Sumo Logic offers a powerful cloud-native analytics solution that supports all types of machine data. Our platform integrates easily with your AWS infrastructure supporting fast, accurate and secure analysis and monitoring of enormous amounts of data—giving you clear and direct visibility into its operations.
In this webinar, you’ll learn how organizations such as Greenhouse Software harness cloud-native machine data analytics to optimize the internal and external process lifecycles, monitor the health of all AWS application and services and deliver a WOW application to their end users.
From On-Premises to Cloud: Modernize Data Protection with Druva Phoenix and AWSAmazon Web Services
Maintaining expensive and diverse backup schemes across a large enterprise requires internal infrastructure management and high costs. Druva Phoenix solves this problem by helping companies bring their backup into the cloud. In this webinar, you’ll learn how Druva helped AWS customer TRC Companies Inc. (NYSE:TRR), a national engineering, environmental consulting and construction management firm, to significantly lower their backup costs and storage footprint as well as modernize their overall data protection strategy. Attendees will learn how to leverage modern backup technology to scale on demand, how to maintain security and compliance across all data, and how to implement additional best practices for moving backup to the cloud.
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
In this session, we’ll show how customers can use management tools to standardize the creation of AWS resources and then govern these resources through the lifecycle. By using AWS CloudFormation and AWS Service Catalog to provision resources at scale, AWS Config to audit any changes to the configuration of these resources, Amazon CloudWatch to monitor the health of these resources, and AWS CloudTrail to audit who or what made API calls to these resources, customers can automate and scale the administration of their infrastructure on AWS. They can even go one step further and automate compliance checking and remediation by using AWS Config rules and Amazon CloudWatch Events. We will demo how this is possible by looking at some common use cases.
AWS re:Invent 2016: Evolving an Enterprise-Level Compliance Framework with Am...Amazon Web Services
Johnson & Johnson is in the process of doing a proof of concept to rewrite the compliance framework that they presented at re:Invent 2014. This framework leverages the newest AWS services and abandons the need for continual describes and master rules servers. Instead, Johnson & Johnson plans to use a distributed, event-based architecture that not only reduces costs but also assigns costs to the appropriate projects rather than central IT.
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016Amazon Web Services
By building your application with AWS Lambda, Amazon API Gateway, and Amazon DynamoDB, you can free yourself from the burden of managing servers while gaining agility and simple scaling. After introducing the basics of building microservices with AWS Lambda and Amazon API Gateway, the session highlights how the Democratic National Committee (DNC) Technology Team uses AWS Lambda and Amazon DynamoDB microservices to provide campaigns and state parties customized applications on top of a core data platform. This serverless architecture has helped the DNC Technology Team improve their microservice functionality and development process, ensuring their applications are performant through the extremely erratic usage levels of a campaign cycle.
AWS re:Invent 2016: Using AWS Lambda to Build Control Systems for Your AWS In...Amazon Web Services
Defining infrastructure resource policies in an organized manner can help your company better manage its infrastructure resources.
This session familiarizes you with using AWS Lambda to process data and provide control logic for your infrastructure. You can use Amazon CloudWatch Events to monitor infrastructure resources in real-time, and you can use AWS Lambda to react to events based on a set of rules. We demonstrate how you can build a rules engine for creating, monitoring, and managing policies. This is all done using Alexa and Alexa Skills Kit.
This document summarizes a presentation given at the AWS London Summit in July 2016 about getting started with AWS Lambda and serverless computing. It discusses what serverless computing is and how it differs from virtual machines and containers. It also outlines some common use cases for AWS Lambda like data processing, backend services, and gluing systems together. The presentation covers topics like how to choose between Lambda, EC2, and ECS, recent updates to Lambda, best practices for using Lambda with VPC, and a customer case study from Parallax about building serverless applications.
BDA402 Deep Dive: Log Analytics with Amazon Elasticsearch ServiceAmazon Web Services
Everything generates logs. Applications, infrastructure, security ... everything. Keeping track of the flood of log data is a big challenge, yet critical to your ability to understand your systems and troubleshoot (or prevent) issues. In this session, we will use both Amazon CloudWatch and application logs to show you how to build an end-to-end log analytics solution. First, we cover how to configure an Amazon Elaticsearch Service domain and ingest data into it using Amazon Kinesis Firehose, demonstrating how easy it is to transform data with Firehose. We look at best practices for choosing instance types, storage options, shard counts, and index rotations based on the throughput of incoming data and configure a secure analytics environment. We demonstrate how to set up a Kibana dashboard and build custom dashboard widgets. Finally, we dive deep into the Elasticsearch query DSL and review approaches for generating custom, ad-hoc reports.
From On-Premises to Cloud: Modernize Data Protection with Druva Phoenix and AWSAmazon Web Services
Maintaining expensive and diverse backup schemes across a large enterprise requires internal infrastructure management and high costs. Druva Phoenix solves this problem by helping companies bring their backup into the cloud. In this webinar, you’ll learn how Druva helped AWS customer TRC Companies Inc. (NYSE:TRR), a national engineering, environmental consulting and construction management firm, to significantly lower their backup costs and storage footprint as well as modernize their overall data protection strategy. Attendees will learn how to leverage modern backup technology to scale on demand, how to maintain security and compliance across all data, and how to implement additional best practices for moving backup to the cloud.
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
In this session, we’ll show how customers can use management tools to standardize the creation of AWS resources and then govern these resources through the lifecycle. By using AWS CloudFormation and AWS Service Catalog to provision resources at scale, AWS Config to audit any changes to the configuration of these resources, Amazon CloudWatch to monitor the health of these resources, and AWS CloudTrail to audit who or what made API calls to these resources, customers can automate and scale the administration of their infrastructure on AWS. They can even go one step further and automate compliance checking and remediation by using AWS Config rules and Amazon CloudWatch Events. We will demo how this is possible by looking at some common use cases.
AWS re:Invent 2016: Evolving an Enterprise-Level Compliance Framework with Am...Amazon Web Services
Johnson & Johnson is in the process of doing a proof of concept to rewrite the compliance framework that they presented at re:Invent 2014. This framework leverages the newest AWS services and abandons the need for continual describes and master rules servers. Instead, Johnson & Johnson plans to use a distributed, event-based architecture that not only reduces costs but also assigns costs to the appropriate projects rather than central IT.
Getting Started with Serverless Architectures | AWS Public Sector Summit 2016Amazon Web Services
By building your application with AWS Lambda, Amazon API Gateway, and Amazon DynamoDB, you can free yourself from the burden of managing servers while gaining agility and simple scaling. After introducing the basics of building microservices with AWS Lambda and Amazon API Gateway, the session highlights how the Democratic National Committee (DNC) Technology Team uses AWS Lambda and Amazon DynamoDB microservices to provide campaigns and state parties customized applications on top of a core data platform. This serverless architecture has helped the DNC Technology Team improve their microservice functionality and development process, ensuring their applications are performant through the extremely erratic usage levels of a campaign cycle.
AWS re:Invent 2016: Using AWS Lambda to Build Control Systems for Your AWS In...Amazon Web Services
Defining infrastructure resource policies in an organized manner can help your company better manage its infrastructure resources.
This session familiarizes you with using AWS Lambda to process data and provide control logic for your infrastructure. You can use Amazon CloudWatch Events to monitor infrastructure resources in real-time, and you can use AWS Lambda to react to events based on a set of rules. We demonstrate how you can build a rules engine for creating, monitoring, and managing policies. This is all done using Alexa and Alexa Skills Kit.
This document summarizes a presentation given at the AWS London Summit in July 2016 about getting started with AWS Lambda and serverless computing. It discusses what serverless computing is and how it differs from virtual machines and containers. It also outlines some common use cases for AWS Lambda like data processing, backend services, and gluing systems together. The presentation covers topics like how to choose between Lambda, EC2, and ECS, recent updates to Lambda, best practices for using Lambda with VPC, and a customer case study from Parallax about building serverless applications.
BDA402 Deep Dive: Log Analytics with Amazon Elasticsearch ServiceAmazon Web Services
Everything generates logs. Applications, infrastructure, security ... everything. Keeping track of the flood of log data is a big challenge, yet critical to your ability to understand your systems and troubleshoot (or prevent) issues. In this session, we will use both Amazon CloudWatch and application logs to show you how to build an end-to-end log analytics solution. First, we cover how to configure an Amazon Elaticsearch Service domain and ingest data into it using Amazon Kinesis Firehose, demonstrating how easy it is to transform data with Firehose. We look at best practices for choosing instance types, storage options, shard counts, and index rotations based on the throughput of incoming data and configure a secure analytics environment. We demonstrate how to set up a Kibana dashboard and build custom dashboard widgets. Finally, we dive deep into the Elasticsearch query DSL and review approaches for generating custom, ad-hoc reports.
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...Amazon Web Services
File sync and share applications have become a cornerstone of collaboration in modern organizations; securing and managing content is an ongoing challenge. Amazon WorKDocs is a fully managed, secure file storage and sharing service with strong administrative controls and feedback capabilities. In this session, we’ll demonstrate how you can use Amazon WorkDocs to manage files and secure content, and show you how we’re shaping Amazon WorkDocs to be a full-fledged productivity tool for users. We'll also present a technical overview of the WorkDocs SDKs, and how they allow you to use existing IT tools for antivirus protection, data loss prevention, analystics, and more.
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)Amazon Web Services
Serverless architectures let you build and deploy applications and services with infrastructure resources that require zero administration. In the past, you had to provision and scale servers to run your application code, install and operate distributed databases, and build and run custom software to handle API requests. Now, AWS provides a stack of scalable, fully-managed services that eliminates these operational complexities.
In this session, you learn about the concepts and benefits of serverless architectures and the basics of the serverless stack AWS provides (e.g., AWS Lambda and Amazon API Gateway). We discuss use cases such as data processing, website backends, serverless applications and "operational glue". After that, you get practical tips and tricks, best practices, and architecture patterns that you can take back and implement immediately.
Leo Zhadanovsky from Amazon Web Services gave a presentation on building serverless web applications. He discussed AWS Lambda concepts like no servers to manage and pay per usage model. He also covered API Gateway for unifying APIs, Lambda environment variables, and common use cases like web apps and data processing. Design patterns like moving from a monolithic to microservices architecture were explained. The AWS Serverless Application Model (SAM) and frameworks like Chalice and ClaudiaJS were presented as tools for defining and deploying serverless applications.
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...Amazon Web Services
Large enterprises face unique procurement, scaling, and management challenges with their software portfolio. AWS has two services in AWS Marketplace and AWS Service Catalog which combine to address these challenges uniquely. Attend this session to learn how the newly launched integration between these two services can help IT Managers and IT Procurement manage the lifecycle of their software portfolios, how the new integration works with popular use cases, and for a demo.
The State of Serverless Computing | AWS Public Sector Summit 2017Amazon Web Services
oin us to learn about the state of serverless computing from Dougal Ballantyne, Principal Product Manager, Serverless. Dougal Ballantyne discusses the latest developments from AWS Lambda and the serverless computing ecosystem. He talks about how serverless computing is becoming a core component in how companies build and run their applications and services, and he also discusses how serverless computing will continue to evolve. Learn More: https://aws.amazon.com/government-education/
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...Amazon Web Services
Amazon API Gateway and AWS Lambda provide a new way of building applications by removing servers from the picture. But what does the removal of servers mean to tasks like deployment, monitoring, and debugging? How should you set up blue-green deployments or set alarms? Come learn all this and more, including ways to use AWS services and tools like AWS CodePipeline, AWS CloudFormation, and Amazon CloudWatch to manage your serverless applications at high quality. We will also demonstrate how you can implement a Continuous Integration and Continuous Delivery pipeline for a serverless application within minutes using AWS CodeStar. Learn More: https://aws.amazon.com/government-education/
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy environments. We'll take a look at several reference architectures for common workloads and highlight the innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the shared security responsibility model and how you can inherit controls from the rich compliance and accreditation programs maintained by AWS.
In this session, you'll learn what’s new and hot with AWS Lambda. Come on a tour with Dr. Tim Wagner, General Manager of AWS Lambda, to learn what we’ve been working on and what we are planning for the future. You'll get a hands-on demonstration of some our newest features which will provide you with a launching pad for some of the later sessions in the day.
(BDT307) Zero Infrastructure, Real-Time Data Collection, and AnalyticsAmazon Web Services
This document summarizes a presentation given by Steve Abraham and Brian Filppu on collecting and analyzing large amounts of real-time data with zero infrastructure using AWS services. It discusses using Amazon API Gateway to ingest data, Amazon Kinesis to collect and store data, AWS Lambda to process data in real-time, and Amazon Redshift and Aurora for analytics and querying. It also provides a case study of how Zillow uses this architecture to collect and analyze mobile app metrics.
Rackspace Fanatical Support for AWS™, with our army of AWS experts, can help implement the ideal combination of cultural philosophies, practices, and tools which enable an organization to deliver applications and services at high velocity. This speed enables organizations to better serve their customers and compete more effectively in the market by allowing them to evolve and improve products at a faster pace than organizations using traditional software development and infrastructure management processes. Join our upcoming webinar to learn how ScriptDrop leveraged Rackspace to develop a best practices DevOps pipeline utilizing the latest AWS technologies, quickly and efficiently.
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...Amazon Web Services
IT is evolving from a cost center to a source of continuous innovation for business. At the heart of this transition are modern, revenue-generating applications, based on dynamic architectures that constantly evolve to keep pace with end-customer demands. This dynamic application environment requires a new, comprehensive approach to traditional monitoring – one based on real-time, end-to-end visibility and analytics across the entire application lifecycle and stack, instead of monitoring by piecemeal. This presentation highlights practical advice on how developers and operators can leverage data and analytics to glean critical information about their modern applications. In this session, we will cover the types of data important for today’s modern applications. We’ll discuss visibility and analytics into data sources such as AWS services (e.g., Amazon CloudWatch, AWS Lambda, VPC Flow Logs, Amazon EC2, Amazon S3, etc.), development tool chain, and custom metrics, and describe how to use analytics to understand business performance and behaviors. We discuss a comprehensive approach to monitoring, troubleshooting, and customer usage insights, provide examples of effective data analytics to improve software quality, and describe an end-to-end customer use case that highlights how analytics applies to the modern app lifecycle and stack. Session sponsored by Sumo Logic.
AWS Competency Partner
Advanced AWS techniques from the trenches of the Enterprise – Sourced GroupAmazon Web Services
Every environment comes with its own set of unique challenges. Looking across our global client base, advanced techniques have emerged to solve common or sometimes, very specific, problems. Techniques such as a re-imagining of autonomous healing, advanced networking and proxying patterns, data ex-filtration controls, and continuous delivery of networks will be covered. This fast-paced technical session will provide an in the trenches view of some of the solutions, discussion of considerations at scale, demonstration, and provide actionable designs to take into your organisation. Join us while we present tips, strategies, and cutting edge patterns from Sourced's battle-hardened consultants
Speakers:
John Painter, Principal Consultant, Sourced Group
Brent Harrison, Consultant, Sourced Group
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn how to build applications on AWS from a strong foundation on SQL Server
- Learn when to deploy SQL Server on Amazon EC2 versus Amazon RDS
- Learn how to take advantage of the latest features in SQL Server 2016 when running on AWS
Enterprises are quickly moving database workloads like SQL Server to the cloud, but with so many options, the best approach isn’t always obvious. You exercise full control of your SQL Server workloads by running them on Amazon EC2 instances, or leverage Amazon RDS for a fully managed database experience. This session will go deep on best practices and considerations for running SQL Server on AWS. We will cover best practices for deploying SQL Server, how to choose between Amazon EC2 and Amazon RDS, ways to optimize the performance of your SQL Server deployment for different applications types. We review in detail how to provision and monitor your SQL Server databases, and how to manage scalability, performance, availability, security, and backup and recovery, in both Amazon RDS and Amazon EC2.
This session provides an overview of how organizations can migrate workloads to the AWS cloud at scale. We will go through available migration frameworks and best practices with common use case examples during this session. After migrating the initial workloads, understand how to migrate at scale to the AWS cloud. Hear about real life experiences from the AWS Professional Services team and learn about common use case examples, frameworks, and best practices. Hear about what to avoid when migrating applications at scale to AWS and understand the tools and partner services that can assist you when migrating applications to AWS.
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...Amazon Web Services
Gilt, a global e-commerce company, implemented a sophisticated microservices architecture on AWS to handle millions of customers visiting their site at noon every day. The microservices architecture pattern enables independent service scaling, faster deployments, better fault isolation, and graceful degradation. In this session, Emerson Loureiro, Sr. Software Engineer at Gilt, will share Gilt's experiences and lessons learned during their evolution from a single monolithic Rails application in a traditional data center to more than 300 Scala/Java microservices deployed in the cloud. Derek Chiles, AWS Solutions Architect, will review best practices and recommended architectures for deploying microservices on AWS.
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)Amazon Web Services
Serverless architecture can eliminate the need to provision and manage servers required to process files or streaming data in real time.
In this session, we will cover the fundamentals of using AWS Lambda to process data in real-time from push sources such as AWS Iot and pull sources such as Amazon DynamoDB Streams or Amazon Kinesis. We will walk through sample use cases and demonstrate how to set up some of these real-time data processing solutions. We'll also discuss best practices and do a deep dive into AWS Lambda real-time stream processing.
You also hear from speakers from Thomson Reuters, who discuss how the company leverages AWS for its Product Insight service. The service provides insights to collect usage analytics for Thomson Reuters products. The speakers walk through its architecture and demonstrate how they leverage Amazon Kinesis Streams, Amazon Kinesis Firehose, AWS Lambda, Amazon S3, Amazon Route 53, and AWS KMS for near real-time access to data being collected around the globe. They also outline how applying AWS methodologies benefited its business, such as time-to-market and cross-region ingestion, auto-scaling capabilities, low-latency, security features, and extensibility.
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...Amazon Web Services
AWS provides unprecedented computational power for graphics-intensive applications in areas such as design, engineering simulations, and 3D content rendering. Together, Amazon EC2 Elastic GPUs and Amazon AppStream provide the capabilities necessary for end users to access and run these applications. In this session, you learn more about Elastic GPUs and Amazon AppStream, and how you can run graphics-intensive applications on AWS. You also hear from ANSYS, a leader in engineering simulation software, and why they are moving the ANSYS Enterprise Cloud to Elastic GPUs and Amazon AppStream to deliver a better experience for customers.
SEC303 Automating Security in Cloud Workloads with DevSecOpsAmazon Web Services
This session is designed to teach security engineers, developers, solutions architects, and other technical security practitioners how to use a DevSecOps approach to design and build robust security controls at cloud-scale. This session walks through the design considerations of operating high-assurance workloads on top of the AWS platform and provides examples of how to automate configuration management and generate audit evidence for your own workloads. We’ll discuss practical examples using real code for automating security tasks, then dive deeper to map the configurations against various industry frameworks. This advanced session showcases how continuous integration and deployment pipelines can accelerate the speed of security teams and improve collaboration with software development teams.
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...Amazon Web Services
The document summarizes how Chick-fil-A scaled their mobile app, Chick-fil-A One, during its launch using Amazon DynamoDB and AWS services. It discusses how the app saw 6 million registrations in 30 days and how the architecture was designed using microservices and DynamoDB to handle the massive scale. It also provides lessons learned around load testing, visibility, and deployment strategies when handling large volumes of traffic.
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)Amazon Web Services
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
This document discusses a webinar about using Sumo Logic and AWS services for big data analytics and compliance. The webinar covers an introduction to AWS Cloud, an overview of Sumo Logic and its advantages, and a customer case study of how InsideView uses Sumo Logic and AWS CloudTrail logs to gain visibility across hybrid infrastructure and demonstrate compliance. Sumo Logic provides log analysis of data from both on-premises and cloud sources to help customers meet security, operations, and business needs.
Scaling Your Tools for Your Modern ApplicationSumo Logic
In this presentation, we discuss Hootsuite - a customer of Sumo Logic and the leading provider of social media management services for enterprises - and their journey off of open source tools to Sumo Logic, including:
- The challenges in running & managing solutions like ELK and Graphite
- Sumo Logic unified logs and metrics monitoring solution and its advanced analytics, dashboarding and troubleshooting capabilities
- How Hootsuite was able to leverage Sumo Logic to deliver excellent user experience to their end customers
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...Amazon Web Services
File sync and share applications have become a cornerstone of collaboration in modern organizations; securing and managing content is an ongoing challenge. Amazon WorKDocs is a fully managed, secure file storage and sharing service with strong administrative controls and feedback capabilities. In this session, we’ll demonstrate how you can use Amazon WorkDocs to manage files and secure content, and show you how we’re shaping Amazon WorkDocs to be a full-fledged productivity tool for users. We'll also present a technical overview of the WorkDocs SDKs, and how they allow you to use existing IT tools for antivirus protection, data loss prevention, analystics, and more.
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)Amazon Web Services
Serverless architectures let you build and deploy applications and services with infrastructure resources that require zero administration. In the past, you had to provision and scale servers to run your application code, install and operate distributed databases, and build and run custom software to handle API requests. Now, AWS provides a stack of scalable, fully-managed services that eliminates these operational complexities.
In this session, you learn about the concepts and benefits of serverless architectures and the basics of the serverless stack AWS provides (e.g., AWS Lambda and Amazon API Gateway). We discuss use cases such as data processing, website backends, serverless applications and "operational glue". After that, you get practical tips and tricks, best practices, and architecture patterns that you can take back and implement immediately.
Leo Zhadanovsky from Amazon Web Services gave a presentation on building serverless web applications. He discussed AWS Lambda concepts like no servers to manage and pay per usage model. He also covered API Gateway for unifying APIs, Lambda environment variables, and common use cases like web apps and data processing. Design patterns like moving from a monolithic to microservices architecture were explained. The AWS Serverless Application Model (SAM) and frameworks like Chalice and ClaudiaJS were presented as tools for defining and deploying serverless applications.
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...Amazon Web Services
Large enterprises face unique procurement, scaling, and management challenges with their software portfolio. AWS has two services in AWS Marketplace and AWS Service Catalog which combine to address these challenges uniquely. Attend this session to learn how the newly launched integration between these two services can help IT Managers and IT Procurement manage the lifecycle of their software portfolios, how the new integration works with popular use cases, and for a demo.
The State of Serverless Computing | AWS Public Sector Summit 2017Amazon Web Services
oin us to learn about the state of serverless computing from Dougal Ballantyne, Principal Product Manager, Serverless. Dougal Ballantyne discusses the latest developments from AWS Lambda and the serverless computing ecosystem. He talks about how serverless computing is becoming a core component in how companies build and run their applications and services, and he also discusses how serverless computing will continue to evolve. Learn More: https://aws.amazon.com/government-education/
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...Amazon Web Services
Amazon API Gateway and AWS Lambda provide a new way of building applications by removing servers from the picture. But what does the removal of servers mean to tasks like deployment, monitoring, and debugging? How should you set up blue-green deployments or set alarms? Come learn all this and more, including ways to use AWS services and tools like AWS CodePipeline, AWS CloudFormation, and Amazon CloudWatch to manage your serverless applications at high quality. We will also demonstrate how you can implement a Continuous Integration and Continuous Delivery pipeline for a serverless application within minutes using AWS CodeStar. Learn More: https://aws.amazon.com/government-education/
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy environments. We'll take a look at several reference architectures for common workloads and highlight the innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the shared security responsibility model and how you can inherit controls from the rich compliance and accreditation programs maintained by AWS.
In this session, you'll learn what’s new and hot with AWS Lambda. Come on a tour with Dr. Tim Wagner, General Manager of AWS Lambda, to learn what we’ve been working on and what we are planning for the future. You'll get a hands-on demonstration of some our newest features which will provide you with a launching pad for some of the later sessions in the day.
(BDT307) Zero Infrastructure, Real-Time Data Collection, and AnalyticsAmazon Web Services
This document summarizes a presentation given by Steve Abraham and Brian Filppu on collecting and analyzing large amounts of real-time data with zero infrastructure using AWS services. It discusses using Amazon API Gateway to ingest data, Amazon Kinesis to collect and store data, AWS Lambda to process data in real-time, and Amazon Redshift and Aurora for analytics and querying. It also provides a case study of how Zillow uses this architecture to collect and analyze mobile app metrics.
Rackspace Fanatical Support for AWS™, with our army of AWS experts, can help implement the ideal combination of cultural philosophies, practices, and tools which enable an organization to deliver applications and services at high velocity. This speed enables organizations to better serve their customers and compete more effectively in the market by allowing them to evolve and improve products at a faster pace than organizations using traditional software development and infrastructure management processes. Join our upcoming webinar to learn how ScriptDrop leveraged Rackspace to develop a best practices DevOps pipeline utilizing the latest AWS technologies, quickly and efficiently.
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...Amazon Web Services
IT is evolving from a cost center to a source of continuous innovation for business. At the heart of this transition are modern, revenue-generating applications, based on dynamic architectures that constantly evolve to keep pace with end-customer demands. This dynamic application environment requires a new, comprehensive approach to traditional monitoring – one based on real-time, end-to-end visibility and analytics across the entire application lifecycle and stack, instead of monitoring by piecemeal. This presentation highlights practical advice on how developers and operators can leverage data and analytics to glean critical information about their modern applications. In this session, we will cover the types of data important for today’s modern applications. We’ll discuss visibility and analytics into data sources such as AWS services (e.g., Amazon CloudWatch, AWS Lambda, VPC Flow Logs, Amazon EC2, Amazon S3, etc.), development tool chain, and custom metrics, and describe how to use analytics to understand business performance and behaviors. We discuss a comprehensive approach to monitoring, troubleshooting, and customer usage insights, provide examples of effective data analytics to improve software quality, and describe an end-to-end customer use case that highlights how analytics applies to the modern app lifecycle and stack. Session sponsored by Sumo Logic.
AWS Competency Partner
Advanced AWS techniques from the trenches of the Enterprise – Sourced GroupAmazon Web Services
Every environment comes with its own set of unique challenges. Looking across our global client base, advanced techniques have emerged to solve common or sometimes, very specific, problems. Techniques such as a re-imagining of autonomous healing, advanced networking and proxying patterns, data ex-filtration controls, and continuous delivery of networks will be covered. This fast-paced technical session will provide an in the trenches view of some of the solutions, discussion of considerations at scale, demonstration, and provide actionable designs to take into your organisation. Join us while we present tips, strategies, and cutting edge patterns from Sourced's battle-hardened consultants
Speakers:
John Painter, Principal Consultant, Sourced Group
Brent Harrison, Consultant, Sourced Group
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn how to build applications on AWS from a strong foundation on SQL Server
- Learn when to deploy SQL Server on Amazon EC2 versus Amazon RDS
- Learn how to take advantage of the latest features in SQL Server 2016 when running on AWS
Enterprises are quickly moving database workloads like SQL Server to the cloud, but with so many options, the best approach isn’t always obvious. You exercise full control of your SQL Server workloads by running them on Amazon EC2 instances, or leverage Amazon RDS for a fully managed database experience. This session will go deep on best practices and considerations for running SQL Server on AWS. We will cover best practices for deploying SQL Server, how to choose between Amazon EC2 and Amazon RDS, ways to optimize the performance of your SQL Server deployment for different applications types. We review in detail how to provision and monitor your SQL Server databases, and how to manage scalability, performance, availability, security, and backup and recovery, in both Amazon RDS and Amazon EC2.
This session provides an overview of how organizations can migrate workloads to the AWS cloud at scale. We will go through available migration frameworks and best practices with common use case examples during this session. After migrating the initial workloads, understand how to migrate at scale to the AWS cloud. Hear about real life experiences from the AWS Professional Services team and learn about common use case examples, frameworks, and best practices. Hear about what to avoid when migrating applications at scale to AWS and understand the tools and partner services that can assist you when migrating applications to AWS.
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...Amazon Web Services
Gilt, a global e-commerce company, implemented a sophisticated microservices architecture on AWS to handle millions of customers visiting their site at noon every day. The microservices architecture pattern enables independent service scaling, faster deployments, better fault isolation, and graceful degradation. In this session, Emerson Loureiro, Sr. Software Engineer at Gilt, will share Gilt's experiences and lessons learned during their evolution from a single monolithic Rails application in a traditional data center to more than 300 Scala/Java microservices deployed in the cloud. Derek Chiles, AWS Solutions Architect, will review best practices and recommended architectures for deploying microservices on AWS.
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)Amazon Web Services
Serverless architecture can eliminate the need to provision and manage servers required to process files or streaming data in real time.
In this session, we will cover the fundamentals of using AWS Lambda to process data in real-time from push sources such as AWS Iot and pull sources such as Amazon DynamoDB Streams or Amazon Kinesis. We will walk through sample use cases and demonstrate how to set up some of these real-time data processing solutions. We'll also discuss best practices and do a deep dive into AWS Lambda real-time stream processing.
You also hear from speakers from Thomson Reuters, who discuss how the company leverages AWS for its Product Insight service. The service provides insights to collect usage analytics for Thomson Reuters products. The speakers walk through its architecture and demonstrate how they leverage Amazon Kinesis Streams, Amazon Kinesis Firehose, AWS Lambda, Amazon S3, Amazon Route 53, and AWS KMS for near real-time access to data being collected around the globe. They also outline how applying AWS methodologies benefited its business, such as time-to-market and cross-region ingestion, auto-scaling capabilities, low-latency, security features, and extensibility.
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...Amazon Web Services
AWS provides unprecedented computational power for graphics-intensive applications in areas such as design, engineering simulations, and 3D content rendering. Together, Amazon EC2 Elastic GPUs and Amazon AppStream provide the capabilities necessary for end users to access and run these applications. In this session, you learn more about Elastic GPUs and Amazon AppStream, and how you can run graphics-intensive applications on AWS. You also hear from ANSYS, a leader in engineering simulation software, and why they are moving the ANSYS Enterprise Cloud to Elastic GPUs and Amazon AppStream to deliver a better experience for customers.
SEC303 Automating Security in Cloud Workloads with DevSecOpsAmazon Web Services
This session is designed to teach security engineers, developers, solutions architects, and other technical security practitioners how to use a DevSecOps approach to design and build robust security controls at cloud-scale. This session walks through the design considerations of operating high-assurance workloads on top of the AWS platform and provides examples of how to automate configuration management and generate audit evidence for your own workloads. We’ll discuss practical examples using real code for automating security tasks, then dive deeper to map the configurations against various industry frameworks. This advanced session showcases how continuous integration and deployment pipelines can accelerate the speed of security teams and improve collaboration with software development teams.
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...Amazon Web Services
The document summarizes how Chick-fil-A scaled their mobile app, Chick-fil-A One, during its launch using Amazon DynamoDB and AWS services. It discusses how the app saw 6 million registrations in 30 days and how the architecture was designed using microservices and DynamoDB to handle the massive scale. It also provides lessons learned around load testing, visibility, and deployment strategies when handling large volumes of traffic.
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)Amazon Web Services
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
This document discusses a webinar about using Sumo Logic and AWS services for big data analytics and compliance. The webinar covers an introduction to AWS Cloud, an overview of Sumo Logic and its advantages, and a customer case study of how InsideView uses Sumo Logic and AWS CloudTrail logs to gain visibility across hybrid infrastructure and demonstrate compliance. Sumo Logic provides log analysis of data from both on-premises and cloud sources to help customers meet security, operations, and business needs.
Scaling Your Tools for Your Modern ApplicationSumo Logic
In this presentation, we discuss Hootsuite - a customer of Sumo Logic and the leading provider of social media management services for enterprises - and their journey off of open source tools to Sumo Logic, including:
- The challenges in running & managing solutions like ELK and Graphite
- Sumo Logic unified logs and metrics monitoring solution and its advanced analytics, dashboarding and troubleshooting capabilities
- How Hootsuite was able to leverage Sumo Logic to deliver excellent user experience to their end customers
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Amazon Web Services
This document summarizes Christian Beedgen's presentation on using AWS to build a scalable machine data analytics service. The presentation covers the architecture of Sumo Logic's service, which ingests machine-generated log data from customers in near real-time and performs analytics. It discusses how the service is built as loosely coupled microservices deployed across AWS with automation. Challenges of scaling such a distributed system are also addressed.
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
This session enables security operators to automate governance and implement use cases addressed by AWS services such as AWS CloudTrail, AWS Config Rules, Amazon CloudWatch Events, and Trusted Advisor. Based on the nature of vulnerabilities, internal processes, compliance regimes, and other priorities, this session discusses the service to use when. We also show how to detect, report, and fix vulnerabilities, or gain more information about attackers. We dive deep into new features and capabilities of relevant services and use an example from an AWS customer, Siemens AG, about how to best automate governance and scale. A prerequisite for this session is knowledge of security and basic software development using Java, Python, or Node.
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Sumo Logic
This document summarizes a webinar on continuous compliance in the cloud presented by thought leaders from Sumo Logic, Coalfire Systems, and AWS. It discusses the shared responsibility model of security between cloud providers and customers. It also covers auditing cloud environments, challenges of compliance in the cloud, benefits of using cloud services for compliance, and how security analytics can help with cloud compliance. The speakers recommend learning about AWS assurances and certifications, understanding IT audit issues in moving to the cloud, and using data analytics to gain visibility into cloud workloads.
Security Requires Visibility-Turn Data Into Security InsightAmazon Web Services
EnerNOC is a leading provider of energy intelligence software and demand response solutions. It has over 1,300 employees globally serving over 6,000 companies. EnerNOC is increasingly moving its infrastructure and applications to AWS to take advantage of cloud capabilities. It uses Splunk extensively to gain visibility into its complex and distributed AWS environment for monitoring, alerting, and troubleshooting. The Splunk App for AWS integrates data from various AWS services to provide a single pane of glass view into AWS activity, configurations, costs, and security.
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...Sumo Logic
Sumo Logic’s proactive security analytics helps customers gain critical, real-time visbility into their AWS and on-premises infrastructure. Guaranteed query performance combined with purpose built applications, pre built searches, dashboards and reports help you demonstrate compliance in real-time while reducing the cost and time associated with audits. By correlating logs across various data sources you can reduce false-positives and run detailed root-cause analysis.
Join this webinar to learn how:
•InsideView is leveraging AWS CloudTrail and Sumo Logic to meet security and compliance requirements
•Pattern recognition and Anomaly Detection can uncover compliance events in real-time
•You can automatically adapt to changing compliance needs
•AWS and Sumo Logic can help you reduce audit costs and cycles
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
PagerDuty deployed Splunk Cloud running on AWS to gain end-to-end visibility across their operations and enhance their security and compliance efforts. With Splunk, PagerDuty sped incident investigations, provided analysts with rich context for decision making, and reduced costs by 30% over their previous solution. Splunk Cloud provided PagerDuty with security, real-time monitoring, compliance reporting, and insights for engineering and operations across their AWS environment.
This document discusses using a "Security by Design" approach on AWS to help customers modernize their technology governance and continuously comply with regulations. It describes building security into every layer, automating security operations, and using AWS services like Config, GuardDuty, and Inspector to continuously monitor for compliance. The Lunar Way case study shows how they use multiple AWS accounts, security groups, and AWS Config custom rules to meet financial regulations and continuously monitor their AWS infrastructure for compliance.
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
We’ve entered a new connectivity oriented world where we can access information any time, any place, on any device, 24 hours a day, and cloud computing is a major enabler of this flexibility. Like you, more and more businesses are looking to the cloud for better, faster, more powerful and affordable communications and while many would think that security in the cloud is much different, the reality is less dramatic. Moving to the cloud still requires using proven security techniques, but sometimes in new and dynamic ways that adapt to the elastic nature of cloud architecture. Join us as we discuss the latest cloud security solutions, including real world examples of how organizations like yours are succeeding against new and evolving threats. We will examine security considerations beyond what is provided by security-conscious cloud providers like Amazon Web Services and what additional factors you might want to think about when deploying to the cloud.
Developing a Continuous Automated Approach to Cloud SecurityAmazon Web Services
Many organizations struggle daily with the question - "Where do we stand with our AWS security practices?" With the recent release of the Center for Internet Security's CIS AWS Foundations Benchmark, organizations now have an industry-accepted set of security configuration best practices. These benchmarks, in combination with 3rd party security solutions that support them, can form the foundation for security operations at organizations of all sizes through continuous monitoring and auditing.
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
If you are looking for complete instructions on how to build your own Cloud governance process and control then view our recorded webinar on our youtube channel. We take you step by step on what is governance for the cloud and a focus area for security governance.
This document discusses how broadcasters can start shifting their operations to the cloud. It outlines typical broadcast workflows and how aspects like storage, processing, and delivery can be moved using AWS and partner solutions. The challenges of bridging physical requirements to the virtual cloud are addressed through services like AWS Storage Gateway and AWS Direct Connect. Key trends highlighted include the need to manage increasing storage demands, scale media processing, and deliver content globally to meet rising consumer expectations across multiple devices. Case studies demonstrate how media companies are leveraging AWS to save costs while improving reliability and the ability to innovate.
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
Does moving core business applications to AWS make sense for your organization? This session covers key business and IT considerations gathered from industry experts and real-world enterprise customers who have chosen to move their mission critical ERP applications to the AWS cloud, resulting in lower costs and better service.
This session covers the following:
- Insights from industry experts and analysts, who explain how the cloud affects costs from three angles: launch, operations, and long-term infrastructure expense
- Review of how time-to-value and cloud launch processes differ from on-premises infrastructure
- How AWS offers increased security and reliability over what some enterprises can afford on their own
Sponsored by Infor
This webinar will introduce the AWS Shared Security Model. We will examine how to use the inherent security of the AWS environment, coupled with the security tools and features AWS makes available, to create a resilient environment with the security you need.
Learning Objectives:
• Understand the security measures AWS puts in place to secure the environment where your data lives
• Understand the tools AWS offers to help you create a resilient environment with the security you need
• Consider actions when moving a sensitive workload to AWS • Security benefits you can expect by deploying in the AWS Cloud
Who Should Attend:
- Prospects and customers with a security background
- Who are interested in using AWS to manage security-sensitive workloads
Neev Services provides cloud infrastructure management, cloud application development, and custom software development. It has over 250 employees across offices in India, the US, and Sweden. It offers support plans for AWS cloud infrastructure and has expertise in services like EC2, S3, RDS, and more. It also discusses typical cloud architectures used and some of its cloud projects.
Using AWS To Build A Scalable Machine Data Analytics ServiceChristian Beedgen
Christian Beedgen presented on using AWS to build a scalable machine data analytics service. He discussed Sumo Logic's architecture which uses loosely coupled AWS components like S3, DynamoDB, and EC2 to ingest, index, analyze and query large volumes of machine log data in real-time. Deployment is automated using tools like Jenkins, and components are deployed across availability zones for high availability. The system scales horizontally by sharding data and queries by customer account.
Similar to How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sumo Logic on AWS (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
2. Today’s Presenters
David Potes, Manager, Solutions Architecture, Amazon Web Services
Dave Anderson, Director of Security & IT, Greenhouse Software
Kalyan Ramanathan, VP of Product Marketing, Sumo Logic
3. Today’s Agenda
• An overview of AWS and AWS Marketplace, with an emphasis on
machine data analytics & security
• The Greenhouse success story with AWS and Sumo Logic
• Q&A/Discussion
4. Learning Objectives
1. Understand the benefits of AWS-hosted machine data analytics
services
2. Ensure data protection and security in the AWS cloud
3. Understand best practices for leveraging machine learning analysis
to uncover real-time insights into application operations and security
6. Familiar Security
Model
Validated and driven by
customers’ security experts
Benefits all customers
PEOPLE & PROCESS
SYSTEM
NETWORK
PHYSICAL
Security is Job Zero
7. AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Network
Security
Identity &
Access
Control
Customer applications & content
You get to define
your controls IN
the Cloud
AWS takes care
of the security
OF the Cloud
You
AWS And You Share Responsibility for Security
Inventory &
Config
Data
Encryption
9. • You benefit from an environment built for the most security
sensitive organizations
• AWS manages 1800+ security controls so you don’t have to
• You get to define the right security controls for your workload
sensitivity
• You always have full ownership and control of your data
What This Means
10. AWS Security Tools & Features
Customer applications & content
Oversight & Monitoring
AWS and its partners offer over 700 security services, tools and features
Mirror the familiar controls you deploy within your on-prem environments
Network
Security
Identity &
Access
Control
Inventory &
Config
Data
Encryption
11. Monitoring in the Cloud is different
• Resources are elastic and ephemeral
• Infrastructure can have tightly coupled interaction to events
• Cost is now a concrete metric that can be tracked.
• Changes can be tracked.
• Access can be tracked.
12. Full visibility of your AWS environment
• CloudTrail will record access to API calls and save logs in your S3
buckets, no matter how those API calls were made
Who did what and when and from where (IP address)
• CloudTrail support for many AWS services and growing - includes
EC2, EBS, VPC, RDS, IAM and RedShift
• Easily Aggregate all log information
Out of the box integration with log analysis tools from AWS
partners including SumoLogic
Monitoring: Get consistent visibility of logs
13. Getting the most out of logging
• Enable anything w/ audit or access log
• Tamper proof (and fail proof) your log
• Create and implement log lifecycle policies
• Use meaningful naming.
• Do something with them!
14. Sumo Logic
Confidential
Sumo Logic + AWS
• Sumo Logic is a secure, AWS-hosted machine data
analytics service that delivers real-time insights
from logs, metrics and event data across the entire
application lifecycle and stack, helping customers
build, run, and secure their modern (AWS)
applications.
• In addition, Sumo Logic supports SaaS Contracts
on AWS Marketplace making it easy for customers
to find, buy, and start using software and technical
services that run on AWS with a single click.
16. Sumo Logic
Confidential
Who is Greenhouse Software?
● Recruitment optimization platform delivered as SaaS
● From job application through onboarding companies run their entire
hiring process on top of Greenhouse
● Founded in 2012, 200 employees, offices in NY and SF
● Nearly two thousand customers and growing
Dave Anderson, Director of Security & IT, Greenhouse Software
• Background in systems/network/security engineering
• Long-time Sumo Logic customer
17. Sumo Logic
Confidential
Greenhouse Infrastructure: Past and Present
• Initially deployed on Heroku’s PaaS
offering
• Operated for a while in a hybrid
Heroku + AWS environment to
support services Heroku could not
• Containerized most everything:
– Already containerized at
Heroku
– Docker was natural choice
– Mesos and Marathon for
container orchestration
– Moving to Kubernetes
• All running on AWS:
– EC2
– ELB and Autoscaling
– RDS databases
– Cloudtrail for auditing
In the Past Present
18. Sumo Logic
Confidential
Management Through Data
• Logs everywhere
• Initial log management was mostly manual
– Mostly in-house solutions
– Lots of greps/manual hunt-and-peck
ELB VPC
Flowlogs
CloudTrail Containers Orchestration Apps
19. Sumo Logic
Confidential
Issues with “un-consolidated” Log Management
• Engineers must have good
Unix/Linux skills.
• Data is harder to access.
• Getting context requires multiple
iterations.
• Correlation is manual.
• Reporting and visualization requires
separate tools.
• Limited app visibility
• Challenges in meeting KPI’s
– Long MTTI/MTTR
• Challenges in ensuring app security
• Team productivity and focus issues
Issues Impact
20. Sumo Logic
Confidential
What did we want in an analytics solution?
• Scales well
– Future proof for Greenhouse growth
• Fast time to value
– Get up and running and show tangible value quickly
– Support AWS services out of the box
• Fully managed & secure
– Don’t spend resources to manage “management” solution
– Should come with right security certifications
21. Sumo Logic
Confidential
Why Sumo Logic?
• Easy to get started.
– Hosted collectors and installed collectors
– Full support for AWS with apps and dashboards
• Very scalable solution.
– High performance and redundancy
– Zero upgrade costs
• Security and compliance of platform.
– SOC 2, ISO 27001, EU GDPR, PCI
• Low TCO.
– SaaS offering - no management required
22. Sumo Logic
Confidential
Sumo Logic at Greenhouse
1. Proactive app performance management
2. Fast application troubleshooting
3. Proactively identify AWS infrastructure security
4. Ensure application security
5. Monitor AWS VPC network activity
Key use cases that enable app performance and security
23. Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 1: Proactive performance management
• Identify performance issues
before customers are
affected
24. Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 2: Resolve performance management quickly
• Leverage Sumo Logic
machine learning to
identify outliers
• Utilize features like
LogCompare and
LogReduce to focus on
relevant events
25. Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 3: Proactively manage AWS/infrastructure security
• Monitor Cloudtrail
security activity
• Set alerts for known
bad activity
26. Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 4: Proactively manage application security
• We have created searches
and dashboards for
common security events in
our application
27. Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 5: Monitor AWS resources
• Monitor traffic in/out of our
VPC
• Identify busy network
resources and bottlenecks
• Unusual outliers are typically
worth investigation
28. Sumo Logic
Confidential
Sumo Logic Results:
Impact on Greenhouse operations and productivity
• Ease of use leads to faster issue resolution
• Saved searches help new engineers
• Dashboards provide useful visualizations
• Alerts on unusual behavior
• Self-healing automation based on log data
99.9% SLA
MTTI/MTTR of minutes
29. Sumo Logic
Confidential
What’s Next?
Greenhouse, Sumo Logic + AWS
• More security automation and dashboards
• Integration with other tools
– Slack for notifications
• “Single pane of glass” for security
– Feed data from other tools in to Sumologic to power security dashboards
30. Sumo Logic
Confidential
What We Learned
Best practices to succeed
• Implement solutions that help you sleep better
– Leverage experts and expert solutions
– Don’t try to solve it all in-house
– Don’t reinvent the wheel
• Easy to get started with in-house solutions
– But it is much more effort when it comes to bulletproofing it
• Sumo Logic and AWS
– Great services and solutions to solve your application analytics
needs and more.
32. Sumo Logic Confidential
1200+
Customers
2-4x lifetime expand
1.
20 Million +
Searches performed daily
100 PB +
Data analyzed daily
300+ Trillion
Records queried daily
Tier-1 Investors
Service Scale
No limits
Leading Machine Data Analytics Service
33. Sumo Logic
Confidential
33
Unified Machine Data Platform
1.
Unified Machine
Data Analytics
Log, Metrics & Events
Machine Learning
Scalable & Elastic
Modern
Application
Track End to End Performance
Full Stack Visibility
Real-Time Insights
Fast troubleshooting and
root-cause analysis
36. Sumo Logic
Confidential
36
Zero Management SaaS Service
Only approach to manage volume + variety of machine data
High TCO & Long TTV
Limited flexibility & scalability
Security as afterthought
Legacy On Prem or Single-Tenant
ZERO Deploy &
Upgrade times
Reduce Time to Value by 90%
No Management
Overhead
Reduce TCO > 50%
Fully Elastic
On Demand
Agility, Scale,
Performance
Always Available
4 Geos, 12AZs, 6 X
Replication
Superior
Performance
Guaranteed SLAs
Secure by
Design
Industry’s Most Secure
Platform
Next Generation Multi-tenant SaaS
“The unique combination of Sumo Logic’s SaaS architecture demonstrated that we would obtain the fast time-to-value & scalability”
37. Sumo Logic
Confidential
Industry’s Most Secure
Cloud-Native
Analytics Service
Fully Secure
Protecting Customer Data with Best-in-Class Security
• PCI/DSS 3.2 Service Provider Level 1 Certified
• SOC 2 Type attestation
• ISO 27001 certified
• CSA Star certified
• HIPAA-HITECH compliance
• U.S. – EU Privacy Shield
• AES 256-bit encryption at rest
• TLS encryption in transit
• FIPS 140-2 compliant
38. Sumo Logic
Confidential
38
Comprehensive app visibility
Cloud Native Secure Architecture
Machine learning for faster MTTI/MTTR
Unified Logs & Metrics Data
Why Sumo Logic?
Available in AWS Marketplace
39. • Buy on AWS Marketplace:
– https://aws.amazon.com/marketplace/pp/B01N06ZS84
• Learn more about Sumo Logic on AWS:
– https://www.sumologic.com/aws/
• Try AWS for free:
– https://aws.amazon.com/
Next steps and further information
<INTRO>
Today we’re going to talk about how we think about security at AWS, and how we believe that your security posture actually improved by deploying workloads in AWS
At AWS security is a top priority.
We build our security program on many of the same tenets as you do. Our data centers are designed with the highest physical security requirements in mind, and access to those data centers is restricted to a very small number of individuals. In our data center we have very strict segregation of duties to ensure that out data center technicians have on the most minimal accesses they need to do their jobs. In the same way you do, we lock down our network and systems, and have well defined processes and people controls to make sure our data centers operate in an efficient and secure manner.
Our security measures have been driven by security experts from across our largest, most advanced customers, including Shell, NASDAQ, and GE, and have been validated by a wide range of security experts and accreditation bodies.
These organizations with very high security standards set the bar for AWS security, but the great thing about security in AWS is that everyone gets to benefit from the security controls that we have put in place. Whether you are a small startup, a mid sized enterprise, or the largest company you get to take advantage of the security controls that we have put in place to satisfy
<IF THE CUSTOMER ASKS ABOUT SPECIFIC CONTROLS WE HAVE IN PLACE, DIRECT THEM TOWARDS OUR SECURITY WHITEPAPER, RISK AND COMPLIANCE WHITEPAPER AND SOC 2 REPORTS THAT WE CAN MAKE AVAIALABLE>
At AWS we have a shared security model, where we are responsible for some aspects of security, whereas you get to choose other security measures you put in place.
As AWS we are responsible for the security of the underlying infrastructure . That of course include physical security across our regions, our data centers, our availability zones, our edge locations. We are also responsible for the security of the foundation services that underpin the AWS environment. This includes the infrastructure that supports our compute, storage, database and networking services.
As a customer, then, you have a choice of what security controls you choose to deploy to protect your virtual networks, servers, your data and what access control policies you wish to put in place. For highly sensitive content and applications you may want to put very stringent controls in place. For less sensitive applications, you may want to dial security back – you get to choose.
We are also certified and accredited by a wide range of regulators and industry bodies. Here is a list of key bodies that have either certified us, or we have a workbook of guidance showing you how to validate an AWS environment against these standards.
Top Row (left to right)
ISO 27001 Information Security Management
ISO 9001 Quality Management Systems Requirements
American Institute of Certified Professional Accounts (SOC 1, SOC 2, SOC 3 reports)
Payment Card Industry Data Security Standard (PCI-DSS)
Federal Information Security Management
Cloud Security Alliance
Middle Row:
TUV Trust IT – independent certification body for the German Federal Office for Information Security (BSI) IT Baseline protection methodology (IT Grundschutz)
UK G-Cloud Digital Marketplace
HIPAA (Health Information Portability and Accountability Act)
Federal Information Processing Standards 140-2
Americans with Disabilities Act Section 508
Motion Pictures of America Association
Bottom Row:
US International Traffic in Arms Regulations
Department of Defense Cloud Security Model
Criminal Justice Information Systems (CJIS) Security Policy
Federal Risk Authorization Management Program (FedRAMP)
Australian Information Risk Assurance Program
US Department of Education (FERPA)
<FOR MORE IN DEPTH QUESTIONS REFER THE CUSTOMER TO http://aws.amazon.com/compliance FOR MORE DETAILS>
What does this mean for you, the customer?
First of all, no matter who you are, you get to benefit from all the controls we put in place for the largest, most security sensitive organizations in the world. You get this at no extra cost, you don’t have to do anything to get this – it’s just all part of the service
Also, performing audits is a time consuming and expensive affair. We validate our environment against over 1800 security controls – we also get audited by third parties. If you want to see those controls and how we’re managing against them, we can make our SOC 2 report available to you under NDA. SOC 2 is a reporting standard of the American Institute of Certified Public Accountants, and is a widely recognized reporting standard.
As we’ve said, you get to the flexibility to define what are the right set of security controls for your workload. More sensitive workloads will demand more stringent controls, less sensitive workloads will demand less. At the same time you remain in full control and have full ownership of your data. You decide where it goes, where it is stored, where it gets processed and how it gets transmitted.
In addition to the security of our environment, we make a wide range of security tools and features available to you our customers. Depending on the security of the application or the content you choose to deploy, AWS and its partners offer over 700 tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. This means that you can deploy a wide range of security controls in your AWS environment without the capital outlay. Also, many AWS security features are free, and those you do pay for you only pay for exactly what you need, when you need it. This means you can do this at a much lower cost than similar controls in an on-premises environment. AWS provides security-specific tools and features across Network Security, Server Security, Access Control and Data Security. Also AWS provides oversight and monitoring tools so that you can detect problems quickly and remediate them before they impact the business.
Because the cloud is on-demand resources are elastic and ephemeral This means that events can drive quantity and scale of deploy infrastructure for instance end user demand increases and the web tier is triggered to a a few more servers then demand wanes and the fleet shrinks back down.
Cost is now a concrete metric that can be tracked.
All changes can be tracked.
All access can be tracked.
We also have a number of tools for monitoring activity in the environment. CloudTrail is our service that logs all API calls, including console activities, command line instructions. It logs exactly who did what, when and from where. That means you have full visibility into and accesses, changes or activity within your AWS environment. You can save these logs into your S3 buckets, and the only cost to you is the cost of that storage. A growing number of AWS services are CloudTrail enabled including EC2, EBS, VPC IAM and RedShift. This means that you can easily aggregate logs and track activity
If you already have a SIEM or log management solution, then a growing number of them support collecting CloudTrail logs. This includes Splunk, AlertLogic and SumoLogic
Let’s start with a very general view of logging, and then we are going to focus in on some of the specifics
Enable audit and access logging capabilities wherever available. There a lot of ways to log, and we’ll look at that in a few minutes; do put in the effort to make sure you are collecting all logs. When we talked to AWS security, they were understandably cagey, but one of the key questions they want to be able to answer: Am I logging everything? If not..
Leverage secure, durable storage for log files to ensure log files are not accidentally lost, stolen, or tampered with. Use S3, arch for 11 9s of avail & make sure you have the right access policies set on your log bucket. Access to modify (and in some cases to view) should be restricted to authorized personnel. Recommend MFA-delete for stronger security (CLI API only)
Create and implement log lifecycle policies for storing, aggregating, analyzing, archiving, and deleting log data. Your lifecycle policy can take older logs and move them to something like Glacier or even delete the files at the right time.
Leverage meaningful names to organize log data when consolidating logs into a single location. Apply your naming convention on the S3 buckets as well as enforcing your tagging policy. Analyze logs, create actionable reports, and configure appropriate alerting to get the most out of log data. A partner solution can be a huge help with this stage.
Sumo Logic ensures performance and availability of AWS applications and infrastructure. It also improves security and compliance posture of AWS application and infrastructure.
PRIMARY USE CASES:
Ensure performance and availability of AWS application and infrastructure
Real-time monitoring with a unified view of logs and time-series metrics (including custom metrics)
Troubleshooting and root-cause analysis for quickly getting to the sources of the problem
Advanced analytics based on machine learning with pattern, anomaly and outlier detection.
Improve security and compliance posture of AWS application and infrastructure
Continuously demonstrate compliance and shorten audit cycles
Uncover security events faster using machine learning to correlate security data rather than pre-defined rules
Improve the security of your cloud application data (i.e. Office365, Salesforce, Box)
[BEFORE PRESENTING SUMO, ASK THE CUSTOMER – WHAT ARE YOUR IT PRIORITIES? WHAT ARE YOUR BIG CHALLENGES? WHAT KEEPS YOU UP AT NIGHT? AND TIE THIS TO THE SLIDES IN THE DECK]
Who is Sumo Logic? We are a cloud native machine data analytics company and we help our customers manage the operation and security of their mission critical applications.
What is machine data it includes logs, metrics and events that are generated by apps and infrastructure. Sumo knows to ingest this data, Sumo knows to get insights from this data and leveraging this data, customers can deliver great apps to the end customers
Greenhouse is an applicant tracking system and recruiting software designed to optimize your entire recruiting process. Find better candidates, conduct more focused interviews, and make data-driven hiring decisions.
Like many startups, when Greenhouse started we chose to host the application on Heroku. As the application and features grew there were components that just couldn’t be supported on Heroku at the time. Our next step was to host some of these supporting services in a VPC at AWS. We lived with that environment for a while but were running up against limitations around security and cost inherent to their platform at the time. Since Heroku’s platform was based on the concept of containers already, and Docker was growing in popularity, we decided to build out a secure multi-tier containerized environment on AWS.
Our infrastructure is build on top of EC2 utilizing many of the built-in AWS tools like ELBs, AutoScaling, and RDS. In the end we were able to create a secure multi-tier VPC which not only provided us with better security but also greatly reduced costs.
Docker and other containerization technologies present an interesting challenge of managing where your containers run as well as deploying new code. To solve this challenge you typically need to implement some sort of container management and orchestration platform. Today AWS has the EC2 container service which solves this problem without having to build out something like Apache Mesos or Kubernetes. Since ECS did not exist at the time we chose Apache Mesos and Marathon since they were the most mature solution available. We are currently in the process of moving to Kubernetes, the open-source project from Google, since it better fits with our workflow.
One of the challenges you have with a agile dynamic infrastructure is keeping tabs on all of the data being produced. Applications and systems produce gigabytes of data in log files. AWS infrastructure produces logs from your ELBs as well as security auditing data from Cloudtrail and VPC Flow logs.
Collecting and processing the log data is critical to successfully managing your application. Bugs and data issues are inevitable and having your log data in a centralized and easily searchable format is incredibly helpful.
Prior to Sumologic our log data was spread across several systems. We had an in-house developed solution that was adequate for a couple of use cases but we were quickly outgrowing it. The log files were still in a format where we had to do greps and get creative with how we extracted and correlated the data from the log files.
One of the major issues you run into when you’re using traditional log files on a unix or linux system is that your engineers who are looking at the log data need to understand how to use the different commandline tools like grep, sort, uniq, as well as a good grasp on regular expressions. Even with the best commandline skills the data is still harder to sift through just by the limitation of the tools. Drilling down or getting contextual information can be extremely difficult and slow since you often have to run the tools over the same log data multiple times to extract out each piece of information.
Reporting and visualization of the data is also a challenge as you often have to massage the data into a format that another tool, often Excel, can understand.
One of the major issues you run into when you’re using traditional log files on a unix or linux system is that your engineers who are looking at the log data need to understand how to use the different commandline tools like grep, sort, uniq, as well as a good grasp on regular expressions. Even with the best commandline skills the data is still harder to sift through just by the limitation of the tools. Drilling down or getting contextual information can be extremely difficult and slow since you often have to run the tools over the same log data multiple times to extract out each piece of information.
Reporting and visualization of the data is also a challenge as you often have to massage the data into a format that another tool, often Excel, can understand.
My path to bringing Sumo Logic to Greenhouse is somewhat unique. My first exposure to Sumo was while I was working as a systems engineer for another SaaS startup six years ago. We had a lot of the same challenges that Greenhouse does as far as the proliferation of log data. We were also in a more traditional colocated data center environment so collection and management of the log data was not as much of a challenge but we still had the same search, reporting, and visualization challenges. We were exploring solutions to better handle our log data and everything we saw on the market at the time was beyond our budget and would require us to purchase and manage more hardware in both our primary and DR sites. We became acquainted with Sumo logic through a VC event and very quickly became Sumo Logic’s first paying customer.
Greenhouse having been born on the cloud made Sumo Logic a natural choice to replace the current system we had. Sumo Logic already had support for getting log data from Heroku and AWS which made getting started a breeze. With Sumo Logic being a managed cloud based solution we never have to worry about managing and scaling our own infrastructure to handle both our volume of log data as well as our access to that data.
Security is a huge deal at Greenhouse since we handle a great deal of personally identifiable information and hiring data that our customers want to keep confidential. We have to take great care in any of the third party systems that we utilize since some of this information can end up in our log files. The security of the Sumo Logic platform was a huge consideration when we decided to start using it.
Next I’ll go over some of the key use cases of Sumologic here at Greenhouse and some of the performance and security metrics we monitor .
Our log data is allows us to create a lot of different graphs and dashboards as well as generate alerts when certain conditions exist. Our platform is under constant development and we do several deploys a day. Even with our manual and automated testing sometimes performance related bugs slip through. While we use NewRelic for up to the minute directly instrumented performance management sometimes there are wider trends that make more sense to use log data to observe. There are also failovers of clustered server components that are most easily alerted to us through saved searches. Most of the time these are simply informational messages so we’re aware something happened but also help us quickly jump in to troubleshoot if something looks off.
Using machine learning functionality lets us identify performance outliers quickly so we can quickly drill into performance issues
Using LogCompare and LogReduce we’re able separate similar repetitive events so we can focus on what is truly relevant.
We track a lot of security related metrics both in our logs as well as from AWS cloudtrail which gives us the ability to send off alerts for unusual or known bad activity. For example we have back-end applications that are used to administer the Greenhouse applications and we alert when we see logins from unusual places. To date these have just been employees working while traveling, but all warrant verification to be able to quickly respond to a compromised account. We also want to keep track of changes to things like security groups and policy violations so that we’re ensuring that our security posture doesn’t degrade over time.
Controlling access to sensitive customer data is extremely important to us. We’re using Sumologic to track various metrics that matter to us around the activity of our customer success team as well as logins into sensitive applications from unusual places.
VPC Flow logs give you insight into the traffic in and out of your VPC. Using flow logs you can identify hot resources, network layer attacks, as well as instances or applications that may be behaving badly.
Learning the basics of searching for data in Sumo is pretty easy and there is a good amount of documentation as well as resources from the community. Over time our engineers have created saved searches and dashboards which enable us to get at relevant data faster than we ever could with manual solutions. We have also implemented alerts for suspicious behavior like logins to our backend administrative application, unusual AWS usage as reported by Cloudtrail, and even logins to Sumo logic itself. We also have self-healing automation in place to restart individual services if they get into a known bad state, which prevents our customers from ever noticing an issue.
Some of the things we’re working on next are adding a lot more around security automation. We have other security tools that monitor various bits of the system and AWS activity. Given the abilities of Sumo Logic to provide dashboards, alerts, and event correlation we are envisioning that we can aggregate alerts and other interesting data into Sumo Logic dashboards by pulling data from our other security tools. Aggregating the data from all of these separate tools would bring us closer to that elusive single pane of glass that is often overpromised yet under delivers.
[BEFORE PRESENTING SUMO, ASK THE CUSTOMER – WHAT ARE YOUR IT PRIORITIES? WHAT ARE YOUR BIG CHALLENGES? WHAT KEEPS YOU UP AT NIGHT? AND TIE THIS TO THE SLIDES IN THE DECK]
Who is Sumo Logic? We are a cloud native machine data analytics company and we help our customers manage the operation and security of their mission critical applications.
What is machine data it includes logs, metrics and events that are generated by apps and infrastructure. Sumo knows to ingest this data, Sumo knows to get insights from this data and leveraging this data, customers can deliver great apps to the end customers
We have 1,200+ Enterprise Customers – and great brands at that
We provide fast value to our customers. AirBnB is a great example where the customer started out managing their app security with us and soon deployed it to many of their mission critical applications
[USE YOUR FAVORITE EXAMPLE CUSTOMER STORIES TO HIGHLIGHT OUR CUSTOMER VALUE]
We have built a very scalable platform
In one day Sumo Logic ingested over 100 TB data and users query/analyze across 300+ trillion records
We are funded by Tier 1 investors who find and fund big ideas. And we are happy to have them support us
There is a better way to manage your applications - and that is with a unified machine data analytics platform
Your apps and infrastructure already generate lots of machine data (logs, metrics, events)
If you can ingest this data and analyze this data (i.e correlate it, identify patterns in this data, be able to visualize and dashboard it), you can get lots of visibility into
The full stack – from the app – infrastructure to the services
The performance and availability of the application and infrastructure including proactively identifying issues
Be able to manage the security of the application.
Lastly, the platform should also be able to real-time data streams across all the dependent applications and infrastructures, and make sense of the volume of data collect, variety of the data, and variety of the data to provide real-time analytics to solve the problems that arise with this new architecture.
How does Sumo Logic work?
Sumo Logic offers a Cloud native SaaS service – so we manage the service for you.
Sumo Logic offers locally deployed Collectors or Cloud API to ingest the machine data from apps and infrastructure.
Once ingested, Sumpo logic will index the data and you can instantly start to query and analyze the data
You can setup alerts which will instantly inform you when your thresholds have been breached.
You can also create dashboards and reports and share it with your team.
And in addition to what is on the other slide, here are the all the AWS apps we have……
Why should you consider a Cloud-native SaaS service.
The alternative is a on-prem or single instance model. Where you manage the analytics service. You are now responsible for
Setting up the service
Optimizing and scaling the service
Upgrading the service
And this is very cost and resource intensive (and also has long time to value)
Sumo logic service is completely SaaS based.
We manage the service for you – install, upgrade, optimization etc.
Its available in many AWS zones
And we have built in security from the get-go – so that you don’t have to worry about it.
Speaker’s Notes:
Sumo provides the most secure cloud-based analytics service on the market
Only Sumo has achieved this level of validation and certification
Key messages:
Sumo takes data security VERY seriously
Enterprise-grade security was built into Sumo’s architecture from the beginning
None of our competitors provide the same level of security or attestations
You can trust Sumo with your data
Discovery Questions:
In your current log management process, how concerned are you about the security of your data?
What steps do you take to ensure it’s protected?
What compliance and audit standards do you have?
Who would need to be involved reviewing and validating Sumo’s approach to security and compliance?