-
31.
公开(公告)号:US20190317817A1
公开(公告)日:2019-10-17
申请号:US15951523
申请日:2018-04-12
Applicant: VMware, Inc.
Inventor: Darren Brown , Junyuan Lin , Paul Pedersen , Keshav Mathur , Leah Nutman , Peng Gao , Xing Wang
Abstract: Computational methods and systems that proactively manage usage of computational resources of a distributed computing system are described. A sequence of metric data representing usage of a resource is detrended to obtain a sequence of non-trendy metric data. Stochastic process models, a pulse wave model and a seasonal model of the sequence of non-trendy metric data are computed. When a forecast request is received, a sequence of forecasted metric data is computed over a forecast interval based on the estimated trend and one of the pulse wave or seasonal model that matches the periodicity of the sequence of non-trendy metric data. Alternatively, the sequence of forecasted metric data is computed based on the estimated trend and the stochastic process model with a smallest accumulated residual error. Usage of the resource by virtual objects of the distributed computing system may be adjusted based on the sequence of forecasted metric data.
-
公开(公告)号:US10268534B2
公开(公告)日:2019-04-23
申请号:US15366640
申请日:2016-12-01
Applicant: VMware, Inc.
Inventor: Darren Brown , Jeremy OlmstedThompson , Nicholas Kushmerick
Abstract: Methods and systems to narrow a search for potential sources of problems in a distributed computing system are described. A volatile event type of event messages recorded in an event-log file is identified. The volatile event type is an event type that may have unexpectedly increased in frequency over an observation time window. An historical period of time may be selected to search for potential sources of the volatile event type. Frequencies of event messages in the event-log file with the same event type as the volatile event type are determined for time intervals of the historical period of time. A time interval of the historical period of time with a largest increase in frequency of event messages is identified. A list of event messages of the event-log file in a selected sub-time interval of the sub-time intervals of the time interval are displayed in a graphical user interface.
-
33.
公开(公告)号:US10061566B2
公开(公告)日:2018-08-28
申请号:US15286291
申请日:2016-10-05
Applicant: VMware, Inc.
Inventor: Darren Brown , Nicholas Kushmerick , Matt Roy McLaughlin , Dhaval Gada , Junyuan Lin
CPC classification number: G06F9/542 , G06F9/5077 , G06F11/362
Abstract: Methods and systems to identify log write instructions of a source code as potential sources of an event message of interest are described. Methods identify non-parametric tokens, such as text strings and natural language words and phrases, of an event message of interest. Candidate log write instructions and associated line numbers in a source code are identified. Non-parametric tokens of each event message of the one or more candidate log write instructions are determined. A confidence score is calculated for each candidate log write instruction based the number of non-parametric tokens the event message of interest and event message of the candidate log write instruction have in common. The candidate log write instructions are rank ordered based on the corresponding one or more confidence scores and the rank ordered candidate log write instructions and associated line numbers of the source code may be displayed in a graphical user interface.
-
公开(公告)号:US20180097687A1
公开(公告)日:2018-04-05
申请号:US15286337
申请日:2016-10-05
Applicant: VMware, Inc.
Inventor: Darren Brown
IPC: H04L12/24
CPC classification number: H04L41/0609 , H04L41/069 , H04L41/22 , H04L67/10 , H04L67/1097 , H04L67/36
Abstract: Methods and systems to identify and respond to low-priority event messages are described. Methods identify types of event messages recorded in event-log files as low-priority event messages. Methods enable an information technology (“IT”) administrator, or other user, to determine which low-priority event messages may be deleted, how the low-priority event messages may be sampled for storage, or how long the low-priority event messages may be stored in a data-storage device.
-
公开(公告)号:US20240111608A1
公开(公告)日:2024-04-04
申请号:US17955367
申请日:2022-09-28
Applicant: VMware, Inc.
Inventor: Darren Brown , Anil Sharma , Ashok Kumar
CPC classification number: G06F9/5088 , G06F9/5077 , G06F9/546
Abstract: The current document is directed to event-message collection, processing, and storage systems and, in particular, to event-message collection, processing, and storage computing systems that are configurable to facilitate scaling, load balancing, and selection of a centralizing/decentralizing level which, in turn, provide a variety of operational efficiencies and advantages. Decentralization combined with event-record filtering, in a described implementation, provides for a significant reduction in data-transmission, processing, and data-storage overheads. Dynamic reconfiguration of the components of the event-message collection, processing, and storage systems allows for increased precision in scaling and load balancing to adapt the event-message collection, processing, and storage systems to dynamically reconfigured distributed computer systems in which the event-message collection, processing, and storage systems run.
-
公开(公告)号:US11693918B2
公开(公告)日:2023-07-04
申请号:US17382676
申请日:2021-07-22
Applicant: VMware, Inc.
Inventor: Anil Sharma , Darren Brown , Ashok Kumar
IPC: G06F11/00 , G06F17/40 , G06F9/455 , G06F11/34 , G06F11/07 , G06F11/30 , G06F18/22 , G06F18/23213
CPC classification number: G06F17/40 , G06F9/45558 , G06F11/0787 , G06F11/3006 , G06F11/3476 , G06F18/22 , G06F18/23213 , G06F2009/4557 , G06F2009/45595
Abstract: Computer-implemented methods and systems described herein are directed to reducing volumes of log messages sent from edge systems to a data center. The computer-implemented methods performed at each edge system includes collecting a stream of log messages generated by one or more event sources of the edge system. Representative log messages of the stream of log messages are determined. The edge systems may discard non-representative log messages from data storage devices at the edge system. The representative log messages are sent from each of the edge systems to the data center where the representative log messages are received and stored in data storage devices of the data center, thereby reducing the volumes of log messages sent from the edge systems to the data center.
-
公开(公告)号:US20230179539A1
公开(公告)日:2023-06-08
申请号:US17540288
申请日:2021-12-02
Applicant: VMware, Inc.
Inventor: Darren Brown , Paul Pedersen
CPC classification number: H04L47/808 , H04L41/22 , H04L47/745 , H04L47/781 , H04L47/823
Abstract: Examples herein include systems and methods for providing capacity forecasting for high-usage periods of a computing infrastructure. An example method can include segmenting a first portion of a data stream and generating a first core set for a forecasting model that predicts future usage of computing resources. The example method can further include segmenting a second portion of the data stream, generating a second core set, and using both core sets to forecast usage. The first core set can then be phased out after a predetermined time period has elapsed such that forecasting is based only on the second core set. The example method can further include defining at least two clusters of data and performing predictive analysis on that specific cluster. Cluster-specific results can be displayed on a GUI, which can also provide a user with options for increase or decrease computing resources based on the predictions.
-
公开(公告)号:US11640465B2
公开(公告)日:2023-05-02
申请号:US16682549
申请日:2019-11-13
Applicant: VMware, Inc.
Inventor: Darren Brown , Paul Pedersen , Keshav Mathur , Junyuan Lin , Nicholas Kushmerick , Jinyi Lu , Xing Wang , Peng Gao
Abstract: Computational methods and systems for detecting and troubleshooting anomalous behavior in distributed applications executing in a distributed computing system are described herein. Methods and systems discover nodes comprising the application. Anomaly detection monitors the metrics associated with the nodes for anomalous behavior in order to identify an approximate point in time when anomalous behavior begins to adversely impact performance of the application. Anomaly detection also monitors logs messages associated with the nodes to detect anomalous behavior recorded in the log messages. When anomalous behavior is detected in either the metrics and/or the log messages an alert identifying the anomalous behavior is generated. Troubleshooting guides an administrator and/or application owner to investigate the root cause of the anomalous behavior. Appropriate remedial measures may be determined based on the root cause and automatically or manually executed to correct the problem.
-
39.
公开(公告)号:US11281520B2
公开(公告)日:2022-03-22
申请号:US16893778
申请日:2020-06-05
Applicant: VMware, Inc.
Inventor: Jinyi Lu , Xing Wang , Shafi Khan , Apolak Borthakur , Paul Pedersen , Darren Brown , Gopal Harikumar
Abstract: Automated methods and systems described herein are directed to identifying potential root causes of a problem in a data center. Methods and systems receipt an alert or other notification of a problem occurring in a data center and a time when the problem was noticed. A search window is created based on the time and a stream of log messages generated in the search window is converted into a time dependent metric. An anomaly detection technique is applied to the metric to determine a start time of a problem. Logging events and key phrases in the log messages are identified in the search window and presented as potential root causes of the problem. The potential root cause may then be used by system administrators and/or tenants to diagnose the problem and execute remedial measures to correct the problem.
-
公开(公告)号:US20210160307A1
公开(公告)日:2021-05-27
申请号:US17165809
申请日:2021-02-02
Applicant: VMware, Inc.
Inventor: Darren Brown , Nicholas Kushmerick , Junyuan Lin , Matt Roy McLaughlin , Jon Herlocker
Abstract: The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. A log-file-analysis subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to identify subsets of log-file entries that predict anomalies and impending problems in the distributed computer system. In many implementations, a numerical comparison of probability distributions of log-file-entry types is used to detect state changes in the distributed computer system.
-
-
-
-
-
-
-
-
-