Systems and methods for adding microservices into existing system environments
First Claim
1. A computer-implemented method, comprising:
- receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification;
determining whether an interface microservice is included on one or more hosts by accessing one or more host records for the one or more hosts;
for hosts that include existing interface microservices,selecting a best available host from the one or more of the hosts that include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification;
for hosts that do not include existing interface microservices or when the one or more hosts that include existing interface microservices are not available,selecting a best available host from the hosts that do not include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification,initializing the interface microservice on the selected host, andattaching the interface microservice to a hypervisor of the selected host;
connecting the security microservice to the interface microservice of the selected host;
deploying the security microservice on the selected host; and
executing the security microservice.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
32 Citations
24 Claims
-
1. A computer-implemented method, comprising:
-
receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determining whether an interface microservice is included on one or more hosts by accessing one or more host records for the one or more hosts; for hosts that include existing interface microservices, selecting a best available host from the one or more of the hosts that include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification; for hosts that do not include existing interface microservices or when the one or more hosts that include existing interface microservices are not available, selecting a best available host from the hosts that do not include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification, initializing the interface microservice on the selected host, and attaching the interface microservice to a hypervisor of the selected host; connecting the security microservice to the interface microservice of the selected host; deploying the security microservice on the selected host; and executing the security microservice. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more non-transitory computer-readable storage media storing instructions which, when executed by one or more hardware processors, cause performance of:
-
receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determining whether an interface microservice is included on one or more hosts by accessing one or more host records for the one or more hosts; for hosts that include existing interface microservices, selecting a best available host from the one or more of the hosts that include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification; for hosts that do not include existing interface microservices or when the one or more hosts that include existing interface microservices are not available, selecting a best available host from the hosts that do not include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification, initializing the interface microservice on the selected host, and attaching the interface microservice to a hypervisor of the selected host; connecting the security microservice to the interface microservice of the selected host; deploying the security microservice on the selected host; and executing the security microservice. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
-
one or more hardware processors; memory coupled to the one or more hardware processors, the memory storing instructions which, when executed by the one or more hardware processors, causes the apparatus to; receive a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determine whether an interface microservice is included on one or more hosts by accessing one or more host records for the one or more hosts; for hosts that include existing interface microservices, select a best available host from the one or more of the hosts that include existing interface microservices that are available, wherein the selecting of the best available host is based on an evaluation of the deployment specification; for hosts that do not include existing interface microservices or when the one or more hosts that include existing interface microservices are not available, select the best available host from the hosts that do not include existing interface microservices, wherein the selecting of the best available host is based on an evaluation of the deployment specification, initializing the interface microservice on the selected host, and attaching the interface microservice to a hypervisor of the selected host; connect the security microservice to the interface microservice of the selected host; deploy the security microservice on the selected host; and execute the security microservice. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification