AWS Marketplace Seller Reporting now provides collections visibility

Today, AWS announces collection visibility in AWS Marketplace Seller Reporting, which adds up-to-date payment collection status to the Billed Revenue Dashboard and Billing Event Data Feed. This enhancement enables sellers to distinguish between invoiced, collected, and disbursed amounts, eliminating the visibility gap between invoice creation and disbursement. With this feature, sellers can make informed business decisions and reduce unnecessary follow-ups with customers about payment status. Collection visibility particularly benefits sellers using monthly disbursement who previously waited up to 30 days to understand payment collection status. All AWS Marketplace sellers can now improve payment forecasting accuracy and detect collection issues earlier. This enhanced visibility streamlines seller operations and improves customer relationships by providing clarity on payment status. Collection visibility is available in all AWS Regions where AWS Seller Reporting is available. The feature launches on January 6th, 2026 for all AWS sellers. To access collection visibility, log into the AWS Marketplace Management Portal and navigate to Insights → Finance Operations
Quelle: aws.amazon.com

Deterministic AI Testing with Session Recording in cagent

AI agents introduce a challenge that traditional software doesn’t have: non-determinism. The same prompt can produce different outputs across runs, making reliable testing difficult. Add API costs and latency to the mix, and developer productivity takes a hit.

Session recording in cagent addresses this directly. Record an AI interaction once, replay it indefinitely—with identical results, zero API costs, and millisecond execution times.

How session recording works

cagent implements the VCR pattern, a proven approach for HTTP mocking. During recording, cagent proxies requests to the AI provider, captures the full request/response cycle, and saves it to a YAML “cassette” file. During replay, incoming requests are matched against the recording and served from cache—no network calls required.

One implementation detail worth noting: tool call IDs are normalized before matching. OpenAI generates random IDs on each request, which would otherwise break replay. cagent handles this automatically.

Getting started

Recording a session requires a single flag:

cagent run my-agent.yaml –record "What is Docker?"
# creates: cagent-recording-1736089234.yaml

cagent run my-agent.yaml –record my-test "Explain containers"
# creates: my-test.yaml

Replaying uses the –fake flag with the cassette path:

cagent exec my-agent.yaml –fake my-test.yaml "Explain containers"

The replay completes in milliseconds with no API calls.

Example: CI/CD integration testing

Consider a code review agent:

# code-reviewer.yaml
agents:
root:
model: anthropic/claude-sonnet-4-0
description: Code review assistant
instruction: |
You are an expert code reviewer. Analyze code for best practices,
security issues, performance concerns, and readability.
toolsets:
– type: filesystem

Record the interaction with –yolo to auto-approve tool calls:

cagent exec code-reviewer.yaml –record code-review –yolo
"Review pkg/auth/handler.go for security issues"

In CI, replay without API keys or network access:

cagent exec code-reviewer.yaml –fake code-review.yaml
"Review pkg/auth/handler.go for security issues"

Cassettes can be version-controlled alongside test code. When agent instructions change significantly, delete the cassette and re-record to capture the new behaviour.

Other use cases

Cost-effective prompt iteration. Record a single interaction with an expensive model, then iterate on agent configuration against that recording. The first run incurs API costs; subsequent iterations are free.

cagent exec ./agent.yaml –record expensive-test "Complex task"
for i in {1..100}; do
cagent exec ./agent-v$i.yaml –fake expensive-test.yaml "Complex task"
done

Issue reproduction. Users can record a session with –record bug-report and share the cassette file. Support teams replay the exact interaction locally for debugging.

Multi-agent systems. Recording captures the complete delegation graph: root agent decisions, sub-agent tool calls, and inter-agent communication.

Security and provider support

Cassettes automatically strip sensitive headers (Authorization, X-Api-Key) before saving, making them safe to commit to version control. The format is human-readable YAML:

version:2
interactions:
-id:0
request:
method: POST
url: <https://api.openai.com/v1/chat/completions>
body:"{…}"
response:
status: 200 OK
body:"data: {…}"

Session recording works with all supported providers: OpenAI, Anthropic, Google, Mistral, xAI, and Nebius.

Get started

Session recording is available now in cagent. To try it:

cagent run ./your-agent.yaml –record my-session "Your prompt here"

For questions, feedback, or feature requests, visit the cagent repository or join the GitHub Discussions.
Quelle: https://blog.docker.com/feed/

AWS Config now supports 21 new resource types

AWS Config now supports 21 additional AWS resource types across key services including Amazon EC2, Amazon SageMaker, and Amazon S3 Tables. This expansion provides greater coverage over your AWS environment, enabling you to more effectively discover, assess, audit, and remediate an even broader range of resources. With this launch, if you have enabled recording for all resource types, then AWS Config will automatically track these new additions. The newly supported resource types are also available in Config rules and Config aggregators. You can now use AWS Config to monitor the following newly supported resource types in all AWS Regions where the supported resources are available: Resource Types:

AWS::AppStream::AppBlockBuilder
AWS::IoT::ThingGroup

AWS::B2BI::Capability
AWS::IoTSiteWise::Asset

AWS::CleanRoomsML::TrainingDataset
AWS::Location::APIKey

AWS::CloudFront::KeyValueStore
AWS::MediaPackageV2::OriginEndpoint

AWS::Connect::SecurityProfile
AWS::PCAConnectorAD::Connector

AWS::Deadline::Monitor
AWS::Route53::DNSSEC

AWS::EC2::SubnetCidrBlock
AWS::S3Tables::TableBucketPolicy

AWS::ECR::ReplicationConfiguration
AWS::SageMaker::UserProfile

AWS::GameLift::Build
AWS::SecretsManager::ResourcePolicy

AWS::GuardDuty::MalwareProtectionPlan      
AWS::SSMContacts::Contact

AWS::ImageBuilder::LifecyclePolicy
 

Quelle: aws.amazon.com

Amazon ECS now supports tmpfs mounts on AWS Fargate and ECS Managed Instances

Amazon Elastic Container Service (Amazon ECS) now supports tmpfs mounts for Linux tasks running on AWS Fargate and Amazon ECS Managed Instances, extending beyond the EC2 launch type. With tmpfs, you can now create memory‑backed file systems for your containerized workloads without writing this data to task storage. tmpfs mounts provide a temporary file system that is backed by memory and exposed inside the container at a path you choose. This is ideal for performance‑sensitive workloads that need fast access to scratch files, caches, or temporary working sets, and for security‑sensitive data such as short‑lived secrets or credentials, because the data does not persist after the task stops. tmpfs also lets you keep the container root file system read‑only using the readonlyRootFilesystem setting while still allowing applications to write to specific in‑memory directories. To get started, update your task definition so that the container definitions include a linuxParameters block with one or more tmpfs entries. For each tmpfs mount, specify the containerPath, size, and optional mountOptions. You can register or update task definitions using the Amazon ECS console, AWS CLI, AWS CloudFormation, or AWS CDK. This feature is available in all AWS Regions where Amazon ECS, AWS Fargate, and Amazon ECS Managed Instances are supported. To learn more, see the LinuxParameters and Tmpfs sections in the Amazon ECS API Reference and the Amazon ECS Developer Guide.
Quelle: aws.amazon.com