Patents by Inventor Boaz Shuster
Boaz Shuster has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11966323Abstract: System calls can be used to troubleshoot problems with software services. For example, a system can receive tracing data indicating system calls executed by a group of software services. The system can analyze parameters of the system calls described in the tracing data to identify relationships between the system calls. The system can determine a sequence of system calls between a predefined starting event and a predefined ending event based on the relationships between the system calls. The system can then generate an output to a user indicating the sequence of system calls. The output can be used by the user to troubleshoot a problem associated with executing the plurality of software services.Type: GrantFiled: January 5, 2021Date of Patent: April 23, 2024Assignee: RED HAT, INC.Inventors: Alexander Braverman Masis, Boaz Shuster
-
Patent number: 11816022Abstract: Methods, systems, and computer program products are provided to identify a set of functions within a first service module that calls a second service module. Both the first service module and the second service module are associated with an application that is structure with a plurality of interworking service modules. The first service module is executed to send requests to the second service module when the set of functions is called. The responses to the requests are captured, and stored in a snapshot data structure. A modified first service module is created, in which the set of functions are modified to return a response from the snapshot data structure in place of the second service module. A unit test is performed on the modified first service module.Type: GrantFiled: July 3, 2018Date of Patent: November 14, 2023Assignee: Red Hat Israel, Ltd.Inventors: Boaz Shuster, Oded Ramraz
-
Patent number: 11803429Abstract: Managing alert messages and access permissions for applications. In one embodiment, a method is provided. The method includes determining that one or more errors have occurred in a set of applications executing in a set of containers. The method also includes identifying a set of users in view of one or more of the set of containers and a set of files for the set of applications. The method further includes sending, via a set of messaging systems, a set of messages to the set of users to indicate that the one or more errors have occurred in the set of applications.Type: GrantFiled: October 30, 2020Date of Patent: October 31, 2023Assignee: Red Hat, Inc.Inventors: Boaz Shuster, Shay Shevach
-
Patent number: 11586531Abstract: Generating test input values for functional components based on test coverage analysis is disclosed herein. In one example, a processor device of a computing device performs a test coverage analysis of a plurality of programming instructions of a functional component that takes a plurality of input parameters. Based on the test coverage analysis, the processor device identifies a subset of the programming instructions for which testing has not been performed. The processor device then identifies a data type for each of the functional component's input parameters, and generates test input values based on the data types and the test coverage analysis, including a test input value that causes executable instructions corresponding to the subset of programming instructions to be executed during subsequent testing. The test input values may be used during subsequent unit testing to ensure full test coverage of the functional component.Type: GrantFiled: September 30, 2020Date of Patent: February 21, 2023Assignee: Red Hat, Inc.Inventors: Shay Shevach, Boaz Shuster
-
Patent number: 11561801Abstract: Predicting execution duration for user-defined functions on function-as-a-service (FaaS) cloud computing platforms is disclosed herein. In one example, a processor device of an FaaS cloud computing platform detects an event that triggers execution of a user-defined function, and automatically fetches an environmental metric that represents a current attribute or condition of the operating environment in which the user-defined function will execute. The processor device then calculates a predicted execution duration for the user-defined function based on the environmental metric, and compares the predicted execution duration to an execution duration threshold. If the predicted execution duration exceeds the execution duration threshold, the processor device prevents execution of the user-defined function by the FaaS cloud computing platform. If the predicted execution duration does not exceed the execution duration threshold, the processor device may initiate execution of the user-defined function.Type: GrantFiled: April 24, 2020Date of Patent: January 24, 2023Assignee: Red Hat, Inc.Inventors: Aviel Yosef, Boaz Shuster
-
Patent number: 11537523Abstract: Implementations of the disclosure provide systems and methods for receiving, by a processing device, a request for an application image. A sequence of commands associated with the application image and a value of a parameter associated with the sequence of commands is received. Responsive to determining that the sequence of commands has been previously executed with the value of the parameter, the processing device retrieves, from a cache, a result of executing the sequence with the value of the parameter. The application image is built using the first result of executing the sequence.Type: GrantFiled: July 31, 2019Date of Patent: December 27, 2022Assignee: Red Hat, Inc.Inventor: Boaz Shuster
-
Patent number: 11474932Abstract: A method includes identifying a set of tests for a source code, analyzing the set of tests to identify overlapping blocks of the source code that are to be tested by each of the set of tests, merging a subset of the tests that include the overlapping blocks of the source code to create a merged test, and causing the merged test to be executed to test the source code. In an implementation, code coverage results are used when analyzing the set of tests to identify overlapping blocks of the source code.Type: GrantFiled: February 4, 2021Date of Patent: October 18, 2022Assignee: Red Hat Israel, Ltd.Inventors: Oded Ramraz, Boaz Shuster
-
Patent number: 11474794Abstract: Generating mock services based on log entries is disclosed herein. In some examples, a processor device of a computing device retrieves a plurality of log entries related to an error condition within a container platform. The processor device identifies a first pair of log entries that corresponds to a first request message received by a first service and a first response message sent by the first service, where the first response message corresponds to the error condition. The processor device next identifies a second pair of log entries that corresponds to a second request message sent by the first service to a second service and a second response message received by the first service from the second service. Based on the second pair of log entries, the processor device generates a mock service that simulates functionality of the second service for use in subsequent testing of the first service.Type: GrantFiled: November 25, 2020Date of Patent: October 18, 2022Assignee: Red Hat, Inc.Inventors: Ido Ovadia, Boaz Shuster
-
Publication number: 20220261405Abstract: A system, include a memory and a processor where the processor is in communication with the memory. The processor is configured to receive a request to analyze an infrastructure comprising a first set of components. Keywords associated with the infrastructure are retrieved and a database is queried, where the database comprises implementations of infrastructures, to retrieve a second set of components associated with the keywords. The processor is configured to determine whether the second set of service level objectives corresponds to the first set of service level objectives. Extra service level indicators are added from the second set of service level indicators to the first set of service level indicators to create a third set of service level indicators. The third set of service level indicators are monitored during operation of the infrastructure to determine whether the first set of service level objectives are met.Type: ApplicationFiled: February 16, 2021Publication date: August 18, 2022Inventors: Boaz Shuster, Oded Ramraz
-
Publication number: 20220214961Abstract: System calls can be used to troubleshoot problems with software services. For example, a system can receive tracing data indicating system calls executed by a group of software services. The system can analyze parameters of the system calls described in the tracing data to identify relationships between the system calls. The system can determine a sequence of system calls between a predefined starting event and a predefined ending event based on the relationships between the system calls. The system can then generate an output to a user indicating the sequence of system calls. The output can be used by the user to troubleshoot a problem associated with executing the plurality of software services.Type: ApplicationFiled: January 5, 2021Publication date: July 7, 2022Inventors: Alexander Braverman Masis, Boaz Shuster
-
Publication number: 20220164168Abstract: Generating mock services based on log entries is disclosed herein. In some examples, a processor device of a computing device retrieves a plurality of log entries related to an error condition within a container platform. The processor device identifies a first pair of log entries that corresponds to a first request message received by a first service and a first response message sent by the first service, where the first response message corresponds to the error condition. The processor device next identifies a second pair of log entries that corresponds to a second request message sent by the first service to a second service and a second response message received by the first service from the second service. Based on the second pair of log entries, the processor device generates a mock service that simulates functionality of the second service for use in subsequent testing of the first service.Type: ApplicationFiled: November 25, 2020Publication date: May 26, 2022Inventors: Ido Ovadia, Boaz Shuster
-
Publication number: 20220138023Abstract: Managing alert messages and access permissions for applications. In one embodiment, a method is provided. The method includes determining that one or more errors have occurred in a set of applications executing in a set of containers. The method also includes identifying a set of users in view of one or more of the set of containers and a set of files for the set of applications. The method further includes sending, via a set of messaging systems, a set of messages to the set of users to indicate that the one or more errors have occurred in the set of applications.Type: ApplicationFiled: October 30, 2020Publication date: May 5, 2022Inventors: Boaz Shuster, Shay Shevach
-
Publication number: 20220100640Abstract: Generating test input values for functional components based on test coverage analysis is disclosed herein. In one example, a processor device of a computing device performs a test coverage analysis of a plurality of programming instructions of a functional component that takes a plurality of input parameters. Based on the test coverage analysis, the processor device identifies a subset of the programming instructions for which testing has not been performed. The processor device then identifies a data type for each of the functional component's input parameters, and generates test input values based on the data types and the test coverage analysis, including a test input value that causes executable instructions corresponding to the subset of programming instructions to be executed during subsequent testing. The test input values may be used during subsequent unit testing to ensure full test coverage of the functional component.Type: ApplicationFiled: September 30, 2020Publication date: March 31, 2022Inventors: Shay Shevach, Boaz Shuster
-
Patent number: 11281561Abstract: Determining user behavior using user interface log records. A plurality of log files, generated by an application in response to user interface inputs from a corresponding plurality of users accessing a user interface of the application to accomplish a task, is accessed. Each log file includes a plurality of log records that identify user interface inputs of the corresponding user to user input controls of the user interface. Each respective log file of the plurality of log files is analyzed to identify a path of a plurality of different potential paths taken by the corresponding user from a start user input control to an end user input control to accomplish the task. Information is stored that identifies a common path from the start user input control to the end user input control based on the path taken by the corresponding user for each log file and a common path criterion.Type: GrantFiled: September 9, 2019Date of Patent: March 22, 2022Assignee: Red Hat, Inc.Inventors: Oded Ramraz, Boaz Shuster
-
Publication number: 20220075769Abstract: Mechanisms for consolidating log information from remote computing devices are provided. Connections with a plurality of remote computing devices are established. Each remote computing device has a corresponding logfile. For a plurality of iterations, logfile contents from each logfile on each remote computing device are retrieved, and the logfile contents are sent to a centralized monitoring service.Type: ApplicationFiled: November 22, 2021Publication date: March 10, 2022Inventor: Boaz Shuster
-
Patent number: 11249749Abstract: A method includes receiving one or more project environment features of a project, identifying one or more relevant projects from a number of known projects by comparing the one or more project environment features of the project to one or more project environment features of each of the known projects, and generating at least a portion of a configuration file based on one or more configuration files from each of the one or more relevant projects. Identifying relevant projects from a number of known projects by comparing project environment features and subsequently using configuration files from the relevant projects to generate at least a portion of the configuration file allows for a robust configuration file to be created without effort on the part of a user.Type: GrantFiled: March 26, 2020Date of Patent: February 15, 2022Assignee: Red Hat, Inc.Inventors: Ido Ovadia, Boaz Shuster
-
Patent number: 11195115Abstract: A method of predicting a format of a file includes calculating a quotient vector storing a list of values in slots. Each slot of the quotient vector and binary vector correspond to a character of a set of distinct characters based on an order. Each value in the quotient vector indicates a frequency with which the corresponding distinct character is found relative to the set of distinct characters found in a file. The method also includes calculating, based on comparing each value in the quotient vector to a threshold, a binary vector storing a list of values in slots. The method further includes predicting, based on the binary vector, a format of the file.Type: GrantFiled: February 21, 2018Date of Patent: December 7, 2021Assignee: RED HAT ISRAEL, LTD.Inventor: Boaz Shuster
-
Patent number: 11188513Abstract: Mechanisms for consolidating log information from remote computing devices are provided. Connections with a plurality of remote computing devices are established. Each remote computing device has a corresponding logfile. For a plurality of iterations, logfile contents from each logfile on each remote computing device are retrieved, and the logfile contents are sent to a centralized monitoring service.Type: GrantFiled: July 6, 2016Date of Patent: November 30, 2021Assignee: Red Hat, Inc.Inventor: Boaz Shuster
-
Publication number: 20210334107Abstract: Predicting execution duration for user-defined functions on function-as-a-service (FaaS) cloud computing platforms is disclosed herein. In one example, a processor device of an FaaS cloud computing platform detects an event that triggers execution of a user-defined function, and automatically fetches an environmental metric that represents a current attribute or condition of the operating environment in which the user-defined function will execute. The processor device then calculates a predicted execution duration for the user-defined function based on the environmental metric, and compares the predicted execution duration to an execution duration threshold. If the predicted execution duration exceeds the execution duration threshold, the processor device prevents execution of the user-defined function by the FaaS cloud computing platform. If the predicted execution duration does not exceed the execution duration threshold, the processor device may initiate execution of the user-defined function.Type: ApplicationFiled: April 24, 2020Publication date: October 28, 2021Inventors: Aviel Yosef, Boaz Shuster
-
Publication number: 20210303295Abstract: A method includes receiving one or more project environment features of a project, identifying one or more relevant projects from a number of known projects by comparing the one or more project environment features of the project to one or more project environment features of each of the known projects, and generating at least a portion of a configuration file based on one or more configuration files from each of the one or more relevant projects. Identifying relevant projects from a number of known projects by comparing project environment features and subsequently using configuration files from the relevant projects to generate at least a portion of the configuration file allows for a robust configuration file to be created without effort on the part of a user.Type: ApplicationFiled: March 26, 2020Publication date: September 30, 2021Inventors: Ido Ovadia, Boaz Shuster