Traffic monitoring
    51.
    发明授权

    公开(公告)号:US11677645B2

    公开(公告)日:2023-06-13

    申请号:US17507449

    申请日:2021-10-21

    Applicant: VMware, Inc.

    CPC classification number: H04L43/028 H04L43/04 H04L43/10 H04L47/2483 H04L47/41

    Abstract: Some embodiments provide a method of aggregating and providing packet metrics collected during a live packet monitoring session performed for packets matching a specified set of characteristics. The method receives, from one or more computing devices that process packets during the live packet monitoring session, multiple metrics associated with a set of packets matching the specified set of characteristics. Metrics associated with each packet in the set are accompanied by a packet identifier (ID) used to tag the packet by an initial computing device that processed the packet. The method uses the accompanying packet IDs to aggregate the received plurality of metrics. The method provides (i) an aggregated set of session metrics for the set of packets matching the specified set of characteristics during the live packet monitoring session and (ii) individual packet metrics using the packet IDs for at least one packet in the set of packets.

    TIERING TO GROUP AND ACCESS CONTROL CLOUD NATIVE SECURITY POLICIES

    公开(公告)号:US20230171291A1

    公开(公告)日:2023-06-01

    申请号:US17570354

    申请日:2022-01-06

    Applicant: VMware, Inc.

    CPC classification number: H04L63/20

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing access to network security policies. One of the methods includes determining, for a policy access request i) received from a device and ii) that requests access to a network security policy that defines a rule for controlling network traffic, whether there is an entitlement for the network security policy, wherein the entitlement indicates one or more types of operations that a subset of user accounts can perform on the network security policy; in response to determining that there is an entitlement, determining, using a mapping for the entitlement that identifies the subset of user accounts that have access to the network security policy, whether a user account for the device is included in the subset of user accounts; and selectively allowing or denying the policy access request using the entitlement and a result of the determination.

    TAGGING PACKETS FOR MONITORING AND ANALYSIS

    公开(公告)号:US20230087454A1

    公开(公告)日:2023-03-23

    申请号:US17507453

    申请日:2021-10-21

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for performing data traffic monitoring. The method processes a packet through a packet processing pipeline that includes multiple stages. At a filtering stage, the method tags the packet with a set of monitoring actions for subsequent stages to perform on the packet based on a determination that the packet matches a particular filter. For each stage of a set of packet processing stages subsequent to the filtering stage, the method (i) executes any monitoring actions specified for the stage to perform on the packet and (ii) sends the packet to a next stage in the packet processing pipeline.

    Automatic configuring of VLAN and overlay logical switches for container secondary interfaces

    公开(公告)号:US11606254B2

    公开(公告)日:2023-03-14

    申请号:US17389305

    申请日:2021-07-29

    Applicant: VMware, Inc.

    Abstract: The method of some embodiments allocates a secondary network interface for a pod, which has a primary network interface, in a container network operating on an underlying logical network. The method receives an ND that designates a network segment. The method receives the pod, wherein the pod includes an identifier of the ND. The method then creates a secondary network interface for the pod and connects the secondary network interface to the network segment. In some embodiments, the pods include multiple ND identifiers that each identify a network segment. The method of such embodiments creates multiple secondary network interfaces and attaches the multiple network segments to the multiple secondary network interfaces.

    DHCP-communications monitoring by a network controller in software defined network environments

    公开(公告)号:US11509686B2

    公开(公告)日:2022-11-22

    申请号:US16442841

    申请日:2019-06-17

    Applicant: VMware, Inc.

    Abstract: In an embodiment, a computer-implemented method for DHCP-communications monitoring by a network controller in software defined networks is disclosed. A method comprises detecting that a virtualized compute instance is instantiated on a host computer; generating, and transmitting to a port manager executing on the host computer, instructions to set a BLOCK-EXCEPT-DHCP status on a port assigned to the virtualized compute instance; determining whether an IP address has been assigned to the port by a DHCP service; and if it has: generating, and transmitting to the port manager, instructions to set a NORMAL status on the port; generating, and transmitting to the port manager, a SpoofGuard configured with the IP address assigned to the port; based on notifications received from the SpoofGuard, determining whether the IP address assigned to the port of the virtualized compute instance has been misused, expired or spoofed; and if it has, transmitting instructions to set the BLOCK-EXCEPT-DHCP status on the port.

    Authentication for logical overlay network traffic

    公开(公告)号:US11470071B2

    公开(公告)日:2022-10-11

    申请号:US16852553

    申请日:2020-04-20

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for authentication for logical overlay network traffic are described. In one example, a first computer system may detect an inner packet and generate authentication information associated with the inner packet based on control information from a management entity. The authentication information may indicate that the inner packet originates from a trusted zone. The first computer system may further generate an encapsulated packet by encapsulating the inner packet with an outer header that specifies the authentication information, and send the encapsulated packet towards the second virtualized computing instance to cause a second computer system to verify that the inner packet originates from the trusted zone based on the authentication information.

    Adaptive packet flow monitoring in software-defined networking environments

    公开(公告)号:US11356362B2

    公开(公告)日:2022-06-07

    申请号:US16294945

    申请日:2019-03-07

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for a network management entity to perform adaptive packet flow monitoring. One example method may comprise receiving a request to monitor a packet flow between a first virtualized computing instance supported by a first host and a second virtualized computing instance supported by a second host. The method may also comprise activating a first set of checkpoints by instructing the first host and/or the second host to monitor the packet flow using the first set of checkpoints. The method may further comprise: in response to detecting a predetermined event based on first performance metric information associated with the packet flow, activating a second set of checkpoints by instructing the first host and/or the second host to monitor the packet flow using the second set of checkpoints.

    Dynamic plugin management for system health

    公开(公告)号:US11340916B2

    公开(公告)日:2022-05-24

    申请号:US17069132

    申请日:2020-10-13

    Applicant: VMware, Inc.

    Abstract: The disclosure provides an approach for providing an extendable system health management framework in a network. Embodiments include receiving, by a manager, a system health plugin. Embodiments include determining, by the manager, an association between the system health plugin and a host in the network based on the host satisfying one or more conditions. Embodiments include providing, by the manager, the system health plugin to the host for installation in a system health agent on the host. Embodiments include receiving, by the manager, from the host, status information for the system health plugin.

    Measuring the Memory Usage of Java Programs

    公开(公告)号:US20220107825A1

    公开(公告)日:2022-04-07

    申请号:US16482244

    申请日:2019-07-11

    Applicant: VMware, Inc.

    Abstract: Techniques for measuring the memory usage of Java programs are provided. In one set of embodiments, a Java agent can detect that a Java Virtual Machine (JVM) is loading a Java class used by a Java program. The Java agent can further determine a class name of the Java class and determine that the class name matches an entry in a first list included in a user-defined configuration file. The Java agent can then dynamically insert bytecode into a constructor of the Java class, where the inserted bytecode includes logic for registering a memory reference to an object created via the constructor.

Patent Agency Ranking