Oracle Patent Applications

Responding To Trigger Events That Threaten An Operability Of A Cloud Infrastructure

Granted: October 31, 2024
Application Number: 20240364579
Techniques for responding to a trigger event that threatens an operability of at least a portion of a cloud infrastructure of a cloud environment are disclosed. In response to detecting the occurrence of the trigger event, a system executes a mitigation process for mitigating an effect of the trigger event. The mitigation process includes determining a set of candidate services as candidates for stopping execution of operations in the cloud environment. In addition, the mitigation…

Providing Customers Visibility Into Security And Compliance Of Services In A Customer Cloud Infrastructure Environment

Granted: October 31, 2024
Application Number: 20240364747
Techniques for presenting information indicating infrastructure security and compliance of services of a customer cloud environment to a customer-facing dashboard are disclosed. The information presented to the customer-facing dashboard is a subset of information available to operators associated with a cloud service provider (CSP). A tier-one dashboard service obtains information indicating infrastructure security and compliance of services in the customer cloud infrastructure…

Consent-Driven Access Management For Cloud Resources

Granted: October 31, 2024
Application Number: 20240364707
Techniques for consent-driven access management include: receiving, from a requestor, a request for consent for an actor to access a target set of resources in a cloud environment; identifying a consent workflow that specifies a name and/or an attribute of a set of one or more users from which to obtain respective approvals of the consent request; traversing the consent workflow to obtain the respective approvals from the set of one or more users; determining that one or more access…

Implementing Tenancies Of Different Tenancy Types In A Cloud Environment

Granted: October 31, 2024
Application Number: 20240364690
Techniques for implementing tenancies in a cloud computing environment are disclosed. A set of tenancies is implemented, with the tenancies having a type attribute in metadata indicating that the tenancies are associated with a cloud provider. Another set of tenancies is implemented, the tenancies having a type attribute in the metadata indicating that the tenancies are associated with a cloud reseller. An additional set of tenancies is implemented with a type attribute in the metadata,…

Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements

Granted: October 31, 2024
Application Number: 20240364689
Techniques for providing user access to cloud environments through an administrative tenancy to comply with sovereignty requirements are disclosed. The administrative tenancy is one of multiple tenancies in the cloud environment. The administrative tenancy includes tools for communicating with services running outside of the administrative tenancy. The user may only be able to access these services through the administrative tenancy. User access to the administrative tenancy requires the…

SECURE TRANSFER OF WORKLOADS ACROSS SECURITY REGIONS

Granted: October 31, 2024
Application Number: 20240364668
A framework for transferring workloads between security regions of an infrastructure service. For example, techniques for transferring workloads between security regions across a private network based on signatures associated with the security regions.

Managing Resource Constraints In A Cloud Environment

Granted: October 31, 2024
Application Number: 20240364638
Techniques for managing resource constraints of a cloud environment are disclosed. A system receives a request to initiate a provisioning process for provisioning a first service in the cloud environment. The system determines a resource constraint associated with a resource that the first service utilizes. Based on the resource constraint, the system determines a set of candidate services that also utilize the resource as candidates for deprovisioning from the cloud environment. The…

Deployment Control Over Cloud Resources

Granted: October 31, 2024
Application Number: 20240364590
Techniques for controlling resource deployments in a cloud partition of a cloud environment are disclosed. A cloud service provider (CSP) operates the cloud environment where its customers can specify two-tiered constraints on deployments to their respective partitions (i.e., regions or realms). A first deployment constraint may be a global constraint set by the CSP and a second deployment constraint may be a partition-specific deployment constraint set by a customer of the CSP. Each…

Obtaining Deployment Tokens For Deploying Artifacts To A Cloud Environment

Granted: October 31, 2024
Application Number: 20240364588
Techniques for deploying artifacts to a computing environment are disclosed. A system includes a deployment service for routing requests to destination addresses in a target computing environment. The deployment service detects a request from an artifact deployment tool to deploy an artifact to the target computing environment. The deployment service obtains a deployment token representing verification that a set of one or more customer designated conditions are satisfied to deploy the…

FAILURE DETECTION AND RECOVERY TECHNIQUES FOR CONVERGED NETWORK ADAPTORS

Granted: October 31, 2024
Application Number: 20240364586
Techniques discussed herein relate to monitoring and/or detecting destabilization events of a host machine of a cloud computing environment. At least some of these destabilization events can be associated with a converged network adaptor of the host machine. The converged network adaptor may include a combination of functionality of a host network interface card (NIC) and functionality associated with a smart adaptor (e.g., a smart NIC). The smart adaptor may be configured to use at the…

Obtaining Deployment Tokens For Deploying Artifacts To A Cloud Environment

Granted: October 31, 2024
Application Number: 20240362002
Techniques for deploying artifacts to a computing environment are disclosed. A system includes an artifact deployment tool. The artifact deployment tool determines that an artifact is available for deployment to a target computing environment. The artifact deployment tool obtains a deployment token representing verification that a set of one or more customer designated conditions are satisfied to deploy the artifact to the target computing environment. The artifact deployment tool…

Controlling Operator Access To Customer Cloud Infrastructure Environments

Granted: October 31, 2024
Application Number: 20240364509
Techniques for enabling a customer operator of a cloud service provider (CSP) the ability to disable operator access to resources in a customer cloud environment are disclosed. Operator access may be disabled or suspended by operators of the CSP customer initiating a disable command. Disabling operator access includes (a) terminating existing sessions that provide operators access to the resources, (b) rejecting new requests for credentials to establish sessions that provide operator…

Enhancing Software Extensibility For Cloud Environments

Granted: October 31, 2024
Application Number: 20240362559
Techniques for enhancing software extensibility in cloud environments are disclosed. One or more embodiments receive instructions to define services and workers within the cloud, categorize workers based on predefined types, apply corresponding predefined functionality, and instantiate corresponding cloud-based infrastructure. Additionally, one or more embodiments facilitate communication and integration with third-party services. One or more embodiments further generate canary…

UNIVARIATE SERIES TRUNCATION POLICY USING CHANGEPOINT DETECTION

Granted: October 31, 2024
Application Number: 20240362517
Techniques described herein are directed toward univariate series truncation policy using change point detection. An example method can include a device determining a first time series comprising a first set of data points indexed over time. The device can determine a first and second change point of the first time series based on a relative position and a category of the change points. The device can generate a first and second truncated time series based on the change points. The…

FORECASTING DATASETS USING BLEND OF TEMPORAL AGGREGATION AND GROUPED AGGREGATION

Granted: October 31, 2024
Application Number: 20240362210
Techniques are described herein for forecasting datasets using blend of temporal aggregation and grouped aggregation. An example method can include a device accessing a first and second time series, comprising a first data point associated with a first time step and a first value and a second data point associated with a second time step and a second value. The method can further include the device determining a grouped aggregated data point using the first and second time series by…

AUTOMATIC FILESYSTEM CLONE GENERATION

Granted: October 31, 2024
Application Number: 20240362184
Techniques described herein relate to systems and methods of data storage, and more particularly to automatic file site clone generation. In certain embodiments, a computing device may include receiving a selection indicating that a clone directory is visible in a head node. In response to the selection indicating that the clone directory to be visible in the head node, the computing device may include generating a snapshot of a target file system. Also, the computing device may include…

Health Metrics Associated With Cloud Services

Granted: October 31, 2024
Application Number: 20240362142
Techniques for monitoring the health of services of a system are disclosed. A system determines a health metric for a service in a cloud environment. Additionally, the system determines a first service feature of the service and a plurality of downstream service features that depend on the first service feature. The system determines an impact weight for the first service based on the plurality of downstream service features. Additionally, the system computes a weighted health metric for…

Health Metrics Associated With Cloud Services

Granted: October 31, 2024
Application Number: 20240362130
Techniques for monitoring the health of services of a system are disclosed. A system determines that a detected alarm is associated with a service feature, and the service feature is associated with a service of a cloud environment. The system computes a health metric for the service based at least on the detected alarm that is associated with the service feature. Additionally, the system generates a visual representation that includes the health metric for display on a service health…

TECHNIQUES FOR CONSISTENT MULTI-TENANT BEHAVIOR IN MICROSERVICES BASED APPLICATIONS

Granted: October 31, 2024
Application Number: 20240362081
Techniques are disclosed for using a multi-tenant framework for microservices in a microservices-based application to implement a tenant-aware distributed cache. The microservices-based application can include at least one microservice that incorporates the multi-tenant framework. The multi-tenant framework includes software components configured to provide multi-tenant functionality for the microservice. A microservice may receive first request associated with a tenant and comprising…

Deployment Control Over Cloud Resources

Granted: October 31, 2024
Application Number: 20240362065
Techniques for controlling resource deployments in a cloud partition of a cloud environment are disclosed. A cloud service provider (CSP) operates the cloud environment where its customers can specify constraints on deployments to their respective partitions (i.e., regions or realms). A partition-specific deployment constraint is a rule that constrains the changes/updates that can be made to one or more specific partitions. A partition-specific deployment constraint applies to at least…