A method and system for password mediation including receiving, within an operating system network stack of a client device, a hypertext transfer protocol (http) request message issued by a client application executing on the client device, the http request message indicating an operation to be performed for a user of the client application at a destination system; requesting, by the client device, security information for the user with respect to the destination system; modifying, by the client device, the received http request message to include the security information; and sending, by the client device, the modified http request message to the destination system.. . ... Red Hat
Kernel same-page merging for encrypted memory
Systems and methods for performing data deduplication one storage blocks while the data is encrypted. An example method may comprise: selecting a first storage block and a second storage block from a plurality of encrypted storage blocks, wherein the first storage block and the second storage block are encrypted using different cryptographic input; causing the first storage block and the second storage block to be decrypted and further encrypted using a common cryptographic input; determining that a cipher text of the first storage block and a cipher text of the second storage block are the same; and updating a reference to the first storage block to reference the second storage block in response to the determining that the cipher text of the first storage block and the cipher text of the second storage block are the same.. ... Red Hat
A server computer determines that an application of a plurality of applications in a cloud subscribes to an event with respect to a plurality of attributes of event data. The server computer, responsive to determining that at least one of the plurality of attributes has changed, executes the application workflow and sends a notification to the application, the notification indicating that at least one of the plurality of attributes has changed.. ... Red Hat
A method and system for suspending operation of a virtual machine executed by a processing device of a host computing system. The method and system include storing state information of the virtual machine to a memory of the guest operating system. ... Red Hat
Efficient cloud service capacity scaling
Efficient cloud service capacity scaling is disclosed. For example, a plurality of services are configured to execute on a plurality of isolated guests, each service being in a real-time latency tolerance or a retriable latency tolerance. ... Red Hat
Automatic microservice problem detection in enterprise applications
A server system includes a memory, a processor in communication with the memory, and a server managing a plurality of cooperating microservices. The server executes on the at least one processor to capture tracing information reported during invocation of a set of cooperating microservices. ... Red Hat
Hash-based mount point lookup in virtual file systems
Systems and methods for performing hash-based mount point lookup in virtual file systems. An example method may include: receiving a first character string representing a file name; identifying, within an array of mount point strings, a second character string comprised by the first character string; identifying a file system object associated with a mount point path represented by the second character string; and utilizing the file system object to access a file referenced by the file name.. ... Red Hat
Breakpoint insertion into kernel pages
A method includes, with a hypervisor, receiving a first request from a guest to write a first piece of data to a first memory location within a kernel code page. The method further includes determining that the first request triggers a violation based on a kernel protection mechanism, and in response to determining that the first request triggers the violation, determining that the first piece of data includes a breakpoint. ... Red Hat
Hypervisor-visible guest thread management
Responsive to receiving a first request from an application to create a thread for the application, a guest operating system sends a first notification to a hypervisor to create a dedicated virtual processor for the thread. Responsive to receiving an identifier associated with the dedicated virtual processor from the hypervisor, the guest operating system starts the thread using the dedicated virtual processor, and pins the thread to the dedicated virtual processor.. ... Red Hat
Updating software utilizing domain name system (dns)
Examples described herein are directed to systems and methods for updating software. An update system may generate a first domain name system (dns) record comprising first version data indicating a version of an update to the software. ... Red Hat
Key-based memory deduplication protection
Methods, systems, and computer program products are included for deduplicating one or more memory pages. A method includes receiving a first key from a first application running on a computer system. ... Red Hat
Node proximity detection for high-availability applications
Systems and methods for detecting when related applications are running on nodes that that located near one another. An example method may comprise: analyzing beacon data to determine a physical location of a first node and a physical location of a second node; determining an application of the first node and an application of the second node are related applications; detecting the physical location of the first node and the physical location of the second node are within a proximity threshold; and generating, by a processing device, a notification indicating the related applications of the first node and the second node are within the proximity threshold.. ... Red Hat
Virtual machine exit support by a virtual machine function
Systems, methods, and techniques for securing a state of a guest are provided. An example method includes determining, by a virtual machine function within a guest, a guest central processing unit (cpu) state that is stored in one or more registers of a cpu and associated with the guest. ... Red Hat
Supporting secure layer extensions for communication protocols
An implementation of the disclosure provides an apparatus comprising: a memory to store a plurality of handshake responses to authenticate client communications; and a processing device, operatively coupled to the memory, to: receive a handshake request from a client device the handshake request comprising an identifier of a communication protocol supported by the client device. A secure layer extension is extracted from the identifier of the communication protocol. ... Red Hat
Various examples are directed to systems and methods for utilizing a memory-mapped i/o channel. A first application may request that a message be sent to a channel counterparty. ... Red Hat
A system for receive packet steering (rps) support for network function virtualization (nfv) by system call bypass includes a memory, a plurality of central processing units (cpus) in communication with the memory, an operating system, and a network interface controller (nic) including a receive queue. The system also includes a driver thread and a plurality of forwarding threads. ... Red Hat
Systems and methods for enabling additional metrics in a monitoring system to diagnose problems are disclosed. An example method may include collecting first metric data at a first collection frequency, determining whether the first metric data exceeds a first boundary defined by a first metric rule, responsive to determining that the first metric data exceeds the first boundary, collecting second metric data at a second collection frequency and collecting the first metric data at a third collection frequency, the second metric data and the third collection frequency defined by the first metric rule, determining whether the first metric data no longer exceeds the first boundary, and responsive to determining the first metric data no longer exceeds the first boundary, terminating collection of the second metric data while continuing to collect the first metric data at the first collection frequency.. ... Red Hat
Blockchain-based software instance usage determination is disclosed. A span identifier that identifies a span is received. ... Red Hat
Embodiments pertain generally to a method for providing subscription services in view of virtual machines. The method includes determining that a user is enrolled for a continuous availability service and determining, in view of the continuous availability service, that the service provider is to instantiate a virtual machine for the user to continue execution of operations executed on a client machine. ... Red Hat
An implementation of this disclosure provides a system comprising memory to store a plurality of layers and a processing device coupled to that memory to set up the layers and to mount them into an overlay. The layers comprise an upper and one or more lower layers. ... Red Hat
Methods, systems, and computer program products are included for providing protections to a processor state of a virtual machine. An example method includes providing, to a processor, instructions corresponding to a virtual machine. ... Red Hat
Systems and methods for enhanced network connection privacy. An example method may comprise: receiving a selection to activate a non-persistent mode for a network manager of a client device, the non-persistent mode preventing tracking of network locations accessed by the client device; activating the non-persistent mode for the network manager; and while the non-persistent mode is activated for the network manager: receiving a request to connect to a network; and performing, via the network manager, a set of operations to establish a connection with the network, the set of operations excluding storing information revealing the network connection in persistent memory of the client device.. ... Red Hat
A method and system for displaying words with a script corresponding to the language of the words, where an input word is received and the system determines whether the word is in a first language list. If the word is in the first language list, the word is displayed in a first script. ... Red Hat
A hypervisor detects a virtual device configured by a virtual machine, generates a para-virtualized networking interface between the virtual device and a memory space within hypervisor memory, maps the memory space to a peripheral component interconnect (pci) memory space of the virtual machine, and configures the memory space to be accessible to a physical device via direct memory access (dma), where the physical device is associated with the virtual device of the virtual machine. The hypervisor then transfer packets between the virtual machine and the physical device using the para-virtualized networking interface.. ... Red Hat
Systems and methods for page cache management during migration are disclosed. An example method may include initiating, by a processing device of a source host machine, a migration process for migration of a virtualized component from the source host machine to a destination host machine. ... Red Hat
Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. ... Red Hat
A system and method for lightweight thread synchronization using a shared memory state includes exposing, by an operating system executing on one or more processors, a memory mapping interface. The one or more processors may execute a first thread and a second thread. ... Red Hat
Systems and methods for scheduling virtual processors via memory monitoring are disclosed. In one implementation, a hypervisor running on a host computer system may detect a task switch event associated with a virtual processor running on a physical processor of the host computer system. ... Red Hat
A system and method for dynamic guest controlled halt polling includes a memory, one or more physical processors in communication with the memory, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. In an example, the hypervisor detects a request to disable halt polling. ... Red Hat
A system and method for efficient virtual machine memory monitoring with hyper-threading includes executing, by a hypervisor executing on a plurality of physical processors, a virtual central processor unit (vcpu) of a virtual machine on a first hyper-thread. The plurality of physical processors include a first physical processor having the first hyper-thread and a second hyper-thread. ... Red Hat
A system for cpu overcommit with guest idle-polling includes a memory, a plurality of host cpus in communication with the memory, a virtual machine, and a hypervisor. The plurality of host cpus include a first host cpu and a second host cpu. ... Red Hat
Preloading enhanced application startup is disclosed. For example, a first local socket associated with a first copy of an executable program loaded in a memory receives a first instruction to launch a second copy of the executable program. ... Red Hat
Methods and apparatus for a transparent fast application launcher are disclosed. For example, an executable loader receives a first request to load and then loads a first copy of an executable program into a memory, including resolving and loading at least one shared library associated with the executable program to the memory. ... Red Hat
A mixed checksum injection system includes a memory, at least one processor in communication with the memory, a data repository including content, and a server including a crms. The crms executes on the at least one processor to generate a plurality of checksum values for the content. ... Red Hat
Embodiments relate to systems and methods for tracking local and remote file usage, and aggregating the resulting file usage statistics for presentation to a user. The operating system of a local computer can track and generate local file usage statistics, such as most recently used files and editing time. ... Red Hat
An error recovery system includes a memory, a processor in communication with the memory, a primary device, a backup device, a hypervisor executing on the processor, and a virtual machine. The virtual machine includes a guest operating system (os) executing on the hypervisor, a pass-through device, and a guest driver. ... Red Hat
Systems and methods for adjusting the receive buffer size for network interface controllers. An example method may comprise: maintaining, by a computer system, a moving window referencing a pre-defined number of incoming data packets; responsive to receiving a new data packet, shifting the moving window to include the new data packet while excluding a least recently received data packet; calculating a weighted average value of sizes the incoming data packets referenced by the moving window, wherein a most recently received data packet is associated with a first weight that is higher that a second weight associated with a least recently received data packet; and adjusting, using the weighted average value, a size of a buffer allocated for incoming data packets.. ... Red Hat
A method includes receiving, by a processing device of a first host from a virtualization manager via a network connection, a request to perform a storage operation on a storage volume associated with a storage domain, initiating the storage operation on the storage volume, responsive to determining that the network connection has been lost, storing a progress indicator of the operation in a volume metadata associated with the storage volume, and transmitting, to the virtualization manager, the progress indicator stored in the volume metadata.. . ... Red Hat
Among other things, in one aspect, in general, a system for managing data in a data storage system includes a plurality of index nodes each storing a map of entries, each entry of the map including an identifier corresponding to a particular portion of data stored in the data storage system, and metadata indicating a location where the particular portion of data is stored in the data storage system, and one or more supernodes configured to return an identification of an index node that recently submitted a request for a particular identifier associated with at least one of the portions of data.. . ... Red Hat
A computing device can securely and selectively enable a remote computing device to decrypt encrypted data that is stored remotely (e.g., within a cloud-computing environment). For example, the computing device can transmit an encrypted communication to a processing device of the remote computing device. ... Red Hat
A system and methods for migrating a virtual machine (vm). In one embodiment, a hypervisor receives a request to migrate the contents of a memory of a source vm in a first physical memory area to a destination vm in a second physical memory area, where the first and second physical memory areas are disjoint. ... Red Hat
A method for identifying and isolating faults in versioned microservices includes a request replicator receiving an original request, and determining whether to replicate the original request. The request replicator replicates the original request creating one or more replicated requests, including a first replicated request. ... Red Hat
Systems and methods for failure recovery in shared storage operations. An example method comprises: acquiring, by a processing device, a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image, wherein the transaction marker is represented by a pre-defined tag associated with a logical volume of a block-based storage, wherein the logical volume implements a data area of a new volume associated with the disk image; creating a component of the new volume associated with the disk image; destroying the transaction marker by removing the pre-defined tag representing the transaction marker from the logical volume; and releasing the lock with respect to the storage domain.. ... Red Hat
A method performed by a physical computing system includes, with a hypervisor, receiving a first packet from a virtual machine managed by the hypervisor, the first packet for transmission to a destination, the first packet including a first queue identifier, selecting a first transmission queue from a plurality of available transmission queues to transmit the first packet, the first transmission queue being based on the first queue identifier, receiving a second packet from the virtual machine, the second packet for transmission to the destination, the second packet including a second queue identifier, and selecting a second transmission queue from the plurality of available transmission queues to transmit the second packet, the second transmission queue being based on the second queue identifier.. . ... Red Hat
Data replication in a data grid can be managed. For example, a computing device usable in the data grid can determine a version number for a key-value pair. ... Red Hat
A mechanism for adjusting a resource availability of a data center is disclosed. A processing device may receive a first request from a client device, wherein the request includes a set of instructions and a host name assigned to an internet protocol (ip) address of a server at a first data center to execute the set of instructions. ... Red Hat
Systems and methods for deferring registration for direct memory access (dma) operations. An example method comprises: receiving a memory region registration request identifying a memory region for a direct memory access (dma) operation; generating a local key for the memory region; deferring registration of the memory region until receiving a dma work request referencing the local key; and responsive to receiving the dma work request, registering the memory region for dma transfer.. ... Red Hat
An example method of establishing one or more connections between a target host machine and a remote endpoint connected to a virtual machine (vm) running on a source host machine includes receiving, by a target hypervisor executable on a target host machine, a list of one or more remote endpoints to which a vm executable on a source host machine is connected. The source and target host machines are coupled to a network. ... Red Hat
An implementation of the disclosure provides a system comprising a memory to store disk images and a processing device, operatively coupled to the memory. The processing device is to identify a first disk image comprising a volume chain. ... Red Hat
Systems and methods for file replication using file content location identifiers. An example method comprises: receiving, by a processing device, an index node number identifying a first index node associated with a file residing on a first file server, the first index node referencing a physical location of contents of the file; identifying a replica of the file residing on a second file server; assigning the index node number of the first index node to a second index node referencing a physical location of contents of the replica of the file on the second file server; performing, by the processing device, a file system operation by accessing the replica of the file referenced by the index node number.. ... Red Hat
Systems and methods for disabling applications on a client device remotely are disclosed. An example method may comprise establishing, via a network interface device, a communication connection with a client computing device, receiving, via the communication connection, a list of applications installed on the client computing device, comparing the received list of applications to a blacklist of applications, identifying, in view of the comparing, an installed application on the received list of applications, the installed application comprised in the blacklist of applications, identifying a severity score corresponding to the installed application and an action corresponding to the severity score, and responsive to the identifying the severity score and the corresponding action, causing, by the processing device, the corresponding action to be performed with respect to the client computing device, the corresponding action pertaining to the installed application.. ... Red Hat
Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal.. ... Red Hat
A mechanism for replacing a first internet protocol (ip) address with a second ip address in a response to a request to a server from an application is disclosed. A processing device may receive a request from an application. ... Red Hat
Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at the virtual machine. After performing the task at the virtual machine, an indicator corresponding to a shutdown of the virtual machine is detected. ... Red Hat
Deferred subscription activation using blockchain is disclosed. A first plurality of blockchain blocks that contain authorized transactions that authorize corresponding activation request transactions associated with software instances of a plurality of software instances is received. ... Red Hat
Affinity based hierarchical container scheduling is disclosed. For example, a hierarchical map identifies relationships between a plurality of nodes and hardware devices, subzones, and zones. ... Red Hat
Categorizing computing process output data streams for flash storage devices is disclosed. A first computing process characteristic of a first computing process that generates a first output data stream is determined. ... Red Hat
Systems and methods to generate an icon that visually represents a server. An input associated with a server is identified. ... Red Hat
A multitenant network scheme system includes a memory, a physical processor in communication with the memory, an isolated guest on a host, a virtual switch, and a network interface controller. The isolated guest includes a virtual network interface controller (vnic). ... Red Hat
An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method also includes obtaining an unencrypted version of the first encrypted request. ... Red Hat
A method includes determining a first host non-uniform memory access (numa) node of a plurality of host numa nodes on a host machine that provides a virtual machine to a guest, the first host numa node being associated with a pass-through device, creating a virtual numa node on the virtual machine, mapping the virtual numa node to the first host numa node, adding a virtual expander to a virtual root bus of the virtual machine, and associating the virtual expander with the virtual numa node.. . ... Red Hat
Providing dynamic instrumentation using domain-specific monitoring-language-to-kernel-bytecode compilation is disclosed. An instrumentation program file is converted by a compilation engine into multiple bytecode sections. ... Red Hat
Providing blockchain-based subscription-as-a-service management is disclosed. In one example, a node within a customer network begins execution of a subscription-as-a-service software instance. ... Red Hat
A mechanism for extracting system characteristics from an unstructured data format, a semi-structured data format, or a structured data format is disclosed. A processing device may receive information associated with a computing system in an unstructured data format. ... Red Hat
In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. ... Red Hat
Methods and systems for provisioning persistent storage are disclosed. For example, a new isolated guest and associated persistent storage volume are requested to be created. ... Red Hat
Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine. ... Red Hat
An example method for managing a conference call includes detecting multiple concurrent audio signals. The multiple concurrent audio signals include a first audio signal from a first participant on a conference call and a second audio signal from a second participant on the conference call. ... Red Hat
Implementations of the present disclosure provide for generating adjacency graph from a series of linear linked data structures. A method of one implementation includes receiving an input of a series of linear linked data structures (links). ... Red Hat
An implementation of the disclosure provides a system for generating low impact snapshots comprising a memory to store application data and a processing device coupled to the memory. The processing device is to identify a plurality of transactions within a cloud computing environment. ... Red Hat
Mechanisms for efficient hypervisor reporting are disclosed. A first communication from a first hypervisor reporter is received that identifies a first hypervisor as a hypervisor about which the first hypervisor reporter can generate reports over time. ... Red Hat
Processor frequencies can be managed. For example, a computing device can determine (i) a first estimate of an operating characteristic of a processor in using a first pair of frequencies to perform a task, and (ii) a second estimate of the operating characteristic of the processor in using a second pair of frequencies to perform the task. ... Red Hat
A system includes a memory, one or more processors, a guest virtual machine, a hypervisor, and a client. The hypervisor receives, from the client, a first notification of stereoscopic capability. ... Red Hat
Container deployment scheduling with constant time rejection request filtering is disclosed. For example, each node in a multi-node system includes system resources with available amounts quantitatively represented by values. ... Red Hat
A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a plugin that adds features of an access control list (acl) to indexes of a logging stack based on a user's access role. ... Red Hat
Systems and methods for batching memory page hints that may enable a hypervisor to reuse a particular memory page without copying the particular memory page to and from swap space. An example method may comprise: releasing, by a processing device executing a virtual machine, memory pages in use by the virtual machine; adding the memory pages to a set of memory pages; determining, by the virtual machine, that the set of memory pages satisfies a threshold quantity; and responsive to the determining, notifying a hypervisor that the memory pages released by the virtual machine are available for reuse by the hypervisor without being copied to persistent storage.. ... Red Hat
Co-locating containers based on source to improve compute density is disclosed. For example, a repository stores image files associated with metadata. ... Red Hat
An example system includes a memory, a processor in communication with the memory, and a compiler that includes a serializer and a deserializer. The compiler executes on the processor to receive an input including a plurality of tags associated with a message. ... Red Hat
Systems and methods for network identifier allocation for virtual machines are described. An example method may include: determining that a first network identifier has not been assigned to a virtual machine, transmitting a network identifier request to a server, and assigning a network identifier to the virtual machine based on a data packet directed to the virtual machine, the data packet comprising the second network identifier.. ... Red Hat
Methods, systems, and computer program products are included for processing one or more buffers in a networking queue. An example method includes receiving one or more transmit requests or receive requests from a guest running on a virtual machine. ... Red Hat
Mechanisms for generating a remediation script to resolve a problem condition in a remote computing device are provided. System information associated with a remote computing device is accessed. ... Red Hat
An example method for managing memory includes receiving an inflate notification including a first identifier corresponding to a first time. The inflate notification indicates that a set of guest memory pages is unused by the guest at the first time. ... Red Hat
A system and method for virtual processor state switching virtual machine functions includes a memory, one or more processors, in communication with the memory, a virtual machine executing on the one or more processors, a virtual machine function executing on the virtual machine, and a hypervisor executing on the one or more processors. The hypervisor receives from the virtual machine function a request to save a state of the virtual machine function in hypervisor memory. ... Red Hat
Methods, systems, and computer program products are included for deduplicating one or more memory pages. A method includes receiving a first key from a first application running on a computer system. ... Red Hat
Implementations of the disclosure provide for size adjustable volumes for containers. A method of the disclosure includes determining, by a processing device of the paas system, a size used space in a storage volume with respect to a container associated with an execution of an application. ... Red Hat
An example method of allocating memory pages for a guest includes receiving, by a hypervisor, a request to allocate a plurality of guest memory pages for a guest running on a virtual machine. The virtual machine and the hypervisor run on a host machine. ... Red Hat
An indication of an update to a server system may be received. In response to receiving the indication that the server system has been updated, a description associated with resources of the server system may be received. ... Red Hat
A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the publishing entity, time-stamping the first piece of evidence, storing the time-stamped first piece of evidence, sending the message to a first subscribing entity, receiving from the first subscribing entity a second piece of evidence that the message was received by the first subscribing entity, time-stamping the second piece of evidence, and storing the time-stamped second piece of evidence.. . ... Red Hat
A method and system is disclosed that identifies a job written in a first language. The job is to be performed in parallel on a plurality of nodes of a plurality of clusters. ... Red Hat
A system, methods, and apparatus for using hypervisor trapping for protection against interrupts in virtual machine functions are disclosed. A system includes memory, one or more physical processors, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. ... Red Hat
Methods, systems, and computer program products for providing dynamic batch management of shared packet buffers are disclosed. A virtualized computer system may include a hypervisor with access to memory and executed by a processor to maintain a pool of host memory to store a plurality of incoming network packets received by a network device, adjust a number of memory buffers associated with the pool of host memory to resize the pool of host memory, receive an indication of an incoming network packet stored in the pool of host memory by the network device, and provide the incoming network packet to a guest. ... Red Hat
A system and method for scheduling of hyper-threaded cpus using memory monitoring includes a memory with an operating system memory and a physical processor in communication with the memory. The physical processor includes a first hyper-thread and a second hyper-thread. ... Red Hat
Methods and systems for security threat detection are disclosed. For example, a virtual machine with a network interface of a plurality of virtual machines includes a plurality of applications including first and second applications. ... Red Hat
A method of communicating data in a node cluster of a data grid is described. The method includes receiving, at a listener of a first node, data from a second node that is filtered using the filter during a search query of a node cluster. ... Red Hat
A system and method of device assignment includes receiving, by a supervisor, an assignment request to assign a device to a first application and a second application. The first application is associated with a first memory and has a first address. ... Red Hat
Methods and systems for executing code referenced from a microservice registry are disclosed. For example, a microservice registry is stored in a memory. ... Red Hat
A system and method of translation bypass includes a hypervisor retrieving a physical bus address range from a host input-output memory management unit. The hypervisor reserves an allowed address range of the physical bus address range, and sends the allowed address range to a guest virtual machine. ... Red Hat
A page table selection system includes a memory, a processor in communication with the memory, a virtual machine, and a hypervisor. The virtual machine includes a guest executing on the processor. ... Red Hat
An example method of detecting incompatibility between an application and an application dependency includes identifying a first set of contracts exposed in a first version of an application dependency. Each contract includes a symbol and a corresponding signature. ... Red Hat
Methods and systems for creating containers by composition are disclosed. For example, a container image includes multiple layers, including first and second layers, which an image engine determines are read only or unmodified by adding any other layers. ... Red Hat
An example system includes a memory, one or more processors in communication with the memory, and a container image generator. The container image generator receives a first set of information. ... Red Hat
Systems and methods for enforcing the idempotent mode of executing commands triggered by complex event processing. An example method may comprise: receiving, by a processing device, an event data item comprising a value of a state variable; applying an event processing rule to the event data item, by evaluating a conditional statement comprising the value of the state variable, to generate an event processing command; producing a command identifier identifying the event processing command; and responsive to failing to insert the command identifier into a hash table employed for storing identifiers of executed commands, discarding the event processing command.. ... Red Hat
An implementation of the disclosure provides a method. The method comprises identifying a quality-of-service level associated with a virtual machine (vm) executed by a processing device of a host machine. ... Red Hat
Systems and methods for identifying memory devices for swapping virtual machine memory pages. An example method may comprise: identifying, by a processing device, a workload type associated with a workload being executed by a computer system; identifying a memory device associated with the workload type; evaluating a memory pressure metric reflecting a period of time during which an application being executed by the computer system has been blocked by a memory allocation operation; and responsive to determining that the memory pressure metric exceeds a threshold value, allocating a memory block on the identified memory device.. ... Red Hat
Data can be stored in a persistent-memory device, rather than a hard drive, of a computing device. A copy of the data can also be stored in another persistent-memory device of a remote computing device. ... Red Hat
Systems and methods for sharing resources between multiple processing streams. An example method may comprise: maintaining, by a processing device, a first variable indicating a number of processing streams waiting to access a resource; performing an operation on a second variable comprising a first portion and a second portion, the operation comprising updating the first portion to reflect a number of available units of the resource and further comprising reading the second portion reflecting a value of the first variable.. ... Red Hat
The present disclosure provides for dynamic resource allocation to a container on a host. For example, in a first directed acyclic graph (“dag”), a cpu resource usage of a container may be detected. ... Red Hat
A method includes receiving, by a processing device executing a validation service, a validation data associated with a first instance of an execution environment, the validation data provided by a publication service associated with a second instance of the execution environment, acquiring a decryption key from a release server associated with the execution environment, determining, using the decryption key, a validation status associated with the first instance in view of the validation data, and notifying the release server of the validation status.. . ... Red Hat
An example system includes a first machine and a second machine, a clustering module, and a training module. The clustering module receives a plurality of data sets, each including attributes. ... Red Hat
A hypervisor configures a page table entry in a host page table to map an address associated with memory-mapped input-output (mmio) for a virtual device of a guest of the hypervisor to an input/output (i/o) instruction. The address is marked in the page table entry as a hypervisor exit entry, and the page table entry to cause an exit to the hypervisor responsive to the guest attempting to access the address. ... Red Hat
A system and method for automatically validated release candidates for data-driven applications includes monitoring a first microservice and a second microservice. A respective functionality of each microservice is independently verifiable. ... Red Hat
A method including initiating a transaction comprising a plurality of data items in one or more data stores, wherein the transaction is to cause a change to at least a first data item of the plurality of data items. The method also including generating a first transactional data usable to undo the change to the first data item associated with the transaction, wherein the first transaction data comprises a serialized compensation data structure to undo the change to the first data item and complementary information regarding activities complementary to the undo operation.. ... Red Hat
The subject matter of this specification can be implemented in, among other things, a method including creating a new disk file at a reference point-in-time, wherein an original disk file is a backing file of the new disk file, copying the original disk file to a disk snapshot file, in response to the original disk file being copied to the disk snapshot file, merging the original disk file and the new disk file to form a merged file, wherein a virtual machine is to continue to perform disk operations using the merged file, and determining whether the merged file is synchronized with the original disk file and the new disk file by determining whether entries of a bitmap for the merged file match corresponding entries of a bitmap for the new disk file.. . ... Red Hat
A method includes instantiating a first web application for a first application owner on a virtual machine and instantiating a second web application for a second application owner. The second application owner is different than the first application owner. ... Red Hat
Mechanisms for identifying a component cluster among a plurality of components in a distributed computing environment are disclosed. Configuration information that corresponds to the plurality of components is accessed. ... Red Hat
An access control system includes a memory, a processor, a host operating system (os) executing on the processor, a container on the host os, and a security manager running on the host os. The container has a set of access control rules and includes a containerized utility. ... Red Hat
A system and method for identifying exploitable code sequences. In one implementation, a first processing device identifies an executable portion of a program and a set of registers of a second processing device, and stores a set of addresses in the set of registers. ... Red Hat
Systems and methods for data storage management technology that enables a guest module of a virtual machine to indicate an order in which a host module should write data from physical memory to a secondary storage. An example method may comprise: identifying, by a processing device executing a host module, a plurality of modifications to direct access excited (dax) memory made by a plurality of direct access operations executed by a guest module of a virtual machine; determining, by the host module, an order of the plurality of modifications to dax memory; receiving, by the host module, a synchronization request from the guest module; and responsive to the synchronization request, copying, by the host module, data from the dax memory to a secondary storage in view of the order of the plurality of modifications.. ... Red Hat
An example method for virtual machine (vm) live migration using intelligent order of pages to transfer includes receiving a request to live migrate a vm, transferring memory pages of the vm that are identified as at least one of read-only or executable in a first iteration of vm memory page transfer of the live migration, transferring, as part of a second iteration of the transfer, prioritized memory pages of the vm that have not been transferred as part of the first iteration, and transferring, as part of a third iteration of the transfer, other memory pages of the vm that have not been transferred as part of the first and second iterations and that are not identified as ignored memory pages of the vm, wherein the other memory pages of the vm comprise de-prioritized memory pages of the vm that are transferred last in the third iteration.. . ... Red Hat
The present disclosure provides new methods and systems for input/output command rebalancing in virtualized computer systems. For example, an i/o command may be received by a rebalancer from a virtual queue in a container. ... Red Hat
An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. ... Red Hat
Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. ... Red Hat
An example method of assigning a task to a developer includes partitioning, based on a first set of developer attributes, a list of developers into a plurality of developer clusters. The method also includes for a plurality of tasks, identifying a set of developers assigned to the respective task, identifying a developer cluster including a greater number of developers from the respective set of developers than another developer cluster, and classifying the respective task as belonging to the respective developer cluster. ... Red Hat
Method and system for deallocating shared system resources. In an example, the system includes a memory storing a system resource allocation database, a processor running a scheduler, including an i/o and a scheduler engine. ... Red Hat
Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. ... Red Hat
A system and method for guest netfilter protection using a virtual machine function includes a memory, one or more processors, in communication with the memory, a virtual machine, a hypervisor, and a virtual network interface controller on the virtual machine. The virtual machine and the hypervisor are configured to execute on the one or more processors. ... Red Hat
Mechanisms for packet creation are provided. A packet capture including a plurality of packets is accessed. ... Red Hat
Mechanisms for supplementing log messages are disclosed. A log collection agent initiates, to a centralized management system, a request for metadata associated with a first executing process of the computing device. ... Red Hat
A system for discovering and mitigating out-of-sync network parameters may determine that a first value for a parameter of a set of parameters of a logical network associated with a host computing system is different from a second value specified for the parameter in a network definition. The system may further presenting, via a user interface, the first value and the second value for the parameter and receiving, via the user interface, a confirmation of validity of the first value for the parameter. ... Red Hat
Automatic parameter value generation is disclosed. It is determined that a parameter value generation trigger associated with a parameter has occurred. ... Red Hat
Calculating a failure intensity value for a group of search sessions is provided. In one example, a method for calculating a failure intensity value for a group of search sessions is provided. ... Red Hat
Systems and methods for quality of service (qos) enforcement and data security for containers accessing storage. An example method may comprise: receiving an input/output (i/o) call initiated by a container running on a host computer system to request data from a storage device; translating the i/o call into a device emulator call to a device emulator emulating a storage device; sending the device emulator call to the device emulator; and receiving, from the device emulator, a response comprising the data retrieved from the storage device.. ... Red Hat
Systems and methods are provided for modifying one or more guest memory permissions. An example method includes receiving a request to modify a memory permission of a guest running on a virtual machine. ... Red Hat
A system and method of translation bypass includes a hypervisor configuring a host input-output memory management unit to translate a guest memory of a guest virtual machine. The hypervisor reserves a first portion of the guest memory. ... Red Hat
Systems and methods are provided for emulating guest code by a virtual machine function. An example method includes detecting, by a hypervisor, a request by a guest to access a resource. ... Red Hat
Methods, systems, and computer program products are included for migrating a virtual machine. An example method of migrating a virtual machine includes transmitting, from a hypervisor, a migration indicator to a guest. ... Red Hat
A system and method for hyper-threading based host-guest communication includes storing, by a guest, at least one request on a shared memory. A physical processor, in communication with the shared memory, includes a first hyper-thread and a second hyper-thread. ... Red Hat
A system and method for safe physical function passthrough using virtual machine functions includes sending, by a guest on a virtual machine, an access request for a host device to a virtual machine function on the virtual machine. The method also includes determining, by the virtual machine function, whether the access request is valid responsive to receiving the access request. ... Red Hat
Methods, systems, and computer program products are included for de-duplicating one or more memory pages. A method includes receiving, by a hypervisor, a list of read-only memory page hints from a guest running on a virtual machine. ... Red Hat
Mechanisms for snapshot management are provided. A request that requests that a first storage entity of type volume entity be generated is sent to an external storage service via an external interface. ... Red Hat
Methods, systems, and products bookmark gaming applications. When a player wishes to pause a gaming application, a bookmark may be created. ... Red Hat
Systems and methods for analyzing a computing image (e.g., container image, virtual disk image) while it is on a remote node in a secured environment. An example method may comprise: initiating a proxy agent on a node, the proxy agent having access to an image repository comprising an image; transmitting to the proxy agent a request for image data of the image; receiving the image data from the proxy agent; and analyzing the image data to determine a state of the image.. ... Red Hat
Systems and methods for discovering changes of network interface controller (nic) names are disclosed. An example method may comprise receiving new network configuration data comprising first network interface controller (nic) configuration data for a nic device that is identified by a permanent identifier (id), identifying the permanent id of the nic device in current network configuration data comprising second nic configuration data for the nic device, responsive to a first nic name corresponding to the permanent id in the new network configuration data being different than a second nic name corresponding to the permanent id in the current network configuration data, updating, by a processing device, the first nic configuration data in the new network configuration data to be the same as the second nic configuration data, and saving, by the processing device, the updated new network configuration data as the current network configuration data.. ... Red Hat
A processing device, responsive to requests for builds for an application, forces an error to occur during an execution of each request. The execution of each request represents an execution of a set of operations for providing a respective build. ... Red Hat
A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data. The gateway, the block store, and the object store are in a compute zone. ... Red Hat
Root cause determination in multiple process systems is disclosed. It is determined that a first process encountered a problem at a first point in time. ... Red Hat
A mechanism for managing virtual machines in a virtualization system is disclosed. A method of implementation of the disclosure includes receiving a request from a client system to route network traffic from a first network interface card (nic) of a first host system to a virtual machine. ... Red Hat
Implementations of the disclosure provide for hot-plugging of virtual functions in a virtualized environment. In one implementation, a computer system comprising a memory to store parameters of virtual functions and a processing device, operatively coupled to the memory is provided. ... Red Hat
Method for loading and garbage collecting image files. An example system includes two memories, processors, and a garbage collector including an i/o and a garbage collector engine. ... Red Hat
Devices in a wireless telecommunication system can implement a blockchain that is distributed among the devices. For example, a base transceiver station of the wireless telecommunication system can receive, from a mobile device, a wireless radio communication that includes information associated with a blockchain transaction. ... Red Hat