-
公开(公告)号:US20190342335A1
公开(公告)日:2019-11-07
申请号:US15949901
申请日:2018-04-10
Applicant: Nutanix, Inc.
Inventor: Julie NI , Ken CHEN , Ravikanth SAMPRATHI , Sridhar Joseph DEVARAPALLI , Viraj SAPRE , Rajesh P. BHATT
Abstract: A request to create a set of security policies for an application is received at a graphical user interface. Information identifying a set of source VMs, a set of destination VMs, and a set of target VMs also are received, wherein the target VMs are executing the application and are supported by (a) node(s) in a clustered virtualization environment. A set of inbound rules identifying (a) category(ies) of source VMs permitted to initiate connections with a subset of target VMs and a set of outbound rules identifying (a) category(ies) of destination VMs to which the subset of target VMs are permitted to initiate connections are received at the graphical user interface. Upon receiving a request to apply the security policies, the policies are configured based at least in part on the inbound and outbound rules and a visual representation of the security policies is presented in the graphical user interface.
-
2.
公开(公告)号:US20190334768A1
公开(公告)日:2019-10-31
申请号:US15836398
申请日:2017-12-08
Applicant: Nutanix, Inc.
Inventor: Ranjan PARTHASARATHY , Constantine Andrew KOUSOULIS , John TORRES , Viraj SAPRE
Abstract: Computer-aided computer system configuration techniques for adding new computing resources to an existing set of computing resources. A method embodiment commences upon identifying an existing computing system having a first set of configuration parameters. A second computing system having a second set of configuration parameters is deployed. A user interface is provided to accept user input comprising a location and protocol to access the existing computing system. Syntactical and semantic differences between the configuration parameters of the existing computing system and those of the newly added set are identified. The identified differences are analyzed to generate a parameter map that relates the existing set of configuration parameters to the second set of configuration parameters and vice-versa. Relationships that are codified in the parameter map are validated through user interactions. The second set of configuration parameters are modified or augmented such that parameters can be synchronized between the two computing systems.
-