DYNAMIC TRACING OF RUNTIME DATA IN A DISTRIBUTED SYSTEM
Granted: May 18, 2023
Application Number:
20230153224
An administrator agent and local worker agents are provided in nodes of a distributed system to support dynamic tracing of runtime data. Trace profiles are associated with the nodes on which the local worker agents reside. The local worker agents monitor the runtime data for an error, and the administrator agent adjusts the trace profile(s) in response to the error(s). The administrator agent sends the adjusted trace profile(s) to the local worker agents, so as to enable trace output…
FORCE PROVISIONING VIRTUAL OBJECTS IN DEGRADED STRETCHED CLUSTERS
Granted: May 18, 2023
Application Number:
20230152992
The present disclosure is related to methods, systems, and machine-readable media for force provisioning virtual objects in degraded stretched clusters. A request to provision a virtual object by a stretched cluster according to a storage policy specified as part of the request can be received by a software defined data center (SDDC). The cluster can include a plurality of sites. An insufficiency of storage policy resources to satisfy the storage policy specified for the virtual object…
INTERNET OF THINGS SOLUTION DEPLOYMENT IN HYBRID ENVIRONMENT
Granted: May 11, 2023
Application Number:
20230141746
Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent…
INTERNET OF THINGS SOLUTION DEPLOYMENT IN HYBRID ENVIRONMENT
Granted: May 11, 2023
Application Number:
20230141746
Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent…
AUTOMATED PROCESSES AND SYSTEMS FOR PERFORMING LOG MESSAGE CURATION
Granted: April 27, 2023
Application Number:
20230128244
Automated computer-implemented processes and systems described herein are directed to performing curation of log messages. The automated processes and systems filter unacceptable character strings from log messages to obtain curated text statements. The curated text statements contain human-readable text that enables a reader to understand the underlying messages contained in the log messages.
MICROSERVICE SCHEDULING
Granted: April 27, 2023
Application Number:
20230127141
A method for microservice scheduling can include determining a network state for a first hypervisor in a virtual computing cluster (VCC). The method can further include determining a network state for a second hypervisor. Microservice scheduling can further include deploying a container to run a microservice on a virtual computing instance (VCI) deployed on the first hypervisor or the second hypervisor based, at least in part, on the determined network state for the first hypervisor and…
TWO-LEVEL LOGICAL TO PHYSICAL MAPPING MECHANISM IN A LOG-STRUCTURED FILE SYSTEM
Granted: April 20, 2023
Application Number:
20230123478
Example methods and systems for accessing data in a log-structured file system having a plurality of snapshots of storage objects backed by a first-level copy-on-write (COW) B+ tree data structure and a plurality of second-level B+ tree data structures have been disclosed. One example method includes obtaining a first first-level mapping associated with a first snapshot from the plurality of snapshots based on a first logical block address, wherein each of the plurality of snapshots…
SUPPORTING RANDOM ACCESS UPLOADS TO AN OBJECT STORE
Granted: April 20, 2023
Application Number:
20230119926
An object storage system can receive chunks of an object. Each of the chunks includes data that is a subset of the object. Each subset has an arbitrary amount of data and at least two of the subsets include overlapping data. Each of the chunks is associated with a timestamp. Responsive to a request for the object the object storage system can reconstitute the object by including the subset of data from a most recent of the chunks based on the timestamps and including only nonoverlapping…
AUTOMATED PROCESSES AND SYSTEMS FOR MANAGING AND TROUBLESHOOTING SERVICES IN A DISTRIBUTED COMPUTING SYSTEM
Granted: April 6, 2023
Application Number:
20230108819
Automated computer-implemented processes and systems manage and troubleshoot a service provided by a distributed application executing in a distributed computing system. Processes query objects of the distributed computing system to identify candidate objects for addition to the service. Processes generate recommendations in a graphical user interface (“GUI”) that enable a user to select and enroll the one or more candidate objects into the service via the GUI. Processes monitor a…
CONTEXT AWARE CIPHER SOLUTIONS IN SECURE COMMUNICATIONS
Granted: April 6, 2023
Application Number:
20230109647
This relates generally to configuring and automatically selecting a cipher solution for secure communication. An example method includes, at an electronic device, receiving a request initiated by a requestor for one or more cryptographic operations, determining contextual information associated with the requestor, selecting a cipher solution for processing the request based on the contextual information and a policy engine, and processing the request for the one or more cryptographic…
TRUSTED EXECUTION MECHANISMS FOR PROTECTING CIPHER SOLUTIONS
Granted: April 6, 2023
Application Number:
20230107763
This relates generally to protecting adjustable cipher solutions using trusted execution mechanisms. An example method includes, at one or more electronic devices, receiving a request for configuring a cipher solution for one or more cryptographic operations, retrieving one or more cryptographic policies from a first module protected by a secure enclave within a trusted execution environment, accessing one or more libraries in accordance with the one or more cryptographic policies,…
AUTOMATED METHODS AND SYSTEMS THAT PROVIDE RESOURCE RECOMMENDATIONS FOR VIRTUAL MACHINES
Granted: April 6, 2023
Application Number:
20230106318
The current document is directed to methods and systems that generate recommendations for resource specifications used in virtual-machine-hosting requests. When distributed applications are submitted to distributed-computer-system-based hosting platforms for hosting, the hosting requester generally specifies the computational resources that will need to be provisioned for each virtual machine included in a set of virtual machines that correspond to the distributed application, such as…
TRAFFIC PRIORITIZATION IN SD-WAN
Granted: April 6, 2023
Application Number:
20230105680
Some embodiments provide a method, for a software-defined wide area network (SD-WAN) that handles (i) traffic for a 5G network and (ii) traffic outside of the 5G network. The SD-WAN is established by a set of edge nodes and a set of gateways. At a particular edge node of the SD-WAN, the method identifies whether a received data message is a 5G message that includes a tunnel header of a particular type associated with the 5G network. When the data message is a 5G message, the method…
MANAGING EXTENT SHARING BETWEEN SNAPSHOTS USING MAPPING ADDRESSES
Granted: April 6, 2023
Application Number:
20230104544
The present disclosure is related to methods, systems, and machine-readable media for managing extent sharing between snapshots using mapping addresses. A first mapping address can be assigned to a first extent responsive to a request to write the first extent. A second mapping address can be assigned to a second extent responsive to a request to write the second extent. A snapshot can be created. A snapshot mapping address, that is monotonically increased from the second mapping…
POLICY-GOVERNED CRYPTOGRAPHIC SELECTION SYSTEM
Granted: April 6, 2023
Application Number:
20230104102
This disclosure relates generally to configuring an application or service with reconfigurable cryptographic features taking the form of cryptographic algorithms, protocols or functions. The application or service can be configured with a cryptographic provider configured to receive abstracted cryptographic API calls and retrieve specific cryptographic features based on established cryptographic policies. This configuration allows for rapid updates to the cryptographic framework and for…
AUTOMATED METHODS AND SYSTEMS FOR TROUBLESHOOTING AND OPTIMIZING PERFORMANCE OF APPLICATIONS RUNNING IN A DISTRIBUTED COMPUTING SYSTEM
Granted: March 30, 2023
Application Number:
20230099001
Automated processes and systems troubleshoot and optimize performance of applications running in distributed computing systems. An automated computer-implemented processes train an inference model for an application based on metrics associated with the application and a key performance indicator (“KPI”) of the application. When a run-time performance problem is detected in run-time KPI values of KPI, the trained inference model is applied to run-time metrics and run-time KPI values…
AUTOMATED NAMING OF AN APPLICATION/TIER IN A VIRTUAL COMPUTING ENVIRONMENT
Granted: March 23, 2023
Application Number:
20230089305
Automated provision and assignment of meaningful business names for auto discovered Applications and Tiers is disclosed. Properties of members of a virtual computing environment are automatically determined. Performing a tokenization process on text corresponding to the members to obtain information from the text. Utilizing a document generation operation to obtain tokens from the text. Performing a text mining operation on the text to obtain Term Frequency (TF) data, Document Frequency…
INTUITIVE GUI FOR CREATING AND MANAGING HOSTS AND VIRTUAL MACHINES
Granted: March 9, 2023
Application Number:
20230075699
In a computer-implemented method for configuring an appliance in a virtualization infrastructure via a graphical user-interface a list of hosts and a centralized management tool of the virtualization infrastructure is displayed via the graphical user-interface. The hosts are for hosting one or more virtual machines. The centralized management tool is for centrally managing the virtualization infrastructure. In response to selecting one of the hosts, displaying host configuration…
CLUSTER-WISE LICENSE INFORMATION REPLICATION
Granted: February 9, 2023
Application Number:
20230037460
System and methods for evaluating license information in a computer cluster are described. An example method may include retrieving a cluster-license-info from a peer-node selected from a plurality of cluster nodes in the computer cluster, wherein the cluster-license-info contains a plurality of peer-license-info collected from the plurality of cluster nodes, receiving a revised cluster-license-info generated by detecting license violations in the cluster-license-info, and transmitting…
ADAPTIVE IDLE DETECTION IN A SOFTWARE-DEFINED DATA CENTER IN A HYPER-CONVERGED INFRASTRUCTURE
Granted: February 9, 2023
Application Number:
20230039875
An adaptive idle detection method determines whether software defined data centers (SDDCs) in a hyperconverged infrastructure (HCI) environment are idle. Idleness may be quantified via a coefficient of variation (CV) against resource usage, so as to adapt the idle detection method to SDDCs with different hardware specifications and workloads. Management overhead may also be filtered out by the idle detection method, and the idle detection method may use idleness scores to further reduce…