-
公开(公告)号:US20240362078A1
公开(公告)日:2024-10-31
申请号:US18308848
申请日:2023-04-28
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Michael Browne
IPC: G06F9/50
CPC classification number: G06F9/5072 , G06F9/5027 , G06F2209/503 , G06F2209/505
Abstract: A computing device determines that an executing first operator process is to be upgraded to a second operator process in an upgrade process, wherein the first operator process maintains on a cluster of compute nodes a desired identified state of an application. The computing device prior to initiating the second operator process, determines that the upgrade process will cause an initiation of a new container of the application to replace an existing container of the application. The computing device determines that an upgrade mode associated with the first operator process is a rolling upgrade mode, wherein the existing container and the new container will execute concurrently for a period of time. The computing device makes a determination whether computing resources needed to execute the existing container and the new container concurrently are available. The computing device takes an upgrade request action based on the determination.
-
12.
公开(公告)号:US12020006B2
公开(公告)日:2024-06-25
申请号:US17743650
申请日:2022-05-13
Applicant: RED HAT, INC.
Inventor: Cathal O'Connor , Brian Gallagher
Abstract: A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein. For example, a system can build an image file that includes a stacked arrangement of layers configured for deploying a software program within a container. The stacked arrangement of layers can include a lower layer including one or more objects. The stacked arrangement of layers can include an upper layer positioned above the lower layer, where the upper layer includes the software program. And the stacked arrangement of layers can include a shim layer positioned between the lower layer and the upper layer. The shim layer can include a shim, which is configured to intercept calls involving the one or more objects from the software program and responsively allow or reject the calls based on control data.
-
公开(公告)号:US20240202319A1
公开(公告)日:2024-06-20
申请号:US18083324
申请日:2022-12-16
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathat O'Connor
CPC classification number: G06F21/54 , G06F21/57 , G06F21/604
Abstract: Systems and methods comprising at least one node comprising an application container; a container image associated with the application container; a static analyzer module deployed to analyze the container image, with instructions configured to autonomously parse, code of an application, during compile time of the application, wherein the application is to be deployed in the application container; determine, based on the parsing, for at least one section of the code, at least one module necessary for execution of the at least one section; annotate, the at least one section of the code, based on the determined at least one module; and inject, at least one wrapper around the at least one section of the code, wherein the wrapper adds at least one restriction to an execution of the at least one section at runtime, wherein the restrictions are based on at least one condition.
-
公开(公告)号:US11989542B2
公开(公告)日:2024-05-21
申请号:US17518902
申请日:2021-11-04
Applicant: Red Hat, Inc.
Inventor: Cathal O'Connor , Brian Gallagher
CPC classification number: G06F8/61 , G06F9/5027
Abstract: Processing logic may obtain a resource of a platform fora containerized application. The platform may include custom resources, and an operator that manages the custom resources during runtime of the containerized application. In response to an indication being defined in the resource, processing logic may schedule an upgrade to a new operator. Processing logic may perform one or more pre-installation actions or post-installation actions that are defined in the resource to manage the installation of the new operator in a controlled manner and reduce the risk of incompatibilities between the new operator and the custom resources.
-
公开(公告)号:US11900158B2
公开(公告)日:2024-02-13
申请号:US17167806
申请日:2021-02-04
Applicant: Red Hat, Inc.
Inventor: Michael Gerard Ryan , Brian Gallagher
CPC classification number: G06F9/4881 , G06F8/70 , G06F9/5038 , G06F21/31 , G06F2209/482
Abstract: Task permissions for software services can be set in a distributed computing environment according to some examples described herein. In one example, a system can determine software services that are included in software products deployable to a user account of a distributed computing environment. The system can determine task permissions to be set in the user account for allowing the software services to execute tasks in the distributed computing environment. The system can generate a list of task permissions by consolidating the task permissions based on predefined rules. The system can then transmit an output indicating the list of task permissions for causing the user account to be configured based on the list of task permissions, to permit the software services to execute the tasks in the distributed computing environment.
-
公开(公告)号:US20230254265A1
公开(公告)日:2023-08-10
申请号:US17592851
申请日:2022-02-04
Applicant: Red Hat, Inc.
Inventor: Cathal O’Connor , Brian Gallagher
IPC: H04L47/762 , H04L47/78 , H04L47/70 , H04L9/32
CPC classification number: H04L47/762 , H04L9/3236 , H04L9/3247 , H04L47/781 , H04L47/822 , H04L47/828
Abstract: Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.
-
公开(公告)号:US20220244989A1
公开(公告)日:2022-08-04
申请号:US17167806
申请日:2021-02-04
Applicant: Red Hat, Inc.
Inventor: Michael Gerard Ryan , Brian Gallagher
Abstract: Task permissions for software services can be set in a distributed computing environment according to some examples described herein. In one example, a system can determine software services that are included in software products deployable to a user account of a distributed computing environment. The system can determine task permissions to be set in the user account for allowing the software services to execute tasks in the distributed computing environment. The system can generate a list of task permissions by consolidating the task permissions based on predefined rules. The system can then transmit an output indicating the list of task permissions for causing the user account to be configured based on the list of task permissions, to permit the software services to execute the tasks in the distributed computing environment.
-
公开(公告)号:US12200004B2
公开(公告)日:2025-01-14
申请号:US17660502
申请日:2022-04-25
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
Abstract: Disclosed are systems and methods for scanning a client codebase for vulnerabilities without exposing the client information. An example method includes receiving, from a client computing device, a scan request to scan a set of encrypted client information to identify vulnerabilities applicable to the client information. The method also includes responsive to the scan request, analyzing, by a processing device, the encrypted client information to generate scan results that identify vulnerabilities applicable to the client information, wherein the analyzing is performed without decrypting the client information. The method also includes returning the scan results to the client, wherein the scan results are in encrypted form when the scan results are generated.
-
公开(公告)号:US20240211323A1
公开(公告)日:2024-06-27
申请号:US18069733
申请日:2022-12-21
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
CPC classification number: G06F9/541 , G06F8/65 , G06F21/629
Abstract: One example can include a system that can determine that a subset of containers in a distributed computing environment have characteristics that match a predefined set of shim injection criteria. The system can then inject respective copies of a shim into the subset of containers, while the subset of containers are running in the distributed computing environment. Each respective copy of the shim may be configured to intercept calls between software programs in a corresponding container.
-
公开(公告)号:US20240143364A1
公开(公告)日:2024-05-02
申请号:US17974154
申请日:2022-10-26
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
CPC classification number: G06F9/45558 , G06F8/63 , G06F2009/45562
Abstract: A method of generating container image snapshots includes scanning one or more worker nodes of a container cluster to generate an image set describing container images loaded onto the one or more worker nodes. The method also includes analyzing, by a processing device, the image set to generate an image manifest comprising at least some of the container images in the image set. The method also includes generating a snapshot from the image manifest, wherein the snapshot describes a set of container images to be used to build a new worker node. The method also includes storing the snapshot in a local memory of the container cluster. The method also includes, responsive to an instruction to provision the new worker node, loading the set of container images from the local memory to the new worker node and building a container for each of the container images in the set.
-
-
-
-
-
-
-
-
-