ACCESSING PURGED WORKLOADS
    1.
    发明申请

    公开(公告)号:US20220391251A1

    公开(公告)日:2022-12-08

    申请号:US17303644

    申请日:2021-06-03

    IPC分类号: G06F9/50

    摘要: Examples described herein relate to a method and a system, for example, a workload controller, for accessing purged workloads. An alert indicative of an attempt to access a purged workload of workloads deployed in a workload environment may be received by the workload controller. The purged workload may include one or both of a deactivated workload or an archived workload. The workload controller may detect the attempt to access the purged workload based on port mirrored data traffic. Further, in some examples, the workload controller may activate the purged workload based on the alert.

    MANAGING A PUBLIC SERVICE ENDPOINT TO A WORKLOAD IN A PUBLIC CLOUD SYSTEM

    公开(公告)号:US20210029196A1

    公开(公告)日:2021-01-28

    申请号:US16520297

    申请日:2019-07-23

    IPC分类号: H04L29/08 H04L29/12

    摘要: Examples described relate to managing a public service endpoint to a workload in a public cloud system. In an example, a determination may be made whether a public service endpoint to a workload in a public cloud system has not been accessed for a pre-defined period of time. In response to a determination that the public service endpoint to the workload in the public cloud system has not been accessed for the pre-defined period of time, the public service endpoint to the workload may be deleted. In response to a determination that an alias service endpoint associated with the public service endpoint has been accessed, a new public service endpoint may be associated with the workload in the public cloud system. Access to the workload in the public cloud system may be allowed via the new public service endpoint.

    SECURE RESTORE OF A COMPUTING SYSTEM

    公开(公告)号:US20230011413A1

    公开(公告)日:2023-01-12

    申请号:US17454936

    申请日:2021-11-15

    IPC分类号: G06F11/14 G06F21/78

    摘要: Examples described herein relate to a method and a system, for example, a restore management system for providing secure restore of computing system. In some examples, the restore management system may determine that the computing system is restored. Further, the restore management system may isolate the computing system by restricting access to the computing system for any data traffic other than data traffic associated with a security fix to be applied to the computing system. Furthermore, the restore management system may determine that the security fix has been successfully applied to the computing system and, in response to determining that the security fix has been successfully applied, the restore management system may remove the computing system from isolation.

    Identifying a least cost cloud network for deploying a virtual machine instance

    公开(公告)号:US11216296B2

    公开(公告)日:2022-01-04

    申请号:US16387490

    申请日:2019-04-17

    IPC分类号: G06F9/455

    摘要: Virtual machine images available across a plurality of cloud networks may be identified. A catalog of the virtual machine images may be generated. The catalog may comprise, for each virtual machine image, a mapping information, comprising: a name of a virtual machine image, a name of a virtual machine instance based on the virtual machine image, a name of a cloud network providing the virtual machine image, a cost of deploying the virtual machine instance on the cloud network, a tag identifying a feature of the virtual machine image, and an identification tag assigned to the virtual machine image. For a given virtual machine instance, the catalog of the virtual machine images may be analyzed to identify a least cost cloud network.

    MANAGING A CONTAINERIZED APPLICATION IN A CLOUD SYSTEM BASED ON USAGE

    公开(公告)号:US20210026700A1

    公开(公告)日:2021-01-28

    申请号:US16522312

    申请日:2019-07-25

    IPC分类号: G06F9/50 G06F16/903 H04L29/08

    摘要: Examples described relate to managing a containerized application in a cloud system based on usage. In an example, a determination may be made whether a containerized application in a cloud system has not been used for a pre-defined period of time. In response to the determination, the containerized application may be deleted. The information related to the containerized application in a database may be stored in a database. In response to a future user request to access the containerized application, a new containerized application may be created in the cloud system based on the information related to the containerized application in the database. A new public service endpoint may be associated with the new containerized application in the cloud system. User access to the new containerized application in the cloud system may be allowed via the new public service endpoint.