-
公开(公告)号:US20190235605A1
公开(公告)日:2019-08-01
申请号:US15882906
申请日:2018-01-29
发明人: Margarit Simeonov CHENCHEV , Benjamin M. SCHULTZ , Paresh MAISURIA , Hari R. PULAPAKA , Ankit SRIVASTAVA , Graham WONG
CPC分类号: G06F1/3234 , G06F8/60 , G06F9/44505 , G06F9/45558 , G06F2009/45591
摘要: Deploying containers constrained by power profiles on a host system. A method includes identifying a container template, a set of reusable stored characteristics, to be used for deploying a container instance. The method further includes obtaining a power profile, defining at least one power consumption threshold, for the container instance based on at least one of the set of reusable stored characteristics of the container template or other information about the container instance. The method further includes deploying the container instance on the host system by applying the set of reusable stored characteristics and the power profile by applying one or more configuration layers which causes power to the container instance to be at least one of regulated or monitored based on information in the power profile.
-
公开(公告)号:US20210182078A1
公开(公告)日:2021-06-17
申请号:US16716467
申请日:2019-12-16
发明人: Axel RIETSCHIN , Margarit Simeonov CHENCHEV , Frederick J. SMITH, IV , Benjamin M. SCHULTZ , Hari R. PULAPAKA
IPC分类号: G06F9/4401 , G06F9/445 , G06F21/53 , G06F16/188 , G06F16/16
摘要: A layered composite boot device, and a corresponding layered composite file system, can be implemented by a boot manager. Requests directed to the layered composite boot device and file system, can be serviced from a primary device and file system that are encapsulated by the layered composite boot device and file system. The primary device and file system can correspond to a virtualized file system within a container environment, thereby enabling changes within the container environment to affect early stages of operating system booting in the container environment. Should such requests not be serviceable from the primary layers, the composite device and file system can comprise secondary layers that can correspond to a container host connection and the host file system, providing fallback to existing data if changes within the container environment were not made, thereby enabling booting to proceed in a traditional manner.
-
公开(公告)号:US20220334848A1
公开(公告)日:2022-10-20
申请号:US17724356
申请日:2022-04-19
发明人: Axel RIETSCHIN , Margarit Simeonov CHENCHEV , Frederick J. SMITH, IV , Benjamin M. SCHULTZ , Hari R. PULAPAKA
IPC分类号: G06F9/4401 , G06F16/16 , G06F16/188 , G06F9/445 , G06F21/53
摘要: A layered composite boot device, and a corresponding layered composite file system, can be implemented by a boot manager. Requests directed to the layered composite boot device and file system, can be serviced from a primary device and file system that are encapsulated by the layered composite boot device and file system. The primary device and file system can correspond to a virtualized file system within a container environment, thereby enabling changes within the container environment to affect early stages of operating system booting in the container environment. Should such requests not be serviceable from the primary layers, the composite device and file system can comprise secondary layers that can correspond to a container host connection and the host file system, providing fallback to existing data if changes within the container environment were not made, thereby enabling booting to proceed in a traditional manner.
-
公开(公告)号:US20190180033A1
公开(公告)日:2019-06-13
申请号:US15894745
申请日:2018-02-12
发明人: Bryan R. BORN , Giridhar VISWANATHAN , Peteris LEDINS , Balaji BALASUBRAMANYAN , Margarit Simeonov CHENCHEV , Benjamin M. SCHULTZ , Hari R. PULAPAKA , Frederick Justus SMITH , Narasimhan RAMASUBRAMANIAN , Raphael GIANOTTI SERRANO DOS SANTO , Nived KALAPPURAIKAL SIVADAS , Ravinder THIND , Matthew David KURJANOWICZ
摘要: Securely performing file operations. A method includes determining a trust characteristic assigned to a file. When the trust characteristic assigned to the file meets or exceeds a predetermined trust condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the container operating system. When the trust characteristic assigned to the file does not meet or exceed the predetermined trust condition, then the method includes performing the file operation on the file in the container operating system while preventing the file operation from being performed directly in the host operating system.
-
公开(公告)号:US20190050560A1
公开(公告)日:2019-02-14
申请号:US15857585
申请日:2017-12-28
发明人: Yolando PEREIRA , Margarit Simeonov CHENCHEV , Giridhar VISWANATHAN , Constantin Sorin OPREA , John Andrew STARKS , Kyle Patrick SABO , Douglas Evan COOK , Seth Christopher BEINHART , Charles Glenn JEFFRIES , Ankit SRIVASTAVA , Benjamin M. SCHULTZ , Hari R. PULAPAKA
摘要: The techniques described herein enable client APIs to be deployed within isolated computing environments while externally exposing and/or maintaining a log of computing events that the client APIs perform and/or attempt to perform within the isolated computing environments. Generally described, configurations disclosed herein enable audit parameters associated with client application programming interfaces (APIs) to be deployed within an isolated computing environment to generate a log of computing events performed by the client APIs. Ultimately, access to the log of computing events is provided externally to the isolated computing environment without exposing sensitive computing resources (e.g., a host operating system (OS)) to the various client APIs.
-
公开(公告)号:US20180349629A1
公开(公告)日:2018-12-06
申请号:US15871635
申请日:2018-01-15
发明人: Margarit Simeonov CHENCHEV , Benjamin M. SCHULTZ , Giridhar VISWANATHAN , Balaji BALASUBRAMANYAN , Yanan ZHANG , Frederick Justus SMITH , Hari R. PULAPAKA , David WESTON
摘要: Technologies are described for selective persistence of data utilized by software containers. A configuration policy is defined that includes data that specifies one or more data stores for which data is not to be persisted following accesses to a software container and one or more data stores for which data is to be persisted following accesses to the software container. When the software container is first accessed, the data stores identified in the configuration policy are attached to the software container. Upon a subsequent access to the container, such as at the conclusion of a user session or upon destruction of the container, the data in the attached data stores is persisted or deleted based upon the configuration policy. When the software container is once again accessed, the data store containing the persisted data can be re-attached to the software container.
-
-
-
-
-