摘要:
Systems and methods for key performance benchmarking may include receiving for a plurality of client devices of a tenant, a duration for performing a plurality of actions to log into a resource. The systems and methods can include determining metrics for each action of the plurality of actions. The systems and methods can include generating, by the one or more processors, one or more recommendations corresponding to at least one action of the plurality of actions, to reduce the duration to log into the resource.
摘要:
A virtual machine, such as a Java(TM) virtual machine, is configured to operate as a web server so that users, using a browser, can make general-purpose inquiries into the state of the virtual machine or, in some cases, mutate the state of the VM. A "browsable" VM contains a network traffic worker, such as an HTTP thread, a services library, and a VM operations thread, which is an existing component in most virtual machines. The network traffic worker and the VM operations thread communicate through a request data structure. The VM operations thread generates a reply to the request upon receiving a request data structure from the traffic worker. Such a reply can be in the form of an HTTP response containing HTML or XML pages. These pages are transmitted back to the browser/user by the network traffic worker.
摘要:
The present disclosure relates to a method and system for providing a pre-launched virtual desktop session by a smart scheduling server. The smart scheduling server predicts a pre-launch time to launch a virtual desktop session for a user based on a login pattern of the user monitored for a pre-defined duration, initiates a pre-launch session for the user based on the predicted pre-launch time, where the initiation comprises performing a plurality of actions for launching the virtual desktop session for the user. The smart scheduling server authenticates the user in the pre-launched initiated session based on pre-defined account credentials associated with the user, generates a security token for the user based on the authentication and provides a pre-launched virtual desktop session to the user when the user logs in to the virtual desktop session based on the security token.
摘要:
There is provided a method of resilient operation of a virtual network function (VNF) and a host platform configured to host VNF. The host platform comprises: first PMB configured to host first virtual platform (VP) with the help of first hypervisor, the first VP is configured, when the first hypervisor is in operational mode, to execute the VNF under primary VNF configuration; second PMB configured to host second VP with the help of second hypervisor with substantially less processing power than processing power of the first hypervisor, the second VP is configured, when the first hypervisor has failed, to execute the VNF under emergency VNF configuration. Second PMB is further configured to execute system controller operatively connected to first hypervisor, second hypervisor and I/O switch, the system controller configured to monitor status of first hypervisor and, responsive to a failure of first hypervisor, enable executing the VNF on second VP.
摘要:
The present disclosure discloses a method and a device for managing execution of scripts by a virtual computing unit configured in a host computing device. The method comprises configuring one or more ports for establishing a communication interface between the host computing device and a virtual computing unit, providing one or more scripts to be executed by the virtual computing device and one or more parameters to the virtual computing unit for execution receiving execution data from the virtual computing unit and monitoring execution of the one or more scripts based on the execution data received from the virtual computing unit. Thus, the host computing device manages execution of the one or more scripts by the virtual computing unit.
摘要:
A cloud computing environment consists of a cloud deployment platform and a cloud management server configured to manage a plurality of virtual machines deployed in a cloud infrastructure. When a request to deploy an application to the cloud infrastructure is received by the cloud deployment platform, application deployment errors are monitored and tracked. A unique identifier is generated for each virtual machine, and requests to instantiate the virtual machines in the cloud infrastructure are then transmitted. A log containing error records that identify the occurrence of deployment errors is monitored based on the generated virtual machine identifiers, where the deployment errors are detected by the cloud deployment platform or the cloud management server. Based on the monitoring, error messages are generated by the cloud deployment platform.
摘要:
Contention for shared resources in a shared resource environment may be determined based on measurements from a probe running in the shared resource environment. The measurements can be compared to benchmarks, and a contention value may be determined based on the comparison.
摘要:
Embodiments of the present invention provide a method for switching over a virtual application two-node cluster in a cloud environment, including: sending, by a cloud management platform, an association state of a shared EBS volume to the standby virtual machine; receiving a request for removing an association between the active virtual machine and the shared EBS volume sent by the standby virtual machine; removing the association between the active virtual machine and the shared EBS volume; receiving a request for associating the shared EBS volume sent by the standby virtual machine; and associating the standby virtual machine with the shared EBS volume so that the standby virtual machine controls the shared EBS volume. The embodiments of the present invention also provide a corresponding cloud management platform and system. A brain-split problem can be completely solved by using the method and an apparatus disclosed in the embodiments of the present invention. In addition, dependence on a reference active node is no longer required, which can simplify deployment of an application two-node cluster and improve reliability of the application two-node cluster.