US 12,137,112 B2
Systems and methods for vulnerability proofed cluster management
Raveendra Babu Madala, Bangalore (IN); and Santosh Gore, Bangalore (IN)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 20, 2022, as Appl. No. 18/048,082.
Prior Publication US 2024/0137381 A1, Apr. 25, 2024
Prior Publication US 2024/0236136 A9, Jul. 11, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An IHS (Information Handling System) configured as a node in a computing cluster comprising a plurality of IHSs, the IHS comprising:
one or more CPUs utilizing one or more buses that connect to a plurality of hardware components of the IHS; and
a remote access controller supporting remote management of the Information Handling System (IHS), the remote access controller comprising a logic unit and a memory device having instructions stored thereon that, upon execution by the logic unit, cause the remote access controller to:
receive notification of modifications to configurations of a computing cluster that includes the IHS;
retrieve, from a persistent data storage of the IHS, a plurality of vulnerability proofing requirements for computing cluster configurations including the IHS;
based on the vulnerability proofing requirements, access a plurality of catalogs comprising known vulnerabilities of IHS hardware components;
determine whether the modifications to the computing cluster configurations are identified as vulnerable in one or more of the catalogs; and
suspend participation of the IHS in the computing cluster until the modifications to the computing cluster configurations are changed to include no configurations with vulnerabilities identified in the plurality of catalogs.