VMware Patent Applications

SYSTEMS THAT DEPLOY AND MANAGE APPLICATIONS WITH HARDWARE DEPENDENCIES IN DISTRIBUTED COMPUTER SYSTEMS AND METHODS INCORPORATED IN THE SYSTEMS

Granted: February 2, 2023
Application Number: 20230035310
The current document is directed to methods and systems that automatically deploy and manage applications that are associated with hardware dependencies. As one example, many machine-learning-based applications use specialized hardware accelerators during training phases since, in many cases, training of machine-learning-based applications and systems would be computationally intractable without the increased computational bandwidth provided by hardware accelerators. However, such…

HEALTH MEASUREMENT AND REMEDIATION OF DISTRIBUTED SYSTEMS UPGRADES

Granted: February 2, 2023
Application Number: 20230029943
The present disclosure relates to health measurement and remediation of distributed systems upgrades. One method includes communicating a request for a health status to a cluster store provided by a cluster of hosts of a software-defined datacenter, wherein the cluster store includes a plurality of process instances undergoing a rolling upgrade, receiving a health status indication in response to the request, the health status indication determined based on a determination of whether the…

INTELLIGENT INTEGRATION OF CLOUD INFRASTRUCTURE TOOLS FOR CREATING CLOUD INFRASTRUCTURES

Granted: February 2, 2023
Application Number: 20230037199
This relates generally to create and manage cloud infrastructure, and more specifically, intelligently integrating one or more cloud infrastructure tools for creating cloud infrastructures. An example method includes, at a server associated with a cloud management platform, receiving a configuration file associated with a cloud infrastructure tool describing a desired state of a cloud infrastructure; creating a hybrid cloud template by incorporating content from the configuration file…

DETERMINING SHARED NODES BETWEEN SNAPSHOTS USING PROBABILISTIC DATA STRUCTURES

Granted: January 26, 2023
Application Number: 20230028678
The present disclosure is related to methods, systems, and machine-readable media for determining shared nodes between snapshots using probabilistic data structures. A unique identifier can be assigned to each node of a first tree data structure corresponding to a first snapshot of a virtual computing instance (VCI). A first probabilistic data structure representing the first tree data structure can be created that includes hashes of the identifiers assigned to the nodes of the first…

USING MAINTENANCE MODE TO UPGRADE A DISTRIBUTED SYSTEM

Granted: January 26, 2023
Application Number: 20230023625
The present disclosure relates to using maintenance mode to upgrade a distributed system. One method includes determining that a first host of a cluster of a software-defined datacenter (SDDC) is to be upgraded as a part of a rolling upgrade of the hosts of the cluster, wherein the first host is executing a process instance of a cluster store, demoting the process instance to a proxy, creating a replica of the process instance using a different proxy on a second host of the cluster,…

DETERMINING SHARED NODES BETWEEN SNAPSHOTS USING PROBABILISTIC DATA STRUCTURES

Granted: January 26, 2023
Application Number: 20230028678
The present disclosure is related to methods, systems, and machine-readable media for determining shared nodes between snapshots using probabilistic data structures. A unique identifier can be assigned to each node of a first tree data structure corresponding to a first snapshot of a virtual computing instance (VCI). A first probabilistic data structure representing the first tree data structure can be created that includes hashes of the identifiers assigned to the nodes of the first…

USING MAINTENANCE MODE TO UPGRADE A DISTRIBUTED SYSTEM

Granted: January 26, 2023
Application Number: 20230023625
The present disclosure relates to using maintenance mode to upgrade a distributed system. One method includes determining that a first host of a cluster of a software-defined datacenter (SDDC) is to be upgraded as a part of a rolling upgrade of the hosts of the cluster, wherein the first host is executing a process instance of a cluster store, demoting the process instance to a proxy, creating a replica of the process instance using a different proxy on a second host of the cluster,…

SITE LOCALITY SUPPORT FOR FILE SERVICES IN A STRETCHED CLUSTER ENVIRONMENT

Granted: January 19, 2023
Application Number: 20230021195
The location of resources for file services are located within the same site, thereby eliminating or reducing performance issues caused by cross-site accesses in a stretched cluster environment. A file server placement algorithm initially places file servers at a site based at least in part on host workload and affinity settings, and can perform failover to move the file servers to a different location (e.g., to a different host on the same site or to another site) in the event of a…

SITE LOCALITY SUPPORT FOR FILE SERVICES IN A STRETCHED CLUSTER ENVIRONMENT

Granted: January 19, 2023
Application Number: 20230021195
The location of resources for file services are located within the same site, thereby eliminating or reducing performance issues caused by cross-site accesses in a stretched cluster environment. A file server placement algorithm initially places file servers at a site based at least in part on host workload and affinity settings, and can perform failover to move the file servers to a different location (e.g., to a different host on the same site or to another site) in the event of a…

AUTOMATIC GENERATION AND ASSIGNING OF A PERSISTENT UNIQUE IDENTIFIER TO AN APPLICATION/COMPONENT GROUPING

Granted: January 5, 2023
Application Number: 20230004853
A methodology for assigning an identity to a plurality of unsupervised machine learning based applications is disclosed. In a computer-implemented method, a machine learning based discovery of a plurality of unsupervised machine learning based applications spanning across a plurality of diverse components in a computing environment is received. A persistent unique identifier is assigned to each of the plurality of unsupervised machine learning based applications. It is then determined…

PASSWORDLESS ACCESS TO VIRTUAL DESKTOPS

Granted: December 29, 2022
Application Number: 20220417243
The present disclosure relates to methods, systems, and machine-readable media for passwordless access to virtual desktops. A request can be received to launch a virtual desktop provided by a software defined data center from a client having previously authenticated a user via a passwordless login. The client can be authenticated to a connection server and a virtual desktop. Authenticating the client to the virtual desktop can include receiving a request from the connection server to…

ADAPTIVE HYBRID POLLING BASED ON OUTSTANDING INPUT/OUTPUT (I/O) DETERMINATION

Granted: December 29, 2022
Application Number: 20220414035
An adaptive hybrid polling technique combines an interrupt mode with a polling mode, and is based on outstanding input/output (OIO) determination to improve I/O performance and to save processor cycles. The OIO includes two types of I/O commands: (1) I/O commands submitted to storage devices for processing, and (2) I/O commands completed by the storage devices but not yet acknowledged by host software. The adaptive hybrid polling technique involves two phases to determine when to poll…

AUTOMATED ROLLBACK IN VIRTUALIZED COMPUTING ENVIRONMENTS

Granted: December 22, 2022
Application Number: 20220405171
A rollback can be performed after completing an upgrade to components of a virtualized computing environment. When the upgrade is performed, an upgrade bundle having rollback scripts is provided to edges, hosts, and managers in the virtualized computing environment that are to be upgraded. When a rollback is to be performed, the rollback scripts are executed, and the components are rolled back in a reverse order relative to their upgrade order. Data and configuration checking are…

DATA AND CONFIGURATION INTEGRITY CHECKING POST-ROLLBACK USING BACKUPS IN VIRTUALIZED COMPUTING ENVIRONMENTS

Granted: December 22, 2022
Application Number: 20220404983
A rollback can be performed after completing an upgrade to components of a virtualized computing environment. When the upgrade is performed, an upgrade bundle having rollback scripts is provided to edges, hosts, and managers in the virtualized computing environment that are to be upgraded. When a rollback is to be performed, the rollback scripts are executed, and the components are rolled back in a reverse order relative to their upgrade order. Data and configuration checking are…

TIME AWARE CACHING

Granted: December 15, 2022
Application Number: 20220398245
The present disclosure relates to time aware caching. One method includes receiving an API request for data from a database, wherein the request defines a time window associated with the data, creating a first and second query based on the request, wherein the first query corresponds to a first chunk of the time window, and wherein the second query corresponds to a second chunk of the time window, hashing a first statement associated with the first query to produce a first key and…

HANDLING PACKETS TRAVELLING TOWARDS LOGICAL SERVICE ROUTERS (SRs) FOR ACTIVE-ACTIVE STATEFUL SERVICE INSERTION

Granted: December 8, 2022
Application Number: 20220393976
Example methods and computer systems for packet handling for active-active stateful service insertion are disclosed. One example may involve a computer system detecting a packet addressed from a source address to a service endpoint address. Based on configuration information associated with the service endpoint address, the computer system may identify a first active logical service router (SR) and a second active logical SR that are both associated with the service endpoint address and…

MACHINE LEARNING METHODS AND SYSTEMS FOR DISCOVERING PROBLEM INCIDENTS IN A DISTRIBUTED COMPUTER SYSTEM

Granted: December 8, 2022
Application Number: 20220391279
Methods and systems are directed to discovering problem incidents in a distributed computing system. Events corresponding to historical problems incidents for the distributed computing system are retrieved from a data base. Sets of representative events of the various historical problem incidents for the distributed computing system are determined. A runtime problem incident in the distributed computing system is characterized by runtime events. The runtime problem incident is classified…

ADDRESS RESOLUTION HANDLING AT LOGICAL DISTRIBUTED ROUTERS

Granted: December 1, 2022
Application Number: 20220385621
Example methods for a network device to perform address resolution handling. The method may comprise: in response to a first distributed router (DR) port of a first DR instance detecting an address resolution request from a second DR port of a second DR instance, generating a modified address resolution request that is addressed from a first address associated with the first DR port instead of a second address associated with the second DR port. The modified address resolution request…

METHOD AND SUBSYSTEM WITHIN A DISTRIBUTED LOG-ANALYTICS SYSTEM THAT AUTOMATICALLY DETERMINES AND ENFORCES LOG-RETENTION PERIODS FOR RECEIVED LOG-EVENT MESSAGES

Granted: November 24, 2022
Application Number: 20220374292
The current document is directed to methods and systems that efficiently process and store log/event messages generated within distributed computer facilities. Various different types of initial processing steps may be applied to a stream of log/event messages received by a message-collector system or a message-ingestion-and-processing subsystem. The currently disclosed methods and systems employ additional pre-processing steps to identify the types of received log/event messages,…

SOFTWARE-BASED HARDWARE SECURITY MODULE (HSM) FOR A VIRTUALIZED COMPUTING ENVIRONMENT

Granted: November 24, 2022
Application Number: 20220374512
A software-based implementation of a hardware security module (HSM) includes a software-based HSM device that uses a hardware-protected secure environment to provide protection for data and for execution of code of the HSM device. The HSM device operates in a virtualized computing environment, and an interface to the security device enables an application running on a virtualized computing instance to access the security device. The execution of the code in the secure environment is a…