Patent classifications
H04L41/0886
Migrating networking configurations
A method includes receiving, from an agent executing in a virtual machine, network information associated with the virtual machine, the virtual machine to be migrated to a container. The method further includes generating a container networking configuration based on the network information. The container networking configuration is to provide network access to processes migrated from the virtual machine to the container. The method further includes providing the container networking configuration to a container orchestration system. The container orchestration system is to use the container networking configuration to provide network access to the container.
Network anomaly detection and mitigation simulation tool
One or more network tests for a network are selected, wherein the selected one or more network tests simulate an attempt to establish an anomalous network configuration. A network configuration update is generated based on the selected one or more network tests and the network configuration update is issued to a network-based device. A performance of the network is monitored for establishment of the anomalous network configuration in response to the network configuration update and a configuration of the network is revised based on the monitored performance of the network, to mitigate the establishment of the anomalous network configuration.
System and method for cloud deployment optimization
Systems and methods of cloud deployment optimization are disclosed. In some example embodiments, a method comprises running original instances of an application concurrently on original servers to implement an online service, receiving, by the original instances of the application original requests for one or more functions of the online service, receiving a command to deploy a number of additional instances of the application, transmitting synthetic requests for the function(s) of the online service to one of the original servers according to a predetermined optimization criteria, deploying the number of additional instances of the application on additional servers using a copy of the original instance of the application, and running the deployed additional instances of the application on their corresponding additional servers concurrently with the original instances of the application being run on their corresponding original servers.
Low-overhead real-time configuration drift detection
A management controller may monitor an information handling system to detect an event associated with a change to a configuration setting by subscribing with an internal event bus to receive the event associated with the change in the configuration setting, and evaluate whether there is a discrepancy between a current configuration setting of the information handling system and a baseline configuration setting. If a configuration drift exists based on the discrepancy, then the configuration drift may be sent to a management console.
Methods and systems for provisioning and managing internet-of-thing devices over a network
Methods for provisioning and managing Internet-of-Things (IoT) devices over a network using device based tunneled nodes are provided. In one aspect, a method includes receiving, by a first network device in a network, data originated from an Internet-of-Things (IoT) device; identifying a device type of the IoT device by analyzing data packets of the received data; obtaining, by the first network device, a device profile for the IoT device, wherein the device profile is used for provisioning the IoT device to access the network; and provisioning the IoT device using the device profile, wherein the provisioning includes at least one of (1) identifying a tunneling attribute in the device profile; and (2) identifying a constrained application protocol (CoAP) parameter in the device profile, wherein the CoAP parameter is used to zero touch provision one or more device attributes of the IoT device. Systems and machine-readable media are also provided.
Network slice management method and apparatus
Embodiments of this application disclose a network slice management method and device, and relate to the field of communications technologies. The method includes: receiving, by a first management unit, a network slice management request, where the network slice management request carries instance information or indication information of a transport network manager; and sending, by the first management unit, a transmission management request to a corresponding transport network manager based on the instance information of the transport network manager, where the transmission management request is used to deploy a transmission network. The embodiments of this application provide a method for determining a transport network manager to create a corresponding transmission network.
AUTOMATED CONFIGURATION OF MACHINE-TO-MACHINE SYSTEMS
A gateway is provided with configuration management logic to identify a set of configurations corresponding to a deployment of a particular application, and automatically send corresponding configuration data to a set of devices in range of the gateway. Service management logic of the gateway determines that assets on the set of devices correspond to one or more asset abstractions defined for the particular application, where the configuration data is sent to the set of devices based on the assets corresponding to the asset abstractions. Sensor data is received during the deployment as generated by a sensor asset of one of the devices, the sensor data is processed according to service logic of the particular application to generate a result, and actuating data is generated and sent during the deployment to an actuator asset on the set of devices based on the result.
SYSTEMS AND METHODS FOR RAPID BOOTING AND DEPLOYING OF AN ENTERPRISE SYSTEM IN A CLOUD ENVIRONMENT
The present disclosure relates to systems and methods for deploying enterprise systems in cloud environments. In one implementation, a system for deploying an enterprise system in a cloud environment may include at least one processor configured to provide: one or more first containers hosting at least one application with at least one enterprise function; one or more second containers hosting at least one microservice configured to activate the at least one enterprise function; at least one application programming interface (API) between the at least one microservice and at least one client; and at least one gateway configured to manage access to the at least one API.
System, method, and computer program for AWS autoscaling of Tuxedo systems
As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.
NETWORK ADAPTIVE MONITORING
A system is disclosed for network management automation using network intent or adaptive monitoring automation. Network intent (NI) represents a network design and baseline configuration for that network or network devices with an ability to diagnose deviation from the baseline configuration. The NI can be automated to update and replicate the diagnosis. The monitoring of the network can be adapted to capture network problems in advance with adaptive monitoring automation.