-
公开(公告)号:US20220391251A1
公开(公告)日:2022-12-08
申请号:US17303644
申请日:2021-06-03
发明人: Thavamaniraja Sakthivel , Siva Subramaniam Manickam , Vinnarasu Ganesan , Sriram Padmachetty Harinath
IPC分类号: G06F9/50
摘要: Examples described herein relate to a method and a system, for example, a workload controller, for accessing purged workloads. An alert indicative of an attempt to access a purged workload of workloads deployed in a workload environment may be received by the workload controller. The purged workload may include one or both of a deactivated workload or an archived workload. The workload controller may detect the attempt to access the purged workload based on port mirrored data traffic. Further, in some examples, the workload controller may activate the purged workload based on the alert.
-
公开(公告)号:US20220103580A1
公开(公告)日:2022-03-31
申请号:US17302017
申请日:2021-04-21
摘要: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.
-
公开(公告)号:US20190188094A1
公开(公告)日:2019-06-20
申请号:US15847261
申请日:2017-12-19
发明人: Balaji Ramamoorthi , Siva Subramaniam Manickam , Vinnarasu Ganesan , Thavamaniraja Sakthivel , Saravana Prabu
CPC分类号: G06F11/203 , G06F11/1662 , G06F11/2023 , G06F2201/805 , G06F2201/82
摘要: In one example, mapping information corresponding to a container running on a private data center may be generated in a public cloud by a processor-based disaster recovery manager. Further, volume data associated with the container may be synchronized to the public cloud based on the mapping information by the disaster recovery manager. Furthermore, a failure of the container running on the private data center may be determined by the disaster recovery manager. In response to the failure of the container running on the private data center, the container may be deployed in the public cloud using the synchronized volume data and the mapping information by the disaster recovery manager.
-
公开(公告)号:US20230115795A1
公开(公告)日:2023-04-13
申请号:US18053174
申请日:2022-11-07
IPC分类号: H04L43/0817 , G06F9/50 , H04L43/00 , H04L43/20 , H04L9/40
摘要: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.
-
公开(公告)号:US11216296B2
公开(公告)日:2022-01-04
申请号:US16387490
申请日:2019-04-17
IPC分类号: G06F9/455
摘要: Virtual machine images available across a plurality of cloud networks may be identified. A catalog of the virtual machine images may be generated. The catalog may comprise, for each virtual machine image, a mapping information, comprising: a name of a virtual machine image, a name of a virtual machine instance based on the virtual machine image, a name of a cloud network providing the virtual machine image, a cost of deploying the virtual machine instance on the cloud network, a tag identifying a feature of the virtual machine image, and an identification tag assigned to the virtual machine image. For a given virtual machine instance, the catalog of the virtual machine images may be analyzed to identify a least cost cloud network.
-
公开(公告)号:US20210026700A1
公开(公告)日:2021-01-28
申请号:US16522312
申请日:2019-07-25
发明人: Siva Subramaniam Manickam , Thavamaniraja Sakthivel , Vinnarasu Ganesan , Balaji Balaji Ramamoorthi
IPC分类号: G06F9/50 , G06F16/903 , H04L29/08
摘要: Examples described relate to managing a containerized application in a cloud system based on usage. In an example, a determination may be made whether a containerized application in a cloud system has not been used for a pre-defined period of time. In response to the determination, the containerized application may be deleted. The information related to the containerized application in a database may be stored in a database. In response to a future user request to access the containerized application, a new containerized application may be created in the cloud system based on the information related to the containerized application in the database. A new public service endpoint may be associated with the new containerized application in the cloud system. User access to the new containerized application in the cloud system may be allowed via the new public service endpoint.
-
公开(公告)号:US20200341881A1
公开(公告)日:2020-10-29
申请号:US16396573
申请日:2019-04-26
摘要: Examples described relate to determining a future operation failure in a cloud system. In an example, a historical utilization of resources for performing an operation in a cloud system may be determined. A current utilization of resources in the cloud system may be determined. Based on the historical utilization of resources for performing the operation in the cloud system and the current utilization of resources in the cloud system, a determination may be made whether a future performance of the operation in the cloud system is likely to be a failure. In response to a determination that the future performance of the operation in the cloud system is likely to be a failure, an alert may be generated.
-
公开(公告)号:US11496499B2
公开(公告)日:2022-11-08
申请号:US17302017
申请日:2021-04-21
摘要: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.
-
公开(公告)号:US20210029196A1
公开(公告)日:2021-01-28
申请号:US16520297
申请日:2019-07-23
摘要: Examples described relate to managing a public service endpoint to a workload in a public cloud system. In an example, a determination may be made whether a public service endpoint to a workload in a public cloud system has not been accessed for a pre-defined period of time. In response to a determination that the public service endpoint to the workload in the public cloud system has not been accessed for the pre-defined period of time, the public service endpoint to the workload may be deleted. In response to a determination that an alias service endpoint associated with the public service endpoint has been accessed, a new public service endpoint may be associated with the workload in the public cloud system. Access to the workload in the public cloud system may be allowed via the new public service endpoint.
-
公开(公告)号:US20180241614A1
公开(公告)日:2018-08-23
申请号:US15888620
申请日:2018-02-05
IPC分类号: H04L12/24 , H04L12/707 , H04L29/08
CPC分类号: H04L41/0663 , H04L41/147 , H04L45/22 , H04L67/16
摘要: In one example in accordance with the present disclosure, a priority is determined for each element in a plurality of elements connected to a network. The plurality of elements may include a source element, a destination element and a first element selected for downtime. A reliability index is determined for each element in the plurality of elements and a plurality of alternate paths between the source element and destination element are determined, each alternate path including a corresponding plurality of elements. For each alternate path in the plurality, a total utilization of the corresponding plurality of elements of the alternate path may be determined for each of a plurality of time slots and a best time slot to be used as a time period for the downtime of the first element may be determined based on the total utilizations.
-
-
-
-
-
-
-
-
-