Patents Assigned to VMware, Inc.
  • Publication number: 20250133019
    Abstract: Some embodiments provide a method for configuring a network to bridge data messages between a hardware-implemented L2 overlay network segment and a software-implemented L2 overlay network segment. The method identifies a host computer on which a logical network endpoint connected to the software-implemented overlay executes. The hardware-implemented L2 overlay connects at least a first set of network endpoints located in a first physical network zone and connected to a first L2 network segment and a second set of network endpoints located in a second physical network zone and connected to a second L2 network segment. The identified host computer is located in the first physical network zone. The method configures a forwarding element executing on the host computer to bridge data messages between the logical network endpoint and (i) the first set of network endpoints and (ii) the second set of network endpoints.
    Type: Application
    Filed: October 19, 2023
    Publication date: April 24, 2025
    Applicant: VMware, Inc.
    Inventors: Mukesh Hira, Hongwei Zhu, Bo Hu
  • Publication number: 20250130830
    Abstract: Managing cloud snapshots in a development platform is described herein. One example method includes creating a snapshot of a virtual computing instance (VCI), provided by a cloud provider, using a development platform, receiving a request to revert to the snapshot, and performing a revert operation responsive to receiving the request. The revert operation can include creating a new boot disk on the cloud provider to replace a current boot disk in the development platform, creating a new data disk to replace a current data disk associated with the VCI, powering off the VCI and detaching the boot disk and the data disk, attaching the new boot disk and the new data disk to the VCI, powering on the VCI, and deleting the detached boot disk and the detached data disk.
    Type: Application
    Filed: October 20, 2023
    Publication date: April 24, 2025
    Applicant: VMware, Inc.
    Inventors: Nikola Bratanov, Ventsyslav Raikov, Plamen Veselinov Peev, Kristina Zhelyazkova, Ina Uzunova
  • Publication number: 20250130871
    Abstract: This disclosure is directed to automated computer-implemented methods for application discovery from log messages generated by event sources of applications executing in a cloud infrastructure. The methods are executed by an operations manager that constructs a data frame of probability distributions of event types of the log messages generated by the event sources in a time period. The operations manager executes clustering techniques that are used to form clusters of the probability distributions in the data frame, where each of the clusters corresponds to one of the applications. The operations manager displays the clusters of the probability distributions in a two-dimensional map of applications in a graphical user interface that enables a user to select one of the clusters in the map of applications that corresponds to one of the applications and launch clustering of probability distributions of the user-selected cluster to discover two or more instances of the application.
    Type: Application
    Filed: October 18, 2023
    Publication date: April 24, 2025
    Applicant: VMware, Inc.
    Inventors: Ashot Nshan Harutyunyan, Arnak Poghosyan, Tigran Bunarjyan, Andranik Haroyan, Marine Harutyunyan, Litit Harutyunyan, Ashot Baghdasaryan
  • Publication number: 20250125892
    Abstract: Some embodiments of the invention provide a method for an interference detection RAN application deployed across one or more RICs for detecting and identifying external interference in a RAN that includes multiple RAN base stations servicing users located across multiple regions, each region including at least one RAN base station. The method is performed for a particular region serviced by a particular RAN base station. The method detects an interference incident associated with the particular region. The method analyzes a pattern of spectrum interference associated with the particular region. Based on said analysis, the method determines whether the pattern of spectrum interference matches a first signature pattern associated with internal interference or a second signature pattern associated with external interference.
    Type: Application
    Filed: October 11, 2023
    Publication date: April 17, 2025
    Applicant: VMware, Inc.
    Inventors: Yang Yang, Fernanda Campello, Islam Elabbasy
  • Publication number: 20250117236
    Abstract: Site reliability engineering (SRE) may be provided as a service to software products, such as an on-premises software product residing at a first computing environment. A SRE service site may be hosted at a second computing environment that is remote and separate from the first computing environment. A SRE agent resides at the first computing environment to monitor the software product, and provides information, such as metric data or log information pertaining to the software product, to the SRE service site. A SRE service of the SRE service site performs analysis of the information to identify an issue with the software product, diagnosis to determine a cause of the issue, and identifies a remediation that may be applied by the SRE agent to address the issue.
    Type: Application
    Filed: October 8, 2023
    Publication date: April 10, 2025
    Applicant: VMware, Inc.
    Inventors: Ziyou WANG, Donghai HAN
  • Publication number: 20250119418
    Abstract: Example methods and systems for connection establishment in a global server load balancer (GSLB) environment are described. In one example, a computer system may establish a first connection with a first entity and a second connection with the second entity. The first connection may be established based on first parameter information that includes a shared certificate and a first identifier (ID). The second connection may be established based on second parameter information that includes the shared certificate and a second ID. The shared certificate may be shared by multiple entities that include the first entity and a second entity. In response to receiving a first request, a first response may be generated and sent towards the first entity via the first connection. In response to receiving a second request, a second response may be generated and sent towards the second entity via the second connection.
    Type: Application
    Filed: October 8, 2023
    Publication date: April 10, 2025
    Applicant: VMware, Inc.
    Inventors: Ravi Kumar Reddy KOTTAPALLI, Sudarshana KANDACHAR SRIDHARA RAO, Venkata Swamy Babu BUDUMURU, Dinesh Kumar KAMALAKANNAN, Prasanna Kumar SUBRAMANYAM, Vidya KOTEESWARAN, Prashant MISHRA, Santosh SINGH
  • Publication number: 20250111251
    Abstract: Automated computer-implemented methods and systems for troubleshooting and resolving problems with objects of a cloud infrastructure are described herein. In response to detecting abnormal behavior of an object running in the cloud infrastructure based on a key performance indicator (“KPI”) of the object, a graphical user interface (“GUI”) is displayed to enable a user to select KPIs of components of the object. For each of the components, a separate rule learning engine is deployed to generate rules for detecting a problem with the component based on the KPI of the object and the KPIs of the component. The rules are subsequently used to detect a runtime problem with the object and display in the GUI remedial measures for resolving the problem. Remedial measures are automatically executed to resolve the problem with the object via the GUI.
    Type: Application
    Filed: October 3, 2023
    Publication date: April 3, 2025
    Applicant: VMware, Inc.
    Inventors: Arnak Poghosyan, Ashot Nshan Harutyunyan, Eduard Amirkhanyan, Tigran Mkrtchyan, Avetik Havhannisyan, Vahe Minasyan, Hakob Arakelyan
  • Publication number: 20250103594
    Abstract: In a computer-implemented method for cardinality-based index caching of time series data, a cardinality of an index of a time series data monitoring system is determined. The cardinality of the index is compared to a cardinality threshold. Responsive to determining that the cardinality of the index exceeds the cardinality threshold, the index is cached in a local memory cache of a query node of the times series data monitoring system. Responsive to determining that the cardinality of the index does not exceed the cardinality threshold, the index is cached in a distributed memory cache of the times series data monitoring system.
    Type: Application
    Filed: September 26, 2023
    Publication date: March 27, 2025
    Applicant: VMware, Inc.
    Inventors: Manoj RAMAKRISHNAN, Rourke RABINOWITZ
  • Publication number: 20250071062
    Abstract: Example methods and systems for receive side scaling (RSS) are described. In one example, a computer system may generate and send instruction(s) to the programmable physical network interface controller (PNIC) to configure a first flow entry that associates a first packet flow with a first queue and a second flow entry that associates a second packet flow with a second queue. In response to receiving a first packet that is associated with the first packet flow, the programmable PNIC may match the first packet with the first flow entry and steer the first packet towards the first queue for processing by a first processing thread. In response to receiving a second packet that is associated with the second packet flow, the programmable PNIC may match the second packet with the second flow entry and steer the second packet towards the second queue for processing by a second processing thread.
    Type: Application
    Filed: August 25, 2023
    Publication date: February 27, 2025
    Applicant: VMware, Inc.
    Inventors: Guolin YANG, Ankur Kumar SHARMA, Wenyi JIANG
  • Publication number: 20250063470
    Abstract: Some embodiments of the invention provide a method for providing asymmetric route resolutions in an SD-WAN. The method is performed at a first edge router at a first site in a first region connected by the SD-WAN. From a first hub router of a first cluster, the method receives a flow sent by a second edge router at a second site in a second region via a first route that points to a next-hop second hub router of a second cluster. The method identifies a default second route from the first edge router to the second edge router pointing to a next-hop third hub router of the second cluster. When the first route includes secure overlay tunnels, and source addresses of the first packet flow and the first route match, the method uses the first route to send a return flow to the second edge router to ensure symmetric routing.
    Type: Application
    Filed: August 16, 2023
    Publication date: February 20, 2025
    Applicant: VMware, Inc.
    Inventors: Arun Kumar Srinivasan, Navaneeth Krishnan Ramaswamy, Sumit Mundhra, Saravanan Kandasamy, Balaji Shanmugam
  • Publication number: 20250053496
    Abstract: This disclosure is directed to automated computer-implemented methods and systems for detecting and correcting a trending problem with an application executing in a data center. The methods receive a new support request entered via a graphical user interface. The methods perform trend discovery of the new support request over recent time windows using a pre-trained and fine-tuned model bidirectional encoder representation from transformer. In response to detecting a trending problem described in the new support request, the method discovers recommended remedial measures for the new support request based on similar support requests previously recorded in a support request data store or on similar knowledge base articles previously recorded in a knowledge base data store. The recommended remedial measures for correcting the trending problem are executed using an operations manager of the data center.
    Type: Application
    Filed: August 10, 2023
    Publication date: February 13, 2025
    Applicant: VMware, Inc.
    Inventors: Ashot Baghdasaryan, Tigran Bunarjyan, Arnak Poghosyan, Ashot Nshan Harutyunyan, Jad El-Zein
  • Publication number: 20250036437
    Abstract: Some embodiments provide a method for configuring a first Pod in a container cluster to perform layer 7 (L7) services for a logical router. At a second Pod that performs logical forwarding operations for the logical router, the method receives configuration data for the logical router from a network management system that defines a logical network for which the logical router routes data messages and performs L7 services. The method provides a set of Pod definition data to a cluster controller to create the first Pod. After creation of the first Pod, the method provides to the first Pod (i) networking information to enable a connection between the first and second Pods and (ii) configuration data defining the L7 services for the first Pod to perform the L7 services on data traffic sent from the second Pod to the first Pod.
    Type: Application
    Filed: July 24, 2023
    Publication date: January 30, 2025
    Applicant: VMware, Inc.
    Inventors: Yu Ying, Pankaj Gupta, Kai-Wei Fan, Stephen Tan, Sreeram Kumar Ravinoothala, Yong Wang
  • Publication number: 20250028791
    Abstract: Example methods and systems for blockchain-based licensing as a service are described. In one example, a computer system may receive a first request to obtain a first license associated with a first product from a first client system. In response, the computer system may (a) select a first blockchain from multiple blockchains, and (b) generate and store a first non-fungible token (NFT) on the first blockchain to issue the first license. Further, the computer system may receive a second request to obtain a second license associated with the first product or a second product from a second client system. In response, the computer system may (a) select a second blockchain from multiple blockchains, and (b) generate and store a second NFT on the second blockchain to issue the second license.
    Type: Application
    Filed: August 30, 2023
    Publication date: January 23, 2025
    Applicant: VMware, Inc.
    Inventors: Bo LIN, Qi WU, Xi ZENG, Kai LOU, Dongping CHEN, Yi ZENG, Danyang LI, DongSheng SHEN, Donghai HAN
  • Publication number: 20250008345
    Abstract: Some embodiments of the invention provide a method for increasing system capacity of a RIC in a RAN, the RIC including a first datapath pod for forwarding communications between a first set of RAN applications connected to the RIC and a first set of base station components connected to the RIC. The method uses the first datapath pod to forward communications between the first set of RAN applications and the first set of base station components. The method determines that the first datapath pod has insufficient resources for forwarding traffic between the first set of base station components and the first set of RAN applications. Based on said determination, the method configures a second datapath pod on the RIC for forwarding traffic between the first set of base station components and the first set of RAN applications. The method assigns a first subset of the first set base station components to the first datapath pod and a second subset of the first set of base station components to the second datapath pod.
    Type: Application
    Filed: June 28, 2023
    Publication date: January 2, 2025
    Applicant: VMware, Inc.
    Inventor: Amit Singh
  • Publication number: 20240419530
    Abstract: Automated computer-implemented methods and systems for discovering incidents occurring with objects running in a data center and executing remedial measures that correct the incidents are described herein. The methods and systems discover clusters of alerts in a stream of alerts triggered by a stream of events occurring with objects in the data center. User feedback is used to identify alerts with related event types in each cluster of alerts that corresponds to separate incidents occurring in the data center. The methods and system compare a set of runtime alerts to each incident to determine one or more similar incidents to the set of runtime alerts. The one or more similar incidents and corresponding remedial measures are displayed in a GUI with each remedial measure selectable to launch an operation that corrects one of the problems represented by the one or more similar incidents.
    Type: Application
    Filed: June 16, 2023
    Publication date: December 19, 2024
    Applicant: VMware, Inc.
    Inventors: Ashot Nshan Harutyunyan, Arnak Poghosyan, Artur Grigoryan, Vahan Tadevosyan, Vahe Mikayelyan
  • Publication number: 20240378069
    Abstract: A remote desktop may be localized to a local operating system (OS), such that remote applications and remote files are accessible via the local OS, without having to launch a remote desktop client that renders a user interface (UI) for connection with the remote desktop. The remote desktop client runs in a background as one or more services without any UI. A user may access and use remote applications/files via the same UIs of the local OS that are used to access and use local applications/files.
    Type: Application
    Filed: May 8, 2023
    Publication date: November 14, 2024
    Applicant: VMware, Inc.
    Inventor: Lin LV
  • Publication number: 20240378092
    Abstract: Example methods and systems for cloud native network function deployment are described. One example may involve a computer system obtaining cluster configuration information associated with multiple single node clusters (SNCs). Based on the cluster configuration information, the computer system may configure (a) a first SNC on a first node and (b) a second SNC on a second node. The computer system may configure (a) a first virtual agent associated with the first SNC, and (b) a second virtual agent associated with the second SNC. In response to receiving a deployment request to deploy a first pod and a second pod, the computer system may process the deployment request by (a) deploying, using the first virtual agent, the first pod on the first SNC, and (b) deploying, using the second virtual agent, the second pod on the second SNC.
    Type: Application
    Filed: May 12, 2023
    Publication date: November 14, 2024
    Applicant: VMware, Inc.
    Inventors: Xiaojun LIN, Liang CUI, Chung-Ta CHENG, Aravind SRINIVASAN, Todd SABIN
  • Publication number: 20240370383
    Abstract: One example method for a host in a virtual storage area network (vSAN) cluster to support vSAN Internet small computer system interface (iSCSI) target services in a distributed storage system of a virtualization system is disclosed. The method includes obtaining ownership information of a target and determining, from the ownership information, whether the host is an owner of the target. In response to determining that the host is the owner of the target, the method further includes determining whether the host commits to a policy provided by the vSAN to support the vSAN iSCSI target services. In response to determining that the host fails to commit to the policy, the method includes reporting a warning message.
    Type: Application
    Filed: May 1, 2023
    Publication date: November 7, 2024
    Applicant: VMware, Inc.
    Inventors: Sixuan YANG, Yang YANG, Zhaohui GUO, Zhou HUANG, Jian ZHAO, Jianxiang ZHOU, Jin FENG
  • Publication number: 20240364501
    Abstract: This disclosure is directed to methods and systems that establish a secure data channel between a host and a disaggregated hardware device (“DHD”) of a data center. The system comprises an initiator host that runs objects, such as virtual machines and containers. The host includes an initiator smart network interface card (“SNIC”). The initiator SNIC includes a virtual device, a trust platform module (“TPM”) and a security engine. The system also comprises a target host equipped with a DHD and a target SNIC. The target SNIC includes a TPM and a security engine. The TPM and the security engine of the initiator SNIC and the TPM and the security engine of the target SNIC establish a secure data channel between an object running on the host and the DHD.
    Type: Application
    Filed: April 27, 2023
    Publication date: October 31, 2024
    Applicant: VMware, Inc.
    Inventors: Jin He, Bing Niu, Jinheng Xu, Juan Liu, Xiangjun Song
  • Publication number: 20240357339
    Abstract: This disclosure is directed to methods and system for intelligent roaming of user equipment (“UE”) of a home network onto a visited network. The methods and systems monitor performance of voice and data services for UEs in coverage areas of edge cell sites of the home network. The methods and systems determine which UEs in the coverage areas of the edge cell sites to roam on the visited network based on decreases in voice and data services. The UEs in the coverage areas selected for roaming are pushed to roam on the visited network by sending a signal that instructs selected UEs to switch into roaming mode while the UEs are still in the coverage areas of the edge cell sites.
    Type: Application
    Filed: April 21, 2023
    Publication date: October 24, 2024
    Applicant: VMware, Inc.
    Inventors: Yang Yang, Robert Soni, Rittwik Jana, Padma Sudarsan, Islam El abbasy