Abstract:
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
Abstract:
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
Abstract:
A computer deploys an operating environment onto a provisionable server. The computer assigns an operating environment from an operating environment configuration management database to the provisionable server in response to detecting a provisioning event. The computer stores a record of the assignment in a deployment configuration management database and updates a management server with a designated operating environment identifier of the assignment.
Abstract:
A system and method for associating a state with a distributed system and transitioning component states with recovery to reverse transitioning attempts includes defining a global state representing an overall provisioning state of a plurality of components involved in a system wherein a set of global states are employed as provisioning checkpoints. Individual software component methods are defined for transitioning from one state to another. Individual states are associated with a global state. A rollback method is defined by which a destination global state may be rolled back to a previous global state in an event of a failure.
Abstract:
A method for customizing virtual machines includes retrieving a virtual machine image file from a library of virtual machine image files. A target virtual machine image file is created by making a copy of the retrieved virtual machine image file. A file size of the target virtual machine image file is increased. A partition size of a primary partition of the target virtual machine image file is increases. The target virtual machine image file is booted after the partition size of the primary partition thereof has been increased.
Abstract:
A method for assigning tenants of users to offering instances of an application or middleware includes representing a set of offerings as respective offering instances of the application or middleware available from a server, determining server resource capacity of the server, representing constraints associated with the tenants and the offering instances, generating a mapping of the tenants to the offering instances based on the server resource capacity and constraints, and assigning a tenant to an offering instance according to the mapping, wherein the offering instance is made accessible to the users of the assigned tenant.
Abstract:
A computer deploys an operating environment onto a provisionable server. The computer assigns an operating environment from an operating environment configuration management database to the provisionable server in response to detecting a provisioning event. The computer stores a record of the assignment in a deployment configuration management database and updates a management server with a designated operating environment identifier of the assignment.
Abstract:
In a distributed computing network having computers interconnected with each other, a method and apparatus of providing policy based provisioning of middleware components to provide a solution for a service. With this invention, the middleware components that are necessary to provide the solution are determined. Then, the configurations of the computers are determined so as to satisfy a selected configuration policy for a selected solution. Finally, the necessary middleware components are installed on the configured computers so that the solution can be provided. Some of the selected configuration policies are: maximization of server utilization policy, provisioning of software components requiring external access based on availability of external resources, and minimization of total time to install said determined components. The progress of installation of the middleware components can also be monitored to make any necessary adjustments in the configuration of the virtual machines so that the selected configuration policy can be satisfied.
Abstract:
The illustrative embodiments disclose a computer implemented method, apparatus, and computer program product for provisioning a server on a network. In one embodiment, the process sends a server identifier to a management server in response to receiving a boot command. The management server uses the server identifier for identifying a designated operating environment for the server to form a designated operating environment identifier. The process then receives, from the management server, the designated operating environment identifier and a first bootstrap code. The process uses the first bootstrap code to extract information for identifying a local operating environment on the server. Thereafter, the process compares the local operating environment to the designated operating environment and initiates a final boot sequence of the server based on the comparison of the local operating environment and the designated operating environment.
Abstract:
A method for assigning tenants of users to offering instances of an application or middleware includes representing a set of offerings as respective offering instances of the application or middleware available from a server, determining server resource capacity of the server, representing constraints associated with the tenants and the offering instances, generating a mapping of the tenants to the offering instances based on the server resource capacity and constraints, and assigning a tenant to an offering instance according to the mapping, wherein the offering instance is made accessible to the users of the assigned tenant.