US 12,255,817 B2
Executing workloads across multiple cloud service providers
Saulius Mašnauskas, Vilnius (LT); Rokas Bilevičius, Vilnius (LT); Tadeuš Varnas, Vilnius (LT); Augustinas Stirbis, Vilnius (LT); and Leonid Kuperman, Tarzana, CA (US)
Assigned to CAST AI Group, Inc., Miami, FL (US)
Filed by CAST AI Group, Inc., North Miami Beach, FL (US)
Filed on Jan. 27, 2023, as Appl. No. 18/102,630.
Application 18/102,630 is a continuation of application No. 17/380,729, filed on Jul. 20, 2021, granted, now 11,595,306.
Claims priority of provisional application 63/054,978, filed on Jul. 22, 2020.
Prior Publication US 2023/0179522 A1, Jun. 8, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 45/741 (2022.01); H04L 9/40 (2022.01); H04L 12/46 (2006.01); H04L 67/10 (2022.01)
CPC H04L 45/741 (2013.01) [H04L 12/4633 (2013.01); H04L 12/4641 (2013.01); H04L 63/029 (2013.01); H04L 67/10 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A non-transitory machine-readable medium comprising memory with instructions encoded thereon, the instructions causing one or more processors to perform operations when executed, the instructions comprising instructions to:
provision a tunnel between nodes of two or more CSPs (Cloud Service Providers), each node having associated Kubernetes pods provisioned for the node that run workloads of the node;
provision an overlay network on top of the tunnel having an encapsulation scheme that enables pod-to-pod communication of the Kubernetes pods between the nodes on each of the two or more CSPs across the two or more CSPs notwithstanding the Kubernetes pods comprising applications that each have their own addressing scheme based on internal domain names;
establish a network infrastructure of the overlay network for compute resources to be communicated between the two or more CSPs over a virtual private network (VPN), wherein provisioning the overlay network comprises opening a firewall port on each node, thereby completing provisioning of the nodes;
responsive to completing provisioning of the nodes, initiating operations across the provisioned nodes by injecting data comprising tokens, certificates, and Internet Protocol (IP) addresses into each node.