Abstract:
A system and method for cluster-wide replication of embedded component configuration. In accordance with an embodiment, the system comprises an application server acting as a host and including one or more embedded components. When the configuration of an embedded component is modified from its original configuration, a configuration replication logic and deployment interface determines one or more appropriate configuration commands which, if executed at a target application server instance, for example, at another application server instance within a cluster, would result in an equivalent change in the state of an embedded component at that instance. The configuration commands are packaged within a configuration archive as one or more command payloads, which are distributed to target instances, and invoked on an embedded component thereon, to synchronize the configuration of the embedded components at the target instances with that of the host.
Abstract:
In response to a request to replicate resources from a primary region data center to a secondary region data center, an executable configuration file that describes the resources and their configuration is created utilizing information about the resources at the primary region data center. A correspondence table is also updated to include entries for to such resources. Utilizing the correspondence table, the executable configuration file is transformed to create a transformed executable configuration file that references the resources utilizing generic resource identifiers instead of primary region identifiers used within the primary region data center. The transformed executable configuration file is then executed at the secondary region data center to create replicated resources at the secondary region data center.
Abstract:
Techniques described herein relate to authorization between integrated cloud products. An example includes receiving, by a computing device and from a first resource, a first request for permission to access a certificate to verify a requestor's identity. The computing device can transmit a second request to a second resource to authorize permitting access to the certificate. The computing device can receive a response from the second resource comprising an authorization to permit access to the certificate. The computing device can grant permission to the first resource to access the certificate, wherein the first resource is configured to verify the requestor's identity based on accessing the certificate. The computing device can receive a third request from the first resource to generate an association object between the first resource and the certificate. The computing device can generate the association object, wherein the association object associates the first resource and the certificate.
Abstract:
Described herein are systems and methods that can support bridging VCNs in a manner which addresses customer needs with respect to access mechanisms, connectivity, regional availability, service complexity, and customer isolation/security. The system and methods that can support bridging VCNs as described herein have particular utility with respect to providing etcd-as-a-Service. In particular embodiments virtual network interface (VNIC) features are used to implement a bridge between a subnet of an etcd VCN and a subnet of a customer VCN in order to bridge the subnets.
Abstract:
A system and method can support a hybrid application development environment. The system can provision a framework instance for a dynamic module system in the application runtime environment. Furthermore, the system can associate a host application in the application runtime environment with a system bundle in the dynamic module system, wherein an application class loader can be used to load the framework instance when the host application is started/loaded. Then, the host application can export one or more resources associated with the host application to the dynamic module system, and/or consume one or more services provided by the dynamic module system.
Abstract:
In response to a request to replicate resources from a primary region data center to a secondary region data center, information is obtained about first resources at the primary region data center and second resources at the secondary region data center. An executable configuration file that references the resources utilizing generic resource identifiers instead of primary region identifiers used within the primary region data center is created. The executable configuration file is then executed at the secondary region data center to create replicated resources at the secondary region data center.
Abstract:
When a cloud services provider infrastructure (CSPI) receives a request from an administrator to perform an operation on an appliance, a load balancer may select a first server within the CSPI to process the request. If the first server does not have a connection with the appliance, the first server may generate a redirect response that includes server identification information identifying a particular server having a pre-established connection with the appliance. The first server may send the redirect response to the application that the administrator used to send the request. The application may then generate a second request that includes the server identification information, and send the second request to the CSPI. A load balancer in the CSPI may then forward the second request to the particular server, and the particular server may use the pre-established connection to send a request to the appliance requesting performance of the operation.
Abstract:
A system and method for cluster-wide replication of embedded component configuration. In accordance with an embodiment, the system comprises an application server acting as a host and including one or more embedded components. When the configuration of an embedded component is modified from its original configuration, a configuration replication logic and deployment interface determines one or more appropriate configuration commands which, if executed at a target application server instance, for example, at another application server instance within a cluster, would result in an equivalent change in the state of an embedded component at that instance. The configuration commands are packaged within a configuration archive as one or more command payloads, which are distributed to target instances, and invoked on an embedded component thereon, to synchronize the configuration of the embedded components at the target instances with that of the host.
Abstract:
A system and method can support a hybrid application development environment. The system allows a client application in the application runtime environment to obtain a reference to a framework instance for a dynamic module system. Furthermore, the system can configure a bundle in the dynamic module system to be a gateway bundle based on the framework instance, and the client application can access the dynamic module system using the gateway bundle.
Abstract:
In response to a request to replicate resources from a primary region data center to a secondary region data center, an executable configuration file that describes the resources and their configuration is created utilizing information about the resources at the primary region data center. A correspondence table is also updated to include entries for to such resources. Utilizing the correspondence table, the executable configuration file is transformed to create a transformed executable configuration file that references the resources utilizing generic resource identifiers instead of primary region identifiers used within the primary region data center. The transformed executable configuration file is then executed at the secondary region data center to create replicated resources at the secondary region data center.