Abstract:
Techniques for predicting the availability of a resource are described. An exemplary method includes obtaining capacity data indicating an amount of capacity available in a cloud provider network to satisfy the request; generating, using a machine learning model that has been trained based at least in part on an output of an automated historical hindsight learner that is an integer linear program, an approval prediction, wherein the approval prediction indicates that the request is to be approved based on one or more launch parameters of the request and the capacity data; receiving information from a downstream component that controls the resource that the approval prediction is incorrect; and evaluating the incorrect approval prediction using a hindsight learner and predictor explainer.
Abstract:
A control node of a multi-tenant stream management service receives a request to initialize a data stream to be comprised of a plurality of data records. The control node determines, based on a partitioning policy, parameters to be used to configure subsystems for ingestion, storage and retrieval of the records. The control node identifies resources to be used for a node of retrieval subsystem The retrieval node is configured to implement programmatic record retrieval interfaces, including respective interfaces to implement non-sequential and sequential access patterns. The control node configures the retrieval node using the selected resources.
Abstract:
A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a data ingestion category and a data retrieval category are to be configured for the stream. The security option indicates a security profile of a resource to be used for nodes of at least one functional category. In accordance with the configuration request, a node of a first functional category is configured at a resource with a first security profile, and configuration of a node of a second functional category is initiated at a different resource with a different security profile.
Abstract:
Pivot queries can be performed using stored monitoring data. Pivot queries can be received. Monitoring data can be read from data files. Each data file can store monitoring data for a plurality of tenants. The read monitoring data can be aggregated based on metric types across various dimensions, according to the pivot queries. Results can be presented in various formats, such as charts and graphs. Reading, aggregating, and presenting results can be performed within a multi-tenant monitoring system.