Patents Assigned to Red Hat Israel, Inc.
-
Patent number: 10423433Abstract: Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a network address to be associated with a network interface of a machine, wherein the machine is represented by one of: a virtual machine or a computer system; identifying a hierarchy of groups that include the machine; searching the hierarchy of groups to identify a group having an associated pool of network addresses; and selecting a network address from the pool of network addresses.Type: GrantFiled: February 23, 2015Date of Patent: September 24, 2019Assignee: Red Hat Israel, Inc.Inventors: Michael Kolesnik, Mordechay Asayag
-
Patent number: 10223219Abstract: A method of managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of networks. The method includes determining whether the plurality of hypervisors satisfies an unavailability condition, and, in response to determining that the plurality of hypervisors satisfies the unavailability condition, re-assigning a first network role of a first network to a back-up network.Type: GrantFiled: December 21, 2016Date of Patent: March 5, 2019Assignee: Red Hat Israel, Inc.Inventors: Alona Kaplan, Michael Kolesnik
-
Patent number: 9430257Abstract: A processing device receives a rule for execution by a rules engine and provides the rule to the rules engine. The processing device receives a request to provision a virtual machine (VM) having VM attributes. The processing device provides metrics of a plurality of physical hosts to the rules engine and the VM attributes to the rules engine. The processing device then receives. from the rules engine, an identification of one or more prioritized physical hosts of the plurality of physical hosts. The processing device provisions the VM on one of the one or more prioritized physical hosts.Type: GrantFiled: January 3, 2013Date of Patent: August 30, 2016Assignee: Red Hat Israel, Inc.Inventors: Yair Zaslavsky, Doron Fediuck, Laszlo Hornyak
-
Patent number: 9026998Abstract: A data processing system obtains a delta between a first version of a target program and a second version of the target program, wherein the target program has been tested by a plurality of test routines. The data processing system obtains test coverage data that has been generated for the plurality of test routines, the test coverage data for a test routine identifying lines of code of the target program that have been previously tested by said test routine. The data processing system ranks the plurality of test routines based on the test coverage data and based on the delta. The data processing system selects one of the plurality of test routines based on the ranking and executes the selected test routine on the second version of the target program to determine code stability of the second version of the target program.Type: GrantFiled: October 6, 2011Date of Patent: May 5, 2015Assignee: Red Hat Israel, Inc.Inventor: Saggi Yehuda Mizrahi
-
Publication number: 20130326498Abstract: A mechanism for provisioning composite application using secure parameter transfer is disclosed. A method of one embodiment of the invention includes receiving a request for a configuration parameter from a first component of a composite Web application residing on a first virtual machine (VM), The requested configuration parameter can be related to a second component of the composite Web application residing on a second VM. The role of the first component in the composite Web application is identified and a determination is made as to whether the first component has access to the requested configuration parameter based on the role of the first component. If the first component has access, then the requested configuration parameter is provided to the first component.Type: ApplicationFiled: May 30, 2012Publication date: December 5, 2013Applicant: RED HAT ISRAEL, INC.Inventors: Ohad Shaul Anaf Levy, Amos Benari
-
Publication number: 20130325885Abstract: Embodiments of the invention provide a mechanism for provisioning composite applications using a hierarchical data structures. A method of embodiments of the invention includes receiving, by a provisioning server, a request for a configuration parameter from a first component of a composite Web application having a plurality of components implemented on a virtual machines (VM), and retrieving information about the composite Web application related to one or more additional components of the composite Web application. The information can then be compared to a match condition of one or more elements of a highest level of a hierarchical data structure that has a plurality of elements organized into levels. if a match condition of a first element is satisfied based on the comparison, a value for the requested configuration parameter is determined based on data contained in the first element of the hierarchical data structure.Type: ApplicationFiled: May 30, 2012Publication date: December 5, 2013Applicant: RED HAT ISRAEL, INC.Inventors: Ohad Shaul Anaf Levy, Amos Benari
-
Publication number: 20120263191Abstract: A computing device assigns a quota to a entity, the quota specifying a total amount of a low level resource that the entity is permitted to use. The computing device divides the quota into quota portions, and assigns each of the quota portions to one of a plurality of high level resources assigned to the entity. Each of the plurality of high level resources may use low level resources of a plurality of targets. The computing device automatically adjusts quota portions for one or more of the plurality of high level resources in response to changes in utilization requirements of the plurality of high level resources.Type: ApplicationFiled: April 12, 2011Publication date: October 18, 2012Applicant: Red Hat Israel, Inc.Inventor: Ayal Baron
-
Publication number: 20120266162Abstract: A mechanism for storing virtual machines on a file system in a distributed environment is disclosed. A method of the invention includes initializing creation of a VM by a hypervisor of a host machine, allocating a logical volume from a logical volume group of a shared storage pool to the VM, and creating a file system on top of the allocated logical volume, the file system to manage all files, metadata, and snapshots associated with the VM.Type: ApplicationFiled: April 12, 2011Publication date: October 18, 2012Applicant: Red Hat Israel, Inc.Inventor: Ayal Baron
-
Publication number: 20120266161Abstract: A computing device receives a command to start a virtual machine, the virtual machine having a read-only layer and a copy-on-write (COW) layer. The computing device accesses the COW layer of the virtual machine from a network storage. The computing device determines whether the read-only layer of the virtual machine is cached in a local storage. Upon determining that the read-only layer of the virtual machine is cached in the local storage, the computing device starts the virtual machine based on a combination of the downloaded COW layer and the cached read-only layer of the virtual machine.Type: ApplicationFiled: April 12, 2011Publication date: October 18, 2012Applicant: Red Hat Israel, Inc.Inventor: Ayal Baron