Systems, methods, and devices used to monitor network traffic in a data center and report security threats are described. For example, one embodiment scales out a layer of micro-services in a security system. In particular, embodiments may include scaling out a layer of micro-services in such a security system, creating a new micro-service of the first tier, configuring data-plane connectivity between the new micro-service and the micro- To do; Configuring data plane connectivity between the new micro-services and the third-level micro-services; And to configure the third level micro-services of the layer to include the new micro-services in the load balancing decisions for the first layer.
展开▼