS attacks using botnets. Through botnets, attackers look for zero-day vulnerabilities—specifically on network devices such […]