VMware Patent Applications

PROVIDING EXPLANATION OF NETWORK INCIDENT ROOT CAUSES

Granted: March 21, 2024
Application Number: 20240097971
Some embodiments provide a method for reporting potential root causes of incidents within a network. The method identifies a first network entity as a potential root cause of an incident affecting a second network entity. For each network entity of a set of network entities in a dependency chain beginning with the first network entity and ending with the second network entity, the method assigns a label to the network entity based on measured metrics of the network entity. The method…

INSPECTION AND REPAIR OF OBJECT METADATA IN VIRTUAL STORAGE AREA NETWORKS

Granted: March 14, 2024
Application Number: 20240086391
Systems and methods for inspection and repair of VSAN object metadata. A user-space indirection layer is maintained to map logical addresses of VSAN objects to physical memory addresses of their metadata. Commands may then be sent from the user space to distributed object manager (DOM) clients, with the physical addresses of metadata of objects to be inspected. DOM owners thus may bypass their own indirection layers to retrieve object metadata directly from received user commands.…

DEVELOPMENT PLATFORM VALIDATION WITH SIMULATION

Granted: March 14, 2024
Application Number: 20240086299
The present disclosure relates to development platform validation with simulation. Some embodiments include instructions to recognize a simulation of a management system as an endpoint of a development platform in a virtualized environment, and execute performance testing on the development platform using the simulation.

LOW-CODE DEVELOPMENT PLATFORM FOR EXTENDING WORKLOAD PROVISIONING

Granted: March 14, 2024
Application Number: 20240086223
The present disclosure relates to extending workload provisioning using a low-code development platform. Some embodiments include a medium having instructions to provide an interface for creating a custom resource in a virtualized environment, the interface including a first portion configured to receive summary information corresponding to the custom resource, and a second portion configured to receive a schema corresponding to the custom resource. Some embodiments include creating the…

METHOD AND SYSTEM TO PROCESS DATA DELETE IN VIRTUALIZED COMPUTING ENVIRONMENT

Granted: March 14, 2024
Application Number: 20240086103
Example methods and systems to process input/output (I/O) requests in a distributed storage system in a virtualized computing environment are disclosed. One example method includes executing a first thread to destage one or more data writes, wherein the one or more data writes correspond to a first bucket; executing a second thread to destage the one or more data deletes, wherein the one or more data deletes correspond to a second bucket; in response to executing the first thread,…

NOISY NEIGHBOR IN A CLOUD MULTITENANT SYSTEM

Granted: February 29, 2024
Application Number: 20240073144
A noisy neighbor in a cloud multitenant system can present resource governance issues. Usage quotas can be applied, and traffic can be throttled to mitigate the problem. Network traffic can be monitored from routers of a software defined data center (SDDC) configured to process network traffic for machines of different tenants. By default, the network traffic from the routers can be processed via a first edge router for the SDDC. A second edge router can be deployed for the SDDC in…

MAPPING COMMON PATHS FOR APPLICATIONS

Granted: February 29, 2024
Application Number: 20240069948
Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these…

CROSS-CLUSTER GRAPH QUERIES

Granted: February 1, 2024
Application Number: 20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.

Meta-level management system that aggregates information and functionalities of computational-resource management systems and that provides new management functionalities

Granted: February 1, 2024
Application Number: 20240036910
The current document is directed to a meta-level management system (“MMS”) that aggregates information and functionalities provided by multiple underlying management systems in addition to providing additional information and management functionalities. In one implementation, the MMS creates and maintains a single inventory-and-configuration-management database (“ICMDB”), implemented using a graph database, to store a comprehensive inventory of managed entities known to, and…

CROSS-CLUSTER GRAPH QUERIES

Granted: February 1, 2024
Application Number: 20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.

Meta-level management system that aggregates information and functionalities of computational-resource management systems and that provides new management functionalities

Granted: February 1, 2024
Application Number: 20240036910
The current document is directed to a meta-level management system (“MMS”) that aggregates information and functionalities provided by multiple underlying management systems in addition to providing additional information and management functionalities. In one implementation, the MMS creates and maintains a single inventory-and-configuration-management database (“ICMDB”), implemented using a graph database, to store a comprehensive inventory of managed entities known to, and…

METHODS AND SUBSYSTEMS THAT MANAGE CODE CHANGES SUBMITTED FOR PROCESSING BY AN AUTOMATED APPLICATION-DEVELOPMENT-AND-RELEASE-MANAGEMENT SYSTEM

Granted: January 25, 2024
Application Number: 20240028330
The current document is directed to methods and subsystems that manage submitted code changes for processing by continuous-integration/continuous-delivery/deployment systems. In disclosed implementations, code changes are processed as quickly as possible, when the code changes are flagged as being urgent. Non-urgent code changes are evaluated for the possibility of merging the non-urgent code changes with additional, subsequently submitted code changes in order to more efficiently employ…

PROVIDING AVAILABILITY OF PASSTHROUGH DEVICES CONFIGURED ON VIRTUAL COMPUTING INSTANCES

Granted: January 25, 2024
Application Number: 20240028363
The present disclosure relates to providing availability of passthrough devices configured on VCIs according to one or more embodiments of the present disclosure. One method includes receiving a notification of a failure associated with a passthrough device configured on a VCI, communicating, to the VCI, a simulation of a surprise hot removal of the device from the VCI, resetting the device, communicating, to the VCI, a simulation of a surprise hot add of the device to the VCI, and hot…

LOAD BALANCING OVER TUNNEL ENDPOINT GROUPS

Granted: January 25, 2024
Application Number: 20240028367
Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to…

CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER

Granted: January 25, 2024
Application Number: 20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028444
Automated computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to obtain rules defining relationships between probabilities of event types of in log messages and performance problems identified by a key performance indictor (“KPI”) of the object. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log messages that describe the…

CLUSTER ADD-ON LIFECYCLE MANAGEMENT

Granted: January 25, 2024
Application Number: 20240028411
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. User interface(s) may be generated based on the cluster add-on definition information to allow a user to request for a management action associated. In response to receiving a first request for a…

LOAD BALANCING OVER TUNNEL ENDPOINT GROUPS

Granted: January 25, 2024
Application Number: 20240028367
Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to…

PROVIDING AVAILABILITY OF PASSTHROUGH DEVICES CONFIGURED ON VIRTUAL COMPUTING INSTANCES

Granted: January 25, 2024
Application Number: 20240028363
The present disclosure relates to providing availability of passthrough devices configured on VCIs according to one or more embodiments of the present disclosure. One method includes receiving a notification of a failure associated with a passthrough device configured on a VCI, communicating, to the VCI, a simulation of a surprise hot removal of the device from the VCI, resetting the device, communicating, to the VCI, a simulation of a surprise hot add of the device to the VCI, and hot…