Abstract:
Technology for rapid deployment of computing instances from images is provided. In one example, a method may include instantiating a base computing instance and building an application layer on the base computing instance to create a modified computing instance. A machine image of the modified computing instance may be saved. The modified computing instance may be instantiated based on the machine image and a customer-defined configuration may be applied to the modified computing instance to obtain a configured computing instance.
Abstract:
A technology for a streaming data marketplace is provided. In one example, a method may include requesting to receive a first stream of data from a first source via the streaming data marketplace. The first stream of data may be received and then correlated and combined with data from a second source as a combined stream. The combined stream may then be published to the streaming data marketplace.
Abstract:
Methods and apparatus for managing pooled client-premise resources via provider-defined interfaces are described. A pool management request is received from a client via a programmatic interface implemented at a provider network, indicating at least one resource located at a data center external to the provider network. An activation status of the resource within a pool is to be managed by a service of the provider network. A network connection between an administrative resource of the service, located within the provider network, and a control module instantiated on behalf of the service at the external data center is established. A command is transmitted from the administrative resource to the control module to activate the particular resource.
Abstract:
A technology is described for a salt service. An example method may include generating a salt value and a salt identifier used to reference the salt value in response to a salt value setup request. Storing the salt value in a data store where the salt value may be referenced by the salt identifier. The salt value and the salt identifier may then be provided in response to the salt value setup request to enable the salt identifier to be stored in association with a first hash value generated from the salt value and a customer password for future customer authentications. In response to an authentication request, the salt value may be retrieved from the data store and the salt value may be provided, enabling customer authentication to be performed by comparing the first hash value with a second hash value generated from the salt value and a customer password.
Abstract:
In a system that provides network-based computer infrastructure services, a monitoring agent is installed on a computer to gather and report operational metrics from various sources, which may include infrastructure support services as well as elements of the computer itself. Metrics to be gathered and reported by the monitoring agent, as well as the format in which metrics are to be reported, are specified declaratively so that they can be changed without altering the procedural aspects of the monitoring agent.
Abstract:
A technology is described for a software container recommendation service. An example method may include collecting utilization metrics for an application hosted on a computing instance. The utilization metrics may be a measure of computing resources used by the application. The utilization metrics may be analyzed to determine a level of computing resources for the computing instance used by the application. A software container configuration for the application may be determined based at least in part on the utilization metrics when analysis of the utilization metrics indicates an underutilization of computing resources by the application. The specifications of the software container configuration may then be provided to a customer.
Abstract:
A user-promotion process allows a service provider to grant the security roles associated with a target user account to a requester by obtaining approvals from a quorum of approving users. The quorum requirements and the identity of the approving users may be established by the target user or an account manager. Upon receiving, from a promotion candidate, a request to assume security roles of a target user, the service provider identifies the approving users from the target user's account record. Approvals are requested from the approving users, and if a quorum of approvals is received by the service provider, the promotion candidate is allowed to assume the roles of the target user. If a quorum of approvals is not received, then substitute approving users may be identified based at least in part on those approving users that did not respond to the approval request.
Abstract:
Methods and apparatus for a secure time service are disclosed. A time server including a time source, a cryptographic key and a cryptographic engine is instantiated within a provider network. A time service endpoint receives a timestamp request from a client. The endpoint transmits a representation of the request to the time server, and receives, from the time server, an encryption of at least a timestamp generated using the time source. A response comprising the encryption of at least the timestamp is transmitted to the requesting client.
Abstract:
Technology is described for preventing cryptovirus attacks in a computing service environment. Data patterns of both read and write operations are monitored for files during a predetermined time period. The data patterns related to the files are recorded during the monitoring. A machine learning model is constructed according to the recorded data to establish a data change probability for the plurality of files. An unexpected change is detected using the machine learning model according to the data change probability of the files having changed data. A warning notification is sent indicating the unexpected change is detected for the files.
Abstract:
Disclosed are various embodiments for reporting as well as tracking usage and/or installation of an application in a machine instance in a computing environment. A machine instance can execute an application and can be associated with a storage volume on which the application is installed. The application, or an installer utility associated with the application, can report installation and/or usage of the application to an application usage service.