When your website’s infrastructure is in AWS, it can be tough to keep track of your resources. An often-underutilized solution is AWS CloudWatch, a service that does just what it sounds like - watches everything in your cloud and sends email alerts when something isn’t right. Here are six essential CloudWatch metrics that provide critical insight into how to optimize your AWS environment and ensure your site is meeting your needs.
User Acceptance Testing is a vital but often overlooked aspect of software development. It can seem redundant, and no one wants to hear about software bugs from a frantic email from an end user. But developers and end users may not always have the same understanding of the requirements, and it’s better to know about any potential issues or misalignments before the software goes live rather than afterward.
In this article, I cover some User Acceptance Testing best practices to ensure your application is thoroughly tested, bugs get resolved before launch, and clients are successful and happy.
Anything that gets measured and watched will improve. That’s why it’s valuable to leverage business intelligence tools that deliver insights throughout your organization. SQL Service Reporting Services, or SSRS, has been generating reports for countless companies for years. Recently, Microsoft has been putting more emphasis on its new Power BI service. With all the hype, you may be asking yourself if you should migrate that old SSRS service, or would it just be a waste of time and resources?
You’ve migrated your application to the cloud. Congratulations! Now that your code is in EC2 instances and your files are in S3, you’ll need to ensure everything’s secure. AWS uses a shared responsibility model in terms of security. This means AWS is responsible for security “of” the cloud, while you and your development team are responsible for security “in” the cloud. AWS will protect the infrastructure of the cloud, including hardware, software, and networking that run AWS services. Other security, including access to your AWS resources and the security of your application, is your responsibility.
Here is an overview of four of the most common AWS security features you’ll need to keep your cloud secure.
Imagine you’re having issues with a third-party service that is called whenever a user logs in. Occasionally, the service is unexpectedly unavailable, leaving users stranded when they wanted to sign in to make a purchase. This happens about once a month, resulting in frustrated customers and some scrambling by the dev team before finding the issue.
Making calls to a third-party application is outside the realm of CloudWatch’s abilities, but there is a way to leverage AWS to combat this issue by taking advantage of the cloud’s monitoring capabilities. In this article, Senior Developer Zachary Sersland walks you through an AWS .Net Lambda function example that will prevent your third-party authentication service from becoming unavailable.