H04L43/0805

Message-based monitoring and action system

Disclosed are various embodiments for monitoring services in a multi-service system and detecting deviations in health metrics and/or business metrics of one or more of the services. In response to detecting a metric deviation for a given service, an enhanced message is generated detailing specific data associated with the detected deviation. The enhanced message is generated and transmitted to a recipient address associated with a services that may be affected by the deviation. An action service monitoring messages being received by a domain associated with the recipient address analyzes the information included in the message content. According to the analysis of the message, an action to be performed is identified according to the detected deviation and one or more action requests are generated and transmitted to one or more components and/or services of the multi-service system.

Message-based monitoring and action system

Disclosed are various embodiments for monitoring services in a multi-service system and detecting deviations in health metrics and/or business metrics of one or more of the services. In response to detecting a metric deviation for a given service, an enhanced message is generated detailing specific data associated with the detected deviation. The enhanced message is generated and transmitted to a recipient address associated with a services that may be affected by the deviation. An action service monitoring messages being received by a domain associated with the recipient address analyzes the information included in the message content. According to the analysis of the message, an action to be performed is identified according to the detected deviation and one or more action requests are generated and transmitted to one or more components and/or services of the multi-service system.

Deploying microservices across a service infrastructure

A method, computer system, and a computer program product for deploying a plurality of microservices across a service infrastructure having a plurality of resources is provided. The present invention may include determining at least one dependency of the plurality of microservices. The present invention may include for each resource of the plurality of resources, determining an outage distribution descriptive of an availability of the resource with respect to time. The present invention may include based on the outage distribution associated with each resource and the at least one dependency of the plurality of microservices, determining a deployment configuration of the plurality of microservices across the resources of the service infrastructure.

HARDWARE RESOURCE MANAGEMENT FOR MANAGEMENT APPLIANCES RUNNING ON A SHARED CLUSTER OF HOSTS

A method of reserving hardware resources for management appliances of a software-defined data center (SDDC) that have been deployed onto one or more hosts of a cluster of hosts, includes reserving hardware resources of the cluster for a resource pool that has been created for the management appliances, the hardware resources including at least processor resources of the hosts and memory resources of the hosts, and assigning the management appliances to the resource pool created for the management appliances. The management appliances share the hardware resources of the cluster with one or more other resource pools and, after the steps of reserving and assigning, are allocated at least the hardware resources that have been reserved for the resource pool created for the management appliances.

METHOD AND APPARATUS FOR FLEXIBLE AND EFFICIENT ANALYTICS IN A NETWORK SWITCH

Embodiments of the present invention relate to a centralized network analytic device, the centralized network analytic device efficiently uses on-chip memory to flexibly perform counting, traffic rate monitoring and flow sampling. The device includes a pool of memory that is shared by all cores and packet processing stages of each core. The counting, the monitoring and the sampling are all defined through software allowing for greater flexibility and efficient analytics in the device. In some embodiments, the device is a network switch.

METHOD AND SYSTEM FOR MONITORING SWITCH ON BASIS OF BMC, AND DEVICE AND MEDIUM
20230216731 · 2023-07-06 ·

The present disclosure relates to a baseboard management controller (BMC)-based switch monitoring method, a system, a computer device, and a readable medium thereof. The BMC-based switch monitoring method includes: virtualizing a multi-core BMC into a plurality of logical computers such that each core operates separately; in response to start of a switch, migrating functions of the switch into a first core of the multi-core BMC for start, and monitoring other cores of the multi-core BMC based on a second core of the multi-core BMC; determining, in response to that a new service is received by the switch is detected, whether the new service is a firmware upgrade service; and allocating the new service to the second core in the multi-core BMC for operation, in response to that the new service is the firmware upgrade service.

METHOD AND SYSTEM FOR MONITORING SWITCH ON BASIS OF BMC, AND DEVICE AND MEDIUM
20230216731 · 2023-07-06 ·

The present disclosure relates to a baseboard management controller (BMC)-based switch monitoring method, a system, a computer device, and a readable medium thereof. The BMC-based switch monitoring method includes: virtualizing a multi-core BMC into a plurality of logical computers such that each core operates separately; in response to start of a switch, migrating functions of the switch into a first core of the multi-core BMC for start, and monitoring other cores of the multi-core BMC based on a second core of the multi-core BMC; determining, in response to that a new service is received by the switch is detected, whether the new service is a firmware upgrade service; and allocating the new service to the second core in the multi-core BMC for operation, in response to that the new service is the firmware upgrade service.

NETWORK REACHABILITY VERIFICATION METHOD AND APPARATUS, AND COMPUTER STORAGE MEDIUM
20230216763 · 2023-07-06 ·

A network reachability verification method and apparatus, and a computer storage medium are provided, and pertain to the field of network technologies. The method includes: obtaining a source interface and a destination interface that correspond to a virtual packet in a target network; and verifying reachability of the virtual packet in an overlay network based on a logical topology of a plurality of forwarding instances of a plurality of network devices in the target network, routing information of the plurality of forwarding instances, a source forwarding instance corresponding to the source interface, and a destination forwarding instance corresponding to the destination interface. In this way, single-layer reachability verification on the overlay network in the target network is implemented, and verification accuracy is high.

HYBRID EDGE COMPUTING

Hybrid edge computing that includes a nimble framework that identifies services for available in a marketplace. The nimble framework defines a location for computing the services selected from the group consisting of a center server, an edge provision server and an edge node. The hybrid edge computing further includes a third party provider making are request for a service to the nimble framework. The hybrid edge computing further includes a virtualized service being provided by the nimble framework to the third party provider including a matched service to the third party provider request for the service, and an optimal location for computing.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.