G06F2209/505

AUTO-SPLIT AND AUTO-MERGE CLUSTERS
20230032812 · 2023-02-02 ·

Methods, computer program products, and/or systems are provided that perform the following operations: identifying a first workload being processed by a first plurality of sites in a cluster; identifying, from the first plurality of sites: (i) a first site as a primary site for the first workload, and (ii) one or more secondary sites for the first workload; identifying a communication link issue between the first site and at least one of the one or more secondary sites; splitting the cluster into sub-clusters based, at least in part, on the communication link issue, wherein the first site is included in a first sub-cluster of the sub-clusters and the at least one of the one or more secondary sites is included in a sub-cluster of the sub-clusters that is different from the first sub-cluster; and instructing the first sub-cluster to locally process the first workload.

Cluster management

In response to receiving a parallel processing job from a customer, a system operated by a computing resource service provider allocates and configures a cluster of computer systems capable of executing the job. In an embodiment, each computer system is configured with a first network stack that allows access to resources of the computing resource service provider and a second network stack that allows access to resources of the customer. In an embodiment, the state of the cluster is monitored by the system via the first network stack. In an embodiment, the system deploys a set of tasks on the cluster for fulfilling the processing job. In an embodiment, the tasks have access to the second network stack so that each task can access resources of the customer.

Automatically configuring execution of a containerized application
11487591 · 2022-11-01 · ·

Provided is a system for automatically generating a set of parameters that can be used to execute a user application on a cluster of compute instances on behalf of a user, where the set of parameters specifies the one or more container images that need to be executed as part of executing the user application. For example, the user may specify a set of container images that are part of the user application, and the system may automatically determine the parameters that define the computing environment in which the user application is to be executed, such as the resource allocation and networking configuration parameters, without the user having to provide such parameters to the system. These parameters can be packaged into the set of parameters (also referred to herein as a task definition), which can be used in future executions of the user application.

GREEN CLOUD COMPUTING RECOMMENDATION SYSTEM

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating customized recommendations for environmentally-conscious cloud computing frameworks for replacing computing resources of existing datacenters. One of the methods involves receiving, through a user interface presented on a display of a computing device, data regarding a user's existing datacenter deployment and the user's preferences for the new cloud computing framework, generating one or more recommendations for environmentally-conscious cloud computing frameworks based on the received data, and presenting such recommendations through the user interface for the user's review and consideration.

FRAMEWORK FOR MANAGING CONFIGURATIONS OF CLOUD COMPUTING RESOURCES
20230090828 · 2023-03-23 ·

The present disclosure relates to generating, updating, modifying, and otherwise managing configurations for virtual services on a cloud computing system. The present disclosure provides example implementations of a configuration management system and configuration handlers on respective server nodes that receive and process requests for modifying one or more configurations that manage operation of virtual services on the cloud. Systems described herein involve leveraging a hierarchical model of configuration characteristics to facilitate both large and small scale modifications. Moreover, the systems described herein leverage a persistent store on server nodes to identify how to update a current base configuration and sub-version as well as synchronize modifications across a set of server nodes.

CONTROLLING PLACEMENT OF WORKLOADS OF AN APPLICATION WITHIN AN APPLICATION ENVIRONMENT

A technique is directed toward controlling placement of workloads of an application within an application environment. The technique involves, while a first placement of workloads of the application is in a first deployment of resources within the application environment, generating a set of resource deployment changes that accommodates a predicted change in demand on the application. The technique further involves adjusting the first deployment of resources within the application environment to form a second deployment of resources within the application environment, the second deployment of resources being different from the first deployment of resources. The technique further involves providing a second placement of workloads of the application in the second deployment of resources to accommodate the predicted change in demand on the application, the second placement of workloads being different from the first placement of workloads.

ROLE DESIGN ADVISOR

A system for controlling access to cluster resources is provided. The system includes one or more processors; and memory operatively coupled to the one or more processors, wherein the one or more processors and the memory form a cluster of computer resources that includes an admission controller configured to receive requests and determine if the request is authorized, a request history database that stores the request information received by the admission controller from a plurality of users, a role design advisor that is configured to adjust permissions for the plurality of users based on a pattern of usage identified from the request history database, and an alert system that communicates an alert to an administrator that a request outside the pattern of requests for the user has been received by the admission controller, wherein the admission controller, request history database, and role design advisor control access to the cluster resources.

Data Center Time to Value
20230131050 · 2023-04-27 ·

A system can receive an order to install a first data center on customer premises, wherein the first data center comprises a first instance of a virtualized overlay network and a first instance of virtualized volume identifiers. The system can, in response to determining that installing the first data center is threshold likely to take at least a defined amount of time to install, instantiate a second data center for the customer account at a colocation site, wherein the second data center comprises a second instance of the virtualized overlay network a second instance of the virtualized volume identifiers. The system can operate customer workloads using the second data center. The system can, after instantiating the second data center, and in response to determining that the first data center is operational, switch the operating of the customer workloads from the second data center to the first data center.

WORKFLOW AUTOMATION UTILIZING METADATA STRUCTURE
20230070063 · 2023-03-09 ·

An apparatus comprises a processing device that is configured to obtain a metadata structure corresponding to a workflow automation. The metadata structure defines a first tier comprising individual tasks, a second tier comprising a plurality of workflows each comprising a grouping of the individual tasks and a third tier comprising an orchestration comprising a grouping of the workflows. The processing device is configured to generate a graphical user interface (GUI) based on the metadata structure that is configured to present the plurality of tiers to a user. The GUI comprises a plurality of elements each activatable to enable or disable corresponding individual tasks and workflows. The GUI is presented to a user and an activation of a given element is received from the user. The activation disables the corresponding individual task or workflow for the workflow automation. The workflow automation is executed based at least in part on the activation.

SCALABLE VISUALIZATION OF A CONTAINERIZED APPLICATION IN A MULTIPLE-CLUSTER AND MULTIPLE DEPLOYMENT APPLICATION ENVIRONMENT

A set of deployment applications that are configured to deploy a plurality of resources that compose a containerized application onto at least one cluster of a plurality of different clusters is identified. Each cluster includes a plurality of nodes onto which the plurality of resources can be deployed. A set of clusters of the plurality of clusters onto which the plurality of resources have been deployed as a plurality of deployed resources is identified. User interface imagery that includes information that: identifies a set of deployed resources of the plurality of deployed resources of the containerized application; identifies a total number of deployment applications in the set of deployment applications; and identifies a total number of clusters in the set of clusters is generated. The user interface imagery is presented on a display device.