6/16/2025, 12:00:00 AM ~ 6/17/2025, 12:00:00 AM (UTC)

Recent Announcements

AWS Compute Optimizer now identifies idle EC2 Auto Scaling groups with GPU instances

AWS Compute Optimizer now detects idle EC2 Auto Scaling groups using G and P instance types, enabling you to identify additional savings opportunities in your AWS spend. As AI development accelerates, organizations are creating more Auto Scaling groups with G and P instance types for training and inference workloads. Once you enable the NVIDIA CloudWatch agent, Compute Optimizer analyzes utilization data and identifies groups that have completed jobs and remained idle during your specified lookback period, making it easier to identify and prevent waste on these high-cost instance types.\n This new feature is available in all AWS Regions where AWS Compute Optimizer is available except for the AWS GovCloud (US) and the China Regions. The new recommendations will also be available in Cost Optimization Hub. For more information about Compute Optimizer, visit our product page and documentation. You can start using AWS Compute Optimizer through the AWS Management Console, AWS Services CLI, or AWS SDK.

Amazon S3 extends additional context for HTTP 403 Access Denied error messages to AWS Organizations

Amazon S3 now includes additional context in HTTP 403 Access Denied errors for requests made to resources in accounts within the same AWS Organization. This context includes the type of policy that denied access, the reason for denial, and information on the AWS Identity and Access Management (IAM) user or role that requested access to the resource. This context helps you to troubleshoot access issues, identify the root cause of access denied errors, and fix incorrect access controls by updating the relevant policies. This additional context is also available in AWS CloudTrail logs.\n Enhanced access denied error messages are rolling out in the coming weeks in all AWS Regions. To learn more about how to troubleshoot access denied errors in S3, visit the S3 User Guide and the IAM troubleshooting documentation.

Amazon RDS for MySQL announces Innovation Release 9.3 in Amazon RDS Database Preview Environment

Amazon RDS for MySQL now supports community MySQL Innovation Release 9.3 in the Amazon RDS Database Preview Environment, allowing you to evaluate the latest Innovation Release on Amazon RDS for MySQL. You can deploy MySQL 9.3 in the Amazon RDS Database Preview Environment which provides the benefits of a fully managed database, making it simpler to set up, operate, and monitor databases.\n MySQL 9.3 is the latest Innovation Release from the MySQL community. MySQL Innovation releases include bug fixes, security patches, as well as new features. MySQL Innovation releases are supported by the community until the next innovation minor, whereas MySQL Long Term Support (LTS) Releases, such as MySQL 8.0 and MySQL 8.4, are supported by the community for up to eight years. Please refer to the MySQL 9.3 release notes and Amazon RDS MySQL release notes for more details. Amazon RDS Database Preview Environment supports both Single-AZ and Multi-AZ deployments on the latest generation of instance classes. Amazon RDS Database Preview Environment database instances are retained for a maximum of 60 days and are automatically deleted after the retention period. Amazon RDS database snapshots created in the Preview Environment can only be used to create or restore database instances within the Preview Environment. Amazon RDS Database Preview Environment database instances are priced the same as production RDS instances created in the US East (Ohio) Region. For further information, see Working with the Database Preview Environment. To get started with the Preview Environment from the RDS console, navigate here.

AWS Network Firewall now supports AWS Transit Gateway native integration

AWS Network Firewall now supports native integration with AWS Transit Gateway for simplified deployment and management of network security across your global AWS infrastructure. This capability is available in 5 AWS Regions, allowing customers to implement security controls more efficiently.\n AWS Transit Gateway interconnects your Amazon Virtual Private Clouds (VPCs) and on-premises networks, while AWS Network Firewall provides comprehensive security controls for those VPCs. Native attachment simplifies connecting these services, providing centralized security control without complex VPC configurations. Additionally, you can configure one or multiple Availability Zones (AZs) for high availability, maintaining traffic flow within the same AZ. This integration is available in the following AWS Regions: Africa (Cape Town), Asia Pacific (Hyderabad), Europe (Stockholm), Europe (Zurich), and Middle East (UAE). There are no additional charges for this native integration beyond standard pricing of AWS Network Firewall and AWS Transit Gateway. To get started, visit the AWS Network Firewall service documentation.

AWS Blogs

AWS Japan Blog (Japanese)

AWS News Blog

AWS Open Source Blog

AWS Big Data Blog

AWS Database Blog

AWS for Industries

Artificial Intelligence and Machine Learning

AWS Security Blog

AWS Storage Blog

Open Source Project

AWS CLI

Amazon Chime SDK React Components Library

Bottlerocket OS

AWS Load Balancer Controller