-
公开(公告)号:US11032156B1
公开(公告)日:2021-06-08
申请号:US16370074
申请日:2019-03-29
Applicant: Amazon Technologies, Inc.
Inventor: Lalit Jain , Sandeep Kumar , Ankit Singh , James Pinkerton , Marc Stephen Olson
Abstract: Aspects relate to a framework for utilizing a single API request to manage the creation of consistent snapshots for a set of volumes attached an individual instance in a distributed computing environment. Responsive to receipt of an API request identifying the instance, the multi-volume snapshot service identifies a set of volumes attached to the identified instance. The identified set of volumes can be processed or filtered to eliminate specific volumes or types of volumes, such as boot volumes. In the event that any snapshot creation attempt fails, the multi-volume snapshot service fails the API request and can delete any snapshot data generated prior to the failure.
-
公开(公告)号:US20190319785A1
公开(公告)日:2019-10-17
申请号:US15952743
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US11502824B2
公开(公告)日:2022-11-15
申请号:US16909814
申请日:2020-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US20200322138A1
公开(公告)日:2020-10-08
申请号:US16909814
申请日:2020-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US10817203B1
公开(公告)日:2020-10-27
申请号:US15690175
申请日:2017-08-29
Applicant: Amazon Technologies, Inc.
Inventor: Manu Anand , Lalit Jain , Aman Singhal , Visakh Sakthidharan Nair , Ajit Balachandran , Kumar Shubhankar
Abstract: A client-configurable tiering service implements an interface allowing a client to specify a tiering policy selected from a plurality of supported tiering policies for data of the client stored in a warm tier, wherein the tiering policies specify conditions for relocating portions of the data to a cold tier. The interface also allows a client to specify a tombstone forwarding policy selected from a plurality of supported tombstone forwarding policies, wherein the tombstone forwarding policies specify how data relocated from the warm tier to the cold tier is subsequently retrieved in response to an access request directed to the warm tier. The client-configurable tiering service relocates and retrieves data between a warm tier and a cold tier in accordance with the client's selected policies. In some embodiments, a client may specify further aspects of how data is stored and relocated between different tiers of a data store.
-
公开(公告)号:US10924275B1
公开(公告)日:2021-02-16
申请号:US16147000
申请日:2018-09-28
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Arvind Chandrasekar , Lalit Jain , James Pinkerton , Marc Stephen Olson , Danny Wei , Sriram Venugopal
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating multiple encrypted block store volumes of data from an unencrypted source. These encryption techniques can use a transform fleet as an intermediary use between the unencrypted source and the encrypted volumes. The transform fleet can obtain data of the volume from one or both of two sources—an object storage “snapshot” a block storage “source volume”—and can then apply the appropriate encryption key for performing the encryption of a particular volume.
-
公开(公告)号:US10728025B2
公开(公告)日:2020-07-28
申请号:US15952743
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
-
-
-
-
-