Methods for synchronizing configurations between computing systems using human computer interfaces

    公开(公告)号:US10721121B2

    公开(公告)日:2020-07-21

    申请号:US15836398

    申请日:2017-12-08

    Applicant: Nutanix, Inc.

    Abstract: Computer-aided computer system configuration techniques for adding new computing resources to an existing set of computing resources. A method embodiment commences upon identifying an existing computing system having a first set of configuration parameters. A second computing system having a second set of configuration parameters is deployed. A user interface is provided to accept user input comprising a location and protocol to access the existing computing system. Syntactical and semantic differences between the configuration parameters of the existing computing system and those of the newly added set are identified. The identified differences are analyzed to generate a parameter map that relates the existing set of configuration parameters to the second set of configuration parameters and vice-versa. Relationships that are codified in the parameter map are validated through user interactions. The second set of configuration parameters are modified or augmented such that parameters can be synchronized between the two computing systems.

    Creation of security policies using a visual approach

    公开(公告)号:US11057432B2

    公开(公告)日:2021-07-06

    申请号:US15949901

    申请日:2018-04-10

    Applicant: Nutanix, Inc.

    Abstract: A request to create a set of security policies for an application is received at a graphical user interface. Information identifying a set of source VMs, a set of destination VMs, and a set of target VMs also are received, wherein the target VMs are executing the application and are supported by (a) node(s) in a clustered virtualization environment. A set of inbound rules identifying (a) category(ies) of source VMs permitted to initiate connections with a subset of target VMs and a set of outbound rules identifying (a) category(ies) of destination VMs to which the subset of target VMs are permitted to initiate connections are received at the graphical user interface. Upon receiving a request to apply the security policies, the policies are configured based at least in part on the inbound and outbound rules and a visual representation of the security policies is presented in the graphical user interface.

Patent Agency Ranking