-
公开(公告)号:US11321106B2
公开(公告)日:2022-05-03
申请号:US16828260
申请日:2020-03-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Adam Babol , Adam Dyszy , Joanna Wawrzyczek , Jakub Blazej Moor , Michal Kmak
IPC: G06F9/455
Abstract: Provided are techniques for using binaries of container images as operating system commands. Metadata describing one or more binaries for a container image is received, where each of the one or more binaries has an associated operating system command. The one or more binaries are integrated with the container image by placing the one or more binaries into the container image. Each operating system command is injected into an operating system by adding each operating system command to a command file accessed by the operating system. In response to receiving an operating system command associated with a binary of the one or more binaries, the container image is pulled using the metadata, the container image is executed with the one or more binaries, and a result is returned.
-
公开(公告)号:US11163557B2
公开(公告)日:2021-11-02
申请号:US16677991
申请日:2019-11-08
Applicant: International Business Machines Corporation
Inventor: Adam Babol , Adam Dyszy , Joanna Wawrzyczek , Jakub B. Moor , Michal Kmak
Abstract: The systems and methods provided herein provide techniques for discovering applications installed in a cluster-based computing environment. A catalog of signatures is obtained. One or more clusters are scanned to obtain information about configuration parameters in the one or more clusters. The catalog of signatures is compared with the information from scanning comprising configuration parameters to identify software applications installed on a per-cluster basis.
-
公开(公告)号:US20210141636A1
公开(公告)日:2021-05-13
申请号:US16677991
申请日:2019-11-08
Applicant: International Business Machines Corporation
Inventor: Adam Babol , Adam Dyszy , Joanna Wawrzyczek , JAKUB B. Moor , MICHAL KMAK
Abstract: The systems and methods provided herein provide techniques for discovering applications installed in a cluster-based computing environment. A catalog of signatures is obtained. One or more clusters are scanned to obtain information about configuration parameters in the one or more clusters. The catalog of signatures is compared with the information from scanning comprising configuration parameters to identify software applications installed on a per-cluster basis.
-
-