TECHNIQUES FOR INCREMENTAL SOFTWARE BUILD
    1.
    发明公开

    公开(公告)号:US20240354102A1

    公开(公告)日:2024-10-24

    申请号:US18305992

    申请日:2023-04-24

    CPC classification number: G06F8/71

    Abstract: Techniques for incrementally building a new version of a software application based on a cloud native distributed CI systems with snapshot of a past build for a qualified past version of the same software application are described herein. The techniques include receiving a first request to generate a first build unit for a first version of the software application and determining a first environment parameter associated with the request. A version history graph associated with the software application is also received, and based on this graph, a second version of the software application is determined. The techniques may further include generating the first build unit based on a distance measure associated with the first version and the second version. The techniques may also include determining the underlying external storage provisioner in Kubernetes base continuous integration systems and provision the snapshots by calling appropriate drivers.

    SCALABLE STATISTICS AND ANALYTICS MECHANISMS IN CLOUD NETWORKING

    公开(公告)号:US20210119854A1

    公开(公告)日:2021-04-22

    申请号:US17137229

    申请日:2020-12-29

    Abstract: Systems, methods, and computer readable storage mediums are disclosed for scalable data collection and aggregation of statistics for logical objects of an application centric network. An analytics agent running on a logical object of an application centric network is elected as one of a Designated Stats device (DSD) or a Member Stats device (MSD). If the analytics agent is defined as a DSD, the analytics agent receives data reported from a downstream MSD communicated over the analytics plane and aggregates data from the MSD belonging to the same access control list rule. If the analytics agent is defined as an MSD, the analytics agent selects a DSD and reports the statistics to that DSD over the analytics plane.

    System and method for providing scalable flow monitoring in a data center fabric

    公开(公告)号:US11233721B2

    公开(公告)日:2022-01-25

    申请号:US16808768

    申请日:2020-03-04

    Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.

    System and method for providing scalable flow monitoring in a data center fabric

    公开(公告)号:US10601693B2

    公开(公告)日:2020-03-24

    申请号:US15658215

    申请日:2017-07-24

    Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.

    Guaranteeing bandwidth for dual-homed hosts in fabric extender topologies
    6.
    发明授权
    Guaranteeing bandwidth for dual-homed hosts in fabric extender topologies 有权
    保证面向扩展器拓扑中双归主机的带宽

    公开(公告)号:US09473357B2

    公开(公告)日:2016-10-18

    申请号:US14163313

    申请日:2014-01-24

    CPC classification number: H04L41/0896 H01L41/083 H04L41/083 H04L43/0894

    Abstract: Techniques are provided for optimizing bandwidth in a network. Information describing a network bandwidth capacity of a port extender device is received at a switch. The port extender device is connected to the switch. The port extender device is configured to provide ports for the switch. The network bandwidth capacity of the port extender device is compared to a minimum network bandwidth guarantee threshold. If the switch determines that the network bandwidth capacity of the port extender device is below the minimum network guarantee threshold, the switch sends to the port extender device a message configured to cause the port extender to deactivate one or more links between the port extender device and one or more servers in communication with the port extender device.

    Abstract translation: 提供技术来优化网络中的带宽。 在交换机处接收描述端口扩展器设备的网络带宽容量的信息。 端口扩展设备连接到交换机。 端口扩展器设备配置为提供交换机的端口。 将端口扩展器设备的网络带宽容量与最小网络带宽保证阈值进行比较。 如果交换机确定端口扩展设备的网络带宽容量低于最低网络保证阈值,则交换机向端口扩展设备发送一条消息,该消息被配置为使端口扩展器停用端口扩展器设备和 与端口扩展器设备通信的一个或多个服务器。

    Multi-domain extension to cloud security

    公开(公告)号:US11343234B2

    公开(公告)日:2022-05-24

    申请号:US16709188

    申请日:2019-12-10

    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.

    TRAFFIC MIRRORING IN HYBRID NETWORK ENVIRONMENTS

    公开(公告)号:US20210218673A1

    公开(公告)日:2021-07-15

    申请号:US16863713

    申请日:2020-04-30

    Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.

    MULTI-DOMAIN EXTENSION TO CLOUD SECURITY

    公开(公告)号:US20210176224A1

    公开(公告)日:2021-06-10

    申请号:US16709188

    申请日:2019-12-10

    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.

Patent Agency Ranking