Index structure for a relational database table

    公开(公告)号:US09600507B2

    公开(公告)日:2017-03-21

    申请号:US14316911

    申请日:2014-06-27

    IPC分类号: G06F7/00 G06F17/30

    摘要: Embodiments are directed to building an index structure for a relational database (RDB) table and for querying the RDB table. An aspect includes obtaining JSON documents from a RDB table, identifying JSON objects in the JSON documents and assigning identifiers for them, and building an index structure according to values in the JSON objects such that the index structure includes at least one node that records values in a JSON object and includes the identifier of the specific JSON object. Querying the RDB table includes receiving a query request including an indicator which indicates that the query is to be performed on JSON objects, and searching the index structure based on query conditions in the query request so as to determine a target JSON object that meets the query conditions.

    Providing a custom virtual appliance
    4.
    发明授权
    Providing a custom virtual appliance 有权
    提供自定义虚拟设备

    公开(公告)号:US09348570B2

    公开(公告)日:2016-05-24

    申请号:US14453114

    申请日:2014-08-06

    IPC分类号: G06F9/445 G06F9/455

    摘要: A method, system and/or computer program product provides a custom virtual appliance. A description file of a custom virtual appliance is generated based on a user requirement. A configuration metadata of the custom virtual appliance is acquired from the description file. A list of candidate virtual appliances is created based on the configuration metadata by using conversion information, wherein the candidate virtual appliances in the list are capable of converting to a configuration that corresponds to the configuration metadata.

    摘要翻译: 方法,系统和/或计算机程序产品提供自定义虚拟设备。 根据用户需求生成自定义虚拟设备的描述文件。 从描述文件获取自定义虚拟设备的配置元数据。 通过使用转换信息,基于配置元数据创建候选虚拟设备的列表,其中列表中的候选虚拟设备能够转换为与配置元数据相对应的配置。

    Database query using a user-defined function
    5.
    发明授权
    Database query using a user-defined function 有权
    数据库查询使用用户定义的函数

    公开(公告)号:US09244999B2

    公开(公告)日:2016-01-26

    申请号:US13744676

    申请日:2013-01-18

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30595 G06F17/30557

    摘要: A database query by using a user-defined function (UDF) is provided. A computer-implemented method for performing the database query by using the UDF includes detecting whether a command for invoking the UDF to transmit a parameter value has been received. Based on detecting that the command for invoking the UDF to transmit the parameter value has been received: a first interface of the UDF is started; the parameter value is received through the first interface; and the received parameter value is transmitted to an external data source. The method further includes returning to detecting whether the command for invoking the UDF to transmit the parameter value has been received.

    摘要翻译: 提供了使用用户定义函数(UDF)的数据库查询。 用于通过使用UDF执行数据库查询的计算机实现的方法包括检测是否已经接收到用于调用UDF以发送参数值的命令。 基于检测到已经接收到用于调用UDF来发送参数值的命令:UDF的第一接口被启动; 通过第一个接口接收参数值; 并将接收到的参数值发送到外部数据源。 该方法还包括返回以检测是否已经接收到用于调用UDF的传送参数值的命令。

    CROSS TENANT DATA ACCESS
    6.
    发明申请
    CROSS TENANT DATA ACCESS 审中-公开
    交叉数据访问

    公开(公告)号:US20150242520A1

    公开(公告)日:2015-08-27

    申请号:US14630119

    申请日:2015-02-24

    IPC分类号: G06F17/30

    CPC分类号: G06F21/10 G06F21/6218

    摘要: Cross tenant data access is provided by creating a logic view in a meta database with respect to at least a first tenant of a group of tenants and according to metadata about the respective tenants. The logic view is based upon first data owned by the first tenant as well as second data that is owned and authorized by at least another tenant of the group of tenants for the first tenant to access. The logic view in the meta database is accessed in response to a cross tenant data access request from an application of the first tenant.

    摘要翻译: 通过在元数据库中针对一组租户的至少第一租户创建逻辑视图并且根据关于相应租户的元数据来提供交叉承租人数据访问。 逻辑视图基于第一租户所拥有的第一数据以及由第一租户访问的租户群体的至少另一个租户拥有和授权的第二数据。 响应于来自第一租户的应用的交叉租户数据访问请求来访问元数据库中的逻辑视图。

    Driver plugin wrapper for container orchestration systems

    公开(公告)号:US12001859B1

    公开(公告)日:2024-06-04

    申请号:US18054289

    申请日:2022-11-10

    IPC分类号: G06F9/445 G06F9/54

    CPC分类号: G06F9/44526 G06F9/547

    摘要: Described are techniques for modifying existing driver plugin behavior using a plugin wrapper to enable driver compatibility with an unsupported container deployment model. The techniques include intercepting, by a plugin wrapper operating as part of a container orchestration system, an allocation request intended for a driver plugin, where the allocation request is for allocating a computing resource to a containerized application deployed using a container deployment model not supported by the driver plugin. The techniques further include modifying, by the plugin wrapper, the allocation request to correspond to specifications of the container deployment model, thereby forming a modified request to allocate the computing resource to the containerized application. The techniques further include sending, by the plugin wrapper, the modified request to the driver plugin to allow the driver plugin to allocate the computing resource to the containerized application using the specifications of the container deployment model.

    DRIVER PLUGIN WRAPPER FOR CONTAINER ORCHESTRATION SYSTEMS

    公开(公告)号:US20240160453A1

    公开(公告)日:2024-05-16

    申请号:US18054289

    申请日:2022-11-10

    IPC分类号: G06F9/445 G06F9/54

    CPC分类号: G06F9/44526 G06F9/547

    摘要: Described are techniques for modifying existing driver plugin behavior using a plugin wrapper to enable driver compatibility with an unsupported container deployment model. The techniques include intercepting, by a plugin wrapper operating as part of a container orchestration system, an allocation request intended for a driver plugin, where the allocation request is for allocating a computing resource to a containerized application deployed using a container deployment model not supported by the driver plugin. The techniques further include modifying, by the plugin wrapper, the allocation request to correspond to specifications of the container deployment model, thereby forming a modified request to allocate the computing resource to the containerized application. The techniques further include sending, by the plugin wrapper, the modified request to the driver plugin to allow the driver plugin to allocate the computing resource to the containerized application using the specifications of the container deployment model.

    Virtual Machine Management
    9.
    发明公开

    公开(公告)号:US20240143373A1

    公开(公告)日:2024-05-02

    申请号:US18051911

    申请日:2022-11-02

    IPC分类号: G06F9/455

    摘要: Virtual machine management is provided. A virtual machine is started automatically based on a custom resource definition of the virtual machine in response to the receiving the custom resource definition of the virtual machine. A container is generated to run an application workload in the virtual machine based on a container configuration file in response to the virtual machine starting. The application workload is deployed on the container automatically based on a container image corresponding to the container. The application workload is run on the container automatically in accordance with a definition of the application workload.

    FILTERING SENSITIVE DATA IN CLOUD NATIVE APPLICATION LOGS

    公开(公告)号:US20230297719A1

    公开(公告)日:2023-09-21

    申请号:US17699521

    申请日:2022-03-21

    摘要: A computer-implemented method to limit access to sensitive information by filtering log files. The method includes deploying a first pod on a node of a cloud computing system, where the first pod includes a first container configured to run an application. The method also includes generating a first log file for the first container, where the first log file includes a set of actions performed by the application for a period of time. The method further includes filtering, by a filter, the first log file wherein the filter is configured to remove a type of sensitive data from the first log file. The method includes exporting, in response to the filtering, the first log file to the node. Advantageously, this can prevent various parties from accessing sensitive data that is contained in log files.