Abstract:
The present application discloses a method, system, and computer system for managing a data in a storage system. The method includes receiving a first transaction that modifies or deletes first data stored in a storage system, determining that the first data is subject to an intervening re-arrangement transaction, and in response to determining that the first data is subject to the intervening re-arrangement transaction, rolling back the re-arrangement transaction at least with respect to the first data and committing the first transaction.
Abstract:
An example method according to some embodiments includes receiving flow data for a packet traversing a network. The method continues by determining a source endpoint group and a destination endpoint group for the packet. The method continues by determining that a policy was utilized, the policy being applicable to the endpoint group. Finally, the method includes updating utilization data for the policy based on the flow data.
Abstract:
A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.
Abstract:
An example method according to some embodiments includes receiving flow data for a packet traversing a network. The method continues by determining a source endpoint group and a destination endpoint group for the packet. The method continues by determining that a policy was utilized, the policy being applicable to the endpoint group. Finally, the method includes updating utilization data for the policy based on the flow data.
Abstract:
A computerized method is disclosed for storing data using a persistent queue. The computerized method includes operations of obtaining machine data from a remote electronic device, providing the machine data to a persistent queue component, wherein the persistent queue component organizes the machine data for storage on a first data store and storing a copy of the organized machine data in the first data store, and responsive to completion of the storing of the copy of the organized machine data. Further operations include transmitting an acknowledgement communication to the remote electronic device indicating storage of the copy of the machine data in the first data store, processing the machine data for storage, and responsive to completion of the storing of the processed machine data in a second data store, deleting the copy of the machine data from the first data store. The persistent queue component may include a socket server.
Abstract:
The present disclosure relates to a method and/or apparatus for versioning cloud network configuration. The method can include receiving base configuration files for a set of devices forming at least a portion of a computing network, pulling current configuration files from each device of the set of devices, for each device, and determining a discrepancy when a base configuration file of the device and a current configuration file of the device do not match. When the discrepancy is determined for a device, generating a patch file based on the determined discrepancy for that device. The method can include extracting a last configuration commit time from that device, allocating a unique snapshot identifier to the patch file and associated with the last configuration commit time, and populating a snapshot database.
Abstract:
Embodiments of the invention are directed to a system, method, or computer program product for a medical diagnostic platform. The system accesses data collected on one or more source server systems and selectively extracts user information according to the desired criteria of an operator or user. The system generates a secure, user database, wherein the user database comprises the selectively extracted user information, such as medical, financial, and demographic information, from multiple source server systems creating a centralized database of user information stored in a single location. The system further generates a medical diagnostic analysis of the user in comparison to similar users and displays recommended and extrapolated results for diagnoses, procedures, treatments, and costs for the user based on the history of the similar users.
Abstract:
Store data chunks associated with data objects to data store files. Determine for each of the data store files reference counts for each of the data chunks indicating number of data objects associated with respective data chunks. Move data chunks to one of the data store files based on whether respective reference counts of respective data chunks exceeds a threshold.
Abstract:
Provided are systems and methods for garbage collection of objects in storage. An example method may include providing a monotonically increasing logical clock. Each object is associated with a first number and a second number. The second number is a minimum of the first numbers of objects in a subtree to which the object refers. When the logical clock increases, objects with the first number less than the logical clock from the storage are deleted. When a new object is added to the storage, the first number of the new object is set to a new first number. The new first number is equal to or greater than the logical clock. The first number of each object in a subtree to which the new object is referring is updated. The updated first number is a function of a previous first number and a previous logical clock.
Abstract:
This disclosure generally relates to a method and system for generating a communication graph of a network using an application dependency mapping (ADM) pipeline. In one aspect of the disclosure, the method comprises receiving network data (e.g., flow data and process information at each node) from a plurality of sensors associated with a plurality of nodes of the network, determining a plurality of vectors and an initial graph of the plurality of nodes based upon the network data, determining similarities between the plurality of vectors, clustering the plurality of vectors into a plurality of clustered vectors based upon the similarities between the plurality of vectors, and generating a communication graph of the network system based upon the plurality of clustered vectors.