白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Recovery from failure in a dynamic scalable services mesh

專利號
US10868845B2
公開日期
2020-12-15
申請人
Netskope, Inc.(US CA Santa Clara)
發(fā)明人
Ravi Ithal; Umesh Bangalore Muniyappa
IPC分類
H04L29/06; H04L29/08; H04L29/12; H04L12/26
技術(shù)領(lǐng)域
service,pod,netskope,services,packet,security,in,cloud,pods,casb
地域: CA CA Santa Clara

摘要

The technology discloses a method of improved recovery from failure of a service instance in a service chain. Instances AA, BA and BB perform services A and B respectively. Instance BA receives from instance AA a first packet that includes an added header with a stream affinity code consistent for packets in the stream. Instance BA with a primary role specified in a distributed service map processes the packet. BA identifies BB as having a secondary role for packets carrying the code and synchronizes BA state information with BB after processing the packet. After failure of instance BA, instance AA receives an updated service map prepares to forward a second packet, with the same code as the first packet, to BA. After determining from the updated map that BA is no longer available and instance BB has the secondary role, AA forwards the second packet to BB, instead of BA.

說明書

Organizations want to utilize a single security service that can apply security services to all customer traffic, expanding beyond cloud apps and web traffic firewalls to securely process P2P traffic over BT, FTP and UDP-based streaming protocols as well as Skype, voice, video and messaging multimedia communication sessions over SIP, and web traffic over other protocols. In one example, the security service needs to allow employees and contractors at an organization to make calls, but not transfer files, a policy that the service can enforce by encoding a SIP control channel and data channel. The enforcement of this policy necessitates more than a SIP proxy to enable the ability to anticipate where the data is getting transferred, and the ability to either avoid or block that channel, based on information in the channel. A streaming agent sending traffic looks at the port only, so needs to know all available ports before sending. If handling all protocols, the security service can catch web traffic over non-standard ports, but it is hard to gather the traffic. An existing workaround for securing files from being transferred is to block access to ports, but security services want to load everything, safely—not block ports. P2P data packets try standard ports first, and then often fall back, hopping from port to port, which also limits the usefulness of blocking a port, because the P2P data service can hop to a different port.

權(quán)利要求

1
微信群二維碼
意見反饋