Patents by Inventor Junyuan LIN
Junyuan LIN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190317817Abstract: Computational methods and systems that proactively manage usage of computational resources of a distributed computing system are described. A sequence of metric data representing usage of a resource is detrended to obtain a sequence of non-trendy metric data. Stochastic process models, a pulse wave model and a seasonal model of the sequence of non-trendy metric data are computed. When a forecast request is received, a sequence of forecasted metric data is computed over a forecast interval based on the estimated trend and one of the pulse wave or seasonal model that matches the periodicity of the sequence of non-trendy metric data. Alternatively, the sequence of forecasted metric data is computed based on the estimated trend and the stochastic process model with a smallest accumulated residual error. Usage of the resource by virtual objects of the distributed computing system may be adjusted based on the sequence of forecasted metric data.Type: ApplicationFiled: April 12, 2018Publication date: October 17, 2019Applicant: VMware, Inc.Inventors: Darren Brown, Junyuan Lin, Paul Pedersen, Keshav Mathur, Leah Nutman, Peng Gao, Xing Wang
-
Publication number: 20190163603Abstract: This disclosure is directed to tagging tokens or sequences of tokens in log messages generated by a logging source. Event types of log messages in a block of log messages are collected. A series of tagging operations are applied to each log message in the block. For each tagging operation, event types that are qualified to receive the corresponding tag are identified. When a log message is received, the event type is determined and compared with the event types of the block in order to identify a matching event type. The series of tagging operations are applied to the log message to generate a tagged log message with the restriction that each tagging operation only applies a tag to token or sequences of tokens when the event type is qualified to receive the tag. The tagged log message is stored in a data-storage device.Type: ApplicationFiled: November 28, 2017Publication date: May 30, 2019Applicant: VMare, Inc.Inventors: Darren Brown, Nicholas Kushmerick, Junyuan Lin
-
Publication number: 20190155953Abstract: The current document is directed to systems, and methods incorporated within the systems, that execute queries against log-file entries. A monitoring subsystem within a distributed computer system uses query results during analysis of log-file entries in order to detect changes in the state of the distributed computer system, identify problems or potential problems, and predict and forecast system characteristics. Because of the large numbers of log-file-entry containers that may need to be opened and processed in order to execute a single query, and because opening and reading through the entries in a log-file-entry container is a computationally expensive and time-consuming operation, the currently disclosed systems employ event-type metadata associated with log-file-entry containers to avoid opening and reading through the log-file entries of log-file-entry containers that do not contain log-file entries with event types relevant to the query.Type: ApplicationFiled: November 17, 2017Publication date: May 23, 2019Applicant: VMware, Inc.Inventors: Darren Brown, Nicholas Kushmerick, Mayank Agarwal, Junyuan Lin
-
Patent number: 10205627Abstract: The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are normalized to identify non-parameter tokens within the event messages. The non-parameter event tokens are used to compute a metric for each event message. The metrics are used, in turn, to identify a type-associated cluster to which to assign each received event message. The type-associated clusters are created dynamically as streams of event messages are processed. The type-associated clusters may be dynamically split and merged to refine event-message typing.Type: GrantFiled: June 24, 2014Date of Patent: February 12, 2019Assignee: VMware, Inc.Inventors: Nicholas Kushmerick, Junyuan Lin
-
Patent number: 10120928Abstract: The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to event-message clusters based on non-parameter tokens identified within the event messages. A parsing function is generated for each cluster that is used to extract data from incoming event messages and to prepare event records from event messages that more efficiently and accessible store event information. The parsing functions also provide an alternative basis for assignment of event massages to clusters.Type: GrantFiled: June 30, 2014Date of Patent: November 6, 2018Assignee: VMware, Inc.Inventors: Nicholas Kushmerick, Junyuan Lin
-
Patent number: 10116675Abstract: Methods and systems that detect computer system anomalies based on log file sampling are described. Computers systems generate log files that record various types of operating system and software run events in event messages. For each computer system, a sample of event messages are collected in a first time interval and a sample of event messages are collected in a recent second time interval. Methods calculate a difference between the event messages collected in the first and second time intervals. When the difference is greater than a threshold, an alert is generated. The process of repeatedly collecting a sample of event messages in a recent time interval, calculating a difference between the event messages collected in the recent and previous time intervals, comparing the difference to the threshold, and generating an alert when the threshold is violated may be executed for each computer system of a cluster of computer systems.Type: GrantFiled: December 8, 2015Date of Patent: October 30, 2018Assignee: VMware, Inc.Inventors: Darren Brown, Junyuan Lin, Nicholas Kushmerick
-
Methods and systems to identify log write instructions of a source code as sources of event messages
Patent number: 10061566Abstract: Methods and systems to identify log write instructions of a source code as potential sources of an event message of interest are described. Methods identify non-parametric tokens, such as text strings and natural language words and phrases, of an event message of interest. Candidate log write instructions and associated line numbers in a source code are identified. Non-parametric tokens of each event message of the one or more candidate log write instructions are determined. A confidence score is calculated for each candidate log write instruction based the number of non-parametric tokens the event message of interest and event message of the candidate log write instruction have in common. The candidate log write instructions are rank ordered based on the corresponding one or more confidence scores and the rank ordered candidate log write instructions and associated line numbers of the source code may be displayed in a graphical user interface.Type: GrantFiled: October 5, 2016Date of Patent: August 28, 2018Assignee: VMware, Inc.Inventors: Darren Brown, Nicholas Kushmerick, Matt Roy McLaughlin, Dhaval Gada, Junyuan Lin -
Publication number: 20180165173Abstract: The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, event messages are assigned types and transformed into event records with well-defined fields that contain field values. Recurring patterns of event messages, referred to as “transactions,” are identified within streams or sequences of time-associated event messages and streams or sequences of time-associated event records.Type: ApplicationFiled: December 14, 2016Publication date: June 14, 2018Applicant: VMware, Inc.Inventors: Junyuan Lin, Nicholas Kushmerick, Jon Herlocker
-
METHODS AND SYSTEMS TO IDENTIFY LOG WRITE INSTRUCTIONS OF A SOURCE CODE AS SOURCES OF EVENT MESSAGES
Publication number: 20180095731Abstract: Methods and systems to identify log write instructions of a source code as potential sources of an event message of interest are described. Methods identify non-parametric tokens, such as text strings and natural language words and phrases, of an event message of interest. Candidate log write instructions and associated line numbers in a source code are identified. Non-parametric tokens of each event message of the one or more candidate log write instructions are determined. A confidence score is calculated for each candidate log write instruction based the number of non-parametric tokens the event message of interest and event message of the candidate log write instruction have in common. The candidate log write instructions are rank ordered based on the corresponding one or more confidence scores and the rank ordered candidate log write instructions and associated line numbers of the source code may be displayed in a graphical user interface.Type: ApplicationFiled: October 5, 2016Publication date: April 5, 2018Applicant: VMware, Inc.Inventors: Darren Brown, Nicholas Kushmerick, Matt Roy Mclaughlin, Dhaval Gada, Junyuan Lin -
Publication number: 20170163669Abstract: Methods and systems that detect computer system anomalies based on log file sampling are described. Computers systems generate log files that record various types of operating system and software run events in event messages. For each computer system, a sample of event messages are collected in a first time interval and a sample of event messages are collected in a recent second time interval. Methods calculate a difference between the event messages collected in the first and second time intervals. When the difference is greater than a threshold, an alert is generated. The process of repeatedly collecting a sample of event messages in a recent time interval, calculating a difference between the event messages collected in the recent and previous time intervals, comparing the difference to the threshold, and generating an alert when the threshold is violated may be executed for each computer system of a cluster of computer systems.Type: ApplicationFiled: December 8, 2015Publication date: June 8, 2017Applicant: VMware, Inc.Inventors: Darren Brown, Junyuan Lin, Nicholas Kushmerick
-
Publication number: 20160373293Abstract: The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to event-message clusters based on non-parameter tokens identified within the event messages. A parsing function is generated for each cluster that is used to extract data from incoming event messages and to prepare event records from event messages that more efficiently and accessible store event information. The parsing functions also provide an alternative basis for assignment of event messages to clusters. Event types associated with the clusters are used for gathering information from various information sources with which to automatically annotate event messages displayed to system administrators, maintenance personnel, and other users of event messages.Type: ApplicationFiled: August 30, 2016Publication date: December 22, 2016Applicant: VMware, Inc.Inventors: Nicholas Kushmerick, Matt Roy McLaughlin, Darren Brown, Junyuan Lin
-
Publication number: 20160277268Abstract: The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. A log-file-analysis subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to identify subsets of log-file entries that predict anomalies and impending problems in the distributed computer system. In many implementations, a numerical comparison of probability distributions of log-file-entry types is used to detect state changes in the distributed computer system.Type: ApplicationFiled: March 17, 2015Publication date: September 22, 2016Applicant: VMware, Inc.Inventors: Darren Brown, Nicholas Kushmerick, Junyuan Lin, Matt Roy McLaughlin, Jon Herlocker
-
Patent number: 9244755Abstract: Large amounts of unstructured log data generated by software and infrastructure components of a computing system are processed and analyzed in real time to identify anomalies and potential problems within the computing system. A log analytics module reduces both the volume and level of detail of log data by first classifying log messages into message types based on their content similarity. The log analytics module may then further reduce data by grouping bursts of log messages into log events. Patterns within these log events, such as the collection and number of different message types that comprise the event, can be used to identify anomalous events.Type: GrantFiled: May 20, 2013Date of Patent: January 26, 2016Assignee: VMware, Inc.Inventors: Mark Huang, Junyuan Lin
-
Publication number: 20150372855Abstract: The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are normalized to identify non-parameter tokens within the event messages. The non-parameter event tokens are used to compute a metric for each event message. The metrics are used, in turn, to identify a type-associated cluster to which to assign each received event message. The type-associated clusters are created dynamically as streams of event messages are processed. The type-associated clusters may be dynamically split and merged to refine event-message typing.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Applicant: VMware, Inc.Inventors: Nicholas Kushmerick, Junyuan Lin
-
Publication number: 20150370885Abstract: The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to event-message clusters based on non-parameter tokens identified within the event messages. A parsing function is generated for each cluster that is used to extract data from incoming event messages and to prepare event records from event messages that more efficiently and accessible store event information. The parsing functions also provide an alternative basis for assignment of event massages to clusters.Type: ApplicationFiled: June 30, 2014Publication date: December 24, 2015Applicant: VMware, Inc.Inventors: Nicholas Kushmerick, Junyuan Lin
-
Publication number: 20150370799Abstract: The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to clusters based on metrics computed for the event messages. In addition, a significance value is determined for each received event message. When the significance value exceeds a threshold value, one or more actions are taken, including marking an event record corresponding to the event message, storing an event record corresponding to the event message in a significant-event log, and generating a notice or alarm.Type: ApplicationFiled: June 30, 2014Publication date: December 24, 2015Applicant: VMware, Inc.Inventors: Nicholas Kushmerick, Junyuan Lin
-
Publication number: 20140344622Abstract: Large amounts of unstructured log data generated by software and infrastructure components of a computing system are processed and analyzed in real time to identify anomalies and potential problems within the computing system. A log analytics module reduces both the volume and level of detail of log data by first classifying log messages into message types based on their content similarity. The log analytics module may then further reduce data by grouping bursts of log messages into log events. Patterns within these log events, such as the collection and number of different message types that comprise the event, can be used to identify anomalous events.Type: ApplicationFiled: May 20, 2013Publication date: November 20, 2014Inventors: Mark HUANG, Junyuan LIN