CROSS-CLUSTER GRAPH QUERIES
Granted: February 1, 2024
Application Number:
20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.
TAGGING PACKETS FOR MONITORING AND ANALYSIS
Granted: January 25, 2024
Application Number:
20240031258
Some embodiments provide a method for performing data traffic monitoring. The method processes a packet through a packet processing pipeline that includes multiple stages. At a filtering stage, the method tags the packet with a set of monitoring actions for subsequent stages to perform on the packet based on a determination that the packet matches a particular filter. For each stage of a set of packet processing stages subsequent to the filtering stage, the method (i) executes any…
CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER
Granted: January 25, 2024
Application Number:
20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…
TAGGING PACKETS FOR MONITORING AND ANALYSIS
Granted: January 25, 2024
Application Number:
20240031258
Some embodiments provide a method for performing data traffic monitoring. The method processes a packet through a packet processing pipeline that includes multiple stages. At a filtering stage, the method tags the packet with a set of monitoring actions for subsequent stages to perform on the packet based on a determination that the packet matches a particular filter. For each stage of a set of packet processing stages subsequent to the filtering stage, the method (i) executes any…
METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…
METHODS AND SYSTEMS FOR USING MACHINE LEARNING TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028444
Automated computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to obtain rules defining relationships between probabilities of event types of in log messages and performance problems identified by a key performance indictor (“KPI”) of the object. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log messages that describe the…
METHODS AND SYSTEMS FOR RESOLVING PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028442
Automated, computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to train a model that comprises rules defining relationships between probabilities of event types of in log messages and values of a key performance indictor (“KPI”) of the object over a historical time period. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log…
CLUSTER ADD-ON LIFECYCLE MANAGEMENT
Granted: January 25, 2024
Application Number:
20240028411
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. User interface(s) may be generated based on the cluster add-on definition information to allow a user to request for a management action associated. In response to receiving a first request for a…
OBJECT VALIDATION IN SOFTWARE-DEFINED DATA CENTER SCRIPTS
Granted: January 25, 2024
Application Number:
20240028362
A script for execution in a software-defined data center (SDDC) can be received. The script can include an object identifier of an SDDC resource object. A validation of the object identifier can be performed before the script is executed. The script can be executed responsive to the validation being successful. A notification can be provided responsive to the validation being unsuccessful.
CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER
Granted: January 25, 2024
Application Number:
20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…
METHODS AND SUBSYSTEMS THAT MANAGE CODE CHANGES SUBMITTED FOR PROCESSING BY AN AUTOMATED APPLICATION-DEVELOPMENT-AND-RELEASE-MANAGEMENT SYSTEM
Granted: January 25, 2024
Application Number:
20240028330
The current document is directed to methods and subsystems that manage submitted code changes for processing by continuous-integration/continuous-delivery/deployment systems. In disclosed implementations, code changes are processed as quickly as possible, when the code changes are flagged as being urgent. Non-urgent code changes are evaluated for the possibility of merging the non-urgent code changes with additional, subsequently submitted code changes in order to more efficiently employ…
METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…
METHODS AND SYSTEMS FOR USING MACHINE LEARNING TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028444
Automated computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to obtain rules defining relationships between probabilities of event types of in log messages and performance problems identified by a key performance indictor (“KPI”) of the object. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log messages that describe the…
METHODS AND SYSTEMS FOR RESOLVING PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028442
Automated, computer-implemented methods and systems for resolving performance problems with objects executing in a data center are described. The automated methods use machine learning to train a model that comprises rules defining relationships between probabilities of event types of in log messages and values of a key performance indictor (“KPI”) of the object over a historical time period. When a KPI violates a corresponding threshold, the rules are used to evaluate run time log…
CLUSTER ADD-ON LIFECYCLE MANAGEMENT
Granted: January 25, 2024
Application Number:
20240028412
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. In response to receiving a first instruction to perform a first management action, a first validation operation may be performed based on the cluster add-on definition information and multiple first…
CLUSTER ADD-ON LIFECYCLE MANAGEMENT
Granted: January 25, 2024
Application Number:
20240028411
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. User interface(s) may be generated based on the cluster add-on definition information to allow a user to request for a management action associated. In response to receiving a first request for a…
GENERATION, ACTUATION, AND ENFORCEMENT OF POLICIES FOR RESOURCES WITHIN A DISTRIBUTED COMPUTING SYSTEM
Granted: January 25, 2024
Application Number:
20240028377
The generation, actuation, and enforcement of policies within a distributed computing system is provided. The policies are employed to manage the resources of the system. The resources include virtualized resources, such as virtual machines (VMs) and virtual storage disks (VSDs). A policy includes a rule and scope. Enforcing a policy includes applying the rule to resources that are within the policy's scope. Policies are employed to constrain the leasing period and reclaim leased…
LOAD BALANCING OVER TUNNEL ENDPOINT GROUPS
Granted: January 25, 2024
Application Number:
20240028367
Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to…
PROVIDING AVAILABILITY OF PASSTHROUGH DEVICES CONFIGURED ON VIRTUAL COMPUTING INSTANCES
Granted: January 25, 2024
Application Number:
20240028363
The present disclosure relates to providing availability of passthrough devices configured on VCIs according to one or more embodiments of the present disclosure. One method includes receiving a notification of a failure associated with a passthrough device configured on a VCI, communicating, to the VCI, a simulation of a surprise hot removal of the device from the VCI, resetting the device, communicating, to the VCI, a simulation of a surprise hot add of the device to the VCI, and hot…
OBJECT VALIDATION IN SOFTWARE-DEFINED DATA CENTER SCRIPTS
Granted: January 25, 2024
Application Number:
20240028362
A script for execution in a software-defined data center (SDDC) can be received. The script can include an object identifier of an SDDC resource object. A validation of the object identifier can be performed before the script is executed. The script can be executed responsive to the validation being successful. A notification can be provided responsive to the validation being unsuccessful.