OPTIMIZING CLUSTERED APPLICATIONS IN A CLUSTERED INFRASTRUCTURE

    公开(公告)号:WO2021034668A1

    公开(公告)日:2021-02-25

    申请号:PCT/US2020/046376

    申请日:2020-08-14

    Abstract: This disclosure describes techniques for providing virtual resources (e.g., containers, virtual machines, etc.) of a clustered application with information regarding a cluster of physical servers on which the distributed clustered application is running. A virtual resource that supports the clustered application is executed on a physical server of the cluster of physical servers. The virtual resource may receive an indication of a database instance (or other application) running on a particular physical server of the cluster of physical servers that is nearest the physical server. The database instance may be included in a group of database instances that are maintaining a common data set on respective physical servers of the group of physical servers. The virtual resource may then access the database instance on the particular physical server based at least in part on the database instance running on the particular server that is nearest the physical server.

    PEER DISCOVERY PROCESS FOR DISCONNECTED NODES IN A SOFTWARE DEFINED NETWORK

    公开(公告)号:WO2021021395A1

    公开(公告)日:2021-02-04

    申请号:PCT/US2020/041034

    申请日:2020-07-07

    Abstract: The present disclosure is directed to a peer node discovery process whereby a network management node can discover peers of inaccessible nodes that have lost connectivity to the network management node over the control plane and receive health report of the inaccessible nodes via the discovered peers. In one example, a method includes detecting a loss of connectivity to a network node; based on a type of the network node, performing one of a first process or a second process to obtain a health report of the network node, the first process and the second process including identification of at least one corresponding peer node from which the health report of the network node is to be received; and analyzing the health report to determine root cause of the loss of connectivity.

    SYSTEMS AND METHODS PROVIDING A MULTI-CLOUD MICROSERVICES GATEWAY USING A SIDECAR PROXY

    公开(公告)号:WO2020251828A1

    公开(公告)日:2020-12-17

    申请号:PCT/US2020/036072

    申请日:2020-06-04

    Abstract: A method includes, in a constellation of clients including a first client and a second client, receiving, at the first client, a connection request from the second client, retrieving endpoint reachability data associated with the second client and transmitting, to a server, a connection request based on the endpoint reachability data. The first client receives, from the server and based on the connection request, endpoint reachability information associated with the second client and starts a bidirectional connection with the second client. A direct or indirect tunnel is established between the first client and the second client. The tunnel is set up based on a table which maps a first connectivity option associated with the first client to a second connectivity option associated with the second client to determine whether to establish the direct tunnel or the indirect tunnel between the first client and the second client.

    APPLICATION-CENTRIC ENFORCEMENT FOR MULTI-TENANT WORKLOADS WITH MULTI SITE DATA CENTER FABRICS

    公开(公告)号:WO2020247331A1

    公开(公告)日:2020-12-10

    申请号:PCT/US2020/035638

    申请日:2020-06-02

    Abstract: The present disclosure provides for application-centric enforcement for multi- tenant workloads with multi-site data center fabrics by: receiving, at a local switch at a first site, a packet from a first host at the first site intended for a second host located at a second site; identifying class identifiers (ID) for the hosts; determining, based on the class IDs, a security policy for transmitting data between the hosts; in response to determining that the security policy indicates that the second site exclusively manages security policies for the hosts' network: setting a policy applied indicator on the packet indicating that enforcement of the security policy is delegated from the first switch to a second switch connected to the second host; including the class IDs in the packet; and transmitting the packet to the second site.

    ADAPTIVE NETWORK CONTROLS FOR IOT AND OTHER APPLICATIONS

    公开(公告)号:WO2020247252A1

    公开(公告)日:2020-12-10

    申请号:PCT/US2020/035064

    申请日:2020-05-29

    Abstract: Presented herein is a system, device and method that involve creating a policy model and policy rule structure for a policy enforcement point to support policies adapt to rapid changing external conditions in addition to traditional policies that are static. The system facilitates the use of attributes that are either or both dynamically (at run-time) created and/or defined as ephemeral. A new policy attribute may be created dynamically (at run-time). The policy attribute may be mapped as being static or ephemeral. The methodology further involves facilitating evaluation of an attribute as an atomic or programmed set of functions.

    FAILURE DETECTIONS IN POINT-TO-MULTIPOINT PACKET-FORWARDING NETWORKS

    公开(公告)号:WO2020247201A1

    公开(公告)日:2020-12-10

    申请号:PCT/US2020/034496

    申请日:2020-05-26

    Abstract: In one embodiment, a method includes identifying a number of target network apparatuses within a network to which a first network apparatus belongs, generating a first message including a reply-required indication and encoded identities for the plurality of target network apparatuses, sending the first message through the network, where the network is configured to deliver a copy of the first message to each of the target network apparatuses using a point-to-multipoint packet-forwarding architecture, receiving one or more second messages from one or more of the target network apparatuses, respectively, where each of the one or more second messages is generated as a reply to the first message by one of the one or more target network apparatuses, and identifying which of the plurality of target network apparatuses failed to respond to the first message based on the received one or more second messages.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES
    140.
    发明申请

    公开(公告)号:WO2020206106A1

    公开(公告)日:2020-10-08

    申请号:PCT/US2020/026367

    申请日:2020-04-02

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

Patent Agency Ranking