Patent classifications
H04L41/0869
INTERNET OF THINGS COMMUNICATION METHOD AND APPARATUS
Provided by the present disclosure are an Internet of Things communication method and apparatus. The method comprises: sending subscription information to a server, wherein the subscription information is used to request a subscription to a target resource on the server; receiving subscription response information sent by the server, wherein the subscription response information is used to characterize that a client successfully subscribes to the target resource, and the subscription response information comprises a validity period of the current state of the target resource; and once the validity period of the current state of the target resource expires, resending the subscription information of the target resource to the server.
GENERATING USER INTERFACE ELEMENTS BASED ON DATA SCHEMA FILES
Methods and systems for improved generation of user interfaces based on data schemas are provided. In one embodiment, a method is provided that includes receiving a data schema file and identifying a data schema within the data schema file. The data schema file may identify valid data for a computing service, such as an API. The data schema may be provided to a validation service, which may test whether a plurality of sentinel values comply with the data schema. An error message may be received from the validation service and a user interface element may be selected based on the error message. The user interface element may be added to the user interface.
INTEGRATED SERVICE MESH CONTROL PLANE MANAGEMENT
This disclosure describes an integrated management method to manage a service mesh data plane over a network fabric. The method includes determining at least one service mesh data plane policy for a microservice of a service mesh. The method further includes sending, over the network fabric, the at least one service mesh data plane policy to a virtual router associated with the microservice based at least in part on connectivity information maintained by a network fabric control plane manager of a configuration manager.
INTEGRATED SERVICE MESH CONTROL PLANE MANAGEMENT
This disclosure describes an integrated management method to manage a service mesh data plane over a network fabric. The method includes determining at least one service mesh data plane policy for a microservice of a service mesh. The method further includes sending, over the network fabric, the at least one service mesh data plane policy to a virtual router associated with the microservice based at least in part on connectivity information maintained by a network fabric control plane manager of a configuration manager.
Cloud computing infrastructure pipelines with run triggers
Systems and methods of managing information technology infrastructure are described. A method includes identifying a run trigger between a first node and a second node, each node maintaining a configuration for a portion of a cloud computing infrastructure associated with executing a portion of a cloud-based application. The run trigger initiates in response to an action at the first node and comprises a source identifier identifying the first node and a destination identifier identifying the second node. Then a run is queued on the second node based on the run trigger, the run including a process executed on the second portion of the cloud computing infrastructure with data received by the second node and associated with a run source identifier. The run on the second node is then planned and executed, causing the cloud computing infrastructure to modify infrastructure resources associated with the second portion of the cloud computing infrastructure.
Cloud computing infrastructure pipelines with run triggers
Systems and methods of managing information technology infrastructure are described. A method includes identifying a run trigger between a first node and a second node, each node maintaining a configuration for a portion of a cloud computing infrastructure associated with executing a portion of a cloud-based application. The run trigger initiates in response to an action at the first node and comprises a source identifier identifying the first node and a destination identifier identifying the second node. Then a run is queued on the second node based on the run trigger, the run including a process executed on the second portion of the cloud computing infrastructure with data received by the second node and associated with a run source identifier. The run on the second node is then planned and executed, causing the cloud computing infrastructure to modify infrastructure resources associated with the second portion of the cloud computing infrastructure.
Tracking application programming interface requests in a cloud computing system
Techniques are provided for tracking application programming interface (API) requests in a cloud computing environment. For example, a method for tracking API requests is implemented by an API gateway. The API gateway receives an API request which comprises a given API endpoint to access a target service of a computing system. The API gateway determines if the received API request is valid. In response to determining that the received API request is valid, the API gateway accesses at least one API counter associated with the given API endpoint of the received API request, wherein the at least one API counter is configured to count a number of times that the given API endpoint is accessed. The API gateway increments a count of the at least one API counter by one, and the API gateway routes the API request to the target service for execution.
MANUFACTURER USAGE DESCRIPTION MUD FILE OBTAINING METHOD AND DEVICE
Embodiments of this application disclose a manufacturer usage description (MUD) file obtaining method and a device. A MUD controller uses a verified valid MUD uniform resource locator (URL) as a trusted basis. When a terminal device is currently updated, the MUD controller obtains a new MUD file based on a new MUD URL that meets a matching condition with the trusted MUD URL. Alternatively, the MUD controller uses fixed attribute information of a valid MUD URL as a trusted basis. When a terminal device is currently updated, the MUD controller obtains an updated MUD URL based on the trusted fixed attribute information and newly received variable attribute information, and obtains a new MUD file.
Logic repository service supporting adaptable host logic
The following description is directed to a logic repository service supporting adaptable host logic. In one example, a method of a logic repository service can include receiving a first request to generate configuration data for configurable hardware using a specification for application logic. The method can include selecting a particular host logic shell from a group of host logic shells. The particular host logic shell can be used to encapsulate the application logic when the configurable hardware is configured. Configuration data for the configurable hardware can be generated. The configuration data can include data for implementing the application logic and at least a portion of the particular host logic shell. The method can include receiving a second request to download the configuration data to a host server computer comprising the configurable hardware. The configuration data can be transmitted to the host server computer in response to the second request.
Logic repository service supporting adaptable host logic
The following description is directed to a logic repository service supporting adaptable host logic. In one example, a method of a logic repository service can include receiving a first request to generate configuration data for configurable hardware using a specification for application logic. The method can include selecting a particular host logic shell from a group of host logic shells. The particular host logic shell can be used to encapsulate the application logic when the configurable hardware is configured. Configuration data for the configurable hardware can be generated. The configuration data can include data for implementing the application logic and at least a portion of the particular host logic shell. The method can include receiving a second request to download the configuration data to a host server computer comprising the configurable hardware. The configuration data can be transmitted to the host server computer in response to the second request.