Mitigating an impact of a datacenter thermal event
    22.
    发明授权
    Mitigating an impact of a datacenter thermal event 有权
    减轻数据中心热事件的影响

    公开(公告)号:US09146814B1

    公开(公告)日:2015-09-29

    申请号:US13975886

    申请日:2013-08-26

    Abstract: A ranking service can retrieve metrics from a metrics data store and use the metrics to determine a priority order in which to power down resources in a data center. Metrics from the data store can include a number of instances running on a host, a length of time that an instance has been operational, a type of instance, an amount of CPU use on a host, etc. The ranking service can also obtain other parameters from other sources. The parameters can include whether redundant or failover instances exist, the importance of the instances, whether the customer itself is considered important, other generic parameters from the customer account, a customer provided ranking of instances, etc.

    Abstract translation: 排名服务可以从衡量数据存储中检索度量,并使用度量来确定在数据中心中关闭资源的优先顺序。 来自数据存储的度量可以包括在主机上运行的多个实例,实例已经可操作的时间长度,实例的类型,主机上的CPU使用量等。排名服务还可以获得其他 来自其他来源的参数。 这些参数可以包括是否存在冗余或故障切换实例,实例的重要性,客户本身是否被视为重要,客户帐户中的其他通用参数,客户提供的实例排名等。

    Token-based debugging of access control policies
    23.
    发明授权
    Token-based debugging of access control policies 有权
    基于令牌的访问控制策略调试

    公开(公告)号:US09053343B1

    公开(公告)日:2015-06-09

    申请号:US13677212

    申请日:2012-11-14

    Abstract: Methods and systems for allowing system administrators to effectively debug access control issues experience by users without comprising security. In some embodiment, when a user's request to access services provided by a service provider is denied, the user may be issued a token that encodes some of debugging information useful for determining the cause of the denial of access. The debugging information may be encoded such that it is inaccessible to the user. Subsequently, the user may give the token to an administrator. The administrator may submit the token to the service provider, which may decode the token and provide the administrator access to debugging information that is useful for debugging access control policies causing the denial of access.

    Abstract translation: 允许系统管理员有效地调试用户的访问控制问题体验的方法和系统,而不包括安全性。 在一些实施例中,当用户访问由服务提供商提供的服务的请求被拒绝时,可以向用户发出令牌,该令牌对一些调试信息进行编码,这些调试信息有助于确定拒绝访问的原因。 可以对调试信息进行编码,使得用户不可访问调试信息。 随后,用户可以将令牌给予管理员。 管理员可以将令牌提交给服务提供商,该服务提供商可以对令牌进行解码,并向管理员提供访问对调试访问控制策略造成拒绝访问有用的调试信息。

    VIRTUAL COMPUTING INSTANCE MIGRATION
    24.
    发明申请
    VIRTUAL COMPUTING INSTANCE MIGRATION 有权
    虚拟计算实时移动

    公开(公告)号:US20150040127A1

    公开(公告)日:2015-02-05

    申请号:US13959550

    申请日:2013-08-05

    CPC classification number: G06F9/5044 G06F9/4856 G06F9/505 G06F9/5088

    Abstract: A customer submits a set of preferences including hardware specifications for instantiating a virtual machine instance. The virtual machine instance may be instantiated in a physical host computer system that does not conform to the set of preferences. The virtual computer system service may be configured to evaluate the specifications of the available physical host computer systems to determine whether any of the available physical host computer systems conform to the set of preferences. Accordingly, the virtual computer system service may further evaluate the available physical host computer systems to determine whether available physical host computer systems comprise available slots for instantiating the existing virtual machine instance. If the one or more available physical host computer systems have available slots, the virtual computer system service may migrate the existing virtual machine instance to an available physical host computer system in order to fulfill the customer request.

    Abstract translation: 客户提交一组首选项,包括用于实例化虚拟机实例的硬件规格。 可以在物理主机计算机系统中实例化虚拟机实例,该系统不符合一组偏好。 虚拟计算机系统服务可以被配置为评估可用的物理主机计算机系统的规范,以确定任何可用的物理主机计算机系统是否符合该组偏好。 因此,虚拟计算机系统服务可以进一步评估可用的物理主机计算机系统,以确定可用的物理主机计算机系统是否包括用于实例化现有虚拟机实例的可用时隙。 如果一个或多个可用物理主机计算机系统具有可用插槽,则虚拟计算机系统服务可以将现有虚拟机实例迁移到可用的物理主机计算机系统以便满足客户请求。

    MANAGING ALLOCATION OF COMPUTING CAPACITY
    25.
    发明申请
    MANAGING ALLOCATION OF COMPUTING CAPACITY 有权
    管理计算能力分配

    公开(公告)号:US20130311650A1

    公开(公告)日:2013-11-21

    申请号:US13946943

    申请日:2013-07-19

    CPC classification number: H04L43/04 G06F9/505

    Abstract: Systems and methods are described for managing requests for computing capacity from a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. In some implementations, user requests are probabilistically denied or granted while some computing resources are still available. By denying some requests or granting only some, the rate of computing resource usage can be reduced, thus preserving some capacity for a longer period of time. In one embodiment, the capacity can be provided to clients based on client priority, provided to clients with reserved resources, provided to clients probabilistically, sold on a spot market, or allocated in some other fashion.

    Abstract translation: 描述了用于管理来自计算资源提供商的计算能力请求的系统和方法。 计算资源可以包括程序执行能力,数据存储或管理能力,网络带宽等。在一些实现中,在某些计算资源仍然可用的情况下,概率地拒绝或授予用户请求。 通过拒绝一些请求或仅授予一些请求,可以减少计算资源使用率,从而在较长时间内保留一些容量。 在一个实施例中,可以基于客户端优先级向客户端提供容量,提供给具有预留资源的客户端,概率地提供给客户,在现货市场上出售或以某种其他方式分配。

    Context-based access controls
    26.
    发明授权

    公开(公告)号:US12189749B2

    公开(公告)日:2025-01-07

    申请号:US16687435

    申请日:2019-11-18

    Abstract: A system includes access controls that allow or deny a request based at least in part on a context associated with the request. A service receives a request from a client, and forwards information that describes the request and the context of the request to a context management service. The context management service determines whether the request should be allowed by querying a set of context validation plugins. Each context validation plugin analyzes particular characteristics of a request's context, and based at least in part on the request's context, indicates to the context management service that the request should be allowed or denied. If a quorum of the context validation plugins indicate to the context management service that the request should be allowed, the context management service indicates to the service that the request is allowed within the provided context.

    Portable network interfaces for authentication and license enforcement

    公开(公告)号:US11295246B2

    公开(公告)日:2022-04-05

    申请号:US15917085

    申请日:2018-03-09

    Abstract: Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator. The coordinator may assign an interface record to the service, wherein the interface record comprises an IP address and a set of security properties. The coordinator may configure the security properties to allow a client to request an attachment of the interface record to a selected resource instance, such that the selected resource instance is enabled to transmit network messages from the IP address using one or more physical network interfaces of the selected resource instance. The producer resource instance initiates authentication operations for the service, including at least one authentication operation based on the IP address of the interface record.

Patent Agency Ranking