Infrastructure-agnostic network-level visibility and policy enforcement for containers
An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy o...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Cook, Daniel Richard Glenn, Matthew Kirby Fandli, Juraj George Gupta, Mukesh McCormick, Thomas Michael Mishra, Rupesh Kumar Kirner, Paul James |
description | An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy on a container. The configuration generation module executes in the host namespace to configure a traffic control and monitoring module in a container namespace associated with the container. The traffic control and monitoring module in the container namespace controls and monitors communications to and from the container in accordance with its configuration. By executing a configuration generation module in the host namespace to configure traffic control and monitoring module in the container namespace, the enforcement mechanism beneficially enables robust and lightweight enforcement in a manner that is agnostic to different containerization protocols. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10805166B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10805166B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10805166B23</originalsourceid><addsrcrecordid>eNqNjTsOwjAMQLMwIOAO5gCRWhBVZxAIZj5rZYKDLIJTJW5Rb08HDsD03vCkNzW3k_iEWVPntEtk8SkxKzsQ0k9MLxuopwA9Z75zYB0A5QFtDOwGIPExOXqTKIwGLooiC6U8NxOPIdPix5lZHvaX3dFSGxvKLToaB831XBZ1sSmrarta_9N8AeN0Oxo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Infrastructure-agnostic network-level visibility and policy enforcement for containers</title><source>esp@cenet</source><creator>Cook, Daniel Richard ; Glenn, Matthew Kirby ; Fandli, Juraj George ; Gupta, Mukesh ; McCormick, Thomas Michael ; Mishra, Rupesh Kumar ; Kirner, Paul James</creator><creatorcontrib>Cook, Daniel Richard ; Glenn, Matthew Kirby ; Fandli, Juraj George ; Gupta, Mukesh ; McCormick, Thomas Michael ; Mishra, Rupesh Kumar ; Kirner, Paul James</creatorcontrib><description>An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy on a container. The configuration generation module executes in the host namespace to configure a traffic control and monitoring module in a container namespace associated with the container. The traffic control and monitoring module in the container namespace controls and monitors communications to and from the container in accordance with its configuration. By executing a configuration generation module in the host namespace to configure traffic control and monitoring module in the container namespace, the enforcement mechanism beneficially enables robust and lightweight enforcement in a manner that is agnostic to different containerization protocols.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20201013&DB=EPODOC&CC=US&NR=10805166B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20201013&DB=EPODOC&CC=US&NR=10805166B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Cook, Daniel Richard</creatorcontrib><creatorcontrib>Glenn, Matthew Kirby</creatorcontrib><creatorcontrib>Fandli, Juraj George</creatorcontrib><creatorcontrib>Gupta, Mukesh</creatorcontrib><creatorcontrib>McCormick, Thomas Michael</creatorcontrib><creatorcontrib>Mishra, Rupesh Kumar</creatorcontrib><creatorcontrib>Kirner, Paul James</creatorcontrib><title>Infrastructure-agnostic network-level visibility and policy enforcement for containers</title><description>An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy on a container. The configuration generation module executes in the host namespace to configure a traffic control and monitoring module in a container namespace associated with the container. The traffic control and monitoring module in the container namespace controls and monitors communications to and from the container in accordance with its configuration. By executing a configuration generation module in the host namespace to configure traffic control and monitoring module in the container namespace, the enforcement mechanism beneficially enables robust and lightweight enforcement in a manner that is agnostic to different containerization protocols.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjTsOwjAMQLMwIOAO5gCRWhBVZxAIZj5rZYKDLIJTJW5Rb08HDsD03vCkNzW3k_iEWVPntEtk8SkxKzsQ0k9MLxuopwA9Z75zYB0A5QFtDOwGIPExOXqTKIwGLooiC6U8NxOPIdPix5lZHvaX3dFSGxvKLToaB831XBZ1sSmrarta_9N8AeN0Oxo</recordid><startdate>20201013</startdate><enddate>20201013</enddate><creator>Cook, Daniel Richard</creator><creator>Glenn, Matthew Kirby</creator><creator>Fandli, Juraj George</creator><creator>Gupta, Mukesh</creator><creator>McCormick, Thomas Michael</creator><creator>Mishra, Rupesh Kumar</creator><creator>Kirner, Paul James</creator><scope>EVB</scope></search><sort><creationdate>20201013</creationdate><title>Infrastructure-agnostic network-level visibility and policy enforcement for containers</title><author>Cook, Daniel Richard ; Glenn, Matthew Kirby ; Fandli, Juraj George ; Gupta, Mukesh ; McCormick, Thomas Michael ; Mishra, Rupesh Kumar ; Kirner, Paul James</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10805166B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Cook, Daniel Richard</creatorcontrib><creatorcontrib>Glenn, Matthew Kirby</creatorcontrib><creatorcontrib>Fandli, Juraj George</creatorcontrib><creatorcontrib>Gupta, Mukesh</creatorcontrib><creatorcontrib>McCormick, Thomas Michael</creatorcontrib><creatorcontrib>Mishra, Rupesh Kumar</creatorcontrib><creatorcontrib>Kirner, Paul James</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cook, Daniel Richard</au><au>Glenn, Matthew Kirby</au><au>Fandli, Juraj George</au><au>Gupta, Mukesh</au><au>McCormick, Thomas Michael</au><au>Mishra, Rupesh Kumar</au><au>Kirner, Paul James</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Infrastructure-agnostic network-level visibility and policy enforcement for containers</title><date>2020-10-13</date><risdate>2020</risdate><abstract>An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy on a container. The configuration generation module executes in the host namespace to configure a traffic control and monitoring module in a container namespace associated with the container. The traffic control and monitoring module in the container namespace controls and monitors communications to and from the container in accordance with its configuration. By executing a configuration generation module in the host namespace to configure traffic control and monitoring module in the container namespace, the enforcement mechanism beneficially enables robust and lightweight enforcement in a manner that is agnostic to different containerization protocols.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10805166B2 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Infrastructure-agnostic network-level visibility and policy enforcement for containers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T16%3A05%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Cook,%20Daniel%20Richard&rft.date=2020-10-13&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10805166B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |