VMware Patent Applications

ADAPTIVE ANOMALY DETECTION FOR COMPUTER SYSTEMS

Granted: February 20, 2020
Application Number: 20200059482
Feature vectors are abstracted from data describing application processes. The feature vectors are grouped to define non-anomalous clusters of feature vectors corresponding to normal application behavior. Subsequent feature vectors are considered anomalous if they do not fall within one of the non-anomalous clusters; alerts are issued for anomalous feature vectors. In addition, the subsequent feature vectors may be used to regroup feature vectors to adapt to changes in what constitutes…

MANAGEMENT POD DEPLOYMENT WITH THE CLOUD PROVIDER POD (CPOD)

Granted: February 20, 2020
Application Number: 20200059401
Automated deployment of a public cloud is disclosed. The technology accesses, via a user interface, a cloud provider pod designer including a plurality of cloud provider platform components. Instructions comprising a plurality of public cloud requirements are received via the user interface. In addition, optimization suggestions for a cloud provider platform and based on the public cloud requirements are provided via the user interface. The cloud provider pod designer then designs a…

PACKET HANDLING DURING SERVICE VIRTUALIZED COMPUTING INSTANCE MIGRATION

Granted: February 6, 2020
Application Number: 20200045148
Example methods are provided for packet handling during service virtualized computing instance migration in a software-defined networking (SDN) environment. The method may comprise configuring first reachability information to associate a first service virtualized computing instance with an active role, and second reachability information to associate a second service virtualized computing instance with a standby role. In response to determination that a switchover is required to…

VIRTUAL MACHINE PIXEL REMOTING

Granted: February 6, 2020
Application Number: 20200045097
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for changing virtual machine user interfaces. One of the methods includes detecting, for a remote session, a first resolution for a content presentation area in a web browser, generating, using the first resolution, a first stream of pixels representative of a user interface, providing the first stream of pixels for display in the web browser, receiving input indicating a change to a…

QUEUE FILTER CONFIGURATION FOR MULTICAST PACKET HANDLING

Granted: January 30, 2020
Application Number: 20200036646
Example methods are provided for a host to perform queue filter configuration for multicast packet handling in a software-defined networking (SDN) environment. One example method may comprise the host generating and sending a request to join an outer multicast group address to one or more multicast-enabled network devices; and configuring a queue filter based on the outer multicast group address. In response to detecting an ingress encapsulated multicast packet that includes an outer…

BIDIRECTIONAL COMMAND PROTOCOL VIA A UNIDIRECTIONAL COMMUNICATION CONNECTION FOR RELIABLE DISTRIBUTION OF TASKS

Granted: January 30, 2020
Application Number: 20200036811
The present disclosure relates to techniques for handling of bidirectional command protocols via a unidirectional communication connection established between a client computing environment and a cloud-services computing environment. In one embodiment, a command request message is pushed from a service component of the cloud-services computing environment to a client gateway of the client computing environment via the unidirectional communication connection. A token indicating routing…

DISTRIBUTED STORAGE RESOURCE MANAGEMENT IN A HYPER CONVERGED INFRASTRUCTURE

Granted: January 30, 2020
Application Number: 20200036791
A distributed storage resource management in a hyper converged infrastructure is created. The system accesses a virtualized infrastructure comprising a plurality of host machines, each of said plurality of host machines having resources, the resources comprising: a central processing unit (CPU), a memory, and a storage, each of the plurality of host machines communicatively coupled with one or more virtual machines. The resources in each of the host machines are disaggregated. The…

SECURE MULTI-DIRECTIONAL DATA PIPELINE FOR DATA DISTRIBUTION SYSTEMS

Granted: January 30, 2020
Application Number: 20200036773
Techniques for ingesting data streams to a distributed-computing system using a multi-directional data ingestion pipeline are provided. In one embodiment, a method for ingesting data streams includes, at a client gateway, receiving a plurality of messages; assigning the plurality of messages to one or more data streams; obtaining stream routing configurations; and identifying one or more receivers. The method further includes determining whether at least one of the one or more data…

TECHNIQUES FOR IMPROVING IMPLEMENTATION OF A REMOTE BROWSER WITHIN A LOCAL BROWSER

Granted: January 30, 2020
Application Number: 20200036770
The present disclosure relates to techniques for causing functions provided by a remote browser to be executed when functions provided by a local browser are requested. For example, a local BHO can intercept a request for the local browser to perform a navigation function. When the navigation function is designated to be provided by the remote browser, the local BHO can (1) prevent the local browser from performing the navigation function and (2) send a communication to a remote BHO to…

MICRO-SEGMENTATION IN VIRTUALIZED COMPUTING ENVIRONMENTS

Granted: January 30, 2020
Application Number: 20200036758
Example methods are provided for an entity to perform micro-segmentation in a virtualized computing environment that includes multiple hosts. The method may comprise obtaining application implementation information associated with one or more applications implemented by multiple virtualized computing instances, each of the multiple virtualized computing instances being supported by one of the multiple hosts. The method may further comprise detecting micro-segments by clustering the…

CONTEXT-AWARE NETWORK INTROSPECTION IN SOFTWARE-DEFINED NETWORKING (SDN) ENVIRONMENTS

Granted: January 30, 2020
Application Number: 20200036608
Example methods are provided for a first host to perform context-aware network mapping a software-defined networking (SDN) environment. One example method may comprise: detecting multiple packet flows that include an egress packet flow originating from a first endpoint and destined for a second host, and an ingress packet flow originating from a second host or a third host and destined for the first endpoint or a second endpoint. The method may also comprise: in response to detecting the…

TWO-CHANNEL-BASED HIGH-AVAILABILITY

Granted: January 30, 2020
Application Number: 20200036576
A method for providing two-channel-based high-availability in a cluster of nodes is disclosed. In an embodiment, a method comprises: initiating, by a local control plane executing on a first node, a first state for an underlay control channel and a second state for a management control channel; detecting a bidirectional forwarding detection (“BFD”) control packet from a second node; determining whether the BFD control packet has been received from the underlay control channel; in…

METHODS AND SYSTEMS TO TROUBLESHOOT AND LOCALIZE STORAGE FAILURES FOR A MULTITENANT APPLICATION RUN IN A DISTRIBUTED COMPUTING SYSTEM

Granted: January 30, 2020
Application Number: 20200036575
Computational methods and systems that troubleshoot and localize failures in data storage of a multitenant application are executed in a multitenant database management system that comprises a control plane of control plane nodes and a data plane of independent and isolated data plane nodes. Each control plane node receives data requests and data queries. Each data plane node maintains data storage for tenants of the multitenant application and executes data storage and data query…

VISUALIZATION OF ANOMALIES IN TIME SERIES DATA

Granted: January 30, 2020
Application Number: 20200035001
In a computer-implemented method for visualization of anomalies in time series data on a graphical user interface, a plurality of time series data is dynamically displayed in a graph of the graphical user interface, the plurality of time series data including data points represented as numerical measurements. An indication that a time series data of the plurality of time series data includes an anomaly is received. Responsive to receiving the indication that the time series data of the…

ANOMALY DETECTION ON TIME SERIES DATA

Granted: January 30, 2020
Application Number: 20200034733
In a computer-implemented method for anomaly detection on time series data, time series data is accessed. A forecasting algorithm is applied to at least a portion of the time series data to generate a forecast confidence band for a time window following the at least a portion of the time series data. The forecast confidence band for the time window is compared to the time series data of the time window. It is determined whether the time series data includes an anomaly based at least in…

HANDLING SOFTWARE PAGE FAULTS IN CONSTANT TIME

Granted: January 30, 2020
Application Number: 20200034310
The present disclosure relates to handling page faults in a constant time. In particular, a data structure of a fixed height is used to store the page tables, allowing for a constant look up time for a particular page. Further, a virtual address descriptor corresponding to the page is used to obtain and load the data into the corresponding instruction data into the page. The virtual address descriptor is directly accessible from the page obtained from walking the page table. This allows…

GROUPING LOG PIECES OF DIFFERENT CONTEXT WITHIN A LOG FILE IN VIRTUALIZATION SYSTEM

Granted: January 30, 2020
Application Number: 20200034271
A method for log analysis includes receiving log outputs from an application and generating a log file by recording the log outputs in the log file and, for each log output in the log file, attaching a log context record to the log output. The log context record is encoded with a call stack having stack frames and one or more variables in the stack frames. The method further includes grouping the log outputs in the log file based on their log context records.

PEER-TO-PEER LICENSE ENFORCEMENT IN VIRTUALIZED COMPUTING ENVIRONMENTS

Granted: January 30, 2020
Application Number: 20200034172
An example method is provided for a first host running a client software to provision a virtual machine on the first host in a virtualized computing environment including one or more hosts. The method may include generating a license key message, transmitting the license key message to a second host via a peer-to-peer (P2P) network including the first host and the second host, receiving a determination of the second host whether the virtual machine can be provisioned on the first host…

UNBALANCED STORAGE RESOURCE USAGE CONFIGURATION FOR DISTRIBUTED STORAGE SYSTEMS

Granted: January 30, 2020
Application Number: 20200034075
Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. The method may comprise: obtaining usage data associated with multiple storage resources forming the distributed storage system; and based on the usage data, determining a higher usage set and a lower usage set from the multiple storage resources. The method also comprise configuring the multiple hosts to use the multiple storage…

METHOD FOR MOVING LOGICAL RESOURCES WITHOUT EXPLICIT NEGOTIATIONS IN A HIGH AVAILABILITY, ACTIVE-ACTIVE SERVICE ROUTER CLUSTER

Granted: January 23, 2020
Application Number: 20200028730
A method for a service router (“SR”) implemented in an active-active SR cluster to move logical resources without explicit negotiations between the service routers (“SRs”) in the cluster to provide high availability of services is disclosed. In an embodiment, the method comprises: determining, by an active SR of a plurality of SRs implemented in an active-active SR cluster, that a particular SR has failed; and obtaining, by the active SR, a plurality of hash values computed for…