VMware Patent Applications

METHODS AND SYSTEMS THAT GENERATE COMPONENT QUANTITIES FOR SYSTEM CONFIGURATIONS

Granted: June 20, 2024
Application Number: 20240202196
The current document is directed to methods and systems that generate lists of component types and quantities needed for system installations based on parameter values that characterize the system, environment, and application domain, referred to as “input values.” An implementation of a private-5G-network component-type-and-quantity-determination system is disclosed. An initial model used to generate component types and quantities is generated from information acquired from various…

TECHNIQUES FOR APPLYING A NAMED PORT SECURITY POLICY

Granted: June 6, 2024
Application Number: 20240187378
The disclosure provides an example method for implementing a network policy in a software defined networking environment. The method generally includes receiving a manifest defining a plurality of pods, wherein: for a first pod, the manifest defines a first environment value, a first port number for a first container of the first pod, and a name for the first port number; for a second pod, the manifest defines the first environment value, a second port number for a second container of…

PATH SELECTION METHOD BASED ON AN ACTIVE-ACTIVE CONFIGURATION FOR A HYPERCONVERGED INFRASTRUCTURE STORAGE ENVIRONMENT

Granted: June 6, 2024
Application Number: 20240184610
For a distributed storage system that has an active-active configuration for hosts and which uses an Internet small computer system interface (iSCSI) protocol, techniques are provided to identify/select a plurality of paths to a target. An active optimized path is selected for a host that is an object owner, and an active non-optimized path is selected for a host that is a component owner. The selection of the optimized path for a host is further based on whether that host has sufficient…

METHOD AND SYSTEM TO SUPPORT ACCESSIBILITY TO WEB PAGE

Granted: May 30, 2024
Application Number: 20240176837
Example methods and systems to support accessibility to a web page are disclosed. One example method includes examining a document to be rendered to the web page and determining whether an accessibility issue exists in the document. In response to determining that the accessibility issue exists in the document, the example method further includes determining whether a first remediation of the document corresponding to the accessibility issue exists. In response to determining that the…

CONTEXT AWARE BEHAVIORAL ANOMALY DETECTION IN COMPUTING SYSTEMS

Granted: May 2, 2024
Application Number: 20240143746
Systems and methods are described for employing event context to improve threat detection. Systems and methods of embodiments of the disclosure measure both process deviation and path deviation to determine whether processes are benign or represent threats. Both a process deviation model and a path deviation model are deployed. The process deviation model determines the similarity of a process to past processes, and the path deviation model estimates whether processes have been called…

REUSING AND RECOMMENDING USER INTERFACE (UI) CONTENTS BASED ON SEMANTIC INFORMATION

Granted: May 2, 2024
Application Number: 20240143293
A recommendation system reuses user interface (UI) strings in a virtualized computing environment based on semantic information. The recommendation system receives an input UI string query, and searches indexed and validated UI strings for candidate UI strings. The candidate UI strings are identified based on a relevance score and then ranked based on a semantic similarity score. The ranked UI strings are provided as a recommendation for a UI string in UI content of a user interface.

METHODS AND SYSTEMS FOR CONSTRUCTING AN ONTOLOGY OF LOG MESSAGES WITH NAVIGATION AND KNOWLEDGE TRANSFER

Granted: April 25, 2024
Application Number: 20240135261
Computer-implemented methods and systems described herein are directed to constructing a navigable tiered ontology that characterize how groups of log messages are distributed across products and applications that run on the platforms provided by the products. The ontology is constructed based on the products, applications, and event types of the log messages. The ontology represents how the log messages are distributed across the products. applications, and event types. The ontology is…

METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITY

Granted: April 25, 2024
Application Number: 20240134961
The current document is directed to automated methods and systems that monitor system-call execution by operating systems in order to detect operating-system corruption. A disclosed implementation of the currently disclosed automated system-call-integrity monitor generate operational system-call fingerprints for randomly selected system calls executed by guest operating systems of randomly selected virtual machines and compares the operational system-call fingerprints to reference…

EVENT-MESSAGE COLLECTION, PROCESSING, AND STORAGE SYSTEMS THAT ARE CONFIGURABLE TO FACILITATE SCALING, LOAD-BALANCING, AND SELECTION OF A CENTRALIZATION/DECENTRALIZATION LEVEL

Granted: April 4, 2024
Application Number: 20240111608
The current document is directed to event-message collection, processing, and storage systems and, in particular, to event-message collection, processing, and storage computing systems that are configurable to facilitate scaling, load balancing, and selection of a centralizing/decentralizing level which, in turn, provide a variety of operational efficiencies and advantages. Decentralization combined with event-record filtering, in a described implementation, provides for a significant…

SECURE EXECUTION OF A FILE ON A COPY DEVICE IN A VIRTUALIZED COMPUTING ENVIRONMENT

Granted: April 4, 2024
Application Number: 20240111857
Techniques are provided to prevent or allow the execution of a file from a copy device, such as a shadow copy device, depending on whether the file includes malicious code or trusted code. Redirection techniques may be used to cause a file (stored in the copy device) to be analyzed for malicious code at an original volume, rather than being analyzed at or executed from the copy device.

PROVIDING EXPLANATION OF NETWORK INCIDENT ROOT CAUSES

Granted: March 21, 2024
Application Number: 20240097971
Some embodiments provide a method for reporting potential root causes of incidents within a network. The method identifies a first network entity as a potential root cause of an incident affecting a second network entity. For each network entity of a set of network entities in a dependency chain beginning with the first network entity and ending with the second network entity, the method assigns a label to the network entity based on measured metrics of the network entity. The method…

INSPECTION AND REPAIR OF OBJECT METADATA IN VIRTUAL STORAGE AREA NETWORKS

Granted: March 14, 2024
Application Number: 20240086391
Systems and methods for inspection and repair of VSAN object metadata. A user-space indirection layer is maintained to map logical addresses of VSAN objects to physical memory addresses of their metadata. Commands may then be sent from the user space to distributed object manager (DOM) clients, with the physical addresses of metadata of objects to be inspected. DOM owners thus may bypass their own indirection layers to retrieve object metadata directly from received user commands.…

DEVELOPMENT PLATFORM VALIDATION WITH SIMULATION

Granted: March 14, 2024
Application Number: 20240086299
The present disclosure relates to development platform validation with simulation. Some embodiments include instructions to recognize a simulation of a management system as an endpoint of a development platform in a virtualized environment, and execute performance testing on the development platform using the simulation.

LOW-CODE DEVELOPMENT PLATFORM FOR EXTENDING WORKLOAD PROVISIONING

Granted: March 14, 2024
Application Number: 20240086223
The present disclosure relates to extending workload provisioning using a low-code development platform. Some embodiments include a medium having instructions to provide an interface for creating a custom resource in a virtualized environment, the interface including a first portion configured to receive summary information corresponding to the custom resource, and a second portion configured to receive a schema corresponding to the custom resource. Some embodiments include creating the…

METHOD AND SYSTEM TO PROCESS DATA DELETE IN VIRTUALIZED COMPUTING ENVIRONMENT

Granted: March 14, 2024
Application Number: 20240086103
Example methods and systems to process input/output (I/O) requests in a distributed storage system in a virtualized computing environment are disclosed. One example method includes executing a first thread to destage one or more data writes, wherein the one or more data writes correspond to a first bucket; executing a second thread to destage the one or more data deletes, wherein the one or more data deletes correspond to a second bucket; in response to executing the first thread,…

NOISY NEIGHBOR IN A CLOUD MULTITENANT SYSTEM

Granted: February 29, 2024
Application Number: 20240073144
A noisy neighbor in a cloud multitenant system can present resource governance issues. Usage quotas can be applied, and traffic can be throttled to mitigate the problem. Network traffic can be monitored from routers of a software defined data center (SDDC) configured to process network traffic for machines of different tenants. By default, the network traffic from the routers can be processed via a first edge router for the SDDC. A second edge router can be deployed for the SDDC in…

MAPPING COMMON PATHS FOR APPLICATIONS

Granted: February 29, 2024
Application Number: 20240069948
Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these…

Meta-level management system that aggregates information and functionalities of computational-resource management systems and that provides new management functionalities

Granted: February 1, 2024
Application Number: 20240036910
The current document is directed to a meta-level management system (“MMS”) that aggregates information and functionalities provided by multiple underlying management systems in addition to providing additional information and management functionalities. In one implementation, the MMS creates and maintains a single inventory-and-configuration-management database (“ICMDB”), implemented using a graph database, to store a comprehensive inventory of managed entities known to, and…

CROSS-CLUSTER GRAPH QUERIES

Granted: February 1, 2024
Application Number: 20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.

CROSS-CLUSTER GRAPH QUERIES

Granted: February 1, 2024
Application Number: 20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.