H04L41/0843

Model driven process for automated deployment of domain 2.0 virtualized services and applications on cloud infrastructure

A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.

Systems and methods for automated governance, risk, and compliance

Systems and methods for configuration vulnerability checking and remediation are provided. The systems provided herein identify risk based upon service indications of a particular configuration, such that automated risk analysis may be facilitated.

Provisioning a service using file distribution technology

According to certain embodiments, a provisioning manager comprises an interface and processing circuitry. The interface is configured to obtain provisioning data from a provisioning database. The processing circuitry is configured to prepare one or more configuration files based on the provisioning data and provide the one or more configuration files to the one or more service instances using file distribution technology. The one or more configuration files indicate how to provision one or more service instances used in sending or receiving electronic messages.

Methods and systems for a self-provisioning device

In an aspect, the present disclosure includes a method, apparatus, and non-transitory computer readable medium for wireless communications for initiating, by a provisioning system, a provisioning procedure to configure and update a device that initiates an initial connection to a wireless network based on a unique identifier of the device; and establishing, by the provisioning system, a secure socket with the device based on the provisioning procedure.

INTEGRATION OF NETWORK SEGMENTS AND SECURITY COMPONENTS INTO CONTAINERS AND HYBRID CLOUD ENVIRONMENTS
20220345367 · 2022-10-27 ·

A processor may identify one or more requirements based on a specific field. The processor may capture the one or more requirements. The one or more requirements may be based on a particular structure. The processor may orchestrate the one or more requirements based on respective requests of the one or more requirements. The processor may store the orchestration of the one or more requirements as respective artifacts.

Edge controller with network performance parameter support

A method includes receiving a plurality of configurations comprising a first configuration for provisioning a first set of network services at a first resource of an edge device and a second configuration for provisioning a second set of network services at the first resource, a first configuration group identifier identifying a configuration group for the first configuration, and a first network performance parameter for the configuration group. The method further includes determining a performance factor for the first resource providing the first set of network services to one or more client devices. The method further includes, in response to determining that the performance factor does not satisfy the first network performance parameter for the configuration group and that the first configuration group identifier identifies the configuration group for the first configuration, moving the first configuration from the first resource to a second resource of the edge device.

Network interface provisioning of containerized instances based on tenant policies
11611453 · 2023-03-21 · ·

Network interface provisioning of containerized instances based on tenant policies. A network interface assignment process (NIAP) receives a first request to assign a network interface to a first containerized instance comprising at least one container. The NIAP determines that a first tenant of a plurality of different tenants is associated with the first containerized instance. The NIAP accesses a first network assignment tenant policy (NATP) that corresponds to the first tenant. Based on the first NATP, the NIAP assigns, to the first containerized instance, a first network interface via which the first containerized instance can communicate with other containerized instances associated with the first tenant.

STORAGE SYSTEM, STORAGE NODE VIRTUAL MACHINE RESTORE METHOD, AND RECORDING MEDIUM
20220342775 · 2022-10-27 · ·

A storage system in which a cluster is configured by a plurality of storage nodes is configured to include: a management server configured to store a template including an OS of a storage node, a process program that configures a process, and an installer; a maintenance node VM configured to collect configuration information required for configuring a restore-target storage node from within the storage system; a maintenance node, a management server, and a hypervisor configured to create a VM for a new storage node on the basis of the template and the configuration information; and a cluster controller configured to create a process in the new storage node using the installer and restore the process to a state corresponding to the process of the restore-target storage node.

Private cloud as a service

The system provisions and upgrades a private cloud stack from a public cloud application. The system registers and activates installed private cloud stacks to discover names, and software packages. The system enables each private cloud stack's roles for data plane elements and activates a private cloud stack. The system receives connection request from the installed host agent to customer resource manager. The system receives host related information from host agent. The software system stores and pushes the desired state for particular host agent to the host agent. The system installs components on enterprise machine associated with role via host agent. The system configures said installed components using templates and dynamic template parameters. The system receives continuous configuration updates for the installed components and continuous heart beat messages for account manager. The system displays visual alerts via UI for any heartbeat, component install or configuration failures.

HIGHLY SCALABLE CONTAINER NETWORK INTERFACE OPERATION TO REDUCE STARTUP OVERHEAD OF FUNCTIONS
20230070242 · 2023-03-09 ·

Systems and methods for providing a container network interface (CNI) specification that has been modified with a set of annotations, a set of operations, and a set of policies to provide network configuration reuse, network configuration replication, and database management (garbage collection) functionality are described. In response to receiving a request to initiate a function, whether the function is to be reused or replicated may be determined. In response to determining that the function is to be reused, calling a container network interface (CNI) plugin with a first operation that decouples database functions from network functions, so that the database can cache and reuse a network configuration generated for the function. In response to determining that the function is to be replicated, calling the CNI plugin with a second operation to create the network configuration and generate and store a template of the network configuration in the database.