MULTI-NETWORK/DOMAIN SERVICE DISCOVERY IN A CONTAINER ORCHESTRATION PLATFORM

    公开(公告)号:US20230291796A1

    公开(公告)日:2023-09-14

    申请号:US18319690

    申请日:2023-05-18

    Applicant: VMware, Inc.

    CPC classification number: H04L67/1014 H04L43/0817 H04L67/1008 H04L67/1029

    Abstract: A computer-implemented method, medium, and system for multi-network/domain service discovery in a container orchestration platform are disclosed. In one computer-implemented method, a pool of servers with a plurality of network interface controllers (NICs) is created in a load balancer and by an operator in a worker node of a container orchestration platform, where each of the plurality of NICs is defined by a corresponding network attachment definition (NAD) object of a plurality of NAD objects. A virtual service object is generated using an annotation corresponding to the plurality of NAD objects. The virtual service object is associated to the pool of servers with the plurality of NICs. An internet protocol (IP) address of the virtual service object is transmitted to the container orchestration platform to update a status of a service object in the container orchestration platform using the IP address.

    TIME SERIES DATABASE COMPRISING A PLURALITY OF TIME SERIES DATABASE SCHEMAS

    公开(公告)号:US20230289330A1

    公开(公告)日:2023-09-14

    申请号:US18123100

    申请日:2023-03-17

    Applicant: VMware, Inc.

    Inventor: Clement PANG

    CPC classification number: G06F16/211 G06F16/283 G06F16/2477

    Abstract: In a computer-implemented method for operating on a time series database including a plurality of time series database schemas, a query of a time series database is received, wherein the time series database includes a plurality of time series database schemas, and wherein each received data point is stored according to each time series database schema of the plurality of time series database schemas, such that the time series database comprises multiple instances of each data point. A query plan is generated according to the query and the plurality of time series database schemas corresponding to a time range.

    Application topology visualization
    237.
    发明授权

    公开(公告)号:US11757721B2

    公开(公告)日:2023-09-12

    申请号:US17154612

    申请日:2021-01-21

    Applicant: VMware, Inc.

    CPC classification number: H04L41/12 H04L41/065 H04L41/0627 H04L41/22

    Abstract: A computer-implemented system and method of application topology visualization of a computing environment is disclosed. The application topology visualization obtains relationship data for a plurality of managed components, wherein the plurality of managed components have an application operating thereon. Event data for the plurality of managed components is also obtained. An application topology visualizer is used to generate the application topology visualization of the computing environment including the plurality of managed components, wherein the application topology visualization uses the relationship data and the event data for the plurality of managed components. A graphical user interface is used to display the application topology visualization of the computing environment as a single page.

    Optimizing file access statistics collection

    公开(公告)号:US11755537B2

    公开(公告)日:2023-09-12

    申请号:US17202342

    申请日:2021-03-15

    Applicant: VMware, Inc.

    CPC classification number: G06F16/1734 G06F21/6218 G06N5/04 G06N20/00

    Abstract: Optimizing file access includes a process for identifying a file access event for a first accessed file, and incrementing a first access counter in an access list in a memory, which also includes access counters for other accessed files. The process further includes exporting the first access counter to a performance monitoring dashboard, or exporting to a storage allocator and, based on the value, moving the first accessed file between a first storage and a second storage. The process also includes determining whether the value of the first access counter meets a first threshold, or a sum of values of the access counters for the other accessed files meets a second threshold. Based on meeting the first threshold or meeting the second threshold, the process includes persisting the access counters on a storage media. The access counters also provide security monitoring (e.g., identifying excessive file access).

Patent Agency Ranking