-
公开(公告)号:US10558454B2
公开(公告)日:2020-02-11
申请号:US16269133
申请日:2019-02-06
Applicant: Palantir Technologies Inc.
Inventor: Ian Mair , Greg DeArment , Lee Avital , Mark Elliot , Michael Nazario , Punyashloka Biswal , William Hickman
Abstract: One or more software products/services may be installed on a cloud deployment. Product versions of such services can be upgraded (or rolled back) based on a deployment plan comprising tasks adapted to reach a target deployment state. A central upgrade server can forward tasks to an upgrade agent for execution, the tasks being based on a current operational state of the cloud deployment (obtained by the upgrade agent) and one or more constraints. In multiple node deployments, some nodes may be upgraded to a new product version, while other nodes are kept at a current product version until stability of the new product version is determined. Traffic across nodes can be shaped to ensure a deployment is healthy before upgrading other nodes/deployments. If the health of a node/deployment does not meet specified criteria, an upgrade can be stopped, an alert can be triggered, and the node/deployment can be rolled back.
-
公开(公告)号:US10430240B2
公开(公告)日:2019-10-01
申请号:US15284959
申请日:2016-10-04
Applicant: Palantir Technologies Inc.
Inventor: Greg DeArment , Mark Elliot , Jonathon Yu , Jon Paek , Phillip Chen , Brian Toth , David Tolnay , Daniel Rothfus , Bradley Moylan
Abstract: Fault-tolerant and highly available configuration of distributed services including a computer-implemented method for role-based configuration discovery comprising receiving a request comprising an identifier of a role; identifying a first key, in a replica of a distributed configuration store, comprising a first value that matches the role identifier; identifying one or more other key-value pairs associated in the replica with the first key; and returning a response to an entity that sent the request comprising the value of at least one key-value pair that is specific to the role the service has. Also disclosed are techniques for log forwarding.
-
公开(公告)号:US10362133B1
公开(公告)日:2019-07-23
申请号:US14750773
申请日:2015-06-25
Applicant: Palantir Technologies Inc.
Inventor: Peter Maag , Tom O'Brien , Peter Tosirisuk , Saad Abdali , Carl Freeland , Greg DeArment , Maciej Albin , Matthew Lynch , Phillip Worton-Cross
Abstract: Various systems and methods are provided that allow reviewers to review and potentially flag processed communication data in order to spot potential malfeasance or illegal activity. Certain systems and methods includes modules for removing duplicate data from the communication data files, generating thread data for email data files, generating lexicon tag data for the data files, removing blacklisted data that meets blacklisted criteria, or generating group association data.
-
公开(公告)号:US09910697B2
公开(公告)日:2018-03-06
申请号:US15284957
申请日:2016-10-04
Applicant: Palantir Technologies, Inc.
Inventor: Greg DeArment
CPC classification number: G06F9/48 , G06F3/0619 , G06F3/0629 , G06F3/065 , G06F3/067 , G06F8/71 , G06F9/44505 , G06F9/4806 , G06F9/4843 , G06F9/4881 , G06F9/4887 , G06F9/50 , G06F9/5005 , G06F9/5027 , G06F9/5038 , H04L41/5054
Abstract: Fault-tolerant and highly available configuration of distributed services including a computer-implemented method for distributed task orchestration. The method includes setting a watch on a first key in a first replica of a distributed configuration store and setting a value of a second key in a second replica of the distributed configuration store where the value of the second key indicates that a first sub-task of a distributed task is successfully complete. The value of the second key is received based on the watch set on the first key and execution of the second sub-tasks is initiated based on receiving the value of the second key. Also disclosed are techniques for service lifecycle management.
-
-
-