Welcome to above the clouds

AWS – Amazon MQ now supports ActiveMQ version 5.15.15
You can now launch Apache ActiveMQ 5.15.15 brokers on Amazon MQ. This patch update to ActiveMQ contains several fixes and new features compared to the previously supported version, ActiveMQ 5.15.14. Read More for the details.

Azure – Prevent Shared Key authorization for an Azure Storage account
Enhance secure access to Azure Storage accounts with Prevent Shared Key authorization. Read More for the details.

Azure – Azure Storage — Attribute-based Access Control (ABAC) now available for preview
Attribute-based Access Control (ABAC) is an authorization mechanism that defines access levels based on attributes associated with security principals, resources, requests or the environment. You can now use ABAC in Azure Storage for Blobs and ADLS Gen2 by defining conditions on role-assignments based on resource and request attributes. Read More for the details.

GCP – SRE fundamentals 2021: SLIs vs. SLAs. vs SLOs
A big part of ensuring the availability of your applications is establishing and monitoring service-level metrics—something that our Site Reliability Engineering (SRE) team does every day here at Google Cloud. The end goal of our SRE principles is to improve services and in turn the user experience. The concept of SRE starts with the idea […]

GCP – Google Cloud and Seagate: Transforming hard-disk drive maintenance with predictive ML
Data centers may be in the midst of a flash revolution, but managing hard disk drives (HDDs) is still paramount. According to IDC, stored data will increase 17.8% by 2024 with HDD as the main storage technology. At Google Cloud, we know first-hand how critical it is to manage HDDs in operations and preemptively identify […]

AWS – Amazon CloudWatch Synthetics supports cron expression for scheduling
CloudWatch Synthetics now supports cron expressions, allowing for flexibility when you schedule canaries to monitor your endpoints. For example, you can run a canary every minute on weekdays between 8 AM and 5 PM. Alternately, you can schedule a canary run for the third Tuesday of the month at 12 PM. Read More for the […]

AWS – Introducing IAM Access Control for Apache Kafka on Amazon MSK
Today we announced AWS Identity and Access Management (IAM) Access Control for Amazon MSK. IAM Access Control is a security option offered at no additional cost that simplifies cluster authentication and Apache Kafka API authorization using IAM role or user policies to control access. By using IAM Access Control, customers no longer need to build […]

AWS – Amazon CloudFront announces price cuts in India and Asia Pacific regions
Amazon CloudFront announces price cuts of up to 36% in India and up to 20% in the Asia Pacific region (Hong Kong, Indonesia, Philippines, Singapore, South Korea, Taiwan, & Thailand) for Regional Data Transfer Out to Internet rates. The new CloudFront prices in these regions are effective May 1st, 2021. You can find CloudFront’s updated […]

Azure – Append blob support in Azure Data Lake Storage is now generally available
Applications can now create append blobs in addition to block blobs in Azure Data Lake Storage accounts and append to them using Append Block operations. Applications that need to add information to existing files efficiently and continuously can leverage append blobs. Read More for the details.
GCP – Chrome Insider: Managing BeyondCorp Enterprise’s threat and data protection capabilities in Chrome
Google’s BeyondCorp Enterprise recently launched, offering organizations a zero trust solution that enables secure access to applications and cloud resources with integrated threat and data protection. These threat and data protection capabilities are delivered directly through Chrome, so organizations can easily take advantage of our web-based protections. Due to BeyondCorp Enterprise’s agentless approach utilizing the […]