SYSTEM AND METHOD FOR SELF-HEALING OF APPLICATION CENTRIC INFRASTRUCTURE FABRIC MEMORY

    公开(公告)号:US20190026176A1

    公开(公告)日:2019-01-24

    申请号:US15654906

    申请日:2017-07-20

    Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.

    Seamless multi-cloud routing and policy interconnectivity

    公开(公告)号:US11582100B2

    公开(公告)日:2023-02-14

    申请号:US17719792

    申请日:2022-04-13

    Abstract: Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.

    SERVICE CHAINING IN MULTI-FABRIC CLOUD NETWORKS

    公开(公告)号:US20210266256A1

    公开(公告)日:2021-08-26

    申请号:US16801500

    申请日:2020-02-26

    Abstract: Techniques for routing data packets through service chains within and between public cloud networks of multi-cloud fabrics. A router in a network, e.g., a public cloud network, receives data packets from nodes in the network through segments of the network. Based at least in part on (i) a source address of the data packet, (ii) a destination address of the data packet, and (iii) an identity of the segments of the network from which the data packets are received, the router determines a next node in the network to which the data packet is to be forwarded. The router may then forward the data packet through another segment of the network to the next node and then receive the data packet from the next node through the another segment.

    System Level Memory Leak Detection
    5.
    发明申请
    System Level Memory Leak Detection 有权
    系统级内存泄漏检测

    公开(公告)号:US20150234700A1

    公开(公告)日:2015-08-20

    申请号:US14184150

    申请日:2014-02-19

    Abstract: A method for detecting memory leaks with an administrative client begins by transmitting to all of the processes running on at least one computing device, a first command to return memory track information. The administrative client receives memory track information from each of the processes, and combines them into a first system wide memory allocation. The administrative client transmits an instruction to run a test case process, and then transmits, to each of the processes, a second command to return memory track information. The administrative client receives the second set of memory track information and combines it to generate a second system wide memory allocation. To generate a list of potential memory leaks originating from the test case process, the administrative client compares the first system wide memory allocation with the second system wide memory allocation.

    Abstract translation: 用于通过向至少一个计算设备上运行的所有进程发送用于检测与管理客户端的内存泄漏的方法,开始返回内存轨道信息的第一命令。 管理客户端从每个进程接收内存轨道信息,并将它们组合成第一系统范围的内存分配。 管理客户端发送运行测试用例处理的指令,然后向每个处理发送用于返回存储器轨道信息的第二命令。 管理客户机接收第二组存储器轨迹信息并将其组合以产生第二系统宽的存储器分配。 为了生成来自测试用例过程的潜在的内存泄漏的列表,管理客户机将第一系统宽的存储器分配与第二系统宽的存储器分配进行比较。

    ON-DEMAND AND SCALABLE TUNNEL MANAGEMENT IN A MULTI-CLOUD AND ON-PREMISES ENVIRONMENT

    公开(公告)号:US20220385498A1

    公开(公告)日:2022-12-01

    申请号:US17335887

    申请日:2021-06-01

    Abstract: Techniques are described for dynamically establishing and scaling IPSec tunnels to connect hundreds of sites of a network by making use of the user intent of connecting certain applications for applying security policies and translating it dynamically based on the location and needs of the workloads to set up the network on demand. The techniques involve a tight loop between the network controller of a site (e.g., a cloud Application Policy Infrastructure Controller) and the inter-site or multi-cloud inter-connect controller, stitched through services that enable security and network automation at scale. In particular, to control the number of IPSec tunnels, IPSec tunnels are established only when required. Additionally, IPSec tunnels may be eliminated when no longer required. Thus, resources of a network may be used in a measured way that is necessary and sufficient to meet network traffic demand.

    System and method for providing scalable flow monitoring in a data center fabric

    公开(公告)号:US11159412B2

    公开(公告)日:2021-10-26

    申请号:US16808830

    申请日:2020-03-04

    Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.

    SEAMLESS MULTI-CLOUD ROUTING AND POLICY INTERCONNECTIVITY

    公开(公告)号:US20210258216A1

    公开(公告)日:2021-08-19

    申请号:US17244941

    申请日:2021-04-29

    Abstract: Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.

    LAYER 2 MOBILITY FOR HYBRID MULTI-CLOUD DEPLOYMENTS WITHOUT HOST-OVERLAY

    公开(公告)号:US20200382471A1

    公开(公告)日:2020-12-03

    申请号:US16426336

    申请日:2019-05-30

    Abstract: Technologies for extending a subnet across on-premises and cloud-based deployments are provided. An example method may include creating a VPC in a cloud for hosting an endpoint being moved from an on-premises site. For the endpoint to retain its IP address, a subnet range assigned to the VPC, based on the smallest subnet mask allowed by the cloud, is selected to include the IP address of the endpoint. The IP addresses from the assigned subnet range corresponding to on-premises endpoints are configured as secondary IP addresses on a Layer 2 (L2) proxy router instantiated in the VPC. The L2 proxy router establishes a tunnel to a cloud overlay router and directs traffic destined to on-premises endpoints, with IP addresses in the VPC subnet range thereto for outbound transmission. The cloud overly router updates the secondary IP addresses on the L2 proxy router based on reachability information for the on-premises site.

Patent Agency Ranking