白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Distribution and execution of instructions in a distributed computing environment

專利號
US11175901B2
公開日期
2021-11-16
申請人
VMware, Inc.(US CA Palo Alto)
發(fā)明人
Dimitar Ivanov; Martin Draganchev; Bryan Paul Halter; Nikola Atanasov; James Harrison
IPC分類
G06F9/44; G06F8/65; G06F8/61; H04L29/08; H04L12/24; G06F9/455
技術(shù)領域
management,endpoint,example,blueprint,agent,or,repository,in,executor,deployment
地域: CA CA Palo Alto

摘要

Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example method includes accessing, by executing an instruction with a processor implementing a management agent within a deployment environment, an indication of an instruction to be executed, the indication of the instruction to be executed provided by a management endpoint operated at a virtual appliance within the deployment environment. The instruction is retrieved from a repository. The repository is identified by the indication of the instruction to be executed. An instruction executor is directed to execute the instruction. The instruction is to cause the instruction executor to install an update to the management agent.

說明書

RELATED APPLICATION

This patent arises from a continuation of U.S. patent application Ser. No. 15/370,747, (Now U.S. Pat. No. 10,558,449) which was filed on Dec. 6, 2016. U.S. patent application Ser. No. 15/370,747 is hereby incorporated herein by reference in its entirety. Priority to U.S. patent application Ser. No. 15/370,747 is hereby claimed.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to cloud computing and, more particularly, to methods and apparatus to distribution and execution of instructions in a distributed computing environment.

BACKGROUND

Virtualizing computer systems provides benefits such as the ability to execute multiple computer systems on a single hardware computer, replicating computer systems, moving computer systems among multiple hardware computers, and so forth.

“Infrastructure-as-a-Service” (also commonly referred to as “IaaS”) generally describes a suite of technologies provided by a service provider as an integrated solution to allow for elastic creation of a virtualized, networked, and pooled computing platform (sometimes referred to as a “cloud computing platform”). Enterprises may use IaaS as a business-internal organizational cloud computing platform (sometimes referred to as a “private cloud”) that gives an application developer access to infrastructure resources, such as virtualized servers, storage, and networking resources. By providing ready access to the hardware resources required to run an application, the cloud computing platform enables developers to build, deploy, and manage the lifecycle of a web application (or any other type of networked application) at a greater scale and at a faster pace than ever before.

權(quán)利要求

1
What is claimed is:1. An apparatus comprising:at least one memory; andan instruction retriever to, in response to a first verification validating that an indication of an instruction includes a valid (1) location and (2) format corresponding to the instruction, retrieve the instruction from a repository, the location being a location associated with the repository;an instruction validator to perform a second verification on the instruction; andan instruction executor interface to direct a component server to execute the instruction in response to the second verification, the instruction to cause the component server to install an update to the apparatus.2. The apparatus of claim 1, wherein the instruction validator is to perform the second verification by computing a first checksum of the instruction and comparing the first checksum to a second checksum provided by the repository.3. The apparatus of claim 1, wherein the instruction validator is to perform the second verification by performing at least one of:a third verification to identify whether pre-requisites of the instruction has been installed; anda virus scan on the instruction.4. The apparatus of claim 1, wherein the apparatus includes an instruction executor to execute the instruction in a separate execution space from the instruction executor interface.5. The apparatus of claim 4, wherein the instruction retriever is to store the instruction in an instruction cache, and the instruction executor interface is to direct the instruction executor to execute the instruction stored in the instruction cache.6. The apparatus of claim 1, wherein the apparatus is to, responsive to the second verification indicating the instruction is not valid, delete the instruction from an instruction cache.7. The apparatus of claim 1, wherein the instruction is a PowerShell script file.8. A non-transitory computer readable medium comprising first instructions which, when executed, cause at least one processor to at least:in response to a first verification validating that an indication of a second instruction includes a valid (1) location from which the second instruction is to be retrieved and (2) format corresponding to the second instruction, retrieve the second instruction from a repository associated with the location;perform a second verification on the second instruction; anddirect a component server to execute the second instruction in response to the second verification, the second instruction to cause the component server to install an update to a management agent.9. The non-transitory computer readable medium of claim 8, wherein the first instructions, when executed, cause the at least one processor to perform the second verification by computing a first checksum of the second instruction and comparing the first checksum to a second checksum provided by the repository.10. The non-transitory computer readable medium of claim 8, wherein the first instructions, when executed, cause the at least one processor to perform the second verification by performing at least one of:a third verification to identify whether pre-requisites of the second instruction has been installed; anda virus scan on the second instruction.11. The non-transitory computer readable medium of claim 8, wherein the first instructions, when executed, cause the at least one processor to execute the second instruction in a separate execution space from the management agent.12. The non-transitory computer readable medium of claim 11, wherein the first instructions, when executed, cause the at least one processor to:store the second instruction in an instruction cache; andexecute the second instruction stored in the instruction cache.13. The non-transitory computer readable medium of claim 8, wherein the first instructions, when executed, cause the at least one processor to, responsive to the second verification indicating the second instruction is not valid, delete the second instruction from an instruction cache.14. The non-transitory computer readable medium of claim 8, wherein the second instruction is a PowerShell script file.15. A method comprising:in response to a first verification validating that an indication of an instruction includes a valid (1) location at a repository from which the instruction is to be retrieved and (2) format corresponding to the instruction, retrieving the instruction from the repository;performing a second verification on the instruction; anddirecting a component server to execute the instruction in response to the second verification, the instruction to cause the component server to install an update to a management agent.16. The method of claim 15, further including performing the second verification by computing a first checksum of the instruction and comparing the first checksum to a second checksum provided by the repository.17. The method of claim 15, further including performing the second verification by performing at least one of:a third verification to identify whether pre-requisites of the instruction has been installed; anda virus scan on the instruction.18. The method of claim 15, further including executing the instruction in a separate execution space from the management agent.19. The method of claim 18, further including:storing the instruction in an instruction cache; andexecuting the instruction stored in the instruction cache.20. The method of claim 15, further including, responsive to the second verification indicating the instruction is not valid, deleting the instruction from an instruction cache.21. An apparatus, comprising:at least one memory; andfirst instructions in the apparatus; andprocessor circuitry to execute the first instructions to:in response to a first verification validating that an indication of a second instruction includes (1) a valid location from which the second instruction is to be retrieved and (2) a valid format corresponding to the second instruction, retrieve the second instruction from a repository associated with the location;perform a second verification on the second instruction; anddirect a component server to execute the second instruction in response to the second verification, the second instruction to cause the component server to install an update to a management agent.22. The apparatus of claim 21, wherein the processor circuitry is to perform the second verification by computing a first checksum of the second instruction and comparing the first checksum to a second checksum provided by the repository.23. The apparatus of claim 21, wherein the processor circuitry is to perform the second verification via at least one of:a third verification to identify whether a pre-requisite of the second instruction has been installed; anda virus scan on the second instruction.24. The apparatus of claim 21, wherein the component server is to execute the second instruction in a separate execution space from the management agent.25. The apparatus of claim 21, wherein the processor circuitry is to:cause storage of the second instruction in an instruction cache; anddirect the component server to execute the second instruction from the instruction cache.26. The apparatus of claim 21, wherein the processor circuitry is to, responsive to the second verification indicating the second instruction is not valid, delete the second instruction from an instruction cache.27. The apparatus of claim 21, wherein the second instruction is a PowerShell script file.
微信群二維碼
意見反饋