Patent classifications
H04L41/0695
Determining readiness for switchover operations for network devices
Embodiments of the present disclosure include systems and methods for determining readiness for switchover operations for network devices. A policy definition specifying a set of criteria and a set of instructions is received. Based on the set of instructions, a first supervisor module is determined whether it is ready for a switchover operation based on the set of criteria. The switchover operation includes a second supervisor module configured as a backup to the first supervisor module taking over for the first supervisor module. A set of conditions are determined whether they are satisfied. When the set of conditions are determined to be satisfied and the first supervisor module is determined to be ready for the switchover operation, the switchover operation is triggered to cause the second supervisor module to take over for the first supervisor module.
DYNAMIC CUSTOMIZATION OF NETWORK CONTROLLER DATA PATH BASED ON CONTROLLER INTERNAL STATE AWARENESS
Techniques for a network controller to manage its data path dynamically in a data network. The techniques include causing the network controller to enter a first state, wherein the first state is associated with first processing rules for processing usage data. The network controller receives first usage data from one or more network devices associated with the data network, processes the first usage data according to the first processing rules. Further, the network controller may detect an event associated with transitioning the network controller to a second state, which cause the network controller to transition from the first state into a second state, wherein the second state is associated with second processing rules for processing the usage data. Moreover, the network controller receives second usage data from the one or more network devices, and processes the second usage data according to the second processing rules.
DETECTING SOURCES OF COMPUTER NETWORK FAILURES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting sources of computer network failures. One of the methods includes identifying a network flow in a computer network between a source and a destination; performing a first probe to determine whether there is end-to-end connectivity between the source and the destination; in response to determining that there is no end-to-end connectivity between the host and the destination, performing one or more additional probes including a second probe to determine whether each hop in the path of the network flow between the source and the destination is operational including requesting that the source transmit a respective first trace diagnostic packet to each hop in the path of the network flow; and determining whether at least one link of the computer network that is part of the path of the network flow has failed based on the results.
Proactive operations platform
A proactive operations (ProOps) platform is contemplated to facilitate processing data for purposes of turning included information into action, such as to enable operators to proactively manage network operations using information derived from mathematical analysis of raw data collected from network devices.
SYSTEM AND APPROACH FOR REMOTE ROOM CONTROLLER AND DEVICE DIAGNOSTICS AND HEALTH MONITORING
The disclosure reveals a system and approach for remote health monitoring and diagnostics of room controllers, networks and devices. A master room controller may be used to open a system health page or a diagnostic page for other controllers. A system health page may provide an overview of virtually all of the other room controllers. A tool of the present system may be used to trouble shoot issues remotely at another room controller in lieu of doing a visit to the respective room controller. A user may navigate from the system health page to virtually any place on the room controller to diagnose issues. The navigation may be done by hyper linking from the system health page. The healthy controllers may be hidden from the page so that the unhealthy systems can be viewed in one shot.
REMEDIATING FALSE POSITIVES OF INTRUSION DETECTION SYSTEMS WITH GUEST INTROSPECTION
The disclosure provides an approach for remediating false positives for a network security monitoring component. Embodiments include receiving an alert related to network security for a virtual computing instance (VCI). Embodiments include collecting, in response to receiving the alert, context information from the VCI. Embodiments include providing a notification to a management plane based on the alert and the context information. Embodiments include receiving, from the management plane, in response to the notification, an indication of whether the alert is a false positive. Embodiments include training a model based on the alert, the context information, and the indication to determine whether a given alert is a false positive.
METHOD AND MANAGING APPARATUS FOR PROCESSING SERVER ANOMALIES
The present disclosure provides a method and a managing apparatus for processing server anomalies. The method includes: acquiring, by a managing apparatus, operation information of each server; if the managing apparatus determines that a first server has an anomaly according to the operation information of each server, determining, by the managing apparatus, a target processing method according to the operation information of the first server and a preset correspondence between the operation information of anomalies and processing methods; and generating, by the managing apparatus, a processing instruction according to the target processing method, and sending, by the managing apparatus, the processing instruction to the first server, such that the first server executes the processing instruction and processes using the target processing method. In the present disclosure, the managing apparatus can automatically complete the server anomaly detection according to the operation information of servers, and servers can also execute the processing instructions according to the received processing instructions to complete anomaly processing. Further, passive waiting for manual processing can be substituted by active automatic analysis and processing, thereby to reduce server anomaly processing time and improve the stability of service quality.
TESTING FRAMEWORK FOR ADAPTIVE VIRTUAL SERVICES
Examples of the present disclosure describe a testing framework for adaptive virtual services. In an example, a function vendor provides a network function having stated specifications to a service provider. A derived signature is generated for the network function (e.g., based on associated metadata, an image associated with the network function, and/or a network signature for the network function), which is used to classify the network function. The testing framework is used to test the network function according to its classification, thereby determining a set of capabilities. In examples, a network function having the same or similar signature as a previously tested network function may be categorized according to the previously tested network function. The network function is categorized according to its determined capabilities and added to an inventory of network functions for the service provider. Network functions in the inventory can then be selected to form a computer network.
TESTING FRAMEWORK FOR ADAPTIVE VIRTUAL SERVICES
Examples of the present disclosure describe a testing framework for adaptive virtual services. In an example, a function vendor provides a network function having stated specifications to a service provider. A derived signature is generated for the network function (e.g., based on associated metadata, an image associated with the network function, and/or a network signature for the network function), which is used to classify the network function. The testing framework is used to test the network function according to its classification, thereby determining a set of capabilities. In examples, a network function having the same or similar signature as a previously tested network function may be categorized according to the previously tested network function. The network function is categorized according to its determined capabilities and added to an inventory of network functions for the service provider. Network functions in the inventory can then be selected to form a computer network.
PATH SIGNATURES FOR DATA FLOWS
This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first value. The method further includes generating a second value by inputting the first value and one or more node details into a hash function. The method includes replacing the first value with the second value in the packet. The packet including the second value is forwarded by the node.