Help improve AWS Support Official channel in re:Post and share your experience - complete a quick three-question survey to earn a re:Post badge!
AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1 / 18
- Hi, I am looking to compute the total size of my files per year inside a given S3 bucket. I have been trying multiple methods: - I tried to use a goto3 script but I constantly ran into issues or inco...
- In the Data Protection section of the official User Guide of AWS Bedrock, it is stated not to put sensitive information in "free-form text fields" because they can appear in diagnostics/billing. I wou...
- I'm a mac user but the software I need to install requires windows. I stopped using windows over 10 years ago after getting hacked daily from every corner of the globe. I've read there's been many s...
- Hello, I plan to use Aurora PostgreSQL Serverless instances, but I've encountered two issues with Aurora PostgreSQL. Can someone explain the causes of these issues and whether they can be resolved? Th...
- ello, i've lost the phone i use for my mfa on my company's root account. on top of that, my organization's number is no longer the right one. how can i regain control of my organization? best christop...
- Currently using CloudFront in front of an EC2 instance that runs a simple application on port 8000 via HTTP (served by Gunicorn and used by less 100 users). I need keep it simple and secure but still ...
- Hi Team, I wanted to setup and penetration lab on AWS by setting\installing burp or zap on EC2 instance, use different pen test tool available on kali machine and other external pen test tool to do pe...
- We have a small Organization consisting of the following AWS Accounts: * Management * Security Account (delegated Admin for AWS Config/SecurityHub, etc) * Member Production * Member Staging So of the...
- Recently we went through one of the worst incidents i have been a part of. Much of our infrastructure is supported by Kafka for the various event messages that the different applications create, among...
- I have configured my AWS Cognito User Pool to use federated authentication (via Azure AD) and to use the Single Sign Out flow. Most of the time this works fine. However, I have noticed that if I wait ...
- I want to know the newly feature on Generative AI protection in AWS
- After scheduled maintenance from my ISP, I am now blocked from accessing anything behind CloudFront. I am a penetration tester by day, so it is possible that that would have added me to the block list...
- Hey Guys, My Elastic beanstalk, app connects to external database ( a third party database). and they were allowing my aws ip range. Currently the third-party had their audit, and given recent ra...
- I'm planning to migrate a multi-database Aurora Serverless v2 (MySQL 8.0) cluster to three standalone RDS MySQL instances for cost optimization. Plan so far: 1. Provision new RDS instances (t4g.smal...
- > Inbound connections to the App Runner exposed port work fine. > > Output connections needed for OAUTH2 fail traversing the NAT gateway. Configuration: VPC: 10.2.0.0/16 SUBNET: 10.2.160.0/24 ROUT...
- Hello, I’m facing an issue where AWS WAF is still blocking certain IP addresses that were previously flagged as originating from one country, even though these IPs have now been updated in MaxMind’s ...
- We are trying to sign into AWS on multiple browsers, but have thus far been unsuccessful. We used to be able to login on multiple browsers using the same password, but now there is an additional step ...
- How much should be approx time taken for EMR batch processing and storing data in Redshift for 1 TB data with simple transformation. I have following characteristics for data * File size varies from...
Recent articles
see all1 / 18
- EXPERTpublished a month ago0 votes161 viewsThis is a series of 3 articles providing guidance in troubleshooting connectivity issues with Amazon VPC Lattice.
- EXPERTpublished a month ago1 votes204 viewsThis is a series of 3 articles providing guidance in troubleshooting connectivity issues with Amazon VPC Lattice.
- EXPERTpublished a month ago1 votes207 viewsThis is a series of 3 articles providing guidance in troubleshooting connectivity issues with Amazon VPC Lattice.
- EXPERTpublished a month ago0 votes85 viewsData protection is the cornerstone of any enterprise storage solution. With Amazon FSx becoming increasingly popular for Linux workloads, implementing robust data protection strategies is crucial. In ...
- EXPERTpublished 2 months ago0 votes189 viewsLearn how to configure Investigation groups required for Amazon Q Developer's operational investigations feature. This guide walks you through the setup process across AWS regions, enabling you to use...
- EXPERTpublished 2 months ago0 votes112 viewsOptimization training for Amazon EKS / Kubernetes based workloads
- EXPERTpublished 2 months ago0 votes120 viewsA step-by-step walkthrough on the new features released in CUDOS v5.5. This guide provides instructions on how to improve cost visibility and maximize savings through Provisioned Capacity Mode and Res...
- AWS OFFICIALUpdated 2 months ago0 votes352 viewsThis blog post explains how AWS Partners can use AWS CloudFormation StackSets to streamline the new **AWSPartnerLedSupportReadOnlyAccess** policy across their organization in AWS Organizations.
- EXPERTpublished 3 months ago1 votes981 viewsThis guide provides an approach to Optimize Amazon CloudWatch spend for your Datadog-AWS Integration
- EXPERTpublished 3 months ago2 votes248 viewsThis article explores strategies for optimizing AWS CloudTrail usage, focusing on high-volume events such as AWS KMS and RDS Data API logs. It explains how these events contribute to increased ingest...
- AWS OFFICIALUpdated 3 months ago1 votes228 viewsThis article is the second part of a series on resilience best practices and key design principles that can minimize business disruptions during outages.
- EXPERTpublished 3 months ago1 votes275 viewsLeveraging AWS Cost Anomaly Detection's machine learning capabilities, organizations can gain comprehensive visibility into anomalous spending patterns, implement tailored monitoring strategies, and t...
- EXPERTpublished 4 months ago0 votes670 viewsLogging and monitoring best practices to operate Amazon Q services, including Amazon Q Business and Amazon Q Developer, at scale.
- EXPERTpublished 4 months ago0 votes320 viewsThis repost focuses on securing Amazon Elastic Kubernetes Service (EKS) clusters using Prowler, an open-source multi-cloud security tool.
- EXPERTpublished 4 months ago2 votes2.3K viewsIn this article we detail how to detect objects encrypted with SSE-C within an S3 bucket, and provide guidance on scaling this approach
- AWS OFFICIALUpdated a month ago1 votes692 viewsThis article is the first part of a series on resilience best practices and key design principles that can minimize business disruptions during outages.
- AWS OFFICIALUpdated 5 months ago4 votes588 viewsThis article explores how AWS Countdown Premium can help you maintain business continuity and resilience during business-critical events and enhance your overall cloud experience.
- EXPERTpublished 5 months ago0 votes144 viewsAs AWS re:Invent kicks off, the excitement is palpable with a series of intriguing announcements made on Day 1, December 1st. In this article, I will swiftly cover my favourite announcements and will ...
Recent selections
see all1 / 2
- EXPERTpublished a year ago9 votes17K viewsRe:invent 2024 takes place in Las Vegas (Nevada) from Monday 12/02 to Friday 12/06. This selection will focus on cost optimization related announcements
- EXPERTpublished 2 years ago4 votes11.3K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTBrettski-AWS
EXPERTAntonio_Lagrotteria
EXPERTOleksii Bebych
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTAdeleke Adebowale Julius
EXPERTTushar_J
EXPERTMatt-B
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTGanesh Kudikala
EXPERTThanniru Anil Kumar
EXPERTSandeep
EXPERTMax Clements
EXPERTNARRAVULA MUNISAI TEJA
EXPERT