Unpacking Our Findings From Assessing Numerous Infrastructures – Part 2

When superior performance comes at a higher price tag, innovation makes it accessible. Quite evident from the way AWS has been evolving its services –

  •  gp3, the successor of gp2 volumes – Offers the same durability, supported volume size, max IOPS per volume, and max IOPS per instance. The main difference between gp2 and gp3 is gp3’s decoupling of IOPS, throughput, and volume size. This flexibility to configure each piece independently – is where the savings come in.
  • AWS Graviton3 processors – Offers 25% better computing, double the floating-point, and improved cryptographic performance compared to its predecessors. It’s 3x faster than Graviton 2 and supports DDR5 memory, providing 50% more bandwidth than DDR4 (Graviton 2). 

To be better at assessing your core infrastructure needs, knowing the AWS services is just half the battle. In my previous blog, I’ve discussed numerous areas where engineering teams often falter. Do give it a read! >>> Unpacking Our Findings From Assessing Numerous Infrastructures – Part 1

What we’ll be discussing here are –

  • Are your systems truly reliable?
  • How do you respond to a security incident?
  • How do you reduce defects, ease remediation, and improve flow into production? (Operational Excellence)
Continue reading “Unpacking Our Findings From Assessing Numerous Infrastructures – Part 2”

Exploring the Power of IAM Roles Anywhere

Introduction:

In today’s cloud-driven world, flexibility and security are paramount concerns for businesses. AWS (Amazon Web Services) offers IAM (Identity and Access Management) Roles to manage access permissions within its ecosystem. However, what happens when your servers, containers, or applications operate outside of AWS? This is where IAM Roles Anywhere comes into play, providing a secure and hassle-free solution to obtain temporary access. This article will delve into the concepts behind IAM Roles Anywhere and how it streamlines access management.

Why IAM Roles Anywhere should be used?

Continue reading “Exploring the Power of IAM Roles Anywhere”

Unpacking Our Findings From Assessing Numerous Infrastructures – Part 1

AWS Well-Architected framework can help you streamline your approach to ensure resilient, consistent, and scalable outcomes.

You can’t improve what you don’t measure. 

When things are not analyzed, changes become responses to hefty cloud bills or security breaches. AWS Well-Architected framework can help you identify issues early and streamline your approach to ensure resilient, consistent, and scalable outcomes.

But what difference does AWS WAR Framework bring? 

WAR offers a distinctive and valuable perspective into the common practices within cloud computing. After reviewing numerous, distinct workloads, it’s fascinating to learn how various cloud engineering teams operate in the cloud — how they see things, what’s important to them, and why they prefer certain things in a certain way. For us, the best part is being able to make assertions about what tech teams genuinely love about cloud, beyond the hype. 

Continue reading “Unpacking Our Findings From Assessing Numerous Infrastructures – Part 1”

Applications Hosting on ECS

Introduction

Applications hosting on Amazon Elastic Container Service (ECS) is a cloud computing solution provided by AWS that enables organizations to manage, scale, and deploy containerized applications with ease. ECS simplifies container deployment and management, enabling developers to concentrate on creating and running their applications.

In this blog, we will create a repository, copy an image to Amazon Elastic Container Registry (ECR), define a task, and set up an ECS cluster to host an application on Amazon ECS.

Create a repo and Copy an Image in ECR

Amazon ECR is a fully managed container registry service provided by Amazon Web Services (AWS). It allows you to store, manage, and deploy Docker container images. Please follow the below steps to create a repo in ECR and copy an image to that ECR.

Continue reading “Applications Hosting on ECS”

OpenSearch Alert Integration with SNS

Why Opt for Integrating Alerts with OpenSearch?

Monitoring the OpenSearch visualization dashboard 24*7 becomes challenging when application or system logs fail to appear. Therefore, it’s essential to establish alerts that promptly notify us when such issues arise. The flexibility and scalability of OpenSearch make it a compelling choice for implementing alerting solutions in various domains, from IT operations and security to business intelligence and analytics.

Overview of OpenSearch cluster

OpenSearch, a powerful and versatile search and analytics engine, plays a crucial role in helping you gain valuable insights from your data. However, staying on top of potential issues and anomalies in your OpenSearch cluster requires a proactive approach.

Continue reading “OpenSearch Alert Integration with SNS”