Managing security in isolated network environments

    公开(公告)号:US11496519B1

    公开(公告)日:2022-11-08

    申请号:US16699320

    申请日:2019-11-29

    IPC分类号: H04L9/40 H04L9/08

    摘要: Security can be provided for data stored using resources that are deployed in an environment managed by a third party. Physical and logical detection mechanisms can be used to monitor various security aspects, and the resulting security data can be used to identify potential threats to these resources. In some embodiments, suspicious activity can cause resources such as data servers to be automatically and remotely rebooted such that keys stored in volatile memory on those data servers will be lost from those servers, such that an attacker will be unable to decrypt data stored on those servers. Once a determination of safety is made, the keys can be provided to the respective data servers such that data operations can resume.

    Managed virtual networks for computing cloud edge locations

    公开(公告)号:US11470047B1

    公开(公告)日:2022-10-11

    申请号:US16699306

    申请日:2019-11-29

    摘要: Techniques are described for a cloud provider to provide a managed experience related to the use of virtual networks and subnets to logically group user computing resources deployed at provider substrate extensions. A cloud provider enables users to create virtual network templates used when deploying computing resources at provider substrate extensions, where such virtual network templates may include various networking, security, and other configurations to be applied to network traffic and other activity of resources deployed within an associated virtual network. Once a virtual network template is defined, a user can use the template as the basis to launch resources into the virtual network and, by extension, into provider substrate extensions associated with the virtual network. Upon receiving such a request, the provider network can manage the creation and configuration of underlying subnets, route tables, and other resource, as needed, at each of the relevant provider substrate extensions.

    Capacity bursting using a remote control plane

    公开(公告)号:US11349718B2

    公开(公告)日:2022-05-31

    申请号:US16450854

    申请日:2019-06-24

    摘要: Techniques for capacity bursting using a remote control plane are described. A method of capacity bursting using a remote control plane includes determining that a first control plane associated with a first area of a provider network has insufficient capacity to manage a plurality of resources in the first area, sending a request for a second control plane in a second area of the provider network to manage at least a first portion of the plurality of resources in the first area, the second control plane identified based at least on a backup hierarchy, and updating management of at least the first portion of the resources in the first area from the first control plane to the second control plane, wherein one or more references to endpoints of the first control plane are updated to be references to endpoints of the second control plane for at least the first portion of the resources managed by the second control plane.

    Intent-based auto scaling of virtual computing resources

    公开(公告)号:US11113120B1

    公开(公告)日:2021-09-07

    申请号:US16406290

    申请日:2019-05-08

    IPC分类号: G06F9/50

    摘要: Techniques are described for enabling users to configure the auto scaling of virtual computing resources using various intent-based auto scaling configurations. Intent-based configurations generally provide various indications of how a user intends to use a scalable group of virtual computing resources and what expectations a user might have about how those resources are scaled in response to changes in demand. A service provider network receives first input to create a scalable group of virtualized computing resources, the first input indicating at least one primary scaling configuration used by the hardware virtualization service to scale the scalable group of compute instances over time, and further receives second input indicating at least one secondary, intent-based scaling configuration used to scale the virtualized computing resources, for example, when the service is unable to scale the group of virtualized computing resources according to the at least one primary scaling condition.