Patent classifications
H04L41/0846
Providing configuration data to a connected network switch
A computer program product and a network switch are provided. The network switch may include network ports, memory and a processor for processing program instructions to perform various operations. The computer program product may provide the program instructions for a network switch. The operations may include detecting a first neighbor network switch connection to a first port of the first network switch, accessing first neighbor network switch configuration data that is stored by the first network switch in association with the first port, and providing the configuration data that is stored in association with the first port of the first network switch to the first neighbor network switch over the first neighbor network switch connection to the first port. In one example, the configuration data is obtained from a second neighbor network switch that was previously connected to the first port prior to the first neighbor network switch.
Upgrading user space networking stacks without disruptions to network traffic
Described embodiments provide systems and methods for upgrading user space networking stacks without disruptions to network traffic. A first packet engine can read connection information of existing connections of a second packet engine written to a shared memory region by the second packet engine. The first packet engine can establish one or more virtual connections according to the connection information of existing connections of the second packet engine. Each of the first packet engine and the second packet engine can receive mirrored traffic data. The first packet engine can receive a first packet and determine that the first packet is associated with a virtual connection corresponding to an existing connection of the second packet engine. The first packet engine can drop the first packet responsive to the determination that the first packet is associated with the virtual connection.
DYNAMIC CLONING OF APPLICATION INFRASTRUCTURES
Techniques for dynamically cloning application infrastructures are provided. In one embodiment, a computer system can monitor one or more metrics pertaining to an infrastructure for an application at a first site. If the one or more metrics exceed or fall below one or more corresponding thresholds, the computer system can clone the infrastructure at a second site distinct from the first site, thereby enabling the application to be hosted at the second site.
Provisioning resources for access by an untrusted computer network
A system securely provisions a resource for access by computing systems of an untrusted network. The provisioning is performed securely such that at no stage during the process the computing systems of the untrusted network have direct access to the computing systems of the trusted network. The system creates a temporary network connected to the trusted network and provisions the requested resource in the temporary network. The system connects the temporary network to the trusted network for provisioning of the resource. The system disconnects the trusted network from the temporary network before connecting the untrusted network to the temporary network for providing access to the resource.
MANAGING CONFIGURATIONS OF MOBILE DEVICES ACROSS MOBILITY CONFIGURATION ENVIRONMENTS
Embodiments described herein provide for systems and methods for managing configurations of mobile devices. A server may receive an instruction inputted via a graphical control to translate configurations from a first device environment to a second device environment. The server may identify, via an interface, a resource accessible by a first plurality of mobile devices in the first device environment based on the instruction. The server may determine, from the first device environment, a first profile identifying a first plurality of attributes defining a first configuration for the first plurality of mobile devices. The server may generate, using the first profile, a second profile identifying a second plurality of attributes defining a second configuration for a second plurality of mobile devices in the second device environment. The server may transmit, via the interface, the second profile to the second plurality of mobile devices.
Configuration validation of a device
In some examples, the validation controller may comprise a processing resource and a memory resource storing machine readable instructions to cause the processing resource to perform a number of actions. In some examples, the validation controller may determine functional capabilities for a topology that includes a plurality of devices to be configured by the validation controller. The validation controller may compare a configuration element for the plurality of devices to the functional capabilities for the plurality of devices. The validation controller may validate the configuration element based on the comparison. The validation controller may also push the configuration element to the plurality of devices when the configuration element is validated.
REACHING A QUORUM WITH A NUMBER OF MASTER NODES
Managing containerized workloads, such as by Kubernetes, provides a robust and expandable platform. Kubernetes high-availability (HA) mode provides additional safeguards against failure that allows services to be maintained without interruption in the event of a partial system or network failure. However, Kubernetes requires an odd number of master nodes (e.g., three) in order to be able have a quorum and maintain certain operations (e.g., election of a leader). In the event a master node loses functionality, the remaining master nodes are unable to have a quorum. System and methods are provided to convert a worker-only node into a master node in order to reestablish a quorum. Once functionality is restored, the converted master is reverted back to a worker-only node and the restored master, and remaining masters, maintain the quorum.
Non-intrusive device discovery and configuration cloning
Infrastructure management device(s) may discover IT device(s) communicatively connected over a network. IT device information may be determined for at least one of the IT device(s). Configuration rule(s) compatible with IT device information may be matched to IT device(s). Action(s) may be performed on one or more device inventories, determined at least in part, by the configuration rule(s).
Management of a security system at a premises
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
Generating a core instance at a first access network core configurator to facilitate operation of a second access network
Generating a core instance via a first access network device of a first access network, wherein the core instance facilitates operation of a second access network via a second access network device of the second access network is disclosed. Generally, implementing a core network can be highly resource intensive, e.g., high labor, equipment, and monetary costs. The level of resources that are conventionally committed in developing a core instance can be a significant barrier for many small or medium sized entities. The disclosed subject matter discloses a configuration component that can generate a core instance that can be performed at a remotely located access network. In an embodiment, a remotely implemented core instance can be updatable. Further, in response to a remotely implemented core instance failing to perform, a monitoring component can facilitate a failover operation.