DEV Community

Gunnar Grosch
Gunnar Grosch

Posted on

Design considerations when building highly available online applications

This post contains resources for the session Design Considerations When Building Highly Available Online Applications.

The availability of your online application can be impacted by many events, such as network congestion on the internet, server failures, service failures, malicious activity, faulty software updates, and more. Join us in this session to learn about advanced patterns using AWS Edge services Amazon CloudFront, AWS Global Accelerator, AWS WAF, and AWS Shield, that you can implement now to address common availability risks that threaten your application.

How Amazon Route 53 Application Recovery Controller works

https://docs.aws.amazon.com/r53recovery/latest/dg/introduction-how-it-works.html

Enhanced origin failover using Amazon CloudFront and AWS Lambda@Edge

https://aws.amazon.com/blogs/media/enhanced-origin-failover-using-amazon-cloudfront-and-aws-lambdaedge/

Static stability using Availability Zones

https://aws.amazon.com/builders-library/static-stability-using-availability-zones/

Using AWS Shield Advanced protection groups to improve DDoS detection and mitigation

https://aws.amazon.com/blogs/security/using-aws-shield-advanced-protection-groups-to-improve-ddos-detection-and-mitigation/

The three most important AWS WAF rate-based rules

https://aws.amazon.com/blogs/security/three-most-important-aws-waf-rate-based-rules/

Virtual Waiting Room on AWS

https://aws.amazon.com/solutions/implementations/virtual-waiting-room-on-aws/

Fine-tune and optimize AWS WAF Bot Control mitigation capability

https://aws.amazon.com/blogs/security/fine-tune-and-optimize-aws-waf-bot-control-mitigation-capability/

AWS Best Practices for DDoS Resiliency

https://d0.awsstatic.com/whitepapers/Security/DDoS_White_Paper.pdf

If you have any questions, please reach out on Twitter or LinkedIn.

Top comments (0)