G06F9/44505

Pod deployment in a guest cluster executing as a virtual extension of management cluster in a virtualized computing system

An example virtualized computing system includes a host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts, the virtualization layer supporting execution of virtual machines (VMs), the VMs including pod VMs, the pod VMs including container engines supporting execution of containers in the pod VMs; and an orchestration control plane integrated with the virtualization layer, the orchestration control plane including a master server configured to manage the pod VMs and first VMs of the VMs. The virtualized computing system further includes a guest cluster executing in the first VMs and managed by the orchestration control plane, the guest cluster including a guest master server configured to, in cooperation with the master server, deploy first pods in the pod VMs.

Method, apparatus, and computer readable medium

A method includes creating a package of an application, registering the package with an orchestrator, triggering instantiation of the application in the orchestrator, generating initial configuration files for the instantiation of the application, changing an application state of the application to a planned state, changing the application state to a Keycloak state in response to obtaining client identification of the Keycloak information for the application, changing the application state to an instantiated state in response to deploying the application on the set of target servers, changing the application state to a configured state in response applying daily configuration files to perform daily configuration of the application in the set of target servers, and changing the application state to a monitored state in response to monitoring the application in the set of target servers by an observability framework tool.

VOICE INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE
20230010969 · 2023-01-12 ·

A voice information processing method and an electronic device are provided. The voice information processing method may include: a first device (1100) obtains first voice information, and when the first voice information includes a wakeup keyword, the first device (1100) sends a voice assistant wakeup instruction to a second device (1200), such that the second device (1200) launches a voice assistant; then the first device (1100) obtains second voice information and sends the second voice information to the second device (1200), the second device (1200) determines a voice triggered event corresponding to the second voice information by using the voice assistant, and feeds target information associated with performance of the voice triggered event back to the first device (1100), such that the first device (1100) performs the voice triggered event based on the target information. The method can reduce the computing burden of the first device (1100).

Method and apparatus for running applet

A method and an apparatus for running an applet are provided. The method includes: reading, in response to issuing an applet to a host application, a configuration file to determine a dynamic library referenced by the applet; loading the dynamic library referenced by the applet from a sandbox directory and/or an applet platform; and running, in response to a running instruction of the applet, a script code of the applet to call the dynamic library referenced by the applet. When the applet is run, the dynamic library referenced by the applet is loaded from the sandbox directory and/or the applet platform, and the dynamic library is no longer integrated into the applet package.

Intra-footprint computing cluster bring-up

Methods, systems and computer program products for intra-footprint computing cluster bring-up within a virtual private cloud. A network connection is established between an initiating module and a virtual private cloud (VPC). An initiating module allocates resources of the virtual private cloud including a plurality of nodes that correspond to members of a to-be-configured computing cluster. A cluster management module having coded therein an intended computing cluster configuration is configured into at least one of the plurality of nodes. The members of the to-be-configured computing cluster interoperate from within the VPC to accomplish a set of computing cluster bring-up operations that configure the plurality of members into the intended computing cluster configuration. Execution of bring-up instructions of the management module serve to allocate networking IP addresses of the virtual private cloud. The allocated networking IP addresses of the virtual private cloud are assigned to networking interfaces of the plurality of nodes.

SYSTEM AND METHOD FOR SERVICE MANAGEMENT AND CONTAINER ORCHESTRATION WITHIN A HOST ENVIRONMENT
20230044016 · 2023-02-09 ·

A system and method for service management and container orchestration (SMCO) within a host environment provides a manifest builder for retrieving containers and configuration tools to generate manifest artifacts for a subsequent update (e.g., full or partial) of one or more applications running on the host environment. At runtime, if the host environment is without a network connection to an external repository, the SMCO system includes a manifest launcher for consuming manifest artifacts to load containers for installation or update of the associated applications to local container registries within the host environment as provided by the configuration tools in the manifest artifacts. Further, the manifest launcher configures the container runtime environment (CRE) and/or host operating system (OS) within the host environment according to a desired state of the application.

Saving page retire information persistently across operating system reboots

Examples described herein include systems and methods for retaining information about bad memory pages across an operating system reboot. An example method includes detecting, by a first instance of an operating system, an error in a memory page of a non-transitory storage medium of a computing device executing the operating system. The operating system can tag the memory page as a bad memory page, indicating that the memory page should not be used by the operating system. The operating system can also store tag information indicating memory pages of the storage medium that are tagged as bad memory pages. The example method can also include receiving an instruction to reboot the operating system, booting a second instance of the operating system, and providing the tag information to the second instance of the operating system. The operating system can use the tag information to avoid using the bad memory pages.

Delta data collection technique for machine assessment

Systems and methods are disclosed to implement a delta data collection technique for collecting machine characteristics data from client machines. In embodiments, the collected data is used by a machine assessment service to maintain a virtual representation of the client machine for assessments. To initialize the collection process, the client uploads an initial copy of the data in full. Subsequently, the client determines periodic deltas between a current baseline of the data and a last reported baseline, and the deltas are uploaded as patches. The machine assessment service then applies these patches to update the virtual representation of the client machine. In embodiments, to facilitate the generation or uploading of the patches, the client may generate the baselines in a different encoding format as used by the data. For example, baselines in the new encoding format may be more easily compared and manipulated during the patch generation process.

Application hosting in a distributed application execution system

In an application execution system having a plurality of application servers, each application server stores a plurality of applications, and has computational resources for executing applications in response to received requests. Each application server also includes instructions for loading a respective application into volatile storage and executing the application in response to a request from a client, and for returning a result. A generic application instance may be cloned, creating a pool of generic application instance clones that can be loaded with code for a requested application to produce an application instance. The application instance can then be stored in a cache to be used for a future application request.

Native applications using database roles

Embodiments of the present disclosure enable users of a data sharing system to build native applications that can be shared with other users of the data sharing system. The native applications can be published and discovered in the data sharing system like any other data listing, and consumers can install them in their local data sharing system account to serve their data processing needs. A provider may define an installation script for installing an application and create a share object to which the installation script may be attached. In response to an imported database being created in a consumer account based on the share object, a native application framework may automatically execute the installation script in the consumer account and may create a set of database roles to manage execution of the application in the consumer account.