For the most recent update on ongoing service disruptions affecting the AWS Middle East (UAE) Region (ME-CENTRAL-1), refer to the AWS Health Dashboard. For information on AWS Service migration, see How do I migrate my services to another region?
AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1 / 18
- Hello! Sorry, I know this is probably a common question, but none of the current content reflects my situation. Anyway, I am using Cognito. My Accounts are fully passwordless, with no option built-i...
- I have been working with clients for many years, helping them properly configure and use Amazon SES in accordance with AWS policies. Until recently, our sending was stable. However, in recent weeks, w...
- I have an AWS batch with an EKS computer environment. I want to use the AWS Secrets Store CSI Driver provider and be able to use Secret Manager secret as a volume and mount it as Env_Var in the Pod. M...
- Hi, I took the [AWS Certified Solutions Architect - Associate (SAA-C03) ](https://aws.amazon.com/certification/certified-solutions-architect-associate/)exam yesterday on February 18, 2026 and receiv...
- Hi, Why is it that I can't see this option under Security tab? What am I missing? Thanks!
-  I am trying to build a dashboard within Quick Suite using cross function datasets. I seem to be the only one withi...
- Hello, We recently experienced service instability due to automatic security patches being applied to our Amazon MSK cluster during peak business hours (approx. 10:00 AM local time). These updates tr...
- My account looks completely reset after changing password. I don't see services I use, though they seem to work. The account id also changed.
- How i can resolve accessing aws web service in my internal network?
- We’re using Gateway Load Balancer (GWLB) to insert third-party firewalls into our traffic path using GENEVE tunnelling. One thing we’re unclear on: when traffic is forwarded through GWLB to the firew...
- We have an interface VPCendpoint for an AWS service and attached a security group to it. Does the security group control traffic to the endpoint, or just the traffic from the endpoint to the service ?
- Hi! If a client uses my app to collect data and the data is stored in my database who is the owner of the data? I saw that with legal agreements you can define if for example my company stores the da...
- Hi. We have recently migrated from AWS Inspector Classic to AWS Inspector V2 which provides CIS scans for our EC2 fleet. We successfully configured everything and have scans running on several AL2-b...
- Hi, I want to run my own hypervisor (KVM/QEMU) on an EC2 bare metal instance and launch a guest VM that uses AMD SEV (not the EC2 managed SEV-SNP “Confidential VM” mode). Goal: Host: EC2 m6a.metal ...
- I'm using a CloudFront distribution with a Lambda@Edge function as a secure proxy for a Cognito User Pool. The purpose of the function is to intercept outbound POST requests to Cognito, inject a Secre...
- Amazon resource identifier: arn:aws:ec2:eu-north-1:618951595864:instance/*********** Remote IP/Ports: ************ 9068 Protocol: UDP Total Gbits sent: 209.250951216 Total packets sent: 22204048 Tot...
- Hello everyone, I’ve recently earned the AWS Certified Cloud Practitioner and come from a cybersecurity background (INE eEDA), with hands-on experience in security fundamentals, networking, and monit...
- We are using the OpenTelemetry (OTel) Collector to collect logs from our EKS cluster and forward them to a centralized CloudWatch Logs group. Although we are already excluding info‑level logs, our Clo...
Recent articles
see all1 / 18
- Amrita PandeyEXPERTpublished 12 days ago0 votes101 viewsAWS Extended Support charges escalate significantly over time—Year 2 doubles the rate, Year 3+ triples it. For organizations with hundreds of resources, these costs can reach tens of thousands monthly...
- AWS OFFICIALUpdated 25 days ago0 votes89 viewsThis article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs.
- AWS OFFICIALUpdated a month ago0 votes101 viewsThis article shows how AWS Unified Operations helps financial institutions enhance their overall operational excellence to meet Digital Operational Resilience Act (DORA) requirements.
- YalaEXPERTpublished a month ago0 votes90 viewsThis article provides a ready-to-use Athena SQL query to identify all Amazon ElastiCache clusters running Redis or Valkey engines across AWS accounts using Cost and Usage Report data. Useful for cost ...
- ChirayuEXPERTpublished a month ago0 votes97 viewsWell-Architected IaC Analyzer tool
- AbdulMEXPERTpublished a month ago0 votes1.8K viewsThis article provides a practical guide to implementing user-level cost tracking and usage limiting for Amazon Bedrock, helping you maintain visibility and control as your AI applications grow.
- jonthomascampbellEXPERTpublished a month ago0 votes65 viewsAmazon EC2 instances that stop cleanly a few minutes after startup are often misinterpreted as experiencing infrastructure instability or hypervisor issues. In many cases, however, this behavior is ca...
- AWS OFFICIALUpdated a month ago0 votes351 viewsThis article explains how to use AWS Unified Operations to address the operational challenges of running telecommunications (telecom) workloads at scale. Unified Operations addresses challenges from i...
- jonthomascampbellEXPERTpublished 2 months ago0 votes106 viewsAmazon EC2 automatic recovery helps restore instances when sustained system-level failures occur. However, customers sometimes notice that automatic recovery does not trigger even though an instance e...
- AWS OFFICIALUpdated 2 months ago2 votes413 viewsLearn how to integrate Dynatrace with AWS Incident Detection and Response to automate incident response and create context-rich support cases that expedite issue resolution.
- Harish MandhadiEXPERTpublished 2 months ago0 votes320 viewsStop overpaying for AI. Your chatbot's routine queries shouldn't cost the same as mission-critical transactions. Bedrock's new inference tiers let you optimize each workload independently.
- Mark_SEXPERTpublished 2 months ago0 votes102 viewsDemonstrates how Java async I/O operations can benefit file processing applications
- Kanwar BajwaEXPERTpublished 2 months ago0 votes221 viewsThis article addresses a common knowledge gap among cloud architects and developers who often misunderstand how Service Level Agreements (SLAs) work in distributed systems.
- Kanwar BajwaEXPERTpublished 2 months ago0 votes118 viewsThis article provides a comprehensive guide for AWS administrators and support teams who need to monitor support cases across multiple AWS accounts within their organization. As organizations scale an...
- Kanwar BajwaEXPERTpublished 2 months ago0 votes126 viewsThis article provides a comprehensive guide for AWS administrators and security teams who need to monitor service adoption across their AWS Organizations. As organizations scale and teams gain autonom...
- AWS OFFICIALUpdated 3 months ago1 votes298 viewsThis article explains how AWS Unified Operations empowers financial services industry (FSI) customers to strengthen resilience against service disruptions and accelerate successful migrations and prod...
- AWS OFFICIALUpdated 3 months ago0 votes292 viewsThis article explains how AWS Unified Operations, our highest tier support plan providing context-aware expertise and rapid resolution addresses the operational challenges of running generative AI (ge...
- AvinashEXPERTpublished 3 months ago1 votes192 viewsPurpose of this article is to offer general guidance on how to troubleshoot issues related to deployment of CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. It summarizes common issue...
Recent selections
see all1 / 5
- Benjamin LecoqEXPERTpublished 2 years ago9 votes17.3K viewsRe:invent 2024 takes place in Las Vegas (Nevada) from Monday 12/02 to Friday 12/06. This selection will focus on cost optimization related announcements
- Jonathan_DEXPERTpublished 2 years ago4 votes12.1K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes93 viewsDo you want to monitor your Amazon WorkSpaces usage and optimize your costs? Deploy Cost Optimizer for Amazon WorkSpaces to review your WorkSpaces usage and manage costs.
- AWS OFFICIALUpdated 2 years ago0 votes77 viewsThis selection includes content and solutions supporting FSI related compliance and requirements covering security, immutable storage, and general guidance.
- AWS OFFICIALUpdated 2 years ago0 votes133 viewsAs a best practice, AWS recommends that you use AWS Identity and Access Management (IAM) roles instead of IAM users with long-term credentials such as access keys.
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTAntonio Lagrotteria
EXPERTOleksii Bebych
EXPERTOsvaldo Marte
EXPERTSedat SALMAN
EXPERTAdeleke Adebowale .J.
EXPERTTushar Jagdale
EXPERTMatt Barbieri
EXPERTSHAJAM
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTGK
EXPERTGunasekaran, Makendran
EXPERTGarre Sandeep
EXPERTThanniru Anil Kumar
EXPERTMax Clements
EXPERT
