APPLICATION PROGRAMMING INTERFACE (API) SECURITY

    公开(公告)号:US20240214348A1

    公开(公告)日:2024-06-27

    申请号:US18303359

    申请日:2023-04-19

    Applicant: NetApp, Inc.

    CPC classification number: H04L63/0236 G06F9/547 H04L63/1425

    Abstract: Systems and methods for enhancing API security by identifying anomalous activities in a cloud environment are provided. In one embodiment, the lack of awareness of an external API with respect to how calls to the external API may affect a cluster of a container orchestration platform is addressed. For instance, the views of the external and internal APIs may be combined to achieve better API security by correlating external API calls with undesirable behavior or other anomalies arising in the internal API. Responsive to identifying such undesirable behavior, information (e.g., a host, a source IP, a user, a specific payload) associated with the offending external API call may be added to a network security feature (e.g., a deny list, an IPS, or a WAF) utilized by the external API to facilitate performance of enhanced filtering of subsequent external API calls by the external API on behalf of the internal API.

    Session recovery mechanism
    712.
    发明授权

    公开(公告)号:US12021851B2

    公开(公告)日:2024-06-25

    申请号:US17517460

    申请日:2021-11-02

    Applicant: NetApp, Inc.

    CPC classification number: H04L63/0485 H04L63/061 H04L63/20 H04L67/148

    Abstract: A system is described. The system includes a processing resource and a non-transitory computer-readable medium, coupled to the processing resource, having stored therein instructions that when executed by the processing resource cause the processing resource to detect an unrecognized Internet Protocol Security (IPsec) packet associated with an IP address at a first node within a cluster, retrieve one or more selector fields from the IPsec packet, query of a security policy database to determine whether a destination IP address included in the one or more retrieved selector fields matches one or more matching outbound IPsec policies associated with a destination IP address, determine whether a matching outbound IPsec policy includes an IPsec policy associated with the destination address entry and establish the first IPsec SA communication session between the first node and the client based on the outbound IPsec policy.

    Methods and Systems for Protecting and Restoring Virtual Machines

    公开(公告)号:US20240193055A1

    公开(公告)日:2024-06-13

    申请号:US18112993

    申请日:2023-02-22

    Applicant: NETAPP, INC.

    CPC classification number: G06F11/1484 G06F11/1451 G06F11/1469

    Abstract: Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.

    FAST RESYNCHRONIZATION OF A MIRRORED AGGREGATE USING DISK-LEVEL CLONING

    公开(公告)号:US20240143215A1

    公开(公告)日:2024-05-02

    申请号:US18060367

    申请日:2022-11-30

    Applicant: NetApp, Inc.

    CPC classification number: G06F3/0646 G06F3/0604 G06F3/067

    Abstract: Systems and methods for performing a fast resynchronization of a mirrored aggregate of a distributed storage system using disk-level cloning are provided. According to one embodiment, responsive to a failure of a disk of a plex of the mirrored aggregate utilized by a high-availability (HA) pair of nodes of a distributed storage system, disk-level clones of the disks of the healthy plex may be created external to the distributed storage system and attached to the degraded HA partner node. After detection of the cloned disks by the degraded HA partner node, mirror protection may be efficiently re-established by assimilating the cloned disks within the failed plex and then resynchronizing the mirrored aggregate by performing a level-1 resync of the failed plex with the healthy plex based on a base file system snapshot of the healthy plex. In this manner, a more time-consuming level-0 resync may be avoided.

Patent Agency Ranking