Patent classifications
G06F2209/542
ARCHITECTURAL DESIGN FOR UNIVERSAL SOFTWARE AUTOMATION PIPELINES
The methods and systems described herein may provide an architecture design for high performance, language-agnostic software automation pipelines that provide software automation tasks, such as Continuous Integration/Continuous Delivery (CI/CD) tasks, for execution in a pipeline session that supports various technology stacks. The pipeline session may be configured in a manner that is customized to meet the requirements of the client project, such as the technology stack used by the client project. For example, the pipeline session may be configured through the use of a universal design that reduces duplication and proliferation of project-specific pipelines and configurations.
Adaptive application version integration support
An Application Programming Interface (API) call that is directed from a first application to a second application is intercepted. A first version number is identified for the first application and a second version number is identified for the second application. One or more transformations are processed on the API call to produce a compatible API call that is compatible with the second application. The compatible API call is provided to the second application for processing on behalf of the first application.
Event-level granular control in an event bus using event-level policies
A message-level policy implemented with for a message routing system may be used to mediate between a variety of message sources and message targets that receive and use messages. The message-level policy may allow fine grained message-by-message policy assessment that a message routing system policy may be able to provide. The message-level policy may furthermore interact with the message routing system policy to provide mechanisms to avoid accidental leakage of protected messages or spill-over to protected regions.
Detecting stack pivots using stack artifact verification
Examples of the present disclosure describe systems and methods for detecting and mitigating stack pivoting using stack artifact verification. In aspects, function hooks may be added to one or more functions. When a hooked function executes, artifacts relating to the hooked function may be left on the stack memory (“stack”). The location of the artifacts on the stack may be stored in a local storage area. Each time a hook in a hooked function is subsequently executed, protection may be executed to determine whether an artifact remains in the location stored in the local storage area. If the artifact is no longer in the same location, a stack pivot may be detected and one or more remedial actions may be automatically performed.
Synchronous replication for synchronous mirror copy guarantee
Techniques are provided for synchronous replication for synchronous mirror copy guarantee. A file system dependent technique for synchronous mirror copy guarantee is provided by overriding default behavior of a persistent fence so that the persistent fence is activated to block operations targeting a storage object having a synchronous replication relationship based upon the synchronous replication relationship being out of sync. The default behavior of the persistent fence is overridden to allow operations to be executed upon the storage object based upon the synchronous replication relationship being in sync. A file system independent technique for synchronous mirror copy guarantee is provided by intercepting operations before the operations are received by a file system. The operations are selectively forwarded to the file system or not based upon a state of a synchronous replication relationship.
SYSTEM AND METHOD FOR CONTROLLING INTER-APPLICATION ASSOCIATION THROUGH CONTEXTUAL POLICY CONTROL
A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.
SYNCHRONOUS REPLICATION FOR SYNCHRONOUS MIRROR COPY GUARANTEE
Techniques are provided for synchronous replication for synchronous mirror copy guarantee. A file system dependent technique for synchronous mirror copy guarantee is provided by overriding default behavior of a persistent fence so that the persistent fence is activated to block operations targeting a storage object having a synchronous replication relationship based upon the synchronous replication relationship being out of sync. The default behavior of the persistent fence is overridden to allow operations to be executed upon the storage object based upon the synchronous replication relationship being in sync. A file system independent technique for synchronous mirror copy guarantee is provided by intercepting operations before the operations are received by a file system. The operations are selectively forwarded to the file system or not based upon a state of a synchronous replication relationship.
NETWORKING-RELATED SYSTEM CALL INTERCEPTION AND MODIFICATION
Various embodiments of the present application set forth a computer-implemented method that includes intercepting a first system call from a client application, wherein the first system call comprises a first request to connect to a first destination using a first set of system call parameters; determining, based on the first destination, a second set of system call parameters; generating a second system call, wherein the second system call comprises a second request to connect to a target destination using the second set of system call parameters; and causing a connection to be established from the client application to the target destination based on the second system call.
Dependency analyzer in application dependency discovery, reporting, and management tool
Techniques for monitoring operating statuses of an application and its dependencies are provided. A monitoring application may collect and report the operating status of the monitored application and each dependency. Through use of existing monitoring interfaces, the monitoring application can collect operating status without requiring modification of the underlying monitored application or dependencies. The monitoring application may determine a problem service that is a root cause of an unhealthy state of the monitored application. Dependency analyzer and discovery crawler techniques may automatically configure and update the monitoring application. Machine learning techniques may be used to determine patterns of performance based on system state information associated with performance events and provide health reports relative to a baseline status of the monitored application. Also provided are techniques for testing a response of the monitored application through modifications to API calls. Such tests may be used to train the machine learning model.
Tiered application pattern
Systems and methods for providing a development application having a tiered application pattern. One system includes an electronic processor configured to, with a gateway layer, receive and route a request to an application layer. In response to receiving the request from the gateway layer, the electronic processor is also configured to, with the application layer, perform application functionality corresponding to a function associated with the request. The application functionality includes generating an application event. The electronic processor is configured to receive, with an event stream layer, the application event from the application layer. The electronic processor is configured to, with the data processing layer, access the application event and process the application event. The electronic processor is configured to transmit, with the data processing layer, the processed application event to a data storage layer.