Patent classifications
H04L41/0627
FAILURE DETECTION AND MITIGATION IN AN MC-LAG ENVIRONMENT
In an example, a failure event is detected in a network, where the failure event is indicative of a network outage in a network device or a peer network device of an MC-LAG. The network device and the peer network device may be configured as a first VTEP in an overlay network. It may be determined that reprovisioning of virtual tunnels in the network device is incomplete. State parameters between the network device and the peer network device is synchronized. The set of virtual tunnels in the network device is provisioned based on the state parameters. After completion of provisioning of the virtual tunnels, an IP address of the first VTEP is published to underlay network devices connecting the first VTEP to a second VTEP over an underlay network. Subsequently, communication links between the MC-LAG and a host device is enabled.
Automatic resolution of configuration inconsistencies
Techniques are described for automatically generating a consistent configuration state version 2 for a network device with no or minimal help from a user and/or from a provider of the network device when updating from a configuration state version 1 to the configuration state version 2. The techniques and architecture also provide for migration from configuration state version 1 to configuration state version 2 when at least some of a configuration state are located in text files that are applied to the network device at start-up of the network device.
Cloud service outage reporting
Various examples are directed to systems and methods for providing software services to one or more consumer systems. A cloud service provider system may receive a first outage message from a second cloud service provider system. The first outage message may describe a first outage of a first software service consumed by the first cloud service provider system and provided by the second cloud service provider system. The cloud service provider system may apply a set of outage inheritance rules to the first outage message and determine that the first outage is to be auto-reported. The cloud service provider system may render a revised first outage message and send the revised first outage message to a consumer system that receives a second software service provided by the cloud service provider system.
Dynamically managed data traffic workflows
Dynamic management of data traffic workflows is performed. An event to perform a data traffic workflow at a remote performance location may be received. Computing resources to perform the data traffic workflow may be identified. Operations to perform the data traffic workflow may be dynamically directed by the identified computing resources to adaptively balance performance of the operations with operations for other data traffic workflows in order to meet respective performance requirements of the data traffic workflows.
Recovery support apparatus, recovery support method and program
A recovery support apparatus includes an index value calculation means which calculates a predetermined index value with respect to a recovery work sequence on the basis of the recovery work sequence indicating a work procedure for recovery from an abnormality that has occurred in an apparatus group constituting a communication network, and an output means which outputs the index value calculated by the index value calculation means to a predetermined output destination.
METHOD AND SYSTEM FOR ANOMALY DETECTION BASED ON TIME SERIES
An anomaly detection method includes collecting and preprocessing time series data every preset detection cycle; detecting an anomaly in time series data preprocessed for a current detection cycle using a deep learning model trained with an unsupervised learning scheme using features of time series data of a previous detection cycle; retraining the deep learning model by further using the time series data preprocessed for at least one detection cycle included in the current learning cycle; and detecting an anomaly in time series data collected and preprocessed for a detection cycle after the current learning cycle using the retrained deep learning model.
INTELLIGENT INTERNET TRAFFIC ROUTING
A primary internet connection via a gateway or router located at a premises may be used to route internet traffic from devices located at the premises. A change in the primary internet connection, such as a loss or a degradation of the connection, may occur. Based on the change in the primary internet connection, metrics of alternative internet connections, such as cellular or hotspot connections, may be used to select one of the alternative internet connections. Internet traffic may be routed via the selected alternative internet connection until the primary internet connection is reestablished or improves.
Identity-based enforcement of network communication in serverless workloads
Systems and methods include implementing dynamic runtime code manipulation to modify application code associated with calls related to networking, with the calls implemented by application software executed as a serverless workload; intercepting the calls from the application software based on the modified application code; determining whether to permit the calls based on a set of policies; responsive to permitting a call, making the call to an operating system interface on behalf of the application software; and, responsive to not permitting the call, providing a failure notification to the application software.
Method and system for generating alerts using parameter based network monitoring for alert conditions
Provided are systems and methods for generating alerts in a computing environment. An example method may commence with receiving parameters associated with an alert. The parameters may include at least an alert condition and an action to be performed based on the alert condition. The method may further include monitoring at least a portion of a network data according to a predetermined schedule based on the parameters. The method may further include generating the alert upon detection of the alert condition.
NETWORK ADAPTIVE MONITORING
A system is disclosed for network management automation using network intent or adaptive monitoring automation. Network intent (NI) represents a network design and baseline configuration for that network or network devices with an ability to diagnose deviation from the baseline configuration. The NI can be automated to update and replicate the diagnosis. The monitoring of the network can be adapted to capture network problems in advance with adaptive monitoring automation.