摘要:
Configuration requirements that specify the provision of services using a system-level description are automatically generated from user requirements. The user requirements are decomposed into one or more levels of decomposed functionalities using an ontology as input. The ontology stores known decompositions of functionalities and relations between the known decompositions. The lowest level of the decomposed functionalities is mapped into a set of components provided by vendors, and additional components on which the set of components depend are identified. Based on the set of components and the additional components, a required number of instances of service workload is calculated to generate the configuration requirements of the system that satisfy the user requirements.
摘要:
Configuration requirements that specify the provision of services using a system-level description are automatically generated from user requirements. The user requirements are decomposed into one or more levels of decomposed functionalities using an ontology as input. The ontology stores known decompositions of functionalities and relations between the known decompositions. The lowest level of the decomposed functionalities is mapped into a set of components provided by vendors, and additional components on which the set of components depend are identified. Based on the set of components and the additional components, a required number of instances of service workload is calculated to generate the configuration requirements of the system that satisfy the user requirements.
摘要:
A system is reconfigured at runtime when triggers are issued in response to events taking place in the system. The triggers, which are issued on configuration entities, are correlated by transferring relations of the configuration entities to relations of the triggers to thereby identify related triggers. Elasticity rules are selected for the triggers, where the elasticity rules specify actions for resource allocation or deallocation at runtime. Selected actions of the selected elasticity rules for the related triggers are executed to reconfigure the system according to a set of action correlation meta-rules which provide an ordering of the actions.
摘要:
An upgrade campaign is generated for entities of a system described by a source configuration. According to the upgrade campaign, the system is upgraded to a target configuration using available software. A change model describes changes from the source configuration to the target configuration. According to the change model, an upgrade campaign specification model is generated, which contains at least one upgrade campaign element for each change in the change model. A subset of upgrade campaign elements are matched based on a first set of rules, and the matched upgrade campaign elements are merged into an upgrade procedure in the upgrade campaign specification model. The upgrade procedures are ordered based on a second set of rules and dependencies among the entities of the system, where the dependencies are extracted from the source configuration, the target configuration and the description of available software.
摘要:
Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.
摘要:
A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.
摘要:
A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.
摘要:
A method and network node are provided for dimensioning a network service (NS). The method comprises calculating, based on given capacity requirements of the NS, a required number of virtual network functions component (VNFC) instances of each of a plurality of virtual network function (VNF) in the NS; selecting a VNF deployment flavor (VnfDf) for each of the plurality of VNFs in the NS, based on the calculated required number of VNFC instances; generating a network service deployment flavor (NsDf) including the selected VnfDfs; and onboarding a network service descriptor (NSD), which includes the NsDf, for use for instantiating the dimensioned NS.
摘要:
The disclosure relates to a method and a state controller running in a Kubernetes system. The state controller being operative to assign labels to pods, the labels indicating services to which the pods are assigned and high-availability states of the pods; detect a failed pod having a label indicating a high-availability state of not ready; and reassign the label indicating the high-availability state of the failed pod to a healthy pod, thereby changing endpoints of services provided and service flows from the failed pod to the healthy pod.
摘要:
A system configuration is generated by integrating source models. Transformations are generated according to a weaving model that specifies relations among metamodels of the source models and the system configuration. The transformations, when executed, transform the source models into the system configuration that includes target entities. From the transformations, one or more integration constraints are generated for each target entity to be created or modified by an operation of the transformations. The integration constraints describe semantics of the relations specified by the weaving model. System configuration constraints are formed to include the integration constraints in addition to constraints of each source model. The transformations are executed to transform the source models into the system configuration to generate the system configuration obeying the system configuration constraints.