Abstract:
Deployment feedback for updates to resources implemented in a private network may be implemented. Feedback codes may be generated and included in deployments sent to a private network for deployment at resources implemented in the private network. One or more of the included feedback codes may be selected based on the performance of the deployment and provided via a feedback communication channel that is disconnected and distinct from the private network. Once received, a current status of the deployment may be determined based on the one or more feedback codes provided via the feedback communication channel.
Abstract:
Methods and systems for a topology service providing an interface for specifying a topology and answering queries regarding the topology. Further, the topology service may create, from a specified topology, a directed acyclic graph and corresponding closure table. The topology service may also provide an interface for receiving metadata regarding the topology. In this way, the topology service, based at least in part on connections between nodes in the entries of the closure table and based at least in part on the metadata regarding the topology, may answer queries in regard to the specified topology.
Abstract:
Systems and methods are disclosed to implement a real-time data validation system that prevents problematic updates from being replicated from a primary database to a replica database. In embodiments, the data validation system injects a time delay into the replication process, so that when an update in a replication stream fails a specified data validation, the data validation system will prevent the update from being applied to the replica. In embodiments, the replication process is halted, a snapshot of the replica database is taken during the halt, and replication to the replica is resumed. Accordingly, if the problematic update is later confirmed to be invalid, the replica database can be rolled back to a point before the problematic update. Advantageously, the disclosed system can be used to implement a variety of data validations on top of a database replication process to protect the replica database from receiving undesired updates.
Abstract:
Techniques are described for optimizing the allocation of computing resources provided by a service provider network—for example, compute resources such as virtual machine (VM) instances, containers, standalone servers, and possibly other types of computing resources—among computing workloads associated with a user or group of users of the service provider network. A service provider network provides various tools and interfaces to help businesses and other organizations optimize the utilization of computing resource pools obtained by the organizations from the service provider network, including the ability to efficiently schedule use of the resources among workloads having varying resource demands, usage patterns, relative priorities, execution deadlines, or combinations thereof. A service provider network further provides various graphical user interfaces (GUIs) to help users visualize and manage the historical and scheduled uses of computing resources by users' workloads according to user preferences.
Abstract:
A high-availability (HA) framework for services deployed in provider network environments. Services may be deployed as machine images or containers to a provider network. The HA framework provides a “wrapper” around the deployed services that provides feedback loops and flow control for inbound and outbound communications to other services on the provider network or to other external entities. The HA framework intercepts inbound and outbound traffic to the service, and may automatically determine, configure, and adjust networking management aspects such as timeouts, flow control, etc. for the service. The HA framework may also intercept outbound traffic to monitor outbound connections to other services to determine if the services satisfy HA requirements of the service.
Abstract:
Techniques for an optimization service of a service provider network to generate an architecture diagram that represents an architecture of a web-based application. The optimization service may use the architecture diagram to determine modifications or changes to make to the application. For example, the optimization service may compare the architecture diagram with optimized architecture diagrams that represent application best practices, and determine the modifications or change to make to the application to optimize the application and bring the application in-line with best practices. Further, the optimization service may use the architecture diagram to generate a visualization, and provide the user account with the visualization of the architecture diagram to show users their application architecture.
Abstract:
Generally described, one or more aspects of the present application relate to deploying a software update to multiple clusters in a decentralized manner, where the individual clusters manage their own deployments based on successes and/or failures experienced by other clusters that have installed the software update. For example, a set of least conservative clusters may install the software update right away, whereas a set of more conservative clusters may wait and see how many of the clusters have installed the update so far and/or how the update is performing on those clusters, before installing the update themselves.
Abstract:
A computing resource service provider provides computing resources to customers, for example, computer system instances supported by server computer systems. These computer system instances may include logical volumes to support execution of the computer system instance. In addition, these instances may be terminated from time to time for various reasons. A stop signal transmitted to computing resource supporting a particular computer system instance may indicate that the particular computer system instance is to be terminated. In response to termination, the particular computer system instance may operate in accordance to a particular behavior.
Abstract:
In a service provider environment, software deployments can be implemented by automatically routing an incrementally larger percentage of requests to a new software stack based on a success rate for previous requests. Thus, new and old versions of the software stack can be executed simultaneously with a small portion being routed to the new version until a sufficient number of requests have been handled. By slowly bringing a new software stack online, a confidence level in the new deployment can increase until it is fully deployed. Different success rates and different ramping rates can be used for each customer or based on different components of the request, such as API name, API parameters, location, etc. The software deployments can be extended to web-page requests.
Abstract:
A real-time data validation system prevents problematic updates from being replicated from a primary database to a replica database. The data validation system may inject a time delay into the replication process, so that when an update in a replication stream fails a specified data validation, the data validation system will prevent the update from being applied to the replica. The replication process may be halted to take snapshot of the replica database during the halt, and resumed after the snapshot. Accordingly, if the problematic update is later confirmed to be invalid, the replica database can be rolled back to a point before the problematic update. Advantageously, the disclosed system can be used to implement a variety of data validations on top of a database replication process to protect the replica database from receiving undesired updates.