AUTOMATIC GENERATION AND ASSIGNING OF A PERSISTENT UNIQUE IDENTIFIER TO AN APPLICATION/COMPONENT GROUPING
Granted: January 5, 2023
Application Number:
20230004853
A methodology for assigning an identity to a plurality of unsupervised machine learning based applications is disclosed. In a computer-implemented method, a machine learning based discovery of a plurality of unsupervised machine learning based applications spanning across a plurality of diverse components in a computing environment is received. A persistent unique identifier is assigned to each of the plurality of unsupervised machine learning based applications. It is then determined…
PASSWORDLESS ACCESS TO VIRTUAL DESKTOPS
Granted: December 29, 2022
Application Number:
20220417243
The present disclosure relates to methods, systems, and machine-readable media for passwordless access to virtual desktops. A request can be received to launch a virtual desktop provided by a software defined data center from a client having previously authenticated a user via a passwordless login. The client can be authenticated to a connection server and a virtual desktop. Authenticating the client to the virtual desktop can include receiving a request from the connection server to…
ADAPTIVE HYBRID POLLING BASED ON OUTSTANDING INPUT/OUTPUT (I/O) DETERMINATION
Granted: December 29, 2022
Application Number:
20220414035
An adaptive hybrid polling technique combines an interrupt mode with a polling mode, and is based on outstanding input/output (OIO) determination to improve I/O performance and to save processor cycles. The OIO includes two types of I/O commands: (1) I/O commands submitted to storage devices for processing, and (2) I/O commands completed by the storage devices but not yet acknowledged by host software. The adaptive hybrid polling technique involves two phases to determine when to poll…
AUTOMATED ROLLBACK IN VIRTUALIZED COMPUTING ENVIRONMENTS
Granted: December 22, 2022
Application Number:
20220405171
A rollback can be performed after completing an upgrade to components of a virtualized computing environment. When the upgrade is performed, an upgrade bundle having rollback scripts is provided to edges, hosts, and managers in the virtualized computing environment that are to be upgraded. When a rollback is to be performed, the rollback scripts are executed, and the components are rolled back in a reverse order relative to their upgrade order. Data and configuration checking are…
DATA AND CONFIGURATION INTEGRITY CHECKING POST-ROLLBACK USING BACKUPS IN VIRTUALIZED COMPUTING ENVIRONMENTS
Granted: December 22, 2022
Application Number:
20220404983
A rollback can be performed after completing an upgrade to components of a virtualized computing environment. When the upgrade is performed, an upgrade bundle having rollback scripts is provided to edges, hosts, and managers in the virtualized computing environment that are to be upgraded. When a rollback is to be performed, the rollback scripts are executed, and the components are rolled back in a reverse order relative to their upgrade order. Data and configuration checking are…
TIME AWARE CACHING
Granted: December 15, 2022
Application Number:
20220398245
The present disclosure relates to time aware caching. One method includes receiving an API request for data from a database, wherein the request defines a time window associated with the data, creating a first and second query based on the request, wherein the first query corresponds to a first chunk of the time window, and wherein the second query corresponds to a second chunk of the time window, hashing a first statement associated with the first query to produce a first key and…
HANDLING PACKETS TRAVELLING TOWARDS LOGICAL SERVICE ROUTERS (SRs) FOR ACTIVE-ACTIVE STATEFUL SERVICE INSERTION
Granted: December 8, 2022
Application Number:
20220393976
Example methods and computer systems for packet handling for active-active stateful service insertion are disclosed. One example may involve a computer system detecting a packet addressed from a source address to a service endpoint address. Based on configuration information associated with the service endpoint address, the computer system may identify a first active logical service router (SR) and a second active logical SR that are both associated with the service endpoint address and…
MACHINE LEARNING METHODS AND SYSTEMS FOR DISCOVERING PROBLEM INCIDENTS IN A DISTRIBUTED COMPUTER SYSTEM
Granted: December 8, 2022
Application Number:
20220391279
Methods and systems are directed to discovering problem incidents in a distributed computing system. Events corresponding to historical problems incidents for the distributed computing system are retrieved from a data base. Sets of representative events of the various historical problem incidents for the distributed computing system are determined. A runtime problem incident in the distributed computing system is characterized by runtime events. The runtime problem incident is classified…
ADDRESS RESOLUTION HANDLING AT LOGICAL DISTRIBUTED ROUTERS
Granted: December 1, 2022
Application Number:
20220385621
Example methods for a network device to perform address resolution handling. The method may comprise: in response to a first distributed router (DR) port of a first DR instance detecting an address resolution request from a second DR port of a second DR instance, generating a modified address resolution request that is addressed from a first address associated with the first DR port instead of a second address associated with the second DR port. The modified address resolution request…
METHODS AND SYSTEMS FOR TROUBLESHOOTING DATA CENTER NETWORKS
Granted: November 24, 2022
Application Number:
20220376970
Computational methods and systems troubleshoot problems in a data center network. A dependency graph is constructed in response to an entity of the network exhibiting anomalous behavior. The dependency graph comprises nodes that correspond to metrics of entities that transmit data to and receive data from the entity over the network and edges that represent a connection between metrics. An anomaly score is determined for each metric of the dependency graph. Correlated metrics connected…
METHODS AND SYSTEMS FOR PREDICTING BEHAVIOR OF DISTRIBUTED APPLICATIONS
Granted: November 24, 2022
Application Number:
20220374702
Computational methods and systems described herein are directed to predicting behavior of a distributed application in response to proposed changes to the distributed application and/or proposed changes to a distributed computing system in which the distributed application is running. A training set of graphs of a distributed computing environment of the distributed application is constructed. Each graph represents a state of the distributed computing environment at a point in time.…
SOFTWARE-BASED HARDWARE SECURITY MODULE (HSM) FOR A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: November 24, 2022
Application Number:
20220374512
A software-based implementation of a hardware security module (HSM) includes a software-based HSM device that uses a hardware-protected secure environment to provide protection for data and for execution of code of the HSM device. The HSM device operates in a virtualized computing environment, and an interface to the security device enables an application running on a virtualized computing instance to access the security device. The execution of the code in the secure environment is a…
METHOD AND SUBSYSTEM WITHIN A DISTRIBUTED LOG-ANALYTICS SYSTEM THAT AUTOMATICALLY DETERMINES AND ENFORCES LOG-RETENTION PERIODS FOR RECEIVED LOG-EVENT MESSAGES
Granted: November 24, 2022
Application Number:
20220374292
The current document is directed to methods and systems that efficiently process and store log/event messages generated within distributed computer facilities. Various different types of initial processing steps may be applied to a stream of log/event messages received by a message-collector system or a message-ingestion-and-processing subsystem. The currently disclosed methods and systems employ additional pre-processing steps to identify the types of received log/event messages,…
REQUEST HANDLING WITH AUTOMATIC SCHEDULING
Granted: November 17, 2022
Application Number:
20220368779
Example methods and systems for request handling with automatic scheduling are described. In one example, a computer system may receive, from multiple client devices, respective multiple requests that are generated and sent according to a first set of control parameters. Based on the multiple requests, request characteristic(s) may be monitored to determine whether an automatic scheduling condition is satisfied. In response to determination that the automatic scheduling condition is…
MUTUALLY EXCLUSIVE FEATURE DETECTION IN AN EVOLVING DISTRIBUTED SYSTEM
Granted: November 3, 2022
Application Number:
20220350820
A distributed system, such as a distributed storage system in a virtualized computing environment and having storage nodes arranged in a cluster, is provided with capability by a management server to detect mutually exclusive features. If a feature being requested for installation is detected as being a mutually exclusive feature by using a first table, the management server searches for the feature in second table. If the feature is located in the second table and if the feature meets a…
FILE SYSTEM EVENT MONITORING USING METADATA SNAPSHOTS
Granted: October 27, 2022
Application Number:
20220342851
The present disclosure is related to methods, systems, and machine-readable media for file system event monitoring using metadata snapshots. A traditional snapshot of a virtual computing instance (VCI) can be created in a file system. The snapshot can correspond to an extent. An indication can be made that the extent is owned by a single snapshot. A metadata snapshot, corresponding to the extent, can be created without changing the indication that the extent is owned. The extent can be…
SNAPSHOT SPACE REPORTING USING A PROBABILISTIC DATA STRUCTURE
Granted: October 27, 2022
Application Number:
20220342848
The present disclosure is related to methods, systems, and machine-readable media for snapshot space reporting. A first probabilistic data structure can be created for a first snapshot of a virtual computing instance (VCI) in a file system based on a hash of physical block numbers of a plurality of blocks of the first snapshot. A second probabilistic data structure can be created for a second snapshot of the VCI based on a hash of physical block numbers of a plurality of blocks of the…
DELETING SNAPSHOTS VIA COMPARING FILES AND DELETING COMMON EXTENTS
Granted: October 27, 2022
Application Number:
20220342847
The present disclosure is related to methods, systems, and machine-readable media for deleting snapshots. A deletion process can be performed responsive to receiving a request to delete a snapshot of a virtual computing instance (VCI) in a file system. The deletion process can include performing a first file comparison between the snapshot and a previous snapshot to determine first extents exclusive to the snapshot, performing a second file comparison between the snapshot and a…
METHOD AND SUBSYSTEM OF A DISTRIBUTED LOG-ANALYTICS SYSTEM THAT AUTOMATICALLY DETERMINE THE SOURCE OF LOG/EVENT MESSAGES
Granted: October 6, 2022
Application Number:
20220318202
The current document is directed to methods and subsystems within distributed log-analytics systems that automatically and autonomously generate indications of log sources for log/event messages received by the distributed log-analytics systems. The log-source indications can be incorporated in tags associated with received log/event messages to facilitate use of log/event-message information and log/event-message-processing tools contained in content packs provided by designers,…
SYSTEM AND METHOD TO MAINTAIN QUALITY OF SERVICE ASSOCIATED WITH CLOUD APPLICATION
Granted: September 29, 2022
Application Number:
20220308908
Example methods relating to maintain a quality of service of a cloud application are described. One example method includes monitoring a workload metric of a virtual machines which is running the cloud application, creating additional one or more virtual machines, isolating the additional one or more virtual machines, and determining whether the workload metric exceeds a threshold. In response to determining that the workload metric exceeds the threshold, the method includes deisolating…