Abstract:
Systems and methods for the management of migrations of virtual machine instances are provided. In response to a request to migrate a virtual machine instance, a migration manager may provide estimates regarding the requested migration before initiating the migration. During the migration process, the migration manager may report status or request instructions regarding the migration based on various determined migration events, thereby facilitating external control of the migration process.
Abstract:
Technology for migration of a computing instance is provided. In one example, a method may include receiving instructions to initiate migration of the computing instance from a first host to a second host. A first message for sending to the first host may be generated which includes instructions to send data representing the computing instance to the second host. The first message may further include encryption information for use in deriving at least one key for encrypting communications to the second host from the first host. A second message for sending to the second host may be generated which includes instructions to receive the data representing the computing instance from the first host. The second message may further include information for use in deriving at least one key for decrypting communications from the first host. The first and second messages may be sent to the respective first and second hosts.
Abstract:
A provider network may implement compute instance migrations across availability zones. Compute instances may be located in a particular availability zone of provider network that is implemented across multiple availability zones. A request may be received, from a client of the provider network or other component of the provider network, to migrate a compute instance that is currently operating for a client and located in one availability zone to another availability zone. A destination compute instance may be provisioned in the other availability zone based on a configuration of the currently operating compute instance. In some embodiments, other computing resources utilized by the currently operating compute instance, such as data storage resources, may be moved to the other availability zone. Migration may be completed such that the destination compute instance is currently operating for the client and the compute instance is not.
Abstract:
A method for migrating a virtual machine instance within a service provider environment may include determining to migrate an instance running on a source server computer, the source server computer associated with a plurality of hardware resource settings. A target server computer may be identified based at least in part on the plurality of hardware resource settings. A local data volume of the target server computer may be synchronized with a local data volume of the source server computer. A notification may be sent to the user, indicating migration of the instance can be initiated. Upon receiving a reboot request, disconnecting at least one network interface attached to the instance. The instance may be terminated from running on the source server computer, and may be launched on the target server computer using the synchronized local data volume and instance state data.
Abstract:
A mobile payment network may include a server receiving a request for payment from a device, where the request may include information related to a location for the device. The information related to location information for the device that is included within the request may then be used for deriving location information for the device. Given the location information for the device, a distance between the location information and a geographic area may be determined. The distance between the location information for the device and the geographic area may then serve, at least in part, as the basis for approving the request for payment.
Abstract:
Connectivity between a radio-based application pipeline processing server and a control plane of a provider network is verified. Based on requests received at the control plane, a first isolated request handler, a second isolated request handler and an offloading manager are launched at the server. The offloading manager causes a first network function for which a request is received from the first request handler to be executed at a first network function accelerator of the server, and a second network function for which a request is received from the second request handler to be executed at a second network function accelerator of the server.
Abstract:
Disclosed are various embodiments for configurable security policies in radio-based networks. In one embodiment, a security event detection rule or a security event mitigation rule for a radio-based network is accessed. The radio-based network includes a radio access network and an associated core network. At least a portion of the radio-based network is operated by a cloud provider on behalf of an organization. A security event is detected based at least in part on the security event detection rule. At least one action is performed in response to the security event based at least in part on the security event mitigation rule.
Abstract:
Techniques for managing latency of communications between compute instances and mobile devices are described. A message including an indication of a mobility event associated with a mobile device of a communications service provider network is received. The mobility event indicates a change in a connection point of the mobile device to the communications service provider network from a from a first access point to a second access point. A communications delay of at least a portion of a network path between the mobile device and a compute instance via the second access point is determined to not satisfy a latency constraint. A second provider substrate extension of the cloud provider network that satisfies the latency constraint for communications with the mobile device via the second access point is identified, and a message is sent to the second provider substrate extension to cause the launch of another compute instance.
Abstract:
Disclosed are various embodiments that provide demand-based allocation of ephemeral radio-based network resources. In one embodiment, a determination is made that an unmanned vehicle has unallocated computing capacity along a travel path. At least a portion of the unallocated computing capacity is provisioned for use by a customer for a time period as the unmanned vehicle progresses on the travel path.
Abstract:
Instructions stored at a memory of an offloading card of a server, when executed at a processor of the offloading card, perform virtualization management tasks pertaining to a compute instance launched at the server, including allocation of memory of the server to the compute instance. In response to a request from the compute instance, a network function of a radio-based application is executed at an accelerator incorporated within the offloading card.