Patent classifications
H04L41/5048
Auto deploying network for virtual private cloud with heterogenous workloads
Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files.
Multi-Access Edge Computing Slicing
An apparatus comprising: at least one processor; and at least one non-transitory memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to: manage an application service using a management web portal; request, using the management web portal, the application service with a given service level agreement from a catalogue of offered application services; and communicate, using the management web portal, with an application service management function; wherein the application service management function is configured to translate the service level agreement of the requested application service to a specification of an application slice, and to trigger a creation of an application slice instance by contacting an application slice management function.
Resolving configuration drift for computing resource stacks
This disclosure describes techniques for resolving discrepancies that occur to interrelated computing resources from computing resource drift. Users may describe computing resources in an infrastructure template. However, computing resource drift occurs when “out-of-band” modifications are made to the computing resources and are not reflected in the infrastructure template. To resolve discrepancies between the infrastructure template and the out-of-band modifications to the computing resources, a notification may be output to a user account associated with the computing resources detailing the differences. An updated infrastructure template may be received that resolves the differences, such as by including configuration settings that reflect a current state of the computing resources. The computing resources may then execute a workflow using the updated template, such that the workflow is executed on all of the computing resources in a current state.
Node addition in cloud networks
Example techniques of addition of nodes in cloud networks managed by a multi-cloud management platform, are described. In an example, a node addition request is received at a multi-cloud management platform. The node addition request includes identification information of a node and a cloud network in which the node is to be added. The identification information is indicative of a functionality of the node, a network address of the node, and an identifier of the cloud network. Based on the identifier of the cloud network, cloud account details of the cloud network may be obtained from one of the multi-cloud management platform and a user input. A controller node of the cloud network may be accessed based on the cloud account details. The node may be registered at the controller node of the cloud network, based on the identification information of the node and the cloud network.
Provisioning network services in a software defined data center
A novel method for dynamic network service allocation that maps generic services into specific configurations of service resources in a network is provided. An application that is assigned to be performed by computing resources in the network is associated with a set of generic services, and the method maps the set of generic services to the service resources based on the assignment of the application to the computing resources. The mapping of generic services is further based on a level of service that is chosen for the application, where the set of generic services are mapped to different sets of network resources according to different levels of services.
INTELLIGENT MONITORING SYSTEMS AND METHODS FOR WI-FI METRIC-BASED ALARMS FOR CLOUD BASED WI-FI NETWORKS
System and methods include obtaining data, over the Internet, associated with a plurality of Wi-Fi networks each Wi-Fi network having one or more access points and each Wi-Fi network being associated with a customer of one or more service providers; aggregating and filtering the data; analyzing the aggregated and filtered data for Wi-Fi metric based alarms, each Wi-Fi metric based alarm being associated with detection of one of an offline Wi-Fi network of the plurality of Wi-Fi networks, an offline node of the Wi-Fi network, instability of the Wi-Fi network, congestion in the Wi-Fi network, and interference in the Wi-Fi network; determining the Wi-Fi metric based alarms based on the analyzing; and performing one or more actions based on the determined Wi-Fi metric based alarms.
Techniques for managing drift in a deployment orchestrator
Techniques for implementing an infrastructure orchestration service are described. A configuration file for a deployment to a first execution target and a second execution target can be received. A first safety plan can be generated for the first execution target that comprises a first list of resources and operations associated with deployment at the first execution target. Approval of the first safety plan can be received. A second safety plan can be generated for the second execution target that comprises a second list of resources and operations associated with deployment at the second execution target. A determination can be made whether the second safety plan is a subset of the first safety plan. If the determination is that the second safety plan is a subset of the first safety plan, the second safety plan can automatically be approved and transmitted to the second execution target for deployment.
End-to-end intent definition of network functions for network slice management
Described are examples for providing end-to-end intent definition of network functions for network slice management. Intents are defined for each level of network constituent including slices, slice subnets, and management functions. A system of intent based network slice management includes a network slice management function (NSMF) configured to receive a service profile from a communication service management function (CSMF) and derive an intent for each desired network slice subnet for a network slice subnet management function (NSSMF). The NSSMF is configured to derive requirements for a plurality of network functions (NFs) and provide an intent defining the requirements of a respective NF to a network function management function (NFMF). The NFMF is configured to receive the intent for the respective NF via an intent-based interface for management of NFs and derive a network resource model (NRM) for the respective NF based on the intent.
TECHNIQUES FOR DETECTING DRIFT IN A DEPLOYMENT ORCHESTRATOR
Techniques for implementing an infrastructure orchestration service are described. A safety plan comprising a list of resources and operations based at least in part on a deployment configuration file can be received. Upon receiving approval of the safety plan, an operation corresponding to at least one of the list of resources can be prepared to be performed. The operation can be compared to the safety plan. If the operation is part of the safety plan, the operation can be performed. If the operation is not part of the safety plan, the deployment can be halted, and a notification that the deployment is not in compliance with the safety plan can be transmitted.
Lifecycle management for NSI and CSI
A network management entity configured to: deactivate a Network Slice Instance without releasing network resources previously allocated to the Network Slice Instance; and subsequent to deactivating the Network Slice Instance, activating the Network Slice Instance using the network resources previously allocated to the Network Slice Instance. A Network Slice Management Function (NSMF) perform slice specific Lifecycle Management (LCM) for a Network Slice Instance (NSI) based on Communication Service Instance (CSI) requirements is also disclosed. Customer Service Management Function (CSMF) for receiving service requirements from a Service Manager (SM) and transmitting the CSI requirements a Network Slice Management Function (NSMF) is also disclosed.