System and method for self-healing of application centric infrastructure fabric memory
First Claim
1. A method comprising:
- obtaining a list of processes in an application centric infrastructure fabric;
sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list;
selecting a group of processes from the sorted list;
collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes;
applying a leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes; and
transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
Citations
18 Claims
-
1. A method comprising:
-
obtaining a list of processes in an application centric infrastructure fabric; sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list; selecting a group of processes from the sorted list; collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes; applying a leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes; and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
at least one processor; and a computer-readable storage device storing instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising; obtaining a list of processes in an application centric infrastructure fabric; sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list; selecting a group of processes from the sorted list; collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes; applying a leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes; and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage device storing instructions which, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
obtaining a list of processes in an application centric infrastructure fabric; sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list; selecting a group of processes from the sorted list; collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes; applying a leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes; and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification