H04L67/1008

TECHNIQUES FOR IMPLEMENTING ROLLBACK OF INFRASTRUCTURE CHANGES IN A CLOUD INFRASTRUCTURE ORCHESTRATION SERVICE

Techniques for implementing rollback of infrastructure changes in an infrastructure orchestration service are described. In certain examples, an infrastructure orchestration service is disclosed that manages both provisioning and deploying of infrastructure assets within a cloud environment. The service receives a plan comprising a set of instructions associated with a set of infrastructure assets of an execution target and identifies a first state of the set of infrastructure assets. The service executes the set of instructions in the plan to achieve a second state for the set of infrastructure assets. Based in part on the executing, the service receives a trigger for rolling back the plan to restore the set of infrastructure assets in the plan to the first state and executes a rollback plan for the plan. The service then transmits a result associated with the execution of the rollback plan.

Systems for Session-Based Routing
20230006925 · 2023-01-05 · ·

In implementations of systems for session-based routing, a computing device implements a routing system to receive session data describing a session ID as a character sequence including non-embedded characters and at least one embedded character at a pre-determined index of the character sequence. The routing system extracts the at least one embedded character and determines a processing device configuration corresponding to the at least one embedded character from ledger data describing processing device configurations. The routing system maps the session data to a particular processing device based on the processing device configuration and the non-embedded characters of the character sequence.

Systems for Session-Based Routing
20230006925 · 2023-01-05 · ·

In implementations of systems for session-based routing, a computing device implements a routing system to receive session data describing a session ID as a character sequence including non-embedded characters and at least one embedded character at a pre-determined index of the character sequence. The routing system extracts the at least one embedded character and determines a processing device configuration corresponding to the at least one embedded character from ledger data describing processing device configurations. The routing system maps the session data to a particular processing device based on the processing device configuration and the non-embedded characters of the character sequence.

SERVER PICKING IN A VIRTUAL PRIVATE NETWORK
20230006974 · 2023-01-05 · ·

A method including transmitting, by a requesting user device to an infrastructure device associated with a virtual private network (VPN), a connection request for receiving VPN services; receiving, by the requesting user device from the infrastructure device, connection information associated with a VPN server selected for providing the VPN services to the requesting user device, the VPN server being selected based at least in part on a comparison between a parameter associated with the requesting user device and a current parameter associated with another user device currently receiving VPN services from the VPN server; and transmitting, by the requesting user device to the VPN server, an initiation request to receive the VPN services from the VPN server based at least in part on utilizing the connection information is disclosed. Various other aspects are contemplated.

TECHNIQUES FOR DEPLOYING WORKLOADS ON NODES IN A CLOUD-COMPUTING ENVIRONMENT
20230007077 · 2023-01-05 ·

Described are examples for deploying workloads in a cloud-computing environment. In an aspect, based on a desired number of workloads of a process to be executed in a cloud-computing environment and based on one or more failure probabilities, an actual number of workloads of the process to execute in the cloud-computing environment to provide a level of service can be determined and deployed. In another aspect, a standby workload can be executed as a second instance of the process without at least a portion of the separate configuration used by the multiple workloads, and based on detecting termination of one of multiple workloads, the standby workload can be configured to execute based on the separate configuration of the separate instance of the process corresponding to the one of the multiple workloads.

TECHNIQUES FOR DEPLOYING WORKLOADS ON NODES IN A CLOUD-COMPUTING ENVIRONMENT
20230007077 · 2023-01-05 ·

Described are examples for deploying workloads in a cloud-computing environment. In an aspect, based on a desired number of workloads of a process to be executed in a cloud-computing environment and based on one or more failure probabilities, an actual number of workloads of the process to execute in the cloud-computing environment to provide a level of service can be determined and deployed. In another aspect, a standby workload can be executed as a second instance of the process without at least a portion of the separate configuration used by the multiple workloads, and based on detecting termination of one of multiple workloads, the standby workload can be configured to execute based on the separate configuration of the separate instance of the process corresponding to the one of the multiple workloads.

On-demand access to compute resources
11522811 · 2022-12-06 · ·

Disclosed are systems, methods and computer-readable media for controlling and managing the identification and provisioning of resources within an on-demand center as well as the transfer of workload to the provisioned resources. One aspect involves creating a virtual private cluster within the on-demand center for the particular workload from a local environment. A method of managing resources between a local compute environment and an on-demand environment includes detecting an event associated with a local compute environment and based on the detected event, identifying information about the local environment, establishing communication with an on-demand compute environment and transmitting the information about the local environment to the on-demand compute environment, provisioning resources within the on-demand compute environment to substantially duplicate the local environment and transferring workload from the local-environment to the on-demand compute environment. The event can be a threshold or a triggering event within or outside of the local environment.

On-demand access to compute resources
11522811 · 2022-12-06 · ·

Disclosed are systems, methods and computer-readable media for controlling and managing the identification and provisioning of resources within an on-demand center as well as the transfer of workload to the provisioned resources. One aspect involves creating a virtual private cluster within the on-demand center for the particular workload from a local environment. A method of managing resources between a local compute environment and an on-demand environment includes detecting an event associated with a local compute environment and based on the detected event, identifying information about the local environment, establishing communication with an on-demand compute environment and transmitting the information about the local environment to the on-demand compute environment, provisioning resources within the on-demand compute environment to substantially duplicate the local environment and transferring workload from the local-environment to the on-demand compute environment. The event can be a threshold or a triggering event within or outside of the local environment.

System and method for predicting the state changes of network nodes

In one aspect, a method performed by a network node for predicting a probability of state change of a node (e.g., a fog node) in a network is provided. The network node determines a set of weights based on attributes of the node. The network node estimates the probability of state change of the node using the determined set of weights and a set of one or more attribute values related to the node where determining the set of weights includes maximizing an evaluation value associated to the node.

System and method for predicting the state changes of network nodes

In one aspect, a method performed by a network node for predicting a probability of state change of a node (e.g., a fog node) in a network is provided. The network node determines a set of weights based on attributes of the node. The network node estimates the probability of state change of the node using the determined set of weights and a set of one or more attribute values related to the node where determining the set of weights includes maximizing an evaluation value associated to the node.