EVENT-MESSAGE COLLECTION, PROCESSING, AND STORAGE SYSTEMS THAT ARE CONFIGURABLE TO FACILITATE SCALING, LOAD-BALANCING, AND SELECTION OF A CENTRALIZATION/DECENTRALIZATION LEVEL
Granted: April 4, 2024
Application Number:
20240111608
The current document is directed to event-message collection, processing, and storage systems and, in particular, to event-message collection, processing, and storage computing systems that are configurable to facilitate scaling, load balancing, and selection of a centralizing/decentralizing level which, in turn, provide a variety of operational efficiencies and advantages. Decentralization combined with event-record filtering, in a described implementation, provides for a significant…
PROVIDING EXPLANATION OF NETWORK INCIDENT ROOT CAUSES
Granted: March 21, 2024
Application Number:
20240097971
Some embodiments provide a method for reporting potential root causes of incidents within a network. The method identifies a first network entity as a potential root cause of an incident affecting a second network entity. For each network entity of a set of network entities in a dependency chain beginning with the first network entity and ending with the second network entity, the method assigns a label to the network entity based on measured metrics of the network entity. The method…
INSPECTION AND REPAIR OF OBJECT METADATA IN VIRTUAL STORAGE AREA NETWORKS
Granted: March 14, 2024
Application Number:
20240086391
Systems and methods for inspection and repair of VSAN object metadata. A user-space indirection layer is maintained to map logical addresses of VSAN objects to physical memory addresses of their metadata. Commands may then be sent from the user space to distributed object manager (DOM) clients, with the physical addresses of metadata of objects to be inspected. DOM owners thus may bypass their own indirection layers to retrieve object metadata directly from received user commands.…
DEVELOPMENT PLATFORM VALIDATION WITH SIMULATION
Granted: March 14, 2024
Application Number:
20240086299
The present disclosure relates to development platform validation with simulation. Some embodiments include instructions to recognize a simulation of a management system as an endpoint of a development platform in a virtualized environment, and execute performance testing on the development platform using the simulation.
LOW-CODE DEVELOPMENT PLATFORM FOR EXTENDING WORKLOAD PROVISIONING
Granted: March 14, 2024
Application Number:
20240086223
The present disclosure relates to extending workload provisioning using a low-code development platform. Some embodiments include a medium having instructions to provide an interface for creating a custom resource in a virtualized environment, the interface including a first portion configured to receive summary information corresponding to the custom resource, and a second portion configured to receive a schema corresponding to the custom resource. Some embodiments include creating the…
METHOD AND SYSTEM TO PROCESS DATA DELETE IN VIRTUALIZED COMPUTING ENVIRONMENT
Granted: March 14, 2024
Application Number:
20240086103
Example methods and systems to process input/output (I/O) requests in a distributed storage system in a virtualized computing environment are disclosed. One example method includes executing a first thread to destage one or more data writes, wherein the one or more data writes correspond to a first bucket; executing a second thread to destage the one or more data deletes, wherein the one or more data deletes correspond to a second bucket; in response to executing the first thread,…
NOISY NEIGHBOR IN A CLOUD MULTITENANT SYSTEM
Granted: February 29, 2024
Application Number:
20240073144
A noisy neighbor in a cloud multitenant system can present resource governance issues. Usage quotas can be applied, and traffic can be throttled to mitigate the problem. Network traffic can be monitored from routers of a software defined data center (SDDC) configured to process network traffic for machines of different tenants. By default, the network traffic from the routers can be processed via a first edge router for the SDDC. A second edge router can be deployed for the SDDC in…
MAPPING COMMON PATHS FOR APPLICATIONS
Granted: February 29, 2024
Application Number:
20240069948
Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these…
Meta-level management system that aggregates information and functionalities of computational-resource management systems and that provides new management functionalities
Granted: February 1, 2024
Application Number:
20240036910
The current document is directed to a meta-level management system (“MMS”) that aggregates information and functionalities provided by multiple underlying management systems in addition to providing additional information and management functionalities. In one implementation, the MMS creates and maintains a single inventory-and-configuration-management database (“ICMDB”), implemented using a graph database, to store a comprehensive inventory of managed entities known to, and…
CROSS-CLUSTER GRAPH QUERIES
Granted: February 1, 2024
Application Number:
20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.
CROSS-CLUSTER GRAPH QUERIES
Granted: February 1, 2024
Application Number:
20240037148
Disclosed herein is a computer-implemented method for the ingestion of data into a partitioned database, the method comprising: receiving data at at least one ingestion node of a graph database, storing the data as a disjoint set of vertices, in a partitioned database, analyzing the disjoint set of vertices to find a set of remote edges and a set of native edges, and storing the set of remote edges and the set of native edges as a set of disjointed vertices in the partitioned database.
Meta-level management system that aggregates information and functionalities of computational-resource management systems and that provides new management functionalities
Granted: February 1, 2024
Application Number:
20240036910
The current document is directed to a meta-level management system (“MMS”) that aggregates information and functionalities provided by multiple underlying management systems in addition to providing additional information and management functionalities. In one implementation, the MMS creates and maintains a single inventory-and-configuration-management database (“ICMDB”), implemented using a graph database, to store a comprehensive inventory of managed entities known to, and…
METHODS AND SUBSYSTEMS THAT MANAGE CODE CHANGES SUBMITTED FOR PROCESSING BY AN AUTOMATED APPLICATION-DEVELOPMENT-AND-RELEASE-MANAGEMENT SYSTEM
Granted: January 25, 2024
Application Number:
20240028330
The current document is directed to methods and subsystems that manage submitted code changes for processing by continuous-integration/continuous-delivery/deployment systems. In disclosed implementations, code changes are processed as quickly as possible, when the code changes are flagged as being urgent. Non-urgent code changes are evaluated for the possibility of merging the non-urgent code changes with additional, subsequently submitted code changes in order to more efficiently employ…
CENTRALIZED SERVICE INSERTION IN AN ACTIVE-ACTIVE LOGICAL SERVICE ROUTER (SR) CLUSTER
Granted: January 25, 2024
Application Number:
20240031290
Example methods and systems for centralized service insertion in an active-active cluster are described. In one example, a first service endpoint may operate in an active mode on a first logical service router (SR) supported by the computer system. The first service endpoint may be associated with a second service endpoint operating on the second logical SR in a standby mode. The first logical SR and the second logical SR may be assigned to a first sub-cluster of the active-active…
TAGGING PACKETS FOR MONITORING AND ANALYSIS
Granted: January 25, 2024
Application Number:
20240031258
Some embodiments provide a method for performing data traffic monitoring. The method processes a packet through a packet processing pipeline that includes multiple stages. At a filtering stage, the method tags the packet with a set of monitoring actions for subsequent stages to perform on the packet based on a determination that the packet matches a particular filter. For each stage of a set of packet processing stages subsequent to the filtering stage, the method (i) executes any…
METHODS AND SYSTEMS FOR USING MACHINE LEARNING WITH INFERENCE MODELS TO RESOLVE PERFORMANCE PROBLEMS WITH OBJECTS OF A DATA CENTER
Granted: January 25, 2024
Application Number:
20240028955
Automated, computer-implemented methods and systems describe herein resolve performance problems with objects executing in a data center. The operations manager uses machine learning to train an inference model that relates probability distributions of event types of log messages of the object to a key performance indicator (“KPI”) of the object. The operations manager monitors the KPI for run-time KPI values that violates a KPI threshold. When the KPI violates the threshold, the…
CLUSTER ADD-ON LIFECYCLE MANAGEMENT
Granted: January 25, 2024
Application Number:
20240028412
Example methods and systems for cluster add-on lifecycle management are described. In one example, a computer system may obtain cluster add-on definition information specifying multiple add-ons that are each capable of extending functionality of at least a first cluster and a second cluster. In response to receiving a first instruction to perform a first management action, a first validation operation may be performed based on the cluster add-on definition information and multiple first…
GENERATION, ACTUATION, AND ENFORCEMENT OF POLICIES FOR RESOURCES WITHIN A DISTRIBUTED COMPUTING SYSTEM
Granted: January 25, 2024
Application Number:
20240028377
The generation, actuation, and enforcement of policies within a distributed computing system is provided. The policies are employed to manage the resources of the system. The resources include virtualized resources, such as virtual machines (VMs) and virtual storage disks (VSDs). A policy includes a rule and scope. Enforcing a policy includes applying the rule to resources that are within the policy's scope. Policies are employed to constrain the leasing period and reclaim leased…
PROVIDING AVAILABILITY OF PASSTHROUGH DEVICES CONFIGURED ON VIRTUAL COMPUTING INSTANCES
Granted: January 25, 2024
Application Number:
20240028363
The present disclosure relates to providing availability of passthrough devices configured on VCIs according to one or more embodiments of the present disclosure. One method includes receiving a notification of a failure associated with a passthrough device configured on a VCI, communicating, to the VCI, a simulation of a surprise hot removal of the device from the VCI, resetting the device, communicating, to the VCI, a simulation of a surprise hot add of the device to the VCI, and hot…
OBJECT VALIDATION IN SOFTWARE-DEFINED DATA CENTER SCRIPTS
Granted: January 25, 2024
Application Number:
20240028362
A script for execution in a software-defined data center (SDDC) can be received. The script can include an object identifier of an SDDC resource object. A validation of the object identifier can be performed before the script is executed. The script can be executed responsive to the validation being successful. A notification can be provided responsive to the validation being unsuccessful.