H04L47/726

System and method for tag based resource limits or quotas in a cloud infrastructure environment
11689475 · 2023-06-27 · ·

Systems and methods described herein support tag based resource limits or quotas in a cloud infrastructure environment. Cloud administrators do not generally have the ability to restrict resource usage in existing clouds. Granting a user permission to create resources allows them to create any number of resources up to a predefined account limit. Tags are associated with resources for allowing administrators to restrict a user's resource usage to the appropriate level by allowing fine-tuned cost control. A usage of resources in a tenancy associated with a resource tag corresponding to a request characteristic of a request to provision a resource is determined and compared against a plurality of tag-based quotas, wherein the request to provision the resource is dropped based on the determined usage exceeding one of the plurality of tag-based quotas.

DATA TRANSMISSION METHOD, NETWORK DEVICE AND SYSTEM IN MULTI-CONNECTIVITY NETWORK
20230189311 · 2023-06-15 ·

The present disclosure relates to a data transmission method, a network device and a system in a multi-connectivity network. The method of the present disclosure includes: determining a type of a user of a terminal; determining a user plane split policy corresponding to the terminal according to the type of the user of the terminal; and allocating a user plane channel of a first standard network of the construction operator to the terminal to transmit user plane data of the terminal, in a case that the user plane split policy corresponding to the terminal is split-disabled, and allocating the user plane channel of the first standard network and a user plane channel of a second standard network of the construction operator to the terminal to transmit the user plane data of the terminal, in a case that the user plane split policy corresponding to the terminal is split-enabled.

Method and system for managing sub-tenants in a cloud computing environment

A method and a system for managing sub-tenants (in a cloud computing environment. In one embodiment, the method includes receiving a request to access sub-set of data of an asset from the cloud computing system from a sub-tenant device associated with a sub-tenant of a tenant. The sub-tenant is associated with an asset. The request includes a sub-tenant identifier, a tenant identifier, and an asset identifier. The method includes determining whether the sub-tenant is authorized to access the requested sub-set of data of the asset using the sub-tenant identifier, the tenant identifier, and the asset identifier based on at least one role and associated permissions to access the requested sub-set data of the asset. If the sub-tenant is authorized to access the requested sub-set data of the asset, the method includes providing access to the requested sub-set data of the asset to the sub-tenant.

Method and system for managing sub-tenants in a cloud computing environment

A method and a system for managing sub-tenants (in a cloud computing environment. In one embodiment, the method includes receiving a request to access sub-set of data of an asset from the cloud computing system from a sub-tenant device associated with a sub-tenant of a tenant. The sub-tenant is associated with an asset. The request includes a sub-tenant identifier, a tenant identifier, and an asset identifier. The method includes determining whether the sub-tenant is authorized to access the requested sub-set of data of the asset using the sub-tenant identifier, the tenant identifier, and the asset identifier based on at least one role and associated permissions to access the requested sub-set data of the asset. If the sub-tenant is authorized to access the requested sub-set data of the asset, the method includes providing access to the requested sub-set data of the asset to the sub-tenant.

System for managing data center asset resource load balance

A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: identifying a plurality of asset resources within a data center; monitoring workloads within the data center, the monitoring providing data center workload data, the data center workload data including asset resource utilization data; determining whether certain asset resources are underutilized; presenting a load balance configurator user interface, the load balance configurator user interface enabling allocation of asset resources to target workloads; and, performing a data center asset allocation operation, the data center asset allocation operation reallocating workloads in response to the allocation of asset resources to target workloads.

System for managing data center asset resource load balance

A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: identifying a plurality of asset resources within a data center; monitoring workloads within the data center, the monitoring providing data center workload data, the data center workload data including asset resource utilization data; determining whether certain asset resources are underutilized; presenting a load balance configurator user interface, the load balance configurator user interface enabling allocation of asset resources to target workloads; and, performing a data center asset allocation operation, the data center asset allocation operation reallocating workloads in response to the allocation of asset resources to target workloads.

Access path management based on path condition

Access path management is provided based on one or more path conditions in an information processing system. For example, an apparatus comprises a storage system comprising a processor coupled to a memory. The storage system is configured to communicate over a network with one or more host devices. The storage system is further configured to obtain notification from one of the one or more host devices that a first path through the network between the storage system and the given one of the one or more host devices is at least temporarily unreliable. The storage system is further configured to cause a path state change for the first path from a first state to a second state and a path state change for a second path to the first state.

Access path management based on path condition

Access path management is provided based on one or more path conditions in an information processing system. For example, an apparatus comprises a storage system comprising a processor coupled to a memory. The storage system is configured to communicate over a network with one or more host devices. The storage system is further configured to obtain notification from one of the one or more host devices that a first path through the network between the storage system and the given one of the one or more host devices is at least temporarily unreliable. The storage system is further configured to cause a path state change for the first path from a first state to a second state and a path state change for a second path to the first state.

GENERATING PACKETS IN A REVERSE DIRECTION OF A SERVICE FUNCTION CHAIN

Embodiments are directed to receiving an original packet at a service function; determining, for a reverse packet, a reverse service path identifier for a previous hop on a service function chain; determining, for the reverse packet, a service index for the reverse service path identifier; and transmitting the reverse packet to the previous hop on the service function chain.

Microservices application network control plane
11489738 · 2022-11-01 · ·

Disclosed embodiments are directed at systems, methods, and architecture for operating a control plan of a microservices application. The control plane corresponds with data plane proxies associated with each of a plurality of APIs that make up the microservices application. The communication between the data plane proxies and the control plane enables automatic detection of service groups of APIs and automatic repair of application performance in real-time in response to degrading service node conditions.