摘要:
One embodiment of a computer-implemented method for managing computing resources may include determining, by a computer, target computing resources to be configured with a platform. A determination, by the computer, may be made as to whether the target computing resources includes a management agent for managing the platform. The computer may cause a management agent to be installed on the target computing resources if the target computing resources are determined to not include a management agent, otherwise, the computer may not cause a management agent to be installed on the target computing resources. The computer may instruct the management agent to commission the platform on the target computing resources.
摘要:
Errors occurring on a hardware bus of a hypervisor-based system may be handled in software monitors in the hypervisor-based system. When an error occurs, guest partitions on the hypervisor-based system may be notified of the error through a monitor executing in each guest partition. Only guest partitions affected by the error may be shut down or provided other instructions for taking an action in response to the error.
摘要:
Systems and methods for obtaining access to a database file managed by an operating system in a computing system are disclosed. One method includes transmitting a call to an operating system from a database management system, the call requesting access to a database file. The method also includes receiving an address from the operating system at the database management system. The address represents a general address of the database file managed by the operating system. The method further includes transmitting a call to the operating system from the database management system, which includes an address and a size of a view of the database file to be created. The method also includes receiving an address of the view of the database file from the operating system.
摘要:
A web interface may generate reports regarding changes in user security parameters in a computer network. The report may ease administrator's duties analyzing log files to determine the modifications to user accounts. The administrator may be presented with an option to revert a user to a prior state of user security parameters. Thus, the interface provides the administrator the ability to generate reports and modify user accounts from a single web page.
摘要:
An agentless monitor may monitor a remote server through a communication session. The monitor may transmit commands for execution on the remote server by a simulated user. Results from the executed commands may be returned to the agentless monitor for parsing and execution of logical rules. The agentless monitor may be used, for example, to identify and terminate looping processes executing on the remote server before failure or performance degradation of the remote server.
摘要:
A list of alert filters may be used to alert alerts generated by remote machines. For example, received alerts may be compared to the list of alert filters. When an alert filter matches the received alert, a new action may be taken by the monitoring agent, such as to raise or lower a priority of the alert or to take an action to message an administrator. When no alert filter matches the alert, a default action for the alert may be taken.
摘要:
Systems and methods for operating a database in system memory within a virtual partition are described. One system includes one or more host computing systems, each host computing system including at least one execution core and a system memory. The system includes a plurality of virtual partitions executing on the one or more host computing systems and including a first partition having at least a portion of the system memory associated with at least one of the one or more host computing systems and configured to store a database therein. The system also includes an interconnect layer communicatively connecting the plurality of virtual partitions, the interconnect layer providing a programming interface by which direct memory access operations between partitions are coordinated. In response to database commands received at the first partition, the data stored in the database is provided to a requesting partition a direct memory access operation.
摘要:
A client system may be configured to request a certificate from a server system and store the certificate locally. The stored certificate may be used to later authenticate a secure connection between the client system and the server system. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection.
摘要:
Databases may be copied to a shadow database on amass storage device. The structure of the files containing the database, such as blocking information and a dump history, may be copied in whole to the mass storage device. The method may include creating a shadow database on a mass storage device, populating the shadow database with data from a production database, idling an application accessing the production database to create an idle point in the production database, and updating the shadow database to the production database.
摘要:
Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure using a fabric manager. A fabric manager managing computing resources in one or more platforms and one or more partitions residing on the platform by monitoring each platform and partitions, and issuing instructions to a hypervisor or other management agent on a platform to execute one or more platform management commands, such as commission a new partition onto a platform.