COMPUTE RESOURCES MANAGEMENT VIA VIRTUAL SERVICE CONTEXTS (VSC) IN COMPUTE CLUSTERS

    公开(公告)号:US20220129326A1

    公开(公告)日:2022-04-28

    申请号:US17077352

    申请日:2020-10-22

    Abstract: Techniques and mechanisms for managing workloads in compute clusters comprising compute nodes by managing the workloads at the resource level of the compute clusters. For example, virtual service contexts (VSCs) may be defined where the VSCs represent service classes. Policies may be defined with respect to each service class. These service classes are dynamically constructed based on business needs. Hence there is natural requirement for a user to construct and rebalance the compute resources for these service classes dynamically. The policies may be related to resources of the compute clusters for executing workload units in the compute clusters. Resources of the compute clusters may be allocated to each service class. Each workload unit may be assigned to a one of the service classes based on the service context or type of workload unit. The workload units may then be executed by the compute clusters using the resources in accordance with the policies.

    Compute resources management via virtual service contexts (VSC) in compute clusters

    公开(公告)号:US11922216B2

    公开(公告)日:2024-03-05

    申请号:US17077352

    申请日:2020-10-22

    Abstract: Techniques and mechanisms for managing workloads in compute clusters comprising compute nodes by managing the workloads at the resource level of the compute clusters. For example, virtual service contexts (VSCs) may be defined where the VSCs represent service classes. Policies may be defined with respect to each service class. These service classes are dynamically constructed based on business needs. Hence there is natural requirement for a user to construct and rebalance the compute resources for these service classes dynamically. The policies may be related to resources of the compute clusters for executing workload units in the compute clusters. Resources of the compute clusters may be allocated to each service class. Each workload unit may be assigned to a one of the service classes based on the service context or type of workload unit. The workload units may then be executed by the compute clusters using the resources in accordance with the policies.

    PROVIDING PERSISTENT EXTERNAL INTERNET PROTOCOL ADDRESS FOR EXTRA-CLUSTER SERVICES

    公开(公告)号:US20220311738A1

    公开(公告)日:2022-09-29

    申请号:US17531241

    申请日:2021-11-19

    Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.

    COMPUTER NETWORK CONTROLLER WITH SWITCH AUTO-CLAIM

    公开(公告)号:US20240073099A1

    公开(公告)日:2024-02-29

    申请号:US18119172

    申请日:2023-03-08

    CPC classification number: H04L41/12

    Abstract: Techniques for automatically claiming switches of a tenant computer network by a remote, cloud-based network controller. A first seed switch is manually claimed by a user by implementing the remote, cloud-based network controller. After claiming the seed switch a set of switches immediately connected with the seed switch are identified by Device Connector logic in the seed switch and immediately connected switches. Switches directly connected to those switches are then identified using Device Connector logic of the switches. This process is performed iteratively by identifying immediately connected switches until all of the switches are identified. All or a subset of the identified switches can then be claimed by the remote, cloud-based controller based on a response from the tenant network user.

    VIRTUALIZING SECURE VAULT OF DATA PROCESSING UNIT FOR SECURE HARDWARE SECURITY MODULE FOR HOSTS

    公开(公告)号:US20250094601A1

    公开(公告)日:2025-03-20

    申请号:US18369070

    申请日:2023-09-15

    Abstract: A system and method of securing and virtualizing firmware trusted platform modules (TPMs) for virtualizing a hardware security module (HSM) for a host within a network fabric is provided. The system and method include operably coupling a set of components associated with a host comprising a data processing unit (DPU) secure vault and a firmware trusted platform module (TPM). The firmware TPM is configured as a virtual firmware TPM. The DPU secure vault secures the virtual firmware TPM into one or more virtual firmware TPMs based on one or more partitions configured with the DPU secure vault. A virtual TPM manager communicatively coupled to the DPU secure vault manages one or more virtual TPMs for hosting a set of Virtual Machines (VMs) or Containers.

    PROVIDING PERSISTENT EXTERNAL INTERNET PROTOCOL ADDRESS FOR EXTRA-CLUSTER SERVICES

    公开(公告)号:US20230216828A1

    公开(公告)日:2023-07-06

    申请号:US18184096

    申请日:2023-03-15

    CPC classification number: H04L61/5007 H04L61/5061 H04L2101/668

    Abstract: Techniques are presented herein for providing a persistent external Internet Protocol (IP) address for extra-cluster services. One example involves initiating, in a cluster, a first pod with a label that identifies a service. The first pod is configured to provide the service to one or more network entities outside the cluster. The first pod is assigned an IP address configured for communicating outside the cluster. A mapping of the service to the IP address is stored. In response to a determination that the service has been disrupted, a second pod is initiated in the cluster with the label that identifies the service. The second pod is configured to provide the service to the one or more network entities outside the cluster. Based on the mapping and the label that identifies the service, the IP address is assigned to the second pod.

Patent Agency Ranking