Patent classifications
H04L41/5051
Network slice selection method, terminal device, and network device
A network slice selection method is provided, so that in a scenario in which one terminal device subscribes to a plurality of network slices, a network device can select a network slice for the terminal device. The method includes: a terminal device sends a first message to a network device, wherein the first message is used to request to select a network slice for the terminal device. Then the terminal device receives a second message sent by the network device, wherein the second message is used to indicate a network slice selected by the network device for the terminal device.
Cloud launch wizard
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Cloud launch wizard
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Smart network topology systems and methods
The smart network topology systems and methods of the present disclosure are aimed at easing network administrator efforts in configuring network configurations to suit their network environment. For instance, the smart network topology system may provide predefined network topology types that an administrator can use when setting up network connectivity between client devices and other network devices such as media agents, storage servers, and the like. Further, the smart network topology system provides the user with a way to customize the routes created between the client computing devices and storage computing devices such that each client computing device is configured to communicate with only those storage computing devices that the client computing device needs to communicate with to perform one or more data protection operations.
Methods, systems and apparatus for client extensibility during provisioning of a composite blueprint
Methods, apparatus and articles of manufacture to provide client extensibility during provisioning of a composite blueprint are disclosed. An example virtual appliance in a cloud computing environment includes an orchestrator to facilitate provisioning of a virtual computing resource based on a blueprint, the provisioning associated with an event defined by the blueprint. The example virtual appliance also includes an event broker to maintain a set of subscribers to the event broker, each of the set of subscribers further subscribing to at least one event topic through the event broker, the event broker to trigger a notification of a first subscriber to a first event topic associated with the event when the event broker determines that the first subscriber is a blocking subscriber for the first event topic, the event broker to facilitate modification of the event by a blocking subscriber but not by a non-blocking subscriber.
Methods, systems and apparatus for client extensibility during provisioning of a composite blueprint
Methods, apparatus and articles of manufacture to provide client extensibility during provisioning of a composite blueprint are disclosed. An example virtual appliance in a cloud computing environment includes an orchestrator to facilitate provisioning of a virtual computing resource based on a blueprint, the provisioning associated with an event defined by the blueprint. The example virtual appliance also includes an event broker to maintain a set of subscribers to the event broker, each of the set of subscribers further subscribing to at least one event topic through the event broker, the event broker to trigger a notification of a first subscriber to a first event topic associated with the event when the event broker determines that the first subscriber is a blocking subscriber for the first event topic, the event broker to facilitate modification of the event by a blocking subscriber but not by a non-blocking subscriber.
Fallback service through a cloud exchange for network service provider connections
An example method includes receiving, from a customer system by a cloud exchange comprising processing circuitry, a request to communicatively couple a virtual gateway on network infrastructure of the cloud exchange to a network gateway communicatively coupled to a public network, the request including data indicating a public Internet Protocol (IP) address of the customer system, wherein the customer system is configured with a first connection communicatively coupling the customer system and the public network via a network service provider (NSP) that is separate from the cloud exchange; configuring, by the cloud exchange, a network route for a network gateway to the virtual gateway, the network gateway communicatively coupled to the public network; and providing, by the cloud exchange to the network gateway, routing information including the public IP address of the customer system to create a second connection communicatively coupling the customer system and the public network.
Fallback service through a cloud exchange for network service provider connections
An example method includes receiving, from a customer system by a cloud exchange comprising processing circuitry, a request to communicatively couple a virtual gateway on network infrastructure of the cloud exchange to a network gateway communicatively coupled to a public network, the request including data indicating a public Internet Protocol (IP) address of the customer system, wherein the customer system is configured with a first connection communicatively coupling the customer system and the public network via a network service provider (NSP) that is separate from the cloud exchange; configuring, by the cloud exchange, a network route for a network gateway to the virtual gateway, the network gateway communicatively coupled to the public network; and providing, by the cloud exchange to the network gateway, routing information including the public IP address of the customer system to create a second connection communicatively coupling the customer system and the public network.
Intent-based governance
Techniques for intent-based access control are described. A method of intent-based access control may include receiving, via a user interface of an intent-based governance service, one or more intent statements associated with user resources in a provider network, the one or more intent statements expressing at least one type of action allowed to be performed on the user resources, compiling the one or more intent statements into at least one access control policy, and associating the at least one access control policy with the user resources.
Intent-based governance
Techniques for intent-based access control are described. A method of intent-based access control may include receiving, via a user interface of an intent-based governance service, one or more intent statements associated with user resources in a provider network, the one or more intent statements expressing at least one type of action allowed to be performed on the user resources, compiling the one or more intent statements into at least one access control policy, and associating the at least one access control policy with the user resources.