Whether you're taking your first steps with Kubernetes or you're an experienced practitioner looking to sharpen your skills, our Amazon EKS workshop series delivers practical, real-world experience that moves you forward. Learn directly from AWS solutions architects and EKS specialists through hands-on sessions designed to build your confidence with Kubernetes. Register now and start building with Amazon EKS!
AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1 / 18
-  I am trying to build a dashboard within Quick Suite using cross function datasets. I seem to be the only one withi...
- Hello, We recently experienced service instability due to automatic security patches being applied to our Amazon MSK cluster during peak business hours (approx. 10:00 AM local time). These updates tr...
- My account looks completely reset after changing password. I don't see services I use, though they seem to work. The account id also changed.
- How i can resolve accessing aws web service in my internal network?
- We’re using Gateway Load Balancer (GWLB) to insert third-party firewalls into our traffic path using GENEVE tunnelling. One thing we’re unclear on: when traffic is forwarded through GWLB to the firew...
- We have an interface VPCendpoint for an AWS service and attached a security group to it. Does the security group control traffic to the endpoint, or just the traffic from the endpoint to the service ?
- Hi! If a client uses my app to collect data and the data is stored in my database who is the owner of the data? I saw that with legal agreements you can define if for example my company stores the da...
- Hi. We have recently migrated from AWS Inspector Classic to AWS Inspector V2 which provides CIS scans for our EC2 fleet. We successfully configured everything and have scans running on several AL2-b...
- Hi, I want to run my own hypervisor (KVM/QEMU) on an EC2 bare metal instance and launch a guest VM that uses AMD SEV (not the EC2 managed SEV-SNP “Confidential VM” mode). Goal: Host: EC2 m6a.metal ...
- I'm using a CloudFront distribution with a Lambda@Edge function as a secure proxy for a Cognito User Pool. The purpose of the function is to intercept outbound POST requests to Cognito, inject a Secre...
- Amazon resource identifier: arn:aws:ec2:eu-north-1:618951595864:instance/*********** Remote IP/Ports: ************ 9068 Protocol: UDP Total Gbits sent: 209.250951216 Total packets sent: 22204048 Tot...
- Hello everyone, I’ve recently earned the AWS Certified Cloud Practitioner and come from a cybersecurity background (INE eEDA), with hands-on experience in security fundamentals, networking, and monit...
- We are using the OpenTelemetry (OTel) Collector to collect logs from our EKS cluster and forward them to a centralized CloudWatch Logs group. Although we are already excluding info‑level logs, our Clo...
- Need help understanding the meaning of Security checks? How are security checks quantified. The first 100,000 security checks per account per region per month cost USD0.001 per check 100,001 – 500,0...
- We are experiencing a routing issue with one of our Site-to-Site VPN tunnels where outbound traffic from on-premises is received by AWS, but return traffic is not being routed back through the same tu...
- I wanted Configure the following in `/etc/pam.d/system-auth and /etc/pam.d/password-auth` auth required pam_tally2.so deny=3 even_deny_root unlock_time=600 TMOUT=600 HISTFILESIZE=0 / HISTSIZE=...
- A notification was sent to my email about suspicious activity involving an access key on my account. Instead of disabling this specific access key, my whole account is restricted from accessing critic...
- AWS Account ID: ************ This AWS account has been taken over. Root access is locked by a hardware MFA device that was never configured or owned by the account holder. As a result, login to the ...
Recent articles
see all1 / 18
- AWS OFFICIALUpdated 3 days ago0 votes28 viewsThis article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs.
- AWS OFFICIALUpdated 7 days ago0 votes42 viewsThis article shows how AWS Unified Operations helps financial institutions enhance their overall operational excellence to meet Digital Operational Resilience Act (DORA) requirements.
- YalaEXPERTpublished 11 days ago0 votes56 viewsThis article provides a ready-to-use Athena SQL query to identify all Amazon ElastiCache clusters running Redis or Valkey engines across AWS accounts using Cost and Usage Report data. Useful for cost ...
- ChirayuEXPERTpublished 16 days ago0 votes67 viewsWell-Architected IaC Analyzer tool
- AbdulMEXPERTpublished 17 days ago0 votes531 viewsThis article provides a practical guide to implementing user-level cost tracking and usage limiting for Amazon Bedrock, helping you maintain visibility and control as your AI applications grow.
- jonthomascampbellEXPERTpublished 18 days ago0 votes43 viewsAmazon EC2 instances that stop cleanly a few minutes after startup are often misinterpreted as experiencing infrastructure instability or hypervisor issues. In many cases, however, this behavior is ca...
- AWS OFFICIALUpdated 21 days ago0 votes318 viewsThis article explains how to use AWS Unified Operations to address the operational challenges of running telecommunications (telecom) workloads at scale. Unified Operations addresses challenges from i...
- jonthomascampbellEXPERTpublished a month ago0 votes100 viewsAmazon EC2 automatic recovery helps restore instances when sustained system-level failures occur. However, customers sometimes notice that automatic recovery does not trigger even though an instance e...
- AWS OFFICIALUpdated a month ago2 votes301 viewsLearn how to integrate Dynatrace with AWS Incident Detection and Response to automate incident response and create context-rich support cases that expedite issue resolution.
- Harish MandhadiEXPERTpublished a month ago0 votes248 viewsStop overpaying for AI. Your chatbot's routine queries shouldn't cost the same as mission-critical transactions. Bedrock's new inference tiers let you optimize each workload independently.
- Mark_SEXPERTpublished a month ago0 votes90 viewsDemonstrates how Java async I/O operations can benefit file processing applications
- Kanwar BajwaEXPERTpublished 2 months ago0 votes179 viewsThis article addresses a common knowledge gap among cloud architects and developers who often misunderstand how Service Level Agreements (SLAs) work in distributed systems.
- Kanwar BajwaEXPERTpublished 2 months ago0 votes100 viewsThis article provides a comprehensive guide for AWS administrators and support teams who need to monitor support cases across multiple AWS accounts within their organization. As organizations scale an...
- Kanwar BajwaEXPERTpublished 2 months ago0 votes105 viewsThis article provides a comprehensive guide for AWS administrators and security teams who need to monitor service adoption across their AWS Organizations. As organizations scale and teams gain autonom...
- AWS OFFICIALUpdated 2 months ago1 votes238 viewsThis article explains how AWS Unified Operations empowers financial services industry (FSI) customers to strengthen resilience against service disruptions and accelerate successful migrations and prod...
- AWS OFFICIALUpdated 2 months ago0 votes248 viewsThis article explains how AWS Unified Operations, our highest tier support plan providing context-aware expertise and rapid resolution addresses the operational challenges of running generative AI (ge...
- AvinashEXPERTpublished 2 months ago1 votes159 viewsPurpose of this article is to offer general guidance on how to troubleshoot issues related to deployment of CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. It summarizes common issue...
- AWS OFFICIALUpdated 2 months ago2 votes494 viewsThis article presents best practices that you can use to collect and manage security data, so that you can differentiate legitimate entities from threat actors.
Recent selections
see all1 / 5
- Benjamin LecoqEXPERTpublished 2 years ago9 votes17.2K viewsRe:invent 2024 takes place in Las Vegas (Nevada) from Monday 12/02 to Friday 12/06. This selection will focus on cost optimization related announcements
- Jonathan_DEXPERTpublished 2 years ago4 votes12K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes81 viewsDo you want to monitor your Amazon WorkSpaces usage and optimize your costs? Deploy Cost Optimizer for Amazon WorkSpaces to review your WorkSpaces usage and manage costs.
- AWS OFFICIALUpdated 2 years ago0 votes73 viewsThis selection includes content and solutions supporting FSI related compliance and requirements covering security, immutable storage, and general guidance.
- AWS OFFICIALUpdated 2 years ago0 votes106 viewsAs a best practice, AWS recommends that you use AWS Identity and Access Management (IAM) roles instead of IAM users with long-term credentials such as access keys.
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTAntonio Lagrotteria
EXPERTOleksii Bebych
EXPERTOsvaldo Marte
EXPERTSedat SALMAN
EXPERTAdeleke Adebowale .J.
EXPERTTushar Jagdale
EXPERTMatt Barbieri
EXPERTSHAJAM
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTGK
EXPERTGunasekaran, Makendran
EXPERTGarre Sandeep
EXPERTThanniru Anil Kumar
EXPERTMax Clements
EXPERT
