VMware Patent Applications

LOAD BALANCING OVER TUNNEL ENDPOINT GROUPS

Granted: January 25, 2024
Application Number: 20240028367
Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to…

CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER

Granted: January 25, 2024
Application Number: 20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…

TAGGING PACKETS FOR MONITORING AND ANALYSIS

Granted: January 25, 2024
Application Number: 20240031258
Some embodiments provide a method for performing data traffic monitoring. The method processes a packet through a packet processing pipeline that includes multiple stages. At a filtering stage, the method tags the packet with a set of monitoring actions for subsequent stages to perform on the packet based on a determination that the packet matches a particular filter. For each stage of a set of packet processing stages subsequent to the filtering stage, the method (i) executes any…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028444
Automated computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to obtain rules defining relationships between probabilities of event types of in log messages and performance problems identified by a key performance indictor (“KPI”) of the object. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log messages that describe the…

METHODS AND SYSTEMS FOR RESOLVING PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028442
Automated, computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to train a model that comprises rules defining relationships between probabilities of event types of in log messages and values of a key performance indictor (“KPI”) of the object over a historical time period. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log…

CLUSTER ADD-ON LIFECYCLE MANAGEMENT

Granted: January 25, 2024
Application Number: 20240028412
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. In response to receiving a first instruction to perform a first management action, a first validation operation may be performed based on the cluster add-on definition information and multiple first…

CLUSTER ADD-ON LIFECYCLE MANAGEMENT

Granted: January 25, 2024
Application Number: 20240028411
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. User interface(s) may be generated based on the cluster add-on definition information to allow a user to request for a management action associated. In response to receiving a first request for a…

GENERATION, ACTUATION, AND ENFORCEMENT OF POLICIES FOR RESOURCES WITHIN A DISTRIBUTED COMPUTING SYSTEM

Granted: January 25, 2024
Application Number: 20240028377
The generation, actuation, and enforcement of policies within a distributed computing system is provided. The policies are employed to manage the resources of the system. The resources include virtualized resources, such as virtual machines (VMs) and virtual storage disks (VSDs). A policy includes a rule and scope. Enforcing a policy includes applying the rule to resources that are within the policy's scope. Policies are employed to constrain the leasing period and reclaim leased…

PROVIDING AVAILABILITY OF PASSTHROUGH DEVICES CONFIGURED ON VIRTUAL COMPUTING INSTANCES

Granted: January 25, 2024
Application Number: 20240028363
The present disclosure relates to providing availability of passthrough devices configured on VCIs according to one or more embodiments of the present disclosure. One method includes receiving a notification of a failure associated with a passthrough device configured on a VCI, communicating, to the VCI, a simulation of a surprise hot removal of the device from the VCI, resetting the device, communicating, to the VCI, a simulation of a surprise hot add of the device to the VCI, and hot…

OBJECT VALIDATION IN SOFTWARE-DEFINED DATA CENTER SCRIPTS

Granted: January 25, 2024
Application Number: 20240028362
A script for execution in a software-defined data center (SDDC) can be received. The script can include an object identifier of an SDDC resource object. A validation of the object identifier can be performed before the script is executed. The script can be executed responsive to the validation being successful. A notification can be provided responsive to the validation being unsuccessful.

METHODS AND SUBSYSTEMS THAT MANAGE CODE CHANGES SUBMITTED FOR PROCESSING BY AN AUTOMATED APPLICATION-DEVELOPMENT-AND-RELEASE-MANAGEMENT SYSTEM

Granted: January 25, 2024
Application Number: 20240028330
The current document is directed to methods and subsystems that manage submitted code changes for processing by continuous-integration/continuous-delivery/deployment systems. In disclosed implementations, code changes are processed as quickly as possible, when the code changes are flagged as being urgent. Non-urgent code changes are evaluated for the possibility of merging the non-urgent code changes with additional, subsequently submitted code changes in order to more efficiently employ…

CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER

Granted: January 25, 2024
Application Number: 20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…

METHODS AND SYSTEMS FOR USING MACHINE LEARNING TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER

Granted: January 25, 2024
Application Number: 20240028444
Automated computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to obtain rules defining relationships between probabilities of event types of in log messages and performance problems identified by a key performance indictor (“KPI”) of the object. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log messages that describe the…

METHODS AND SYTSTEMS FOR DISCOVERING INCIDENTS THROUGH CLUSTERING OF ALERT OCCURING IN A DATA CENTER

Granted: January 18, 2024
Application Number: 20240022466
Automated computer-implemented methods and systems for discovering clusters of alerts triggered by abnormal events occurring with objects in a data center are described. In one aspect, alerts with start times in a sliding run-time window are retrieved from an alerts database. Each alert corresponds to a run-time event occurring with an object of the data center. Clusters of alerts in the sliding run-time window are detected based on the start times of the alerts and topological proximity…

HANDLING LOCAL APPLICATION EVENTS WHILE WORKING ON REMOTE DESKTOPS

Granted: January 18, 2024
Application Number: 20240020080
A method enables events associated with local applications to be handled at a user device while a remote desktop is being used at the user device. A notification of an event is presented on a display screen of the user device, over the remote desktop. The notification prompts a user to handle the event now or handle the event later. In response to the user selecting to handle the event now, a window of a local application associated with the event is displayed over the remote desktop and…

HANDLING LOCAL APPLICATION EVENTS WHILE WORKING ON REMOTE DESKTOPS

Granted: January 18, 2024
Application Number: 20240020080
A method enables events associated with local applications to be handled at a user device while a remote desktop is being used at the user device. A notification of an event is presented on a display screen of the user device, over the remote desktop. The notification prompts a user to handle the event now or handle the event later. In response to the user selecting to handle the event now, a window of a local application associated with the event is displayed over the remote desktop and…

METHODS AND SYTSTEMS FOR DISCOVERING INCIDENTS THROUGH CLUSTERING OF ALERT OCCURING IN A DATA CENTER

Granted: January 18, 2024
Application Number: 20240022466
Automated computer-implemented methods and systems for discovering clusters of alerts triggered by abnormal events occurring with objects in a data center are described. In one aspect, alerts with start times in a sliding run-time window are retrieved from an alerts database. Each alert corresponds to a run-time event occurring with an object of the data center. Clusters of alerts in the sliding run-time window are detected based on the start times of the alerts and topological proximity…

METHODS AND SYSTEMS FOR RESOLVING ROOT CAUSES OF PERFORMANCE PROBLEMS WITH APPLICATIONS EXECUTING IN A DATA CENTER

Granted: January 18, 2024
Application Number: 20240020191
Automated methods and systems for resolving potential root causes of performance problems with applications executing in a data center are described. The automated methods use machine learning to train an inference model that relates event types recorded in metrics, log messages, and traces of an application to values of a key performance indicator (“KPI”) of the application. The methods use the trained inference model to determine which of the event types are important event types…