摘要:
A cloud broker receives a request for processing resources from one of a plurality of cloud management infrastructures (each of which correspond to one of a plurality of clouds). The cloud broker selectively enables access to the clouds associated with each cloud management infrastructure. The clouds each comprise segregated computing environments having at least one server for executing tasks and a data store for data persistency attached to the at least one server. The cloud management infrastructures selectively starts and stops services executed by the corresponding cloud. After receiving the request, the cloud broker identifies which of the plurality of clouds coupled to the cloud broker has processing capacity to fulfill the request. Subsequently, the cloud broker enables access to at least one of the identified clouds having capacity to fulfill the request. Related apparatus, systems, techniques and articles are also described.
摘要:
The present disclosure involves systems, products, and methods for excluding inconsistent objects from lifecycle management processing. One method includes operations for identifying a set of objects in a system, at least a subset of the set of objects associated with a lifecycle management process; prior to performing the lifecycle management process, determining a consistency status for each object in the subset of objects associated with the lifecycle management process; and performing the lifecycle management process, wherein performing the lifecycle management process includes executing at least one lifecycle management operation on each object in the set of objects determined to be consistent within the system prior to performing the lifecycle management process. In some instances, performing the lifecycle management process may include skipping the execution of the at least one lifecycle management operation for each inconsistent object during the lifecycle management process.
摘要:
An application server in a multi-tenant computing system is enabled access to a first set of tables and views in a database according to a first schema. The views in the first schema correspond to a table in a second schema. Thereafter, the table in the second schema is modified to add a column. Views of the modified table as defined by the second schema are generated in a third schema so that the third schema defines a second set of tables and views in the database. Subsequently, access by the application server to the second set of tables and views in the database is enabled and access by the application server to the first set of tables and views in the database is prevented. Related apparatus, systems, techniques and articles are also described.
摘要:
Techniques are described in which at least one column is added to a table in a column-based database that has a plurality of columns and table fields. A shadow-in-place upgrade of the column-based database can be performed that adds at least one new column to the database. Thereafter, access to the column-based database can be seamlessly enabled before, during, and after the upgrade through a plurality of views. The views define a subset of the fields in the database that are visible. Related apparatus, systems, techniques and articles are also described.
摘要:
Availability of processing resources of client computing systems can be registered by a client virtual machine on each of the plurality of client computing systems with a cloud controller. Thereafter, the cloud controller selectively dispatches tasks to at least one of the client virtual machines based on availability of corresponding processing resources and a level of workload in at least one datacenter coupled to the cloud controller. Related apparatus, systems, techniques and articles are also described.
摘要:
Implementations of the present disclosure provide for automation of manual tasks executed on an application server. Implementations include generating a manual action request at the application server, the manual action request including at least one parameter, transmitting the manual action request to an administrator computer, determining that an automation module corresponding to the manual action request exists within a database based on the at least one parameter, providing the automation module to the application server, and executing the automation module on the application server to resolve a task corresponding to the manual action request.
摘要:
Methods and systems are directed to controlling access to data in a production environment. Production data may be stored in a production database and test data may be stored in a test database. A production application may have access only to the data in the production database while a test application may have access to both the production database and the test database. The test application may have read-only access to the production database and read-write access to the test database. Data in the test database may be handled differently than data in the production database. A type of data may be associated with a range of valid values. The values assigned to the elements may differ depending on whether the elements are stored in the production database or the test database.
摘要:
The various embodiments herein include at least one of systems, methods, and software that operate to replicate structural changes made to a master database to a replicate database. In some such embodiments, changes made to a master database are identified and a representation thereof is provided to a process that implements such changes in the replicate database. The structural changes are then replicated in the replicate database.
摘要:
An upgrade procedure for an application system without downtime is presented. The upgrade procedure includes a mix of a rolling upgrade of application servers, shadow systems, and record and replay mechanisms that employ transformation and locking, for the upgrade of the applications on the application system. Application servers are upgraded one after another. A target version of the system is simultaneously added to the original system and a shadow, or target, system. Data changes are not only carried out in the original system, but are also carried out in the target system, so that a customer realizes no downtime for their data requests to the applications.
摘要:
An upgrade of a first version of a database application to a second version of a database application that both have a same data schema is initiated. The first database application has a first access schema such that at least one table in the data schema is linked to the first access schema. The second version of the database application has a second access schema such that at least one table in the data schema is linked to the second access schema. Subsequently, concurrent access is provided for each access schema to at least one database table in the data schema to the first and second versions of the database application. The concurrent access is enabled by a respective at least one table link object in each of the first access schema and the second access schema that is used by database views or stored procedures such access schema.