Load balancing and secure tunneling for cloud-based network controllers
Abstract:
Methods, systems, and devices for using secured tunnels (e.g., SSH tunnels), for example with microservices-based architectures and/or operating-system level virtualization technologies, An example method may include receiving, by a secured tunnel server and via a secured tunnel, network traffic intended for a first original destination of the plurality of original destinations; selecting, using a plurality of override rules that indicate mappings between a plurality of original destinations and respective override destinations, an override destination for the network traffic intended for the first original destination; and forwarding, by the secured tunnel server, the network traffic to the override destination.
Information query
Patent Agency Ranking
0/0