AWS Partner Network (APN) Blog

Category: Management Tools

Migration-4

How to Upgrade Large Windows 2008 R2 Workloads in Place

Upgrading legacy systems to the cloud can seem daunting and time-consuming, but with the right combination of AWS Systems Manager, AWS Directory Service, and a few simple AWS Lambda functions, you can upgrade from your outdated Windows environments flawlessly, seamlessly, and at scale. Learn how you can run an in-place upgrade of your Windows 2008 R2 production instances to Windows 2019 R2, and how to control instance tagging so you can orchestrate the root volume replacement process.

AWS-Well-Architected-2

How to Be Successful in the AWS Well-Architected Partner Program: A Guide for APN Consulting Partners

Thanks to the dedication and skill of APN Partners throughout the world, the AWS Well-Architected Partner Program continues to drive benefits for our customers while building a new business stream for partners. Learn about the essential areas that will assist partners in building a successful consultancy practice through the use of tried and tested techniques. The tips provided in this post represent the majority of the feedback we have received from the field in terms of areas where consultancy partners have seen success.

How BriteCore Improved Security and Scalability by Migrating Insurance Workloads with AWS Landing Zone

BriteCore was originally designed as an on-premises data center-based monolith; a state-of-the-art core insurance solution. However, the business agility, cost savings, and increased security of the cloud made it clear the insurance industry had to migrate. Learn how BriteCore used AWS Landing Zone to deliver a modern administrative system for Property & Casualty insurance that could be more agile, scale better, and be more secure than on-premises infrastructure.

AWS-Well-Architected-2

Improving Your AWS Cloud Applications with New AWS Well-Architected Best Practices

AWS recently launched a new version of the AWS Well-Architected Framework, and updates to the AWS Well-Architected Tool. The new changes were made in response to industry trends, as well as feedback from customers and AWS Well-Architected Partners. This post provides a brief overview of what’s new and is intended for AWS Well-Architected Partners, members of the AWS Partner Network (APN) who are new to AWS Well-Architected, or AWS Cloud customers.

Persistent-Systems-AWS-Partners

Managing Multi-Tenancy in Digital Banking with AWS Control Tower

Cost conscious credit unions looking to provide digital banking services need logical isolation from other tenants. Larger credit unions, on the other hand, require physical as well as logical isolation from other tenants. Persistent Systems Digital Credit Union Solution helps a credit union go live in a short time frame with digital banking offerings such as digital loans or digital deposits. The solution uses fine-grained microservices, deployed on Amazon EKS and provided as secure API’s using Amazon API Gateway.

Trend-Micro-AWS-Partners

Using Shift-Left to Find Vulnerabilities Before Deployment with Trend Micro Template Scanner

Shift-Left is increasingly being employed within DevOps organizations to ensure companies minimize risk early in their infrastructure as code (IaC) deployment cycle. This post explains how to combine two of the technologies that make Shift-Left possible. The first is AWS CloudFormation, which represents IaC, and the second is Trend Micro’s Template Scanner, which checks your IaC to make sure it conforms to the AWS Well-Architected Framework.

Reducing the Cost of Managing Multiple AWS Accounts Using AWS Control Tower

As larger and more complex workloads are deployed on AWS, multi-account solutions are an increasingly common architectural blueprint. Often referred to as cloud “landing zones,” these blueprints enable simple administrative boundaries. However, using multiple accounts increases the complexity of security tooling, access control and authorization, and cross-account networking. AWS Control Tower simplifies the process of setting up multi-account environments with predefined security baseline templates.

AWS-Config-Rules-1

Integrating Third-Party Solutions to AWS Config Rule Evaluations

AWS Config continuously monitors and records your AWS resource configurations, and allows you to automate the evaluation of recorded configurations against desired configurations. This post aims to assist you on deploying a set of custom AWS Config Rules that leverages third-party REST APIs to evaluate AWS resources in an automated fashion. The AWS Config evaluations represented in this guide show the reporting status of Amazon EC2 instances against TrendMicro and Qualys.

Monitoring Your Palo Alto Networks VM-Series Firewall with a Syslog Sidecar

By hosting a Palo Alto Networks VM-Series firewall in an Amazon VPC, you can use AWS native cloud services—such as Amazon CloudWatch, Amazon Kinesis Data Streams, and AWS Lambda—to monitor your firewall for changes in configuration. This post explains why that’s desirable and walks you through the steps required to do it. You now have a way to monitor your Palo Alto Networks firewall that is very similar to how you monitor your AWS environment with AWS Config.

How to Monitor Amazon CloudWatch Synthetics from Dynatrace

Amazon CloudWatch Synthetics monitors RESTful APIs, URLs, and website content endpoints via synthetic traffic. Dynatrace also offers powerful, integrated synthetic capabilities, but if you use both CloudWatch and Dynatrace you have to switch between their consoles to check status. Now, you can integrate CloudWatch Synthetics into Dynatrace and check for unexpected behavior across both platforms from a single dashboard in your Dynatrace account.