AWS Compute Blog

Category: Amazon API Gateway

AWS X-Ray trace view

Introducing AWS Lambda Powertools for .NET

CloudWatch and AWS X-Ray offer functionality that provides comprehensive observability for your applications. Lambda Powertools .NET is now generally available. The library helps implement observability when running Lambda functions based on .NET 6 while reducing the amount of custom code.

Implementing reactive progress tracking for AWS Step Functions

This blog post is written by Alexey Paramonov, Solutions Architect, ISV and Maximilian Schellhorn, Solutions Architect ISV This blog post demonstrates a solution based on AWS Step Functions and Amazon API Gateway WebSockets to track execution progress of a long running workflow. The solution updates the frontend regularly and users are able to track the […]

Deploying Local Gateway Ingress Routing on AWS Outposts

This post is written by Leonardo Solano, Senior Hybrid Cloud Solution Architect and Chris Lunsford, Senior Specialist Solutions Architect, AWS Outposts. AWS Outposts lets customers use the same Amazon Virtual Private Cloud (VPC) security mechanisms, such as security groups and network access control lists, to control traffic flows for on-premises applications running on Outposts. Some […]

Building resilient private APIs using Amazon API Gateway

This post written by Giedrius Praspaliauskas, Senior Solutions Architect, Serverless. Modern architectures meet recovery objectives (recovery time objective, RTO, and recovery point objective, RPO) by being resilient to routine and unexpected infrastructure disruptions. Depending on the recovery objectives and regulatory requirements, developers must choose the disaster recovery strategy. For more on disaster recovery strategies, see […]

KeyStore and TrustStore

Implementing mutual TLS for Java-based AWS Lambda functions

This post is written by Dhiraj Mahapatro, Senior Specialist SA, Serverless and Christian Mueller, Principal Solutions Architect Modern secure applications establish network connections to other services through HTTPS. This ensures that the application connects to the right party and encrypts the data before sending it over the network. You might not want unauthenticated users to […]