Abstract:
Certain embodiments described herein are directed to a method of receiving information associated with a service provided by a management plane for managing a remote network. The method, in one example, includes registering, at an adapter container, with a data store or an entity within a service instance of a service deployment associated with a service within a software-defined networking environment associated with the remote network, wherein the service is provided for managing a remote network, and wherein registering with the data store or the entity causes the data store or the entity to send information associated with the service instance to the adapter when information is available. The method also includes receiving, at the adapter container, information from the data store or the entity. The method also includes transforming the information from a first format to a second format. The method also includes transmitting the information to an endpoint.
Abstract:
Embodiments of the present disclosure relate to enforcing universal security policies across data centers. Embodiments include receiving, from a user, a first universal security policy (USP) related to a first universal policy group. Embodiments include identifying a first data center as an enforcement point for the first USP. Embodiments include automatically generating, at the first data center, a first local security policy based on the first USP. Embodiments include deploying a workload associated with the first universal policy group to the first data center. The first USP is enforced for the workload via the first local security policy.
Abstract:
Some embodiments provide a method for distributing a service rule that is to be enforced across a first set of sites and that is defined by reference to a group identifier that identifies a group of machines. The method distributes the service rule to each site in the first set of sites. The method identifies at least one site in the first set of sites that is not in a second set of sites that has already received a definition of the group. The method distributes the group definition to each identified site in the first set of sites that has not already received the definition of the group.
Abstract:
Techniques for optimizing guest operating system (OS) utilization cost in a processor based licensing model in a virtual datacenter are described. In one example embodiment, a virtual machine (VM) that has or is scheduled to have an instance of an operating system (OS) that requires a license is identified. Availability of a physical processor of a first host computing system that is licensed to execute the OS based on the computing resource requirements of the VM, the physical processor based license, author assigned affinity to physical processors in the first host computing system is determined. The VM is then migrated/placed to/on the physical processor of the first host computing system or migrated/placed to/on a physical processor of a second host computing system based on the outcome of the determination.
Abstract:
Systems and techniques are described for generating test cases. In one example, a manual test of code is performed. The manual test uses proxy code to detect at least one input to the code and a data transfer between the code and other code. The data transfer includes an input to the other code and an output from the other code. A file is generated that includes the at least one input to the code, the input to the other code, the output from the other code, and data that specifies that the manual test of the code resulted in an expected output. A mock test automates the manual test of the code based at least in part on the file.
Abstract:
The present disclosure is related to methods, systems, and machine-readable media for information technology (IT) cost calculation in a software defined data center. A cost of infrastructure IT objects in a software defined data center can be calculated. The infrastructure IT objects can be mapped to an IT service construct over time, during runtime of the infrastructure IT objects. A portion of the cost of the infrastructure IT objects can be allocated to the IT service construct according to the map. A non-infrastructure IT cost can be allocated to the IT service construct. A total cost of the IT service construct can be calculated based on the allocations.
Abstract:
Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.
Abstract:
Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.
Abstract:
Some embodiments provide a method for distributing rules associated with a particular logical network element that is implemented across one or more physical sites. The method uses a set of attributes of a set of elements associated with the particular logical network element to identify a particular set of physical sites spanned by the particular logical network element. The method identifies a set of rules associated with the particular logical network element. The method distributes the identified set of rules to each site of the identified set of physical sites.
Abstract:
The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. The currently described methods and systems employ configuration files to specify configuration of the execution environment for application-release-management pipelines, application-release-management-pipeline stages, and application-release-management-pipeline-stage tasks and apply policies to configuration files to further specify the execution environments for application-release-management pipelines.