Secure and efficient cross-service sharing of subscriber data

    公开(公告)号:US11425140B1

    公开(公告)日:2022-08-23

    申请号:US15608658

    申请日:2017-05-30

    Abstract: A configuration management service provides data identifying its subscribers to a secure sharing service that executes in an account that has a higher security level than a service account used to provide the configuration management service. The secure sharing service securely determines whether each subscriber has authorized producer services to share resource configuration data with the configuration management service. If a subscriber has authorized such sharing, information identifying the subscriber can be stored in a location accessible to the producer services. If a subscriber has not authorized such sharing, the secure sharing service will not make the subscriber's information available to the producer services. The producer services can use the subscriber data to provide resource configuration data to the configuration management service only for those subscribers that subscribe to both the configuration management service and to the producer services.

    Resource configuration history service

    公开(公告)号:US10257040B1

    公开(公告)日:2019-04-09

    申请号:US14657130

    申请日:2015-03-13

    Abstract: A configuration history service for web-based computing resources is implemented by capturing and storing a historical record of each configuration state for each computing resource in a subscriber's account. Files of the configuration history store information about a computing resource type offered by the web service. The file comprises records for each particular resource of that type that is or was actively configured in the subscriber's account during the period that the configuration history service is active in the account. Each record lists a particular configuration state, at a particular point in time, for a particular computing resource. The configuration history of a computing resource can be displayed as a timeline by which a subscriber can access information describing the configuration state of the particular computing resource at any point in time.

    Detecting configuration drift for computing resource stacks

    公开(公告)号:US11115272B1

    公开(公告)日:2021-09-07

    申请号:US15951921

    申请日:2018-04-12

    Abstract: Techniques are described for identifying “out-of-band” modifications to an interrelated set of computing resources, also referred to herein as a computing resource stack, that was provisioned at a service provider network using an infrastructure modeling service. An infrastructure modeling service generally allows users to describe a computing resource stack in a text file or other type of descriptive representation, referred to herein as an infrastructure template, and to automatically provision computing resource stacks defined in templates at a service provider network. Users may at times make so-called out-of-band modifications to one or more computing resources of a provisioned computing resource stack, either inadvertently or in response to time-sensitive demands, where an out-of-band modification is made outside of the infrastructure modeling service.

    Resource configuration service
    7.
    发明授权

    公开(公告)号:US10225208B1

    公开(公告)日:2019-03-05

    申请号:US14657026

    申请日:2015-03-13

    Abstract: Configurations of computing resources established on a web-based computing service can be monitored, managed and controlled. According to one embodiment, a method may include discovering a set of computing resources being used by an enterprise. The disclosed resource configuration service can deliver a set of resource-specific data that uniquely identifies each computing resource and describes each resource's configuration state. The resource configuration service monitors the computing environment and detects changes to the configurations of computing resources. The resource configuration service can deliver a stream of notifications when computing resources are created, updated, deleted or otherwise reconfigured. The notifications can be used by, for example, software tools or system administrators.

Patent Agency Ranking