Wednesday, 13 February 2019

Amazon RDS for Oracle gives assistance to Oracle Application Express (APEX) Versions 18.1 and 18.2

Oracle® Database is a relational database management system developed by Oracle. It is simple to set up, operate, and scale Oracle Database deployments in the cloud with Amazon RDS. Also, you can deploy several editions of Oracle Database within few minutes with cost-effective and re-sizable hardware capacity. Amazon RDS make you available to concentrate on application development by handling time-consuming database administration activities covering provisioning, backups, software patching, monitoring, and hardware scaling. Amazon RDS assists Oracle Application Express (APEX) through the utilization of the APEX and APEX-DEV alternatives. Oracle APEX can be deployed as a run-time environment or as a complete development environment for web-based applications. With the utilization of Oracle APEX, developers can create applications completely inside the web browser. Now, Amazon RDS for Oracle gives assistance to Oracle Application Express (APEX) 18.1 and 18.2 versions for the Oracle Database versions 11.2, 12.1 and 12.2. Refer Oracle Database Pricing of Amazon RDS to know the regional availability.

Tuesday, 12 February 2019

Now AWS AppSync is Obtainable in EU (London) Region

AWS AppSync is a serverless back-end for mobile, web, and enterprise applications. It is simple to create data driven web and mobile applications by managing safely all the application data management operations like online/offline data access, data synchronization, and data manipulation over several data sources like Amazon DynamoDB, Amazon ElasticSearch Service, AWS Lambda, Amazon RDS, and any HTTP data source with AWS AppSync. This uses GraphQL, an open standard enabling to request, change and subscribe to the accurate data they require in one network request. GraphQL is an API query language designed to create client applications by offering an instinctive and flexible syntax for detailing their data needs. Now, AWS AppSync is accessible in 11 AWS Regions: US East (N. Virginia), US East (Ohio), US West (Oregon), Asia Pacific (Mumbai), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), EU (Frankfurt), EU (Ireland), and EU (London).

Monday, 11 February 2019

Now AWS Fargate Has Assistance For AWS PrivateLink

AWS PrivateLink clarifies the security of data shared with cloud-based applications by removing the exposure of data to the public Internet. AWS PrivateLink offers individual connectivity between VPCs, AWS services, and on-premises applications, securely on the Amazon network. It is simple to join services over distinct accounts and VPCs to importantly clarify the network architecture with AWS PrivateLink. Now AWS Fargate has support for AWS PrivateLink. AWS PrivateLink enables you to privately connect your Amazon VPC to AWS services containing Amazon ECR. When you generate PrivateLink endpoints for ECR, Fargate can fetch container images without requiring to travel across the public internet. AWS PrivateLink endpoints are simple to configure. They offers valid connectivity to Fargate excluding an Amazon Network Address Translation (NAT) Gateway. You can shield your Fargate tasks from internet traffic, and lessen the exposure to threats with AWS PrivateLink endpoints. AWS Fargate integration with AWS PrivateLink is accessible in every regions where AWS Fargate is available, refer AWS region table

Saturday, 9 February 2019

Now, Amazon Transcribe is Accessible in the South America (Sao Paulo)

Amazon Transcribe is an Automatic Speech Recognition (ASR) service which makes it simple for you to add a speech-to-text potential to your applications. Amazon Transcribe can be use to design text transcripts of audio and video files. Amazon Transcribe allows companies to improve the accessibility and discoverability of their audio and video content. This speech recognition service is helpful across a spread of use cases. Users connection centers can turn call recordings into text and study the data for actionable intelligence. Media content creators can automate subtitling workflows for large engagement and accessibility. Besides, Marketers and Advertisers can boost content discovery and present extra focused advertising related to the extracted metadata from video files. Now Amazon Transcribe is accessible in the AWS South America (Sao Paulo) Region, Asia Pacific (Sydney), Asia Pacific (Singapore), Asia Pacific (Mumbai), Canada (Central), South America (Sao Paulo), EU (Ireland), EU (London), EU (Paris), US East (Northern Virginia), US East (Ohio), and US West (Oregon). To get detail information on Amazon Transcribe, refer documentation

Friday, 8 February 2019

AppStream 2.0 Allows Custom Scripts Before Session Begin And After Session End

Amazon AppStream 2.0 is a completely organized application streaming service. You centrally handle your desktop applications on AppStream 2.0 and securely send them to any computer. Now, session script is declared by Amazon AppStream 2.0 ; with this feature, you can apply custom scripts which run before a user’s session begins and after their session ends. Today, Amazon AppStream 2.0 announced session scripts. With this feature, you can implement custom scripts that execute before a user's session starts and after their session ends. These scripts clarify frequent scenarios for admins. It is easy to customize a session depend on user identity, configure applications before a session begins, gather logs, and execute cleanup tasks after a session ends. These session scripts can also be use to upload usage data from the streaming session to S3 and use tools like Amazon Athena to analyze the data. This feature is obtainable at no extra costs in every AWS Regions where AppStream 2.0 is available. AppStream 2.0 provides pay-as-you-go pricing. Please visit try our sample applications on Amazon AppStream 2.0

Thursday, 7 February 2019

Amazon S3 Bucket Public Access Considerations

Amazon S3 provides a set of an appliance to manage access of the buckets and objects. An Access Control List (ACL) is one of these access control appliances. It has come to our attention that some customers have changed default permissions and granted public access to their buckets.

We can grant public access to the bucket using ACLs, we must take the following issues into consideration :

1. Bucket Public "READ" Access :
It allows anybody to get a complete list of the bucket content. It does not grant permissions to read the content of an object. However, a list of object names can provide more information than required to the public. It referred to as "list" access.

2. Bucket Public "WRITE" Access :
It allows anybody to add, delete or replace objects in S3 bucket. This may result in unintended changes on the account. It referred to as "put" or "upload" access.

3. Bucket Public "WRITE ACP" Access :
It allows anybody to modify the access control permissions on the bucket. These entities can add permission to the ACL, an opening bucket to more public access than we require. Example, public WRITE_ACP permission on the bucket enables anybody to modify the ACL and grant permissions such as grant write permission on the bucket to others. It referred to as "edit permissions" access.

You can use ACLs to allow permissions to separate AWS accounts; however, it is firmly suggested that you do not allow public access to your bucket using an ACL.

Security By Default :

Any recently generated bucket is blocked to the public by default, minimizing the risk of accidentally uncover sensitive or private information to the public. Admin can easily revoke public access to older buckets at the account level. AWS has introduced functionality that made it easier for admin to see which buckets are marked as publicly available so they could adjust access controls as required. This product enhancement enables stricter access controls by default, which is welcome news for companies seeking greater peace of mind regarding their data security. While Amazon S3 once allowed a bucket owner to make adjustments to a particular bucket’s visibility settings, it is now possible to make those changes at the AWS account level as well.

Updating ACL to Remove Public Access to Your Buckets :

Use the following steps to remove any public access that you have granted to your bucket via ACL.
1. Sign in to Amazon Web Services and go to your S3 Management Console.
2. Select the bucket from the left. Click the Properties button from right if it's not already enlarged.
3. Refer the Permissions tab and click the Add Bucket Policy link.
4. Select the row that grants permission to everyone. "Everyone" refers to the Amazon S3 All User group.
5. Uncheck all the permissions allowed to everyone (or click x to delete the row). This removes all permissions granted to the public.
6. Click Save to save the ACL.

Best Practices For Protecting Your Amazon S3 Buckets And Objects :

Amazon S3 is a powerful service, and it’s easy to use. But if you don’t pay attention to the security, there can be serious consequences. We highly recommends that you use S3 Bucket Block for publicly accessible as the default setting for any new buckets and objects you may created. Any S3 bucket that has been appointed for internal use only, since there is no need for it to be accessible to the outside world. If you notice that a bucket of yours has been accidentally exposed, you can then go back into your S3 dashboard and set it to “Not public.”

If you have any queries related to this article, then feel free to contact us at www.cloud.in

Inter-Region VPC Peering is Accessible in AWS GovCloud (US)

Amazon VPC allows you to start AWS resources into a virtual network which you have described. A VPC peering connection is a networking connection between two VPCs which allows you to route traffic between them with the help of private IPv4 addresses or IPv6 addresses. Inter-Region VPC Peering permits VPC resources, like Amazon EC2 instances, Amazon RDS databases, and AWS Lambda functions, to divulge with each other at the time of executing in various AWS Region. Since Inter-Region VPC Peering uses private IP addresses, it does not need gateways, VPN connections, or a discrete physical hardware. It gives an easy and cost-effective way to share resources between regions and copy data for geographic redundancy. Now Inter-Region Virtual Private Cloud (VPC) Peering can be setup between the AWS US Govcloud (US) Regions: AWS GovCloud (US-Gov-West) and AWS GovCloud (US-Gov-East). Data moved over Inter-Region VPC Peering connections is charged at the standard inter-region data transfer rates. To know more on Amazon VPC Peering, refer this documentation

Amazon RDS for Oracle gives assistance to Oracle Application Express (APEX) Versions 18.1 and 18.2

Oracle® Database is a relational database management system developed by Oracle. It is simple to set up, operate, and scale Oracle Dat...