Dynamic tracing of runtime data in a distributed system

    公开(公告)号:US11940898B2

    公开(公告)日:2024-03-26

    申请号:US17527188

    申请日:2021-11-16

    Applicant: VMware, Inc.

    CPC classification number: G06F11/3495 G06F11/0709 G06F11/0751

    Abstract: An administrator agent and local worker agents are provided in nodes of a distributed system to support dynamic tracing of runtime data. Trace profiles are associated with the nodes on which the local worker agents reside. The local worker agents monitor the runtime data for an error, and the administrator agent adjusts the trace profile(s) in response to the error(s). The administrator agent sends the adjusted trace profile(s) to the local worker agents, so as to enable trace output data of traces performed by the nodes to be increased or decreased.

    MAPPING VLAN OF CONTAINER NETWORK TO LOGICAL NETWORK IN HYPERVISOR TO SUPPORT FLEXIBLE IPAM AND ROUTING CONTAINER TRAFFIC

    公开(公告)号:US20230300002A1

    公开(公告)日:2023-09-21

    申请号:US17724433

    申请日:2022-04-19

    Applicant: VMware, Inc.

    CPC classification number: H04L12/4645 H04L41/122 H04L41/0803 G06F9/547

    Abstract: Some embodiments of the invention provide a method for adding routable subnets to a logical network that connects multiple machines and is implemented by a software defined network (SDN). The method receives an intent-based API that includes a request to add a routable subnet to the logical network. The method defines (i) a VLAN (virtual local area network) tag associated with the routable subnet, (ii) a first identifier associated with a first logical switch to which at least a first machine in the multiple machines that executes a set of containers belonging to the routable subnet attaches, and (iii) a second identifier associated with a second logical switch designated for the routable subnet. The method generates an API call that maps the VLAN tag and the first identifier to the second identifier. The method provides the API call to a management and control cluster of the SDN to direct the management and control cluster to implement the routable subnet.

    Logical overlay tunnel monitoring
    15.
    发明授权

    公开(公告)号:US11546242B2

    公开(公告)日:2023-01-03

    申请号:US17170900

    申请日:2021-02-09

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for logical overlay tunnel monitoring are described. One example may involve a first computer system obtaining control information identifying a list of multiple logical overlay tunnels to be monitored, including a first logical overlay tunnel between a first virtual tunnel endpoint (VTEP) and a second VTEP. Based on the control information, a first monitoring agent may configure and inject a probe packet at the first VTEP to cause the first VTEP to perform encapsulation and send an encapsulated probe packet over the first logical overlay tunnel. In response, an encapsulated response packet that includes a response packet may be received from the second monitoring agent over the first logical overlay tunnel. Based on the response packet, a tunnel performance metric associated with the first logical overlay tunnel may be determined.

    PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK

    公开(公告)号:US20150058463A1

    公开(公告)日:2015-02-26

    申请号:US14070346

    申请日:2013-11-01

    Applicant: VMware, Inc.

    Abstract: Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster.

    TRAFFIC MONITORING
    18.
    发明申请

    公开(公告)号:US20230101764A1

    公开(公告)日:2023-03-30

    申请号:US17507449

    申请日:2021-10-21

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method of aggregating and providing packet metrics collected during a live packet monitoring session performed for packets matching a specified set of characteristics. The method receives, from one or more computing devices that process packets during the live packet monitoring session, multiple metrics associated with a set of packets matching the specified set of characteristics. Metrics associated with each packet in the set are accompanied by a packet identifier (ID) used to tag the packet by an initial computing device that processed the packet. The method uses the accompanying packet IDs to aggregate the received plurality of metrics. The method provides (i) an aggregated set of session metrics for the set of packets matching the specified set of characteristics during the live packet monitoring session and (ii) individual packet metrics using the packet IDs for at least one packet in the set of packets.

    PRACTICAL OVERLAY NETWORK LATENCY MEASUREMENT IN DATACENTER

    公开(公告)号:US20220217068A1

    公开(公告)日:2022-07-07

    申请号:US17700060

    申请日:2022-03-21

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method of identifying packet latency in a software defined datacenter (SDDC) that includes a network and multiple host computers executing multiple machines. At a first host computer, the method identifies and stores (i) multiple time values associated with several packet processing operations performed on a particular packet sent by a first machine executing on the first host computer, and (ii) a time value associated with packet transmission through the SDDC network from the first host computer to a second host computer that is a destination of the particular packet. The method provides the stored time values to a set of one or more controllers to process to identify multiple latencies experienced by multiple packets processed in the SDDC.

Patent Agency Ranking