Patent classifications
H04L41/5096
Network Data Analytics in a communications network
A network data analytics function, which may be implemented as a service, is disclosed which provides a new and improved network data analytics capability in 5G core networks.
Secure count in cloud computing networks
Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.
Techniques for preventing concurrent execution of declarative infrastructure provisioners
Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.
Systems and methods for deploying a cloud management system configured for tagging constructs deployed in a multi-cloud environment
A distributed cloud computing system is disclosed that includes a controller configured to deploy a first gateway in a first cloud computing network and a second gateway in a second cloud computing network and logic. The logic, upon execution by one or more processors, causes performance of operations including generating a topology mapping visualization illustrating a plurality of constructs and communication paths therebetween, wherein a first subset of the plurality of constructs are deployed in the first cloud computing network and a second subset of the plurality of constructs are deployed in the second cloud computing network, receiving user input corresponding to (i) a selection of one or more constructs and (ii) an identifier for the selection, generating a filtered topology mapping visualization of the selection of the one or more constructs and any connections therebetween, and causing rendering of the filtered topology mapping visualization on a display screen.
Platform for automated management of servers
Presented herein are systems and methods for managing networked environments. A computer system may provide a user interface for configuring a plurality of groups of servers each hosting a resource for an application. The user interface may include: a first element configured to select, upon interaction, at least one group of servers from the plurality of groups of servers to which to install a patch for the application; a second element configured to identify, upon interaction, a first group of servers of the plurality of groups of servers to which to transfer network traffic associated with the application and communicated with a second group of servers of the plurality of groups of servers; and a third element configured to provide, upon interaction, one or more performance indicators for at least one of a plurality of functions of the application.
REMEDIATING DRIFT IN THE CLOUD
Techniques for remediating drift in real cloud infrastructure from desired cloud infrastructure. In one technique, a configuration graph is generated based on first infrastructure configuration code. A deployed state of a cloud infrastructure is generated based on a data schema and a current state of the cloud infrastructure. Resources indicated in the deployed state are matched to nodes in the configuration graph. Based on differences between the resources and the nodes, the configuration graph is updated to generate an updated configuration graph. Based on the updated configuration graph, second infrastructure configuration code is generated that is different than the first infrastructure configuration code.
END-TO-END SERVICE LEVEL METRIC APPROXIMATION
Described are examples for providing service level monitoring for a network hosting applications as a cloud service. A service level monitoring device may receive end-to-end measurements of service usage collected at user devices for a plurality of applications hosted as a cloud services. The service level monitoring device may determine degraded applications of the plurality of applications based on anomalies in the measurements. The service level monitoring device may determine a service level metric based on an aggregation of the degraded applications. In some examples, the service level monitoring device may detect a network outage affecting the service.
Autonomous cloud design and control
The autonomous cloud design system may determine a design that may appropriately mix emerging technologies and operations to provide a versatile and cost-effective or efficient solution for a given cloud site.
METHOD TO PROVIDE SLA BASED ACCESS TO CLOUD DATA IN BACKUP SERVERS WITH MULTI CLOUD STORAGE
The disclosure provides a system, computer readable medium, and computer-implemented method for managing data access. The method includes obtaining a data access request from a requestor for client data redundantly stored in at least two storage providers that are unknown to the requestor; identifying a service level objective for servicing the data access request; ranking the at least two storage providers based on the service level objective to identify one of the at least two storage providers to service the data access request; and providing the requestor with access to a copy of the client data using the one of the at least two storage providers.
Enterprise control plane for data streaming service
The invention relates to a computer-implemented method for providing an enterprise control plane for a data streaming service. The method may comprise providing a control plane user interface to enable a non-technical user to define a cluster logical abstraction dataset for an application, including a namespace, metadata, entitlement data, controls and governance data, and topics and size requirements related to the cluster and the application. The method may also include providing a representational state transfer (REST) interface to enable a technical user to specify cluster parameters using application programming interfaces (APIs). The method comprises automatically configuring the cluster and onboarding the application to the cluster following authentication.