6/16/2025, 12:00:00 AM ~ 6/17/2025, 12:00:00 AM (UTC)
Recent Announcements
AWS Compute Optimizer now identifies idle EC2 Auto Scaling groups with GPU instances
AWS Compute Optimizer now detects idle EC2 Auto Scaling groups using G and P instance types, enabling you to identify additional savings opportunities in your AWS spend. As AI development accelerates, organizations are creating more Auto Scaling groups with G and P instance types for training and inference workloads. Once you enable the NVIDIA CloudWatch agent, Compute Optimizer analyzes utilization data and identifies groups that have completed jobs and remained idle during your specified lookback period, making it easier to identify and prevent waste on these high-cost instance types.\n This new feature is available in all AWS Regions where AWS Compute Optimizer is available except for the AWS GovCloud (US) and the China Regions. The new recommendations will also be available in Cost Optimization Hub. For more information about Compute Optimizer, visit our product page and documentation. You can start using AWS Compute Optimizer through the AWS Management Console, AWS Services CLI, or AWS SDK.
Amazon S3 extends additional context for HTTP 403 Access Denied error messages to AWS Organizations
Amazon S3 now includes additional context in HTTP 403 Access Denied errors for requests made to resources in accounts within the same AWS Organization. This context includes the type of policy that denied access, the reason for denial, and information on the AWS Identity and Access Management (IAM) user or role that requested access to the resource. This context helps you to troubleshoot access issues, identify the root cause of access denied errors, and fix incorrect access controls by updating the relevant policies. This additional context is also available in AWS CloudTrail logs.\n Enhanced access denied error messages are rolling out in the coming weeks in all AWS Regions. To learn more about how to troubleshoot access denied errors in S3, visit the S3 User Guide and the IAM troubleshooting documentation.
Amazon RDS for MySQL announces Innovation Release 9.3 in Amazon RDS Database Preview Environment
Amazon RDS for MySQL now supports community MySQL Innovation Release 9.3 in the Amazon RDS Database Preview Environment, allowing you to evaluate the latest Innovation Release on Amazon RDS for MySQL. You can deploy MySQL 9.3 in the Amazon RDS Database Preview Environment which provides the benefits of a fully managed database, making it simpler to set up, operate, and monitor databases.\n MySQL 9.3 is the latest Innovation Release from the MySQL community. MySQL Innovation releases include bug fixes, security patches, as well as new features. MySQL Innovation releases are supported by the community until the next innovation minor, whereas MySQL Long Term Support (LTS) Releases, such as MySQL 8.0 and MySQL 8.4, are supported by the community for up to eight years. Please refer to the MySQL 9.3 release notes and Amazon RDS MySQL release notes for more details. Amazon RDS Database Preview Environment supports both Single-AZ and Multi-AZ deployments on the latest generation of instance classes. Amazon RDS Database Preview Environment database instances are retained for a maximum of 60 days and are automatically deleted after the retention period. Amazon RDS database snapshots created in the Preview Environment can only be used to create or restore database instances within the Preview Environment. Amazon RDS Database Preview Environment database instances are priced the same as production RDS instances created in the US East (Ohio) Region. For further information, see Working with the Database Preview Environment. To get started with the Preview Environment from the RDS console, navigate here.
AWS Network Firewall now supports AWS Transit Gateway native integration
AWS Network Firewall now supports native integration with AWS Transit Gateway for simplified deployment and management of network security across your global AWS infrastructure. This capability is available in 5 AWS Regions, allowing customers to implement security controls more efficiently.\n AWS Transit Gateway interconnects your Amazon Virtual Private Clouds (VPCs) and on-premises networks, while AWS Network Firewall provides comprehensive security controls for those VPCs. Native attachment simplifies connecting these services, providing centralized security control without complex VPC configurations. Additionally, you can configure one or multiple Availability Zones (AZs) for high availability, maintaining traffic flow within the same AZ. This integration is available in the following AWS Regions: Africa (Cape Town), Asia Pacific (Hyderabad), Europe (Stockholm), Europe (Zurich), and Middle East (UAE). There are no additional charges for this native integration beyond standard pricing of AWS Network Firewall and AWS Transit Gateway. To get started, visit the AWS Network Firewall service documentation.
AWS Blogs
AWS Japan Blog (Japanese)
- Weekly Generative AI with AWS — Week 06/09/2025
- AWS Weekly — 2025/6/9
- Introducing the agent coding experience in Visual Studio and JetBrains IDEs
- Accelerating Product Engineering with Teamcenter Simulation on AWS
- Performance and metrics enhancements in AWS Transit Gateway and AWS Cloud WAN
AWS News Blog
AWS Open Source Blog
AWS Big Data Blog
AWS Database Blog
- Native SQL Server replication options on Amazon RDS Custom for SQL Server
- Implement row-level security in Amazon Aurora MySQL and Amazon RDS for MySQL
AWS for Industries
Artificial Intelligence and Machine Learning
- How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner
- Extend your Amazon Q Business with PagerDuty Advance data accessor
- Innovate business logic by implementing return of control in Amazon Bedrock Agents