Containers

Read the blog post about architecting for resiliency on AWS App Runner.

Architecting for resiliency on AWS App Runner

AWS App Runner is one of the simplest ways to run your containerized web applications and APIs on AWS. App Runner abstracts away the cloud resources needed for running your web application or API, including load balancers, TLS certificates, auto-scaling, logs, metrics, tracing (such as observability), as well as the underlying compute resources. With App Runner, […]

Read the blog post about migrating and modernizing Windows Communication Foundation (WCF) workloads onto AWS container services.

Migrating and modernizing Windows Communication Foundation (WCF) workloads onto AWS container services

Introduction Windows Communication Foundation (WCF) is a framework created by Microsoft in 2008 for building service-oriented architecture (SOA) applications. It provides a set of libraries for building web services, using different network protocols to send and receive data between service endpoints. With the introduction of .NET Core in 2016 and the emergence of microservices, our […]

Getting started with Amazon EKS Anywhere on Bare Metal

Getting started with Amazon EKS Anywhere on Bare Metal

We are happy to announce the general availability of Amazon EKS Anywhere on Bare Metal. We released Amazon EKS Anywhere in 2021 with support to run on-premises Kubernetes clusters using VMware and today you can use EKS Anywhere to provision clusters without virtualization. The new functionality adds support for managing the full hardware lifecycle to […]

Introducing bare metal deployments for Amazon EKS Anywhere

Introducing bare metal deployments for Amazon EKS Anywhere

Introduction At one time, all servers were bare metal servers. We have come a long way with virtualization, cloud computing, and more recently with containers and serverless technologies. Despite these innovations, bare metal servers remain popular on premises. Customers run applications on bare metal infrastructure for performance benefits, to gain direct access to underlying hardware […]

Leverage AWS secrets stores from EKS Fargate with External Secrets Operator

Leverage AWS secrets stores from EKS Fargate with External Secrets Operator

Secrets management is a challenging but critical aspect of running secure and dynamic containerized applications at scale. To support this need to securely distribute secrets to running applications, Kubernetes provides native functionality to manage secrets in the form of Kubernetes Secrets. However, many customers choose to centralize the management of secrets outside of their Kubernetes […]

Run an active-active multi-region Kubernetes application with AppMesh and EKS

Run an active-active multi-region Kubernetes application with AppMesh and EKS

NOTICE: October 04, 2024 – This post no longer reflects the best guidance for configuring a service mesh with Amazon EKS and its examples no longer work as shown. Please refer to newer content on Amazon VPC Lattice. ——— As application architects we have come across many customers who are moving towards a container-only strategy […]

Amazon EKS improves control plane scaling and update speed by up to 4x

Amazon EKS improves control plane scaling and update speed by up to 4x

Years before Amazon Elastic Kubernetes Service (EKS) was released, our customers told us they wanted a service that would simplify Kubernetes management. Many of them were running self-managed clusters on Amazon Elastic Computer Cloud (EC2) and were having challenges upgrading, scaling, and maintaining the Kubernetes control plane. When EKS launched in 2018, it aimed to […]

title: Understanding data transfer costs for AWS container services

Understanding data transfer costs for AWS container services

Overview Data transfer costs can play a significant role in determining the overall design of a system. The Amazon Elastic Container Registry (Amazon ECR), Amazon Elastic Container Service (Amazon ECS), and Amazon Elastic Kubernetes Service (Amazon EKS) can all incur data transfer charges depending on a variety of factors. It can be difficult to visualize what […]

Cryptographic Signing for Containers

Introduction In May of 2021, the United States Executive Branch released an Executive Order on Improving the Nation’s Cybersecurity. One of the key focus areas for this order was enhancing software supply chain security, with requirements around addressing supply chain risks by, in part: Securing development environments with strong access controls Using automated code scanning […]