AWS Database Blog
Improve cost visibility of an HAQM RDS multi-tenant instance with Performance Insights and HAQM Athena
In this post we introduce a solution that addresses a common challenge faced by many customers: managing costs in multi-tenant applications, particularly for shared databases in HAQM Relational Database Service (HAQM RDS) and HAQM Aurora. This solution uses HAQM RDS Performance Insights and AWS Cost and Usage Reports (CUR) to addresses this challenge. This allows for efficient grouping of tenants within the same RDS or Aurora instances, while helping you implement accurate chargeback models, optimize resource-intensive workloads, and make data-driven decisions for capacity planning.
Use pgactive for rolling major version upgrades in HAQM RDS for PostgreSQL
In this post, we explore how pgactive can perform rolling major version upgrades for HAQM Relational Database Service (HAQM RDS) for PostgreSQL, allowing for a smoother transition with reduced impact on your applications.
Grouping database tables in AWS DMS tasks for Oracle source engine
AWS Database Migration Service is a cloud service designed to simplify the process of migrating and replicating databases, data warehouses and other data stores. It offers a comprehensive solution for both homogeneous and heterogeneous database migrations, facilitating transitions between different database platforms. The migration process typically involves two major phases: Migration of existing data (full […]
HAQM DocumentDB Quick Start: Zero Setup with AWS CloudShell
HAQM DocumentDB (with MongoDB compatibility) launched its integration with AWS CloudShell. With this integration, you can now connect to HAQM DocumentDB with a single click on the AWS Management Console without needing to perform any setup. In this post, we show how to connect to and work with HAQM DocumentDB using CloudShell. HAQM DocumentDB is […]
Multiple database support on HAQM RDS for Db2 DB instance
Many organizations run IBM Db2 databases across multiple physical servers or virtual machines. This approach leads to resource investments in infrastructure, management, and licensing. Additionally, advancements in hardware technology, increased CPU capacities, and database engine enhancements result in underutilized servers if not rightsized at the outset. To optimize resource utilization, organizations can explore the following […]
Build resilient Oracle Database workloads on HAQM EC2
In this post, we dive into the various architecture patterns and options available for both compute and storage layers while configuring your self-managed Oracle databases on HAQM EC2 to comply with your HA and DR requirements.
Demystifying HAQM DynamoDB on-demand capacity mode
In this post, we examine the realities behind common myths about DynamoDB on-demand capacity mode across three key areas: cost implications and efficiency, operational overhead and management, and performance considerations. We provide practical guidance to help you make informed decisions about throughput management.
Long-term backup options for HAQM RDS and HAQM Aurora
In this post, we show you several long-term data backup strategies and how to effectively implement them in the AWS environment, with a focus on HAQM Relational Database Service (HAQM RDS) and HAQM Aurora.
Automate HAQM RDS credential rotation with AWS Secrets Manager for primary instances with read replicas
When using Secrets Manager to manage your master user passwords, you cannot create new read replicas for your database instance. This applies to all DB engines except HAQM RDS for SQL Server, potentially impacting your organization’s ability to efficiently scale its read operations while maintaining secure credential practices. In this post, we present a solution that automates the process of rotating passwords for a primary instance with read replicas while maintaining secure credential management practices. This approach allows you to take advantage of the benefits of both read scaling and automated credential rotation.
Customer-managed process for configuring Kerberos authentication on an HAQM RDS for SQL Server DB instance, joined to a self-managed Active Directory
Many organizations rely on Windows Authentication and Kerberos for secure access to their SQL Server databases. When using HAQM RDS for SQL Server with a self-managed Active Directory, organizations can enhance their authentication beyond the default NTLM protocol to support Kerberos authentication. In this post, we show you how to manually configure and maintain Kerberos authentication for HAQM RDS for SQL Server DB instances joined to a self-managed Active Directory. We walk through the process of configuring service principal names (SPNs), adding necessary user principal name (UPN) suffixes, and automating SPN updates to handle failovers and host replacements.