VMware Patent Applications

PROBABILITY-DISTRIBUTION-BASED LOG-FILE ANALYSIS

Granted: May 27, 2021
Application Number: 20210160307
The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. A log-file-analysis subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to…

SYSTEM AND METHOD FOR AUTOMATICALLY SCALING VIRTUAL MACHINE VERTICALLY USING A FORECAST SYSTEM WITHIN THE COMPUTING ENVIRONMENT

Granted: May 20, 2021
Application Number: 20210149785
A feature capacity scaling methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature capacity analysis using a forecast performed thereon. Provided the feature capacity analysis determines that features of the components are well utilized, a vertical scaling of the features is performed.

INTERNET OF THINGS SOLUTION DEPLOYMENT IN HYBRID ENVIRONMENT

Granted: May 20, 2021
Application Number: 20210149740
Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent…

STREAMING ANOMALY DETECTION

Granted: May 13, 2021
Application Number: 20210144164
Computational methods and systems to detect anomalous behaving resources and objects of a distributed computing system are described. Multiple streams of metric data representing usage of various resources of the distributed computing system are sent to a management system of the distributed computing system. The management system updates a performance model based on newly received metric values of the streams of metric data. The updated performance model is used to detect changes in one…

METHODS AND SYSTEMS FOR TROUBLESHOOTING APPLICATIONS USING STREAMING ANOMALY DETECTION

Granted: May 13, 2021
Application Number: 20210141900
Computational methods and systems for detecting and troubleshooting anomalous behavior in distributed applications executing in a distributed computing system are described herein. Methods and systems discover nodes comprising the application. Anomaly detection monitors the metrics associated with the nodes for anomalous behavior in order to identify an approximate point in time when anomalous behavior begins to adversely impact performance of the application. Anomaly detection also…

INTUITIVE GUI FOR CREATING AND MANAGING HOSTS AND VIRTUAL MACHINES

Granted: May 13, 2021
Application Number: 20210141496
In a computer-implemented method for configuring an appliance in a virtualization infrastructure via a graphical user-interface a list of hosts and a centralized management tool of the virtualization infrastructure is displayed via the graphical user-interface. The hosts are for hosting one or more virtual machines. The centralized management tool is for centrally managing the virtualization infrastructure. In response to selecting one of the hosts, displaying host configuration…

TAG COEXISTENCE DETECTION

Granted: May 6, 2021
Application Number: 20210133194
In various embodiments, a method for optimizing data storage includes receiving an input data stream, where each data record received in the data stream is tagged with a group of one or more tags. The method further includes, for each data record of data records that have been received in the data stream, using the group of one or more tags of the corresponding data record to update a data structure tracking coexistence implications of tags that have been observed together in the groups…

SYSTEM AND METHOD FOR CONFIGURATION MANAGEMENT DATABASE, GOVERNANCE, AND SECURITY IN A COMPUTING ENVIRONMENT

Granted: May 6, 2021
Application Number: 20210132967
A Hybrid Configuration Management Database methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are subjectively defined, a classification of the features is performed. Provided the feature selection analysis determines that features of the components are not well defined, a…

METHODS AND SYSTEMS THAT EFFICIENTLY STORE METRIC DATA

Granted: April 29, 2021
Application Number: 20210124665
The current document is directed to methods and systems that collect metric data within computing facilities, including large data centers and cloud-computing facilities. In a described implementation, lower and higher metric-data-value thresholds are used to partition collected metric data into outlying metric data and inlying metric data. The inlying metric data is quantized to compress the inlying metric data and adjacent data points having the same quantized metric-data values are…

MANAGING CLIENT COMPUTING SYSTEMS USING DISTILLED DATA STREAMS

Granted: April 22, 2021
Application Number: 20210120100
The present disclosure relates to techniques for managing client computing systems, such as a client distributed-computing system. In one embodiment, a desired state of the client distributed-computing system and a current state of the client distributed-computing system are received. Measurement data generated by a plurality of components of the client distributed-computing system is received. The measurement data is processed using one or more analytical or statistical techniques to…

STORAGE OF KEY-VALUE ENTRIES IN A DISTRIBUTED STORAGE SYSTEM

Granted: April 22, 2021
Application Number: 20210117443
A distributed storage system, such as a distributed storage system in a virtualized computing environment, stores data in storage nodes as immutable key-value entries. A coordinator storage node creates a key-value entry and attempts to store the key-value entry in the coordinator storage node and in neighbor storage nodes. If the storage of the key-value entry in the in the coordinator storage node and in the neighbor storage node is successful, the coordinator storage node pushes the…

QUERY IMPLEMENTATION USING SYNTHETIC TIME SERIES

Granted: April 22, 2021
Application Number: 20210117420
Techniques described herein perform implement a query using a synthetic time series (STS), for example applying an STS on time series data to obtain an answer to the query. In an embodiment, a method receives a times series and query relating to the time series. The method translates the query into a synthetic time series. The method executes a reduce operation on the STS and the time series. The method then returns the result of the operation as an answer to the query. A result of the…

SPLITTING A QUERY INTO NATIVE QUERY OPERATIONS AND POST-PROCESSING OPERATIONS

Granted: April 22, 2021
Application Number: 20210117412
Techniques for splitting a query into native query operations and post-processing operations are provided. In one embodiment, a user query including a plurality of search parameters is received. Expressions representing the plurality of search parameters in the user query are determined. A first subset and a second subset of the expressions are identified. Each expression of the first subset corresponds to one of a plurality of native query operations executable by a database platform,…

UNBALANCED STORAGE RESOURCE USAGE CONFIGURATION FOR DISTRIBUTED STORAGE SYSTEMS

Granted: April 8, 2021
Application Number: 20210103410
Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. An example method may include obtaining usage data associated with multiple storage resources forming the distributed storage system. The multiple storage resources are supported by the multiple hosts. Based on the usage data, the method may further include determining a higher usage set and a lower usage set of one or more storage…

SECURITY IN A COMPUTING ENVIRONMENT BY MONITORING EXPECTED OPERATION OF PROCESSES WITHIN THE COMPUTING ENVIRONMENT

Granted: April 1, 2021
Application Number: 20210097167
A process monitoring methodology is disclosed. In a computer-implemented method, a selection of a process to be monitored is received. The process is to be at least partially performed using a component of a computing environment. An expected operating parameter of the process is determined. The process is also monitored to determine an actual operating parameter of the process. The actual operating parameter of the process is compared with the expected operating parameter of the process…

Linking Virtualized Application Namespaces at Runtime

Granted: April 1, 2021
Application Number: 20210096879
A method for linking a plurality of virtualized application packages for execution on a computer system is described. A runtime executable of a primary virtualized application package is launched. A secondary virtualized application package to be merged with the primary virtualized application package is identified. In one embodiment, application settings and file data for the first and second virtualized application packages are merged into a single data structure. An execution layer is…

CONFIGURATION OF A HYPER-CONVERGED INFRASTRUCTURE (HCI) CLUSTER USING CENTRALIZED WORKFLOWS

Granted: April 1, 2021
Application Number: 20210096878
Example methods are provided for configuring a hyper-converged infrastructure (HCl) cluster managed by a cluster manager. The method may comprise retrieving, by a workflow session from the cluster manager. The workflow session may include a plurality of workflow operations, and a first workflow operation selected from the plurality of workflow operations is marked as incomplete. The method may transmit o the cluster manager a request to invoke the first workflow operation. The cluster…

LABEL-BASED METHODS FOR IDENTIFYING A SOURCE LOCATION IN SERVICE CHAINING TOPOLOGY

Granted: March 11, 2021
Application Number: 20210075641
In an embodiment, a computer-implemented method provides mechanisms for identifying a source location in a service chaining topology. In an embodiment, a method comprises: determining, at an egress interface of a host that hosts a virtual machine (“VM”), whether a service plane MAC address (“spmac”) in a packet header of a packet, provided to the egress interface, is the same as an inner destination MAC address in the packet; in response to determining that the spmac in the…

AUTHENTICATION OF PLUGINS IN A VIRTUALIZED COMPUTING ENVIRONMENT

Granted: March 4, 2021
Application Number: 20210067504
Plugins are authenticated for purposes of accessing and using application program interfaces (APIs) of a management service of a virtualized computing environment. In an authentication process, each plugin is associated with a session ticket that is unique to the plugin. The session ticket may be in the form of a single-use token that has a finite duration, and which may be used by the plugin to establish a session with the APIs of the management service. Because of the single-use and…

EFFICIENT TIME-RANGE QUERIES ON DATABASES IN DISTRIBUTED COMPUTING SYSTEMS

Granted: February 18, 2021
Application Number: 20210049172
The present disclosure relates to querying data cores for data items that correspond to a specified time range. Probabilistic data structures corresponding to associated data cores are used to filter the plurality of data cores to identify a subset of data cores that contain data items corresponding to the specified time range. Only the subset of the plurality of data cores determined to contain relevant data items are searched.