摘要:
A system configuration is partially validated in response to requested changes to the system configuration. First, a reduced set of constraints is identified among a plurality of constraints of the system configuration. The reduced set of constraints place restrictions on attribute values and relations of changed entities to which the requested changes are applied. Each constraint of the reduced set is categorized based on leadership information that indicates an impact that a changed entity has on another entity with respect to the constraint. Each categorized constraint of the reduced set is validated to determine whether to accept, reject or modify the system configuration having the requested changes.
摘要:
Configuration requirements that specify the provision of services using a system-level description are automatically generated from user requirements. The user requirements are decomposed into one or more levels of decomposed functionalities using an ontology as input. The ontology stores known decompositions of functionalities and relations between the known decompositions. The lowest level of the decomposed functionalities is mapped into a set of components provided by vendors, and additional components on which the set of components depend are identified. Based on the set of components and the additional components, a required number of instances of service workload is calculated to generate the configuration requirements of the system that satisfy the user requirements.
摘要:
A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid.
摘要:
A system is reconfigured at runtime when triggers are issued in response to events taking place in the system. The triggers, which are issued on configuration entities, are correlated by transferring relations of the configuration entities to relations of the triggers to thereby identify related triggers. Elasticity rules are selected for the triggers, where the elasticity rules specify actions for resource allocation or deallocation at runtime. Selected actions of the selected elasticity rules for the related triggers are executed to reconfigure the system according to a set of action correlation meta-rules which provide an ordering of the actions.
摘要:
Configuration requirements that specify the provision of services using a system-level description are automatically generated from user requirements. The user requirements are decomposed into one or more levels of decomposed functionalities using an ontology as input. The ontology stores known decompositions of functionalities and relations between the known decompositions. The lowest level of the decomposed functionalities is mapped into a set of components provided by vendors, and additional components on which the set of components depend are identified. Based on the set of components and the additional components, a required number of instances of service workload is calculated to generate the configuration requirements of the system that satisfy the user requirements.
摘要:
An Availability Management Framework (AMF) configuration describes how configuration entities of a highly available system are grouped and includes information on service provision and service protection policies against resource failure. The AMF configuration defines a set of failure types for each component and each node, and specifies a failure rate and a recommended recovery for each failure type. A method for evaluating service availability receives the AMF configuration as input, and analyzes it to obtain an actual recovery that the highly available system is to perform when the given component fails. The method maps the AMF configuration to a stochastic model that captures the dependencies among the components and among the configuration entities at multiple levels of the hierarchy. The method utilizes the model to calculate the service availability of the AMF configuration based on the failure rate, the actual recovery and the dependencies.
摘要:
A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration.
摘要:
The disclosure relates to a method, system and computer readable media for validating that a configuration of a cloud system meets requirements, using a reduced test suite selected from a test suite. The method includes classifying the requirements and service instances realizing the requirements composing the cloud system. The method includes applying test suite reduction rules to the test suite, using the classified requirements and service instances, to obtain the reduced test suite. The method includes applying the reduced test suite to the cloud system configured with the configuration, thereby validating that the configuration of the cloud system meets the requirements.
摘要:
A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.
摘要:
The disclosure relates to a method and a state controller running in a Kubernetes system. The state controller being operative to assign labels to pods, the labels indicating services to which the pods are assigned and high-availability states of the pods; detect a failed pod having a label indicating a high-availability state of not ready; and reassign the label indicating the high-availability state of the failed pod to a healthy pod, thereby changing endpoints of services provided and service flows from the failed pod to the healthy pod.