Amazon Aurora DSQL launches Playground for interactive database exploration

Today, AWS announces Amazon Aurora DSQL Playground, a browser-based interactive environment that enables developers to explore and experiment with Aurora DSQL without requiring an AWS account. Developers can write and execute SQL queries, test schema designs, and experience Aurora DSQL’s PostgreSQL-compatible distributed SQL capabilities directly in their browser with no setup or configuration required. Aurora DSQL Playground provides an instant sandbox environment with temporary clusters where developers can learn Aurora DSQL concepts, prototype application schemas, and validate query patterns before deploying to production. The playground includes sample datasets that enable developers to get started faster, understand how Aurora DSQL handles common database operations, and explore best practices for designing schemas optimized for distributed workloads. To get started, visit the Aurora DSQL Playground. For production workloads, get started with Aurora DSQL for free with the AWS Free Tier. To learn more about Amazon Aurora DSQL, visit the webpage.
Quelle: aws.amazon.com

Aurora DSQL launches new support for Tortoise, Flyway, and Prisma

Today we are announcing the release of Aurora DSQL integrations for popular ORM and database migration tools: an adapter for Tortoise (Python ORM), a dialect for Flyway (schema management tool), and CLI tools for Prisma (Node.js ORM). These integrations help developers use their preferred frameworks with Aurora DSQL while automatically handling IAM authentication and Aurora DSQL-specific compatibility requirements. The Aurora DSQL Adapter for Tortoise enables Python developers to build applications using Tortoise without writing custom authentication code. The adapter supports both asyncpg and psycopg drivers, integrates with the Aurora DSQL Connector for Python for automatic IAM token generation, and includes compatibility patches for rich migrations. The Flyway dialect adapts Flyway for Aurora DSQL’s distributed architecture by automatically handling Aurora DSQL-specific behaviors such as IAM-based authentication. The Prisma CLI tools help Node.js developers validate their Prisma schemas for Aurora DSQL compatibility and generate Aurora DSQL-compatible migrations, streamlining the path from development to production. To get started, visit the GitHub repositories for Tortoise ORM, Flyway, and Prisma. Get started with Aurora DSQL for free with the AWS Free Tier. To learn more about Aurora DSQL, visit the webpage.
Quelle: aws.amazon.com

Aurora DSQL launches new integrations for Visual Studio Code SQLTools and DBeaver

Today we are announcing the release of the Aurora DSQL Driver for SQLTools and the Aurora DSQL Plugin for DBeaver Community Edition. These integrations allow customers to leverage popular database tools to run queries against Aurora DSQL clusters, explore database schemas, and manage their data. Both integrations simplify database connectivity by automatically handling IAM authentication and transparently managing access tokens, eliminating the need to write token generation code or manually supply IAM tokens. The SQLTools driver integrates Aurora DSQL with Visual Studio Code and is also available on Open VSX Registry for use with VS Code-compatible editors such as Cursor and Kiro. The DBeaver plugin is built on top of the Aurora DSQL Connector for JDBC. Both integrations eliminate security risks associated with traditional user-generated passwords by using AWS IAM credentials for secure, password-free authentication. To get started, visit the Aurora DSQL documentation page for VSCode and DBeaver. Get started with Aurora DSQL for free with the AWS Free Tier. To learn more about Aurora DSQL, visit the webpage.
Quelle: aws.amazon.com

AWS Security Agent adds support for penetration tests on shared VPCs across AWS accounts

AWS Security Agent now enables customers to run penetration tests against Virtual Private Cloud (VPC) resources shared from other AWS accounts within the same organization. This new capability allows security teams to perform comprehensive security assessments across their multi-account environments using AWS Security Agent. By leveraging AWS Resource Access Manager (RAM), customers can securely share VPC resources from sub-accounts to a central AWS account where penetration testing is conducted. This feature addresses the challenge of testing distributed architectures spanning multiple AWS accounts. Security professionals can now create an Agent Space in a central account and use RAM to access VPC resources from connected sub-accounts for testing. This streamlines security assessments for organizations with complex multi-account setups. The ability to comprehensively test shared VPC resources enhances an organization’s overall security posture. To get started, ensure your accounts are part of the same AWS Organization and configure resource sharing using RAM. Then launch AWS Security Agent in your central account to begin penetration testing across the shared VPC resources. For more information on AWS Security Agent and its penetration testing capabilities, visit the AWS Security Agent documentation. 
Quelle: aws.amazon.com

AWS Outposts racks now support additional Amazon CloudWatch metrics in AWS GovCloud (US) Regions

AWS Outposts racks now support VifConnectionStatus and VifBgpSessionState Amazon CloudWatch metrics in AWS GovCloud (US) Regions. These metrics provide visibility into the connectivity status of your Outposts racks’ Local Gateway (LGW) and Service Link Virtual Interfaces (VIFs) with your on-premises devices. These metrics provide you with the ability to monitor Outposts VIF connectivity status directly within the CloudWatch console, without having to rely on external networking tools or coordination with other teams. You can use these metrics to set alarms, troubleshoot connectivity issues, and ensure your Outposts racks are properly integrated with your on-premises infrastructure. The VifConnectionStatus metric indicates whether an Outposts VIF is successfully connected, configured, and ready to forward traffic. A value of “1” means that the VIF is operational, while “0” means that it is not ready. The VifBgpSessionState metric shows the current state of the BGP session between the Outposts VIF and the on-premises device, with values ranging from 1 (IDLE) to 6 (ESTABLISHED). The VifConnectionStatus and VifBgpSessionState metrics are now available for all Outposts VIFs in AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions where Outposts racks are available. To get started, read this blog post and access the metrics in the CloudWatch console. To learn more, check out the CloudWatch metrics for Outposts documentation for first-generation Outposts racks.
Quelle: aws.amazon.com