US 12,113,905 B2
System and method for computing cluster seeding and security using kubernetes immutable resource log
Douglas Sanders, Coppell, TX (US); Marc Jimenez, Richardson, TX (US); Robert Jackson, Wylie, TX (US); and Aaron Kitchens, Dallas, TX (US)
Assigned to DELL PRODUCTS LP, Round Rock, TX (US)
Filed by Dell Products, LP, Round Rock, TX (US)
Filed on Nov. 20, 2022, as Appl. No. 17/990,717.
Application 17/990,717 is a continuation of application No. 17/232,958, filed on Apr. 16, 2021, granted, now 11,516,015.
Prior Publication US 2023/0224160 A1, Jul. 13, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 15/16 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 67/00 (2022.01); H04L 67/06 (2022.01); H04L 67/1097 (2022.01)
CPC H04L 9/3226 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0819 (2013.01); H04L 67/06 (2013.01); H04L 67/1097 (2013.01); H04L 67/34 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An information handling system operating a Kubernetes® Immutable Resource Log (KIRL) cluster seeding and security system comprising:
a processor, executing KIRL cluster seeding and security system code instructions to receive, via user input, and store a first cluster configuration file configuring a computing cluster for execution of a containerized software application and a first user credentials file for the computing cluster, where the first user credentials file defines a user authorized via the KIRL cluster seeding and security system to deploy the containerized software application at the computing cluster;
the processor accessing a KIRL root directory for a first credential set identifying the computing cluster and identifying the first user credentials file for the computing cluster;
a network interface device configured to receive from the computing cluster a current user credentials file for the computing cluster;
the processor, executing KIRL cluster seeding and security system code instructions to determine that the first user credentials file identified in the first credential set associated with the containerized software application does not match the current user credentials file; and
a display device configured to display a warning message indicating an unauthorized reconfiguration of the computing cluster has occurred.