-
1.
公开(公告)号:US20190250972A1
公开(公告)日:2019-08-15
申请号:US16393067
申请日:2019-04-24
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
CPC classification number: G06F11/0715 , G06F9/5077 , G06F11/0751 , G06F11/0793 , G06F11/3648 , G06F12/0253 , G06F12/0269 , G06F2212/152 , G06F2212/154 , G06F2212/163
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
2.
公开(公告)号:US20190026176A1
公开(公告)日:2019-01-24
申请号:US15654906
申请日:2017-07-20
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
公开(公告)号:US11582100B2
公开(公告)日:2023-02-14
申请号:US17719792
申请日:2022-04-13
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Sivakumar Ganapathy , Gianluca Mardente , Giovanni Meo , Patel Amitkumar Valjibhai
IPC: G06F15/177 , H04L41/0816 , H04L12/46 , H04L41/0806 , H04L41/0893 , H04L45/02 , H04L45/44
Abstract: Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.
-
公开(公告)号:US20210266256A1
公开(公告)日:2021-08-26
申请号:US16801500
申请日:2020-02-26
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Sivakumar Ganapathy , Javed Asghar , Azeem Muhammad Suleman
IPC: H04L12/741 , H04L29/08 , H04L12/26 , H04L29/12
Abstract: Techniques for routing data packets through service chains within and between public cloud networks of multi-cloud fabrics. A router in a network, e.g., a public cloud network, receives data packets from nodes in the network through segments of the network. Based at least in part on (i) a source address of the data packet, (ii) a destination address of the data packet, and (iii) an identity of the segments of the network from which the data packets are received, the router determines a next node in the network to which the data packet is to be forwarded. The router may then forward the data packet through another segment of the network to the next node and then receive the data packet from the next node through the another segment.
-
公开(公告)号:US20150234700A1
公开(公告)日:2015-08-20
申请号:US14184150
申请日:2014-02-19
Applicant: Cisco Technology, Inc.
Inventor: Xianlong Qin , Sivakumar Ganapathy , Fei Xu
CPC classification number: G06F11/0778 , G06F9/50 , G06F11/366 , G06F11/3688 , G06F12/0253
Abstract: A method for detecting memory leaks with an administrative client begins by transmitting to all of the processes running on at least one computing device, a first command to return memory track information. The administrative client receives memory track information from each of the processes, and combines them into a first system wide memory allocation. The administrative client transmits an instruction to run a test case process, and then transmits, to each of the processes, a second command to return memory track information. The administrative client receives the second set of memory track information and combines it to generate a second system wide memory allocation. To generate a list of potential memory leaks originating from the test case process, the administrative client compares the first system wide memory allocation with the second system wide memory allocation.
Abstract translation: 用于通过向至少一个计算设备上运行的所有进程发送用于检测与管理客户端的内存泄漏的方法,开始返回内存轨道信息的第一命令。 管理客户端从每个进程接收内存轨道信息,并将它们组合成第一系统范围的内存分配。 管理客户端发送运行测试用例处理的指令,然后向每个处理发送用于返回存储器轨道信息的第二命令。 管理客户机接收第二组存储器轨迹信息并将其组合以产生第二系统宽的存储器分配。 为了生成来自测试用例过程的潜在的内存泄漏的列表,管理客户机将第一系统宽的存储器分配与第二系统宽的存储器分配进行比较。
-
公开(公告)号:US11838325B2
公开(公告)日:2023-12-05
申请号:US17506553
申请日:2021-10-20
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Sivakumar Ganapathy , Prashanth Matety , Patel Amitkumar Valjibhai
IPC: H04L9/40 , H04L12/46 , H04L12/66 , H04L41/0893 , H04L67/10
CPC classification number: H04L63/20 , H04L12/46 , H04L12/4641 , H04L12/66 , H04L41/0893 , H04L63/0263 , H04L63/101 , H04L67/10 , H04L63/0272
Abstract: Systems, methods, and computer-readable media for elastic policy scaling in multi-cloud fabrics. A method can involve deploying a cluster of policy agents on a hub virtual private cloud (VPC) that interconnects spoke VPCs in a cloud associated with a multi-cloud fabric, and mapping endpoints in the spoke VPCs to the policy agents. The method can involve distributing groups of policies for the endpoints across the policy agents based on the mapping of endpoints to policy agents, and advertising, by each policy agent to a respective first set of virtual gateways in the spoke VPCs, routes associated with endpoints mapped to the policy agent and preventing the policy agent from advertising routes associated with a second set of virtual gateways in the spoke VPCs. The method can involve applying, via the policy agent, a group of policies on the policy agent to traffic received by the policy agent.
-
公开(公告)号:US20220385498A1
公开(公告)日:2022-12-01
申请号:US17335887
申请日:2021-06-01
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Arun Saha , Sivakumar Ganapathy , Jose Carlos Recuero Arias , Sapan Shah , Shashank Chaturvedi
Abstract: Techniques are described for dynamically establishing and scaling IPSec tunnels to connect hundreds of sites of a network by making use of the user intent of connecting certain applications for applying security policies and translating it dynamically based on the location and needs of the workloads to set up the network on demand. The techniques involve a tight loop between the network controller of a site (e.g., a cloud Application Policy Infrastructure Controller) and the inter-site or multi-cloud inter-connect controller, stitched through services that enable security and network automation at scale. In particular, to control the number of IPSec tunnels, IPSec tunnels are established only when required. Additionally, IPSec tunnels may be eliminated when no longer required. Thus, resources of a network may be used in a measured way that is necessary and sufficient to meet network traffic demand.
-
公开(公告)号:US11159412B2
公开(公告)日:2021-10-26
申请号:US16808830
申请日:2020-03-04
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Rajagopalan Janakiraman , Kalyan Ghosh , Sapan Shah
IPC: H04L12/26 , H04L29/12 , H04L12/46 , H04L12/743
Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.
-
公开(公告)号:US20210258216A1
公开(公告)日:2021-08-19
申请号:US17244941
申请日:2021-04-29
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Sivakumar Ganapathy , Gianluca Mardente , Giovanni Meo , Patel Amitkumar Valjibhai
IPC: H04L12/24 , H04L12/46 , H04L12/751 , H04L12/715 , H04L12/721
Abstract: Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.
-
公开(公告)号:US20200382471A1
公开(公告)日:2020-12-03
申请号:US16426336
申请日:2019-05-30
Applicant: Cisco Technology, Inc.
Inventor: Rajagopalan Janakiraman , Sivakumar Ganapathy , Azeem Suleman , Mohammed Javed Asghar , Patel Amitkumar Valjibhai , Ronak K. Desai
IPC: H04L29/06 , H04L12/721 , H04L29/12 , H04L29/08 , H04L12/46
Abstract: Technologies for extending a subnet across on-premises and cloud-based deployments are provided. An example method may include creating a VPC in a cloud for hosting an endpoint being moved from an on-premises site. For the endpoint to retain its IP address, a subnet range assigned to the VPC, based on the smallest subnet mask allowed by the cloud, is selected to include the IP address of the endpoint. The IP addresses from the assigned subnet range corresponding to on-premises endpoints are configured as secondary IP addresses on a Layer 2 (L2) proxy router instantiated in the VPC. The L2 proxy router establishes a tunnel to a cloud overlay router and directs traffic destined to on-premises endpoints, with IP addresses in the VPC subnet range thereto for outbound transmission. The cloud overly router updates the secondary IP addresses on the L2 proxy router based on reachability information for the on-premises site.
-
-
-
-
-
-
-
-
-