Systems and methods for adding microservices into existing system environments
First Claim
1. A computer-implemented method, comprising:
- receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification;
determining that one or more hosts are available;
accessing one or more host records for the one or more available hosts;
selecting an available host on which to deploy the security microservice utilizing the deployment specification and the one or more host records for the one or more available hosts;
determining whether an interface microservice is available on the selected available host based on a host record for the selected available host;
when the selected available host does not include existing interface microservices,initializing the interface microservice on the selected available host, andattaching the interface microservice to a hypervisor of the selected available host;
initializing the security microservice on the selected available host;
connecting the security microservice to the interface microservice of the selected available host; and
executing the security microservice.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determining that one or more hosts are available; accessing one or more host records for the one or more available hosts; selecting an available host on which to deploy the security microservice utilizing the deployment specification and the one or more host records for the one or more available hosts; determining whether an interface microservice is available on the selected available host based on a host record for the selected available host; when the selected available host does not include existing interface microservices, initializing the interface microservice on the selected available host, and attaching the interface microservice to a hypervisor of the selected available host; initializing the security microservice on the selected available host; connecting the security microservice to the interface microservice of the selected available host; and executing the security microservice. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more non-transitory computer-readable storage media storing instructions which, when executed by one or more hardware processors, cause performance of:
-
receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determining that one or more hosts are available; accessing one or more host records for the one or more available hosts; selecting an available host on which to deploy the security microservice utilizing the deployment specification and the one or more host records for the one or more available hosts; determining whether an interface microservice is available on the selected available host based on a host record for the selected available host; when the selected available host does not include existing interface microservices, initializing the interface microservice on the selected available host, and attaching the interface microservice to a hypervisor of the selected available host; initializing the security microservice on the selected available host; connecting the security microservice to the interface microservice of the selected available host; and executing the security microservice. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
-
one or more hardware processors; memory coupled to the one or more hardware processors, the memory storing instructions which, when executed by the one or more hardware processors, causes the apparatus to; receive a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification; determine that one or more hosts are available; access one or more host records for the one or more available hosts; select an available host on which to deploy the security microservice utilizing the deployment specification and the one or more host records for the one or more available hosts; determine whether an interface microservice is available on the selected available host based on a host record for the selected available host; when the selected available host does not include existing interface microservices, initialize the interface microservice on the selected available host, and attach the interface microservice to a hypervisor of the selected available host; initialize the security microservice on the selected available host; connect the security microservice to the interface microservice of the selected available host; and execute the security microservice. - View Dependent Claims (18, 19, 20)
-
Specification