Software container activation and throttling
First Claim
1. A non-transitory computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computer, cause the computer to:
- receive a first request from a tenant to activate the tenant in a software container, the tenant comprising an application executable in the software container;
determine that the first request indicates that, prior to activating the tenant in the first software container, execution of the software container is to be terminated, and then the execution of the software container is to be restarted;
transmit a second request to an authorization system to inquire whether the tenant is authorized to request an activation that includes a restart of the software container;
receive, from the authorization system, a response indicating that the tenant is so authorized to request the activation; and
based at least in part on determining that the tenant is authorized to request the activation;
terminate the execution of the software container;
restart the execution of the software container;
activate the tenant in the software container; and
prime the execution of the software container by replaying previously recorded network traffic to the software container following restarting the execution of the software container.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies are described herein for managing the activation of software containers, for throttling of requests directed to tenants executing in a software container, and for priming the execution of software containers. The activation of software containers and tenants may be managed by maintaining an activation queue for storing requests to activate software containers or tenants on a host computer. Requests may be retrieved from the queue and utilized to determine whether a software container or a tenant is to be activated on a host. “Bounce” or hot swap tenant activations may be performed. Tenant activation requests might also be throttled by denying the requests or by postponing the requests until a later time. A software container might also be configured to throttle incoming requests to tenants executing therein. The execution of a software container might also be primed by replaying previously recorded network traffic to the software container.
-
Citations
21 Claims
-
1. A non-transitory computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computer, cause the computer to:
-
receive a first request from a tenant to activate the tenant in a software container, the tenant comprising an application executable in the software container; determine that the first request indicates that, prior to activating the tenant in the first software container, execution of the software container is to be terminated, and then the execution of the software container is to be restarted; transmit a second request to an authorization system to inquire whether the tenant is authorized to request an activation that includes a restart of the software container; receive, from the authorization system, a response indicating that the tenant is so authorized to request the activation; and based at least in part on determining that the tenant is authorized to request the activation; terminate the execution of the software container; restart the execution of the software container; activate the tenant in the software container; and prime the execution of the software container by replaying previously recorded network traffic to the software container following restarting the execution of the software container. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer for activation of tenant in a software container on the computer, the computer comprising:
-
a processor; and a non-transitory computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by the processor, cause the computer to; receive a first request from a tenant to activate the tenant in a software container, the tenant being executable in the software container; determine whether the tenant is authorized to request an activation that includes a restart of the software container; based at least in part on a first determination that the tenant is authorized to request the activation; terminate the execution of the software container; restart the execution of the software container; activate the tenant in the software container; and prime the execution of the software container by replaying previously recorded network traffic to the software container following restarting the execution of the software container;
orbased at least in part on a second determination that the tenant is not se authorized to request the activation; activate the tenant in the software container without terminating and restarting the execution of the software container. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method for activating a tenant in a software container, comprising:
-
receiving a first request from the tenant to activate the tenant in the software container, wherein the first request indicates that, prior to activating the tenant in the software container, execution of the software container is to be terminated, and then the execution of the software container is to be restarted; in response to receiving the first request, transmitting a second request to an authorization system to inquire whether the tenant is authorized to request an activation that includes a restart of the software container; in response to transmitting the second request, receiving, from the authorization system, a first response; based at least in part on a first determination that the first response indicates that the tenant is not authorized to request activation that includes the restart of the software container then; refrain from terminating the execution of the software container, and activating the tenant in the software container without terminating and restarting the execution of the software container;
orbased at least in part on a second determination that the first response indicates that the tenant is authorized to request the activation that includes the restart of the software container then; terminating the execution of the software container; restarting the execution of the software container; priming the execution of the software container by replaying previously recorded network traffic to the software container following restarting the execution of the second software container; and activating the tenant in the software container. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification