Examining memory of execution environments to identify potential anomalies

    公开(公告)号:US10185823B1

    公开(公告)日:2019-01-22

    申请号:US14546892

    申请日:2014-11-18

    Abstract: Technologies are described herein for examining memory data of execution environments to identify potential anomalies. An execution environment is identified as having a potential anomaly. The memory data associated with the execution environment is identified as having a potential anomaly. Checksums may be generated for the identified memory and for memory associated with other execution environments. Execution environments may be identified as having potential anomalies based, at least in part, on a commonality of the memory data of the execution environment that is identified as a having a potential anomaly with the memory data of another execution environment. Different actions may be performed on the execution environments that are identified as having a potential anomaly.

    User-Influenced Placement of Virtual Machine Instances

    公开(公告)号:US20140337832A1

    公开(公告)日:2014-11-13

    申请号:US13889907

    申请日:2013-05-08

    CPC classification number: G06F9/45558 G06F9/45533 G06F2009/4557

    Abstract: A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated. Vendor-agnostic placement strategies might also be utilized to identify a service provider network for executing a virtual machine instance. A placement strategy that includes dynamically evaluated parameters might also be utilized to modify virtual machine instances in a customer fleet on an ongoing basis.

    Reducing network traffic when replicating memory data across hosts

    公开(公告)号:US10902014B1

    公开(公告)日:2021-01-26

    申请号:US14546816

    申请日:2014-11-18

    Abstract: Technologies are described herein for reducing network traffic when replicating memory data across hosts. The memory data stored in a main memory of the host computer is replicated to a main memory of a second host computer. Memory data from the local data storage of the second host computer and other hosts computers that is a duplicate of memory data from the main memory is identified. Instead of sending the memory data from the main memory that is duplicated, the duplicated memory is copied from the local storage of the second computer or from one or more of the other computers to the main memory of the second host computer.

    User-influenced placement of virtual machines through selection of hardware

    公开(公告)号:US10289439B1

    公开(公告)日:2019-05-14

    申请号:US15269575

    申请日:2016-09-19

    Abstract: When launching a virtual machine on a network of server computers, a user has little ability to influence which server computer is used. The embodiments described herein allow a user to specify a parameter that can influence placement on a particular server meeting user-specified criteria. For example, the user can influence placement based on price, a manufacturer, a year that the infrastructure platform was manufactured, a chipset, a hardware card, a processor type, etc. An example API call can allow users to provide guidance on placement preference policy for selecting different generations and/or editions.

    Network entity registry for network entity handles included in network traffic policies enforced for a provider network
    5.
    发明授权
    Network entity registry for network entity handles included in network traffic policies enforced for a provider network 有权
    网络实体注册表,用于为提供商网络强制执行的网络流量策略中包含的网络实体句柄

    公开(公告)号:US09548897B2

    公开(公告)日:2017-01-17

    申请号:US14158504

    申请日:2014-01-17

    CPC classification number: H04L41/0893 H04L41/5022 H04L41/5029

    Abstract: A provider network may implement network entity registry for network entity handles included in network traffic policies enforced for a provider network. Network entity entries may be maintained in a network entity registry that specify network address information for network entity handles included in network traffic control policies. Network traffic control policies may be enforced by a network traffic controller. When an update to an network entity entry is received, the network entity entry may be updated and network address information specified in the network entity entry may be provided to a subset of network traffic controls implemented in a provider network for those network traffic controls enforcing network traffic policies including the network entity handle for the updated network entity entry. Network entity entries may, in some embodiments, not be updated by a network entity entry owner.

    Abstract translation: 提供商网络可以为包括在为提供商网络强制执行的网络流量策略中的网络实体句柄实现网络实体注册。 可以在网络实体注册表中维护网络实体条目,该注册表指定网络流量控制策略中包括的网络实体句柄的网络地址信息。 网络流量控制策略可以由网络流量控制器来执行。 当接收到对网络实体条目的更新时,可以更新网络实体条目,并且可以将在网络实体条目中指定的网络地址信息提供给在提供商网络中实现的用于那些网络流量控制实施网络的网络流量控制的子集 流量策略包括更新的网络实体条目的网络实体句柄。 在一些实施例中,网络实体条目不能被网络实体条目所有者更新。

    Dynamic provisioning of computing resources
    6.
    发明授权
    Dynamic provisioning of computing resources 有权
    动态配置计算资源

    公开(公告)号:US09535754B1

    公开(公告)日:2017-01-03

    申请号:US14615135

    申请日:2015-02-05

    CPC classification number: G06F9/5011 G06F9/4881 G06F9/5027

    Abstract: Dynamic provisioning of computing resources may be implemented to provision computing resources for a data center or other collection of computing resources. Computing resources for provisioning may be detected. A build manifest describing configuration operations to provision the computing resources to perform respective tasks may be identified. The build manifest may be evaluated to direct the computing resources to perform the configuration operations according to the build manifest. In some embodiments, the provisioning of the computing resources may be paused or undone according to the build manifest. Upon completion of the configuration operations, the computing resources may be made available to perform the respective tasks.

    Abstract translation: 可以实现计算资源的动态配置以为数据中心或其他计算资源集合提供计算资源。 可以检测用于供应的计算资源。 可以识别描述配置操作以构建计算资源以执行相应任务的构建清单。 可以评估构建清单以指导计算资源根据构建清单执行配置操作。 在一些实施例中,计算资源的供应可以根据构建清单暂停或撤消。 在完成配置操作之后,可以使计算资源可用于执行相应的任务。

    Secure virtual machine memory allocation management via dedicated memory pools
    7.
    发明授权
    Secure virtual machine memory allocation management via dedicated memory pools 有权
    通过专用内存池实现安全的虚拟机内存分配管理

    公开(公告)号:US09323552B1

    公开(公告)日:2016-04-26

    申请号:US13830117

    申请日:2013-03-14

    Abstract: Embodiments are disclosed for recycling memory from a memory pool dedicated to a virtual machine instance. For example, memory sub-pools can be pre-allocated to respective virtual machine instances. Memory scrubbing can be ordinarily performed to avoid data leakage between different customers. However, scrubbing can be inhibited when a given virtual machine reclaims memory previously released to the dedicated pool because the memory remains dedicated to the instance. Further features, such as partition and merge of sub-pools can be supported. Control of the features can be accomplished via API calls as part of a web service.

    Abstract translation: 公开了用于从专用于虚拟机实例的存储器池中回收存储器的实施例。 例如,内存子池可以预分配给相应的虚拟机实例。 通常可以执行内存擦除以避免不同客户之间的数据泄漏。 然而,当给定的虚拟机回收先前释放到专用池的存储器时,可以禁止擦除,因为存储器仍然专用于该实例。 可以支持其他功能,例如子池的分区和合并。 功能的控制可以通过作为Web服务一部分的API调用来实现。

    Reducing network traffic when replicating memory data across hosts

    公开(公告)号:US10432727B1

    公开(公告)日:2019-10-01

    申请号:US15853399

    申请日:2017-12-22

    Abstract: Technologies are described herein for reducing network traffic when replicating memory data across hosts. The memory data stored in a main memory of the host computer is replicated to a main memory of a second host computer. Memory data from the local data storage of the second host computer that is a duplicate of memory data from the main memory is identified. Instead of sending the memory data from the main memory that is duplicated, the duplicated memory is copied from the local storage to the main memory of the second host computer.

    Secure virtual machine memory allocation management via memory usage trust groups
    10.
    发明授权
    Secure virtual machine memory allocation management via memory usage trust groups 有权
    通过内存使用信任组来保护虚拟机内存分配管理

    公开(公告)号:US09507540B1

    公开(公告)日:2016-11-29

    申请号:US13830034

    申请日:2013-03-14

    CPC classification number: G06F9/45558 G06F2009/45575 G06F2009/45583

    Abstract: Embodiments are disclosed for recycling memory among virtual machine instances in the same memory usage trust group. Memory scrubbing can be ordinarily performed to avoid data leakage between different customers. However, scrubbing can be inhibited when a given virtual machine reclaims memory previously released by another virtual machine in the same trust group. Further features, such as enabling and disabling trust groups can be supported. Control of the features can be accomplished via API calls as part of a web service.

    Abstract translation: 公开了用于在相同存储器使用信任组中的虚拟机实例之间再循环存储器的实施例。 通常可以执行内存擦除以避免不同客户之间的数据泄漏。 但是,当给定的虚拟机回收先前由同一个信任组中的另一个虚拟机释放的内存时,可以禁止擦除。 可以支持其他功能,例如启用和禁用信任组。 功能的控制可以通过作为Web服务一部分的API调用来实现。

Patent Agency Ranking