SECURE CONTAINERIZED USER SPECIFIC ISOLATED DATA STORAGE

    公开(公告)号:US20180357447A1

    公开(公告)日:2018-12-13

    申请号:US15619101

    申请日:2017-06-09

    Applicant: Red Hat, Inc.

    Abstract: Secure containerized user specific isolated data storage is disclosed. For example, a first isolated guest is instantiated, including a first account specific database with a write-protected schema, a write-protected first lower storage layer and a first upper storage layer. A first account is authenticated with the first isolated guest. A first change to the first account specific database is saved in the first upper storage layer based on executing a first database command from the first account. A second isolated guest is instantiated, including a second account specific database with the write-protected schema, a write-protected second lower storage layer and a second upper storage layer. The second account is authenticated with the second isolated guest. A second change to the second account specific database is saved in the second upper storage layer based on executing the second database command from the second account.

    ON DEMAND DATA VOLUME PROVISIONING
    82.
    发明申请

    公开(公告)号:US20180351870A1

    公开(公告)日:2018-12-06

    申请号:US15608264

    申请日:2017-05-30

    Applicant: Red Hat, Inc.

    Abstract: On demand data volume provisioning is disclosed. For example, a first memory accessible to first and second accounts stores a temporary directory. Physically separate second and third memories are across a network from the first memory. The first account requests to create a first file in the temporary directory. A first storage controller creates a first storage layer assigned to the first account in the second memory linked to the temporary directory. The first file is stored on the first storage layer and first metadata associated with the first storage layer is updated. The second account requests to create a second file in the temporary directory. A second storage controller creates a second storage layer assigned to the second account in the third memory linked to the temporary directory. The second file is stored on the second storage layer and second metadata associated with the second storage layer is updated.

    OPTIMIZING CI USING CODE REVIEW QUALITY
    83.
    发明申请

    公开(公告)号:US20180349789A1

    公开(公告)日:2018-12-06

    申请号:US15608585

    申请日:2017-05-30

    Applicant: Red Hat, Inc.

    Abstract: A system and method for optimizing CI using code review quality includes a memory, a processor in communication with the memory, a classifier executing on the processor, a high priority integration queue, and a low priority integration queue. In an example, the classifier may receive pull requests for code changes and determine reliability factors. The classifier may also determine a reliability value of the pull requests based on the reliability factors and classify each of the pull requests into a classification, such as a trusted classification and an untrusted classification. Then, the classifier sends the pull requests in the trusted classification to the high priority integration queue and the pull requests in the untrusted classification to the low priority integration queue.

    FAST AND GREEDY SCHEDULING MACHINE BASED ON A DISTANCE MATRIX

    公开(公告)号:US20180349174A1

    公开(公告)日:2018-12-06

    申请号:US15608234

    申请日:2017-05-30

    Applicant: Red Hat, Inc.

    CPC classification number: G06F9/4843 G06F9/45558 G06F2009/4557

    Abstract: A method for scheduling containers includes receiving attribute values for every node, generating location metrics for each node based on each node's attribute values, generating distance values, including a first distance value corresponding to the distance between a first node and second node. Each distance value represents the distance between respective location metrics for respective nodes. A distance matrix is populated with the distance values. The scheduler initiates an attempt to schedule a container at the first node, compares attribute requirements of the container to the first attribute values, and determines that at least one of the attribute requirements of the container exceeds a respective attribute value of the first attribute values. The second node is selected from the distance matrix based on the first distance value, and the scheduler initiates an attempt to schedule the container at the second node selected from the distance matrix.

    SESSION KEY EXCHANGE AS A SERVICE
    85.
    发明申请

    公开(公告)号:US20180343115A1

    公开(公告)日:2018-11-29

    申请号:US15604586

    申请日:2017-05-24

    Applicant: Red Hat, Inc.

    Abstract: An example method may include receiving, at a session key service, a first session key and a first public key of a client device to be authenticated to a web server. The first session key being encrypted by the client device using a second public key of the web server. The web server is a subscriber of the session key service hosted in a cloud-based environment. The method may also include decrypting, using a first private key of the web server, the first session key to obtain a plaintext session key, encrypting the plaintext session key using the first public key of the client device to generate a second session key, and sending the second session key to the web server to facilitate a decryption of the second session key by the client device for an authentication of the client device to the web server.

    REDUCING OVERLAY NETWORK OVERHEAD ACROSS CONTAINER HOSTS

    公开(公告)号:US20180331969A1

    公开(公告)日:2018-11-15

    申请号:US15593744

    申请日:2017-05-12

    Applicant: Red Hat, Inc.

    Abstract: A system for reducing overlay network overhead includes a memory, a processor in communication with the memory, a first container and a second container running on a first host, and a container scheduler executing on the processor. Each of the first container and second container expose a network service port(s). The container scheduler executes on the processor to assign a network complexity weight to the first host. The network complexity weight is based on a quantity of network service ports that the first container and the second container expose. The container scheduler also filters hosts based on resource availability corresponding to each host and ranks the hosts based on a respective network complexity weight corresponding to each host. Additionally, the container scheduler dispatches a third container to a second host based on the resource availability and network complexity weight corresponding to the second host.

    COOPERATIVE CLOUD INFRASTRUCTURE USING BLOCKCHAINS FOR HARDWARE OWNERSHIP AND ACCESS

    公开(公告)号:US20180314539A1

    公开(公告)日:2018-11-01

    申请号:US15497429

    申请日:2017-04-26

    Applicant: Red Hat, Inc.

    Abstract: A system includes a memory, a processor in communication with the memory, a hypervisor executing on the processor, a pool of hypervisor resources, and a cloud-sharing module (CSM). The CSM runs in a kernel to assign an anonymous identity to a hypervisor resource from the pool of hypervisor resources. The CSM broadcasts a transaction for the hypervisor resource and determines which provider owns the hypervisor resource. A first provider is associated with a second anonymous identity and a second provider is associated with a third anonymous identity. Additionally, the CSM receives mining information that includes a block associated with the transaction, where the block is part of a blockchain. The CSM completes the transaction for the first anonymous identity associated with the hypervisor resource between the second anonymous identity and the third anonymous identity.

    CATEGORIZING COMPUTING PROCESS OUTPUT DATA STREAMS FOR FLASH STORAGE DEVICES

    公开(公告)号:US20180203635A1

    公开(公告)日:2018-07-19

    申请号:US15405822

    申请日:2017-01-13

    Applicant: Red Hat, Inc.

    CPC classification number: G06F3/061 G06F3/0659 G06F3/0683

    Abstract: Categorizing computing process output data streams for flash storage devices is disclosed. A first computing process characteristic of a first computing process that generates a first output data stream is determined. A structure that correlates the first computing process characteristic to a first stream identifier is accessed. A first filter driver is associated with the first computing process to configure the first filter driver to receive the first output data stream. The first filter driver is associated with a flash storage device. The first stream identifier is sent to the first filter driver.

    Executing code referenced from a microservice registry

    公开(公告)号:US10013275B2

    公开(公告)日:2018-07-03

    申请号:US15354420

    申请日:2016-11-17

    Applicant: Red Hat, Inc.

    CPC classification number: G06F9/5055 H04L67/10

    Abstract: Methods and systems for executing code referenced from a microservice registry are disclosed. For example, a microservice registry is stored in a memory. The microservice registry includes references to a plurality of microservices including a first microservice. An isolated guest executing on one or more processors receives a request to execute an executable code and determines that the executable code is unavailable in the first isolated guest. The isolated guest determines that, based on the microservice registry, the first microservice executes the executable code. The isolated guest forwards the first request to the first microservice and receives a result of the request from the first micro service.

    DYNAMICALLY ADJUSTING RESOURCES TO MEET SERVICE LEVEL OBJECTIVES

    公开(公告)号:US20180109464A1

    公开(公告)日:2018-04-19

    申请号:US15297871

    申请日:2016-10-19

    Applicant: Red Hat, Inc.

    Abstract: The present disclosure provides for dynamic resource allocation to a container on a host. For example, in a first directed acyclic graph (“DAG”), a CPU resource usage of a container may be detected. In a second DAG, an I/O resource usage of the container may be detected. In a third DAG, a network traffic resource usage of the container may be detected. Each detected resource may be associated with a distinct control group. Each detected resource usage may be compared to a detected service level objective (“SLO”). Resources that fail to meet the SLO may be adjusted. Each adjusted resource usage may be compared to the SLO, and any resources that continue to fail to meet the SLO may be further adjusted. An orchestrator may be notified when a resource has been adjusted to a threshold limit and the container may be migrated to a second host.

Patent Agency Ranking