KR-20260065626-A - AUTOMATICALLY DEPLOYED INFORMATION TECHNOLOGY (IT) SYSTEM AND METHOD WITH ENHANCED SECURITY
Abstract
A system and method for deploying an IT computer system are disclosed. According to exemplary embodiments, the system may include a controller that provides and manages interrelated services within the system. For example, it may manage methods to release modifications when a service that has interdependencies with other services is deleted by creating and maintaining cleanup rules. According to additional exemplary embodiments, the system may include a controller that provisions storage for computing resources or provisions resources and connects them to cloud instances. An innovative technique for backing up system components is also described.
Inventors
- 슈미트, 파커 존
- 리차드슨 숀 마이클
- 세멜 닐 벤자민
- 스프리 카메론 타일러
- 오사 아리아나
Assignees
- 넷-썬더, 엘엘씨
Dates
- Publication Date
- 20260508
- Application Date
- 20200610
- Priority Date
- 20190611
Claims (1)
- As an information technology (IT) computer system, Controller; Resources for connection to the above controller - said resources include a first service and a second service, said first and second services have dependencies on each other, said first service includes a dependency service for the second service, and said second service includes a dependent service for the first service; and It includes an API (application programming interface) that interfaces with the first and second services and with the controller, and The above controller is an information technology computer system configured to manage the interoperability of the first service with the second service.
Description
Automatically Deployed Information Technology (IT) System and Method with Enhanced Security [Cross-reference and Priority Claim for Related Patent Applications] This patent application claims priority to U.S. provisional application No. 62/860,148, filed on June 11, 2019, under the title “Automatically Deployed Information Technology (IT) System and Method with Enhanced Security,” the entire disclosure of which is incorporated herein by reference. The demand, use, and necessity of computing have surged over the past few decades. Consequently, the demand for greater storage, speed, computing power, applications, and accessibility has rapidly transformed the computing landscape, providing tools for entities of various types and sizes. As a result, the use of public virtual computing and cloud computing systems has evolved to provide larger computing resources to a multitude of users and user types. This exponential growth is expected to continue. At the same time, due to increased failure and security risks, infrastructure setup, management, change management, and updates have become more complex and costly. Over time, system scalability, or growth, has become a significant challenge in the field of information technology. Most IT system issues related to performance and security can be difficult to diagnose and resolve. Constraints on the time and resources allowed for system setup, configuration, and deployment can lead to errors that may result in future IT problems. Over time, various administrators may be involved in changes, patches, or updates to IT systems, including users, applications, services, security, software, and hardware. Often, documentation and records regarding configurations and changes are inadequate or lost, making it difficult to understand how a specific system is configured and operates later. This can hinder future changes or troubleshooting. IT configurations and settings can be difficult to recover from and reproduce when problems or failures occur. Furthermore, system administrators can easily make mistakes, such as incorrect commands or other errors, which can ultimately cause computers, web databases, and services to downtime. Additionally, while the risk of security breaches is very common, changes, updates, and patches intended to avoid such breaches can cause undesirable downtime. When critical infrastructure is in place, operational, and running, the costs or risks may often appear to outweigh the benefits of system changes. Issues associated with changing operating IT systems or environments can cause significant, and sometimes devastating, problems for users or entities that depend on them. At the very least, the amount of time required to resolve and repair failures or issues arising during change management can require substantial resources in terms of time, personnel, and cost. When changing the actual environment, potential technical problems can have a cascading effect and may not be resolved solely by reversing the change. Many of these issues prevent the rapid rebuilding of systems in the event of failures during change management. Additionally, bare metal cloud nodes or resources within an IT system may be vulnerable to security issues, intruded upon, or accessed by malicious users. Hackers, attackers, or malicious users may pivot off such nodes or resources to access or hack any other part of the IT system or network connected to the node. Bare metal cloud nodes or controllers in an IT system may also be vulnerable through resources connected to an application network that could expose the system to security threats or otherwise intrude upon the system. According to various exemplary embodiments disclosed herein, an IT system may be configured to enhance the security of bare metal cloud nodes or resources that interface with the Internet or interface with an application network, regardless of whether they are connected to an external network. FIG. 1 is a schematic diagram of a system according to an exemplary embodiment. FIG. 2a is a schematic diagram of an exemplary controller for the system of FIG. 1. FIG. 2b illustrates an exemplary flow of the operation of an exemplary set of storage extension rules. FIGS. 2C and 2D illustrate alternative embodiments for performing steps 210.1 and 210.2 of FIG. 2B. Figure 2e shows an exemplary template. Figure 2f shows an exemplary process flow of controller logic for template processing. FIGS. 2g and 2h show an exemplary process flow for steps 205.11, 205.12, and 205.13 of FIG. 2f. Figure 2i shows another exemplary template. Figure 2j illustrates another exemplary process flow of controller logic for template processing. Figure 2k shows an exemplary process flow for managing service dependencies. FIG. 2L is a schematic diagram of an exemplary image derived from a template according to an exemplary embodiment. Figure 2m illustrates an exemplary set of system rules. FIG. 2n illustrates an exemplary process flow of controller l