Self-Correcting Service Level Agreement Enforcer

    公开(公告)号:US20240179076A1

    公开(公告)日:2024-05-30

    申请号:US18472111

    申请日:2023-09-21

    CPC classification number: H04L41/5009 H04L43/0811 H04L43/0888

    Abstract: Example systems, methods, and storage media are described. An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to obtain telemetry data. The instructions cause the network system to determine, based on the telemetry data, that an application running on server processing circuitry does not meet at least one service level agreement (SLA) requirement, the server processing circuitry not including processing circuitry resident on a network interface card (NIC). The instructions cause the network system to, based on the application not meeting the at least one SLA requirement, determine to offload at least one component of the application from the server processing circuitry to the processing circuitry resident on the NIC.

    SELF LEARNING FIREWALL POLICY ENFORCER
    3.
    发明公开

    公开(公告)号:US20240179158A1

    公开(公告)日:2024-05-30

    申请号:US18472092

    申请日:2023-09-21

    CPC classification number: H04L63/1416 G06N5/022 G06N20/20

    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to obtain first traffic session metrics data and execute a machine learning model to determine a traffic prediction based on the first traffic session metrics data. The instructions cause the network system to obtain second traffic session metrics data and determine an anomaly in traffic based on a comparison of the traffic prediction and the second traffic session metrics data. The instructions cause the network system to, based on the determination of the anomaly, generate an indication of the anomaly.

    Framework for automated application-to-network root cause analysis

    公开(公告)号:US12199813B2

    公开(公告)日:2025-01-14

    申请号:US18345422

    申请日:2023-06-30

    Abstract: A computing system comprising a memory and processing circuitry may perform the techniques. The memory may store time series data comprising measurements of one or more performance indicators. The processing circuitry may determine, based on the time series data, an anomaly in the performance of the network system, and create, based on the time series data, a knowledge graph. The processing circuitry may determine, in response to detecting the anomaly, and based on the knowledge graph and a machine learning (ML) model trained with previous time series data, a causality graph. The processing circuitry may determine a weighting for each edge in the causality graph, determine, based on the edges in the causality graph, a candidate root cause associated with the anomalies, and determine a ranking of the candidate root cause based on the weighting. The analysis framework system may output at least a portion of the ranking.

    INTELLIGENT FIREWALL POLICY PROCESSOR
    5.
    发明公开

    公开(公告)号:US20240179124A1

    公开(公告)日:2024-05-30

    申请号:US18472050

    申请日:2023-09-21

    CPC classification number: H04L63/0245 H04L41/16

    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which cause the system to obtain telemetry data, the telemetry data being associated with a plurality of applications running on a plurality of hosts. The instructions cause the system to, based on the telemetry data, determine a subset of applications of the plurality of applications that run on a first host of the plurality of hosts. The instructions cause the system to determine a subset of firewall policies of a plurality of firewall polices, each of the subset of firewall policies applying to at least one respective application of the subset of applications. The instructions cause the system to generate an indication of the subset of firewall policies and send the indication to a management plane of a distributed firewall.

    SELF-LEARNING EGRESS TRAFFIC CONTROLLER
    6.
    发明公开

    公开(公告)号:US20240179074A1

    公开(公告)日:2024-05-30

    申请号:US18472059

    申请日:2023-09-21

    CPC classification number: H04L41/16 H04L41/14

    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to receive connection data related to an egress connection of an application service of an application. The instructions cause the network system to analyze the connection data to determine that the egress connection is an anomalous connection. The instructions cause the network system to generate a notification indicative of the egress connection being an anomalous connection and send the notification to a computing device.

    DISTRIBUTED APPLICATION CALL PATH PERFORMANCE ANALYSIS

    公开(公告)号:US20250112851A1

    公开(公告)日:2025-04-03

    申请号:US18478260

    申请日:2023-09-29

    Abstract: In general, techniques are described for managing a distributed application based on call paths among the multiple services of the distributed application that traverse underlying network infrastructure. In an example, a method comprises determining, by a computing system, and for a distributed application implemented with a plurality of services, a call path from an entry endpoint service of the plurality of services to a terminating endpoint service of the plurality of services; determining, by the computing system, a corresponding network path for each pair of adjacent services from a plurality of pairs of services that communicate for the call path; and based on a performance indicator for a network device of the corresponding network path meeting a threshold, performing, by the computing system, one or more of: reconfiguring the network; or redeploying one of the plurality of services to a different compute node of the compute nodes.

    Intelligent firewall policy processor

    公开(公告)号:US12267300B2

    公开(公告)日:2025-04-01

    申请号:US18472050

    申请日:2023-09-21

    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which cause the system to obtain telemetry data, the telemetry data being associated with a plurality of applications running on a plurality of hosts. The instructions cause the system to, based on the telemetry data, determine a subset of applications of the plurality of applications that run on a first host of the plurality of hosts. The instructions cause the system to determine a subset of firewall policies of a plurality of firewall polices, each of the subset of firewall policies applying to at least one respective application of the subset of applications. The instructions cause the system to generate an indication of the subset of firewall policies and send the indication to a management plane of a distributed firewall.

    Self-correcting service level agreement enforcer

    公开(公告)号:US12238069B2

    公开(公告)日:2025-02-25

    申请号:US18472111

    申请日:2023-09-21

    Abstract: Example systems, methods, and storage media are described. An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to obtain telemetry data. The instructions cause the network system to determine, based on the telemetry data, that an application running on server processing circuitry does not meet at least one service level agreement (SLA) requirement, the server processing circuitry not including processing circuitry resident on a network interface card (NIC). The instructions cause the network system to, based on the application not meeting the at least one SLA requirement, determine to offload at least one component of the application from the server processing circuitry to the processing circuitry resident on the NIC.

    Intelligent Firewall Flow Processor
    10.
    发明公开

    公开(公告)号:US20240179121A1

    公开(公告)日:2024-05-30

    申请号:US18472123

    申请日:2023-09-21

    CPC classification number: H04L63/0236 H04L41/16

    Abstract: Example systems, methods, and storage media are described. An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to obtain telemetry data, the telemetry data including flow processing data associated with a plurality of flows. The instructions cause the network system to rank the plurality of flows indicated by the telemetry data according to importance. The instructions cause the network system to send information indicative of a respective rank of at least one of the plurality of flows to at least one of a controller or a network interface card (NIC), the NIC comprising NIC processing circuitry.

Patent Agency Ranking