ARCHITECTURE, METHOD AND SYSTEM FOR LIVE TESTING IN A PRODUCTION ENVIRONMENT

    公开(公告)号:US20230082606A1

    公开(公告)日:2023-03-16

    申请号:US17795639

    申请日:2021-03-31

    IPC分类号: G06F11/36

    摘要: There is provided an architecture, methods and a system for live testing in a production environment. The architecture comprises a platform independent Test Planner for generating a test package in response to receiving an event. Generating a test package comprises selecting test goals, generating a test suite and generating a test plan. The architecture comprises a platform dependent Test Execution Framework (TEF) for executing the test package in an environment serving live traffic. Executing the test package comprises initializing the test plan, starting the test plan and reporting the successful completion of the test plan, reporting the suspension of the test plan and waiting for further instructions, or reporting a failure of the test plan and executing a corresponding contingency plan.

    Model based upgrade campaign generation

    公开(公告)号:US10466998B2

    公开(公告)日:2019-11-05

    申请号:US16071034

    申请日:2016-02-17

    摘要: An upgrade campaign is generated for entities of a system described by a source configuration. According to the upgrade campaign, the system is upgraded to a target configuration using available software. A change model describes changes from the source configuration to the target configuration. According to the change model, an upgrade campaign specification model is generated, which contains at least one upgrade campaign element for each change in the change model. A subset of upgrade campaign elements are matched based on a first set of rules, and the matched upgrade campaign elements are merged into an upgrade procedure in the upgrade campaign specification model. The upgrade procedures are ordered based on a second set of rules and dependencies among the entities of the system, where the dependencies are extracted from the source configuration, the target configuration and the description of available software.

    Automation of management of cloud upgrades

    公开(公告)号:US11886917B2

    公开(公告)日:2024-01-30

    申请号:US17265998

    申请日:2019-07-24

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5027

    摘要: Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.

    Runtime adjustment of configuration models for consistency preservation

    公开(公告)号:US11099860B2

    公开(公告)日:2021-08-24

    申请号:US15758622

    申请日:2015-09-15

    IPC分类号: G06F9/445 G06F8/656 G06F9/50

    摘要: A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.

    NETWORK SERVICE DESCRIPTOR SUPPORT FOR NETWORK SLICE ISOLATION REQUIREMENTS

    公开(公告)号:US20230037914A1

    公开(公告)日:2023-02-09

    申请号:US17791036

    申请日:2020-01-30

    摘要: A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.

    Dimensioning network services (NS)

    公开(公告)号:US11558248B2

    公开(公告)日:2023-01-17

    申请号:US17291950

    申请日:2019-11-06

    摘要: A method and network node are provided for dimensioning a network service (NS). The method comprises calculating, based on given capacity requirements of the NS, a required number of virtual network functions component (VNFC) instances of each of a plurality of virtual network function (VNF) in the NS; selecting a VNF deployment flavor (VnfDf) for each of the plurality of VNFs in the NS, based on the calculated required number of VNFC instances; generating a network service deployment flavor (NsDf) including the selected VnfDfs; and onboarding a network service descriptor (NSD), which includes the NsDf, for use for instantiating the dimensioned NS.

    Semantic weaving of configuration fragments into a consistent configuration

    公开(公告)号:US10768945B2

    公开(公告)日:2020-09-08

    申请号:US15769590

    申请日:2016-03-21

    摘要: A system configuration is generated by integrating source models. Transformations are generated according to a weaving model that specifies relations among metamodels of the source models and the system configuration. The transformations, when executed, transform the source models into the system configuration that includes target entities. From the transformations, one or more integration constraints are generated for each target entity to be created or modified by an operation of the transformations. The integration constraints describe semantics of the relations specified by the weaving model. System configuration constraints are formed to include the integration constraints in addition to constraints of each source model. The transformations are executed to transform the source models into the system configuration to generate the system configuration obeying the system configuration constraints.

    Rolling upgrade with dynamic batch size

    公开(公告)号:US10754694B2

    公开(公告)日:2020-08-25

    申请号:US16070097

    申请日:2016-01-29

    摘要: A system is upgraded by rolling upgrade with dynamic batch sizes in multiple iterations. The system includes multiple hosts that host multiple resources. The rolling upgrade calculates a number of hosts to upgrade and a number of resources to upgrade for each iteration. The calculation subtracts a reserved number of hosts from a capacity of the system to account for potential failover and potential resource scaling operations during the iteration. Based on the calculated number of hosts to upgrade, it is determined whether the system has a capacity for upgrade. If the capacity exists, the calculated number of hosts to upgrade and the calculated number of resources to upgrade are upgraded, while accepting resource scaling requests during the iteration.