TECHNIQUES FOR RESOURCE DISCOVERY
    1.
    发明公开

    公开(公告)号:US20230254382A1

    公开(公告)日:2023-08-10

    申请号:US18078883

    申请日:2022-12-09

    CPC classification number: H04L67/51

    Abstract: Techniques are described for identifying resources within a region of a cloud-computing environment. A Resource Identification Service (RIS) may be configured to obtain a flock configuration file comprising resource discovery data associated with a service. The resource discovery data may indicate a set of parameters with which a previously existing resource of the cloud-computing environment is to be identified. RIS may execute operations to identify the previously existing resource based at least in part on matching attributes associated with previously existing resource to the set of parameters of the resource discovery data. The RIS may identify, from the flock configuration file, a set of import operations to perform to obtain an identifier corresponding to the previously existing resource. The identifier may be provided to cause the previously existing resource to be utilized in a region build.

    TECHNIQUES FOR MANAGING LONG-RUNNING TASKS WITH A DECLARATIVE PROVISIONER

    公开(公告)号:US20210224107A1

    公开(公告)日:2021-07-22

    申请号:US16926515

    申请日:2020-07-10

    Abstract: Techniques for implementing an infrastructure orchestration service are described. In some examples, a declarative provisioner of the infrastructure orchestration service receives instructions for deployment of a resource. The declarative provisioner identifies that the deployment of the resource is a long-running task stores state information corresponding to the deployment of the resource. In certain embodiments, upon identifying that the deployment of the resource is a long-running task, the declarative provisioner pauses its execution of the long-running task. Responsive to a trigger received from the infrastructure orchestration service, the declarative provisioner resumes execution of the deployment of the resource using the state information and transmits deployment information corresponding to the deployment of the resource to the infrastructure orchestration service.

    Techniques for managing dependencies of an orchestration service

    公开(公告)号:US11755337B2

    公开(公告)日:2023-09-12

    申请号:US17150778

    申请日:2021-01-15

    Abstract: Techniques are disclosed for managing dependencies in an orchestration service. A computer-implemented method can include operations performed by a declarative infrastructure provisioner (DIP). In some embodiments, the DIP parses configuration data associated with a computing system and generates a directed acyclic graph (DAG) for booting a first resource. The DAG may specify a dependency of the first resource on a capability of a second resource. The DIP may traverse the DAG and determine, based at least in part on the traversal, that the dependency has been reached. The DIP may publish, to a scheduling process, an indication that the first resource is awaiting availability of the capability of the second resource. In some embodiments, the DIP receives a subsequent indication that the capability is available, regenerates the DAG, and recommences traversal of the DAG. Additional operations for booting the first resource may be performed in accordance with the recommenced traversal.

    REENTRANT SERVICE DEPLOYMENTS
    4.
    发明公开

    公开(公告)号:US20230273816A1

    公开(公告)日:2023-08-31

    申请号:US18098617

    申请日:2023-01-18

    CPC classification number: G06F9/4881 G06F9/5027

    Abstract: Techniques are described for automating the creating, provisioning, and deployment of resources and infrastructure for building a data center that is configured to provide a set of services. Techniques are described for scheduling and executing multiple releases for a service. For a service for which a first release has been previously scheduled and executed, a second release may be scheduled for the service in response to an optional capability dependency for the service being published in a data center. The second release for the flock is then executed. As a result of the execution of the second release, additional enhanced capabilities may be added to the service.

    TECHNIQUES FOR MANAGING REGION BUILD DEPENDENCIES

    公开(公告)号:US20230251872A1

    公开(公告)日:2023-08-10

    申请号:US18163219

    申请日:2023-02-01

    CPC classification number: G06F9/4416 G06F9/44505 G06F8/433 G06F8/427

    Abstract: Techniques are described for performing an automated region build. An orchestration service (e.g., a Multi-Flock Orchestrator (MFO)) may be configured to bootstrap any suitable number of services within a region corresponding to one or more data centers. Each service can be associated with a respective set of resources (e.g., infrastructure components to be provisioned, software artifacts to be deployed, etc.). The WO can obtain configuration files corresponding to the services to be bootstrapped and perform a static analysis the configuration files to identify one or more dependencies between the services. Circular dependencies can be identified and resolved before region build. A graph may be generated that maintains the dependencies identified and indicates a corresponding order with which bootstrapping tasks are to be performed. The WO may traverse the graph to incrementally instruct, according to the identified dependencies, a provisioning and deployment manager to bootstrap services in the region.

    TECHNIQUES FOR TRANSFERRING DATA ACROSS AIR GAPS

    公开(公告)号:US20250039157A1

    公开(公告)日:2025-01-30

    申请号:US18916415

    申请日:2024-10-15

    Abstract: Techniques for transferring data to a secure computing region that is isolated from any public networks is disclosed. In some embodiments, one or more artifacts for the secure computing region are packaged. As part of the packaging, one or more data packets and metadata for the one or more artifacts can be generated. The metadata indicates corresponding destination components for the one or more artifacts within the secure computing region. The data packet(s) are received and transmitted by a first data diode endpoint device. The first data diode endpoint device is configured to transmit data to the secure computing region via a second data diode endpoint device, the second data diode endpoint device being configured to restrict data from being transmitted to a destination outside of the secure computing region. The transmission of the one or more data packets may be monitored by the system.

    Techniques for transferring data across air gaps

    公开(公告)号:US12149509B2

    公开(公告)日:2024-11-19

    申请号:US17152610

    申请日:2021-01-19

    Abstract: Techniques for transferring data to a secure computing region that is isolated from any public networks is disclosed. In some embodiments, one or more artifacts for the secure computing region are packaged. As part of the packaging, one or more data packets and metadata for the one or more artifacts can be generated. The metadata indicates corresponding destination components for the one or more artifacts within the secure computing region. The data packet(s) are received and transmitted by a first data diode endpoint device. The first data diode endpoint device is configured to transmit data to the secure computing region via a second data diode endpoint device, the second data diode endpoint device being configured to restrict data from being transmitted to a destination outside of the secure computing region. The transmission of the one or more data packets may be monitored by the system.

    TECHNIQUES FOR MANAGING DEPENDENCIES OF AN ORCHESTRATION SERVICE

    公开(公告)号:US20210224076A1

    公开(公告)日:2021-07-22

    申请号:US17150778

    申请日:2021-01-15

    Abstract: Techniques are disclosed for managing dependencies in an orchestration service. A computer-implemented method can include operations performed by a declarative infrastructure provisioner (DIP). In some embodiments, the DIP parses configuration data associated with a computing system and generates a directed acyclic graph (DAG) for booting a first resource. The DAG may specify a dependency of the first resource on a capability of a second resource. The DIP may traverse the DAG and determine, based at least in part on the traversal, that the dependency has been reached. The DIP may publish, to a scheduling process, an indication that the first resource is awaiting availability of the capability of the second resource. In some embodiments, the DIP receives a subsequent indication that the capability is available, regenerates the DAG, and recommences traversal of the DAG. Additional operations for booting the first resource may be performed in accordance with the recommenced traversal.

Patent Agency Ranking