itb-au logo
Story image

AWS expands ECS offering in APAC

01 Oct 2018

Amazon Elastic Container Service (Amazon ECS) now includes integrated service discovery in select APAC and EU regions.

ECS service discovery makes it easy for containerised services to discover and connect with each other. 

ECS creates and manages a registry of service names using the Route53 Auto Naming API so you can refer to a service by name in your code and write DNS queries to have the service name resolve to the service’s endpoint at runtime.

Service discovery is available for all networking modes for EC2 launch type or with AWS Fargate.

Amazon ECS features AWS Fargate, so businesses can deploy and manage containers without having to provision or manage servers. 

With Fargate, companies no longer have to select Amazon EC2 instance types, provision, and scale clusters of virtual machines to run containers or schedule containers to run on clusters and maintain their availability.

Fargate enables them to focus on building and running applications, not the underlying infrastructure.

The service also lets businesses build all types of containerised applications, from long-running applications and microservices to batch jobs and machine learning applications. 

Users can migrate legacy Linux or Windows applications from on-premises to the cloud and run them as containerized applications using Amazon ECS.

ECS also launches these containers in an Amazon VPC, allowing businesses to use their VPC security groups and network ACLs.

No compute resources are shared with other customers. Users can also assign granular access permissions for each of your containers using IAM to restrict access to each service and what resources a container can access. 

Amazon ECS is deeply integrated with AWS services including Elastic Load Balancing, Amazon VPC, AWS IAM, Amazon ECR, AWS Batch, Amazon CloudWatch, AWS CloudFormation, AWS CodeStar, and AWS CloudTrail. 

This gives businesses a complete solution for building and running a wide range of containerised applications.

Download image
Ultimate security: The best authentication just got better
Cloud applications can hold sensitive data, and top-notch authentication is key. But having separate tools for separate applications can be cumbersome - here's how to overcome that.More
Story image
UiPath raises $225 to help on mission to advance RPA for businesses
This funding allows us to accelerate our platform ambitions to meet mounting customer demands and scale the tremendous opportunity to bring automation to one billion citizen developers resulting in every business finally becoming a software business.” More
Story image
Fortinet: Distributed networks driving enterprises towards consistent security
Jon McGettigan, Fortinet A/NZ Regional Director, explains how consistent security services can protect and help manage distributed networks.More
Link image
APAC CFOs share their secrets to customer experience success
We've collected the most common FAQs from CFOs in the Australia-Pacific region (along with client examples) to empower you with a return on investment model that will highlight the true impact of experience management.More
Link image
Leave your legacy in the past & look to the future with cloud
With fundamental changes in the nature of the modern workplace, cloud is the obvious choice for providing a flexible cloud and communications environment.More
Download image
The role security culture plays in any successful business
In a recent survey, 74% Asia Pacific IT and business leaders surveyed declare that security culture is essential to a successful business.  More