AWS Cloud Operations Blog
Category: Advanced (300)
Update your HAQM CloudWatch dashboards automatically using HAQM EventBridge and AWS Lambda
HAQM CloudWatch lets customers collect monitoring and operational data in the form of logs, metrics, and alarms. This allows for easy visualization and notifications regarding their workload health. HAQM CloudWatch dashboards are customizable home pages in the CloudWatch console that you can use to monitor your resources in a single view, even those resources that […]
Identity Guide – Preventive controls with AWS Identity – SCPs
AWS Identity offers a set of features that let customers apply preventive controls to their AWS environment. This includes AWS Organizations service control policies (SCPs). For you to achieve common preventive controls, SCPs provide preventative enforcement by offering central control over the maximum available permissions for all accounts in your organization. SCPs affect all users and roles […]
How and when to enable session cookies with HAQM CloudWatch RUM
HAQM CloudWatch RUM is a real user monitoring service that closes the gap between the end-user experience in a web application, and the serving of that content from your AWS or on-premises environment. By measuring client-side application performance, such as page load time and JavaScript errors, you have access to new and powerful tools for […]
Proactive autoscaling of Kubernetes workloads with KEDA using metrics ingested into HAQM Managed Service for Prometheus
UPDATE: This blog post has been published to include information about the recently added support for KEDA with the HAQM Managed Service for Prometheus (AMP).” Orchestration platforms such as HAQM EKS and HAQM ECS have simplified the process of building, securing, operating, and maintaining container-based applications, thereby helping organizations focus on building applications. We simplified this further […]
Introducing AWS AppConfig Feature Flags In Preview
Update (15 March 2022): AWS AppConfig Feature Flags are now generally available. The information below is still correct, but additional information can be found in the link at the end of this blog post. Modern DevOps practices require development teams to continuously iterate their applications based on customer feedback. These iterations are mostly comprised of […]
How to validate authentication using HAQM CloudWatch Synthetics – Part 2
In the second post of this two-part series, I will demonstrate how to utilize the HAQM CloudWatch Synthetics canary that uses the multiple HTTP endpoints blueprint in order to monitor an application requiring an authentication certificate. The first post Multi-step API monitoring using HAQM CloudWatch Synthetics provided steps to create an HAQM CloudWatch Synthetics script for executing a […]
Visualize application costs using AWS Service Catalog AppRegistry and HAQM QuickSight
In a previous blog post, we discussed how AWS Service Catalog AppRegistry lets you create a repository of your applications and associated resources. Then, you can define and manage your application metadata. This lets you understand the context of your applications and resources across your environments. This post will demonstrate how to utilize your application […]
Implement AWS resource tagging strategy using AWS Tag Policies and Service Control Policies (SCPs)
AWS lets us assign metadata to the AWS resources in the form of tags. Each tag is a simple label consisting of a customer-defined key and a value that makes it easier to manage, search for, and filter AWS resources. Tagging can be an effective scaling mechanism for implementing cloud management and governance strategies. Tags […]
Policy-as-Code for Securing AWS and Third-Party Resource Types
This post was written by Scott Alexander and Kevin Formsma from Mphasis Stelligent. Every day, more developers are having lightbulb moments as they realize they can design and manage their infrastructure. It’s our responsibility, as practitioners of the DevOps mindset, to build systems that allow developers to move quickly and speed up the feedback loop […]
How to Deploy AWS Config Conformance Packs Using Terraform
This post demonstrates how to enable AWS Config and deploy a sample AWS Config Conformance pack using HashiCorp’s Terraform. AWS Config provides configuration, compliance, and auditing features required for governing your resources and providing security posture assessment at scale. This service lets you create managed rules, which are predefined, customizable rules that AWS Config uses […]