AWS Partner Network (APN) Blog
Category: Advanced (300)
Gathering Market Intelligence from the Web Using Cloud-Based AI and ML Techniques
Many organizations face the challenge of gathering market intelligence on new product and platform announcements made by their partners and competitors—and doing so in a timely fashion. Harnessing these insights quickly can help businesses react to specific industry trends and fuel innovative products and offerings inside their own company.Learn how Accenture helped a customer use AWS to gather critical insights along with key signals and trends from the web using AI and ML techniques.
How to Visualize and Monitor Your AWS Container Fleet with Datadog
To fully leverage the versatility and scalability of containers, you need a monitoring solution capable of providing clarity into a highly dynamic environment comprising thousands (or even tens of thousands) of ephemeral containers. Learn how Datadog provides visibility into dynamic, ephemeral container workloads running on Amazon EKS, a service that makes it easy for you to run Kubernetes on AWS without needing to install and operate your own Kubernetes clusters.
How to Use Xplenty with AWS KMS to Provide Field-Level Encryption in ETL Data Processing
Enterprises often choose to mask, remove, or encrypt sensitive data in the ETL step to minimize the risk of sensitive data becoming stored, logged, accessible, or breached from their data lake or data warehouse. Xplenty’s ETL and ELT platform allows customers to quickly and easily prepare their data for analytics using a simple-to-use data integration cloud service. Xplenty’s global service uses AWS KMS to create and control the keys used to encrypt or digitally sign your data.
Leveling Up Your Alerting Workflow with Thundra’s Deep Instrumentation Capabilities
Serverless architectures allow application teams to build applications quickly without worrying about any of the underlying servers. Thundra’s cloud-native observability and security tool helps you test, debug, monitor, troubleshoot, and secure AWS Lambda functions, containers deployed by services like AWS Fargate, and their environments composed of managed or unmanaged services. Walk through a sample alerting scenario and learn how Thundra helps pinpoint and resolve the problem.
How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM
AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS services to create a pipeline that sends HSM audit logs into Splunk. You’ll also learn how to interpret the audit events and gain specific data insights that enable you to flag critical events taking place on the CloudHSM appliance.
Automated Refactoring from Mainframe to Serverless Functions and Containers with AWS Blu Age
Mainframe workloads are often tightly-coupled legacy monoliths with millions of lines of code, and customers want to modernize them for business agility. Manually rewriting a legacy application for a cloud-native architecture requires lots of re-engineering. See how AWS Blu Age transformed a typical mainframe CICS application to AWS containers and AWS Lambda functions. You’ll also learn how to increase mainframe workload agility with refactoring to serverless and containers.
Monitoring Kubernetes Environments with AWS and New Relic’s Cluster Explorer
Kubernetes provides development teams with the tools and capabilities they need to deliver real customer value in far shorter time than more traditional architectures. Operating Kubernetes environments at scale, however, becomes more complex and requires special focus on monitoring for performance and health. Explore the challenges of monitoring Kubernetes environments at scale, and learn how to implement monitoring with the New Relic Cluster Explorer that’s included with the Kubernetes integration.
Secure Certificate Management with HashiCorp Consul on AWS
The adoption of service mesh has been accelerated by the emergence of microservices. Companies leverage orchestration tools for deploying services, and then use a service mesh to manage the connections between them. These solutions provide important capabilities, such as traffic management and load balancing. Learn how HashiCorp Consul and AWS Certificate Manager Private CA automate certificate management, perform signing operations, and rotate private certificates.
Microsoft SQL Standard Clustering Across AWS Availability Zones with Zadara Storage as a Service
With Zadara offering Storage-as-a-Service across Availability Zones, the platform’s centralized storage services release the ability to connect multiple Microsoft (MSSQL) servers in a standard Windows Server Failover Cluster model to a single set of shared storage volumes. This removes the need for MSSQL Enterprise Edition licensing and the doubling up of Amazon EBS disk for Amazon EC2 instances. In this post, explore the use of high availability MSSQL Standard Clustering on AWS with Zadara.
Improving Dataset Query Time and Maintaining Flexibility with Amazon Athena and Amazon Redshift
Analyzing large datasets can be challenging, especially if you aren’t thinking about certain characteristics of the data and what you’re ultimately looking to achieve. There are a number of factors organizations need to consider in order to build systems that are flexible, affordable, and fast. Here, experts from CloudZero walk through how to use AWS services to analyze customer billing data and provide value to end users.