VIRTUAL NETWORK DISTRIBUTED DENIAL-OF-SERVICE SCRUBBER
Granted: June 27, 2024
Application Number:
20240214416
A novel overlay network DDOS mitigation system (ONDMS) is described for performing DDOS attack mitigation in a virtual network environment. Network traffic received by network resources in overlay networks is monitored. When a potential DDOS attack is detected, ONDMS may initiate a protected mode for a network resource. This may involve creating one or more shadow VNICs for the network resource being protected. While in protected mode, as a result of the one or more shadow VNICs, packets…
TECHNIQUES FOR MANAGING REQUESTS IN A MULTI-TENANT ENVIRONMENT
Granted: June 27, 2024
Application Number:
20240214380
A method may include receiving a request to access a cloud resource associated with a user from a service component in an application container. The method may include determining a proxy service running in the application container and transmitting the request to the proxy service. The method may include generating, a proxy authentication including information identifying a private endpoint and transmitting, by the proxy service, the request and the proxy authentication to an egress…
AUTOMATED COMPATIBILITY ASSESSMENT AND MIGRATION ASSET SHAPE GENERATION
Granted: June 27, 2024
Application Number:
20240212019
Techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code, or instructions executable by one or more processors) herein for automated compatibility assessment and migration asset shape generation. A method can include receiving replication strategy from a user, receiving metadata of a source asset collected via a virtual agent located in a source environment, applying rules for shape recommendation based on the replication strategy received…
Visualization Tool For Building Nested Queries
Granted: June 27, 2024
Application Number:
20240211472
Techniques for generating an interactive visualization tool for building nested queries are disclosed. The interactive nested query visualization tool allows a user to observe, analyze, and modify query characteristics and attributes of a set of nested queries. A system displays an interactive visual depiction of a set of nested queries. Visual representations of the nested queries are positioned relative to each other based on the relationships between the nested queries. The system…
TECHNIQUES FOR PERFORMING FAULT TOLERANCE VALIDATION FOR A DATA CENTER
Granted: June 27, 2024
Application Number:
20240211327
Techniques are described for deploying a fault tolerant data center by determining that the physical infrastructure deployment of the data center meets the fault tolerance levels and the fault domains specified for the data center. Techniques are described for obtaining configuration information related to various infrastructure resources deployed in a data center. A resource graph for the data center is generated based on the configuration information. The resource graph represents a…
DISCOVERY AND INVENTORY CONTROL FOR REMOTE RESOURCE INTEGRATION WITH CLOUD SERVICES
Granted: June 27, 2024
Application Number:
20240211319
Techniques are disclosed herein for extending a cloud service's reach into on- or off-premises environments and other cloud platforms to enable migration and multi-cloud use cases. In one aspect, a computer-implemented method is provided that includes deploying a remote agent appliance with a discovery plugin in an external environment of a use. creating an asset source specifying a location of the external environment from which external assets and associated asset metadata should be…
SHUTDOWN OF PREEMPTIBLE NODES ON MANAGED CLUSTERS
Granted: June 20, 2024
Application Number:
20240202008
Conventional techniques for shutting down preempted nodes includes drawbacks to cloud users and service providers alike. The disclosed techniques are directed to mitigating or eliminating these drawbacks. Upon receiving a preemptible node request, a preemptible node may be generated, labeled as having a particular capacity type, and added to a cluster managed by a cluster manager. In response to detecting the label, the cluster manager may deploy a containerized application to the…
DISCOVERY OF SOURCE RANGE PARTITIONING INFORMATION IN DATA EXTRACT JOB
Granted: June 20, 2024
Application Number:
20240202210
Techniques are described for the discovery of source range partitioning information. An example method includes a device determining a partition boundary value for the data based at least in part on the following steps. The device can determine a first plurality of bounded value sets and a second plurality of bounded value sets. The device can calculate a first average value of a first value and a second average value. The device can determine a first deviation value of the first average…
TECHNIQUES FOR IN-MEMORY STITCHING
Granted: June 20, 2024
Application Number:
20240202199
Event processing techniques for updating a database in real time based on events in a continuous event stream are disclosed. The techniques can update the database to incorporate information from thousands of received events per second. The events can include metrics measuring milestones for an organizational process defined by a user. Moreover, multiple streams can include metrics from many tenants concurrently. The techniques include receiving a plurality of events corresponding to a…
DATA MIGRATION USING COUNTER HASHING
Granted: June 20, 2024
Application Number:
20240202161
Techniques described herein are directed toward a counter hash generation scheme. One embodiment includes a method for counter hash generation. The method includes a device receiving an instruction to transmit an artifact from a source system to a target system, the artifact comprising a plurality of blocks. The device receives a block from the source system. The device generates an initialization vector based at least in part on the artifact. The device generates a nonce based at least…
CONTAINER ORCHESTRATION FRAMEWORK AWARE PORT SCANNING
Granted: June 13, 2024
Application Number:
20240195829
A scanner service can be configured to scan one or more nodes associated with a container management service. The container management service can be configured to manage a set of services by allocating managed containers associated with the set of services to the one or more nodes. The scanner service can be configured to identify vulnerabilities of processes running on the one or more nodes. The vulnerabilities can be attributed to the containers and/or the associated services rather…
SECURE BI-DIRECTIONAL NETWORK CONNECTIVITY SYSTEM BETWEEN PRIVATE NETWORKS
Granted: June 13, 2024
Application Number:
20240195681
A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud. The SNCS provides secure private bi-directional network connectivity between external resources residing in a customer's external site representation and resources and services residing in the…
RUNTIME APPLICATION SELF-PROTECTION
Granted: June 13, 2024
Application Number:
20240193291
A method may include collecting, by a software agent connected to a target application, a set of observations of executing the target application while in a logging mode. The set of observations identifies instances of operations of the target application. The method may also include transmitting the set of observations to a security service, and receiving an allow list and a confidence estimator model from the security service. The security service generalizes the operations into…
SYSTEMS AND METHODS FOR CREATING AN EXTENDED SMART CARD APPLICATION FILE FROM MULTIPLE SMART CARD APPLICATION FILES
Granted: June 13, 2024
Application Number:
20240192936
Techniques are described herein for merging multiple smart card application files into a single, consolidated file that may be used by a smart card runtime environment to execute multiple applications. The techniques may reduce the load size of installed application code on a smart card by bundling applications and libraries together into an optimized file. As a result, smart card platforms may have more space available to execute the applications at runtime and/or to install additional…
Zone Segment Drive Management
Granted: June 13, 2024
Application Number:
20240192876
Techniques for management of data storage in distributed storage systems are provided. A method may include receiving, by a computer system, a request to write data to a volume. The method may include identifying, by the computer system, a zone segment mapped to the volume. The zone segment may include a plurality of zones. The method may include identifying, by the computer system, a segment pointer indicating a write location in a zone of the zone segment. The method may include…
TECHNIQUES FOR DISTRIBUTED INTERFACE COMPONENT GENERATION
Granted: June 6, 2024
Application Number:
20240187501
Techniques are disclosed for efficient generation and maintenance of interface components in an infrastructure-as-a-service (IaaS) environment. A component facilitation system may receive a first request to display a component dashboard and generate declarative metadata for component generation, at least a portion of the declarative metadata corresponding to one or more visual components to be displayed on an interface. The component facilitation system may transmit the declarative…
Centralized Approach For Managing Cross-Service Data Of Cloud Resources
Granted: June 6, 2024
Application Number:
20240187478
Techniques for managing network-accessible infrastructure metadata are provided. A method includes receiving a resource request comprising resource metadata corresponding to a network-accessible infrastructure resource, determining whether to commit the resource request based at least in part on a constraint associated with the network-accessible infrastructure resource, and, in accordance with a determination to commit the resource request: generating, by the computer system, a resource…
SECURED BOOTSTRAP WITH DYNAMIC AUTHORIZATION
Granted: June 6, 2024
Application Number:
20240187232
In some implementations, the techniques may include receiving a request to launch a first instance in a customer partition. The request can identify one or more of a cluster and an instance image. In addition, the techniques may include launching the first instance on a server in the customer partition using the instance image identified by the request. The techniques may include receiving a request to authenticate the first instance. Moreover, the techniques may include in response to a…
Augmented Training Set Or Test Set For Improved Classification Model Robustness
Granted: June 6, 2024
Application Number:
20240184998
A target set of texts, for training and/or evaluating a text classification model, is augmented using insertions into a base text within the original target set. In an embodiment, an expanded text, including the base text and an insertion word, must satisfy one or more inclusion criteria in order to be added to the target set. The inclusion criteria may require that the expanded text constitutes a successful attack on the classification model, the expanded text has a satisfactory…
Cross-Platform Resource Optimization
Granted: May 30, 2024
Application Number:
20240177191
Techniques for determining recommended allocations of resources among different platforms that sell a common type of inventory. Determining the allocations can include obtaining parameters of a campaign from a client. Determining the allocations can include combining current campaign parameters and scoring with historical campaign performance data to create recommendations for dividing resources among different media platforms.