AMAZON CLOUD COMPUTING + CIA = NON-STORY
-
- Posts: 2826
- Joined: Wed Nov 30, 2016 8:33 am
AMAZON CLOUD COMPUTING + CIA = NON-STORY
So the company that just happens to have a contract with the CIA to provide Cloud Sourcing was "down" yesterday.
Intelligence community loves its new Amazon cloud
Barb Darrow
Jun 29, 2015
U.S. intelligence agencies moving from legacy systems to new cloud computing infrastructure built by Amazon(AMZN, +0.40%) Web Services are pretty happy about it thus far, according to a report in NextGov.
Two years ago, the CIA selected AWS to build and run a special, secure cloud to be used by 17 intelligence-related agencies, in a contract valued at $600 million. That was a watershed event for Amazon, the leader in public cloud services. Many companies with regulatory and compliance concerns resist the notion of using public cloud infrastructure, in which resources are typically shared by many customers, although Amazon cordons off sections of its public cloud for use by select customers.
http://fortune.com/2015/06/29/intellige ... zon-cloud/
Amazon S3 Availability Event: July 20, 2008
We wanted to provide some additional detail about the problem we experienced on Sunday, July 20th.
At 8:40am PDT, error rates in all Amazon S3 datacenters began to quickly climb and our alarms went off. By 8:50am PDT, error rates were significantly elevated and very few requests were completing successfully. By 8:55am PDT, we had multiple engineers engaged and investigating the issue. Our alarms pointed at problems processing customer requests in multiple places within the system and across multiple data centers. While we began investigating several possible causes, we tried to restore system health by taking several actions to reduce system load. We reduced system load in several stages, but it had no impact on restoring system health.
At 9:41am PDT, we determined that servers within Amazon S3 were having problems communicating with each other. As background information, Amazon S3 uses a gossip protocol to quickly spread server state information throughout the system. This allows Amazon S3 to quickly route around failed or unreachable servers, among other things. When one server connects to another as part of processing a customer's request, it starts by gossiping about the system state. Only after gossip is completed will the server send along the information related to the customer request. On Sunday, we saw a large number of servers that were spending almost all of their time gossiping and a disproportionate amount of servers that had failed while gossiping. With a large number of servers gossiping and failing while gossiping, Amazon S3 wasn't able to successfully process many customer requests.
At 10:32am PDT, after exploring several options, we determined that we needed to shut down all communication between Amazon S3 servers, shut down all components used for request processing, clear the system's state, and then reactivate the request processing components. By 11:05am PDT, all server-to-server communication was stopped, request processing components shut down, and the system's state cleared. By 2:20pm PDT, we'd restored internal communication between all Amazon S3 servers and began reactivating request processing components concurrently in both the US and EU.
At 2:57pm PDT, Amazon S3's EU location began successfully completing customer requests. The EU location came back online before the US because there are fewer servers in the EU. By 3:10pm PDT, request rates and error rates in the EU had returned to normal. At 4:02pm PDT, Amazon S3's US location began successfully completing customer requests, and request rates and error rates had returned to normal by 4:58pm PDT.
We've now determined that message corruption was the cause of the server-to-server communication problems. More specifically, we found that there were a handful of messages on Sunday morning that had a single bit corrupted such that the message was still intelligible, but the system state information was incorrect. We use MD5 checksums throughout the system, for example, to prevent, detect, and recover from corruption that can occur during receipt, storage, and retrieval of customers' objects. However, we didn't have the same protection in place to detect whether this particular internal state information had been corrupted. As a result, when the corruption occurred, we didn't detect it and it spread throughout the system causing the symptoms described above. We hadn't encountered server-to-server communication issues of this scale before and, as a result, it took some time during the event to diagnose and recover from it.
During our post-mortem analysis we've spent quite a bit of time evaluating what happened, how quickly we were able to respond and recover, and what we could do to prevent other unusual circumstances like this from having system-wide impacts. Here are the actions that we're taking: (a) we've deployed several changes to Amazon S3 that significantly reduce the amount of time required to completely restore system-wide state and restart customer request processing; (b) we've deployed a change to how Amazon S3 gossips about failed servers that reduces the amount of gossip and helps prevent the behavior we experienced on Sunday; (c) we've added additional monitoring and alarming of gossip rates and failures; and, (d) we're adding checksums to proactively detect corruption of system state messages so we can log any such messages and then reject them.
Finally, we want you to know that we are passionate about providing the best storage service at the best price so that you can spend more time thinking about your business rather than having to focus on building scalable, reliable infrastructure. Though we're proud of our operational performance in operating Amazon S3 for almost 2.5 years, we know that any downtime is unacceptable and we won't be satisfied until performance is statistically indistinguishable from perfect.
Sincerely,
The Amazon S3 Team
http://www.zerohedge.com/news/2017-02-2 ... y-impacted
Intelligence community loves its new Amazon cloud
Barb Darrow
Jun 29, 2015
U.S. intelligence agencies moving from legacy systems to new cloud computing infrastructure built by Amazon(AMZN, +0.40%) Web Services are pretty happy about it thus far, according to a report in NextGov.
Two years ago, the CIA selected AWS to build and run a special, secure cloud to be used by 17 intelligence-related agencies, in a contract valued at $600 million. That was a watershed event for Amazon, the leader in public cloud services. Many companies with regulatory and compliance concerns resist the notion of using public cloud infrastructure, in which resources are typically shared by many customers, although Amazon cordons off sections of its public cloud for use by select customers.
http://fortune.com/2015/06/29/intellige ... zon-cloud/
Amazon S3 Availability Event: July 20, 2008
We wanted to provide some additional detail about the problem we experienced on Sunday, July 20th.
At 8:40am PDT, error rates in all Amazon S3 datacenters began to quickly climb and our alarms went off. By 8:50am PDT, error rates were significantly elevated and very few requests were completing successfully. By 8:55am PDT, we had multiple engineers engaged and investigating the issue. Our alarms pointed at problems processing customer requests in multiple places within the system and across multiple data centers. While we began investigating several possible causes, we tried to restore system health by taking several actions to reduce system load. We reduced system load in several stages, but it had no impact on restoring system health.
At 9:41am PDT, we determined that servers within Amazon S3 were having problems communicating with each other. As background information, Amazon S3 uses a gossip protocol to quickly spread server state information throughout the system. This allows Amazon S3 to quickly route around failed or unreachable servers, among other things. When one server connects to another as part of processing a customer's request, it starts by gossiping about the system state. Only after gossip is completed will the server send along the information related to the customer request. On Sunday, we saw a large number of servers that were spending almost all of their time gossiping and a disproportionate amount of servers that had failed while gossiping. With a large number of servers gossiping and failing while gossiping, Amazon S3 wasn't able to successfully process many customer requests.
At 10:32am PDT, after exploring several options, we determined that we needed to shut down all communication between Amazon S3 servers, shut down all components used for request processing, clear the system's state, and then reactivate the request processing components. By 11:05am PDT, all server-to-server communication was stopped, request processing components shut down, and the system's state cleared. By 2:20pm PDT, we'd restored internal communication between all Amazon S3 servers and began reactivating request processing components concurrently in both the US and EU.
At 2:57pm PDT, Amazon S3's EU location began successfully completing customer requests. The EU location came back online before the US because there are fewer servers in the EU. By 3:10pm PDT, request rates and error rates in the EU had returned to normal. At 4:02pm PDT, Amazon S3's US location began successfully completing customer requests, and request rates and error rates had returned to normal by 4:58pm PDT.
We've now determined that message corruption was the cause of the server-to-server communication problems. More specifically, we found that there were a handful of messages on Sunday morning that had a single bit corrupted such that the message was still intelligible, but the system state information was incorrect. We use MD5 checksums throughout the system, for example, to prevent, detect, and recover from corruption that can occur during receipt, storage, and retrieval of customers' objects. However, we didn't have the same protection in place to detect whether this particular internal state information had been corrupted. As a result, when the corruption occurred, we didn't detect it and it spread throughout the system causing the symptoms described above. We hadn't encountered server-to-server communication issues of this scale before and, as a result, it took some time during the event to diagnose and recover from it.
During our post-mortem analysis we've spent quite a bit of time evaluating what happened, how quickly we were able to respond and recover, and what we could do to prevent other unusual circumstances like this from having system-wide impacts. Here are the actions that we're taking: (a) we've deployed several changes to Amazon S3 that significantly reduce the amount of time required to completely restore system-wide state and restart customer request processing; (b) we've deployed a change to how Amazon S3 gossips about failed servers that reduces the amount of gossip and helps prevent the behavior we experienced on Sunday; (c) we've added additional monitoring and alarming of gossip rates and failures; and, (d) we're adding checksums to proactively detect corruption of system state messages so we can log any such messages and then reject them.
Finally, we want you to know that we are passionate about providing the best storage service at the best price so that you can spend more time thinking about your business rather than having to focus on building scalable, reliable infrastructure. Though we're proud of our operational performance in operating Amazon S3 for almost 2.5 years, we know that any downtime is unacceptable and we won't be satisfied until performance is statistically indistinguishable from perfect.
Sincerely,
The Amazon S3 Team
http://www.zerohedge.com/news/2017-02-2 ... y-impacted
“I've got a phone that allows me to convene Americans from every walk of life, nonprofits, businesses, the private sector, universities to try to bring more and more Americans together around what I think is a unifying theme..." - Obama
-
- Posts: 5991
- Joined: Thu Dec 01, 2016 1:54 am
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Maybe if we hadn't spent the last 40-50 years dismantling anti-trust laws, AWS wouldn't have so much power when it comes to the infrastructure of The Cloud, and the CIA would have to spread it's black budget around a little more.
HAIL!
Her needs America so they won't just take his shit away like in some pussy non gun totting countries can happen.
-Hwen
Her needs America so they won't just take his shit away like in some pussy non gun totting countries can happen.
-Hwen
-
- Posts: 2421
- Joined: Wed Nov 30, 2016 11:07 am
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Hanarchy Montanarchy wrote:Maybe if we hadn't spent the last 40-50 years dismantling anti-trust laws, AWS wouldn't have so much power when it comes to the infrastructure of The Cloud, and the CIA would have to spread it's black budget around a little more.
There is a time for good men to do bad things.
For fuck sake, 1984 is NOT an instruction manual!
__________
For fuck sake, 1984 is NOT an instruction manual!
__________
-
- Posts: 25278
- Joined: Wed Nov 30, 2016 6:50 am
- Location: Ohio
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
But... CORPORATIONS!!!! How else could we do anything?SilverEagle wrote:Hanarchy Montanarchy wrote:Maybe if we hadn't spent the last 40-50 years dismantling anti-trust laws, AWS wouldn't have so much power when it comes to the infrastructure of The Cloud, and the CIA would have to spread it's black budget around a little more.
-
- Posts: 2421
- Joined: Wed Nov 30, 2016 11:07 am
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
GrumpyCatFace wrote:But... CORPORATIONS!!!! How else could we do anything?SilverEagle wrote:Hanarchy Montanarchy wrote:Maybe if we hadn't spent the last 40-50 years dismantling anti-trust laws, AWS wouldn't have so much power when it comes to the infrastructure of The Cloud, and the CIA would have to spread it's black budget around a little more.
LOL!!!!RIGHT!!!!!!
There is a time for good men to do bad things.
For fuck sake, 1984 is NOT an instruction manual!
__________
For fuck sake, 1984 is NOT an instruction manual!
__________
-
- Posts: 12950
- Joined: Wed Nov 30, 2016 10:27 pm
- Location: The Great Place
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Spreading it around creates liabilities. Just using Amazon creates liabilities. They probably have Bezos' mom tied up in a bunker somewhere to make sure he behaves.
This has nothing to do with anti-trust. The CIA needs to die.
GrumpyCatFace wrote:Dumb slut partied too hard and woke up in a weird house. Ran out the door, weeping for her failed life choices, concerned townsfolk notes her appearance and alerted the fuzz.
viewtopic.php?p=60751#p60751
-
- Posts: 2421
- Joined: Wed Nov 30, 2016 11:07 am
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Organizations like the CIA never die. They transform/morph into something even more sinister.Okeefenokee wrote:
Spreading it around creates liabilities. Just using Amazon creates liabilities. They probably have Bezos' mom tied up in a bunker somewhere to make sure he behaves.
This has nothing to do with anti-trust. The CIA needs to die.
There is a time for good men to do bad things.
For fuck sake, 1984 is NOT an instruction manual!
__________
For fuck sake, 1984 is NOT an instruction manual!
__________
-
- Posts: 5991
- Joined: Thu Dec 01, 2016 1:54 am
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Maybe it do... maybe it do.Okeefenokee wrote:
Spreading it around creates liabilities. Just using Amazon creates liabilities. They probably have Bezos' mom tied up in a bunker somewhere to make sure he behaves.
This has nothing to do with anti-trust. The CIA needs to die.
But, it occurs to me that many, dare I say most, of our problems can be traced back to centralized, unaccountable concentrations of power.
Having been slandered as liberal more than once already, I may, unsurprisingly, believe more things have something to do with anti-trust laws than you.
HAIL!
Her needs America so they won't just take his shit away like in some pussy non gun totting countries can happen.
-Hwen
Her needs America so they won't just take his shit away like in some pussy non gun totting countries can happen.
-Hwen
-
- Posts: 4116
- Joined: Tue Nov 29, 2016 11:37 pm
Re: AMAZON CLOUD COMPUTING + CIA = NON-STORY
Government consolidation of power =Hanarchy Montanarchy wrote:Maybe it do... maybe it do.Okeefenokee wrote:
Spreading it around creates liabilities. Just using Amazon creates liabilities. They probably have Bezos' mom tied up in a bunker somewhere to make sure he behaves.
This has nothing to do with anti-trust. The CIA needs to die.
But, it occurs to me that many, dare I say most, of our problems can be traced back to centralized, unaccountable concentrations of power.
Having been slandered as liberal more than once already, I may, unsurprisingly, believe more things have something to do with anti-trust laws than you.
Corporate consolidation of power =
No man's life, liberty, or property are safe while the legislature is in session