H04L41/0897

Pod migration across nodes of a cluster

Example techniques for pod migration across nodes of a cluster are described. In an example, in response to receiving a request to migrate a pod from a first region of a cloud computing platform to a second region of the cloud computing platform, the pod may be migrated from a first node in the first region to a second node in the second region. The first node and the second node may each be a part of a cluster of nodes.

Migrating networking configurations
11588693 · 2023-02-21 · ·

A method includes receiving, from an agent executing in a virtual machine, network information associated with the virtual machine, the virtual machine to be migrated to a container. The method further includes generating a container networking configuration based on the network information. The container networking configuration is to provide network access to processes migrated from the virtual machine to the container. The method further includes providing the container networking configuration to a container orchestration system. The container orchestration system is to use the container networking configuration to provide network access to the container.

Dynamic adjustment of deployment location of software within a network

Optimizing a performance of a software function withing a content distribution network, such as a software-implemented virtual cable modem termination system (CMTS) network, a virtualized Radio Access Network (vRAN), a Passive Optical Network (PON), or a Wi-Fi network. The performance may be optimized by dynamically changing a deployment location within the content distribution network for the software function from an original location to an updated location using an instance management platform. The deployment location may be dynamically changing in response to a variety of trigger conditions or concerns, such as but not limited to a difference in compute resources, responding to latency needs or tolerances, and a desired cohabitation of data or other software.

Adaptive storage processing for storage-as-a-service
11588716 · 2023-02-21 · ·

Adaptive storage processing for storage-as-a-service, including detecting, by a cloud-based monitoring system, a storage system state for a storage system by monitoring the storage system in real-time remotely via a network; selecting, by the cloud-based monitoring system based on the storage system state, an entry in a tunables repository, wherein the entry in the tunables repository comprises a tunable parameter for the storage system state; accessing, by the cloud-based monitoring system via the network, a gateway for the storage system; and modifying, by the cloud-based monitoring system via the gateway, the tunable on the storage system based on the tunable parameter for the storage system state.

Migrating software defined network

Some embodiments provide a method of migrating a first software defined (SD) network managed by a first network manager to a second SD network managed by a second network manager. The method of some embodiments is performed by a third network manager that provides an interface that allows a set of users to specify and review logical network components, which the first and second network managers can then respectively deploy in the first and second SD networks. The third network manager in some embodiments identifies for a migration manager a first group of two or more logical network components that the third network manager previously specified for the first network manager to deploy in the first SD network. The migration manager then uses this information to correctly convert the first group of logical network components to a second group of two or more logical components in an appropriate manner that will allow the third network manager to manage the second group of logical network components that is implemented in the second SD network.

Migration of traffic flows

There is set forth herein obtaining data traffic monitoring data, the data traffic monitoring data being in dependence on monitoring of traffic received by a container of a protected computing environment; obtaining data traffic monitoring data, the data traffic monitoring data being in dependence on monitoring of traffic received by a processing resource of a computing environment; obtaining a state of the processing resource and provisioning a utility processing resource to include the state of the processing resource; and configuring the computing environment to route data traffic to the utility processing resource.

Controlling parallel data processing for service function chains

Systems and methods are disclosed for parallelizing service function chains. A method comprises receiving a sequential service function chain comprising a plurality of network functions, receiving a plurality of operations, determining at least two network functions are capable of being parallelized, aggregating operations of the plurality of operations associated with the at least two network functions into a network function segment, determining whether another network function is capable of being parallelized with the network function segment, based on the determining: aggregating an operation associated with the another network function into the network function segment when the another network function is capable of being parallelized with the network function segment, or pushing the network function segment as a completed segment of a hybrid service function chain when the another network function is not capable of being parallelized with the network function segment, and implementing the hybrid service function chain.

ON-DEMAND SECURITY POLICY PROVISIONING

Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.

Automated network change system

Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.

Modifying capacity assigned to support a network slice allocated to a user device in a 5G or other next generation wireless network

The technologies described herein are generally directed to facilitating the allocation, scheduling, and management of network slice resources. According some embodiments, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can include identifying a slice configuration of a network slice that was allocated to a user device, the slice configuration being based on a characteristic of the user device, wherein a capacity of a resource of a network device of a network was previously assigned to support the network slice based on the slice configuration. The operations can further include monitoring usage of the network slice by the user device during the usage of the network slice, resulting in monitored usage of the network slice. Further, based on and during the monitored usage of the network slice, operations can include facilitating modifying the capacity of the resource assigned to support the network slice.