MECHANISMS FOR SOLVING AN IP FRAGMENTATION OVERLAPPING ISSUE IN L2VPN USING MULTIPLE IP ADDRESSES IN GRE HEADERS
Granted: October 1, 2020
Application Number:
20200314057
In an embodiment, a computer-implemented method for using multiple IP addresses in GRE IP headers to prevent IPID fragmentation overlapping in L2VPN networks is disclosed. In an embodiment, the method comprises: receiving, by an edge service gateway, a packet that requires fragmentating; determining whether the gateway is configured to prevent IPID fragmentation overlapping; and in response to determining that the gateway is configured to prevent IPID fragmentation overlapping, creating…
METHODS FOR ENABLING ENHANCED FIREWALL RULES VIA ARP-BASED ANNOTATIONS
Granted: September 17, 2020
Application Number:
20200296077
In an embodiment, a computer-implemented method for enabling enhanced firewall rules via ARP-based annotations is described. In an embodiment, a method comprises detecting, by a hypervisor implemented in a first host, that a first process is executing on the first host. The hypervisor determines first context information for the first process, generates a first request, encapsulates the first request and the first context information in a first packet, and transmits the first packet to a…
HYBRID ACCESS CONTROL MODEL IN COMPUTER SYSTEMS
Granted: August 27, 2020
Application Number:
20200274881
Techniques for providing hybrid access control in a cloud-services computing environment are provided. In one embodiment, a method for providing hybrid access control is provided at a host computing device. The method includes obtaining access control settings including at least a first user's role-based access settings with respect to a first sub-system of a hierarchical computing-resource system. The method further includes propagating the access control settings from the first…
MULTI-VRF AND MULTI-SERVICE INSERTION ON EDGE GATEWAY VIRTUAL MACHINES
Granted: August 27, 2020
Application Number:
20200274799
In an embodiment, a method for a VRF and multi-service insertion on edge gateways is described. In an embodiment, the method comprises: detecting a packet; determining attributes for the packet; based on the attributes, determining whether the attributes match one or more rule attributes of a particular rule in a rule table; in response to determining that the attributes match the one or more rule attributes of a particular rule in the rule table: determining, based on the particular…
MULTI-VRF AND MULTI-SERVICE INSERTION ON EDGE GATEWAY VIRTUAL MACHINES
Granted: August 27, 2020
Application Number:
20200274791
In an embodiment, a method for a VRF and multi-service insertion on edge gateways is described. In an embodiment, the method comprises obtaining a rule configuration. Based on, at least in part, the rule configuration, a rule table is created. The rule table comprises rule data records, wherein a rule data record comprises packet attributes and a redirection identifier. A policy configuration comprising policy records is obtained. Each policy record comprises a redirection identifier, a…
DEPLOYING AN APPLICATION IN A HYBRID CLOUD COMPUTING ENVIRONMENT
Granted: August 20, 2020
Application Number:
20200267208
An example method is provided for a computing system in a private cloud computing environment to deploy an application in a hybrid cloud computing environment. The method may comprise generating a request to deploy an application in a public cloud environment, the request including a deployment plan that specifies one or more tasks to be executed by a virtual computing resource from a cloud provider to deploy the application. The method may comprise sending, to an orchestration node in…
TRAFFIC FOOTPRINT CHARACTERIZATION
Granted: August 20, 2020
Application Number:
20200267071
A method for traffic footprint characterization can include monitoring containerized workloads originating from a virtual computing instance (VCI) and/or container. The method can further include determining that a containerized workload originating from the VCI consumes greater than a threshold amount of bandwidth and tagging the VCI in response to determining that the containerized workload consumes greater than the threshold amount of bandwidth.
METHODS AND SYSTEMS TO PREDICT PARAMETERS IN A DATABASE OF INFORMATION TECHNOLOGY EQUIPMENT
Granted: August 20, 2020
Application Number:
20200265111
Methods and systems predict parameters in a dataset of an identified piece of (“information technology”) IT equipment. An automated method identifies datasets IT equipment in a same category of IT equipment as a piece of IT equipment identified as having incomplete dataset information. Each dataset of IT equipment parameters is used to construct generalized linear models of different classes of IT equipment within the category of IT equipment. The class of the identified IT equipment…
PROCESSES AND SYSTEMS THAT DETECT OBJECT ABNORMALITIES IN A DISTRIBUTED COMPUTING SYSTEM
Granted: August 20, 2020
Application Number:
20200264965
Computational processes and systems are directed to detecting abnormally behaving objects of a distributed computing system. An object can be a physical or a virtual object, such as a server computer, application, VM, virtual network device, or container. Processes and systems identify a set of metrics associated with an object and compute an indicator metric from the set of metrics. The indicator metric is used to label time stamps that correspond to outlier metric values of the set of…
ACTIVE-ACTIVE ARCHITECTURE FOR DISTRIBUTED ISCSI TARGET IN HYPER-CONVERGED STORAGE
Granted: August 6, 2020
Application Number:
20200250126
A method is provided for a hyper-converged storage-compute system to implement an active-active failover architecture for providing Internet Small Computer System Interface (iSCSI) target service. The method intelligently selects multiple hosts to become storage nodes that process iSCSI input/output (I/O) for a target. The method further enables iSCSI persistent reservation (PR) to handle iSCSI I/Os from multiple initiators.
MANAGING CLIENT COMPUTING SYSTEMS USING DISTILLED DATA STREAMS
Granted: July 30, 2020
Application Number:
20200244770
The present disclosure relates to techniques for managing client computing systems, such as a client distributed-computing system. In one embodiment, a desired state of the client distributed-computing system and a current state of the client distributed-computing system are received. Measurement data generated by a plurality of components of the client distributed-computing system is received. The measurement data is processed using one or more analytical or statistical techniques to…
SOLUTION WHICH CAN IMPROVE VDI USER EXPERIENCE AUTOMATICALLY
Granted: July 30, 2020
Application Number:
20200241894
A method to improve virtual desktop infrastructure (VDI) user experience includes providing a user access to a first virtual desktop executing a first set of applications and having a first virtual machine (VM) configuration, collecting VDI performance metrics associated with the first virtual desktop, detecting a problem from the VDI performance metrics, and changing a first remote display protocol configuration to address the problem. The method further includes collecting the user's…
SERVICE INSERTION IN PUBLIC CLOUD ENVIRONMENTS
Granted: July 23, 2020
Application Number:
20200236047
Example methods are provided a network device to perform service insertion in a public cloud environment that includes a first virtual network and a second virtual network. In one example method, in response to receiving a first encapsulated packet from a first virtualized computing instance located in the first virtual network, the network device may generate a decapsulated packet by performing decapsulation to remove, from the first encapsulated packet. The method may also comprise…
TUNNEL-BASED SERVICE INSERTION IN PUBLIC CLOUD ENVIRONMENTS
Granted: July 23, 2020
Application Number:
20200236046
Example methods and systems are provided a network device to perform tunnel-based service insertion in a public cloud environment. An example method may comprise establishing a tunnel between the network device and a service path. The method may also comprise: in response to receiving a first encapsulated packet, identifying the service path specified by a service insertion rule; generating and sending a second encapsulated packet over the tunnel to cause the service path to process an…
ADAPTIVE PACKET FLOW MONITORING IN SOFTWARE-DEFINED NETWORKING ENVIRONMENTS
Granted: July 23, 2020
Application Number:
20200236037
Example methods and systems for a network management entity to perform adaptive packet flow monitoring. One example method may comprise receiving a request to monitor a packet flow between a first virtualized computing instance supported by a first host and a second virtualized computing instance supported by a second host. The method may also comprise activating a first set of checkpoints by instructing the first host and/or the second host to monitor the packet flow using the first set…
CONFIGURATION CHANGE MONITORING IN SOFTWARE-DEFINED NETWORKING ENVIRONMENTS
Granted: July 23, 2020
Application Number:
20200235991
Example methods and systems for a network management entity to perform configuration change monitoring. One example method may comprise receiving a request to monitor a datapath to which a configuration change is applicable. The datapath may include multiple network elements. The method may also comprise instructing the first host to inject, at a first network element, one or more trace packets for transmission along the datapath to a second network element. The method may further…
POST PROVISIONING OPERATION MANAGEMENT IN CLOUD ENVIRONMENT
Granted: July 23, 2020
Application Number:
20200233708
An example method to manage post provisioning operations of a virtual computing instance in a heterogeneous cloud environment is disclosed. The virtual computing instance may be provisioned by a first management entity and configured to receive a command from a second management entity. The method includes defining the instance with a dynamic type by the first management entity and repeatedly finding the dynamic type with one or more finder workflows to determine whether the virtual…
METHOD FOR ENHANCING PRODUCTS WITH CLOUD ANALYTICS
Granted: July 23, 2020
Application Number:
20200233685
A method is provided to enhance a virtualized infrastructure at a customer's premise with a cloud analytics service. The method includes receive a request for an expert use case on an expertise about an object in the virtualized infrastructure and performing an expertise cycle on the expert use case, which includes retrieving a manifest for the expert use case from a cloud analytics site remote from the customer's premise, collecting the telemetry data from the virtualized infrastructure…
STORAGE RECLAMATION FOR DISTRIBUTED STORAGE SYSTEMS
Granted: July 23, 2020
Application Number:
20200233602
Example methods and systems are provided for storage reclamation from a distributed storage system in a virtualized computing environment. The method may comprise: detecting a request to reclaim a target address range associated with the distributed storage system; and mapping the target address range to multiple data chunks. The method may also comprise: in response to identifying a fully-reclaimable stripe spanning across the multiple storage resources, reclaiming particular data…
METHOD AND SYSTEM FOR CLUSTERING EVENT MESSAGES AND MANAGE EVENT-MESSAGE CLUSTERS
Granted: July 16, 2020
Application Number:
20200228392
The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to event-message clusters based on non-parameter tokens identified within the event messages. A parsing function is generated for each cluster that is used to extract data from incoming event messages and to prepare event records from event…