-
公开(公告)号:US11539552B1
公开(公告)日:2022-12-27
申请号:US17330350
申请日:2021-05-25
Applicant: Amazon Technologies, Inc.
Inventor: Paul C. Reed , Asawaree Kalavade , Danny Wei , Marc Stephen Olson , Brad E. Marshall
Abstract: One or more configuration parameters for an object gateway instance are received at an interface to a provider network, the parameters including an identifier of a first object store of the provider network for which to cache objects in a first object cache of the object gateway instance and an indication of a data transfer mode that controls when objects written to the first object cache are written to the first object store. The one or more configuration parameters are stored in a data store of the provider network and sent to the object gateway instance. A read request that includes the identifier of the first object store and a first object identifier is received from the object gateway instance, and a first object associated with the first object identifier and stored in the first object store is sent to the object gateway instance.
-
公开(公告)号:US11381468B1
公开(公告)日:2022-07-05
申请号:US14658941
申请日:2015-03-16
Applicant: Amazon Technologies, Inc.
Inventor: James Michael Thompson , Marc Stephen Olson , Marc John Brooker
IPC: H04L41/147 , H04L67/101 , H04L67/1021
Abstract: A distributed system may implement identifying correlated workloads for resource allocation. Resource data for resources hosted at resource hosts in a distributed system may be analyzed to determine behavioral similarities. Historical behavior data or resource configuration data, for instance, may be compared between resources. Behaviors between resources may be identified as correlated according to the determined behavioral similarities. An allocation of one or more resource hosts in the distributed system may be made for a resource based on the behaviors identified as correlated. For instance, resources may be migrated from a current resource host to another resource host, new resources may be placed at a resource host, or resources may be reconfigured into different resources. Machine learning techniques may be implemented to refine techniques for identifying correlated behaviors.
-
公开(公告)号:US10809920B1
公开(公告)日:2020-10-20
申请号:US15385814
申请日:2016-12-20
Applicant: Amazon Technologies, Inc.
Inventor: Marc Stephen Olson , Christopher Magee Greenwood , Anthony Nicholas Liguori , James Michael Thompson , Surya Prakash Dhoolam , Marc John Brooker , Danny Wei
Abstract: First information about regions of storage space in a storage environment available for a volume is provided to a service provider, with the storage environment being external to the service provider. The service provider is notified that information usable to locate a storage destination of a portion of the volume is unavailable. Second information that includes the storage destination in the storage environment is obtained from the service provider. A data operation is performed at the storage destination, with the storage destination determined based at least in part from the second information.
-
公开(公告)号:US10270668B1
公开(公告)日:2019-04-23
申请号:US14665878
申请日:2015-03-23
Applicant: Amazon Technologies, Inc.
Inventor: James Michael Thompson , Marc Stephen Olson , Marc John Brooker
Abstract: A distributed system may implement identifying correlated events in a distributed system according to operational metrics. A distributed system may collect large numbers of operational metrics from multiple different sources. Some operational metrics may be monitored, analyzing the operational metrics for correlation with other operational metrics. The monitored operational metrics may be manually selected, or identified according to anomalous events detected for the operational metrics. Based on the monitoring, a correlated event may be detected. A response for the correlated event may be determined and performed. In some embodiments, a notification of the correlated event may be sent. Corrective actions may be performed at the distributed system, in some embodiments.
-
公开(公告)号:US20180165112A1
公开(公告)日:2018-06-14
申请号:US15449801
申请日:2017-03-03
Applicant: Amazon Technologies, Inc.
Inventor: Brian Todd Burruss , John Luther Guthrie, II , Marc Stephen Olson , Madhuvanesh Parthasarathy
CPC classification number: G06F9/45558 , G06F2009/45579 , G06F2009/45583 , G06F2009/45595 , H04L67/1097
Abstract: Systems and methods are described for a storage processing service that processes multiple storage commands. The storage processing service uses tags from test storage commands to determine whether a test storage service is to be instantiated that reflects a corresponding production service. Test storage commands with the same tag are tested on that test service. Additionally, the storage processing service determines a strategy for testing processes on production services when the storage system is overloaded. In one embodiment, the test service manager can determine to stop testing processes for a period of time, and issue a shed command that queues or sheds test storage commands. Advantageously, a shed command, while active at a storage processing service, may alleviate the overload on production services. The test service manager can continue to monitor the storage system to determine whether the overload continues to exist.
-
公开(公告)号:US20180006963A1
公开(公告)日:2018-01-04
申请号:US15197557
申请日:2016-06-29
Applicant: Amazon Technologies, Inc.
Inventor: Pieter Kristian Brouwer , Marc Stephen Olson , Nachiappan Arumugam , Michael Thacker , Vijay Prasanth Rajavenkateswaran , Arpit Tripathi , Danny Wei
IPC: H04L12/927 , H04L12/911
CPC classification number: H04L47/801
Abstract: A user can set or modify operational parameters of a data volume stored on a network-accessible storage device in a data center. For example, the user may be provided access to a data volume and may request a modification to the operational parameters of the data volume. Instead of modifying the existing data volume, the data center can provision a new data volume and migrate data stored on the existing data volume to the new data volume. While the data migration takes place, the existing data volume may block input/output (I/O) requests and the new data volume may handle such requests instead. Once the data migration is complete, the data center may deallocate the data blocks of the existing data volume such that the data blocks can be reused by other data volumes.
-
公开(公告)号:US20180004698A1
公开(公告)日:2018-01-04
申请号:US15197573
申请日:2016-06-29
Applicant: Amazon Technologies, Inc.
Inventor: Pieter Kristian Brouwer , Marc Stephen Olson , Nachiappan Arumugam , Michael Thacker , Vijay Prasanth Rajavenkateswaran , Arpit Tripathi , Danny Wei
CPC classification number: G06F13/4221 , G06F13/4068
Abstract: A user can set or modify operational parameters of a data volume stored on a network-accessible storage device in a data center. For example, the user may be provided access to a data volume and may request a modification to the operational parameters of the data volume. Instead of modifying the existing data volume, the data center can provision a new data volume and migrate data stored on the existing data volume to the new data volume. While the data migration takes place, the existing data volume may block input/output (I/O) requests and the new data volume may handle such requests instead. If a request is received for data not yet migrated to the new data volume, then the new data volume prioritizes a migration of the requested data.
-
公开(公告)号:US12197397B1
公开(公告)日:2025-01-14
申请号:US17643802
申请日:2021-12-10
Applicant: Amazon Technologies, Inc.
Inventor: Christopher Magee Greenwood , Marc Stephen Olson , Jacob Wires , Andrew Kent Warfield
IPC: G06F9/455 , G06F16/188
Abstract: Systems and methods are provided for handling file operations from a hosted computing instance via a secure compute layer. The secure compute layer is presented to the instance as a virtualized service device that is locally addressable by the instance. Software within the instance can submit file operations to the virtualized service device, which the secure compute layer can translate into calls to a network-accessible storage service. Results from the calls can then be passed back to the instance through the virtualized service device. As a result, the instance can communicate with a variety of different network services, without itself implementing network communications for those services.
-
9.
公开(公告)号:US11966370B1
公开(公告)日:2024-04-23
申请号:US17643809
申请日:2021-12-10
Applicant: Amazon Technologies, Inc.
Inventor: Christopher Magee Greenwood , Marc Stephen Olson , Jacob Wires , Andrew Kent Warfield
IPC: G06F16/188 , G06F9/455 , G06F11/14 , G06F16/172
CPC classification number: G06F16/196 , G06F9/45558 , G06F11/14 , G06F16/172 , G06F2009/45583
Abstract: Systems and methods are provided for implementing a multi-service file system for a hosted computing instance via a locally-addressable secure compute layer. Software within the instance can submit file operations to the secure compute layer, which the secure compute layer can translate into calls to one or more network-accessible storage services. To provide a multi-service file system, the secure compute layer can obtain mapping data mapping file system objects within the virtualized file system to different network-accessible storage services. On receiving a file operation, the secure compute layer can determine one or more network-accessible storage services corresponding to the file operation, and submit appropriate calls to the one or more network-accessible storage services. By varying the calls for file operations, various functionalities, such as data backup, write staging, read caching, and failover can be implemented independent of both operation of the hosted computing device and the network-accessible storage services.
-
公开(公告)号:US11496519B1
公开(公告)日:2022-11-08
申请号:US16699320
申请日:2019-11-29
Applicant: Amazon Technologies, Inc.
Inventor: Diwakar Gupta , David Wachtfogel , Marc Stephen Olson , Anthony Nicholas Liguori , Stephen David Hildrey
Abstract: Security can be provided for data stored using resources that are deployed in an environment managed by a third party. Physical and logical detection mechanisms can be used to monitor various security aspects, and the resulting security data can be used to identify potential threats to these resources. In some embodiments, suspicious activity can cause resources such as data servers to be automatically and remotely rebooted such that keys stored in volatile memory on those data servers will be lost from those servers, such that an attacker will be unable to decrypt data stored on those servers. Once a determination of safety is made, the keys can be provided to the respective data servers such that data operations can resume.
-
-
-
-
-
-
-
-
-