There are four common challenges that CISOs and their security teams struggle with, even in the most secure and mature organizational datacenters – visibility, resilience, defense-in-depth, and automation. Learn how these challenges become benefits of using the AWS Cloud and why Cybersecurity is becoming a driving force behind commercial cloud adoption. This is an executive level presentation that covers key technical concepts and capabilities to meet business security and compliance objectives. Intended audience includes CIOs, CISOs, Technical Managers, senior architects and engineers new to AWS, and Technically-savvy Business Managers.
Simplificando Arquiteturas Microsoft com os Serviços da AWS - ARC204 - Sao P...Amazon Web Services
Nesta sessão, aprenda como fazer a arquitetura de soluções e ambientes Microsoft totalmente disponíveis e escaláveis na AWS. Descubra como as soluções da Microsoft podem alavancar diversos serviços AWS para conseguir maior resiliência, substituir complexidades desnecessárias, simplificar a arquitetura, fornecer escalabilidade e apresentar conceitos de DevOps como compliance, governança, automação e replicabilidade. Além disso, planeje autenticação e autorização e explore vários cenários híbridos com outros ambientes de nuvem e soluções ou infraestrutura on-premise . Saiba mais sobre padrões comuns de arquitetura para design de rede, Microsoft Active Directory e soluções de produtividade de negócios como Microsoft Dynamics AX, CRM e Microsoft SharePoint, bem como os cenários mais comuns de customização .NET, .NET Core com a implementação e migrações Microsoft SQL.
AWS Summit 2011: Overview of Security and Compliance in the cloudAmazon Web Services
The document provides an overview of Amazon Web Services security and compliance certifications. It discusses key security concepts like the shared responsibility model, identity and access management, multi-factor authentication, and data backups. It also summarizes certifications including SAS70 Type II audit, ISO 27001, PCI DSS Level 1, and FedRAMP.
Running more than one containerized application in production makes teams look for solutions to quickly deploy and orchestrate containers. One of the most popular options is the open-source project Kubernetes. With the release of the Amazon Elastic Container Service for Kubernetes (EKS), engineering teams now have access to a fully managed Kubernetes control plane and time to focus on building applications. This workshop will deliver hands-on labs to support you getting familiar with Amazon's EKS.
Secure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWSHostedbyConfluent
The document discusses using Amazon Managed Streaming for Kafka (Amazon MSK) with AWS Identity and Access Management (IAM) for authentication. Amazon MSK manages Apache Kafka to make it easier to use on AWS. IAM can be used to securely authenticate users and control access. Using IAM with MSK provides centralized credential management, cross-account access without sharing secrets, and integration with other AWS services like CloudTrail for auditing. An example setup demonstrates configuring a client to connect to MSK using IAM credentials.
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013Amazon Web Services
For businesses running entirely on AWS, your AWS account is one of your most critical assets. Just as you might run an intrusion detection system in your on-premises network, you should monitor activity in your account to detect abnormal behavior. This session walks you through leveraging unique capabilities provided within AWS that enable you to detect and respond to changes in your environment.
Protect your applications from DDoS/BOT & Advanced AttacksAmazon Web Services
This document discusses strategies for protecting applications from DDoS and bot attacks using AWS and F5 technologies. It outlines common external threats such as SQL injection and SYN floods. It then describes AWS services like Shield Standard, Shield Advanced, WAF, and Firewall Manager that provide detection, mitigation and protection capabilities. The benefits of these services include automatic protection, custom rule creation, access to response teams, and central management. It also outlines F5's managed security solutions for bot protection, threat intelligence and firewall management that are designed for multi-cloud environments.
There are four common challenges that CISOs and their security teams struggle with, even in the most secure and mature organizational datacenters – visibility, resilience, defense-in-depth, and automation. Learn how these challenges become benefits of using the AWS Cloud and why Cybersecurity is becoming a driving force behind commercial cloud adoption. This is an executive level presentation that covers key technical concepts and capabilities to meet business security and compliance objectives. Intended audience includes CIOs, CISOs, Technical Managers, senior architects and engineers new to AWS, and Technically-savvy Business Managers.
Simplificando Arquiteturas Microsoft com os Serviços da AWS - ARC204 - Sao P...Amazon Web Services
Nesta sessão, aprenda como fazer a arquitetura de soluções e ambientes Microsoft totalmente disponíveis e escaláveis na AWS. Descubra como as soluções da Microsoft podem alavancar diversos serviços AWS para conseguir maior resiliência, substituir complexidades desnecessárias, simplificar a arquitetura, fornecer escalabilidade e apresentar conceitos de DevOps como compliance, governança, automação e replicabilidade. Além disso, planeje autenticação e autorização e explore vários cenários híbridos com outros ambientes de nuvem e soluções ou infraestrutura on-premise . Saiba mais sobre padrões comuns de arquitetura para design de rede, Microsoft Active Directory e soluções de produtividade de negócios como Microsoft Dynamics AX, CRM e Microsoft SharePoint, bem como os cenários mais comuns de customização .NET, .NET Core com a implementação e migrações Microsoft SQL.
AWS Summit 2011: Overview of Security and Compliance in the cloudAmazon Web Services
The document provides an overview of Amazon Web Services security and compliance certifications. It discusses key security concepts like the shared responsibility model, identity and access management, multi-factor authentication, and data backups. It also summarizes certifications including SAS70 Type II audit, ISO 27001, PCI DSS Level 1, and FedRAMP.
Running more than one containerized application in production makes teams look for solutions to quickly deploy and orchestrate containers. One of the most popular options is the open-source project Kubernetes. With the release of the Amazon Elastic Container Service for Kubernetes (EKS), engineering teams now have access to a fully managed Kubernetes control plane and time to focus on building applications. This workshop will deliver hands-on labs to support you getting familiar with Amazon's EKS.
Secure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWSHostedbyConfluent
The document discusses using Amazon Managed Streaming for Kafka (Amazon MSK) with AWS Identity and Access Management (IAM) for authentication. Amazon MSK manages Apache Kafka to make it easier to use on AWS. IAM can be used to securely authenticate users and control access. Using IAM with MSK provides centralized credential management, cross-account access without sharing secrets, and integration with other AWS services like CloudTrail for auditing. An example setup demonstrates configuring a client to connect to MSK using IAM credentials.
Intrusion Detection in the Cloud (SEC402) | AWS re:Invent 2013Amazon Web Services
For businesses running entirely on AWS, your AWS account is one of your most critical assets. Just as you might run an intrusion detection system in your on-premises network, you should monitor activity in your account to detect abnormal behavior. This session walks you through leveraging unique capabilities provided within AWS that enable you to detect and respond to changes in your environment.
Protect your applications from DDoS/BOT & Advanced AttacksAmazon Web Services
This document discusses strategies for protecting applications from DDoS and bot attacks using AWS and F5 technologies. It outlines common external threats such as SQL injection and SYN floods. It then describes AWS services like Shield Standard, Shield Advanced, WAF, and Firewall Manager that provide detection, mitigation and protection capabilities. The benefits of these services include automatic protection, custom rule creation, access to response teams, and central management. It also outlines F5's managed security solutions for bot protection, threat intelligence and firewall management that are designed for multi-cloud environments.
Sessão Avançada: VMware Cloud na AWS - ENT204 - Sao Paulo SummitAmazon Web Services
O VMware Cloud na AWS permite migrar rapidamente as cargas de trabalho existentes para o AWS Cloud usando ferramentas com as quais você já está familiarizado. O VMware Cloud na AWS traz o software de data center definido por software da VMware para a nuvem pública da Amazon, fornecido como uma solução baseada em nuvem sob demanda, elasticamente escalável. Vendida e operada pela VMware, a solução permite que os clientes usem um conjunto comum de softwares e ferramentas para gerenciar consistentemente seus recursos do vSphere com base na AWS e no local. Esta sessão usa exemplos práticos e reais de implantação de clientes para aprofundar a conectividade de rede em nuvem híbrida, as práticas recomendadas de proteção de dados e as integrações de serviços nativas da AWS.
In this session, dive deep on best practices and considerations for running Microsoft SQL Server on AWS. Learn how to choose between Amazon EC2 and Amazon RDS, and understand how to optimize the performance of your SQL Server deployment for different application types. We review in detail how to provision and monitor your SQL Server databases and how to manage scalability, performance, availability, security, and backup and recovery in both Amazon RDS and Amazon EC2.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
This document provides guidance for introverted attendees of AWS re:Invent. It discusses how introverts may prefer lower stimulation environments compared to extroverts. It then offers tips for introverted attendees to focus on topics of interest, allow time for learning and recharging, but also to connect with others. Specific session recommendations are provided. Attendees are encouraged to find ways to socialize without feeling overwhelmed, such as joining others for meals and asking questions. The document emphasizes the value of networking at the event and joining local AWS user groups.
SID201 Overview of AWS Identity, Directory, and Access ServicesAmazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building new applications using cloud-native services. Along each of these journeys, identity and access management helps customers protect their applications and resources. In this session, you learn how AWS identity services provide you a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
- The document provides guidance on implementing security best practices on AWS using a prescriptive approach, beginning with understanding AWS's shared security responsibility model and then covering topics like building compliance foundations, integrating identity and access management, enabling detective controls, establishing network security, implementing data protection, optimizing change management, and automating security functions.
- It highlights AWS services and features for each topic and includes case studies showing how organizations have improved security and saved money by leveraging AWS security tools and services.
Durante il webinar discuteremo brevemente le varie opzioni disponibili per utilizzare Kubernetes su Amazon Web Services con un forte focus su Amazon Elastic Container Service for Kubernetes. Amazon EKS è il servizio gestito indirizzato ai clienti che usano o vogliono usare Kubernetes ma che preferiscono demandare la gestione del famoso software open-source ad AWS.
Amazon Elastic Compute Cloud (Amazon EC2) provides a broad selection of instance types to accommodate a diverse mix of workloads. In this technical session, we provide an overview of the Amazon EC2 instance platform, key platform features, and the concept of instance generations. We dive into the current-generation design choices of the different instance families, including the General Purpose, Compute Optimized, Storage Optimized, Memory Optimized, and GPU instance families. We also detail best practices and share performance tips for getting the most out of your Amazon EC2 instances.
Evolve Your Incident Response Process and Powers for AWS Amazon Web Services
You want your current incident response (IR) runbooks to account for your AWS workloads ASAP, and eventually, you want cloud-based IR superpowers, too. In this session, we cover the basics that you must get in place, runbook updates specific to AWS, and we show you how to build initial IR capabilities that blend well with existing processes and partner offerings. We also walk through a hypothetical IR scenario for an AWS environment that uses an evolved on-premises IR runbook that accounts for the differences of an AWS environment. In this scenario, we demonstrate unique AWS platform capabilities for IR success. Go beyond updating your IR runbooks, and start your journey toward gaining cloud-based IR superpowers today!
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand the features of AWS IoT and how to use them
- Articulate architectures for IoT applications across commercial, consumer, and industrial use cases
- Hints and tips for keeping devices secure
The document discusses Amazon Web Services container management services and Kubernetes. It provides an overview of AWS services like Amazon ECS, EKS, Fargate, ECR, Cloud Map and App Mesh. It also describes Kubernetes concepts like pods, deployments, services, namespaces and control plane/data plane architecture. Amazon EKS is highlighted as a managed Kubernetes service that makes it easy to run Kubernetes on AWS without operating the control plane.
Secure your AWS Account and your Organization's Accounts Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
AWS Identity, Directory, and Access Services: An Overview Amazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building Approved applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftAmazon Web Services
This document discusses identity and access management for serverless applications. It provides an overview of AWS Identity and Access Management (IAM) including IAM users, groups, roles, and policies. It also discusses Amazon Cognito for user management and the WildRydes serverless application workshop which involves restricting access to an S3 bucket and setting up user authentication with Cognito user pools.
This document discusses security best practices for AWS. It covers understanding the shared responsibility model for security between AWS and customers. It also discusses using AWS features like virtual private clouds, identity and access management, encryption, and building secure applications to implement security best practices. The document provides guidance on topics like network segmentation, access control lists, security groups, load balancing, and auditing to help customers securely deploy solutions on AWS.
Adding the Sec to Your DevOps Pipelines: AWS Security Week at the SF LoftAmazon Web Services
The document describes a workshop on adding security to DevOps pipelines. It discusses building a CI/CD pipeline using AWS services like CodeCommit, CodeBuild, and CodePipeline. It then covers implementing security checks like static code analysis, vulnerability scanning with Amazon Inspector, and threat detection with Amazon GuardDuty. The workshop takes participants through hands-on exercises to build the pipeline and integrate various security checks at different stages.
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
Module 3: Security, Identity and Access Management
This module will cover:
- Data Center Security
- AWS Identity and Access Management (IAM) concepts including users, groups, roles and policies
This document discusses managing continuous delivery of code to AWS Lambda using key AWS services. It provides an overview of continuous delivery and describes AWS CodePipeline for modeling release processes. The webinar demonstrates a sample serverless application pipeline using CodePipeline and Lambda and discusses tips for implementing continuous delivery with these services, including using Lambda functions in CodePipeline actions and API/function versioning strategies.
Sessão Avançada: VMware Cloud na AWS - ENT204 - Sao Paulo SummitAmazon Web Services
O VMware Cloud na AWS permite migrar rapidamente as cargas de trabalho existentes para o AWS Cloud usando ferramentas com as quais você já está familiarizado. O VMware Cloud na AWS traz o software de data center definido por software da VMware para a nuvem pública da Amazon, fornecido como uma solução baseada em nuvem sob demanda, elasticamente escalável. Vendida e operada pela VMware, a solução permite que os clientes usem um conjunto comum de softwares e ferramentas para gerenciar consistentemente seus recursos do vSphere com base na AWS e no local. Esta sessão usa exemplos práticos e reais de implantação de clientes para aprofundar a conectividade de rede em nuvem híbrida, as práticas recomendadas de proteção de dados e as integrações de serviços nativas da AWS.
In this session, dive deep on best practices and considerations for running Microsoft SQL Server on AWS. Learn how to choose between Amazon EC2 and Amazon RDS, and understand how to optimize the performance of your SQL Server deployment for different application types. We review in detail how to provision and monitor your SQL Server databases and how to manage scalability, performance, availability, security, and backup and recovery in both Amazon RDS and Amazon EC2.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
This document provides guidance for introverted attendees of AWS re:Invent. It discusses how introverts may prefer lower stimulation environments compared to extroverts. It then offers tips for introverted attendees to focus on topics of interest, allow time for learning and recharging, but also to connect with others. Specific session recommendations are provided. Attendees are encouraged to find ways to socialize without feeling overwhelmed, such as joining others for meals and asking questions. The document emphasizes the value of networking at the event and joining local AWS user groups.
SID201 Overview of AWS Identity, Directory, and Access ServicesAmazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building new applications using cloud-native services. Along each of these journeys, identity and access management helps customers protect their applications and resources. In this session, you learn how AWS identity services provide you a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
- The document provides guidance on implementing security best practices on AWS using a prescriptive approach, beginning with understanding AWS's shared security responsibility model and then covering topics like building compliance foundations, integrating identity and access management, enabling detective controls, establishing network security, implementing data protection, optimizing change management, and automating security functions.
- It highlights AWS services and features for each topic and includes case studies showing how organizations have improved security and saved money by leveraging AWS security tools and services.
Durante il webinar discuteremo brevemente le varie opzioni disponibili per utilizzare Kubernetes su Amazon Web Services con un forte focus su Amazon Elastic Container Service for Kubernetes. Amazon EKS è il servizio gestito indirizzato ai clienti che usano o vogliono usare Kubernetes ma che preferiscono demandare la gestione del famoso software open-source ad AWS.
Amazon Elastic Compute Cloud (Amazon EC2) provides a broad selection of instance types to accommodate a diverse mix of workloads. In this technical session, we provide an overview of the Amazon EC2 instance platform, key platform features, and the concept of instance generations. We dive into the current-generation design choices of the different instance families, including the General Purpose, Compute Optimized, Storage Optimized, Memory Optimized, and GPU instance families. We also detail best practices and share performance tips for getting the most out of your Amazon EC2 instances.
Evolve Your Incident Response Process and Powers for AWS Amazon Web Services
You want your current incident response (IR) runbooks to account for your AWS workloads ASAP, and eventually, you want cloud-based IR superpowers, too. In this session, we cover the basics that you must get in place, runbook updates specific to AWS, and we show you how to build initial IR capabilities that blend well with existing processes and partner offerings. We also walk through a hypothetical IR scenario for an AWS environment that uses an evolved on-premises IR runbook that accounts for the differences of an AWS environment. In this scenario, we demonstrate unique AWS platform capabilities for IR success. Go beyond updating your IR runbooks, and start your journey toward gaining cloud-based IR superpowers today!
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand the features of AWS IoT and how to use them
- Articulate architectures for IoT applications across commercial, consumer, and industrial use cases
- Hints and tips for keeping devices secure
The document discusses Amazon Web Services container management services and Kubernetes. It provides an overview of AWS services like Amazon ECS, EKS, Fargate, ECR, Cloud Map and App Mesh. It also describes Kubernetes concepts like pods, deployments, services, namespaces and control plane/data plane architecture. Amazon EKS is highlighted as a managed Kubernetes service that makes it easy to run Kubernetes on AWS without operating the control plane.
Secure your AWS Account and your Organization's Accounts Amazon Web Services
The cloud enables users to run workloads more securely than they could in a traditional data center. However, customers are still not sure how to harden their AWS accounts and resources in order to enforce compliance. Consistency around governance can also be a concern when large customers have multiple accounts. In this session, we show you how to use automation, tools, and techniques to harden and audit your AWS account as well as how to leverage AWS Organizations to ensure compliance in your enterprise.
AWS Identity, Directory, and Access Services: An Overview Amazon Web Services
Every journey to the AWS Cloud is unique. Some customers are migrating existing applications, while others are building Approved applications using cloud-native services. Along each journey, identity and access management helps customers protect their applications and resources. Come to this session and learn how AWS identity services provide you with a secure, flexible, and easy solution for managing identities and access on the AWS Cloud. With AWS identity services, you do not have to adapt to AWS. Instead, you have a choice of services designed to meet you anywhere along your journey to the AWS Cloud.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftAmazon Web Services
This document discusses identity and access management for serverless applications. It provides an overview of AWS Identity and Access Management (IAM) including IAM users, groups, roles, and policies. It also discusses Amazon Cognito for user management and the WildRydes serverless application workshop which involves restricting access to an S3 bucket and setting up user authentication with Cognito user pools.
This document discusses security best practices for AWS. It covers understanding the shared responsibility model for security between AWS and customers. It also discusses using AWS features like virtual private clouds, identity and access management, encryption, and building secure applications to implement security best practices. The document provides guidance on topics like network segmentation, access control lists, security groups, load balancing, and auditing to help customers securely deploy solutions on AWS.
Adding the Sec to Your DevOps Pipelines: AWS Security Week at the SF LoftAmazon Web Services
The document describes a workshop on adding security to DevOps pipelines. It discusses building a CI/CD pipeline using AWS services like CodeCommit, CodeBuild, and CodePipeline. It then covers implementing security checks like static code analysis, vulnerability scanning with Amazon Inspector, and threat detection with Amazon GuardDuty. The workshop takes participants through hands-on exercises to build the pipeline and integrate various security checks at different stages.
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
Module 3: Security, Identity and Access Management
This module will cover:
- Data Center Security
- AWS Identity and Access Management (IAM) concepts including users, groups, roles and policies
This document discusses managing continuous delivery of code to AWS Lambda using key AWS services. It provides an overview of continuous delivery and describes AWS CodePipeline for modeling release processes. The webinar demonstrates a sample serverless application pipeline using CodePipeline and Lambda and discusses tips for implementing continuous delivery with these services, including using Lambda functions in CodePipeline actions and API/function versioning strategies.
Continuous Delivery with AWS Lambda - AWS April 2016 Webinar SeriesAmazon Web Services
Managing the deployment of code to multiple AWS Lambda functions and updating your API Gateway methods can be manual and time consuming.
In this webinar, we will show you how to build a deployment pipeline to AWS Lambda using AWS CodePipeline. We will discuss how to use versioning, allowing you to better manage the different variations of your Lambda function and API Gateway methods in your development workflow, such as development, staging, and production. We will walk through how to automate the entire release process of your application from development to staging and finally to production, performing automated integration tests at each stage.
Learning Objectives:
Understand the basics of AWS CodePipeline
Learn how to version AWS Lambda functions and API Gateway methods
Build a deployment pipeline to AWS Lambda
The document provides an overview of application lifecycle management (ALM) in a serverless world. It discusses key concepts like continuous integration/delivery and testing practices for serverless applications. Serverless architectures using AWS Lambda and API Gateway are highlighted, along with how to manage deployments, configurations, and monitor applications.
Serveless Design Patterns (Serverless Computing London)Yan Cui
Serverless technologies like AWS Lambda has drastically simplified the task of building reactive systems - drop a file into S3 and a Lambda function would be triggered to process it, push an event into a Kinesis stream and magically it'll be processed by a Lambda function in real-time, you can even use Lambda to automate the process of auditing and securing your account by automatically reacting to rule violations to your security policy.
Join us in this talk to see some architectural design patterns that have emerged with Lambda, and how to pick the right event source based on the tradeoffs you want. Here are a few patterns that we'll cover in the talk: pub-sub, cron, push-pull, saga and decoupled invocation.
AWS October Webinar Series - AWS Lambda Best Practices: Python, Scheduled Job...Amazon Web Services
AWS Lambda lets you run code without provisioning or managing servers. We have introduced a few new features this year at re:Invent and would like to share with you some of the best practices.
This webinar will introduce you to scheduled AWS Lambda functions and how to use long running functions to handle large volume data ingestion and processing jobs. We will demonstrate how to use versioning to control which Lambda function version is being executed in your development, testing, and production environments. We will also show you how to run your Python code in AWS Lambda.
This document discusses new features and capabilities for serverless applications on AWS Lambda. Key points include:
- AWS Serverless Application Model (SAM) allows defining serverless apps in a common language and integrates with CloudFormation.
- New features for serverless CI/CD pipelines include pulling source from GitHub/CodeCommit with CodePipeline and building with CodeBuild.
- Environment variables are now supported for Lambda functions.
- X-Ray provides visibility for tracing calls between Lambda and other AWS services.
- Other updates include Kinesis iterator, C# runtime, dead letter queues, and integrations with services like API Gateway, DynamoDB, and Step Functions for orchestrating functions.
Migrating your .NET Applications to the AWS Serverless PlatformAmazon Web Services
Windows and .NET-based workloads are first-class citizens on AWS. In this session, we show how you can easily move an existing .NET application to the AWS cloud and take advantage of it serverless capabilities. We will cover migration and architectural considerations for porting your C# application to AWS Lambda, and using API Gateway to create a façade for your application to safely make changes as you migrate.
Speakers:
Stephen Liedig, Public Sector Solutions Architect, Amazon Web Services
Shane Baldacchino, Solutions Architect, Amazon Web Services
The document discusses new features and capabilities of AWS Lambda and serverless computing. Some key points include:
- AWS Serverless Application Model (SAM) allows describing serverless apps in a common language and supports packaging and deploying Lambda-based apps.
- New features for Lambda include environment variables, C#/.NET Core support, dead letter queues, and integrations with services like API Gateway, Kinesis, and X-Ray for tracing.
- Serverless CI/CD pipelines can now pull source from GitHub/CodeCommit and deploy packaged apps using CodeBuild and CloudFormation.
- Step Functions allows orchestrating Lambda functions to choreograph long-running workflows.
Serverless technologies like AWS Lambda has drastically simplified the task of building reactive systems - drop a file into S3 and a Lambda function would be triggered to process it, push an event into a Kinesis stream and magically it'll be processed by a Lambda function in real-time, you can even use Lambda to automate the process of auditing and securing your AWS account by automatically reacting to rule violations to your security policy.
Join us in this talk to see some architectural design patterns that have emerged with AWS Lambda, and learn how to pick the right event source based on the tradeoffs you want. Amongst the many patterns we'll explore, here are a few to whet your appetite : pub-sub, cron, push-pull, saga and decoupled invocation.
Serveless design patterns (VoxxedDays Luxembourg)Yan Cui
Serverless technologies like AWS Lambda has drastically simplified the task of building reactive systems - drop a file into S3 and a Lambda function would be triggered to process it, push an event into a Kinesis stream and magically it'll be processed by a Lambda function in real-time, you can even use Lambda to automate the process of auditing and securing your AWS account by automatically reacting to rule violations to your security policy.
Join us in this talk to see some architectural design patterns that have emerged with AWS Lambda, and learn how to pick the right event source based on the tradeoffs you want. Amongst the many patterns we'll explore, here are a few to whet your appetite : pub-sub, cron, push-pull, saga and decoupled invocation.
Serverless DevOps to the Rescue - SRV330 - re:Invent 2017Amazon Web Services
Join this workshop for a crash course in serverless DevOps! This workshops presents a scenario in which you help out Wild Rydes (www.wildrydes.com), the world’s leading unicorn transportation startup! After building the first iteration of its serverless web application, Wild Rydes needs serverless DevOps experts like yourself to help it rapidly build and iterate upon its web app. In this workshop, you’ll help Wild Rydes set up a CI/CD pipeline that enables the company to rapidly build, test, and deploy changes to its serverless application. You’ll also learn to monitor and diagnose issues for its application. This workshop will teach you how to model and deploy serverless apps with the AWS Serverless Application Model. You’ll learn to use AWS CodePipeline and AWS CodeBuild to create a CI/CD pipeline for AWS Lambda and other services. Finally, you’ll learn to use AWS X-Ray to diagnose issues in your Lambda functions.
Requirements: Laptop, AWS account, basic Git experience. Recommended: Previous experience with the AWS Management Console and AWS CloudFormation templates, some familiarity with the AWS Developer Tools services, and preferably one of the AWS Associate certifications.
Managing the deployment of code to multiple AWS Lambda functions and updating your API Gateway methods can be manual and time consuming.
In this session, we will show you how to build a deployment pipeline to AWS Lambda using AWS CodePipeline, a continuous delivery service based on Amazon’s internal release automation tooling. We will discuss how to use versioning, which enables you to better manage the different variations of your Lambda functions and API Gateway methods in your development workflow (e.g., development, staging, and production). We will walk through how to automate the entire release process of your application from development, to staging, and finally to production; performing automated integration tests at each stage.
AWS August Webinar Series - Building Serverless Backends with AWS Lambda and ...Amazon Web Services
AWS Lambda is a compute service that runs your code in response to triggers and automatically manages the compute resources for you. Amazon API Gateway is a fully managed service that makes it easy for developers to publish, maintain, monitor, and secure APIs at any scale.
This webinar will familiarize you with the basics of AWS Lambda and Amazon API Gateway and demonstrate how to build web, mobile, and IoT backends using these services. You will learn how to setup API endpoints that trigger AWS Lambda functions to handle mobile, web, IoT, and 3rd party API requests. You will also learn how to use Lambda to read and write to DynamoDB.
Learning Objectives:
Understand key AWS Lambda and Amazon API Gateway features
Learn how to set up a serverless backend using Amazon API Gateway and AWS Lambda
Explore sample use cases, best practices and tips on using AWS Lambda with Amazon API Gateway
AWS Community Day 2022 Dhiraj Mahapatro_AWS Lambda under the hood _ Best Prac...AWS Chicago
The document provides an in-depth overview of AWS Lambda, including:
- What AWS Lambda is and how it works under the hood.
- The three invocation modes: synchronous, asynchronous, and event source mapping.
- Details on the Lambda execution environment like sizing, concurrency, and architectures.
- Other notable Lambda features like code signing and Amazon EFS integration.
- Best practices like using AWS Lambda Powertools for observability and optimizing functions.
Compute Without Servers – Building Applications with AWS LambdaAmazon Web Services
AWS Lambda enables developers to build scalable applications without managing servers. Come learn how AWS Lambda’s event driven approach helps build backend ingestion systems, real time stream processing, and scalable API backends. We will deep dive and provide live demo into the different approaches that customers have taken to building applications with AWS Lambda, the typical architectures that customers use and best practices for authoring, deploying, and managing the functions.
Markku Lepisto, Principal Technology Evangelist, Amazon Web Services, APAC
This document provides an overview of serverless applications and how to build one. It discusses what serverless means, common use cases, how to bundle and deploy code, continuous integration and delivery, versioning, monitoring, and more. Specific AWS services for building serverless applications are also covered, including AWS Lambda, API Gateway, DynamoDB, S3, CloudFormation, CodeBuild, CodePipeline, X-Ray and CloudWatch.
With AWS Lambda, you can easily build scalable microservices for mobile, web, and IoT applications or respond to events from other AWS services without managing infrastructure. In this session, you’ll see demonstrations and hear more about newly launched features. We’ll show you how to use Lambda to build web, mobile, or IoT backends and voice-enabled apps, and we'll show you how to extend both AWS and third party services by triggering Lambda functions. We’ll also provide productivity and performance tips for getting the most out of your Lambda functions and show how cloud native architectures use Lambda to eliminate “cold servers” and excess capacity without sacrificing scalability or responsiveness.
Serverless Architectural Patterns & Best PracticesDaniel Zivkovic
This ServerlessTO meetup covered various Serverless design patterns and best practices for building apps using the full #AWS #Serverless stack - not just Lambda. Event recording (including 25min long Q&A!) is at https://youtu.be/gsILTMXPUeU
Similar to What’s new in serverless - re:Invent 2020 (20)
AWS reInvent 2023 recaps from Chicago AWS user groupAWS Chicago
Chicago AWS Solutions Architect Scott Hewitt recaps the non-GenAI updates from AWS re:Invent 2023. Updates range from storage, networking, compute and developer tools.
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...AWS Chicago
This document summarizes Amazon Web Services' generative AI and machine learning services, including Amazon Q, Amazon Bedrock, Amazon CodeWhisperer, and Amazon SageMaker. It outlines new capabilities and updates to each service, such as customizing AI models with domain-specific data in Amazon Bedrock, improved coding suggestions from Amazon CodeWhisperer, and new tools for distributed training and inference in Amazon SageMaker. The document is intended to recap announcements from re:Invent 2023 about AWS's generative AI and AI/ML services.
WilliamCollins_Road-to-Transit-Gateway.pptxAWS Chicago
The document discusses using AWS Transit Gateway to improve networking connectivity across the Galactic Empire. Transit Gateway can serve as a central hub to connect all of the Empire's VPCs and on-premises data centers across different star systems. This overcomes issues with the current decentralized infrastructure and lack of security protocols. Transit Gateway supports creating many attachments, scaling to thousands of connections, and using custom routing tables to segment and control traffic flow. The Empire can now implement uniform routing policies and secure communication networks.
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfAWS Chicago
The document discusses generative AI and tools for building with it on AWS. It provides an introduction to generative AI, describes common use cases like text generation and image generation, and reviews tools available on AWS for generative AI like Amazon Bedrock, Amazon EC2 Trn1n and Amazon EC2 Inf2, Amazon CodeWhisperer, and Amazon SageMaker Jumpstart. It also discusses security, customization, and cost benefits of using AWS for generative AI projects.
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaAWS Chicago
Morningstar faced challenges with centralized data management and entitlements across their data lake and Amazon Redshift. They implemented a tag-based permissions system in Lake Formation to simplify entitlements management. They then created an in-house mapper to translate the tag-based Lake Formation grants and revokes to equivalent resource-based grants and revokes in Amazon Redshift. This provided a consistent permissions approach across both systems and enabled faster data access, more automation and self-service of permissions.
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxAWS Chicago
This document discusses building enterprise SaaS applications on AWS. It notes that the SaaS market size is projected to grow significantly by 2029. When building SaaS applications on AWS, developers should consider the different models for tenant isolation and leveraging shared services. The document also provides recommendations around security, compliance, connectivity options, and best practices to accelerate time to market and growth when building SaaS applications on AWS.
Ross Stuart_Using ML to Solve Lifes Problems.pptxAWS Chicago
The document discusses predicting e-bike availability for Divvy, Chicago's bike sharing system. It describes a solutions architect who wants to use machine learning to build a model that predicts when e-bikes will be available for rides between his home and office, as not having an e-bike available adds time to his commute. The architect works for AHEAD, a company focused on data, analytics, and machine learning, and hopes to apply his skills to solve the problem of occasionally finding no e-bikes available for important meetings in the city.
Mohamed Wali_AWS Security Reference Architecture.pptxAWS Chicago
The document discusses the AWS Security Reference Architecture (AWS SRA), which defines a target security architecture that organizations can use to build and review their own security architectures. The AWS SRA helps organizations define their security architecture, review existing designs and capabilities, implement security services, learn about AWS security features, and facilitate discussions around security responsibilities. It presents a layered approach to security and reference designs for account structure, network architecture, and protecting resources, principals, and accounts using various AWS security services. Code examples demonstrating the AWS SRA are provided in a public GitHub repository along with architecture diagrams, deployment guides, and other documentation.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
7. Serverless applications
Event source Services
Changes in
data state
Requests to
endpoints
Changes in
resource state
Function
Node.js
Python
Java
C#
Go
Ruby
Runtime API
9. What’s new for:
• AWS Lambda
• Amazon API Gateway
• AWS Step Functions
• Amazon EventBridge
• AWS SAM CLI
Grab bag: New services and features that serverless application
developers should check out
What’s new in serverless
10.
11. AWS Lambda: 1 ms billing
• Reduced billing granularity from
100 ms to 1 ms
• Affects all Lambda functions
• Automatic – no action needed
• Starts with December 2020
billing cycle
12. Developers can now configure
Lambda functions for:
10 GB in memory with up to
6 vCPUs proportional to memory
configuration
Build compute-intensive workloads:
• Machine learning, genomics, gaming,
HPC applications
Build memory-intensive workloads:
• Batch, ETL, analytics, media processing
AWS Lambda: Larger Lambda functions
Configured memory (MB) Allocated cores
128 – 1769 1
1770 – 3538 2
3539 – 5307 3
5308 – 7076 4
7077 – 8845 5
8846 – 10240 6
13. • Easier dependency management
and application building with
container images
• Use a consistent set of tools for
containers and Lambda-based
applications
• Deploy large applications with
AWS provided or third-party
images of up to 10 GB
AWS Lambda container image support
P A C K A G E A N D D E P L O Y F U N C T I O N S A S C O N T A I N E R I M A G E S
14. Simple developer experience
C R E A T E F U N C T I O N A S C O N T A I N E R I M A G E
docker push
Amazon Elastic
Container Registry
Container image
Upload image to registry
Invoke
Status: ACTIVE
Ready for invoke
Lambda
function
Container image
1. Pull image from Amazon ECR
2. Optimize image
3. Deploy image to Lambda
CreateFunction
Container image
Status: PENDING
AWS Lambda
15. AWS SAM developer experience
C R E A T E F U N C T I O N A S C O N T A I N E R I M A G E
docker push
Amazon Elastic
Container Registry
Container image
Upload image to registry
Invoke
Status: ACTIVE
Ready for invoke
Lambda
function
Container image
1. Pull image from Amazon ECR
2. Optimize image
3. Deploy image to Lambda
CreateFunction
Container image
Status: PENDING
AWS Lambda
AWS SAM will package the container, push it to a repository, and
create or update the Lambda function with a single command
16. AWS Consulting Partners are here to help
This is not a complete list. To view all AWS Lambda Delivery Partners, visit https://aws.amazon.com/lambda/partners
17. A new way for developer tools and
third-party tools to integrate
deeply into the Lambda
environment
• Capturing diagnostics before,
during, and after function
invocation
• Instrumenting code without
changing it
• Fetch configuration settings or
secrets before function
invocation
• Detect and alert on function
activity through hardened
security agents
AWS Lambda Extensions
Extension
layer
https://s12d.com/extensions-intro
18. Lambda Extensions – internal
AWS Lambda service
Execution environment
ProcessAPI endpoints
Lambda function Extension
• Runs within the runtime, in-process with Lambda function code
• Allows modification of startup and runtime process
• Language-specific environment variables / wrapper scripts
19. Lambda Extensions – external
AWS Lambda service
Execution environment
Process
Lambda function Extension
ProcessAPI endpoints
• Run outside the runtime as separate processes
• Can start before runtime process, continue after runtime shutdown
20. Lambda Extensions – Logs API
• Take logs from the execution environment and send to extensions for
local processing or shipping to outside destinations
AWS Lambda service
Execution environment
Process
Lambda function Extension
ProcessAPI endpoints
21. Lambda Extensions – Lambda lifecycle
FUNCTION
INIT
FUNCTION
INVOCATION
FUNCTION
INVOCATION
EXTENSION INIT
EXTENSION
PROCESSING
EXTENSION
PROCESSING
RUNTIME INIT
RUNTIME
PROCESSING
RUNTIME
PROCESSING
RUNTIME
SHUTDOWN
EXTENSION
SHUTDOWN
Lambda execution
environment
Lambda execution
environment
Lambda execution
environment
INIT INVOKE FREEZE/
THAW
FREEZE/
THAW
INVOKE SHUTDOWN
Extensions start
before runtime
Time after invoke to process
telemetry about the invoke
Time after runtime
ends for final tasks
22. Extensions available today
A W S L A M B D A R E A D Y P A R T N E R , A W S P A R T N E R , A N D A W S T O O L S U S I N G L A M B D A E X T E N S I O N S
23. Create, manage, and invoke
Lambda functions securely from
inside your virtual private cloud
(VPC) or on-premises data centers
without exposing traffic to the
public internet
• Invoke Lambda functions
without leaving the AWS
private network
• Uses AWS PrivateLink
• Removes need for network
address translation (NAT)
gateways
VPC endpoints for AWS Lambda
VPC
Lambda
service APIs
Instance Endpoints
24. Allows CPUs to perform a higher
number of integer and floating-
point operations per clock cycle
• Python – libraries can be
compiled with the AVX2 flag or
linked with MKL to take
advantage of AVX2
• Java – Java’s JIT compiler can
auto-vectorize code to run with
AVX2 instructions
• Golang – use the gcc compiler
for Go, gccgo
• Node – use the AVX2-enabled
or MKL-enabled versions of
libraries
AWS Lambda – AVX2 support
A D V A N C E D V E C T O R E X T E N S I O N S 2
25. AWS Lambda – AVX2 support
For vectorizable algorithms,
this can enhance performance,
resulting in lower latencies
and higher throughput
Filter No AVX2 With AVX2
Performance
improvement
Bilinear 105 ms 71 ms 32%
Bicubic 122 ms 73 ms 40%
Lanczos 136 ms 77 ms 43%
Image source: https://unsplash.com/photos/IMXhx6qhvf0. Photo credit: Daniel Seßler.
26. Now generally available
• Gives you deep insight into
how your Lambda-based
applications are performing
• Works with CloudWatch and
AWS X-Ray to show a
complete picture
• Single-page view of costs,
cold starts, performance, and
more critical information
Amazon CloudWatch Lambda Insights
27. AWS Step Functions + Amazon API Gateway
You can now add Amazon
API Gateway actions to your
Step Functions workflows
• Request response
Or
• Wait for callback
• AWS Identity and Access
Management (IAM) for
access controls
• Supports tag-based and API-
GW resource policies
28. Synchronous “blocking” calls to
Express Workflows
• No need to poll for response
• Great for:
• High-volume microservice orchestration
• Fast compute tasks that communicate
via HTTPS
Step Functions Synchronous Express Workflows
AWS Step Functions
Express Workflows
Client
29. Create and replay an
encrypted archive of the events
published to an event bus
• Record and store events
processed by any type of
event bus
• Filter archived events
using event pattern
matching
• Replay stored events to all
rules defined for the event
bus (excluding managed
rules created by other
AWS services)
Amazon EventBridge replay and archiving
Amazon EventBridge
rule
Event archive
30. • Local testing of AWS Lambda Extensions
• Container image support
• HTTP APIs in SAM local
• AmazonMQ as an event source for
AWS Lambda
• Mutual TLS (mTLS) for REST and HTTP
APIs
• Cached and parallel builds
• Logs API for AWS Lambda Extensions
• AWS Lambda Code Signer
SAM CLI updates
31. Aurora Serverless V2 – improved
scalability, performance, multi-AZ
support, read replicas, and global
database support
Amazon DevOps Guru – managed
operations service that provides
guidance on potential operational
issues, trained on years of data
from Amazon and AWS
Amazon Lookout for Metrics –
detect business anomalies, pulling
data from potentially numerous
AWS services and AWS Partner
products
AWS Proton – automate and
manage infrastructure provisioning
and code deployments for
serverless and container-based
applications
Grab bag: Check these out!
32. There are so many new capabilities to
make your serverless applications:
• Faster
• Lower cost
• Larger scale
• More easily deployed
• Easier to debug and troubleshoot
• More resilient
• Have even less code
FIN / ACK
https://s12d.com/svs207