7/18/2024, 12:00:00 AM ~ 7/19/2024, 12:00:00 AM (UTC)
Recent Announcements
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) C7i-flex instances that deliver up to 19% better price performance compared to C6i instances, are available in Asia Pacific (Sydney) and Asia Pacific (Tokyo) regions. C7i-flex instances expand the EC2 Flex instances portfolio to provide the easiest way for you to get price performance benefits for a majority of compute intensive workloads. The new instances are powered by the 4th generation Intel Xeon Scalable custom processors (Sapphire Rapids) that are available only on AWS, and offer 5% lower prices compared to C7i.\n C7i-flex instances offer the most common sizes, from large to 8xlarge, and are a great first choice for applications that don’t fully utilize all compute resources. With C7i-flex instances, you can seamlessly run web and application servers, databases, caches, Apache Kafka, and Elasticsearch, and more. For compute-intensive workloads that need larger instance sizes (up to 192 vCPUs and 384 GiB memory) or continuous high CPU usage, you can leverage C7i instances. C7i-flex instances are available in the following AWS Regions: US East (Ohio), US West (N. California), Europe (Ireland, London, Paris, Spain, Stockholm), Canada (Central), Asia Pacific (Mumbai, Singapore, Sydney, Tokyo), and South America (São Paulo). To learn more, visit Amazon EC2 C7i-flex instances.
Amazon RDS for SQL Server supports password policies for SQL Server logins
Amazon Relational Database Service (Amazon RDS) for SQL Server now supports password policies for SQL Server logins. If you use SQL Server logins to authenticate users to an RDS for SQL Server database instance, you can now apply password policies to meet your compliance requirements. You can configure password policy parameters such as minimum length, minimum age, maximum age, lockout threshold, lockout duration, and lockout reset counter.\n Customers can configure password policies in all AWS regions where Amazon RDS for SQL Server databases are available, including the AWS GovCloud (US) Regions. Amazon RDS for SQL Server makes it simple to set up, operate, and scale SQL Server deployments in the cloud. See Amazon RDS for SQL Server Pricing for pricing details and regional availability.
AWS Lambda now supports SnapStart for Java functions that use the ARM64 architecture
Starting today, you can use Lambda SnapStart with Java functions that use the ARM64 instruction set architecture.\n SnapStart for Java delivers up to 10x faster function startup performance at no extra cost, enabling you to build highly responsive and scalable Java applications using AWS Lambda without having to provision resources or implement complex performance optimizations. This launch expands SnapStart’s performance benefits to functions running on ARM64 architecture, which enables upto 34% better price performance as compared to x86. Lambda SnapStart for Java functions on ARM64 architecture is available in all AWS Regions where SnapStart is generally available. You can activate SnapStart for new or existing Lambda functions that use the ARM64 architecture and Java versions 11 or higher using the AWS Lambda API, AWS Management Console, AWS Command Line Interface (AWS CLI), AWS Cloud Formation, AWS Serverless Application Model (AWS SAM), AWS SDK, and AWS Cloud Development Kit (AWS CDK). For more information on Lambda SnapStart, see the documentation and the SnapStart launch blog post. To learn more about Lambda, see the Lambda developer guide.
Amazon EC2 High Memory instances now available in Asia Pacific (Jakarta) Region
Starting today, Amazon EC2 High Memory instances with 6TiB of memory (u-6tb1.56xlarge, u-6tb1.112xlarge) are now available in Asia Pacific (Jakarta) region. Customers can start using these new High Memory instances with On Demand and Savings Plan purchase options.\n Amazon EC2 High Memory instances are certified by SAP for running Business Suite on HANA, SAP S/4HANA, Data Mart Solutions on HANA, Business Warehouse on HANA, and SAP BW/4HANA in production environments. For details, see the Certified and Supported SAP HANA Hardware Directory.
New open-source Advanced MYSQL ODBC Driver now available for Amazon Aurora and RDS
The Amazon Web Services (AWS) ODBC Driver for MYSQL is now generally available for use with Amazon RDS and Amazon Aurora MySQL-compatible edition database clusters. This database driver provides support for faster switchover and failover times, and authentication with AWS Secrets Manager or AWS Identity and Access Management (IAM).\n The Amazon Web Services (AWS) ODBC Driver for MYSQL is a standalone driver and supports RDS and community MySQL 8.X and Amazon Aurora MySQL version 3.X. You can install the aws-mysql-odbc package for Windows, Mac or Linux by following established installation guides in GitHub. The driver relies on monitoring the database cluster status and being aware of the cluster topology to determine the new writer. This approach reduces switchover and failover times from tens of seconds to single digit seconds compared to the open-source driver. The AWS Advanced MySQL ODBC driver is released as an open-source project under version 2 of the GNU General Public License (GPL v2). For more details click here to view Getting Started instructions and guidance on how to raise issues.
AWS Private CA now supports ARM architecture in Kubernetes
AWS Private Certificate Authority (AWS Private CA) announces support for ARM architecture in Kubernetes. With this support, you can now use the AWS Private CA Connector for Kubernetes with AWS Graviton instances in AWS or ARM based hosts on premise. The connector lets you use private certificates to provide secure authentication and encryption over TLS for your Kubernetes containers, applications, and service meshes. By using the connector, you can use AWS Private CA, a managed, hardware security module (HSM) backed, highly-available cloud certificate authority (CA), to issue private certificates to your Kubernetes clusters automatically at scale. The connector works with Kubernetes clusters deployed through Amazon Elastic Kubernetes Services (Amazon EKS), on-premises, or other infrastructure.\n The Connector for Kubernetes is one of three connector types offered for AWS Private CA. Connectors allow you to replace your existing CAs with AWS Private CA in environments that have an established native certificate distribution solution. This means that instead of using multiple CA solutions, you can utilize a single private CA solution for your enterprise. You benefit from comprehensive support, extending to Kubernetes, Active Directory, and, mobile devices. Connector for Kubernetes support for ARM architecture is available in all AWS Regions where AWS Private CA is available. To learn more about how you can use AWS Private CA with Kubernetes, you can visit the AWS Private CA User Guide and the Connector for Kubernetes GitHub repository.
AWS Control Tower customization frameworks are available in opt-in regions
Today, AWS Control Tower customization frameworks Account Factory for Terraform (AFT) and Customizations for AWS Control Tower (CfCT) are available in additional AWS Regions. AFT and CfCT are now available in 5 additional commercial AWS Regions: Asia Pacific (Hyderabad, Jakarta, and Osaka), Israel (Tel Aviv), and Middle East (UAE). They are also available in the AWS GovCloud (US-East) Region. Customers in these home regions can now deploy customizations in their accounts using the AFT and CfCT frameworks.\n AWS Control Tower offers the easiest way to set up and govern a secure, multi-account AWS environment. It simplifies AWS experiences by orchestrating multiple AWS services on your behalf while maintaining the security and compliance needs of your organization. Account Factory for Terraform (AFT) sets up a Terraform pipeline to help you provision and customize accounts in AWS Control Tower. Customizations for AWS Control Tower (CfCT) helps you customize your AWS Control Tower landing zone and accounts with AWS CloudFormation templates and service control policies (SCPs). To learn more, visit the Account Factory for Terraform and Customizations for AWS Control Tower pages in the AWS Control Tower User Guide. You may also review the release notes on the AFT Github page and the CfCT Github page. AFT and CfCT are supported in all commercial regions with some exceptions. See the list of Region limitations here.
Amazon Redshift Serverless with lower base capacity available in the Europe (London) Region
Amazon Redshift now allows you to get started with Amazon Redshift Serverless with a lower data warehouse base capacity configuration of 8 Redshift Processing Units (RPUs) in the AWS Europe (London) region. Amazon Redshift Serverless measures data warehouse capacity in RPUs, and you pay only for the duration of workloads you run in RPU-hours on a per-second basis. Previously, the minimum base capacity required to run Amazon Redshift Serverless was 32 RPUs. With the new lower base capacity minimum of 8 RPUs, you now have even more flexibility to a support diverse set of workloads of small to large complexity based on your price performance requirements. You can increment or decrement the RPU in units of 8 RPUs.\n Amazon Redshift Serverless allows you to run and scale analytics without having to provision and manage data warehouse clusters. With Amazon Redshift Serverless, all users, including data analysts, developers, and data scientists, can use Amazon Redshift to get insights from data in seconds. With the new lower capacity configuration, you can use Amazon Redshift Serverless for production environments, test and development environments at an optimal price point when a workload needs a small amount of compute. To get started, see the Amazon Redshift Serverless feature page, user documentation, and API Reference.
AWS Network Firewall is now available in the AWS Canada West (Calgary) region
Starting today, AWS Network Firewall is available in the AWS Canada West (Calgary) Region, enabling customers to deploy essential network protections for all their Amazon Virtual Private Clouds (VPCs).\n AWS Network Firewall is a managed firewall service that is easy to deploy. The service automatically scales with network traffic volume to provide high-availability protections without the need to set up and maintain the underlying infrastructure. It is integrated with AWS Firewall Manager to provide you with central visibility and control over your firewall policies across multiple AWS accounts. To see which regions AWS Network Firewall is available in, visit the AWS Region Table. For more information, please see the AWS Network Firewall product page and the service documentation.
AWS IAM Identity Center adds independent 90-days session duration for Amazon Q Developer
AWS IAM Identity Center administrators now have an option to extend the session duration for Amazon Q Developer separately from the session durations of other IAM Identity Center integrated applications and the AWS access portal. Users of Q Developer can work in the integrated development environment (IDE) for 90 days without being asked to re-authenticate by Q Developer.\n Previously, session durations for Q Developer in the IDE had the same length as other IAM Identity Center integrated applications and the AWS access portal, between 15 minutes and 90 days. Customers appreciated the flexibility to change the configuration and many opted for more frequent re-authentication requirements as a security measure. However developers found the requirement for frequent re-authentication unnecessary for their context. With this release, IAM Identity Center provides additional flexibility to define separately the session duration for Q Developer. IAM Identity Center is the recommended service for managing workforce access to AWS applications and multiple AWS accounts. It can be used with an existing identity source or by creating a new directory. It can manage workforce access to some or all AWS applications, and to some or all AWS accounts. AWS IAM Identity Center is available at no additional cost in AWS Regions. Learn more about session duration here.
Amazon Aurora zero-ETL integration with Amazon Redshift now available in 8 additional regions
Amazon Aurora MySQL zero-ETL integration with Amazon Redshift is now supported in 8 additional regions, enabling near real-time analytics and machine learning (ML) using Amazon Redshift. With this launch, Amazon Aurora MySQL zero-ETL integration with Amazon Redshift is supported in all AWS commercial regions where Amazon Redshift is supported.\n Zero-ETL integration helps you derive holistic insights across many applications and break data silos in your organization, making it simpler to analyze data from Aurora database clusters. Additionally, you can use data filtering to select the databases and tables to be replicated from Aurora MySQL to Amazon Redshift. Multiple filters can be applied to the zero-ETL integration, allowing you to tailor the replication to your specific needs and leverage Amazon Redshift’s powerful analytical functionalities. To learn more and get started with data filtering, visit this post. Amazon Aurora MySQL zero-ETL integration with Amazon Redshift is available for Aurora MySQL version 3.05 (compatible with MySQL 8.0.32) and higher in the Asia Pacific (Jakarta), Asia Pacific (Hyderabad), Asia Pacific (Melbourne), Canada West (Calgary), Europe (Spain), Europe (Zurich), Israel (Tel Aviv), and Middle East (UAE). For all regions supported by this zero-ETL integration, see the supported AWS regions. To learn more and get started with zero-ETL integration, visit Amazon Aurora zero-ETL integration with Amazon Redshift and the getting started guides for Aurora and Amazon Redshift.
AWS Blogs
AWS Japan Blog (Japanese)
- Best practices for using large-scale GitHub Actions self-hosted runners on AWS
- AWS Weekly Roundup: Amazon Bedrock and Amazon Q advanced features and more (July 15, 2024).
- Amazon MemoryDB vector search is open to the public
- Build a Unity app for Apple Vision Pro on AWS
AWS Japan Startup Blog (Japanese)
AWS Big Data Blog
- Migrate from Apache Solr to OpenSearch
- How Volkswagen streamlined access to data across multiple data lakes using Amazon DataZone – Part 1
AWS Contact Center
AWS Database Blog
- Configure password policy for Amazon RDS for SQL Server
- Migrate an Amazon QLDB Ledger to Amazon Aurora PostgreSQL
- Replace Amazon QLDB with Amazon Aurora PostgreSQL for audit use cases
AWS for Industries
- Key Takeaways from the Inaugural NRF 2024: Retail’s Big Show Asia Pacific
- Supercharging Development for Automotive E-Cockpit on AWS: Achieving Bit Parity
The Internet of Things on AWS – Official Blog
AWS Machine Learning Blog
- Intelligent document processing using Amazon Bedrock and Anthropic Claude
- Metadata filtering for tabular data with Knowledge Bases for Amazon Bedrock
- Secure AccountantAI Chatbot: Lili’s journey with Amazon Bedrock
- How Mend.io unlocked hidden patterns in CVE data with Anthropic Claude on Amazon Bedrock