Networking & Content Delivery

Integrating AWS Verified Access with device trust providers

In this post, we discuss how to architect Zero Trust based remote connectivity on AWS. Specifically, we will be exploring how to integrate Verified Access with CrowdStrike, a device trust provider. This solution builds upon the Okta-based identity provider integration previously published in this AWS post. Zero Trust is a conceptual model, and an associated […]

Deploying hybrid networks using AWS Cloud WAN and AWS Direct Connect

AWS Cloud WAN is a managed wide-area networking (WAN) service for building, managing, and monitoring a unified global network, as well as connecting resources running across your cloud and on-premises environments. We work with many customers to build hybrid networks that connect their on-premises environments to Cloud WAN using AWS Direct Connect. This extends their […]

Removing Unassociated Elastic IPs

Have you ever wondered why your Elastic IP (EIP) count is growing, and what’s behind the “ElasticIP:IdleAddress” line item on your AWS bill? This could be because there is an hourly charge for EIP addresses that are not associated with a running instance, when an EIP is associated with a stopped instance, or when there […]

Improving Performance on AWS and Hybrid Networks

In this post, we provide recommendations to improve network performance on AWS and hybrid networks. In today’s enterprise networking environment, it is becoming common for customers to have multi-gigabit connectivity to AWS either through AWS Direct Connect or over the Internet. Although network bandwidth is fundamental, several other factors come into play for network performance, […]

Set up end-to-end tracing with Amazon CloudFront using OpenTelemetry

In a modern distributed system, identifying where a problem has occurred is not a trivial task. In fact, it’s a key capability that an organization must master to maintain its competitiveness. Tracing is a great methodology to be used for this purpose. It creates a series of formatted logs with an identifier called Trace ID, which […]

Using AWS WAF intelligent threat mitigations with cross-origin API access

AWS WAF offers advanced features for filtering undesired web application traffic, such as Bot Control and Fraud Control. These intelligent threat mitigations include techniques such as client-side interrogations using JavaScript challenges or CAPTCHA, as well as client-side behavioral analysis. Implementing these techniques on a web page with a same-origin access is simple. When a cross-domain […]

Ataccama: Building our global network with AWS Cloud WAN

Ataccama is a global software company with a unified platform for automating data quality, MDM, and metadata management – Ataccama ONE. We specialize in complex enterprise data governance solutions that provide sustainable, long-term value. At Ataccama, we migrated our global wide area network to AWS Cloud WAN to simplify configuration and management. In this post, […]

External Connectivity to Amazon VPC Lattice

In this blog post, we discuss how to connect on-premises and external services to Amazon VPC Lattice. We will go over architectural considerations and requirements for connecting services from trusted locations (on-premises), non-trusted locations (3rd party), and across AWS Regions. Then, we provide a solution that builds out a capability to facilitate this using AWS […]

Segmenting hybrid networks with AWS Transit Gateway connect

Virtual Routing and Forwarding (VRF) is a traditional network feature which uses isolated logical routing domains (route tables/VRFs) to keep network traffic segregated within the same physical infrastructure. Customers ask us how to combine the segmentation provided by AWS Cloud WAN and AWS Transit Gateway with VRF isolation when connecting their on-premises networks to AWS. […]

Using load balancer target group health thresholds to improve availability

Introduction AWS recently added features to our Elastic Load Balancers (ELB) that give you control over when they take measures to shift traffic between targets. In this blog, we will explore these new capabilities and review how you can use them to improve the availability and resiliency of your applications. Two types of Elastic Load […]