AWS Developer Tools Blog
Category: Technical How-to
Update to AWS SDK for Java v2, AWS SDK for .NET v3, and AWS Tools for PowerShell when using S3 GetObjectAttributes API
This blog post is intended to notify customers using the AWS SDK for Java v2.x, AWS SDK for .NET v3.x, or AWS Tools for PowerShell v4.x, of a change in parameter type for the S3 GetObjectAttributes API. This change may require a type definition change in your code. On September 20, 2023, we released a […]
New: Improved flexibility when configuring endpoint URLs with the AWS SDKs and tools
The AWS SDKs and Tools team is excited to announce improvements for configuration of the endpoint URL used for API service requests through the shared SDK configuration file and environment variables with the AWS SDKs and Tools. Previously, you could specify the endpoint URL used for AWS requests by setting the –endpoint-url command line parameter […]
Run an Active-Passive, multi region API using Aurora RDS Global Cluster
Increasingly enterprises and customers run and manage applications at a global scale that need to be resilient and highly available. In order to deliver the best possible experience to their end consumers, these applications need to safeguard against risks of service disruptions and downtime. Risks due to service downtime, due to natural disasters, hardware failures, […]
Using Amazon Corretto (OpenJDK) for lean, fast, and efficient AWS Lambda Applications
Using Amazon Corretto (OpenJDK) for lean, fast, and efficient AWS Lambda By Guest Blogger Adam Bien In this post, I will discuss how you can launch large, monolithic applications on top of AWS Lambda, and I’ll show that they perform well and are cost effective. You’ll learn that the same application you develop for Lambda […]
Version 1 of the AWS Cloud Development Kit (AWS CDK) is now in maintenance mode
The AWS Cloud Development Kit (AWS CDK) version 1 (v1) for JavaScript, TypeScript, Java, Python, .NET and Go is now in maintenance mode. AWS CDK v1 is no longer receiving higher-level “L2” construct updates for new or existing services. It will continue receiving updates for new and updated resource level “L1” constructs, critical bug fixes, and security updates only. We […]
Using atomic counters in the Enhanced DynamoDB AWS SDK for Java 2.x client
We are pleased to announce that users of the enhanced client for Amazon DynamoDB in AWS SDK for Java 2.x can now enable atomic counters, as well as add custom DynamoDB update expressions through the enhanced client extension framework. Customers have told us that they want improved performance and consistency when updating table records. The […]
Tips & Tricks: Debugging your C# CDK project in Visual Studio
NOTE: This post assumes the reader has some familiarity with the AWS Cloud Development Kit (CDK). To get started with the AWS CDK, please visit the AWS CDK Developer Guide and follow the AWS CDK for .NET workshop. The AWS CDK is an an open-source Infrastructure-as-Code (IaC) framework that allows developers to model and provision […]
Increasing development speed with CDK Watch
The AWS Cloud Development Kit (CDK) CLI introduces a new mode of operation, cdk watch, and two new flags for cdk deploy, –hotswap and –no-rollback. cdk watch makes development faster by monitoring your code and assets for changes and automatically performing the optimal form of deployment every time a file change is detected, meaning you […]
AWS Batch Application Orchestration using AWS Fargate
Many customers prefer to use Docker images with AWS Batch and AWS Cloudformation for cost-effective and faster processing of complex jobs. To run batch workloads in the cloud, customers have to consider various orchestration needs, such as queueing workloads, submitting to a compute resource, prioritizing jobs, handling dependencies and retries, scaling compute, and tracking utilization […]
Virus scan S3 buckets with a serverless ClamAV based CDK construct
Edit: March 10th 2022 – Updated post to use AWS Cloud Development Kit (CDK) v2. Protecting systems from malware is an essential part of a systems protection strategy. It is important to both scan binaries and other files before introducing them into your system boundary and appropriately respond to potential threats in accordance to your […]