Runtime monitoring in intent-based networking

    公开(公告)号:US11159384B2

    公开(公告)日:2021-10-26

    申请号:US16398728

    申请日:2019-04-30

    Abstract: Described herein are methods, network devices, systems, and computer-readable media that provide a technical solution for runtime monitoring and visualization of intent-based network policies in a manner that bridges the gap between high-level insights from runtime and low-level network device configurations. A network topology and a plurality of network configurations can be received in an intent-based network and a number of monitoring spots available within the network topology for runtime monitoring of an intent-based network policy among a plurality of intent-based policies can be determined. A plurality of runtime constraints including one or more of time, resource capacity, and bandwidth demand can then be determined based on the network topology and the plurality of network configurations. Based on the plurality of runtime constraints, a runtime monitoring schedule that includes at least a flow, a monitoring spot assigned for runtime monitoring of the flow, and a runtime monitoring rule to be applied at the assigned monitoring spot can be generated and implemented.

    PROACTIVELY ACCOMODATING PREDICTED FUTURE SERVERLESS WORKLOADS USING A MACHINE LEARNING PREDICTION MODEL

    公开(公告)号:US20210184942A1

    公开(公告)日:2021-06-17

    申请号:US16931850

    申请日:2020-07-17

    Abstract: Example implementations relate to a proactive auto-scaling approach. According to an example, a machine-learning prediction model is trained to forecast future serverless workloads during a window of time for an application running in a public cloud based on past serverless workload information associated with the application by performing a training process. During the window of time, serverless workload information associated with the application is monitored. A future serverless workload is predicted for the application at a future time within the window, based on the machine learning prediction model. Prior to the future time, containers within the public cloud executing the application are pre-warmed to accommodate the predicted future serverless workload by issuing fake requests to the application to trigger auto-scaling functionality implemented by the public cloud.

    Network policy graphs
    54.
    发明授权

    公开(公告)号:US10992520B2

    公开(公告)日:2021-04-27

    申请号:US15500628

    申请日:2014-11-06

    Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.

    Multi-path transmission control protocol (MP-TCP) option tunneling for MP-TCP proxies

    公开(公告)号:US10965788B2

    公开(公告)日:2021-03-30

    申请号:US16357046

    申请日:2019-03-18

    Abstract: Various aspects of the subject technology relate to methods, systems, and machine-readable media for multi-path transmission control protocol (MP-TCP) proxy tunneling. The method includes reading a first multi-path transmission control protocol (MP-TCP) information from at least one first MP-TCP header, the at least one first MP-TCP header included in a first MP-TCP subflow, the first MP-TCP subflow included in a first MP-TCP session. The method also includes encapsulating the first MP-TCP information in a second MP-TCP session, the second MP-TCP session different from the first MP-TCP session. The method also includes sending the first MP-TCP information through the second MP-TCP session.

    MULTI-PATH TRANSMISSION CONTROL PROTOCOL (MP-TCP) OPTION TUNNELING FOR MP-TCP PROXIES

    公开(公告)号:US20200304606A1

    公开(公告)日:2020-09-24

    申请号:US16357046

    申请日:2019-03-18

    Abstract: Various aspects of the subject technology relate to methods, systems, and machine-readable media for multi-path transmission control protocol (MP-TCP) proxy tunneling. The method includes reading a first multi-path transmission control protocol (MP-TCP) information from at least one first MP-TCP header, the at least one first MP-TCP header included in a first MP-TCP subflow, the first MP-TCP subflow included in a first MP-TCP session. The method also includes encapsulating the first MP-TCP information in a second MP-TCP session, the second MP-TCP session different from the first MP-TCP session. The method also includes sending the first MP-TCP information through the second MP-TCP session.

    CONFIGURATION OPTIONS FOR CLOUD ENVIRONMENTS
    57.
    发明申请

    公开(公告)号:US20200244527A1

    公开(公告)日:2020-07-30

    申请号:US16261743

    申请日:2019-01-30

    Abstract: In some examples, a system receives input information for an application, the input information comprising a specification of a performance parameter relating to the application, and information of an arrangement of components of the application. The system generates, based on the input specification of the parameter and the information of the arrangement of components of the application, a plurality of configuration options representing respective different sets of resources, where a first set of resources of the different sets of resources includes resources of a plurality of cloud environments from different cloud providers. The system selects, based on a target goal, a configuration option of the plurality of configuration options, and output deployment information to cause deployment of the selected configuration option. The system adjusts an allocation of resources to the application responsive to performance metrics from a performance monitor that monitors performance of the application after the deployment.

    DETERMINING VIOLATION OF A NETWORK INVARIANT
    58.
    发明申请

    公开(公告)号:US20200186429A1

    公开(公告)日:2020-06-11

    申请号:US16721274

    申请日:2019-12-19

    Abstract: Example implementations relate to determining whether network invariants are violated by flow rules to be implemented by the data plane of a network. In an example, a verification module implemented on a device receives a flow rule transmitted from an SDN controller to a switch, the flow rule relating to an event. The module determines whether the flow rule matches any of a plurality of network invariants cached in the device. If determined that the flow rule matches one of the plurality of network invariants, the verification module determines whether the flow rule violates the matched network invariant. If determined that the flow rule does not match any of the plurality of network invariants, the verification module (1) reports the event associated with the flow rule to a policy management module, (2) receives a new network invariant related to the event from the policy management module, and (3) determines whether the flow rule violates the new network invariant. The verification module generates an alarm if determined that the flow rule violates any of the network invariants.

Patent Agency Ranking