G06F2209/542

Mirroring virtual network traffic

The disclosed system implements techniques to enable a tenant of a cloud-based platform to effectively and efficiently apply a policy that copies data packets communicated to or from a virtual machine in the tenant's own virtual network. When applied, the policy mirrors data traffic associated with a workload executing on a virtual machine in the tenant's virtual network. To mirror the data traffic, a copy of a data packet is streamed to another virtual machine so that network analytics can be performed (e.g., performance analytics, security analytics, etc.). In various examples, the policy can be a role-based mirroring policy that defines a plurality of roles in association with a role-based access model that scales operations and that provides improved security for a tenant's virtual network.

COMPUTING SYSTEM RESOURCE USAGE ACCOUNTING AND USAGE LIMIT ENFORCEMENT
20220083383 · 2022-03-17 · ·

Resource access control modules that are part of an operating system kernel and data structures visible in both user space and kernel space provide for user space-based configuration of computing system resource limits, accounting of resource usage, and enforcement of resource usage limits. Computing system resource limits can be set on an application, customer, or other basis, and usage limits can be placed on various system resources, such as files, ports, I/O devices, memory, and processing unit bandwidth. Resource usage accounting and resource limit enforcement can be implemented without the use of in-kernel control groups. The resource access control modules can be extended Berkeley Program Format (eBPF) Linux Security Module (LSM) programs linked to LSM hooks in the Linux operation system kernel.

Universal webhook connectivity via multi-step HTTP transformation
11271987 · 2022-03-08 · ·

A method for synchronization of a publishing web-application and subscriber web-applications is provided. The method includes (a) registering a hypertext transfer protocol (HTTP) message subscription associated with (i) an event that occurs on the publishing web-application and (ii) an HTTP message of the publishing web-application sent to the subscriber web-application at the event, (b) generating a transformed HTTP message using the HTTP message subscription which is created by (i) generating an extended web URL by augmenting a web URL associated with the HTTP message subscription with an HTTP method identifier, (ii) transforming a payload associated with the HTTP message from a format of the publishing web-application to a format of the subscriber web-application using payload mapping, and, (iii) augmenting the extended web URL by appending a variable with the payload, wherein the variable includes identifier information associated with a data entity.

Systems, methods, and apparatuses for local web components development within a cloud based computing environment

Resolving a dynamic request from a local web component rendered on a development server executing on a user client device. A cache is located in the user client device and is accessible to the development server. The development server receives a first request for information from the local web component via a web browser, intercepts the first request at a proxy override module and transmits the first request to a cloud computing service provider's server. The development server receives a response from the cloud computing service provider's server in reply to the first request, transmits the response from the development server to the local web component, stores in the cache the response received at the development server from the cloud computing service provider's server in reply to the first request for information. The development server receives a subsequent request for the information from the local web component via the web browser, accesses the response to the subsequent request from the cache, and transmits the response accessed from the cache to the local web component.

RPC CALL INTERCEPTION
20210328972 · 2021-10-21 ·

A service proxy is described herein. The service proxy is configured to act as an intermediary between a client and a service. The service proxy may observe communications, modify communications, log communications, or the like, particularly so as to enhance the security and reliability of the host device. In some implementations, the service proxy may cooperate with an operating system to take over a named port object. In some implementations, the service proxy may receive messages as an intermediary between the client and the server. In some implementations, the service proxy may attach to a shared memory to intercept communications. In some implementations, the service proxy may be injected into a client process to appear to be the client itself.

METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION
20210326166 · 2021-10-21 ·

A hypervisor virtual server system, including a plurality of virtual servers, a plurality of virtual disks that are read from and written to by the plurality of virtual servers, a physical disk, an I/O backend coupled with the physical disk and in communication with the plurality of virtual disks, which reads from and writes to the physical disk, a tapping driver in communication with the plurality of virtual servers, which intercepts I/O requests made by any one of said plurality of virtual servers to any one of said plurality of virtual disks, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted I/O write requests from the tapping driver, and that provides data services based thereon.

AUTOMATED ASSISTANT ARCHITECTURE FOR PRESERVING PRIVACY OF APPLICATION CONTENT
20210328949 · 2021-10-21 ·

Implementations set forth herein relate to an automated assistant that allows third party applications to inject dependencies to leverage automated assistant functions. Furthermore, enabling such dependency injections can allow third party applications to preserve privacy of any application content that is used during execution of automated assistant functions. In some implementations, a third party application can initialize a function with an assistant dependency using parameters that are tagged as private. Initializing a function in such as a way can allow private content communicated between the third party application and the automated assistant to be abstracted for security purposes. The abstracted content can thereafter be communicated to a remote server-such as a server hosting an extensively trained machine learning model. Intelligent output provided by the server can then be incorporated into one or more processes of the third party application without comprising security.

METHOD AND SERVICE TO ENCRYPT DATA STORED ON VOLUMES USED BY CONTAINERS
20210319114 · 2021-10-14 ·

A method and service to encrypt data at rest on disks that are managed by a container orchestrator (CO) using a container storage interface (CSI). The method and service including intercepting a request transferred from a CO to a CSI plugin and sending the intercepted request to an encryption proxy plugin. The method and service also including examining the request to determine if encryption is needed. In response to encryption being needed, performing encryption on the volume. The method and service also transferring the intercepted request to the container storage interface plugin

Real time multi-tenant workload tracking and auto throttling

Technologies are disclosed for real-time workload tracking and throttling within a multi-tenant service. Multi-tenant services receive requests from computing devices associated with different tenants. While processing requests, the multi-tenant service itself sends requests to an underlying resource, such as a database. Requests from computing device associated with an overactive tenant may cause the multi-tenant service to overwhelm the underlying resource. The overwhelmed underlying resource may not know which tenant a request received by the underlying resource is associated with, and so the underlying resource is unable to only throttle requests originating from computing devices associated with the overactive tenant. Instead, the underlying resource throttles all requests from the multi-tenant service. To avoid this result, the multi-tenant service tracks utilization of the underling resource associated with each tenant, and throttles requests received from overactive tenants before the underlying resource becomes overwhelmed and throttles all requests from the multi-tenant service.

System and method for controlling inter-application association through contextual policy control

A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.