5/23/2024, 12:00:00 AM ~ 5/24/2024, 12:00:00 AM (UTC)

Recent Announcements

New open-source AWS Advanced Python Wrapper driver now available for Amazon Aurora and Amazon RDS

The Amazon Web Services (AWS) Advanced Python Wrapper driver is now generally available for use with Amazon RDS and Amazon Aurora PostgreSQL and MySQL-compatible edition database clusters. This database driver provides support for faster switchover and failover times, and authentication with AWS Secrets Manager or AWS Identity and Access Management (IAM).\n The AWS Advanced Python Wrapper driver wraps the open-source Psycopg and the MySQL Connector/Python drivers and supports Python versions 3.8 or newer. You can install the aws-advanced-python-wrapper package using the pip command along with either the psycpg or mysql-connector-python open-source packages. The wrapper driver relies on monitoring database cluster status and being aware of the cluster topology to determine the new writer. This approach reduces switchover and failover times from tens of seconds to single digit seconds compared to the open-source drivers. The AWS Advanced Python Wrapper driver is released as an open-source project under the Apache 2.0 License. Check out the project on GitHub to view installation instructions and documentation.

AWS re:Post Private is now available in five new regions

AWS re:Post Private is now available in five new regions: US East (N. Virginia), Europe (Ireland), Canada (Central), Asia Pacific (Sydney), and Asia Pacific (Singapore).\n re:Post Private is a secure, private version of the AWS re:Post, designed to help organizations increase speed to get started with the cloud, remove technical roadblocks, accelerate innovation, and improve developer productivity. With re:Post Private, it is easier for organizations to build an organizational cloud community that drives efficiencies at scale and provides access to valuable knowledge resources. Additionally, re:Post Private centralizes trusted AWS technical content and offers private discussion forums to improve how organizational teams collaborate internally—and with AWS—to remove technical obstacles, accelerate innovation, and scale more efficiently in the cloud. On re:Post Private, convert a discussion thread into a support case, and centralize AWS Support responses for your organization’s cloud community. Learn more about using AWS re:Post Private on the product page.

AWS announces new AWS Direct Connect location in Chicago, Illinois

Today, AWS announced the opening of a new AWS Direct Connect location within the Coresite CH1 data center in Chicago, Illinois. By connecting your network to AWS at the new Illinois location, you gain private, direct access to all public AWS Regions (except those in China), AWS GovCloud Regions, and AWS Local Zones. This is the fourth AWS Direct Connect site within Chicago Metropolitan area and the 44th site in the United States.\n The Direct Connect service enables you to establish a private, physical network connection between AWS and your data center, office, or colocation environment. These private connections can provide a more consistent network experience than those made over the public internet. The new Direct Connect location at Coresite CH1 offers dedicated 10 Gbps and 100 Gbps connections with MACsec encryption available. For more information on the over 140 Direct Connect locations worldwide, visit the locations section of the Direct Connect product detail pages. Or, visit our getting started page to learn more about how to purchase and deploy Direct Connect.

AWS CloudFormation accelerates dev-test cycle with a new parameter for DeleteStack API

AWS CloudFormation launches a new parameter called DeletionMode for the DeleteStack API. This new parameter allows customers to safely delete their CloudFormation stacks that are in DELETE_FAILED state.\n Today, customers create, update, delete, and re-create CloudFormation stacks when iterating on their cloud infrastructure in their dev-test environments. Customers can use the DeleteStack CloudFormation API to successfully delete their stacks and stack resources. However, certain stack resources can prevent the DeleteStack API to successfully complete for e.g. when customers attempt to delete non-empty Amazon S3 buckets. The DeleteStack API can enter into the DELETE_FAILED state in such scenarios. With this launch, customers can pass FORCE_DELETE_STACK value to the new DeletionMode parameter and delete such stacks.

Amazon EC2 M7i-flex, M7i, C7i, and R7i instances are now available in additional regions

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M7i-flex, M7i, C7i are available in the AWS GovCloud (US-East) Region. In addition, Amazon EC2 M7i-flex, M7i and R7i instances are available in the AWS GovCloud (US-West) Region. These instances are powered by powered by custom 4th Generation Intel Xeon Scalable processors (code-named Sapphire Rapids)custom processors, available only on AWS, and offer up to 15% better performance over comparable x86-based Intel processors utilized by other cloud providers.\n M7i-flex instances are the easiest way for you to get price-performance benefits for a majority of general-purpose workloads, and deliver up to 19% better price-performance compared to M6i. M7i-flex instances offer the most common sizes, from large to 8xlarge, and are a great first choice for applications that don’t fully utilize all compute resources such as web and application servers, virtual-desktops, batch-processing, and microservices. M7i, C7i and R7i deliver up to 15% better price-performance compared to prior generation M6i, C6i and R6i instances. They offer larger instance sizes up to 48xlarge, can attach up to 128 EBS volumes and two bare metal sizes (metal-24xl, metal-48xl). These bare-metal sizes support built-in Intel accelerators: Data Streaming Accelerator, In-Memory Analytics Accelerator, and QuickAssist Technology that are used to facilitate efficient offload and acceleration of data operations and optimize performance for workloads.

AWS CloudFormation streamlines deployment troubleshooting with AWS CloudTrail integration

AWS CloudFormation enhances the troubleshooting experience for stack operations with a new AWS CloudTrail deep-link integration. This feature enables quicker resolution of stack provisioning errors. It directly links stack operation events in the CloudFormation Console to relevant CloudTrail events. These links provide detailed visibility into the errors, thus speeding up the dev-test cycle for developers.\n When you create, update, or delete a stack, your operation can encounter provisioning errors, such as missing required parameters for an EC2 instance or inadequate permissions. Previously, troubleshooting a stack provisioning error in the CloudFormation Console was a multi-step process. It involved opening the CloudFormation stack events tab, clicking ‘Detect Root Cause’ to highlight the likely root cause of the error, and then going to the AWS CloudTrail events dashboard. There, you had to manually set filters, such as the timestamp period, to find the detailed history of the stack provisioning API events. Now, clicking ‘Detect Root Cause’ highlights the likely root cause of a stack provisioning error and provides a pre-configured AWS CloudTrail deep-link to API events generated by your stack operation. This provides you with additional context to diagnose and resolve errors and and eliminates multiple manual steps from the troubleshooting process.

AWS Blogs

AWS Japan Blog (Japanese)

AWS Big Data Blog

AWS Database Blog

AWS HPC Blog

AWS for Industries

AWS Machine Learning Blog

Open Source Project

AWS CLI

Amplify for JavaScript

Amplify for iOS

Amazon EKS Anywhere