The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 11, 2023

Filed:

Apr. 30, 2019
Applicant:

Alibaba Group Holding Limited, Grand Cayman, KY;

Inventors:

Yuqian Li, Zhejiang, CN;

Hua Xu, Zhejiang, CN;

Yu Ding, Zhejiang, CN;

Xingfei Yang, Zhejiang, CN;

Tao Huang, Zhejiang, CN;

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 9/50 (2006.01); G06F 11/30 (2006.01); G06F 11/34 (2006.01); H04L 67/101 (2022.01); H04L 67/10 (2022.01);
U.S. Cl.
CPC ...
G06F 9/505 (2013.01); G06F 9/50 (2013.01); G06F 11/3024 (2013.01); G06F 11/3433 (2013.01); H04L 67/101 (2013.01); G06F 9/5027 (2013.01); G06F 9/5038 (2013.01); G06F 9/5072 (2013.01); G06F 9/5077 (2013.01); G06F 11/3414 (2013.01); G06F 11/3442 (2013.01); G06F 11/3457 (2013.01); G06F 2201/81 (2013.01); H04L 67/10 (2013.01);
Abstract

Application link scaling method, apparatus and system are provided. The method includes obtaining an application link, the application link being a path formed by at least two associated applications for a service scenario; determining information of target resources required by capacity scaling for all applications in the application link; allocating respective resources to the applications according to the information of the target resources; and generating instances for the applications to according the respective resources. From the perspective of services, the method performs capacity assessment for related applications on a link as a whole, and capacity scaling of the entire link, thus fully utilizing resources, and preventing the applications from being called by other applications which results in insufficient resources. This ensures the applications not to become the vulnerability of a system, ensures the stability of the system, avoids allocating excessive resources to the applications, and reduces a waste of resources.


Find Patent Forward Citations

Loading…