Managing a workload in an environment
First Claim
1. A computer implemented method for testing a set of alternative environments for running a set of workloads including an original workload of an original computer environment, the method comprising:
- establishing a shadow workload on a shadow computer environment, wherein the shadow workload includes a copy of the original workload, wherein the original workload comprises a database program, wherein establishing the shadow workload further comprises;
assigning, to a set of cloud nodes of the shadow computer environment, a workload resource usage estimation comprising an estimated memory usage, a central processing unit (CPU) load, a graphics processing unit (GPU) load, a network traffic activity level, and a power consumption, wherein the workload resource usage estimation is based on resource usage statistics for the original workload;
allocating, based on the workload resource usage estimation, a portion of system resources of the set of cloud nodes for the shadow workload; and
processing, by the set of cloud nodes, a set of original workload instructions for the portion of system resources for the shadow workload;
communicating, for the shadow workload, a shadow input that includes a copy of an original input for the original workload, wherein the original input comprises a password verification request submitted to the original workload by a user attempting to access the database;
collecting an original output from the original workload and a shadow output from the shadow workload; and
determining, by comparing the original output from the original workload with the shadow output from the shadow workload, whether the shadow computer environment is configured to operate the original workload, wherein determining whether the shadow computer environment is configured to operate the original workload further comprises;
performing one or more integrity tests on the shadow computer environment, the integrity tests comprising a port isolation test, wherein the integrity tests are performed in response to detecting that a network activity value has decreased below a network activity threshold, wherein the network activity threshold comprises a data per time value, wherein the data per time value comprises 50 megabits per second;
calculating a percentage difference between the original output and the shadow output by comparing respective data packets of the original output with respective data packets of the shadow output;
comparing the percentage difference to a correspondence threshold;
in response to the percentage difference being at least the correspondence threshold, determining the shadow computer environment is configured to operate the original workload; and
in response to the percentage difference being less than the correspondence threshold, determining the shadow computer environment is not configured to operate the original workload.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and computer-implemented method for managing a workload in an environment is disclosed. The method may include establishing a shadow workload on a shadow computer environment, wherein the shadow workload is a copy of an original workload. The method may include communicating a shadow input for the shadow workload, wherein the shadow input is a copy of an original input for the original workload. The method may also include collecting an original output from the original workload and a shadow output from the shadow workload. The method may also include determining, by comparing the original output from the original workload with the shadow output from the shadow workload, whether the shadow computer environment is configured to operate the original workload.
12 Citations
11 Claims
-
1. A computer implemented method for testing a set of alternative environments for running a set of workloads including an original workload of an original computer environment, the method comprising:
-
establishing a shadow workload on a shadow computer environment, wherein the shadow workload includes a copy of the original workload, wherein the original workload comprises a database program, wherein establishing the shadow workload further comprises; assigning, to a set of cloud nodes of the shadow computer environment, a workload resource usage estimation comprising an estimated memory usage, a central processing unit (CPU) load, a graphics processing unit (GPU) load, a network traffic activity level, and a power consumption, wherein the workload resource usage estimation is based on resource usage statistics for the original workload; allocating, based on the workload resource usage estimation, a portion of system resources of the set of cloud nodes for the shadow workload; and processing, by the set of cloud nodes, a set of original workload instructions for the portion of system resources for the shadow workload; communicating, for the shadow workload, a shadow input that includes a copy of an original input for the original workload, wherein the original input comprises a password verification request submitted to the original workload by a user attempting to access the database; collecting an original output from the original workload and a shadow output from the shadow workload; and determining, by comparing the original output from the original workload with the shadow output from the shadow workload, whether the shadow computer environment is configured to operate the original workload, wherein determining whether the shadow computer environment is configured to operate the original workload further comprises; performing one or more integrity tests on the shadow computer environment, the integrity tests comprising a port isolation test, wherein the integrity tests are performed in response to detecting that a network activity value has decreased below a network activity threshold, wherein the network activity threshold comprises a data per time value, wherein the data per time value comprises 50 megabits per second; calculating a percentage difference between the original output and the shadow output by comparing respective data packets of the original output with respective data packets of the shadow output; comparing the percentage difference to a correspondence threshold; in response to the percentage difference being at least the correspondence threshold, determining the shadow computer environment is configured to operate the original workload; and in response to the percentage difference being less than the correspondence threshold, determining the shadow computer environment is not configured to operate the original workload. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for testing a set of alternative environments for running a set of workloads including an original workload of an original computer environment, the system comprising a memory and a processor configured to:
-
establish a shadow workload on a shadow computer environment, wherein the shadow workload includes a copy of the original workload wherein the original workload comprises a database program, wherein to establish the shadow workload the processor is further configured to; assign, to a set of cloud nodes of the shadow computer environment, a workload resource usage estimation comprising an estimated memory usage, a central processing unit (CPU) load, a graphics processing unit (GPU) load, a network traffic activity level, and a power consumption, wherein the workload resource usage estimation is based on resource usage statistics for the original workload; allocate, based on the workload resource usage estimation, a portion of system resources of the set of cloud nodes for the shadow workload; and process, by the set of cloud nodes, a set of original workload instructions for the portion of system resources for the shadow workload; communicate a shadow input for the shadow workload, wherein the shadow input includes a copy of an original input for the original workload, wherein the original input comprises a password verification request submitted to the original workload by a user attempting to access the database; collect an original output from the original workload and a shadow output from the shadow workload; and determine, by comparing the original output from the original workload with the shadow output from the shadow workload, whether the shadow computer environment is configured to operate the original workload, wherein the processor configured to determine whether the shadow computer environment is configured to operate the original workload is further configured to; perform one or more integrity tests on the shadow computer environment, the integrity tests comprising a port isolation test, wherein the integrity tests are performed in response to detecting that a network activity value has decreased below a network activity threshold, wherein the network activity threshold comprises a data per time value, wherein the data per time value comprises 50 megabits per second; calculate a percentage difference between the original output and the shadow output by comparing respective data packets of the original output with respective data packets of the shadow output; compare the percentage difference to a correspondence threshold; in response to the percentage difference being at least the correspondence threshold, determine the shadow computer environment is configured to operate the original workload; and in response to the percentage difference being less than the correspondence threshold, determine the shadow computer environment is not configured to operate the original workload. - View Dependent Claims (8, 9)
-
-
10. A computer program product comprising a computer readable storage medium having a computer readable program stored therein, wherein the computer readable program, when executed on a first computing device, causes the first computing device to:
-
establish a shadow workload on a shadow computer environment, wherein the shadow workload includes a copy of an original workload, wherein the original workload comprises a database program, wherein to establish the shadow workload the computing device is further configured to; assign, to a set of cloud nodes of the shadow computer environment, a workload resource usage estimation comprising an estimated memory usage, a central processing unit (CPU) load, a graphics processing unit (GPU) load, a network traffic activity level, and a power consumption, wherein the workload resource usage estimation is based on resource usage statistics for the original workload; allocate, based on the workload resource usage estimation, a portion of system resources of the set of cloud nodes for the shadow workload; and process, by the set of cloud nodes, a set of original workload instructions for the portion of system resources for the shadow workload; communicate a shadow input for the shadow workload, wherein the shadow input includes a copy of an original input for the original workload, wherein the original input comprises a password verification request submitted to the original workload by a user attempting to access the database; collect an original output from the original workload and a shadow output from the shadow workload; and determine, by comparing the original output from the original workload with the shadow output from the shadow workload, whether the shadow computer environment is configured to operate the original workload, wherein to determine whether the shadow computer environment is configured to operate the original workload, the computing device is further configured to; perform one or more integrity tests on the shadow computer environment, the integrity tests comprising a port isolation test, wherein the integrity tests are performed in response to detecting that a network activity value has decreased below a network activity threshold, wherein the network activity threshold comprises a data per time value, wherein the data per time value comprises 50 megabits per second; calculate a percentage difference between the original output and the shadow output by comparing respective data packets of the original output with respective data packets of the shadow output; compare the percentage difference to a correspondence threshold; in response to the percentage difference being at least the correspondence threshold, determine the shadow computer environment is configured to operate the original workload; and in response to the percentage difference being less than the correspondence threshold, determine the shadow computer environment is not configured to operate the original workload. - View Dependent Claims (11)
-
Specification