<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Well-Architected Archives | Cloudar</title>
	<atom:link href="https://cloudar.be/category/well-architected/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/category/well-architected/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Tue, 17 Mar 2026 08:10:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Dear SaaS Vendor, We&#8217;ve Been Waiting Since 2017.</title>
		<link>https://cloudar.be/awsblog/dear-saas-vendor-weve-been-waiting-since-2017/</link>
		
		<dc:creator><![CDATA[Tom De Blende]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 07:27:19 +0000</pubDate>
				<category><![CDATA[Managed Services]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<category><![CDATA[Serverless]]></category>
		<category><![CDATA[Well-Architected]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22717</guid>

					<description><![CDATA[<p>Let me tell you about two feature requests. The first one was filed on November 19, 2017. Seven years ago. The ask: let an admin change a customer&#8217;s email address in Jira Service Management. Not migrate accounts through a four-step workaround involving Atlassian ID. Just&#8230; change an email address. The kind of thing you&#8217;d expect [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/dear-saas-vendor-weve-been-waiting-since-2017/">Dear SaaS Vendor, We&#8217;ve Been Waiting Since 2017.</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Let me tell you about two feature requests.</p>
<p>The first one was filed on November 19, 2017. Seven years ago. The ask: let an admin change a customer&#8217;s email address in Jira Service Management. Not migrate accounts through a four-step workaround involving Atlassian ID. Just&#8230; change an email address. The kind of thing you&#8217;d expect a junior developer to ship on a Tuesday afternoon. As of today, it has 779 votes, 447 watchers, and a status of <em>&#8220;Future Consideration.&#8221;</em> Which, in SaaS-speak, translates roughly to: &#8220;we heard you, we filed it, please stop asking.&#8221;</p>
<p>The second one landed in January 2019. The request: make Confluence&#8217;s alphabetical page sorting persistent, so new pages don&#8217;t just pile up at the bottom like uninvited guests. Six years later: 600 votes, 261 watchers, status <em>&#8220;Under Consideration.&#8221;</em> Progress!</p>
<p>Now, to be fair to Atlassian, they&#8217;re not uniquely terrible. Every major SaaS vendor has a graveyard of feature requests exactly like these. Sensible, obvious, clearly wanted by thousands of paying customers. Just&#8230; never quite prioritized. Because they have a roadmap. And you&#8217;re not on it.</p>
<p>This is the part of the SaaS brochure they don&#8217;t show you.</p>
<p><strong>The Pitch vs. The Reality</strong></p>
<p>SaaS vendors are exceptionally good at one thing before you sign: making you feel like you&#8217;re about to get exactly what you need. The demos are polished. The slide decks are beautiful. The onboarding is smooth. Eighty percent of your requirements? Covered, on day one.</p>
<p>It&#8217;s that remaining twenty percent where things get interesting.</p>
<p>That twenty percent is where your actual workflows live. The edge cases. The things specific to how your organization actually operates. And when you file a support ticket asking about them, you enter a fascinating parallel universe where time moves differently. Features are &#8220;on the roadmap.&#8221; Updates will come &#8220;in a future release.&#8221; Your vote has been registered. Thank you for your feedback.</p>
<p>Meanwhile, you&#8217;re paying. Every month. For the product as it exists, not as it was promised.</p>
<p><strong>The Numbers Are Telling</strong></p>
<p>The scale of SaaS sprawl is difficult to overstate. According to BetterCloud&#8217;s annual State of SaaSOps report, the average number of SaaS applications per company peaked at 130 in 2022 and even after a wave of consolidation, still sits at over 100 today. That&#8217;s more than 100 subscriptions to manage, renew, secure, and integrate. For every single organization.</p>
<p>The waste embedded in that sprawl is just as striking. Gartner estimates that approximately 30% of purchased SaaS licenses go unused, what they bluntly call &#8220;toxic spend.&#8221; BetterCloud puts a price tag on it: companies report wasting an average of more than $135,000 per year on unused software licenses alone. And Gartner projects SaaS spending will continue growing at around 19% annually, reliably outpacing the budgets meant to fund it.</p>
<p>Do the arithmetic on a typical mid-market tool. Fifty users. €50 per user per month. That&#8217;s €30,000 per year. Every year. With annual price increases that arrive in your renewal email as a polite fait accompli. After five years, you&#8217;ve spent €150,000-plus on software you don&#8217;t own, can&#8217;t modify, and can&#8217;t easily leave and somewhere between a quarter and a third of those licenses have been sitting idle.</p>
<p><strong>Something Changed</strong></p>
<p>Here&#8217;s what&#8217;s different in 2026: building software got dramatically cheaper and faster. Not incrementally but by an order of magnitude.</p>
<p>Tools like Claude Code and Kiro represent a new category of agentic coding assistants. They don&#8217;t just suggest the next line. They can take a requirement, reason through a solution, write the code, test it, catch errors, and iterate, with minimal human supervision. What previously required a team of developers and months of work can now be done by one technically capable person in days.</p>
<p>This isn&#8217;t science fiction. It&#8217;s happening right now in engineering teams across the world.</p>
<p>And it fundamentally changes the math on one of the oldest questions in IT: should we build or buy?</p>
<p><strong>What You Get When You Build Your Own</strong></p>
<p>When you build a custom application -even a relatively simple internal tool- you build exactly what you need. No more, no less. You control the data model, the workflow, the integrations, and the roadmap. And critically: you decide what gets built next. Not a product manager in Sydney who&#8217;s never seen your workflows.</p>
<p>Running on cloud-native infrastructure like AWS means scalability, security, and availability are largely handled by the platform. The operational gap between &#8220;something you built&#8221; and &#8220;something a vendor hosts for you&#8221; has narrowed considerably. And the cost gap has flipped.</p>
<p>A custom-built equivalent to that €30,000/year SaaS tool, developed with AI-assisted tooling and running on serverless AWS infrastructure, might cost a fraction of that annually in operational expenses, after a one-time build investment that has also come down dramatically. More importantly: you own the asset. It does exactly what you need. And you&#8217;re not waiting seven years for someone to let you update an email address.</p>
<p><strong>A Word of Honesty</strong></p>
<p>Custom software isn&#8217;t free of responsibility. Someone has to maintain it, secure it, and evolve it. The SaaS argument, that someone else handles the infrastructure, the uptime and the patches, is not without merit. And for commodity functions like email, video conferencing, or payroll, that argument still wins. These are solved problems. Building your own would be an expensive act of reinvention.</p>
<p>But pairing custom-built applications with managed cloud services gives you the operational coverage of SaaS without the product dependency. You get uptime. You get security. You get to decide what comes next.</p>
<p><strong>So What Should You Actually Do?</strong></p>
<p>Not everything should be custom-built. That would be its own kind of madness.</p>
<p>The question worth asking is simpler: where are your core differentiating workflows? The processes that encode years of operational knowledge. The edge cases that keep showing up in feature request threads, yours and everyone else&#8217;s, year after year, status unchanged.</p>
<p>Those are exactly the features that will never quite make it onto a SaaS vendor&#8217;s roadmap.</p>
<p>The question is no longer &#8220;can we afford to build?&#8221; The question, in 2026, is whether you can afford to keep waiting.</p>
<p>JSDCLOUD-5746 would like a word.</p>
<p>The post <a href="https://cloudar.be/awsblog/dear-saas-vendor-weve-been-waiting-since-2017/">Dear SaaS Vendor, We&#8217;ve Been Waiting Since 2017.</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#CloudartotheRescue: DO use AWS CloudFormation (a response)</title>
		<link>https://cloudar.be/awsblog/do-use-aws-cloudformation-a-response/</link>
		
		<dc:creator><![CDATA[Ben Bridts]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 15:43:04 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Well-Architected]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=19792</guid>

					<description><![CDATA[<p>Over the past few months I’ve seen the article “Do not use AWS CloudFormation” by Greg Swallow make the rounds a couple of times. While there are some valid reasons you could prefer Terraform, I don’t agree with many of the issues Greg has with CloudFormation. Some of the weaknesses he identifies, I’d even count [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/do-use-aws-cloudformation-a-response/">#CloudartotheRescue: DO use AWS CloudFormation (a response)</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Over the past few months I’ve seen the article “Do not use AWS CloudFormation” by Greg Swallow make the rounds a couple of times. While there are some valid reasons you could prefer Terraform, I don’t agree with many of the issues Greg has with CloudFormation. Some of the weaknesses he identifies, I’d even count as strengths! So here I’m going to go through and counter his points, following the structure of his piece. All quotes (in italics) are from Greg’s blog to provide context.</strong></p>
<h3>Indirection</h3>
<p><em>With Terraform […] no intermediary sits between you and the service you’re controlling. Want an RDS instance? Terraform will make calls directly to the RDS API.</em></p>
<p>First of all, both Terraform and CloudFormation provide some level of indirection. CloudFormation converts a YAML or JSON template to a set of API calls. Terraform does the same, starting from an HCL template.</p>
<p>Having that transformation in the cloud can make it harder to see the underlying API responses, but that’s not because of the conversion between template and API. The same APIs are still getting called, and they will raise the same errors when there is something wrong with the requests. If you look in CloudTrail, you will see these requests together with the entire error message.</p>
<p>The way CloudFormation implements that translation layer (for newer resources) can add a second step after an API call fails. However, it also allows for standardized errors in other cases, like “Resource Already Exists” or “Only configurable when creating a resource”.</p>
<p><em>The prerequisite steps you have to take to use CloudFormation [StackSets] across multiple accounts </em>also <em>must be taken just to have CloudFormation spin up resources in multiple regions </em>within the same account<em>.</em></p>
<p>I’d argue that StackSets (and Service Catalog) are benefits of using CloudFormation. However, if they are too much overhead for a project, you can still deploy to multiple regions by adding a &#8211;region parameter to your deployment command. Although, by not using StackSets, you’d lose some convenience features, like being able to update multiple regions in parallel easily.</p>
<h3>Logic</h3>
<p><em>Terraform offers a rich set of data sources and transforming data with Terraform is a breeze.</em></p>
<p>I agree that CloudFormation could use more intrinsic functions, but that does not mean it’s severely lacking in functionality. In many cases, you can replace the missing functions by being stricter about the acceptable inputs.</p>
<h3>Speed</h3>
<p><em>AWS CloudFormation is S-L-O-W.</em></p>
<p>CloudFormation can seem slow because it tries very hard not to get into a state where your infrastructure is broken. Both CloudFormation and Terraform try to execute as much in parallel as possible (keeping dependencies between resources in mind). However, CloudFormation will not start deleting resources until every creation and update has been completed. On top of that, CloudFormation will validate that all actions (deletes included) finish before it considers the deployment complete.</p>
<h3>Sync vs Async</h3>
<p><em>Wrapping CI/CD tooling around AWS CloudFormation is […] a difficult matter of polling stack updates until the right stack state bubbles up from an aws cloudformation CLI query.</em></p>
<p>Here Greg argues that Terraform is better because polling for changes can be challenging to do. However, if you’re okay with executing a command-line tool (like Terraform), you can AWS CloudFormation deploy, and the AWS CLI will do all that for you.</p>
<p>Even without the CLI, running async comes with some significant advantages:</p>
<ul>
<li>You don’t have to worry about the build tool (or your laptop) crashing or losing internet connectivity</li>
<li>Everyone with access to the AWS account can see when an update is in progress and poll independently for changes</li>
<li>You don’t need a process that keeps running during the change. The deployment will keep running until it’s done.</li>
</ul>
<p>Running 100% as a managed service also includes the following advantages:</p>
<ul>
<li>You don’t need to execute any code on your machine</li>
<li>You don’t need to worry about different tool versions and upgrades between them</li>
<li>You don’t need an access key with full admin permissions</li>
<li>You get state management included by default (instead of having to configure it yourself).</li>
</ul>
<p>That safer approach has the potential of doubling the time it takes to execute a change (assuming that a create/update takes as long as a delete), but having automatic rollbacks is frequently worth the extra time.</p>
<h3>Portability</h3>
<p><em>If you learn AWS CloudFormation, then guess what: you can’t take your skills with you. If you put forth the effort to learn Terraform, then you can take your skills to any other cloud.</em></p>
<p>While the workflow might stay the same, the resources that you create are going to be vastly different between clouds. The primary skill that you should learn (independently from the tool) is how AWS works. This will make your skills transferable between tools instead of between clouds. You wouldn’t expect carpenters to list their experience with a hammer (even if it’s useful for all kinds of projects): instead you want to know what they can build.</p>
<h3>Importing existing resources</h3>
<p><em>I can’t even begin to tell you how to import resources with AWS CloudFormation, and neither can AWS’s engineers.</em></p>
<p>This is pure hyperbole. Importing resources into CloudFormation is documented, and the console has a basic wizard.</p>
<p>If we ignore the exaggeration, there is indeed still room for improvement. While all new resource types should support importing, there is still a long tail of old resources that are not yet supported. “All resources should support resource import” is a valid point. However, CloudFormation was usable before the introduction of this feature. Whether this is a dealbreaker will depend on how frequently you expect to import unsupported resources.</p>
<h3>Service Quotas</h3>
<p><em>The list of quotas for the AWS CloudFormation service is just hilarious.</em></p>
<p>I don’t think that documented limitations are necessarily a bad thing, and I wonder how many of those quotas people actually run into. It’s been a long time since I had to look at that page.</p>
<h3>TL;DR</h3>
<p>CloudFormation makes different trade-offs than Terraform. Looking at its sharp edges without considering the advantages they bring is unfair.</p>
<p>Use the tool that matches your requirements. If you want safe deployments, tight integration within AWS, and minimal operational overhead, CloudFormation will probably fit the bill.</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/awsblog/do-use-aws-cloudformation-a-response/">#CloudartotheRescue: DO use AWS CloudFormation (a response)</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#CloudartotheRescue: How to use custom domain names on a private REST API Gateway</title>
		<link>https://cloudar.be/awsblog/cloudartotherescue-how-to-use-custom-domain-names-on-a-private-rest-api-gateway/</link>
		
		<dc:creator><![CDATA[Iman Azimnia]]></dc:creator>
		<pubDate>Thu, 04 Nov 2021 14:54:19 +0000</pubDate>
				<category><![CDATA[Well-Architected]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=19742</guid>

					<description><![CDATA[<p>API Gateway is one the better-known services of AWS and one that fits great in a serverless architecture. It’s your go-to service when you want to create, publish, maintain, and secure your API. Combine it with a Lambda function as your backend together with a DynamoDB as your database and you have a great serverless [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudartotherescue-how-to-use-custom-domain-names-on-a-private-rest-api-gateway/">#CloudartotheRescue: How to use custom domain names on a private REST API Gateway</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>API Gateway is one the better-known services of AWS and one that fits great in a serverless architecture. It’s your go-to service when you want to create, publish, maintain, and secure your API. Combine it with a Lambda function as your backend together with a DynamoDB as your database and you have a great serverless setup that can dynamically scale to your demands. And we have a great hack for you to create a custom domain name on a private REST API Gateway.</strong></p>
<h2><strong>Getting around the Gateway </strong></h2>
<p>The API Gateway comes in four different flavors:</p>
<ol>
<li>HTTP API</li>
<li>WebSocket API</li>
<li>REST API (public)</li>
<li>REST API (private)</li>
</ol>
<p>One of the nice features you have with the API Gateway is that you can create a custom domain for the API Gateway (e.g., www.example.com). <strong>BUT </strong>there is a big catch to this: when you choose the private REST API flavor, you can’t use a custom domain name with your API Gateway. This means you end up with an AWS-provided domain name which is not user-friendly. For example, https://ab123456789.execute-api.eu-west-1.amazonaws.com/test (The format of the AWS provided domain name is: &lt;API ID&gt;.execute-api.&lt;AWS Region&gt;.amazonaws.com/&lt;Stage Name&gt;).</p>
<p><strong>BUT</strong> have no fear: Cloudar is here!</p>
<p>We can bypass this limitation by utilizing an internal application load balancer in front of our API Gateway. This way the load balancer acts as our front door, giving us the ability to use custom domain names and forwarding all traffic to the API Gateway.</p>
<p><strong>Important note: </strong>In this example we aren’t going to dive into the configuration of the API Gateway or the resources that are behind the API Gateway (Lambda, ECS, etc.), but rather the solution for using a custom domain name with your API Gateway.</p>
<p>&nbsp;</p>
<h2>The architectural design</h2>
<p>The components that should already be in place are:</p>
<ul>
<li>A VPC with subnets</li>
<li>Route53 private hosted zone</li>
<li>A valid TLS certificate</li>
</ul>
<p>The components we are going to create are:</p>
<ul>
<li>Internal Application Load balancer</li>
<li>ALB Target group based on IPs</li>
<li>VPC Endpoint for the API Gateway. (In our design we went with VPC Endpoint deployed in 2 AZs for high availability, but you it also works with 1 or 3 AZs)</li>
<li>A private REST API Gateway</li>
</ul>
<p>&nbsp;</p>
<h2>Configuring all the components</h2>
<p><strong>Route53</strong></p>
<p>Create a Route53 private hosted zone and connect it to your VPC. This is the zone that is going to provide our custom domain name for our API Gateway. In our case the private hosted zone is called “cloudar.be”.</p>
<p><strong>ACM Certificate</strong></p>
<p>Via Amazon Certificate Manager (ACM) you can create or import a certificate to use with our Application load balancer. In our case, we created a certificate for “api.cloudar.be”.</p>
<p><strong>VPC Endpoints for API Gateway</strong></p>
<p>You can create the VPC Endpoints for API Gateway to ensure that you call the API using private IPs only. VPC Endpoints can be found under VPC &gt;&gt; Endpoints in the console. Under “AWS services”, search for “com.amazonaws.&lt;your region&gt;.execute-api”, select your VPC, select the subnets you want to deploy this, select the security group you want to couple with this endpoint and leave all the settings as is.</p>
<p>After the creation of your endpoint note, collect the following information that we are going to need later:</p>
<ul>
<li>The endpoint ID</li>
<li>The IP addresses of the endpoints</li>
<li>This can be found in the console under: VPC &gt;&gt; Endpoints &gt;&gt; select your endpoint &gt;&gt; Subnets tab</li>
</ul>
<p><strong>API Gateway</strong></p>
<p>Next, we create our private REST API Gateway. Choose an API Name and a description. Endpoint Type should be set to “Private”, and under “VPC Endpoint IDs” you fill in the endpoint ID we created in the step above.</p>
<p>At this point your API should have been created. First thing we are going to do is add a resource policy to the API Gateway. This is mandatory, because otherwise we can’t deploy our API later.</p>
<p>For this demo, we are going to allow everyone who is in our network to call the API, but in real-life scenarios you can use a Condition to limit only traffic coming from certain IPs, VPC or VPC endpoint.</p>
<p><strong>Don’t forget to save your resource policy!</strong></p>
<p>After completing this, we can go ahead and create a GET method under “/” of the API Gateway. As “Integration type” we are going to choose “Mock” since this is just a tutorial to show you how to use custom domain names with a private API Gateway.</p>
<p>Now that we have a private REST API, with its resource policy allowing it to be invoked and a GET method, we can deploy this API to a stage. In our case we have a stage called “test” where we deployed this API to.</p>
<p>So by now you should have received your Amazon-provided domain name for your API Gateway in the following format:</p>
<p>https://&lt;API ID&gt;.execute-api.&lt;AWS region&gt;.amazonaws.com/&lt;stage name&gt;</p>
<p>This can be found/verified in the console under API Gateway &gt;&gt; API’s &gt;&gt; your API &gt;&gt; Stages &gt;&gt; select your stage. There at the top of the page, you can find your Amazon-provided domain name for that stage.</p>
<p>The only thing that remains is to map this API to a custom domain name. Open “Custom domain names” under the API Gateway section.</p>
<ul>
<li>Create a new custom domain name, in our case: api.cloudar.be</li>
<li>Endpoint type: Regional</li>
<li>ACM Certificate: Select the certificate you made for api.cloudar.be in ACM</li>
</ul>
<p>After the creation of the custom domain name, we go to “API mappings” within the custom domain names screen and configure a new API mapping and save it by going to:</p>
<ul>
<li>API: Select the API you just created</li>
<li>Stage: test</li>
</ul>
<p>&nbsp;</p>
<h2>Application Load balancer &amp; target group</h2>
<p>To set up the load balancer, we start by creating a target group. This is a target group based on IPs of the API Gateway VPC Endpoints. In our case:</p>
<ul>
<li>Target type: IP addresses</li>
<li>Target group name: api-endpoints</li>
<li>Protocol: HTTPS</li>
<li>VPC: Choose your VPC</li>
<li>Health check protocol: HTTPS</li>
<li>Under “Advanced health check settings” &gt;&gt; Success codes: 200,403</li>
<li>Register the IP addresses of the API Gateway VPC endpoints on port 443 and create the target group. These IPs can be found under: VPC &gt;&gt; Endpoints &gt;&gt; select your endpoint &gt;&gt; Subnets tab</li>
</ul>
<p>Now that we have our target group, we can create our Application load balancer:</p>
<ul>
<li>Load balancer name: private-api-loadbalancer</li>
<li>Scheme: Internal</li>
<li>Select your VPC, subnets and the security group for this load balancer</li>
<li>Listener: HTTPS</li>
<li>Default action: Forward to api-endpoints target group</li>
</ul>
<h2>Configuring the security groups</h2>
<p>The last step is to finetune our security groups for the load balancer and the API Gateway endpoints.</p>
<p><strong>Security Group VPC Endpoint </strong></p>
<p>In the security group of the VPC Endpoint, we are going to add a rule that allows HTTPS traffic from the security group of the internal ALB (red underlined in example here below).</p>
<p><strong>Security group application load balancer </strong></p>
<p>This security group acts as our entry point when we call the API Gateway. Here you can allow traffic from your VPC CIDR range, on-premises range, only a certain IP or many more variations. In our case we are going to allow inbound on HTTPS from our VPC CIDR range.</p>
<p><strong>Important note:</strong> Traffic can still be dropped if your API’s resource policy doesn’t have a valid allow statement. In our scenario we control the inbound traffic via the internal ALB’s security group. Our API’s resource policy is created in such a way that it accepts all traffic (see example API resource policy under API Gateway section).</p>
<p><strong>The final step </strong></p>
<p>Now you can deploy an EC2 instance in a subnet and make a call to: https://api.cloudar.be and getting forwarded to your private REST API Gateway.</p>
<p><strong>And voil</strong><strong>à</strong><strong>! Now you can have your cake and eat it too with a custom-named API Gateway. Want to know what other AWS tricks we have  up our sleeves? Check out </strong><a href="https://cloudar.be/awsblog/"><strong>our blog</strong></a><strong> or </strong><a href="https://cloudar.be/"><strong>get in touch</strong></a><strong> with us. </strong></p>
<p>The post <a href="https://cloudar.be/awsblog/cloudartotherescue-how-to-use-custom-domain-names-on-a-private-rest-api-gateway/">#CloudartotheRescue: How to use custom domain names on a private REST API Gateway</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Great News : Cloudar is an official AWS Migration Competency Delivery Partner !</title>
		<link>https://cloudar.be/awsblog/great-news-cloudar-is-an-official-aws-migration-competency-delivery-partner/</link>
		
		<dc:creator><![CDATA[Patrick Daulie]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 14:13:06 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[Well-Architected]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=18018</guid>

					<description><![CDATA[<p>When I reflect on my IT Career, I have been actually migrating applications and workloads for the past few decades. It&#8217;s a constant and apparently that kind of thing that you never get tired of. Perhaps this is because there&#8217;s always a new road that reveals when reaching the next milestone. When arriving at a [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/great-news-cloudar-is-an-official-aws-migration-competency-delivery-partner/">Great News : Cloudar is an official AWS Migration Competency Delivery Partner !</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When I reflect on my IT Career, I have been actually migrating applications and workloads for the past few decades. It&#8217;s a constant and apparently that kind of thing that you never get tired of. Perhaps this is because there&#8217;s always a new road that reveals when reaching the next milestone. When arriving at a new milestone, it&#8217;s a good moment to stop, enjoy the scenery and look for the next challenge. </p>
<p>One of the key take-aways, is to travel in good company. Good travelling buddies make you strong and resilient in order to overcome roadblocks. They make you persistent. I have had the joy and luck to travel in very good company the past few years.</p>
<p>Today is the day to stop at a Milestone and enjoy the scenery.</p>
<p><strong>At Cloudar, we are glad to announce that we officially have achieved our AWS Migration Competency Delivery partnership.</strong></p>
<p><strong>With this competency, Cloudar has proven to be a reliable partner and expert for Customers to assist and guide them in their Digital Migration journey. </strong></p>
<p>It will get its place besides all of the other AWS competencies we already achieved. </p>
<p>Look at it as climbing a mountain, you have to be well-prepared for it , and well-equipped. But it will still take quite some effort and make you sweat. But when you arrive at your goal, you will see the clear perspective of where you&#8217;re going to. New roads reveil.</p>
<p>Today, with this competency, and with strong support of AWS, we are ready to even help our customers even more with reaching their goals and become a trustworthy travel companion in their Digital Migration Journey. </p>
<p>Maybe the travel metaphor seems less relevant in these times of staycations, but it is the journey itself and your next target that counts. It doesn&#8217;t always need to be far, just enjoy the road and your next success.</p>
<p>So, I think we arrived at a conclusion : you now know that Cloudar is an AWS Migration delivery partner ready to roll, staycations can be quite enjoyable too, and I also believe we even have got the people, process, tooling triangle covered along the way&#8230; </p>
<p>Please allow me to say special thanks to the travel companions that made it happen : AWS &#038; AWS Partner Migration team, Cloudar Teams and especially our Customers ! Thank you. </p>
<p>Please consult the <a href="https://cloudar.be/services-solutions/aws-migration-expertise-guidance/">Public Migration Customer cases</a> on our website and reach out.</p>
<p>The post <a href="https://cloudar.be/awsblog/great-news-cloudar-is-an-official-aws-migration-competency-delivery-partner/">Great News : Cloudar is an official AWS Migration Competency Delivery Partner !</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The detailed updates to the Well-Architected Framework</title>
		<link>https://cloudar.be/awsblog/the-detailed-updates-to-the-well-architected-framework/</link>
		
		<dc:creator><![CDATA[Ben Bridts]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 06:54:37 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Well-Architected]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=18001</guid>

					<description><![CDATA[<p>If you follow the AWS &#8220;What&#8217;s New&#8221; blog, you might have noticed that there&#8217;s a new version of the Well-Architected Framework. Since we&#8217;ve been doing regular Well-Architected Reviews, we were curious to see what changed. Unfortunately, the blog post did not include a list of changes. Luckily there are other places where you can find [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/the-detailed-updates-to-the-well-architected-framework/">The detailed updates to the Well-Architected Framework</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you follow the AWS &#8220;What&#8217;s New&#8221; blog, you might have noticed that <a href="https://aws.amazon.com/about-aws/whats-new/2020/07/updates-aws-well-architected-framework-tool/">there&#8217;s a new version of the Well-Architected Framework</a>. Since we&#8217;ve been doing regular <a href="https://cloudar.be/services-solutions/aws-well-architected-review/">Well-Architected Reviews</a>, we were curious to see what changed.</p>
<p>Unfortunately, the blog post did not include a list of changes. Luckily there are other places where you can find those changes (if you know where to look):</p>
<p>For the quick summary of the changes, you can head over to the AWS Architecture Blog: <a href="https://aws.amazon.com/blogs/architecture/announcing-the-new-version-of-the-well-architected-framework/">Announcing the New Version of the Well-Architected Framework.</a></p>
<p>To find more details, with some additional context about why they changed, you can check out a different blog post for each pillar:</p>
<ul>
<li><a href="https://aws.amazon.com/blogs/architecture/whats-new-in-the-well-architected-operational-excellence-pillar/">What’s New in the Well-Architected Operational Excellence Pillar?</a> on the AWS Architecture Blog</li>
<li><a href="https://aws.amazon.com/blogs/security/updates-to-security-pillar-aws-well-architected-framework/">Updates to the security pillar of the AWS Well-Architected Framework</a> on the AWS Security Blog</li>
<li><a href="https://aws.amazon.com/blogs/architecture/whats-new-in-the-well-architected-reliability-pillar/">What’s New in the Well-Architected Reliability Pillar?</a> on the AWS Architecture Blog</li>
<li><a href="https://aws.amazon.com/blogs/architecture/whats-new-in-the-well-architected-performance-efficiency-pillar/">What’s New in the Well-Architected Performance Efficiency Pillar?</a> on the AWS Architecture Blog</li>
<li><a href="https://aws.amazon.com/blogs/aws-cost-management/launch-aws-well-architected-framework-cost-optimization-pillar/">What’s New in the AWS Well-Architected Cost Optimization Pillar</a> on the AWS Cost Management Blog</li>
</ul>
<p>If you want to see the actual changes, you would have to download both the old and the new PDF and put the questions side by side. And that&#8217;s exactly what we did. There is value in seeing the actual changes &#8211; even though the posts above already give a decent idea of what is different &#8211; but keep the following in mind when you look at the file we compiled:</p>
<ul>
<li>We only looked at the titles of the best practices. These aren&#8217;t the only improvements, there have been a lot of changes in the descriptions, examples, and explanations too.</li>
<li>Since the attached document only shows the changes, it&#8217;s recommended to use it side-by-side with the official pdf.</li>
<li>It&#8217;s not the prettiest looking document, but we hope it&#8217;s useful anyway.</li>
</ul>
<p>That being said, we&#8217;re interested to hear what you think of these changes!</p>
<p><a href="https://cloudar.be/wp-content/uploads/2020/07/well-architected-changes.pdf" target="_blank" rel="noopener noreferrer">Download the list of changes here</a></p>
<p>The post <a href="https://cloudar.be/awsblog/the-detailed-updates-to-the-well-architected-framework/">The detailed updates to the Well-Architected Framework</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
