IDENTIFYING COMPONENTS FOR REMOVAL IN A NETWORK CONFIGURATION

    公开(公告)号:US20220166673A1

    公开(公告)日:2022-05-26

    申请号:US17670036

    申请日:2022-02-11

    Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to determine a hit count for a concrete level rule implemented on a node and identify one or more components of a logical model, wherein each of the one or more components are associated with the concrete level rule. The network assurance appliance may attribute the hit count for the concrete level rule to each of the components of the logical model, determine a number of hardware level entries associated with the each of the one or more components, and generate a report comprising the one or more components of the logical model, the hit count attributed to each of the one or more components of the logical model, and the number of hardware level entries associated with the one or more components of the logical model.

    NETWORK NODE MEMORY UTILIZATION ANALYSIS
    12.
    发明申请

    公开(公告)号:US20200252297A1

    公开(公告)日:2020-08-06

    申请号:US16857843

    申请日:2020-04-24

    Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.

    Network node memory utilization analysis

    公开(公告)号:US10652102B2

    公开(公告)日:2020-05-12

    申请号:US15661912

    申请日:2017-07-27

    Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.

    CHECK-POINTING ACI NETWORK STATE AND RE-EXECUTION FROM A CHECK-POINTED STATE

    公开(公告)号:US20210092023A1

    公开(公告)日:2021-03-25

    申请号:US17112854

    申请日:2020-12-04

    Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.

    NETWORK ASSURANCE EVENT AGGREGATOR
    18.
    发明申请

    公开(公告)号:US20190081850A1

    公开(公告)日:2019-03-14

    申请号:US15703029

    申请日:2017-09-13

    Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.

    IDENTIFYING COMPONENTS FOR REMOVAL IN A NETWORK CONFIGURATION

    公开(公告)号:US20180367387A1

    公开(公告)日:2018-12-20

    申请号:US15661889

    申请日:2017-07-27

    Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to determine a hit count for a concrete level rule implemented on a node and identify one or more components of a logical model, wherein each of the one or more components are associated with the concrete level rule. The network assurance appliance may attribute the hit count for the concrete level rule to each of the components of the logical model, determine a number of hardware level entries associated with the each of the one or more components, and generate a report comprising the one or more components of the logical model, the hit count attributed to each of the one or more components of the logical model, and the number of hardware level entries associated with the one or more components of the logical model.

Patent Agency Ranking