METHODS AND SYSTEMS FOR TROUBLESHOOTING DATA CENTER NETWORKS
Granted: November 24, 2022
Application Number:
20220376970
Computational methods and systems troubleshoot problems in a data center network. A dependency graph is constructed in response to an entity of the network exhibiting anomalous behavior. The dependency graph comprises nodes that correspond to metrics of entities that transmit data to and receive data from the entity over the network and edges that represent a connection between metrics. An anomaly score is determined for each metric of the dependency graph. Correlated metrics connected…
METHODS AND SYSTEMS FOR PREDICTING BEHAVIOR OF DISTRIBUTED APPLICATIONS
Granted: November 24, 2022
Application Number:
20220374702
Computational methods and systems described herein are directed to predicting behavior of a distributed application in response to proposed changes to the distributed application and/or proposed changes to a distributed computing system in which the distributed application is running. A training set of graphs of a distributed computing environment of the distributed application is constructed. Each graph represents a state of the distributed computing environment at a point in time.…
REQUEST HANDLING WITH AUTOMATIC SCHEDULING
Granted: November 17, 2022
Application Number:
20220368779
Example methods and systems for request handling with automatic scheduling are described. In one example, a computer system may receive, from multiple client devices, respective multiple requests that are generated and sent according to a first set of control parameters. Based on the multiple requests, request characteristic(s) may be monitored to determine whether an automatic scheduling condition is satisfied. In response to determination that the automatic scheduling condition is…
MUTUALLY EXCLUSIVE FEATURE DETECTION IN AN EVOLVING DISTRIBUTED SYSTEM
Granted: November 3, 2022
Application Number:
20220350820
A distributed system, such as a distributed storage system in a virtualized computing environment and having storage nodes arranged in a cluster, is provided with capability by a management server to detect mutually exclusive features. If a feature being requested for installation is detected as being a mutually exclusive feature by using a first table, the management server searches for the feature in second table. If the feature is located in the second table and if the feature meets a…
FILE SYSTEM EVENT MONITORING USING METADATA SNAPSHOTS
Granted: October 27, 2022
Application Number:
20220342851
The present disclosure is related to methods, systems, and machine-readable media for file system event monitoring using metadata snapshots. A traditional snapshot of a virtual computing instance (VCI) can be created in a file system. The snapshot can correspond to an extent. An indication can be made that the extent is owned by a single snapshot. A metadata snapshot, corresponding to the extent, can be created without changing the indication that the extent is owned. The extent can be…
SNAPSHOT SPACE REPORTING USING A PROBABILISTIC DATA STRUCTURE
Granted: October 27, 2022
Application Number:
20220342848
The present disclosure is related to methods, systems, and machine-readable media for snapshot space reporting. A first probabilistic data structure can be created for a first snapshot of a virtual computing instance (VCI) in a file system based on a hash of physical block numbers of a plurality of blocks of the first snapshot. A second probabilistic data structure can be created for a second snapshot of the VCI based on a hash of physical block numbers of a plurality of blocks of the…
DELETING SNAPSHOTS VIA COMPARING FILES AND DELETING COMMON EXTENTS
Granted: October 27, 2022
Application Number:
20220342847
The present disclosure is related to methods, systems, and machine-readable media for deleting snapshots. A deletion process can be performed responsive to receiving a request to delete a snapshot of a virtual computing instance (VCI) in a file system. The deletion process can include performing a first file comparison between the snapshot and a previous snapshot to determine first extents exclusive to the snapshot, performing a second file comparison between the snapshot and a…
METHOD AND SUBSYSTEM OF A DISTRIBUTED LOG-ANALYTICS SYSTEM THAT AUTOMATICALLY DETERMINE THE SOURCE OF LOG/EVENT MESSAGES
Granted: October 6, 2022
Application Number:
20220318202
The current document is directed to methods and subsystems within distributed log-analytics systems that automatically and autonomously generate indications of log sources for log/event messages received by the distributed log-analytics systems. The log-source indications can be incorporated in tags associated with received log/event messages to facilitate use of log/event-message information and log/event-message-processing tools contained in content packs provided by designers,…
SYSTEM AND METHOD TO MAINTAIN QUALITY OF SERVICE ASSOCIATED WITH CLOUD APPLICATION
Granted: September 29, 2022
Application Number:
20220308908
Example methods relating to maintain a quality of service of a cloud application are described. One example method includes monitoring a workload metric of a virtual machines which is running the cloud application, creating additional one or more virtual machines, isolating the additional one or more virtual machines, and determining whether the workload metric exceeds a threshold. In response to determining that the workload metric exceeds the threshold, the method includes deisolating…
METHODS AND SYSTEMS FOR INTELLIGENT SAMPLING OF NORMAL AND ERRONEOUS APPLICATION TRACES
Granted: September 15, 2022
Application Number:
20220291982
Computer-implemented methods and systems described herein perform intelligent sampling of application traces generated by an application. Computer-implemented methods and systems determine different sampling rates based on frequency of occurrence of normal traces and erroneous traces of the application. The sampling rates for low frequency normal and erroneous traces are larger than the sampling rates for high frequency normal and erroneous traces. The relatively larger sampling rates…
METHODS AND SYSTEMS FOR INTELLIGENT SAMPLING OF APPLICATION TRACES
Granted: September 8, 2022
Application Number:
20220283924
Computer-implemented methods and systems described herein perform intelligent sampling of application traces generated by an application. Computer-implemented methods and systems determine different sampling rates based on frequency of occurrence of trace types and/or frequency of occurrence of durations of the traces. Each sampling rate corresponds to a different trace type and/or different duration. The sampling rates for low frequency trace types and durations are larger than the…
PERSISTING AN HTTP CONNECTION BETWEEN APPLICATION COMPONENTS
Granted: May 12, 2022
Application Number:
20220150319
Persistent connections are provided between components in a containiner environment. A hypertext transfer protocol (HTTP) client may include a monitoring service and a proxy service. To obtain information regarding containers in the container environment, the monitoring service communicates a request to the proxy service. The proxy service in turn maintains a persistent connection for a session with a container management service using an authentication token, and communicates the…
SUPPORT FOR MULTI-AZ MANAGEMENT APPLIANCE NETWORKING
Granted: May 12, 2022
Application Number:
20220150165
Processes for managing computing processes within a plurality of data centers configured to provide a cloud computing environment are described. An exemplary process includes executing a process on a first host of a plurality of hosts. When the process is executing on the first host, a first network identifier associated with the plurality of hosts is not a network identifier of a pool of network identifiers associated with the cloud computing environment and first and second route…
FLOW-BASED LATENCY MEASUREMENT FOR LOGICAL OVERLAY NETWORK TRAFFIC
Granted: May 12, 2022
Application Number:
20220150147
Example methods and systems for flow-based latency measurement for logical overlay network traffic are described. In one example, in response to detecting a first inner data packet associated with a packet flow, a first computer system may generate and send a first encapsulated packet via a logical overlay tunnel towards a second computer system. The first encapsulated packet may be generated by encapsulating the first inner data packet with a first outer header that includes first time…
MANAGING CLIENT COMPUTING SYSTEMS USING DISTILLED DATA STREAMS
Granted: May 5, 2022
Application Number:
20220141316
The present disclosure relates to techniques for managing client computing systems, such as a client distributed-computing system. In one embodiment, a desired state of the client distributed-computing system and a current state of the client distributed-computing system are received. Measurement data generated by a plurality of components of the client distributed-computing system is received. The measurement data is processed using one or more analytical or statistical techniques to…
CACHE MANAGEMENT IN A PRINTING SYSTEM IN A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: May 5, 2022
Application Number:
20220137905
A varied least recently used (VLRU) caching technique is used to enable print data to be available at a cache of a client for printing, even after an agent performs a deletion of a hash value for the print data at a cache of the agent. The deletion of the print data (cached at the cache of the client) is postponed at the client device via the use of a waiting list, so that the cached print data can be printed at a physical printer of the client, in response to receiving a delayed print…
FAULT-TOLERANT UPLOADING OF DATA TO A DISTRIBUTED STORAGE SYSTEM
Granted: April 21, 2022
Application Number:
20220121532
Techniques for the increased efficiency of storing data objects storage in the object storage of a software designed data center (SDDC) are provided. The techniques include the efficient storage of data, while enabling snapshots of each updating of the data. The snapshots of the data may be efficiently recovered via the techniques. Difference-level mappings for each snapshot are encoded in compact self-balancing data trees included in the object's metadata. The metadata mappings include…
DISTRIBUTED OBJECT STORAGE SUPPORTING DIFFERENCE-LEVEL SNAPSHOTS
Granted: April 21, 2022
Application Number:
20220121365
Techniques for the increased efficiency of storing data objects storage in the object storage of a software designed data center (SDDC) are provided. The techniques include the efficient storage of data, while enabling snapshots of each updating of the data. The snapshots of the data may be efficiently recovered via the techniques. Difference-level mappings for each snapshot are encoded in compact self-balancing data trees included in the object's metadata. The metadata mappings include…
CONTEXT-AWARE NETWORK POLICY ENFORCEMENT
Granted: April 14, 2022
Application Number:
20220116379
Example methods and systems for context-aware network policy enforcement are described. In one example, a computer system may detect a request for a client device to access a destination server. The computer system may extract, from the request, connection information identifying a connection to be established for the client device to access the destination server; and map the connection information to contextual information associated with the client device or a user operating the…
METHODS AND SYSTEMS THAT GENERATE AND USE MICRO-SEGEMENTATION QUOTIENTS FOR SECURITY MONITORING OF DISTRIBUTED-COMPUTER-SYSTEM COMPONENTS
Granted: April 7, 2022
Application Number:
20220109684
The current document is directed to methods and systems that generate microsegmentation quotients for computational entities and components of a distributed-computer-system. In the described implementation, microsegmentation quotients are generated for each component, subsystem, or computational entity, collectively referred to as “system entities,” of a set of specified system-entity types within the distributed computer system. Microsegmentation quotients are generated for system…