EP2981896A1 - User-defined pools - Google Patents

User-defined pools

Info

Publication number
EP2981896A1
EP2981896A1 EP14779020.8A EP14779020A EP2981896A1 EP 2981896 A1 EP2981896 A1 EP 2981896A1 EP 14779020 A EP14779020 A EP 14779020A EP 2981896 A1 EP2981896 A1 EP 2981896A1
Authority
EP
European Patent Office
Prior art keywords
user
instances
resource
computing
resource slots
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP14779020.8A
Other languages
German (de)
French (fr)
Other versions
EP2981896A4 (en
Inventor
Rachid Ennaji
Jin Seop KIM
Brian Helfrich
David John WARD
Stephen Alden ELLIOTT
Peng ZHAI
Dhanvi Harsha KAPILA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Amazon Technologies Inc
Original Assignee
Amazon Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/855,449 external-priority patent/US9645840B2/en
Priority claimed from US13/855,518 external-priority patent/US9634958B2/en
Priority claimed from US13/855,498 external-priority patent/US20140297867A1/en
Application filed by Amazon Technologies Inc filed Critical Amazon Technologies Inc
Publication of EP2981896A1 publication Critical patent/EP2981896A1/en
Publication of EP2981896A4 publication Critical patent/EP2981896A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0605Improving or facilitating administration, e.g. storage management by facilitating the interaction with a user or administrator
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0631Configuration or reconfiguration of storage systems by allocating resources to storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0665Virtualisation aspects at area level, e.g. provisioning of virtual or logical volumes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Definitions

  • a data center is a facility that ho ises computer systems and various networking, storage and other related components.
  • Data centers may, for example, provide computing services to businesses and individuals as a remote computing service or provide "software as a service" (e.g., cloud computing),
  • visualization technologies may allow a single physical computing machine to host one or more instances of virtual machines that appear and operate as independent computer machines to a connected computer user. With virtuali3?.ation s the single physical computing device can create, maintain or delete virtual machines in a dynamic manner.
  • Some visualization technologies are capable of providing virtual resources that span two or more physical resources, such as a single virtual machine with multiple virtual processors that span multiple distinct physical computing systems.
  • virtual ization technologies may allow data storage hardware to be shared among multiple users by providing each user with a virtualized data store that may be distributed across multiple data storage devices, with each such virtualized data store acting as a distinct logical data store that provides users with the illusion that they are the sole operators and administrators of the data storage resource.
  • the computing resource provider may provide facilities for customers to select and launch the desired computing resources, deploy application components to the computing resources and maintain an application executing in the environment.
  • the computing resource provider may provide further facilities for the customer to quickly and easily scale up or scale down the numbers and types of resources allocated to the application, either manually or through automatic scaling, as demand for or capacity requirements of the application change.
  • the compisting resources provided by the computing resource provider may be made available in discrete units, which ma be referred to as instances.
  • An instance may be run on directly ors a physical server hardware platform, within a virtual machine or some combinaiiors of the two.
  • Various types and configurations of instances may be made available, including different sizes of resources executing different operating systems (OS) and/or hypervisors and with various installed software applications, runtimes and the like.
  • OS operating systems
  • hypervisors with various installed software applications, runtimes and the like.
  • FIG. ! is a diagram illustrating a mechanism for pooling instances m accordance with the present disclosure
  • FIG. 2 is a diagram illustrating an example computing system thai may be used in some embodiments
  • FIG. 3 is a diagram illustrating an example computing system that may be used in some embodiments.
  • FIG, 4 is a diagram illustrating a system for pooling instances in accordance with the present disclosure
  • FIG. 5 is a diagram illustrating a mechanism for pooling instances in accordance with the present disclosure
  • FIG. 6 is a diagram illustrating a system for pooling instances in accordance with the present disclosure.
  • FIG. 7 is a diagram iliissiradng a system for pooling instances in accordance with the present disclosure
  • FIG. 8 is a diagram illustrating a system for bursting capacity m accordance with the present disclosure.
  • FIG. 9 is a diagram illustrating a system for pooling instances in accordance with the present disclosure.
  • FIG. 10 is a diagram illustrating an example user interface in accordance with the present disclosure.
  • FIG. 1 l is a diagram illustrating an e ample user interface in accordance with the present d sclos ire;
  • FIG. 12 is a diagram illustrating an example data record in accordance with the present disclosure.
  • FIG. 13 is a flowchart depicting an example procedure for pooling instances in accordance with the present disclosure
  • FIG. 14 is a flowchart depicting an example procedure for pooling instances in accordance with She present disclosure.
  • FIG. 15 is a flowchart depicting an example procedure for pooling instances in accordance widi die present disclosure.
  • a provider network such as a network implemented across one or more data centers may offer computing reso rces such as reserved instances and spot instances.
  • a reserved instance may provide a customer with the ability to reserve a number of a specific type and configuration of an instance for a fixed term, such as one year or three years.
  • a spot instance may refer to an allocation of an instance using a spot-price policy, where a c stomer may specify the maximum price per unit of time that the easterner is willing to pay to ran the instance. If the customer's maximum price exceeds a dynamic spot price determined at least in par t by supply and demand, then the instance may be run for the customer. Other types of instances may be offered by the provider network.
  • customers may be provided with the ability to create a private marketplace that operates to offer a customer-defined set of the customer's instances to a selected group of users according to a bidding or pricing policy that, in some cases, may be similar to a spot instance policy.
  • a bidding or pricing policy that, in some cases, may be similar to a spot instance policy.
  • an organization such as a university may have a set of reserved instances thai are offered via a private marketplace that allows users to bid for the reserved instances.
  • the university may offer the customer-defined set of instances to departments within the university. Individuals or computers within the departments can bid intemaiiy for the reserved instances.
  • the departments can bid a price or use a defined set of "currency" or bidding credits.
  • the university may also be abie to customize aspects such as the minimum and maximum prices, the bidding pricing algorithm, interruption cycles and other parameters that may be applicable to resource types, such as spot instances.
  • 3S i 359.1 university may also be able to select other types of instances for the private marketplace, such as allocated spot instances and on-demand instances (further described below), By providing die ability to create a private marketplace, customers cars more efficiently distribute its computing capacity to Its interna! users. This can decrease costs for the customer who may need less reserved capacity when the capacity is distributed in this manrser, and the provider network can increase utilization of its spare capacity. Additional embodiments of a private marketplace are further described below, Irs various embodiments described herein, the private marketplace may be referred to as a private marketplace, limited marketplace, user-defined pool, user-defined market, private spot market or user-defined spot market.
  • FIG, 1 is a diagram illustrating a system 100 including a mec a ism for providing user-defmed pools in accordance with the present disclosure.
  • system 100 may include a reserved virtual machine instance 1 10, an on-demand virtual machine instance 1 15 and a spot virtual machine instance 120 that may execute, for example, ors one or more server computers 130, 135 and 140, respectively. It will be appreciated that some embodiments may involve additional virtual machine instances of various types that may be instantiated on additional server computers.
  • FIG, 1 also illustrates a public network 150 that may include one or more compnters such as computers 160 and 170.
  • instances 1 10, 1 15 and 120 may be configured to provide computing services to a computer user (not shown) of public network 150 via gateway 190 and computers 160 and 170.
  • reserved virtual machine instance 1 10 may provide a set of remote access enterprise applications to a group of users who may, for example, be employees of a university or other educational institution.
  • a user at computer 160 or 170 may send a request to a iBser-defined pool generation service 180 for creation of a user-defined pool or private marketplace.
  • server 130 or 140 may send the request on behalf of a user, on behalf of itself or on behalf of other servers.
  • user-defined pool generation service 180 may log the request and periodically provide updates as to the status of the request.
  • the user-defined pool generation service 180 may communicate with other services to facilitate creation of the requested private marketplace.
  • the user-defined pool generation service 180 may, for example, determine what instances are associated with the user and provide an interface for facilitating selection of the user's instances, selection of who may request or bid for the selected instances, and selection of a pricing or bidding policy.
  • 3361353.1 generation service 180 may further provide notifications to the user when the private
  • Networks established by or on behalf of an entity such as a company or organization to provide one or more services (such as various types of cloud-based computing or storage) accessible via the Internet and/or other networks to a distributed set of clients may be termed provider networks.
  • a provider network may include one or more data centers hosting various resource pools, such as collections of physical and/or virtualized computer servers, storage devices, networking equipment and the like, that may be used to implement and distribute the infrastructure and services offered by the provider network.
  • the resources may in
  • a virtual computing instance may, for example, comprise one or more servers with a specified computational capacity (which may be specified by indicating the type and number of CPUs, the main memory size and so on) and a specified software stack (e.g., a particular version of an operating system, which may in turn run on top of a hypervisor),
  • a specified computational capacity which may be specified by indicating the type and number of CPUs, the main memory size and so on
  • a specified software stack e.g., a particular version of an operating system, which may in turn run on top of a hypervisor
  • a number of different types of computing devices may be used singly or in combination to implement the resources of the provider network in different embodiments, including general purpose or special purpose composer servers, storage devices, network devices and the like.
  • a client or user may be provided direct access to a resource instance, e.g., by giving a user an administrator login and password.
  • the provider network operator may allow clients to specify execution requirements for specified client applications and schedule execution of the applications on behalf of the client on execution platforms (such as application server instances, JavaTM virtual machines (JVMs), general purpose or special-purpose operating systems, platforms that support various interpreted or compiled programming languages such as Ruby, Perl, Python, C, C++ and the like or high-performance computing platforms) suitable for the applications. This may be done without, for example, requiring the client to access an instance or an execution platform directly, A given execution platform may utilize one or more resource instances in some implementations; in other implementations, multiple execution platforms may be mapped to a single resource instance.
  • execution platforms such as application server instances, JavaTM virtual machines (JVMs),
  • FIG. 2 illustrates an example computing environment in which the embodiments described herein may be implemented.
  • FIG. 2 is a diagram schematically illustrating an example of a data center 210 that can provide computing resources to users 2Q0a and 200b (which may be referred herein singularly as “a user 200" or in the plural as “the users 200") via user computers 202a and 202b (which may be referred herein singularly as "a computer 202" or in the plural as “the computers 202") via a communications network 230.
  • Data center 210 may be configured to provide computing resources for executing applications on a permanent or an as-needed basis.
  • the computing resources provided by data center 10 may include various types of resources, such as data processing resources, data storage resources, data communication resources and the like. Each type of competing resource may be general-purpose or may be available in a number of specific configurations. For example, data processing resources may be available as virtual machine instances. The instances may he configured to execute applications, including Web
  • Data storage resources may include file storage devices, block storage devices and the like,
  • Each type or configuration of computing resource may be available in different sizes, such as large resources, consisting of many processors, large amounts of memory and/or large storage capacity, and small resources consisting of fewer processors, smaller amounts of memory and/or smaller storage capacity.
  • Customers may choose to allocate a number of small processing resources as Web servers and/or one large processing resource as a database server, for example.
  • Data center 210 may include servers 216a and 21 b (which may be referred herein singularly as “a server 216" or in the plural as “the servers 216") that provide computing resources available as virtual machine instances 218a and 218b (which may be referred herein singularly as “a virtual machine instance 218" or in the plural as “the virtual machine instances 218").
  • the virtual machine instances 218 may be configured to execute applications, including Web servers, application servers, media servers, database servers and the like.
  • Other resources that may be provided include data storage resources ⁇ not shown) and may include file storage devices, block storage devices and the like.
  • virtuaiization technologies such as those provided by VMware or other virtualization systems may allow a physical computing device to be shared among multiple users by providing each user with one or more virtual machine instances hosted by the physical computing device,
  • a virtual machine instance may be a software emulation of a particular physical computing system that acts as a distinct logical computing system.
  • Such a virtual machine instance provides isolation among multiple operating systems sharing a given physical computing resource.
  • some virtual ization technologies may provide virtual resources that span one or more physical resources, such as a single virtual machine instance with multiple virtual processors that spans multiple distinct physical computing systems.
  • communications network 230 may, for example, be a publicly accessible network of linked networks arid possibly operated by various distinct parties, such as the Internet.
  • communications network 230 may be a private network, such as, for example, a corporate or university network that is wholly or partially
  • communications network 230 may include one or more private networks with access to and/or from the Internet.
  • Communication network 230 may provide access to computers 202.
  • Computers 202 may be computers utilized by customers 200 or other customers of data center 210.
  • user computer 202a or 202b may be a server, a desktop or laptop personal computer, a tablet computer, a wireless telephone, a personal digital assistant (PDA), ars e-book reader, a game console, a set-top box or any other competing device capable of accessing data center 21&
  • User computer 202a or 202b may connect directly to the Internet (e.g., via a cable modem or a Digital Subscriber Line (DSL)).
  • DSL Digital Subscriber Line
  • Computers 202 may also be utilized to configure aspects of the computing resources provided by data center 210.
  • data center 210 might provide a Web interface through which aspects of t ' is operation may be configured through the use of a Web browser application program executing on user eomptster 202.
  • a stand-alone application program executing on user computer 202 might access an application programming interface (API) exposed by data center 210 for performing the configuration operations.
  • API application programming interface
  • Other mechanisms for configuring the operation of the data center 210, including deploying updates to an application might also be utilized,
  • Servers 216a and 216b shown m FIG. 2 may be standard servers configured appropriately for providing the computing resources described above and may provide computing resources for executing one or more applications.
  • the computing resources may be virtual machine instances 218.
  • each of the servers 216 may be configured to execute an instance manager 220a or 220b (which may be referred herein singularly as “an instance manager 220" or in the plural as "the instance managers 220") capable of executing the virtual machine instances.
  • the instance managers 220 may be a virtual machine monitor (VMM) or another type of program configured to enable the execution of virtual machine instances 218 on servers 216, for example.
  • VMM virtual machine monitor
  • each of the virtual machine instances 218 may be configured to execute all or a portion of an application.
  • a rooter 214 may be utilized to interconnect the servers 216a and 216b. Router 214 may also be corrected to gateway 240, which is connected to communications network 230. Rooter 214 may manage communications within networks in data center 210, for example, by forwarding packets or other data communications as appropriate based on characteristics of such communications (e.g., header information including source arid/or destination addresses, protocol identifiers, etc.) and/or the characteristics of the private network (e.g., routes based on network topology, etc.). It will be appreciated that, for the sake of simplicity, various aspects of the computing systems and other devices in this example are illustrated without showing certain conventional details. Additional computing systems and other devices may be interconnected in odier embodiments and may be interconnected in different ways.
  • data center 210 described in FIG, 2 is merely illustrative and that other implementations might he utilized. Additionally, it should be appreciated that the functionality disclosed herein might be implemented in software, hardware or a combination of software and hardware. Other implementations should be apparent to those skilled in the art.
  • a server, gateway or other computing device may comprise any combination of hardware or software that can interact and perform the described types of functionality, including without limitation desktop or other computers, database servers, network storage devices and other network devices, PDAs, tablets, cellphones, wireless phones, pagers, electronic organizers, Internet appliances, television-based systems (e.g., using set top boxes and/or personal/digital video recorders) and various other consumer products that include appropriate communication capabilities,
  • the functionality provided by the Illustrated modules may in some embodiments be combined in fewer modules or distributed in additional modules. Similarly, in some embodiments the functionality of some of the illustrated modules may not be provided and/or other additional functionality may be available.
  • scaling refers to the process of instantiating (which ntay also be referred to herein as “launching” or “creating”) or terminating (which may
  • 338135S.1 also be referred to herein as "de-sealing" instances of computing resources in response to demand.
  • de-sealing instances of computing resources in response to demand.
  • the capacity of resources purchased by a customer of data center 210 can be scaled on-demand.
  • Auto scaling is one mechanism for scaling computing resources in response to increases or lulls in demand for the resources.
  • Auto sealing allows customers of data center 210 to configure data center 210 to scale their purchased computing resources according to conditions defined by the customer. For instance, rales may be defined for scaling up capacity in a particular manner in response to the occurrence of specified conditions, such as a spike in demand. Similarly, rules might also be defined to scale down capacity in a particular manner in response to the occurrence of other conditions, such as a lull in demand.
  • the mechanisms disclosed herein for launching virtual machine instances might be utilised when instances are marmally launched by a customer or when instances are launched by an auto scaling component in data center 210.
  • Data center 210 may also be configured with a deployment component to assist customers in the deployment of new instances of computing resources.
  • the deployment component may receive a configuration from a customer that includes data describing how new instances should be configured.
  • the configuration might specify one or more applications or software components that should be installed in new instances, provide scripts and/or other types of code to be executed in new instances, provide cache warming logic specifying how an application cache should be prepared and other types of information.
  • the deployment component utilizes the customer-provided configuration and cache warming logic to launch, configure and prime new instances of computing resources,
  • a server that implements a portion or all of one or more of the technologies described herein, including die techniques to implement the functionality of a pool generation service 180 may include a general-purpose computer system that includes or is configured to access one or more computer-accessible media
  • FIG. 3 illustrates such a general purpose computing device 300.
  • computing device 300 includes one or more processors 310a, 310b and/or 31 On (which may be referred herein singularly as “a processor 310" or in the pinral as “the processors 310") coapled to a system memory 320 via an input output (I/O) interface 330.
  • Computing device 300 further includes a network interface 340 coupled to I O interface 330.
  • computing device 300 may be a uniprocessor system including one processor 310 or a multiprocessor system including several processors 310 (e.g.,
  • Processors 310 may be any suitable processors capable of executing instructions.
  • processors 310 may be general-purpose or embedded processors implementing any of a variety of instruction set architectures (ISAs), such as the xS6, PowerPC, SPARC or MIPS ISAs or any other suitable ISA.
  • ISAs instruction set architectures
  • processors 310 may commonly, but not necessarily, implement the same ISA.
  • System memory 320 may be configured to store instructions and data accessible by processors) 310.
  • system memory 320 may be implemented using any suitable memory technology, such as static random access memory (SRAM), synchronous dynamic RAM (SDRAM), nonvolatiie/FlashTM-type memory or any other type of memory, in the illustrated embodiment, program instructions and data implementing one or more desired functions, such as those methods, techniques and data described above, are shown stored within system memory 320 as code 325 and data 326,
  • I/O interface 330 may be configured to coordinate I O traffic between processor 310, system memory 320 and any peripheral devices in the device, including network interface 340 or other peripheral interfaces, in some embodiments, I/O interface 330 may perform any necessary protocol, timing or other data transformations to convert data signals from one component (e.g., system memory 320) into a format suitable for use by another component (e.g., processor 310). In some embodiments, I O interface 330 may inclnde support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component. Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard, for example.
  • PCI Peripheral Component Interconnect
  • USB Universal Serial Bus
  • I O interface 330 may be split into two or more separate components, such as a north bridge and a south bridge, for example. Also, in some embodiments some or all of the functionality of I O interface 330, such as an interface to system memory 320, may be incorporated directly into processor 310.
  • Network interface 340 may be configured to allow data to be exchanged between computing device 300 and other device or devices 360 attached to a network or networks 350, such as other computer systems or devices as illustrated in FIGS. 1 through 3, for example.
  • network interface 340 may support communication via any suitable wired or wireless general data networks, such as types of Ethernet networks, for example. Additionally, network interface 340 may support communication via
  • teiecontmunications/telephony networks such as analog voice networks or digital fiber
  • 3381359 J communications networks via storage area networks seen as Fibre Channel SANs or via any other suitable type of network and/or protocol.
  • system memory 320 may be one embodiment of a computer-accessible medium configured to store program instructions and data as described above for FIGS. 1 and 2 for implementing embodiments of the corresponding methods and apparatus.
  • program instructions and/or data may be received, sent or stored upon different types of computer-accessible media.
  • a computer-accessible medium may include non-transitory storage media or memory media such as magnetic or optical media, e.g., disk or DVD/CD coupled to computing device 300 via I O interface 330.
  • a non-transitory computer-accessible storage medium may also incltsde any volatile or non-volatile media such as RAM (e.g.
  • a computer-accessible medium may include transmission media or signals such as electrical, electromagnetic or digital signals, conveyed via a communication medium such as a network and/or a wireless link, such as may be implemented via network interface 340. Portions or all of multiple competing devices such as those illustrated in FIG. 3 may be used to implement the described functionality in various embodiments; for example, software components running on a variety of different devices and servers may collaborate to provide the functionality.
  • portions of the described functionality may be implemented using storage devices, network devices or special-purpose computer systems, in addition to or instead of being implemented using general-purpose computer systems.
  • Tbe term "computing device,” as used herein, refers to at least all these types of devices and is not limited to these types of devices.
  • a network set up by an sntky such as a company or a public sector organization to provide one or more services ⁇ such as various types of cloud-based computing or storage) accessible via the Internet and or other networks to a distributed set of clients may be termed a provider network.
  • a provider network may include numerous data centers hosting various resource pools, such as collections of physical and/or virtualked computer servers, storage devices, networking equipment and the like, needed to implement and distribute the
  • the resources may in some embodiments be offered to clients in units called instances, such as virtual or physical computing instances or storage instances.
  • a virtual computing instance may, for example, comprise one or more servers with a specified computational capacity (which may be specified by indicating the
  • a specified software slack e.g., a particular version of an operating system, which may in turn run on top of a hypervisor.
  • a number of different types of computing devices may be used singly or in combination to implement the resources of the provider network in different embodiments, including general purpose or special purpose computer servers, storage devices, network devices and the like.
  • a client or user may be provided direct access to a resource instance, e.g., by giving a user an administrator login and password.
  • the provider network operator may allow clients to specify execution requirements for specified client applications and schedule execution of the applications on behalf of the client on execntion platforms (such as application server instances, JavaTM virtual machines (JVMs), general purpose or special-purpose operating systems, platforms that support various interpreted or compiled programming languages such as Ruby, Perl, Python, C, C-H- and the like, or high-performance computing platforms) suitable for the applications, without, for example, requiring the client to access an instance or an execution platform directly.
  • execntion platforms may utilize one or more resource instances in some implementations; in other implementations multiple execution platforms may be mapped to a single resource Instance,
  • the computing resource provider may provide facilities for customers to select and launch the desired computing resources, deploy application components to the computing resources and maintain an application executing in the environment.
  • the computing resource provider may provide further facilities for the customer to quickly and easily scale up or scale down the numbers and types of resources allocated to the applicadon, either manually or through automatic scaling, as demand for or capacity requirements of the application change.
  • the computing resources provided by the computing resource provider may be made available in discrete units, which may be referred to as instances.
  • An instance may represent a physical server hardware platform, a virtual machine instance executing on a server or some combination of the two.
  • Various types and configurations of instances may be made available, including different sises of resources executing different operating systems (OS) and/or hypervisors, and with various installed software applications, runtimes and the like, instances may further be available in speci ic availability zones, representing a data center or other geographic location of e underlying computing hardware, for example.
  • OS operating systems
  • the provider network may be organized into a plurality of geographical regions, and each region may include one or more availability zones.
  • An availability zone (which may also be referred to as an availability container) in turn may comprise one or more distinct locations or data centers, configured in such a way that the reso rces in a given availability zone may be isolated or insulated from failures in od3 ⁇ 4er availability zones. That is, a failure in one availability zone may not be expected to result in a failure in any other availability zone.
  • the availability profile of a resource instance is intended to be independent of the availability profile of a resource instance in a different availability zone.
  • Clients may be able to protect their applications from failures at a single location by launching multiple application instances in respective availability zones.
  • inexpensive and low latency network connectivity may be provided between resource instances that reside within the same geographical region (and network transmissions between resources of the same availability zom may be even faster).
  • the provider network may make instances available "on-demand,” allowing a customer to select a number of instances of a specific type and configuration (e.g. size, platform, tenancy, availability one and the like) and quickly launch the instances for deployment.
  • On- demand instances may further be added or removed as needed, either manually or automatically through auto scaling, as demand for or capacity requirements changes over time.
  • the easterner may incur ongoing usage costs related to their on-demand instances, based on the number of honrs of operation and/or the actual resources utilized, for example,
  • the computing resource provider may also make reserved instances available to the customer. Reserved instances may provide the customer with the ability to reserve a number of a specific type and configuration of Instances for a fixed term, such as one year or three years, for a low, upfront cost in exchange for reduced hourly or other usage costs, for example, if and when the instances are launched. This may allow the customer to defer costs related to scaling up the deployed application in response to increase in demand, while ensnring that the right resources will be available when needed.
  • reserved instances provide customers with reliable, stand-by capacity for scaling of their application
  • pnrchasing reserved instances may also lock the customer into a specific number, type and/or configuration of computing resource in a specific availability zone for a longer period than desired, If the technical architecture or needs of the application change, the customer may not be able to realize a return on their investment in the reserved instances.
  • a resource manager of the provider network may implement a programmatic resource reservation interface (e.g., via a Web site or a set of Web pages) that allows clients to learn about, select, purchase access to and or reserve resource instances.
  • a programmatic resource reservation interface e.g., via a Web site or a set of Web pages
  • an interface manager subcomponent of that entity may be responsible for the interface-related functionality.
  • equivalent interface-related functionality may be implemented by a separate or standalone interface manager, external to the resource manager and the pricing optimizer.
  • Such an interface may include capabilities to allow browsing of a resource catalog, provide details and specifications of the different types or sizes of resotrrees supported, the different reservation types or modes supported, pricing models and so on.
  • the provider network may support several different purchasing modes (which may also be referred to herein as reservation modes) corresponding to some of the instance types described above.
  • the provider network may support long-term reservations, o - demand resource allocations or spot-price-based resource allocations.
  • long-term reservation mode a client may make a low, one-time, upfront payment for a resource instance, reserve it for a specified duration, such as a one- or three-year term, and pay a low hourly rate for the instance; the client would be assured of having the reserved instance available for the term of the reservation.
  • a client could pay for capacity by the hour (or some appropriate time unit), without any long-term commitments or upfront payments.
  • a client could specify the maximum priee ⁇ per ⁇ tmit time that it is willing to pay for a particular type of resource, and if the client's maximum price exceeded a dynamic spot price determined at least in part by supply and demand, then that type of resource would be provided to the client.
  • dynamically resizabl pools of resource instances may be set aside for the different reservation types or modes - e.g., long-term reserved instances may be allocated from one pool, on-demand instances from another and so on.
  • a resource allocation may be interrupted - i.e.. a resource instance that was previously allocated to the client may be reclaimed by the resource manager and may be allocated to some other client that is willing to pay a higher
  • a provider network may also Implement a service to allow for creation of a private marketplace.
  • the service may provide a mechanism for customers who would like to offer their reserved instances and other types of instances to users associated with the customer or otherwise designated by the customer, For example, the customer's interna! users within their organizations may want to obtain shorter- term reserved instances than those generally provided by the computing resource provider, or only need access to an instance for a limited duration.
  • a customer may select the remainder of the term of their reserved instances, a number of unused reserved instances and allocated spot instances, or a portion thereof, and offer the selected instances to the customer's internal users m the private marketplace, allowing the internal users to "purchase,” "bid for” or otherwise request access to instances via the private marketplace.
  • Customers may thus be provided with a method of more efficiently utilising its acquired instances by implementing such a limited private marketplace for providing the instances to those internal users who most need or are willing to pay the most "currency" for the instances, thus more efficiently distributing me customer's allocated capacity.
  • FIG. 4 illustrates an example system environment for providing instances, according to at least some embodiments.
  • the system 400 may include a provider network 410 comprising a plurality of resource instances 430 (which may be referred herein singularly as “a resource instance 430" or in the plural as “the resource instances 430”), such as instances 430A, 43GB, 43GD, 430E, 430G and 430H in one availability zone 420A and instances 430J, 430K, 430M, 430N, 430P, 430Q in a different availability zone 420B.
  • the various resource instances 430 in the availability zones 420A and 420B (which may be referred herein singularly as "an availability zone 420" or in the p!nra!
  • system 400 includes a resource manager 480 and an interface manager 482. As rtoted earlier, in some embodiments the functionality of the interface manager 482 may be implemented by a subcomponent of the resource manager 480.
  • the interface manager 482 may in some embodiments implement one or more programmatic interfaces allowing clients 448 to search for, browse, reserve and acquire instances 430 to obtain various types of services, e.g., to ran and/or access various applications.
  • clients 448 may search for, browse, reserve and acquire instances 430 to obtain various types of services, e.g., to ran and/or access various applications.
  • some or all of the instances 430 may be assigned to instance pools, such as reserved instance pools 421 A or 42 IB, on-demand instance pools 423A or 423B, available instance pool 425 or other pools such as other pool 427.
  • a given pool such as available instance pool 425 may itself contain its own sub-pools, e.g., based on the modes of instance reservation and allocation supported.
  • Each poo? (or sob-pool) may have an associated pricing policy for its instances, as well as other properties such as tntemiptibility settings for the instances that happen to be assigned to the pool or sab-pool.
  • the pools may represent logical collections or aggregations, so that, for example, the presence of two instances in the same pool or sub-pool may not necessarily Imply anything aboat the physical location of the hardware used for She two instances.
  • Availability zones 420 may be grouped into geographic regions (not shown in HG, 4 ⁇ in some embodiments. Instance pools may be implemented within availability E n in some im lementations (e.g., each availability zone may have Its own reserved instance pool); while In other implementations an instance pool or sub- pool may span mnltiple availability zones.
  • a data center 500 may be viewed as a collection of shared computing resources and/or shared infrastructure.
  • a data center 500 may include virtual machine slots 504, physical hosts 502, power supplies 506, routers 508, isolation zones 510 and geographical locations 512.
  • a virtual machine slot 504 may be referred to as a slot or as a resource slot,
  • a physical host 502 may be shared by mnltiple virtual machine slots 504, each slot 504 being capable of hosting a virtual machine, such as a guest domain.
  • Multiple physical hosts 502 may share a power supply 506, such as a power supply 506 provided on a server rack.
  • a router 508 may service multiple physical hosts 502 across several power supplies 506 to route network traffic.
  • An isolation zone 510 may service many ranters 508; the isolation zone 510 being a group of computing resources that may be serviced by redundant resources such as a backup generator. Multiple Isolation zones 510 may reside at a geographical location 512, such as a data center 500.
  • a provisioning server 514 may include a memory and processor configured with instructions to analyze user data and rank available implementation resources using determined roles and shared resources/infrastructure in the calculation. The provisioning server(s) 514 may also manage workflows for provisioning
  • 3381 ass, 5 and de-provisioning computing resources as well as detecting health and/or failure of computing resources.
  • a provisioning server 514 may determine a placement of the resource within the data center. In some embodiments, this placement may be based at least in part on available computing resources and/or relationships between computing resources. In one embodiment, the distance between resources may be measured by the degree of shared resources. This distance may be used in the ranking of resources according to role. For example, a first system on a host 502 that shares a router 508 with a second system may be more proximate to the second system than to a third system only sharing an isolation zone 510, Depending on an application, it may be desirable to keep the distance low to increase throughput or high to increase durability. In another embodiment, the distance may be defined in terms of unshared resources. For example, two slots 504 sharing a router 508 may have a distance of a physical host 502 and a power supply 506. Each difference in resources may be weighted differently in a distance calculation.
  • a placement calculation may also be used when selecting a prepared resource to transfer to a client account.
  • a cheat requests a virtual machine having an operating system.
  • the provisioning server 514 may determine that the request may be satisfied with a staged volume in a slot 504,
  • a placement decision may be made that determines which infrastructure may be desirable to share and which infrastructure is undesirable to share.
  • a staged volume that satisfies at least some of the placement decision characteristics may be selected from a pool of available resources. For example, a pool of staged volumes may be used in a cluster computing setup.
  • a provisioning server 514 may determine that a placement near other existing volumes is desirable for latency concerns, Therefore, the decision may find that sharing a roister 508 is desirable, but sharing a supply 506 and physical host 502 is undesirable. A volume in the pool may then be selected that matches these attributes and placed preferably on a same router 508 as the other volumes, but not the same physical host 502 or power supply 506, In other examples of placement decisions, such as those relating to a database shard, sharing of infrastructure may be less desirable and a volume may be selected that has less infrastructure in common with other related volumes.
  • Operators of provider networks sueh as those described above may, in some embodiments, provide an infrastructure, such as user-defined pool generation service 180 depicted in FIG. I , that provides customers with the ability to request and create user-defined private marketplaces,
  • a customer may be an entity, such as an educational institution, etc.
  • 3381369.1 institution that has purchased a number of resources, such as reserved instances and on-demand instances.
  • the customer may select a subset of the customer's reserved and on-demand instances and create an internal marketplace in which departments and/or users within the educational institution may bid internally for the reserved instances and on-demand instances.
  • the bidding process may be similar to the process for bidding for a spot instance in a spot market as described above, in some embodiments, the customer may seiect other bidding processes or allow for bidding using other forms of payment such as with allotted credits.
  • aspects may be customizable— such as the currency, the minirnurn/ naxinjuni prices or price levels, the bidding/pricing algorithm, interruption cycles and other parameters.
  • User A may have associated reserved instances 600, on-demand instances 605 and spot instances 610. User A may allocate instances
  • User B, C and D of user A's reserved instances 600 may be referred to as a subset of the reserved instances 600, and instances 1 and 2 of the spot instances 600 may be referred to as a subset of the spot instances 600.
  • User B may have associated reserved instances 630 and spot instances 640.
  • User B may allocate instances and L of user B's reserved instances 630 for user-defined pool 650, User B may also allocate instances 8 and 9 of user B's spot instances 640 for the user- defined pool 650.
  • Instances and L of user B's reserved instances 630 may be referred to as a subset of the reserved instances 630, and 8 and 9 of user B's spot instances 640 may be referred to as a subset of the spot instances 640, in some embodiments, user A or user B can remove instances that have been allocated to a user-defined pool.
  • a user-defined pool or private marketplace may be provided as an additional service on tap of a customer's resource slots, such as the user-defined pool generation service 180 of FIG. 1.
  • the nser-defined pool generation service 180 can be embodied in software that can be installed on a network of computers, such as in a private data center.
  • a user may select a number of instances of each instance type that the user has obtained and has beers allocated by the provider network.
  • the user may also be able to provide or select a pricing algorithm, for example, the user may be able to upload one or more algorithms or formulas using a standardized format, such as XML.
  • a pricing algorithm for example, the user may be able to upload one or more algorithms or formulas using a standardized format, such as XML.
  • the pool generation service may provide one or more templates for an algorithm OF formula.
  • the pool generation service may also provide additional templates or predetermined selections for parameters siich as the number and type of instances, configuring the selected instances, making selections for enforcing fairness between bidders and so on,
  • the nser can be provided the option of selecting an English auction method in which ascending prices are displayed, and the winner is the highest bidder with the price for the instance being the highest bid.
  • the user may be provided au option of selecting a Dutch auction method in which the price for the instance begins at a high level and is lowered until a user accepts the current price.
  • the user can select a maximum price that the user is willing to pay, and if the user's ma imum price exceeds a dynamic price determined at least in part by supply and demand, then the instance may be provided to the user.
  • the nser can be provided the option of selecting a currency lo be used for the bidding process.
  • the currency can include units of value that are defined or selected by the customer when the private marketplace is created. While the customer may- select traditional monetary units or values for the i stances such as dollars unit of time, the customer may also select other units such as CPU cycles or network bandwidth, which may reflect value based on different bases of value.
  • the currency may be used to bid for units of computing capacity such as a resource slot or for other units of computing capacity that may be defined by the user.
  • a bid can include a monetary bid amount and an amount of desired computing capacity such as an amount of computing cycles.
  • the user-defined pool generation service 180 can provide an API for facilitating the selection of parameters for the private marketplace.
  • the API may determine which customer is communicating with the pool generation service and generate a request to create a private marketplace.
  • the user-defined pool generation service 180 may assign an ID to the request and track the ID of the requested private marketplace during processing of the request.
  • a customer that is only identified with a single authorized user may allow the single authorized user able to set up a private market. If there are multiple authorized persons, then the pool generation service may require that a single specialized account be identified as being able to set up a private market.
  • the user-defined poo! generation service 180 may authorise the user with the specialized acco nt based on, for example, credentials presented by the user.
  • the user-defined pool generation service 1 80 can track the private marketplace generation activities for billing purposes.
  • the user-defined pool generation service 180 may further track which of the users who bid on the instances in the private marketplace have bid for arid have been allocated instances so that the customer may track this activity.
  • the user-defined pool generation service 180 may track die usage on a per-user basis, a per-use basis, a per-bid basis or other metering schemes, and provide the information to the customer for billing and tracking purposes.
  • the user-defined pool generation service 180 in response to a bid request, can embed an ID for the bidding user as metadata that can be used to identify the bidding user as the bid request is processed and fulfilled.
  • the metadata can include fields including the user ID, which can be included in the billing records. The user-defined pool generation service 180 can thus track the customer who requested the private marketplace, as well as identify users who have bid for instances in the private marketplace.
  • key-value pairing can be used to track the data or attributes associated with the request for the private marketplace or bids far the resource slots in the private marketplace.
  • the user-defined pool generation service 180 may track linked data records that include a unique identifier for the data as well as the data itself or a pointer to the location of the data. For example, an open-ended data structure may be used to collect the user data such as ⁇ user ⁇ defined pool ID, user ID, request ID>.
  • customers may have more than one account with the provider network and thus have multiple pools of allocated resources.
  • a customer may have a first account for a first project and have associated resource slots allocated with the first account.
  • the customer may also have a second account for a second project and have associated resource slots allocated with the second account.
  • the customer may be provided the ability to select resource slots associated with either the first or second accounts and allocate the selected resource slots for a single private marketplace. Customers may thus be able to mix and match resources from multiple pools of resources into one user-defined pool,
  • the user-defined pool generation service 180 can link together accounts of two or more customers to create a single user-defined pool.
  • the user-defined pool generation service 180 may also track usage based on actual usage of the resources and by tracking the users who bid for the resources and their affiliations with the customers.
  • the single user-defined pool may be updated by a single customer who is authorized to m ke changes to the single user-defined pool. Alternatively, additional customers may be authorized to make changes to the single user-defined pool. Similarly, a single customer may be authorized to make changes to policies associated with the single user-defined pool,
  • the functionality of th user-defmed pool generation service 180 may be provided via software that can be installed and executed on a customers computing resources.
  • the customer may own and or operate their own computing
  • the pool generation service software may provide interfaces for selecting the customer's resource slots, selecting parameters for a user-selected pool as described above and create the user-selected pool
  • the pool generation service software may further facilitate the requests bids for the resource slots and track usage information for tracking/billing purposes.
  • Entity A who may correspond to entity A in Figure 6, may have associated internal users A, B, C, D» E and F. Entity A may also have allocated reserved instances A, B, C and D of entity A's reserved instances in user-defined pool 620. Entity A may also allocate instances 1 and 2 of entity A's spot instances for the user-defined pool 620. Entity B may have associated internal users N, P, RNase S, T and U, Entity B may also allocate instances and L of entity B's reserved instances for user-defined pool 650.
  • User B may also allocate instances 8 and 9 of user B's spot instances for the nser-defined pool 650.
  • Entity A may further authorize its interna! users A, B, C, and D (subset 710) to access its user-defined pool 620.
  • Entity B may further authorize its internal users R, S, and T (subset 720) to access its user-defined pool 650.
  • the authorized internal users may now bid for access to the instances in their respective user-defined pools.
  • entity A and entity B may elect to join resources and request that user-defined pool 620 and user-defined pool 650 be joined into a single user-defined pool.
  • users A, B, C, and D of entity A and users R, S, and T of entity B may bid for the combined single user-defined pool.
  • the capacity of the resource slots allocated to a user-defined pool by a customer may be exceeded by die requests for the resource slots generated by the users, For example, a customer may undere stint ate the demand for resource slots and select a number of resource sl ts for the user-defined pool that is insufficient to meet the actual demand.
  • the provider network may provide an option for the customer to allow for such excess capacity demands to he met using unused capacity.
  • arc option may be provided to fulfill the exceeded capacity using unused capacity that is already allocated to the customer but uot allocated to the user-defined pool.
  • an option may be provided to fulfill die exceeded capacity using unused capacity provided by the provider network.
  • the provider network may charge a fee for the service.
  • a customer may be able to continue providing access to the user-defined pool by accessing or "bursting" into additional capacity provided by the service provider or by the customer (using the customer's unused capacity) on an as-needed basis.
  • Such a capability may be useful when peak demand occurs only on an occasional basis, in which case it may be more cost effective for the customer to purchase burst capacity rather than dedicate additional resource slots to the user-defined pool.
  • the decision as to whether excess capacity will be bnrsted from the provider network or front the customer's non-ailocated capacity can be based on a policy selected by the customer. For example, the customer may specify a maximum price that the customer is willing to pay for excess capacity. The customer may also specify a maximum budget within which burst requests can be fulfilled until the maximum budget is reached.
  • a user-defined pool 800 may include reserved instances 801 , 802, 803, 804 and 805, as well as spot instances 806, 807 and 808. During periods of peak activity, user- defined pool 800 may receive more requests than can be provided using the resources allocated to the user-defined pool
  • a policy may have been established that allows user-defined pool 800 to access reserved instance pool 810 for bursting capacity. For example, as shown in the figure reserved instance slots 81 1 , 812 and 813 may be allocated to user-defined pool 800 for burst capacity.
  • the policy may allow user-defined pool 800 to access on- demand instance pool 820 including on-demand instances 821 , 822 and 823, and spot instance pool 830, including spot instances 831 , 832 and 833, for bursting capacity.
  • FIG. 9 is a system diagram that shows an illustrative operating environment 900 including several components for implementing a private marketplace.
  • the environment 900
  • may include a computing platform 902,
  • the computing platform 902 may be implemented by a computing resource provider to make computing resources available to customers 920 for the deployment and execution of distributed applications.
  • the computing resources provided by the computing platform 902 may include various classes of resources, such as data processing resources, data storage resources, data communication resonrces and the like. Each class of computing resource may be general- purpose or may be available in a number of specific configurations. For example, data processing resources provided by the computing resource provider may be made available in discrete units or instances 904. Each instance 904 may represent the data processing resources of a dedicated host computer 906, referred to herein as a dedicated tenancy instance, or each instance 904 may represent a virtual machine instance executing on a host computer 906, which may also be referred to as a shared tenancy instance.
  • the host computers 906 may represent generic multi-processor server devices, special-purpose hardware devices and the like. As discussed above, various types and configurations of instances 904 may be made available. For example, each available instance 904 of data processing resources may be of a particular size-— such as small, medium and large- representing different combinations of physical and/or virtual resources comprising or allocated to the instance, snch as number and types of processors, amounts of memory, size and speed of local storage, number of networking addresses or communication channels and or the like. An instance 904 may further be configured with a particular platform, such as a specific OS and/or hypervisor installed on the instance. Instances 904 may also be made available with specific application software components Installed, such as Web server software, database management software, portal software, a specific runtime environment or platform and the like.
  • Instances may further be available in specific availability zones 908A and 908B, as described above.
  • an availability zone 908 may represent a particular physical location, such as a data center, or other physical and ⁇ or logical grouping of underlying host computers 906 and computing devices supporting the instances 904 provided by the computing platform 902, Providing instances 904 in different sizes and in different availability zones 908 may allow a deployed application to be geographically dispersed, improving end-user performance and insulating the overall application from failures in one particular location or zone.
  • a customer 920 may choose to deploy a number of small instances 904 across multiple availability zones 908 for some functions of the application, such as Web servers, while deploying a single large instance 904 for other functions, such as a database server, for example,
  • the customer 920 may also require that instances 904 be hosted by host computers 906 in particular geographical locations for geopolitical reasons, as well
  • Ersd-users 950 may ut lize end-user computer systems 952 to access the functionality of the application executing on the allocated Instances 904 through one or more networks 944.
  • the network(s) 944 may represent a combination of local-area networks (LANs), wide-area networks (WANs), the Internet and/or any other networking infrastructure known in the art that connects the host computers 906 in the computing platform 902 to the end-user computer systems 952, to each other and to other computing resources,
  • the end-user computer systems 952 may represent personal computers (PCs), desktop workstations, laptops, notebooks, personal digital assistants (PDAs), electronic-book readers, game consoles, set-top boxes, consumer electronics devices, server computers or any other computing device capable of connecting to the net ork(s) 944 and communicating with the host computers 906 in the computing platform 902,
  • a customer 920 wishing to access resources on the computing platform 902 may similarly utilize a customer computer system 922 to connect the computing platform over the rsetwork(s) 944 and to configure and manage the computing resources provided by the computing platform.
  • the computing platform 902 may include a number of application servers 924 thai provide various management services to the customer 920 for purchasing and maintaining instances 904 of data processing and or other computing resources, deploying components of the application across the purchased instances 904, monitoring and administering execution of the application and the like.
  • the customer computer systems 922 may represent PCs, desktop workstations, laptops, notebooks, PDAs, electronic-book readers, game consoles, set-top boxes, consumer electronics devices, server computers or any other computing device capable of connecting to the network(s) 944 and communicating with the application servers 924 in the computing platform 902.
  • the application servers 924 may represent standard server computers, database servers, Web servers, network appliances, desktop computers, other computing devices and any combination thereof.
  • the application servers 924 may execute a number of modules in order to provide the management services.
  • the modules may execute on a single application server 924 or in parallel across multiple application servers in the computing platform 902.
  • each module may consist of a number of subcomponents executing on different application
  • the modules may be implemented as software, hardware or any combination of the two,
  • [ ⁇ ] i3 ⁇ 4 e application servers 924 may execute an instance management module 926.
  • the instance management module 926 may allow customers 920 to purchase and configure instances 904 of data processing or other computing resources, manage and maintain purchased instances 904 and the like.
  • Instances 904 may include instances that may be obtained through various modes such as reserved instances, spot instances and on demand instances as described above. Purchased instances 904 for each customer 920 and corresponding configuration and status information may be stored in customer/instance management data 928.
  • customer/instance management data 928 may be stored in a database 930 or other data storage system available to the application server(s) 924 in the computing platform 902.
  • Reserved instances provide the customer with the ability to reserve a number of a specific type and configuration of instances for a term, such as one year or three years.
  • the reserved instances may represent actual instances of data processing resources configured as specified and placed in stand-by for launch and depioyment by the customer 920 at a future time, or the reserved insiances 904 may represent overall capacity reserved by the computing resource provider for quick configuration and launch when required.
  • a customer 920 may purchase and launch a number of on-demand instances 904 of a specific type and configuration (e.g., size, platform, tenancy, availability zone and the like) to support immediate availability of the application, as well as a number of reserved instances of the same or similar type and configuration for scaling up the application in the future in response to increased demand or capacity requirements of the application, for example.
  • a specific type and configuration e.g., size, platform, tenancy, availability zone and the like
  • a customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a user interface (UI) presented by the instance management module 926 through a Web service to perform the configuration and maintenance of their purchased instances 904.
  • the customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a UI presented by the pool generation module 946 through a Web service to one or more of their purchased instances 904 as a user- defined pool as discussed above.
  • the instance management module 926 or pool generation module 946 may expose an application programming interface (API) 932 » which may be accessed over the network(s) 944 by stand-alone application programs executing on the customer computer system 922.
  • API application programming interface
  • 33813SS.1 may also be imagined, including remote procedure calls, SOAP-based Web services, remote file access, proprietary client-server architectures and the like.
  • the instance management module 926 may allow customers 920 to purchase both on-demand instances and reserved instances. On-demand instances may be purchased and launched immediately, allowing for quick deployment of the components of the application. On-demand instances may further be added or removed as needed, either manually or automatically through to sealing, as demand for or capacity requirements of the application changes over time. The customer 920 may incur ongoing usage costs related to their ors-demand instances, based on the number of hours of operation of the instances 904 and/or the actual resources tilized, for example.
  • a customer 920 may determine that their computing capacity may be more efficiently utilised If their instances 904 purchased at deployment of the application were offered to their internal users using a private purchase/bidding process via a private marketplace as described above. For example, the computation needs of the users of customer 920 may change over time, requiring data processing Instances 904 of a different skes or platforms at different times. Similarly, overall demand for the resources may change requiring more instances 904 or requiring instances in different availability zones 908 than originally anticipated.
  • the customer 920 may wish to "sell" their instances 904 to their internal users in order to more efficiently utilize the computing capacity offered by their instances 904 and provide a greater return on the original investment in the purchased Instances, in this regard, the pool generation module 946 may further allow the customer 920 to select a number of instances 904 to allocate to a private marketplace.
  • the instance management module 926 may store information regarding the instance(s) 904 selected for the private marketplace in reserved instance listings 934 and spot instance listings 940 in the database 930 or other data storage system available to the application server(s) 924 in the computing platform 902.
  • the customer 920 may delegate a number of instances 904 for a user-defined pool or private marketplace that is accessible to a set of internal users as designated by the customer 920.
  • the private marketplace may implement a private spot market that is configured to provide access to instances using some of the features used in spot markets as described above.
  • the private marketplace may be limited to designated or internal users of the customer 920.
  • the private marketplace may operate using a particularized set of parameters and features that are selected by the customer 920.
  • the pool generation module 946 may allow customers 920 to purchase a user-defined poo! or a private marketplace.
  • User-defined pools may be purchased and launched to allow users designed by customers 920 to bid for instances that are allocated to the user-defined pool.
  • User-defined pools may further be added or removed as rteeded by the customers 920, either manual y or automatically through the use of policies.
  • the customer 920 may incur one-time fees and/or ongoing usage costs related to their user-defined pools, based for example on the number of user-defined pools and the number of hours of operation of the user- defined pools and/or the actual resources utilized.
  • the application servers 924 may further execute an instance listings module 936.
  • the instance listings module 936 may allow users identified by customer 920 to browse and bid for the instances 904 allocated for the private marketplace.
  • a user of customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a user interfaces (UI) presented by the instance listings module 936 through a Web service to browse and select instances 904 listed in the private marketplace for "purchase” or "bid.”
  • UI user interfaces
  • the instance listings module 936 may expose an API 932, which may be accessed over the rsetwork(s) 944 by stand-alone application programs executing on the customer computer system 922,
  • the instance listings module 936 may access the reserved instance listings 934 and spot instance listings 940 in the database 930 to determine availability and pricing for instances meeting specified type and configuration requirements (e.g., size, platform, tenancy, availability zone and the like), The instance listings module 936 may also effect allocation of the instances In the private marketplace.
  • the reserved instance listings module 936 may further store data regarding each "sale" of the instances through the pri vate marketplace in private marketplace history data 938 in the database 930 or other data storage system.
  • the private marketplace history data 938 may be utilized by customer 920 or the competing resource provider to analyze billing data regarding the allocation of instances through the private marketplace.
  • the customer 920 may utilize one or more of the above described modules to add additional types of instances as they become available. At least some of the above described functionality can be executed on one or more of the customer's instances, or can be executed on instances or other resources of the provider network,
  • the user can be provided a user interface for selecting one or more of the user's resource slots for the private marketplace and selecting associated
  • the user may be able to access a user interface, such as the one shown hi FIG. 10,
  • a customer may utilize a UI presented by the irsstance management module 9926 of FIG. 9 to select the instances to be listed in a private marketplace.
  • the instance management; module 926 or another module in the ciond computing platform 902 may present the UI 500 to the customer 920 m a window 102 of a Web browser or other client application executing on the customer computer system 922.
  • the UI 100 may include a reserved instance list 104 listing the reserved instances of instances 90 of FIG.
  • the reserved instance list 104 may further include the original term of each reserved instance of instances 904 and the remaining term until the reserved instance expires.
  • the reserved instance list 104 may also include the current state of the reserved instances of instances 904, such as whether the reserved instances are active, have expired, are already listed in a user-defined pool, the name of the user-defined pool if already listed and the like.
  • the UI 100 may fnrther include a selection UI control, such as the checkbox UI control 106 shown in FIG. 9, that allows the customer 920 to select one or more reserved instances shown in the reserved instance list 104 for listing in the private marketplace, after which the customer 920 may select a command UI control, such as the create listing UI control 108 shown in FIG, 9.
  • a selection UI control such as the checkbox UI control 106 shown in FIG. 9
  • Other methods of selecting reserved instances of instances 904 for listing in the reserved instance marketplace through the UI 100 may also be implemented, including selecting a Hue in the reserved instance list 104 with a mouse or other input control and selecting a command UI control from a context menu presented by the instance management module 926 for the selected line, for example.
  • instance management module 926 may receive information for the parameters for the private
  • the instance management module 926 or another module in the cloud computing platform 902 may present the UI 1 100 to the customer 820, as shown in FIG, 1 1 .
  • the UI 1 100 may be presented in the window 1 102 of a Weh browser or other client application executing on the customer computer system 822, for example.
  • the UI i 100 may Include a summary of the private marketplace, including the private marketplace (user-defined pool) properties and bidding parameters (e.g., request type, bidding method, currency and the like).
  • the UI 1 100 may further include a user selection UI control 1 102, allowing the customer 820 to select a maximum quantity of users who cm participate in the private marketplace,
  • the UI 1 100 may further include a number of entry UI controls 1 !04A- i 104N, allowing the customer 920 to specify users who can participate in tie private marketplace.
  • the customer 920 may be able to list the specific identifier, name and organization for die users who can access the marketplace. These users may have beer* previously entered and stored as users associated with customer 920.
  • the user information cm be used to determine users who are authorized to bid for the resources in the private marketplace and can also be used to track usage for billing purposes.
  • the customer 920 may also remove one or more users by deleting users using UI controls 1 104A-1 104N,
  • an ⁇ may be provided for facilitating the creation and management of user-defined pools.
  • the API may be configured to receive electronic messages d3 ⁇ 4at encode identifiers indicative of requests for allocating computing resources in a provider network and creating a user-defmed pool of the computing resources, Irs response to receiving one of the electronic messages, the API may send second electronic messages indicative of information indicating that a set of resource slots associated with a customer is associated with a pricing policy and one or more users designated for the user-defined pool,
  • FIG. 12 is a data structure diagram showing a number of data elements stored in a user-defined pool record i 200 regarding a user-defined pool, It will be appreciated by one skilled in the art that the data structure shown sn the figure may represent a data file, a database table, an object stored in a computer memory, a programmatic structure or any other data container commonly krsown in the art. Each data element inciuded in die data structure may represent one or more fields in a data file, one or more columns of a database table, one or more attributes of an object, one or more member variables of a programmatic structure or any odier unit of data of a data structure commonly known in the art. The implementation is a matter of choice and may depend on the technology, performance and other requirements of die computing system upon which the data structures are implemented,
  • Each user-defined pool record 1200 may contain a customer ID 1202 identifying the customer 820 of the cloud computing platform 802 that is creating the private marketpiace. According to one embodiment, each user-defined pool record 1200 may also contain an instance ID 1204 identifying the specific instance 804 that may be associated with a bid request. The instance ID 1204 may correspond to information regarding the instance 104 stored in the customer/instance management data 828, for example. In this embodiment, each instance 104,
  • 336135S.1 which is to be included in the private marketplace, may have an associated user-defsned pool record 1200 in die database 830,
  • the user-defined poo! record 1200 may additionally or alternatively contain the type and configuration parameters describing the associated instance(s) 1204, including ihe size 1206, platform 5208, tenancy 1210, availability mne 1252, instance type [ 214 and the iike.
  • the user-defined pool record 5200 may also contain a user ID 1216 indicating an identification of a particular user associated with the record.
  • the user ID 1216 may correspond to the identifier information provided by the customer 820 when creating the user- defined pool, as described above with regard to FIG, 10.
  • the user-defmed pooi record 5200 may also contain information regarding a request ID 1218, corresponding to a particular request for an instance, and asking price 121 that corresponds to the bid amount for the request.
  • the user-defined pool record 1200 may further contain information regarding one or more usage records 5220A ⁇ 122GM (also referred to herein generally as "usage 1220") and billing records 1222A-1222N (aiso referred to herein generally as "billing 1222").
  • usage 1220 also referred to herein generally as "usage 1220”
  • billing records 1222A-1222N as “aiso referred to herein generally as "billing 1222"
  • Billing records 1222A- 1222N for usage 1220A-1202N may be tracked for die user for billing purposes. It will be appreciated that the user-defined pooi record 1200 may contain additional data elements beyond those shown in FIG. 12 and described above that are utilized by the instance
  • the management module 926 the instance listings module 936 and/or other modules of the cloud computing platform 902 implementing the private marketplace.
  • the instance management module 9926 or other modules in the cloud computing platform 0902 may provide UIs or APIs 932 to the customer 920 and/or customer computer system 9922 that allow the customer to modify their user-defined pooi, check the status of the user-defined pool and/or to delete die ser-defined pooi if it is no longer desired to provide die instances using the user-defined pool delivery mechanism.
  • FIG. 13 illustrates an example operations! procedure for allocating computing resources in a provider network.
  • a mechanism for creating a user-defined pooi can be provided by services such as user-defined pool generation service 180 in FIG, I .
  • the operational procedure may be implemented in a system comprising one or more computing devices, The one or more computing devices may comprise a plurality of resource slots, each resource slot configured to host a computing instance. Referring to FIG. 13, operation 1300 begins die operational procedure. Operation 1300 may be followed by operation 1302. Operation
  • 3381359.1 1302 illustrates allocating a plurality of resource slots to a plurality of entities according to a first pricing policy.
  • the entities may correspond to customers or users of the provider network, such as a university or other institution.
  • the first pricing policy may be the pricing policies sed by tlie provider network to sell and allocate resource slots and odier resources in the provider network,
  • Operation 1302 may be followed by operation 1304.
  • Operation 1304 illustrates receiving an indication that at least one of the resource slots associated with a first entity of the plurality of entities is associated with a second pricing policy.
  • the indicated resource slots may be accessible to other entities.
  • the second pricing policy and the other entities may be designated by the first entity.
  • the subset may correspond to a group of resource slots designated by a customer to allocate to a private marketplace.
  • the second pricing policy may correspond to user-selected policies for offering the resource slots to th other entities.
  • the other entities may correspond to the users designated by the customer who can access the resource slots in the private marketplace.
  • Operation 1304 may be followed by operation 1306.
  • Operation 1306 illustrates determining that the first entity has indicated that the indicated resource slots should be brought online.
  • operation 1306 may be followed by operation 1308—which illustrates allocating the indicated resource slots to the other entities according to the second pricing policy.
  • FIG. 14 illustrates an example operational procedure for allocating computing resources in a provider network.
  • a mechanism for allocating computing resources can be provided by services such as the nser-defmed pool generation service 180 in FIG, 1 .
  • the operational procedure may be implemented in a system comprising one or more computing devices.
  • the one or more computing devices may comprise a plurality of resource slots, each resource slot config red to host a computing instance.
  • operation 1400 begins the operational procedure.
  • Operation 1400 may be followed by operation 1402.
  • Operation 1402 illustrates maintaining a plurality of resonrce slots allocated to a plurality of entities according to a first pricing policy,
  • Operation 1402 may be followed by operation 1404, Operation 1404 illustrates receiving a first indication that one or more of the resonrce slots associated with a first entity of the plurality of entities is associated with a second pricing policy and accessible to a grouping of other entities.
  • Operation 1404 may be followed by operation 1406.
  • Operation 1406 illustrates receiving a second indication that one or more of the resource slots associated with a second entity of the plurality of entities is associated with the second pricing policy and accessible to die- grouping of other entities.
  • Operation 1406 may be followed by operation 1408, Operation 1408 illustrates determining that the or more of the resource siots associated with the first entity and one or more of the resource slots associated with the second entity should be combined and brought online. If the resource slots should be brought online, then operation 1408 may be followed by operation 1410— which illustrates combining the or more of the resource slots associated with the first entity and one or more of the resource slots associated with the second entity and allowing the grouping of other entitles to bid for the combined resource slots according to the second pricing policy.
  • FIG. 15 illustrates an example operational procedure for allocating computing resources in a provider network
  • a mechanism for creating a user-defined pool can be provided by services such as the user-defined pool generation service 180 in FIG. 1 .
  • the operational procedure may be implemented in a system comprising one or more computing devices.
  • the one or more computing devices may comprise a plurality of resource slots, each resource slot configured to host a computing instance.
  • operation 1500 begins the operational procedure, Operation 1500 may be followed by operation 1502.
  • Operation 1502 Illustrates associating one or more resource slots with a designated group of users who are allowed to request access to the one or more resource slots according to a user-selected pricing policy.
  • die one or more resource slots may be selected from resource slots associated with an entity according to a provider-selected pricing policy.
  • Operation 1502 may be followed by operation 1504.
  • Operation 1504 illustrates receiving an indication that a request for access to the one or more resource slots has been received that exceeds a computing capacity of the one or more resource slots.
  • Operation 1504 may be followed by operation 1506.
  • Operation 1506 illustrates determining that a policy is stored for allocating excess computing capacity requests for die one or more resource siots.
  • operation 1506 may be followed by operation 1508—which illustrates allocating additional computing capacity to allow fulfillment of the request for access.
  • a system for allocating computing resources in a provider network comprising:
  • the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
  • At least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to:
  • a method for allocating computing resources in a provider network comprising:
  • the user allowing the user to identify one or more of the associated resource slots and identify oilier users allowed to access the one or more of the associated resource slots according to a second set of pricing policies, the second set of pricing policies being designated by the user.
  • a user interface allowing a user to identify one or more resource slots associated with the user and identify other users allowed to access the one or more resource slots associated with the user according to a pricing policy, the pricing policy being designated by the user;
  • non-transitory compiUer-readabie storage medium of clause 23, comprising instructions mat upon execution on one or more computing devices, at least cause determining billing information for allowing the other users to bid for the one or more resource slots associated with the nser.
  • a system for allocating computing resources in a provider network comprising:
  • the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
  • At least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to;
  • 3381359.1 maintain a plurality of resource slots allocated to a plurality of entities according to a first pricing policy
  • a method for allocating computing resources in a provider network comprising:
  • a computing environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, associating one or more resource slots with a first user according to a first set of pricing policies
  • the first user to identify at least one resource slot associated with the first user that can be accessed by a designated set of odier ysers accordiog to a second pricing policy; and allowing the second user to identify at least one resource slot associated with the second user that can be accessed by the designated set of other users according to the second pricing policy.
  • a rton-transitory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions thai upon execution on one or more computing devices, to at least:
  • first user to identify one or more resource slots associated with the first user, the one or more resource slots associated widi the first user being accessible by a grouping of other users according to a pricing policy;
  • a second user to identify one or more resource slots associated with the second user, the one or more resource slots associated with the second user being accessible by the grouping of other users according to the pricing policy;
  • non-transitory computer-readable storage medium of clause 46 further comprising instructions that upon execution on one or more computing devices, at least cause determining billing information for allowing the grouping of other users to bid for the one or more resource slots associated with the first user and one or more resource slots associated with the second user.
  • non-transitory computer-readable storage medium of clause 49 comprising instructions that upon execution on one or more computing devices, at least eatsse determining which of the grouping of other users have bid for the one or more resource slots associated with the first user or one or more resource slots associated with the second user in accordance with the pricing policy and collecting billing information based on the determining.
  • a system for allocadng computing resources in a provider network comprising:
  • the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
  • At least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause t e system to:
  • a method for allocating computing resources in a provider network comprising:
  • a corn puling environment comprising a plurality of competing devices and wherein capacity of each computing device is logically segmented into one or more resource slots, and wherein one or more resource slots are associated with a user according to a first set of pricing policies, allowing the user to identify at least one of the one or more associated resoorce slots and iderstify other users allowed to access the at least one associated resource slot according to a second set of pricing policies;
  • a non-transitory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions that upon execution on one or more computing devices, to at least:
  • a computing environment comprising a plurality of computing devices and wherein capacity of each computing device is logically segmented into one or more resource slots, and wherein one or more resource slots are associated with a user according to a first set of pricing policies, generate a user interface allowing the nser to identify at leas one of the associated resource slots and identify other users allowed to access the at least one associated resource slot according to a second set of pricing policies;
  • non-transitory computer-readable storage medium of clause 67 comprising instructions that upon execution on one or more computing devices, at least cause the compiling environment to determine billing information for allowing the other users to bid for the at least one associated resource slot.
  • non-transitory computer-readable storage medium of clause 67 comprising instructions that upon execution on one or more computing devices, at least cause the computing environment to determine diat a policy is stored for allocating the additional computing capacity for the at least one associated resource slot, wherein the additional computing capacity is allocated in accordance with the policy,
  • 33S13SS thereto can be performed in other sequences that are appropriate, For example, described blocks or states may be performed in an order other than that specifically disclosed, or multiple blocks or states may be combi ed in a single block or state.
  • the exampl blocks or states may be performed In serial, In parallel or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments.
  • the example systems and components described herein may be configured differently than described, For example, elements may be added to, removed from or rearranged compared to the disclosed example embodiments.
  • some or all of the systems and/or modules may be implemented or provided in other ways, such as at least partially irs firmware arsd or hardware, including, but not limited to, one or more application-specific integrated circuits (ASICs), standard integrated circuits, controllers (e.g., by executing appropriate instructions, and including microcontrollers and/or embedded controllers), field-programmable gate arrays (FPGAs), complex programmable logic devices (CPLDs), etc.
  • ASICs application-specific integrated circuits
  • controllers e.g., by executing appropriate instructions, and including microcontrollers and/or embedded controllers
  • FPGAs field-programmable gate arrays
  • CPLDs complex programmable logic devices
  • Some or all of the modules, systems and data structures may also be stored (e.g., as software instructions or structured data) on a computer-readable medium, such as a hard disk, a memory, a network or a portable media article to be read by an appropriate drive or via an appropriate connection.
  • the systems, modules and data structures may also be transmitted as generated data signals (e.g., as part of a carrier wave or other analog or digital propagated signal) on a variety of computer-readable transmission media, including wireless-based and wired/cable-based media, and may take a variety of forms (e.g., as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames).
  • generated data signals e.g., as part of a carrier wave or other analog or digital propagated signal
  • Such computer program products may also take other forms in other embodiments. Accordingly, the present invention may be practiced with other computer system configurations.
  • 33S1359.1 any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or steps are included or are to be performed Irs any particular embodiment.
  • the terms "comprising,” “including,” “having” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations and so forth.
  • the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when nsed, for example, to connect a list of elements, the term “or” means one, some or all of the elements in the list.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

One or more resource slots, are allocated to a customer according to a first set of pricing policies. The customer is allowed to identify at least one of the resource slots and identify other users allowed to access the identified resource slots according to a second pricing policy, the second pricing policy being designated by the customer.

Description

USER-DEFINED POOLS
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims the benefit of U.S. Patent Application No, 13/855,449, filed April 2, 2013; L S. Patent Application No. 13/855,498, filed April 2, 2013; and U.S. Patent Application No. 13/855,518, filed April 2, 2013, the disclosures of which are incorporated herein by reference in their entireties, .
BACKGROUND
[0002] A data center is a facility that ho ises computer systems and various networking, storage and other related components. Data centers may, for example, provide computing services to businesses and individuals as a remote computing service or provide "software as a service" (e.g., cloud computing), To facilitate utilization of data center resources, visualization technologies may allow a single physical computing machine to host one or more instances of virtual machines that appear and operate as independent computer machines to a connected computer user. With virtuali3?.ations the single physical computing device can create, maintain or delete virtual machines in a dynamic manner.
Some visualization technologies are capable of providing virtual resources that span two or more physical resources, such as a single virtual machine with multiple virtual processors that span multiple distinct physical computing systems. As another example, virtual ization technologies may allow data storage hardware to be shared among multiple users by providing each user with a virtualized data store that may be distributed across multiple data storage devices, with each such virtualized data store acting as a distinct logical data store that provides users with the illusion that they are the sole operators and administrators of the data storage resource.
[Θ0Ο4] In many environments, operators of data centers that implement different types of virtualized computing, storage and/or other network-accessible resources may allow customers to reserve or purchase access to resources in various resource acquisition modes. The computing resource provider may provide facilities for customers to select and launch the desired computing resources, deploy application components to the computing resources and maintain an application executing in the environment. In addition, the computing resource provider may provide further facilities for the customer to quickly and easily scale up or scale down the numbers and types of resources allocated to the application, either manually or through automatic scaling, as demand for or capacity requirements of the application change. The compisting resources provided by the computing resource provider may be made available in discrete units, which ma be referred to as instances. An instance may be run on directly ors a physical server hardware platform, within a virtual machine or some combinaiiors of the two. Various types and configurations of instances may be made available, including different sizes of resources executing different operating systems (OS) and/or hypervisors and with various installed software applications, runtimes and the like.
BRIEF DESCRIPTION OF DRAWINGS
[00Θ5] Throughout the drawings, reference numbers may be reused to indicate correspondence between referenced elements, The drawings are provided to illustrate example embodiments described herein and are not intended to limit the scope of die disclosure:
[0006] FIG. ! is a diagram illustrating a mechanism for pooling instances m accordance with the present disclosure;
§§§7] FIG. 2 is a diagram illustrating an example computing system thai may be used in some embodiments;
0008] FIG. 3 is a diagram illustrating an example computing system that may be used in some embodiments;
[0009] FIG, 4 is a diagram illustrating a system for pooling instances in accordance with the present disclosure;
[0010] FIG. 5 is a diagram illustrating a mechanism for pooling instances in accordance with the present disclosure;
[0011 ] FIG. 6 is a diagram illustrating a system for pooling instances in accordance with the present disclosure;
[01112] FIG. 7 is a diagram iliissiradng a system for pooling instances in accordance with the present disclosure;
[ΘΘ13] FIG. 8 is a diagram illustrating a system for bursting capacity m accordance with the present disclosure;
[0014] FIG. 9 is a diagram illustrating a system for pooling instances in accordance with the present disclosure;
[0015] FIG. 10 is a diagram illustrating an example user interface in accordance with the present disclosure;
- 2 -
33813SS.i [0016] FIG. 1 l is a diagram illustrating an e ample user interface in accordance with the present d sclos ire;
[0017] FIG. 12 is a diagram illustrating an example data record in accordance with the present disclosure;
[OOii] FIG. 13 is a flowchart depicting an example procedure for pooling instances in accordance with the present disclosure;
[0019] FIG. 14 is a flowchart depicting an example procedure for pooling instances in accordance with She present disclosure; and
[§§20] FIG. 15 is a flowchart depicting an example procedure for pooling instances in accordance widi die present disclosure.
DETAILED DESCRIPTION
[0021] A provider network such as a network implemented across one or more data centers may offer computing reso rces such as reserved instances and spot instances. A reserved instance may provide a customer with the ability to reserve a number of a specific type and configuration of an instance for a fixed term, such as one year or three years. A spot instance may refer to an allocation of an instance using a spot-price policy, where a c stomer may specify the maximum price per unit of time that the easterner is willing to pay to ran the instance. If the customer's maximum price exceeds a dynamic spot price determined at least in par t by supply and demand, then the instance may be run for the customer. Other types of instances may be offered by the provider network.
[ΘΘ22] In various embodiments described further in this disclosure, customers may be provided with the ability to create a private marketplace that operates to offer a customer-defined set of the customer's instances to a selected group of users according to a bidding or pricing policy that, in some cases, may be similar to a spot instance policy. For example, an organization such as a university may have a set of reserved instances thai are offered via a private marketplace that allows users to bid for the reserved instances. In this example, the university may offer the customer-defined set of instances to departments within the university. Individuals or computers within the departments can bid intemaiiy for the reserved instances. In one example, the departments can bid a price or use a defined set of "currency" or bidding credits. In addition to the currency or bidding credits, the university may also be abie to customize aspects such as the minimum and maximum prices, the bidding pricing algorithm, interruption cycles and other parameters that may be applicable to resource types, such as spot instances. The
- 3 -
3S i 359.1 university may also be able to select other types of instances for the private marketplace, such as allocated spot instances and on-demand instances (further described below), By providing die ability to create a private marketplace, customers cars more efficiently distribute its computing capacity to Its interna! users. This can decrease costs for the customer who may need less reserved capacity when the capacity is distributed in this manrser, and the provider network can increase utilization of its spare capacity. Additional embodiments of a private marketplace are further described below, Irs various embodiments described herein, the private marketplace may be referred to as a private marketplace, limited marketplace, user-defined pool, user-defined market, private spot market or user-defined spot market.
[SS23] FIG, 1 is a diagram illustrating a system 100 including a mec a ism for providing user-defmed pools in accordance with the present disclosure. In FIG, I , system 100 may include a reserved virtual machine instance 1 10, an on-demand virtual machine instance 1 15 and a spot virtual machine instance 120 that may execute, for example, ors one or more server computers 130, 135 and 140, respectively. It will be appreciated that some embodiments may involve additional virtual machine instances of various types that may be instantiated on additional server computers.
[0024] FIG, 1 also illustrates a public network 150 that may include one or more compnters such as computers 160 and 170. According to one embodiment, instances 1 10, 1 15 and 120 may be configured to provide computing services to a computer user (not shown) of public network 150 via gateway 190 and computers 160 and 170. For example, reserved virtual machine instance 1 10 may provide a set of remote access enterprise applications to a group of users who may, for example, be employees of a university or other educational institution.
[0025] A user at computer 160 or 170 may send a request to a iBser-defined pool generation service 180 for creation of a user-defined pool or private marketplace. In some embodiments, server 130 or 140 may send the request on behalf of a user, on behalf of itself or on behalf of other servers. In response to the request for the instance, user-defined pool generation service 180 may log the request and periodically provide updates as to the status of the request. The user-defined pool generation service 180 may communicate with other services to facilitate creation of the requested private marketplace. The user-defined pool generation service 180 may, for example, determine what instances are associated with the user and provide an interface for facilitating selection of the user's instances, selection of who may request or bid for the selected instances, and selection of a pricing or bidding policy. The user-defmed pool
3361353.1 generation service 180 may further provide notifications to the user when the private
marketplace goes online.
[6026] Various aspects of the disclosure are now described with regard to certain examples and embodiments, which are intended to illustrate bat not to limit the disclosure. It should be appreciated that the subject matter presented herein may be implemented as a computer process, a computer-controlled apparatus or a computing system or an article of manufacture, sneh as a computer-readable storage medium. While the subject matter described herein is presented in the general context of program modules that execute on one or more computing devices, those skilled in the art will recognize that other implementations may be performed in combination with other types of program modules. Generally, program modules include routines, programs, components, data structures and other types of structures that perform particular tasks or implement particular abstract data types.
[ΘΘ27] Those skilled in the art will also appreciate that the subject matter described herein may be practiced on or in conjunction with other computer system configurations beyond those described herein, including multiprocessor systems, microprocessor-based or
programmable consumer electronics, minicomputers, mainframe computers, handheld computers, personal digital assistants, e-readers, cellular telephone devices, special-purposed hardware devices, network appliances and the like. The embodiments described herein may also be practiced in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
[002SJ In the following detailed description, references are made to the accompanying drawings thai form a part hereof, and that show, by way of illustration, specific embodiments or examples, The drawings herein are not drawn to scale. Like numerals represent like elements throughout the several figures.
[§029] Networks established by or on behalf of an entity such as a company or organization to provide one or more services (such as various types of cloud-based computing or storage) accessible via the Internet and/or other networks to a distributed set of clients may be termed provider networks. Such a provider network may include one or more data centers hosting various resource pools, such as collections of physical and/or virtualized computer servers, storage devices, networking equipment and the like, that may be used to implement and distribute the infrastructure and services offered by the provider network. The resources may in
- 5 -
33813S9.1 some embodiments be offered to clients in units called "instances," such as virtual or physical compute instances or storage instances. A virtual computing instance may, for example, comprise one or more servers with a specified computational capacity (which may be specified by indicating the type and number of CPUs, the main memory size and so on) and a specified software stack (e.g., a particular version of an operating system, which may in turn run on top of a hypervisor),
[©©30] A number of different types of computing devices may be used singly or in combination to implement the resources of the provider network in different embodiments, including general purpose or special purpose composer servers, storage devices, network devices and the like. In some embodiments a client or user may be provided direct access to a resource instance, e.g., by giving a user an administrator login and password. In other embodiments, the provider network operator may allow clients to specify execution requirements for specified client applications and schedule execution of the applications on behalf of the client on execution platforms (such as application server instances, Java™ virtual machines (JVMs), general purpose or special-purpose operating systems, platforms that support various interpreted or compiled programming languages such as Ruby, Perl, Python, C, C++ and the like or high-performance computing platforms) suitable for the applications. This may be done without, for example, requiring the client to access an instance or an execution platform directly, A given execution platform may utilize one or more resource instances in some implementations; in other implementations, multiple execution platforms may be mapped to a single resource instance.
[0031] FIG. 2 illustrates an example computing environment in which the embodiments described herein may be implemented. FIG. 2 is a diagram schematically illustrating an example of a data center 210 that can provide computing resources to users 2Q0a and 200b (which may be referred herein singularly as "a user 200" or in the plural as "the users 200") via user computers 202a and 202b (which may be referred herein singularly as "a computer 202" or in the plural as "the computers 202") via a communications network 230. Data center 210 may be configured to provide computing resources for executing applications on a permanent or an as-needed basis. The computing resources provided by data center 10 may include various types of resources, such as data processing resources, data storage resources, data communication resources and the like. Each type of competing resource may be general-purpose or may be available in a number of specific configurations. For example, data processing resources may be available as virtual machine instances. The instances may he configured to execute applications, including Web
33g1359.1 servers, application servers, media servers, database servers arid the like. Data storage resources may include file storage devices, block storage devices and the like,
[0032] Each type or configuration of computing resource may be available in different sizes, such as large resources, consisting of many processors, large amounts of memory and/or large storage capacity, and small resources consisting of fewer processors, smaller amounts of memory and/or smaller storage capacity. Customers may choose to allocate a number of small processing resources as Web servers and/or one large processing resource as a database server, for example.
[0033] Data center 210 may include servers 216a and 21 b (which may be referred herein singularly as "a server 216" or in the plural as "the servers 216") that provide computing resources available as virtual machine instances 218a and 218b (which may be referred herein singularly as "a virtual machine instance 218" or in the plural as "the virtual machine instances 218"). The virtual machine instances 218 may be configured to execute applications, including Web servers, application servers, media servers, database servers and the like. Other resources that may be provided include data storage resources {not shown) and may include file storage devices, block storage devices and the like.
[S#34] The availability of visualization technologies for computing hardware has provided benefits for providing large scale computing resources for customers and allowing computing resources to be efficiently and securely shared between multiple customers. For example, virtuaiization technologies such as those provided by VMware or other virtualization systems may allow a physical computing device to be shared among multiple users by providing each user with one or more virtual machine instances hosted by the physical computing device, A virtual machine instance may be a software emulation of a particular physical computing system that acts as a distinct logical computing system. Such a virtual machine instance provides isolation among multiple operating systems sharing a given physical computing resource, Furthermore, some virtual ization technologies may provide virtual resources that span one or more physical resources, such as a single virtual machine instance with multiple virtual processors that spans multiple distinct physical computing systems.
[0035] Referring to FIG, 2, communications network 230 may, for example, be a publicly accessible network of linked networks arid possibly operated by various distinct parties, such as the Internet. In other embodiments, communications network 230 may be a private network, such as, for example, a corporate or university network that is wholly or partially
„ „
33S1359.1 inaccessible to no s-privileged users, to still other embodiments, communications network 230 may include one or more private networks with access to and/or from the Internet.
[0036] Communication network 230 may provide access to computers 202. Computers 202 may be computers utilized by customers 200 or other customers of data center 210. For instance, user computer 202a or 202b may be a server, a desktop or laptop personal computer, a tablet computer, a wireless telephone, a personal digital assistant (PDA), ars e-book reader, a game console, a set-top box or any other competing device capable of accessing data center 21& User computer 202a or 202b may connect directly to the Internet (e.g., via a cable modem or a Digital Subscriber Line (DSL)). Although only two user computers 202a and 202b are depicted, it should be appreciated that there niay be multiple user computers,
[0037] Computers 202 may also be utilized to configure aspects of the computing resources provided by data center 210. In this regard, data center 210 might provide a Web interface through which aspects of t 'is operation may be configured through the use of a Web browser application program executing on user eomptster 202. Alternatively, a stand-alone application program executing on user computer 202 might access an application programming interface (API) exposed by data center 210 for performing the configuration operations. Other mechanisms for configuring the operation of the data center 210, including deploying updates to an application, might also be utilized,
[0038] Servers 216a and 216b shown m FIG. 2 may be standard servers configured appropriately for providing the computing resources described above and may provide computing resources for executing one or more applications. In one embodiment, the computing resources may be virtual machine instances 218. In the example of virtual machine instances, each of the servers 216 may be configured to execute an instance manager 220a or 220b (which may be referred herein singularly as "an instance manager 220" or in the plural as "the instance managers 220") capable of executing the virtual machine instances. The instance managers 220 may be a virtual machine monitor (VMM) or another type of program configured to enable the execution of virtual machine instances 218 on servers 216, for example. As discussed above, each of the virtual machine instances 218 may be configured to execute all or a portion of an application.
[ΘΘ39] It should be appreciated that although the embodiments disclosed above discuss the context of virtual machine instances, other types of implementations can be utilized with the concepts arsd technologies disclosed herein. For example, the embodiments disclosed hereire might also be utilized with computing systems that do not utilize virtual machine instances.
- 8
338t359.1 [§©4Θ] In the example data center 210 shown in FIG, 2, a rooter 214 may be utilized to interconnect the servers 216a and 216b. Router 214 may also be corrected to gateway 240, which is connected to communications network 230. Rooter 214 may manage communications within networks in data center 210, for example, by forwarding packets or other data communications as appropriate based on characteristics of such communications (e.g., header information including source arid/or destination addresses, protocol identifiers, etc.) and/or the characteristics of the private network (e.g., routes based on network topology, etc.). It will be appreciated that, for the sake of simplicity, various aspects of the computing systems and other devices in this example are illustrated without showing certain conventional details. Additional computing systems and other devices may be interconnected in odier embodiments and may be interconnected in different ways.
[01)41 j It should be appreciated that the network topology illustrated in FIG. 2 has been greatly simplified and that many more networks arid networking devices may be utilised to interconnect the various computing systems disclosed herein. These network topologies and devices should be apparent to those skilled in the art.
[0042] It should also be appreciated that data center 210 described in FIG, 2 is merely illustrative and that other implementations might he utilized. Additionally, it should be appreciated that the functionality disclosed herein might be implemented in software, hardware or a combination of software and hardware. Other implementations should be apparent to those skilled in the art. It should also be appreciated that a server, gateway or other computing device may comprise any combination of hardware or software that can interact and perform the described types of functionality, including without limitation desktop or other computers, database servers, network storage devices and other network devices, PDAs, tablets, cellphones, wireless phones, pagers, electronic organizers, Internet appliances, television-based systems (e.g., using set top boxes and/or personal/digital video recorders) and various other consumer products that include appropriate communication capabilities, In addition, the functionality provided by the Illustrated modules may in some embodiments be combined in fewer modules or distributed in additional modules. Similarly, in some embodiments the functionality of some of the illustrated modules may not be provided and/or other additional functionality may be available.
[ΘΘ43] The capacity of the purchased computing resources provided by data center 210 can be scaled in response to demand. In this regard, scaling refers to the process of instantiating (which ntay also be referred to herein as "launching" or "creating") or terminating (which may
- 9 .
338135S.1 also be referred to herein as "de-sealing") instances of computing resources in response to demand. In this manner, the capacity of resources purchased by a customer of data center 210 can be scaled on-demand.
[111144] Auto scaling is one mechanism for scaling computing resources in response to increases or lulls in demand for the resources. Auto sealing allows customers of data center 210 to configure data center 210 to scale their purchased computing resources according to conditions defined by the customer. For instance, rales may be defined for scaling up capacity in a particular manner in response to the occurrence of specified conditions, such as a spike in demand. Similarly, rules might also be defined to scale down capacity in a particular manner in response to the occurrence of other conditions, such as a lull in demand. The mechanisms disclosed herein for launching virtual machine instances might be utilised when instances are marmally launched by a customer or when instances are launched by an auto scaling component in data center 210.
[0Q4S] Data center 210 may also be configured with a deployment component to assist customers in the deployment of new instances of computing resources. The deployment component may receive a configuration from a customer that includes data describing how new instances should be configured. For example, the configuration might specify one or more applications or software components that should be installed in new instances, provide scripts and/or other types of code to be executed in new instances, provide cache warming logic specifying how an application cache should be prepared and other types of information. The deployment component utilizes the customer-provided configuration and cache warming logic to launch, configure and prime new instances of computing resources,
[1)046] In at least some embodiments, a server that implements a portion or all of one or more of the technologies described herein, including die techniques to implement the functionality of a pool generation service 180 may include a general-purpose computer system that includes or is configured to access one or more computer-accessible media, FIG. 3 illustrates such a general purpose computing device 300. In the illustrated embodiment, computing device 300 includes one or more processors 310a, 310b and/or 31 On (which may be referred herein singularly as "a processor 310" or in the pinral as "the processors 310") coapled to a system memory 320 via an input output (I/O) interface 330. Computing device 300 further includes a network interface 340 coupled to I O interface 330.
[ΘΘ47] in various embodiments, computing device 300 may be a uniprocessor system including one processor 310 or a multiprocessor system including several processors 310 (e.g.,
- 10 -
338135S.1 two, four, eight or another suitable number). Processors 310 may be any suitable processors capable of executing instructions. For example, irt various embodiments, processors 310 ma be general-purpose or embedded processors implementing any of a variety of instruction set architectures (ISAs), such as the xS6, PowerPC, SPARC or MIPS ISAs or any other suitable ISA. In multiprocessor systems, each of processors 310 may commonly, but not necessarily, implement the same ISA.
[0048] System memory 320 may be configured to store instructions and data accessible by processors) 310. In various embodiments, system memory 320 may be implemented using any suitable memory technology, such as static random access memory (SRAM), synchronous dynamic RAM (SDRAM), nonvolatiie/Flash™-type memory or any other type of memory, in the illustrated embodiment, program instructions and data implementing one or more desired functions, such as those methods, techniques and data described above, are shown stored within system memory 320 as code 325 and data 326,
[0049] In one embodiment, I/O interface 330 may be configured to coordinate I O traffic between processor 310, system memory 320 and any peripheral devices in the device, including network interface 340 or other peripheral interfaces, in some embodiments, I/O interface 330 may perform any necessary protocol, timing or other data transformations to convert data signals from one component (e.g., system memory 320) into a format suitable for use by another component (e.g., processor 310). In some embodiments, I O interface 330 may inclnde support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component. Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard, for example. In some embodiments, the function of I O interface 330 may be split into two or more separate components, such as a north bridge and a south bridge, for example. Also, in some embodiments some or all of the functionality of I O interface 330, such as an interface to system memory 320, may be incorporated directly into processor 310.
[OOSQj Network interface 340 may be configured to allow data to be exchanged between computing device 300 and other device or devices 360 attached to a network or networks 350, such as other computer systems or devices as illustrated in FIGS. 1 through 3, for example. In various embodiments, network interface 340 may support communication via any suitable wired or wireless general data networks, such as types of Ethernet networks, for example. Additionally, network interface 340 may support communication via
teiecontmunications/telephony networks such as analog voice networks or digital fiber
3381359 J communications networks, via storage area networks seen as Fibre Channel SANs or via any other suitable type of network and/or protocol.
[QQS1 j 1st some embodiments, system memory 320 may be one embodiment of a computer-accessible medium configured to store program instructions and data as described above for FIGS. 1 and 2 for implementing embodiments of the corresponding methods and apparatus. However, in other embodiments, program instructions and/or data may be received, sent or stored upon different types of computer-accessible media. Generally speaking, a computer-accessible medium may include non-transitory storage media or memory media such as magnetic or optical media, e.g., disk or DVD/CD coupled to computing device 300 via I O interface 330. A non-transitory computer-accessible storage medium may also incltsde any volatile or non-volatile media such as RAM (e.g. SDRAM, DDR SDRAM, RDRAM, SRAM, etc.), ROM, etc., that may be included in some embodiments of computing device 300 as system memory 320 or another type of memory. Further, a computer-accessible medium may include transmission media or signals such as electrical, electromagnetic or digital signals, conveyed via a communication medium such as a network and/or a wireless link, such as may be implemented via network interface 340. Portions or all of multiple competing devices such as those illustrated in FIG. 3 may be used to implement the described functionality in various embodiments; for example, software components running on a variety of different devices and servers may collaborate to provide the functionality. la some embodiments, portions of the described functionality may be implemented using storage devices, network devices or special-purpose computer systems, in addition to or instead of being implemented using general-purpose computer systems. Tbe term "computing device," as used herein, refers to at least all these types of devices and is not limited to these types of devices.
[ΘΘ52] A network set up by an sntky such as a company or a public sector organization to provide one or more services {such as various types of cloud-based computing or storage) accessible via the Internet and or other networks to a distributed set of clients may be termed a provider network. Such a provider network may include numerous data centers hosting various resource pools, such as collections of physical and/or virtualked computer servers, storage devices, networking equipment and the like, needed to implement and distribute the
infrastructure and services offered by the provider network. The resources may in some embodiments be offered to clients in units called instances, such as virtual or physical computing instances or storage instances. A virtual computing instance may, for example, comprise one or more servers with a specified computational capacity (which may be specified by indicating the
3381358,1 type and somber of CPUs, the main memory size and so on) and a specified software slack (e.g., a particular version of an operating system, which may in turn run on top of a hypervisor).
[Θ053] A number of different types of computing devices may be used singly or in combination to implement the resources of the provider network in different embodiments, including general purpose or special purpose computer servers, storage devices, network devices and the like. In some embodiments a client or user may be provided direct access to a resource instance, e.g., by giving a user an administrator login and password. In other embodiments the provider network operator may allow clients to specify execution requirements for specified client applications and schedule execution of the applications on behalf of the client on execntion platforms (such as application server instances, Java™ virtual machines (JVMs), general purpose or special-purpose operating systems, platforms that support various interpreted or compiled programming languages such as Ruby, Perl, Python, C, C-H- and the like, or high-performance computing platforms) suitable for the applications, without, for example, requiring the client to access an instance or an execution platform directly. A given execntion platform may utilize one or more resource instances in some implementations; in other implementations multiple execution platforms may be mapped to a single resource Instance,
[CICI54] Irs many environments, operators of provider networks that implement different types of virtualized computing, storage and or other network-accessible functionality may allow customers to reserve or purchase access to resources in various resource acquisition modes. The computing resource provider may provide facilities for customers to select and launch the desired computing resources, deploy application components to the computing resources and maintain an application executing in the environment. In addition, the computing resource provider may provide further facilities for the customer to quickly and easily scale up or scale down the numbers and types of resources allocated to the applicadon, either manually or through automatic scaling, as demand for or capacity requirements of the application change. The computing resources provided by the computing resource provider may be made available in discrete units, which may be referred to as instances. An instance may represent a physical server hardware platform, a virtual machine instance executing on a server or some combination of the two. Various types and configurations of instances may be made available, including different sises of resources executing different operating systems (OS) and/or hypervisors, and with various installed software applications, runtimes and the like, instances may further be available in speci ic availability zones, representing a data center or other geographic location of e underlying computing hardware, for example.
- 13 -
3381359.1 [I SSJ In some embodiments the provider network may be organized into a plurality of geographical regions, and each region may include one or more availability zones. An availability zone (which may also be referred to as an availability container) in turn may comprise one or more distinct locations or data centers, configured in such a way that the reso rces in a given availability zone may be isolated or insulated from failures in od¾er availability zones. That is, a failure in one availability zone may not be expected to result in a failure in any other availability zone. Thus, the availability profile of a resource instance is intended to be independent of the availability profile of a resource instance in a different availability zone. Clients may be able to protect their applications from failures at a single location by launching multiple application instances in respective availability zones. At the same time, in some implementations, inexpensive and low latency network connectivity may be provided between resource instances that reside within the same geographical region (and network transmissions between resources of the same availability zom may be even faster).
[0056] The provider network may make instances available "on-demand," allowing a customer to select a number of instances of a specific type and configuration (e.g. size, platform, tenancy, availability one and the like) and quickly launch the instances for deployment. On- demand instances may further be added or removed as needed, either manually or automatically through auto scaling, as demand for or capacity requirements changes over time. The easterner may incur ongoing usage costs related to their on-demand instances, based on the number of honrs of operation and/or the actual resources utilized, for example,
[0057] The computing resource provider may also make reserved instances available to the customer. Reserved instances may provide the customer with the ability to reserve a number of a specific type and configuration of Instances for a fixed term, such as one year or three years, for a low, upfront cost in exchange for reduced hourly or other usage costs, for example, if and when the instances are launched. This may allow the customer to defer costs related to scaling up the deployed application in response to increase in demand, while ensnring that the right resources will be available when needed. While reserved instances provide customers with reliable, stand-by capacity for scaling of their application, pnrchasing reserved instances may also lock the customer into a specific number, type and/or configuration of computing resource in a specific availability zone for a longer period than desired, If the technical architecture or needs of the application change, the customer may not be able to realize a return on their investment in the reserved instances.
14 -
3381359.1 [WSSJ Operators of such provider networks may in some instances implement a flexible set of resource reservation, control and access interfaces for their clients. For example, a resource manager of the provider network may implement a programmatic resource reservation interface (e.g., via a Web site or a set of Web pages) that allows clients to learn about, select, purchase access to and or reserve resource instances. In some embodiments discussed below where an entity such as a resource manager or a pricing optimizer is described as implementing one or more programmatic interfaces such as a Web page or an API, an interface manager subcomponent of that entity may be responsible for the interface-related functionality. In ma embodiments equivalent interface-related functionality may be implemented by a separate or standalone interface manager, external to the resource manager and the pricing optimizer. Such an interface may include capabilities to allow browsing of a resource catalog, provide details and specifications of the different types or sizes of resotrrees supported, the different reservation types or modes supported, pricing models and so on.
[00S9] The provider network may support several different purchasing modes (which may also be referred to herein as reservation modes) corresponding to some of the instance types described above. For example, the provider network may support long-term reservations, o - demand resource allocations or spot-price-based resource allocations. Using the long-term reservation mode, a client may make a low, one-time, upfront payment for a resource instance, reserve it for a specified duration, such as a one- or three-year term, and pay a low hourly rate for the instance; the client would be assured of having the reserved instance available for the term of the reservation. Using the on-demand mode, a client could pay for capacity by the hour (or some appropriate time unit), without any long-term commitments or upfront payments. In the spot- price mode, a client could specify the maximum priee~per~tmit time that it is willing to pay for a particular type of resource, and if the client's maximum price exceeded a dynamic spot price determined at least in part by supply and demand, then that type of resource would be provided to the client. In some embodiments, dynamically resizabl pools of resource instances may be set aside for the different reservation types or modes - e.g., long-term reserved instances may be allocated from one pool, on-demand instances from another and so on. During periods when the supply of the requested resource type exceeded the demand, the spot price may become significantly lower than the price for the on-demand mode, In some implementations, if the spot price increases beyond the maximum bid specified by a client, a resource allocation may be interrupted - i.e.. a resource instance that was previously allocated to the client may be reclaimed by the resource manager and may be allocated to some other client that is willing to pay a higher
- 13 -
33813S9.1 price. Other purchasing modes or combinations of modes may be implemented by the resource manager in some embodiments.
[ΘΘ60] Utilizing the technologies described herein, a provider network may also Implement a service to allow for creation of a private marketplace. The service may provide a mechanism for customers who would like to offer their reserved instances and other types of instances to users associated with the customer or otherwise designated by the customer, For example, the customer's interna! users within their organizations may want to obtain shorter- term reserved instances than those generally provided by the computing resource provider, or only need access to an instance for a limited duration. A customer may select the remainder of the term of their reserved instances, a number of unused reserved instances and allocated spot instances, or a portion thereof, and offer the selected instances to the customer's internal users m the private marketplace, allowing the internal users to "purchase," "bid for" or otherwise request access to instances via the private marketplace. Customers may thus be provided with a method of more efficiently utilising its acquired instances by implementing such a limited private marketplace for providing the instances to those internal users who most need or are willing to pay the most "currency" for the instances, thus more efficiently distributing me customer's allocated capacity.
[0061] FIG. 4 illustrates an example system environment for providing instances, according to at least some embodiments. The system 400 may include a provider network 410 comprising a plurality of resource instances 430 (which may be referred herein singularly as "a resource instance 430" or in the plural as "the resource instances 430"), such as instances 430A, 43GB, 43GD, 430E, 430G and 430H in one availability zone 420A and instances 430J, 430K, 430M, 430N, 430P, 430Q in a different availability zone 420B. The various resource instances 430 in the availability zones 420A and 420B (which may be referred herein singularly as "an availability zone 420" or in the p!nra! as "the availability zones 420") may be reserved and/or allocated for u e by clients (or potential clients) such as client 448A and 448B (which may be referred herein singularly as "a client 448" or in the plural as "the clients 448"). In the illustrated embodiment, system 400 includes a resource manager 480 and an interface manager 482. As rtoted earlier, in some embodiments the functionality of the interface manager 482 may be implemented by a subcomponent of the resource manager 480.
[0062] The interface manager 482 may in some embodiments implement one or more programmatic interfaces allowing clients 448 to search for, browse, reserve and acquire instances 430 to obtain various types of services, e.g., to ran and/or access various applications. In the
- 16 -
33813SS.1 illustrated embodiment, at a given point in time, some or all of the instances 430 may be assigned to instance pools, such as reserved instance pools 421 A or 42 IB, on-demand instance pools 423A or 423B, available instance pool 425 or other pools such as other pool 427.
[SS63J In some embodiments a given pool such as available instance pool 425 may itself contain its own sub-pools, e.g., based on the modes of instance reservation and allocation supported. Each poo? (or sob-pool) may have an associated pricing policy for its instances, as well as other properties such as tntemiptibility settings for the instances that happen to be assigned to the pool or sab-pool. The pools may represent logical collections or aggregations, so that, for example, the presence of two instances in the same pool or sub-pool may not necessarily Imply anything aboat the physical location of the hardware used for She two instances. Although the instances 430 illustrated in HG. 4 are shown as belonging to availability zones 420, in other embodiments the provider network 410 may be organised differently, e.g., in some embodiments availability zones 420 may not be implemented, Availability zones 420 may be grouped into geographic regions (not shown in HG, 4} in some embodiments. Instance pools may be implemented within availability E n in some im lementations (e.g., each availability zone may have Its own reserved instance pool); while In other implementations an instance pool or sub- pool may span mnltiple availability zones.
[0064] In some embodiments, such as in FIG. 5, a data center 500 may be viewed as a collection of shared computing resources and/or shared infrastructure. For example, as shown in FIG. 5, a data center 500 may include virtual machine slots 504, physical hosts 502, power supplies 506, routers 508, isolation zones 510 and geographical locations 512. A virtual machine slot 504 may be referred to as a slot or as a resource slot, A physical host 502 may be shared by mnltiple virtual machine slots 504, each slot 504 being capable of hosting a virtual machine, such as a guest domain. Multiple physical hosts 502 may share a power supply 506, such as a power supply 506 provided on a server rack. A router 508 may service multiple physical hosts 502 across several power supplies 506 to route network traffic. An isolation zone 510 may service many ranters 508; the isolation zone 510 being a group of computing resources that may be serviced by redundant resources such as a backup generator. Multiple Isolation zones 510 may reside at a geographical location 512, such as a data center 500. A provisioning server 514 may include a memory and processor configured with instructions to analyze user data and rank available implementation resources using determined roles and shared resources/infrastructure in the calculation. The provisioning server(s) 514 may also manage workflows for provisioning
~ 17 -
3381 ass, 5 and de-provisioning computing resources as well as detecting health and/or failure of computing resources.
[ΘΘ65] A provisioning server 514 may determine a placement of the resource within the data center. In some embodiments, this placement may be based at least in part on available computing resources and/or relationships between computing resources. In one embodiment, the distance between resources may be measured by the degree of shared resources. This distance may be used in the ranking of resources according to role. For example, a first system on a host 502 that shares a router 508 with a second system may be more proximate to the second system than to a third system only sharing an isolation zone 510, Depending on an application, it may be desirable to keep the distance low to increase throughput or high to increase durability. In another embodiment, the distance may be defined in terms of unshared resources. For example, two slots 504 sharing a router 508 may have a distance of a physical host 502 and a power supply 506. Each difference in resources may be weighted differently in a distance calculation.
[§§66] A placement calculation may also be used when selecting a prepared resource to transfer to a client account. In one embodiment, a cheat requests a virtual machine having an operating system. The provisioning server 514 may determine that the request may be satisfied with a staged volume in a slot 504, A placement decision may be made that determines which infrastructure may be desirable to share and which infrastructure is undesirable to share. Using the placement decision, a staged volume that satisfies at least some of the placement decision characteristics may be selected from a pool of available resources. For example, a pool of staged volumes may be used in a cluster computing setup. When a new volume is requested, a provisioning server 514 may determine that a placement near other existing volumes is desirable for latency concerns, Therefore, the decision may find that sharing a roister 508 is desirable, but sharing a supply 506 and physical host 502 is undesirable. A volume in the pool may then be selected that matches these attributes and placed preferably on a same router 508 as the other volumes, but not the same physical host 502 or power supply 506, In other examples of placement decisions, such as those relating to a database shard, sharing of infrastructure may be less desirable and a volume may be selected that has less infrastructure in common with other related volumes.
[0067] Operators of provider networks sueh as those described above may, in some embodiments, provide an infrastructure, such as user-defined pool generation service 180 depicted in FIG. I , that provides customers with the ability to request and create user-defined private marketplaces, In one embodiment, a customer may be an entity, such as an educational
- I S -
3381369.1 institution, that has purchased a number of resources, such as reserved instances and on-demand instances. The customer may select a subset of the customer's reserved and on-demand instances and create an internal marketplace in which departments and/or users within the educational institution may bid internally for the reserved instances and on-demand instances. The bidding process may be similar to the process for bidding for a spot instance in a spot market as described above, in some embodiments, the customer may seiect other bidding processes or allow for bidding using other forms of payment such as with allotted credits. In various embodiments, aspects may be customizable— such as the currency, the minirnurn/ naxinjuni prices or price levels, the bidding/pricing algorithm, interruption cycles and other parameters.
[ΘΘ68] Referring to FIG. 6, illustrated is art example of users allocating resources for a private marketplace in accordance with this disclosure. User A may have associated reserved instances 600, on-demand instances 605 and spot instances 610. User A may allocate instances
A, B, C and D of user A's reserved instances 600 for user-defined pool 620. User A may also allocate instances 1 and 2 of the spot instances 600 for the user-defined pool 620. Instances A,
B, C and D of user A's reserved instances 600 may be referred to as a subset of the reserved instances 600, and instances 1 and 2 of the spot instances 600 may be referred to as a subset of the spot instances 600. User B may have associated reserved instances 630 and spot instances 640. User B may allocate instances and L of user B's reserved instances 630 for user-defined pool 650, User B may also allocate instances 8 and 9 of user B's spot instances 640 for the user- defined pool 650. Instances and L of user B's reserved instances 630 may be referred to as a subset of the reserved instances 630, and 8 and 9 of user B's spot instances 640 may be referred to as a subset of the spot instances 640, in some embodiments, user A or user B can remove instances that have been allocated to a user-defined pool.
As discussed above, an instance may be referred to as a resource slot, a virtual machine slot or a slot, A user-defined pool or private marketplace may be provided as an additional service on tap of a customer's resource slots, such as the user-defined pool generation service 180 of FIG. 1. In one embodiment, the nser-defined pool generation service 180 can be embodied in software that can be installed on a network of computers, such as in a private data center.
[007Q] A user may select a number of instances of each instance type that the user has obtained and has beers allocated by the provider network. In one embodiment, the user may also be able to provide or select a pricing algorithm, for example, the user may be able to upload one or more algorithms or formulas using a standardized format, such as XML. In one embodiment,
- 19 -
3381359.1 the pool generation service may provide one or more templates for an algorithm OF formula. The pool generation service may also provide additional templates or predetermined selections for parameters siich as the number and type of instances, configuring the selected instances, making selections for enforcing fairness between bidders and so on,
[0071. J A number of methods cars be used for allowing users to bid for instances in the private marketplace. In one embodiment, the nser can be provided the option of selecting an English auction method in which ascending prices are displayed, and the winner is the highest bidder with the price for the instance being the highest bid. In another embodiment, the user may be provided au option of selecting a Dutch auction method in which the price for the instance begins at a high level and is lowered until a user accepts the current price. As noted above, the user can select a maximum price that the user is willing to pay, and if the user's ma imum price exceeds a dynamic price determined at least in part by supply and demand, then the instance may be provided to the user.
[ΘΘ72] In one embodiment, the nser can be provided the option of selecting a currency lo be used for the bidding process. The currency can include units of value that are defined or selected by the customer when the private marketplace is created. While the customer may- select traditional monetary units or values for the i stances such as dollars unit of time, the customer may also select other units such as CPU cycles or network bandwidth, which may reflect value based on different bases of value. In some embodiments, the currency may be used to bid for units of computing capacity such as a resource slot or for other units of computing capacity that may be defined by the user. For example, a bid can include a monetary bid amount and an amount of desired computing capacity such as an amount of computing cycles.
[0073] In one embodiment, the user-defined pool generation service 180 can provide an API for facilitating the selection of parameters for the private marketplace. The API may determine which customer is communicating with the pool generation service and generate a request to create a private marketplace. The user-defined pool generation service 180 may assign an ID to the request and track the ID of the requested private marketplace during processing of the request.
[0§74] In one embodiment, a customer that is only identified with a single authorized user (e.g., a university customer with one authorized person who can make changes to the university account with the provider network) may allow the single authorized user able to set up a private market. If there are multiple authorized persons, then the pool generation service may require that a single specialized account be identified as being able to set up a private market.
- 20 -
3381359.1 The user-defined poo! generation service 180 may authorise the user with the specialized acco nt based on, for example, credentials presented by the user. The user-defined pool generation service 1 80 can track the private marketplace generation activities for billing purposes. The user-defined pool generation service 180 may further track which of the users who bid on the instances in the private marketplace have bid for arid have been allocated instances so that the customer may track this activity. The user-defined pool generation service 180 may track die usage on a per-user basis, a per-use basis, a per-bid basis or other metering schemes, and provide the information to the customer for billing and tracking purposes.
[007S] In one embodiment, in response to a bid request, the user-defined pool generation service 180 can embed an ID for the bidding user as metadata that can be used to identify the bidding user as the bid request is processed and fulfilled. The metadata can include fields including the user ID, which can be included in the billing records. The user-defined pool generation service 180 can thus track the customer who requested the private marketplace, as well as identify users who have bid for instances in the private marketplace.
[0076] In some embodiments, key-value pairing can be used to track the data or attributes associated with the request for the private marketplace or bids far the resource slots in the private marketplace. The user-defined pool generation service 180 may track linked data records that include a unique identifier for the data as well as the data itself or a pointer to the location of the data. For example, an open-ended data structure may be used to collect the user data such as <user~defined pool ID, user ID, request ID>.
[0077] in some cases, customers may have more than one account with the provider network and thus have multiple pools of allocated resources. For example, a customer may have a first account for a first project and have associated resource slots allocated with the first account. The customer may also have a second account for a second project and have associated resource slots allocated with the second account. In one embodiment, the customer may be provided the ability to select resource slots associated with either the first or second accounts and allocate the selected resource slots for a single private marketplace. Customers may thus be able to mix and match resources from multiple pools of resources into one user-defined pool,
[ΘΘ78] Irs some cases, two or more customers may elect to join resources and reques a single private marketplace that can be accessed by users associated with the two or more customers. Thus organizations and businesses may be able to pool resources among the entities to create the private marketplace. Irs one embodiment, the user-defined pool generation service 180 can link together accounts of two or more customers to create a single user-defined pool.
- 21 -
3385359.1 The user-defined pool generation service 180 may also track usage based on actual usage of the resources and by tracking the users who bid for the resources and their affiliations with the customers. The single user-defined pool ma be updated by a single customer who is authorized to m ke changes to the single user-defined pool. Alternatively, additional customers may be authorized to make changes to the single user-defined pool. Similarly, a single customer may be authorized to make changes to policies associated with the single user-defined pool,
Alternatively, additional customers may be authorized to make changes to policies associated with the single user-defined pool,
In one embodiment, the functionality of th user-defmed pool generation service 180 may be provided via software that can be installed and executed on a customers computing resources. For example, the customer may own and or operate their own computing
infrastructure and configure their computing resources as a plurality of resource slots configured to host computing instances, The pool generation service software may provide interfaces for selecting the customer's resource slots, selecting parameters for a user-selected pool as described above and create the user-selected pool The pool generation service software may further facilitate the requests bids for the resource slots and track usage information for tracking/billing purposes.
[§080] Referring to FIG. 7, illustrated is an example showing entities allocating resources and users for a private marketplace in accordance with this disclosure. Entity A, who may correspond to entity A in Figure 6, may have associated internal users A, B, C, D» E and F. Entity A may also have allocated reserved instances A, B, C and D of entity A's reserved instances in user-defined pool 620. Entity A may also allocate instances 1 and 2 of entity A's spot instances for the user-defined pool 620. Entity B may have associated internal users N, P, R„ S, T and U, Entity B may also allocate instances and L of entity B's reserved instances for user-defined pool 650. User B may also allocate instances 8 and 9 of user B's spot instances for the nser-defined pool 650. Entity A may further authorize its interna! users A, B, C, and D (subset 710) to access its user-defined pool 620. Entity B may further authorize its internal users R, S, and T (subset 720) to access its user-defined pool 650. The authorized internal users may now bid for access to the instances in their respective user-defined pools. Furthermore, entity A and entity B may elect to join resources and request that user-defined pool 620 and user-defined pool 650 be joined into a single user-defined pool. In one embodiment, users A, B, C, and D of entity A and users R, S, and T of entity B may bid for the combined single user-defined pool. [§0S1] Irs some cases, the capacity of the resource slots allocated to a user-defined pool by a customer may be exceeded by die requests for the resource slots generated by the users, For example, a customer may undere stint ate the demand for resource slots and select a number of resource sl ts for the user-defined pool that is insufficient to meet the actual demand. In one embodiment, the provider network may provide an option for the customer to allow for such excess capacity demands to he met using unused capacity. For example, arc option may be provided to fulfill the exceeded capacity using unused capacity that is already allocated to the customer but uot allocated to the user-defined pool. As another example, an option may be provided to fulfill die exceeded capacity using unused capacity provided by the provider network. The provider network may charge a fee for the service. By providing such a capability, instead of rejecting user requests due to insufficient capacity, a customer may be able to continue providing access to the user-defined pool by accessing or "bursting" into additional capacity provided by the service provider or by the customer (using the customer's unused capacity) on an as-needed basis. Such a capability may be useful when peak demand occurs only on an occasional basis, in which case it may be more cost effective for the customer to purchase burst capacity rather than dedicate additional resource slots to the user-defined pool. In some embodiments, the decision as to whether excess capacity will be bnrsted from the provider network or front the customer's non-ailocated capacity can be based on a policy selected by the customer. For example, the customer may specify a maximum price that the customer is willing to pay for excess capacity. The customer may also specify a maximum budget within which burst requests can be fulfilled until the maximum budget is reached.
[0 S2] Turning to FIG. 8, illustrated is an example of a user-defined pool configured to access hurst capacity. A user-defined pool 800 may include reserved instances 801 , 802, 803, 804 and 805, as well as spot instances 806, 807 and 808. During periods of peak activity, user- defined pool 800 may receive more requests than can be provided using the resources allocated to the user-defined pool In one embodiment, a policy may have been established that allows user-defined pool 800 to access reserved instance pool 810 for bursting capacity. For example, as shown in the figure reserved instance slots 81 1 , 812 and 813 may be allocated to user-defined pool 800 for burst capacity. Similarly, the policy may allow user-defined pool 800 to access on- demand instance pool 820 including on-demand instances 821 , 822 and 823, and spot instance pool 830, including spot instances 831 , 832 and 833, for bursting capacity.
[§§§3] FIG. 9 is a system diagram that shows an illustrative operating environment 900 including several components for implementing a private marketplace. The environment 900
- 23 -
33813SS. ϊ may include a computing platform 902, The computing platform 902 may be implemented by a computing resource provider to make computing resources available to customers 920 for the deployment and execution of distributed applications.
[0084] The computing resources provided by the computing platform 902 may include various classes of resources, such as data processing resources, data storage resources, data communication resonrces and the like. Each class of computing resource may be general- purpose or may be available in a number of specific configurations. For example, data processing resources provided by the computing resource provider may be made available in discrete units or instances 904. Each instance 904 may represent the data processing resources of a dedicated host computer 906, referred to herein as a dedicated tenancy instance, or each instance 904 may represent a virtual machine instance executing on a host computer 906, which may also be referred to as a shared tenancy instance.
[00SS] The host computers 906 may represent generic multi-processor server devices, special-purpose hardware devices and the like. As discussed above, various types and configurations of instances 904 may be made available. For example, each available instance 904 of data processing resources may be of a particular size-— such as small, medium and large- representing different combinations of physical and/or virtual resources comprising or allocated to the instance, snch as number and types of processors, amounts of memory, size and speed of local storage, number of networking addresses or communication channels and or the like. An instance 904 may further be configured with a particular platform, such as a specific OS and/or hypervisor installed on the instance. Instances 904 may also be made available with specific application software components Installed, such as Web server software, database management software, portal software, a specific runtime environment or platform and the like.
[0Θ86] Instances may further be available in specific availability zones 908A and 908B, as described above. As discussed above, an availability zone 908 may represent a particular physical location, such as a data center, or other physical and^or logical grouping of underlying host computers 906 and computing devices supporting the instances 904 provided by the computing platform 902, Providing instances 904 in different sizes and in different availability zones 908 may allow a deployed application to be geographically dispersed, improving end-user performance and insulating the overall application from failures in one particular location or zone. For example, a customer 920 may choose to deploy a number of small instances 904 across multiple availability zones 908 for some functions of the application, such as Web servers, while deploying a single large instance 904 for other functions, such as a database server, for example,
~ 24 ~
3331359.1 The customer 920 may also require that instances 904 be hosted by host computers 906 in particular geographical locations for geopolitical reasons, as well
Θ0871 Ersd-users 950 may ut lize end-user computer systems 952 to access the functionality of the application executing on the allocated Instances 904 through one or more networks 944. The network(s) 944 may represent a combination of local-area networks (LANs), wide-area networks (WANs), the Internet and/or any other networking infrastructure known in the art that connects the host computers 906 in the computing platform 902 to the end-user computer systems 952, to each other and to other computing resources, The end-user computer systems 952 may represent personal computers (PCs), desktop workstations, laptops, notebooks, personal digital assistants (PDAs), electronic-book readers, game consoles, set-top boxes, consumer electronics devices, server computers or any other computing device capable of connecting to the net ork(s) 944 and communicating with the host computers 906 in the computing platform 902,
[0088] A customer 920 wishing to access resources on the computing platform 902 may similarly utilize a customer computer system 922 to connect the computing platform over the rsetwork(s) 944 and to configure and manage the computing resources provided by the computing platform. In this regard, the computing platform 902 may include a number of application servers 924 thai provide various management services to the customer 920 for purchasing and maintaining instances 904 of data processing and or other computing resources, deploying components of the application across the purchased instances 904, monitoring and administering execution of the application and the like. As in the case of die end-user computer systems 952, the customer computer systems 922 may represent PCs, desktop workstations, laptops, notebooks, PDAs, electronic-book readers, game consoles, set-top boxes, consumer electronics devices, server computers or any other computing device capable of connecting to the network(s) 944 and communicating with the application servers 924 in the computing platform 902.
[ΘΘ89] The application servers 924 may represent standard server computers, database servers, Web servers, network appliances, desktop computers, other computing devices and any combination thereof. The application servers 924 may execute a number of modules in order to provide the management services. The modules may execute on a single application server 924 or in parallel across multiple application servers in the computing platform 902. In addition, each module may consist of a number of subcomponents executing on different application
3381359,1 servers 924 or other computing devices in the computing platform 902, The modules may be implemented as software, hardware or any combination of the two,
[δθθθ] i¾e application servers 924 may execute an instance management module 926. The instance management module 926 may allow customers 920 to purchase and configure instances 904 of data processing or other computing resources, manage and maintain purchased instances 904 and the like. Instances 904 may include instances that may be obtained through various modes such as reserved instances, spot instances and on demand instances as described above. Purchased instances 904 for each customer 920 and corresponding configuration and status information may be stored in customer/instance management data 928. The
customer/instance management data 928 may be stored in a database 930 or other data storage system available to the application server(s) 924 in the computing platform 902.
[0091] Reserved instances provide the customer with the ability to reserve a number of a specific type and configuration of instances for a term, such as one year or three years. The reserved instances may represent actual instances of data processing resources configured as specified and placed in stand-by for launch and depioyment by the customer 920 at a future time, or the reserved insiances 904 may represent overall capacity reserved by the computing resource provider for quick configuration and launch when required. When deploying an application, a customer 920 may purchase and launch a number of on-demand instances 904 of a specific type and configuration (e.g., size, platform, tenancy, availability zone and the like) to support immediate availability of the application, as well as a number of reserved instances of the same or similar type and configuration for scaling up the application in the future in response to increased demand or capacity requirements of the application, for example.
[0092] A customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a user interface (UI) presented by the instance management module 926 through a Web service to perform the configuration and maintenance of their purchased instances 904. The customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a UI presented by the pool generation module 946 through a Web service to one or more of their purchased instances 904 as a user- defined pool as discussed above. Additionally or alternatively, the instance management module 926 or pool generation module 946 may expose an application programming interface (API) 932» which may be accessed over the network(s) 944 by stand-alone application programs executing on the customer computer system 922. Other mechanisms for accessing the configuration and maintenance services of the instance management module 926 or pool generation module 946
- 26 -
33813SS.1 may also be imagined, including remote procedure calls, SOAP-based Web services, remote file access, proprietary client-server architectures and the like.
[0093] In some embodiments, the instance management module 926 may allow customers 920 to purchase both on-demand instances and reserved instances. On-demand instances may be purchased and launched immediately, allowing for quick deployment of the components of the application. On-demand instances may further be added or removed as needed, either manually or automatically through to sealing, as demand for or capacity requirements of the application changes over time. The customer 920 may incur ongoing usage costs related to their ors-demand instances, based on the number of hours of operation of the instances 904 and/or the actual resources tilized, for example.
[§094] A customer 920 may determine that their computing capacity may be more efficiently utilised If their instances 904 purchased at deployment of the application were offered to their internal users using a private purchase/bidding process via a private marketplace as described above. For example, the computation needs of the users of customer 920 may change over time, requiring data processing Instances 904 of a different skes or platforms at different times. Similarly, overall demand for the resources may change requiring more instances 904 or requiring instances in different availability zones 908 than originally anticipated. The customer 920 may wish to "sell" their instances 904 to their internal users in order to more efficiently utilize the computing capacity offered by their instances 904 and provide a greater return on the original investment in the purchased Instances, in this regard, the pool generation module 946 may further allow the customer 920 to select a number of instances 904 to allocate to a private marketplace. The instance management module 926 may store information regarding the instance(s) 904 selected for the private marketplace in reserved instance listings 934 and spot instance listings 940 in the database 930 or other data storage system available to the application server(s) 924 in the computing platform 902.
[ΘΘ95] In one embodiment, the customer 920 may delegate a number of instances 904 for a user-defined pool or private marketplace that is accessible to a set of internal users as designated by the customer 920. In one embodiment, the private marketplace may implement a private spot market that is configured to provide access to instances using some of the features used in spot markets as described above. However, the private marketplace may be limited to designated or internal users of the customer 920. Furthermore, the private marketplace may operate using a particularized set of parameters and features that are selected by the customer 920.
~ 27 -
3381359,1 [©©96] In one embodiment, the pool generation module 946 may allow customers 920 to purchase a user-defined poo! or a private marketplace. User-defined pools may be purchased and launched to allow users designed by customers 920 to bid for instances that are allocated to the user-defined pool. User-defined pools may further be added or removed as rteeded by the customers 920, either manual y or automatically through the use of policies. The customer 920 may incur one-time fees and/or ongoing usage costs related to their user-defined pools, based for example on the number of user-defined pools and the number of hours of operation of the user- defined pools and/or the actual resources utilized.
The application servers 924 may further execute an instance listings module 936. The instance listings module 936 may allow users identified by customer 920 to browse and bid for the instances 904 allocated for the private marketplace. A user of customer 920 may utilize a Web browser application executing on the customer computer system 922 to access a user interfaces (UI) presented by the instance listings module 936 through a Web service to browse and select instances 904 listed in the private marketplace for "purchase" or "bid." Additionally or alternatively, the instance listings module 936 may expose an API 932, which may be accessed over the rsetwork(s) 944 by stand-alone application programs executing on the customer computer system 922,
[©©98] The instance listings module 936 may access the reserved instance listings 934 and spot instance listings 940 in the database 930 to determine availability and pricing for instances meeting specified type and configuration requirements (e.g., size, platform, tenancy, availability zone and the like), The instance listings module 936 may also effect allocation of the instances In the private marketplace. The reserved instance listings module 936 may further store data regarding each "sale" of the instances through the pri vate marketplace in private marketplace history data 938 in the database 930 or other data storage system. The private marketplace history data 938 may be utilized by customer 920 or the competing resource provider to analyze billing data regarding the allocation of instances through the private marketplace.
[0099] In some embodiments, the customer 920 may utilize one or more of the above described modules to add additional types of instances as they become available. At least some of the above described functionality can be executed on one or more of the customer's instances, or can be executed on instances or other resources of the provider network,
[0100] In one embodiment, the user can be provided a user interface for selecting one or more of the user's resource slots for the private marketplace and selecting associated
- 28 -
338135S.1 parameters. For example, the user may be able to access a user interface, such as the one shown hi FIG. 10, In one embodiment, a customer may utilize a UI presented by the irsstance management module 9926 of FIG. 9 to select the instances to be listed in a private marketplace. For example, as shown in FIG. 10, the instance management; module 926 or another module in the ciond computing platform 902 may present the UI 500 to the customer 920 m a window 102 of a Web browser or other client application executing on the customer computer system 922. The UI 100 may include a reserved instance list 104 listing the reserved instances of instances 90 of FIG. 8 currently owned by the customer 920, including the type and configuration parameters of each, such as the availability zone, platform, size, tenancy and the like, The reserved instance list 104 may further include the original term of each reserved instance of instances 904 and the remaining term until the reserved instance expires. The reserved instance list 104 may also include the current state of the reserved instances of instances 904, such as whether the reserved instances are active, have expired, are already listed in a user-defined pool, the name of the user-defined pool if already listed and the like.
[0101] The UI 100 may fnrther include a selection UI control, such as the checkbox UI control 106 shown in FIG. 9, that allows the customer 920 to select one or more reserved instances shown in the reserved instance list 104 for listing in the private marketplace, after which the customer 920 may select a command UI control, such as the create listing UI control 108 shown in FIG, 9. Other methods of selecting reserved instances of instances 904 for listing in the reserved instance marketplace through the UI 100 may also be implemented, including selecting a Hue in the reserved instance list 104 with a mouse or other input control and selecting a command UI control from a context menu presented by the instance management module 926 for the selected line, for example.
[01Q2J After selection of an option to create a private marketplace, instance management module 926 may receive information for the parameters for the private
marketplace. For example, upon selecting the create user-defined pool UI control 1 18 in the UI 1 10 shown in FIG. 9, the instance management module 926 or another module in the cloud computing platform 902 may present the UI 1 100 to the customer 820, as shown in FIG, 1 1 , The UI 1 100 may be presented in the window 1 102 of a Weh browser or other client application executing on the customer computer system 822, for example. The UI i 100 may Include a summary of the private marketplace, including the private marketplace (user-defined pool) properties and bidding parameters (e.g., request type, bidding method, currency and the like).
- 29 -
3381355.1 The UI 1 100 may further include a user selection UI control 1 102, allowing the customer 820 to select a maximum quantity of users who cm participate in the private marketplace,
[0103] The UI 1 100 may further include a number of entry UI controls 1 !04A- i 104N, allowing the customer 920 to specify users who can participate in tie private marketplace. According to one embodiment, the customer 920 may be able to list the specific identifier, name and organization for die users who can access the marketplace. These users may have beer* previously entered and stored as users associated with customer 920. The user information cm be used to determine users who are authorized to bid for the resources in the private marketplace and can also be used to track usage for billing purposes. The customer 920 may also remove one or more users by deleting users using UI controls 1 104A-1 104N,
[0104] In some embodiments, an ΑΡΪ may be provided for facilitating the creation and management of user-defined pools. The API may be configured to receive electronic messages d¾at encode identifiers indicative of requests for allocating computing resources in a provider network and creating a user-defmed pool of the computing resources, Irs response to receiving one of the electronic messages, the API may send second electronic messages indicative of information indicating that a set of resource slots associated with a customer is associated with a pricing policy and one or more users designated for the user-defined pool,
[Q10S] FIG. 12 is a data structure diagram showing a number of data elements stored in a user-defined pool record i 200 regarding a user-defined pool, It will be appreciated by one skilled in the art that the data structure shown sn the figure may represent a data file, a database table, an object stored in a computer memory, a programmatic structure or any other data container commonly krsown in the art. Each data element inciuded in die data structure may represent one or more fields in a data file, one or more columns of a database table, one or more attributes of an object, one or more member variables of a programmatic structure or any odier unit of data of a data structure commonly known in the art. The implementation is a matter of choice and may depend on the technology, performance and other requirements of die computing system upon which the data structures are implemented,
[0106] Each user-defined pool record 1200 may contain a customer ID 1202 identifying the customer 820 of the cloud computing platform 802 that is creating the private marketpiace. According to one embodiment, each user-defined pool record 1200 may also contain an instance ID 1204 identifying the specific instance 804 that may be associated with a bid request. The instance ID 1204 may correspond to information regarding the instance 104 stored in the customer/instance management data 828, for example. In this embodiment, each instance 104,
- 30 -
336135S.1 which is to be included in the private marketplace, may have an associated user-defsned pool record 1200 in die database 830,
|0107] Irs some embodiments, the user-defined poo! record 1200 may additionally or alternatively contain the type and configuration parameters describing the associated instance(s) 1204, including ihe size 1206, platform 5208, tenancy 1210, availability mne 1252, instance type [ 214 and the iike. The user-defined pool record 5200 may also contain a user ID 1216 indicating an identification of a particular user associated with the record. The user ID 1216 may correspond to the identifier information provided by the customer 820 when creating the user- defined pool, as described above with regard to FIG, 10.
[ 108J The user-defmed pooi record 5200 may also contain information regarding a request ID 1218, corresponding to a particular request for an instance, and asking price 121 that corresponds to the bid amount for the request. The user-defined pool record 1200 may further contain information regarding one or more usage records 5220A~ 122GM (also referred to herein generally as "usage 1220") and billing records 1222A-1222N (aiso referred to herein generally as "billing 1222"). As further discussed above in regard to FIG, 10, a user may access an instance after successfully bidding for the instance in the private marketplace. Billing records 1222A- 1222N for usage 1220A-1202N may be tracked for die user for billing purposes. It will be appreciated that the user-defined pooi record 1200 may contain additional data elements beyond those shown in FIG. 12 and described above that are utilized by the instance
management module 926, the instance listings module 936 and/or other modules of the cloud computing platform 902 implementing the private marketplace.
[0109] In additional embodiments, the instance management module 9926 or other modules in the cloud computing platform 0902 may provide UIs or APIs 932 to the customer 920 and/or customer computer system 9922 that allow the customer to modify their user-defined pooi, check the status of the user-defined pool and/or to delete die ser-defined pooi if it is no longer desired to provide die instances using the user-defined pool delivery mechanism.
[OllOj FIG. 13 illustrates an example operations! procedure for allocating computing resources in a provider network. In an embodiment, a mechanism for creating a user-defined pooi can be provided by services such as user-defined pool generation service 180 in FIG, I . The operational procedure may be implemented in a system comprising one or more computing devices, The one or more computing devices may comprise a plurality of resource slots, each resource slot configured to host a computing instance. Referring to FIG. 13, operation 1300 begins die operational procedure. Operation 1300 may be followed by operation 1302. Operation
- 31 -
3381359.1 1302 illustrates allocating a plurality of resource slots to a plurality of entities according to a first pricing policy. The entities may correspond to customers or users of the provider network, such as a university or other institution. The first pricing policy may be the pricing policies sed by tlie provider network to sell and allocate resource slots and odier resources in the provider network,
[0111] Operation 1302 may be followed by operation 1304. Operation 1304 illustrates receiving an indication that at least one of the resource slots associated with a first entity of the plurality of entities is associated with a second pricing policy. The indicated resource slots may be accessible to other entities. In one embodiment, the second pricing policy and the other entities may be designated by the first entity. The subset may correspond to a group of resource slots designated by a customer to allocate to a private marketplace. The second pricing policy may correspond to user-selected policies for offering the resource slots to th other entities. The other entities may correspond to the users designated by the customer who can access the resource slots in the private marketplace.
fC lll] Operation 1304 may be followed by operation 1306. Operation 1306 illustrates determining that the first entity has indicated that the indicated resource slots should be brought online.
[0113] If the indicated resource slots should be brought online, then operation 1306 may be followed by operation 1308— which illustrates allocating the indicated resource slots to the other entities according to the second pricing policy.
[§114] FIG. 14 illustrates an example operational procedure for allocating computing resources in a provider network. In an embodiment, a mechanism for allocating computing resources can be provided by services such as the nser-defmed pool generation service 180 in FIG, 1 , The operational procedure may be implemented in a system comprising one or more computing devices. The one or more computing devices may comprise a plurality of resource slots, each resource slot config red to host a computing instance. Referring to FIG. 14, operation 1400 begins the operational procedure. Operation 1400 may be followed by operation 1402. Operation 1402 illustrates maintaining a plurality of resonrce slots allocated to a plurality of entities according to a first pricing policy,
[§115] Operation 1402 may be followed by operation 1404, Operation 1404 illustrates receiving a first indication that one or more of the resonrce slots associated with a first entity of the plurality of entities is associated with a second pricing policy and accessible to a grouping of other entities.
- 32 -
33Θ 353.1 [0116] Operation 1404 may be followed by operation 1406. Operation 1406 illustrates receiving a second indication that one or more of the resource slots associated with a second entity of the plurality of entities is associated with the second pricing policy and accessible to die- grouping of other entities.
[0117] Operation 1406 may be followed by operation 1408, Operation 1408 illustrates determining that the or more of the resource siots associated with the first entity and one or more of the resource slots associated with the second entity should be combined and brought online. If the resource slots should be brought online, then operation 1408 may be followed by operation 1410— which illustrates combining the or more of the resource slots associated with the first entity and one or more of the resource slots associated with the second entity and allowing the grouping of other entitles to bid for the combined resource slots according to the second pricing policy.
[11118] FIG. 15 illustrates an example operational procedure for allocating computing resources in a provider network, In an embodiment, a mechanism for creating a user-defined pool can be provided by services such as the user-defined pool generation service 180 in FIG. 1 . The operational procedure may be implemented in a system comprising one or more computing devices. The one or more computing devices may comprise a plurality of resource slots, each resource slot configured to host a computing instance. Referring to FIG, 15, operation 1500 begins the operational procedure, Operation 1500 may be followed by operation 1502. Operation 1502 Illustrates associating one or more resource slots with a designated group of users who are allowed to request access to the one or more resource slots according to a user-selected pricing policy. In one embodiment, die one or more resource slots may be selected from resource slots associated with an entity according to a provider-selected pricing policy.
[0119] Operation 1502 may be followed by operation 1504. Operation 1504 illustrates receiving an indication that a request for access to the one or more resource slots has been received that exceeds a computing capacity of the one or more resource slots.
[0120J Operation 1504 may be followed by operation 1506. Operation 1506 illustrates determining that a policy is stored for allocating excess computing capacity requests for die one or more resource siots.
[0121] If a policy is stored for allocating excess computing capacity requests for the one or more resource slots, then operation 1506 may be followed by operation 1508— which illustrates allocating additional computing capacity to allow fulfillment of the request for access.
33S1359.1 [6122] Embodiments of the disclosure can be described in view of the following clauses;
1. A system for allocating computing resources in a provider network, the system comprising:
one or more computing devices, the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
at least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to:
allocate a plurality of resource slots to a plurality of entities according to a first pricing policy;
receive an indication that at least a portion of the resource slots associated with a first entity of the plurality of entities is associated with a second pricing policy and accessible to one or more users identified by the first entity, the second pricing policy being designated by the first entity; and
allocate the indicated resource slots to the one or more users according to the second pricing policy,
2. The system according to clause 1 , further comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least allow the one or more se s identified by the first entity to bid for the indicated resource slots in accordance with the second pricing policy,
3, The system according to clause 2, further comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least provide a user interface for allowing the one or more users identified by the first entity to bid for the indicated resource slots.
4, The system according to clause 1 , further comprising computer readable instructions that, upon execution by the one or more processors of the system, canse the system to at least provide a user interface for facilitating selection of the indicated resource slots, the one or more users identified by t e first entity, and the second pricing policy.
- 34
3361358,1 5. A method for allocating computing resources in a provider network, the method comprising:
in a computing environment comprising a plurality of computing devices arid where capacity of each compiiisrig device is logically segmented into one or more resource slots, associating a plurality of resource slots with a first user according to a first set of pricing policies; and
allowing the user to identify one or more of the associated resource slots and identify oilier users allowed to access the one or more of the associated resource slots according to a second set of pricing policies, the second set of pricing policies being designated by the user.
6. The method of cla se 5, further comprising causing allocation of the one or more of the associated resource slots to the other users according to the second pricing policy.
7. The method of clause 5, further comprising allowing the other users to hid for the one or more of the associated resource siots in accordance with the second pricing policy.
8. The method of clause 5, further comprising providing a user interface operable to receive indication of the one or more of the associated resource slots, the other users allowed to access the one or more of the associated resource slots, and the second pricing policy,
9. The method of clause 5, wherein the second pricing policy indicates currency to use to acquire a resource slot, minimum/maximum currency levels, or a bidding algorithm.
10. The method of clause 9, wherein the currency relates to monetary units. i I . The method of clause 9, wherein the currency relates to CPU cycles, storage, memory, or network bandwidth.
12. The method of clause 7, wherein said bid comprises bidding for CPU cycles or network bandwidth.
13- The method of clause 5, further comprising allowing the user to disallow some of the other users from accessing the one or more of the associated resource slots.
- 35 -
33S 359.1 14. The method of clause 5, wherein said allowing comprises receiving a request to allocate the one or more of the associated resource slots, associating the request with a request identifier, and associating the one or more of the associated resource slots with a pool identifier.
15. The method of clause 5, further comprising determining billing information for accessing the one or more of the associated resource slots.
16. The method of clause 7, further comprising determining which of the other users have bid For at least one of the one or more of the associated resource slots in accordance with the second pricing policy and collecting billing information based on the determining,
17. The method of clause 16, farther comprising associating the determined other users with user identifiers and including the user identifiers with records associated with the determined other users.
18. The method of clause 17, wherein the records are formed as key value pairs.
19. The method of clause 7, wherein the bid comprises a maximum price to be paid for one or more of the associated resource slots.
20. The method of clause 19, wherein one of the one or more of the associated resource slots is allocated to one of the other users when the maximum price exceeds a predeterraiued price.
21. The method of clause 20, wherein the predetermined price is based on supply and demand of the oue or more of the associated resource slots,
22. The method of clause 21 , wherein the predetermined price is selectable by the user.
3381359.1 23, A non-trarrskory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions that upon execution on one or more computing de vices, to at least:
in a computing environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, generate a user interface allowing a user to identify one or more resource slots associated with the user and identify other users allowed to access the one or more resource slots associated with the user according to a pricing policy, the pricing policy being designated by the user; and
cause t e computing environment to at least allow the other users to bid for me one or more resource slots associated with the user in accordance with the pricing policy,
24, The non-transitory computer-readable storage medium of clanse 23, wherein the pricing policy comprises currency to use to acquire a resource slot, price levels, or a bidding algorithm.
25, The non-transitory computer-readable storage medium of clause 24, wherein the bidding algorithm comprises one of an ascending auction and a descending auction.
26, The non-transitory compiUer-readabie storage medium of clause 23, comprising instructions mat upon execution on one or more computing devices, at least cause determining billing information for allowing the other users to bid for the one or more resource slots associated with the nser.
27, The non-transitory computer-readable storage medium of clause 26, comprising instructions that upon execution on one or more computing devices, at least cause determining which of the other users have bid for one or more of the one or more resource slots associated with the user in accordance with the pricing policy and determining billing information based on the determining.
28, A system for allocating computing resources in a provider network, the system comprising:
one or more computing devices, the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
at least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to;
- 37 -
3381359.1 maintain a plurality of resource slots allocated to a plurality of entities according to a first pricing policy;
receive a first indication dtat one or more resource slots associated with a first entity of the plurality of entitles is associated with a second pricing policy arid accessible to one or more users,
receive a second indication that one or more resource slots associated with a second entity of the plurality of entities is associated with the second pricing policy and accessible to the one or more users; and
allocate the one or more resource slots associated with he first entity and one or more resource slots associated with the. second entity to the one or more users according to the second pricing policy.
29. The system according to clause 28, fnrther comprising computer readable, instructions that, upon execution by the one or more processors of the system, cause the system to at least allow the one or more users to bid for the one or more resource slots associated with the first entity and one or more resource slots associated with the second entity in accordance with the second pricing policy,
30. The system according to clause 28, fnrther comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least provide a user interface for allowing the one or more users to bid for the one or more resource slots associated with the first entity and one or more resource slots associated with me second entity,
31. The system according to clause 28, further comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least provide a user interface for facilitating selection of the one or more resource slots associated with the first entity and one or more resource slots associated with the second entity, the one or more users, and the second pricing policy.
32. A method for allocating computing resources in a provider network, the method comprising:
in a computing environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, associating one or more resource slots with a first user according to a first set of pricing policies
- 38 -
3381359.1 and associating one or more resource slots with a second user according to the first set of pricing policies;
allowing the first user to identify at least one resource slot associated with the first user that can be accessed by a designated set of odier ysers accordiog to a second pricing policy; and allowing the second user to identify at least one resource slot associated with the second user that can be accessed by the designated set of other users according to the second pricing policy.
33. The method of clause 32, wherein the second pricing policy is selected by the first user or the second user.
34. The method of clause 32, further comprising allowing the second user to identify additional ones of the others users who cart access the at least one resource slot associated with the first user or at least orse resource slot associated with the second iiser.
35. The method of clause 32, further comprising allowing the first user or the second user to disallow at least one of the designated set of other users from accessireg the at least one resource slot associated with the first user or at least one resource slot associated with the second user.
36. The method of clause 32, further comprising allowing the first user or the second user to update the second pricing policy.
37. The method of claase 32, further comprising combining the at least one resource slot associated with the first user and the at least one resource slot associated with the second user and allowing the designated set of other users to request access to at least one of the combined resource slots according to the second pricing policy,
38. The method of clause 32, further comprising providing a user interface operable to receive indication of the at least one resource slot associated with the first user, die at least one resource slot associated with the second user, the designated set of other users, and the second prieirsg policy.
39. The method of clause 37, wherein said request comprises a bid for a resource slot in the combined resource slots.
- 39 -
33S1359.1 40. The method of clause 32, wherein the second pricing policy comprises a currency to use to acquire a resource slot, price limits, or a bidding algorithm.
41. The method of clause 32, wherein said allowing the first user and allowing the second user comprises receiving a request to allocate the at least one resource slot associated with the first user or the at least one resource slot associated with the second user, associating the request with a request identifier, and associating the at least one resource slot associated with the first user or the at least one resource slot associated with the second user with a pool identifier.
42. The method of clause 32, further comprising determining billing information for accessing the at least one resource slot associated with the first user or the at least one resource slot associated with the second user.
43. The method of clause 39, farther comprising determining which of the designated set of other users have bid for at least one of the resource slots associated with the first user or at least one resource slot associated with the second user in accordance with the second pricing policy and collecting billing information based on the determining,
44. The method of clause 43, further comprising associating the determined other users with a user identifier and including the user identifier with records associated with the determined other users,
45. The method of clause 42, wherein the billing information is collected according to a hilling policy for combining the at least one resource slot associated with the first user and the at least one resource slot associated with the second user.
- 40 *
338 35S.1 46. A rton-transitory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions thai upon execution on one or more computing devices, to at least:
in a com eting environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, generate a user Interface allowing:
first user to identify one or more resource slots associated with the first user, the one or more resource slots associated widi the first user being accessible by a grouping of other users according to a pricing policy;
a second user to identify one or more resource slots associated with the second user, the one or more resource slots associated with the second user being accessible by the grouping of other users according to the pricing policy;
wherein the grouping of other users and pricing policy are selected by the first user or the second user; and
cause the computing environment to at least allow the grouping of other users to bid for the one or more resource slots associated with the first user and one or more resource slots associated with the second user in accordance with the pricing policy.
47. The non-transitory computer-readable storage medium of clause 46, wherein the pricing policy comprises one or more of currency to use to acquire a resource slot, minimum/maximum pricing levels, or a bidding pricing algorithm,
48. The non-transitory computer-readable storage medium of clause 47, wherein the bidding/pricing algorithm comprises one of an ascending auction and a descending auction,
49. The non-transitory computer-readable storage medium of clause 46, further comprising instructions that upon execution on one or more computing devices, at least cause determining billing information for allowing the grouping of other users to bid for the one or more resource slots associated with the first user and one or more resource slots associated with the second user.
3351 ass, 1 50. The non-transitory computer-readable storage medium of clause 49, comprising instructions that upon execution on one or more computing devices, at least eatsse determining which of the grouping of other users have bid for the one or more resource slots associated with the first user or one or more resource slots associated with the second user in accordance with the pricing policy and collecting billing information based on the determining.
5 L A system for allocadng computing resources in a provider network, the system comprising:
one or more computing devices, the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
at least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause t e system to:
associate at least a portion of a plurality of resource slots with one or more users who are allowed to request access to the portion of the plurality of resource slots according to an entity- selected pricing policy, wherein the portion of the plurality of resource slots are selected from resource slots associated with an entity according to a provider-selected pricing policy;
receive an indication that a request for access to the portion of the plurality of resource slots has been recei ved that exceeds a computing capacity of the portion of the plurality of resource slots;
in response to the indication, determine that a policy is stored for allocating excess computing capacity requests for the portion of the plurality of resource slots; and
allocating additional computing capacity to allow fulfillment of the request for access.
52. The system according to clause 51 , wherein the portion of the plurality of resource slots, the one or more users, and the entity-selected pricing policy are selected by the entity.
53. The system according to clause 51 , further comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least provide a user interface for allowing the one or more users to bid for the grouping of the plurality of resource slots.
54. The system according to clause 51 , wherein the additional computing capacity is provided from the plurality of resource slots.
·· 42 ·
3331359.1 55. A method for allocating computing resources in a provider network, the method comprising:
in a corn puling environment comprising a plurality of competing devices and wherein capacity of each computing device is logically segmented into one or more resource slots, and wherein one or more resource slots are associated with a user according to a first set of pricing policies, allowing the user to identify at least one of the one or more associated resoorce slots and iderstify other users allowed to access the at least one associated resource slot according to a second set of pricing policies;
receive an indication that a request for access to the at least one associated resource slot as been received that exceeds a computing capacity of the at least one associated resource slot; and
in response to the indication, allocating additional computing capacity to allow fulfillment of the request for access.
56. The method of clause 55, further comprising causing allocation of the at least one associated resource slot to the other users according to the second pricing policy,
57. The method of clause 55, wherein the second set of pricing policies is selected by the user.
58. The method of clause 55, further comprising determining that a policy is stored for allocating the additional computing capacity for the at least one associated resource slot, wherein the additional computing capacity is allocated in accordance with the policy,
59. The method of clause 55, further comprising providing a user interface for allowing the other users to bid for the at least one associated resource slot.
60. The method of clause 55, further comprising providing a user interface for facilitating selection of the at least one associated resource slot, other users allowed to access the at least one associated resource slot, and the second set of pricing policies,
61. The method of clause 55, further comprising allowing the other users to bid for the at least osie associated resource slot irs accordance with the second pricing policy.
- 43 -
3381359.1 62. The method of clause 55, wherein the second pricing policy comprises a currency to use to acquire a resource slot, minimum/maximum prices, or bidding pricing algorithm,
63. The method of clause 61 , wherein said allowing comprises receiving request to allocate the at least arse associated resource slot, associating the request with a request identifier, arid the at least one associated resource slot with a pool identifier.
64. The method of clause 55, further comprising determining billing information for allocating the at least one associated resource slot and allocating the additional comparing capacity.
65. The method of clause 61 , further comprising determining which of the other users have bid for one or more of the at least one associated resource slot in accordance with the second pricing policy and collecting billing information based on the determining,
66. The method of clause 65, further comprising associating the other users with a user identifier and including the user identifier with records associated with the other users.
67. A non-transitory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions that upon execution on one or more computing devices, to at least:
in a computing environment comprising a plurality of computing devices and wherein capacity of each computing device is logically segmented into one or more resource slots, and wherein one or more resource slots are associated with a user according to a first set of pricing policies, generate a user interface allowing the nser to identify at leas one of the associated resource slots and identify other users allowed to access the at least one associated resource slot according to a second set of pricing policies;
generate a user interface allowing the other users to request access to the at least one associated resource slot; and
in response to receiving an indication that a request for access to the at least one associated resource slot has been received that exceeds a computing capacity of the at least one associated resource slot, cause the computing environment to allocate additional computing capacity to allow fulfillment of die request for access.
* .44 »
33S1359.1 68. The non-transitory computer-readable storage medium of clause 66, wherein the second set of pricing policies comprises a currency to u e lo acquire a resource slot, mininiurr^maxsmurn prices, or bidding/pricing algorithm,
69. The non-transitory computer-readable storage medium of clause 68, wherein the bidding/pricing algorithm comprises one of an ascending auction and a descending auction.
70. The non-transitory computer-readable storage medium of clause 67, comprising instructions that upon execution on one or more computing devices, at least cause the compiling environment to determine billing information for allowing the other users to bid for the at least one associated resource slot.
71. The non-transitory computer-readable storage medium of clause 67, comprising instructions that upon execution on one or more computing devices, at least cause the computing environment to determine diat a policy is stored for allocating the additional computing capacity for the at least one associated resource slot, wherein the additional computing capacity is allocated in accordance with the policy,
72. The non-transitory computer-readable storage medium of clause 67, wherein the additional computing capacity is allocated from the one or more resource slots associated with the user.
[§1231 Esch of the processes, methods and algorithms described in the preceding sections may be embodied in, and folly or partially automated by, code modules executed by one or more computers or computer processors. The code modules may be stored on any type of non- transitory computer-readable medium or computer storage device, such as hard drives, solid state memory, optical disc and/or the like. The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, e.g., volatile or non-volatile storage,
[D124J The various features and processes described above may be used Independently of one another, or may be combined in various ways. Ail possible combinations and
subcombinations are intended to fall within the scope of this disclosure. In addition, certain method or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular seqnence, and the- blocks or states relating
- 45 -
33S13SS. thereto can be performed in other sequences that are appropriate, For example, described blocks or states may be performed in an order other than that specifically disclosed, or multiple blocks or states may be combi ed in a single block or state. The exampl blocks or states may be performed In serial, In parallel or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described, For example, elements may be added to, removed from or rearranged compared to the disclosed example embodiments.
[01251 ¾ will also be appreciated that various items are illustrated as being stored in memory or on storage while being used, and that these stems or portions of thereof may be transferred between memory and other storage devices for purposes of memory management and data integrity, Alternatively, in other embodiments some or all of the software modules and/or systems may execute in memory on another device and communicate with the illustrated computing systems via inter-computer communication. Furthermore, in some embodiments, some or all of the systems and/or modules may be implemented or provided in other ways, such as at least partially irs firmware arsd or hardware, including, but not limited to, one or more application-specific integrated circuits (ASICs), standard integrated circuits, controllers (e.g., by executing appropriate instructions, and including microcontrollers and/or embedded controllers), field-programmable gate arrays (FPGAs), complex programmable logic devices (CPLDs), etc. Some or all of the modules, systems and data structures may also be stored (e.g., as software instructions or structured data) on a computer-readable medium, such as a hard disk, a memory, a network or a portable media article to be read by an appropriate drive or via an appropriate connection. The systems, modules and data structures may also be transmitted as generated data signals (e.g., as part of a carrier wave or other analog or digital propagated signal) on a variety of computer-readable transmission media, including wireless-based and wired/cable-based media, and may take a variety of forms (e.g., as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames). Such computer program products may also take other forms in other embodiments. Accordingly, the present invention may be practiced with other computer system configurations.
[0126] Conditional language used herein, such as, among others, "cars," "could," "might." "may," "e.g." and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in
- 46 -
33S1359.1 any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or steps are included or are to be performed Irs any particular embodiment. The terms "comprising," "including," "having" and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations and so forth. Also, the term "or" is used in its inclusive sense (and not in its exclusive sense) so that when nsed, for example, to connect a list of elements, the term "or" means one, some or all of the elements in the list.
[§127] While certain example embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions disclosed herein. Thns, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module or block is necessary or indispensable. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions disclosed herein. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of certain of the inventions disclosed herein.
47 -
338135S.1

Claims

CLAMS
WHAT IS CLAIMED IS;
1. A system for allocating computing resources in a provider network, the system comprising:
one or more computing devices, the one or more computing devices comprising one or more resource slots, each resource slot configured to host a computing instance;
al least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to;
allocate a plurality of resource slots to a plurality of entities according to a first pricing policy;
receive ars indication that at least a portion of the resource slots associated with a first entity of the plurality of entities is associated with a second pricing policy and accessible to one or more users identified by the first entity, the second pricing policy being designated by the first entity; and
allocate the indicated resource slots to the one or more users according to the second pricing policy.
2. The system according to claim I , further comprising computer readable instructions that, upon execution by d e one or more processors of the system, cause the system to at least allow the one or more users identified by the first entity to bid for the indicated resource slots in accordance with the second pricing policy.
3. The system according to claim 2, further comprising computer readable instructions that, upon execution by the one or more processors of the sysiem, cause the system to at least provide a user interface for allowing the one or more users identified by the first entity to bid for the indicated resource slots.
4. The system according to claim 1 , further comprising computer readable instructions that, upon execution by the one or more processors of the system, cause the system to at least provide a user interface for facilitating selection of the indicated resource slots, the one or more users identified by the first entity, and the second pricing policy.
« 4$ "
5. A method for allocating computing resources in a provider network, the method comprising:
In a computing environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, associating a plurality of resource slots with a first user according to a first set of pricing policies; and
allowing the user to identify one or more of the associated resource slots and identify other users allowed to access the one or more of the associated resource slots according to a second set of pricing policies, the second set of pricing policies being designated by the user.
6, The method of claim 5, further comprising causing allocation of the one or more of the associated resource slots to the other users according to the second pricing policy,
?, The method of claim 5, further comprising allowing the other users to bid for the one or more of the associated resource slots iu accordance with the second pricing policy.
8. The method of claim 5, further comprising providing a user interface operable to receive indication of the one or more of the associated resource slots, the other users allowed to access the one or more of the associated resource slots, md the second pricing policy.
9. The method of claim 5, wherein the second pricing policy indicates currency to use to acquire a resource slot, minimum/maximum currency levels, or a bidding algorithm,
10. The method of claim 9, wherein the currency relates to monetary units, CPU cycles, storage, memory, or network bandwidth.
1 1. The method of claim 7. wherein said bid comprises bidding for CPU cycles or network bandwidth.
12. The method of claim 5, further comprising allowing the user to disallow some of the other users from accessing the one or more of the associated resoorce slots.
33B1359,1 ί 3. The method of claim 5, wherein said allowing comprises receiving a request to allocate the one or more of the associated resource slots, associating the request with a request identifier, and associating the one or more of the associated resource slots with a pool identifier,
14. The method of claim 5, further comprising determining billing information for accessing the one or mars of the associated resource slots.
15. A non-transitory computer-readable storage medium having stored thereon computer- readable instructions, the computer-readable instructions comprising instructions that ηροη execution on one or more computing devices, to at least:
in a computing environment comprising a plurality of computing devices and where capacity of each computing device is logically segmented into one or more resource slots, generate a user interface allowing a user to identify one or more resource slots associated with fe user and identify other users allowed to access the one or more resource slots associated with the user according to a pricing policy, the pricing policy being designated by the user; and
cause die computing environment to at least allow the other users to bid for the one or more resource slots associated with the user in accordance with the pricing policy.
EP14779020.8A 2013-04-02 2014-04-01 User-defined pools Withdrawn EP2981896A4 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US13/855,449 US9645840B2 (en) 2013-04-02 2013-04-02 User-defined pools
US13/855,518 US9634958B2 (en) 2013-04-02 2013-04-02 Burst capacity for user-defined pools
US13/855,498 US20140297867A1 (en) 2013-04-02 2013-04-02 Capacity merging for user-defined pools
PCT/US2014/032514 WO2014165507A1 (en) 2013-04-02 2014-04-01 User-defined pools

Publications (2)

Publication Number Publication Date
EP2981896A1 true EP2981896A1 (en) 2016-02-10
EP2981896A4 EP2981896A4 (en) 2016-11-02

Family

ID=51659172

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14779020.8A Withdrawn EP2981896A4 (en) 2013-04-02 2014-04-01 User-defined pools

Country Status (5)

Country Link
EP (1) EP2981896A4 (en)
JP (1) JP6494595B2 (en)
CN (1) CN105190568B (en)
SG (1) SG11201508211TA (en)
WO (1) WO2014165507A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10291548B2 (en) 2014-08-08 2019-05-14 Oracle International Corporation Contribution policy-based resource management and allocation system
US9912609B2 (en) 2014-08-08 2018-03-06 Oracle International Corporation Placement policy-based allocation of computing resources

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080148342A1 (en) * 2006-12-13 2008-06-19 Cisco Technology, Inc. Management of application specific data traffic
US8924982B2 (en) * 2010-01-12 2014-12-30 Amazon Technologies, Inc. Managing private use of program execution capacity
US10678602B2 (en) * 2011-02-09 2020-06-09 Cisco Technology, Inc. Apparatus, systems and methods for dynamic adaptive metrics based application deployment on distributed infrastructures
US20120215598A1 (en) * 2011-02-18 2012-08-23 Sony Corporation Marketing and selling contributed resources in distributed computing

Also Published As

Publication number Publication date
WO2014165507A1 (en) 2014-10-09
JP2016519368A (en) 2016-06-30
EP2981896A4 (en) 2016-11-02
CN105190568B (en) 2019-09-13
SG11201508211TA (en) 2015-11-27
JP6494595B2 (en) 2019-04-03
CN105190568A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
US9645840B2 (en) User-defined pools
US9634958B2 (en) Burst capacity for user-defined pools
US10972532B2 (en) Dynamic shared server resource allocation
US11368517B2 (en) Secure automated resource-exchange system
US11625738B2 (en) Methods and systems that generated resource-provision bids in an automated resource-exchange system
US10114668B2 (en) Managing private use of program execution capacity
US10819776B2 (en) Automated resource-price calibration and recalibration by an automated resource-exchange system
US9712535B1 (en) Security recommendation engine
US20180260251A1 (en) Use of nested hypervisors by a resource-exchange system to enhance data and operational security and to facilitate component installation
US10511658B1 (en) Computing resource transition notification and pending state
US9129052B2 (en) Metering resource usage in a cloud computing environment
US11665105B2 (en) Policy-based resource-exchange life-cycle in an automated resource-exchange system
US20110145153A1 (en) Negotiating agreements within a cloud computing environment
WO2011067029A1 (en) Inter-cloud resource sharing within a cloud computing environment
US11502972B2 (en) Capacity optimization in an automated resource-exchange system
US11507417B2 (en) Job scheduling based on job execution history
US9246986B1 (en) Instance selection ordering policies for network-accessible resources
US10296750B1 (en) Robust data tagging
US10129094B1 (en) Variable computing capacity
US10152449B1 (en) User-defined capacity reservation pools for network-accessible resources
US11321787B2 (en) Automonous multi-cloud solution design and fulfillment via crowdsourcing
US20140297867A1 (en) Capacity merging for user-defined pools
US9639875B1 (en) Reconfiguring reserved instance marketplace offerings for requested reserved instance configurations
US11159402B1 (en) Virtual machine import/export risk assessment
WO2014165507A1 (en) User-defined pools

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20151015

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20161006

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 12/02 20060101AFI20160929BHEP

Ipc: G06F 3/06 20060101ALN20160929BHEP

Ipc: H04L 12/911 20130101ALI20160929BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20200311

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20210824