-
公开(公告)号:US11650868B2
公开(公告)日:2023-05-16
申请号:US17143203
申请日:2021-01-07
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Jobin Raju George , Nikhil Jaiswal , Pushkar Patil , Vaidic Joshi
IPC: G06F9/54
Abstract: The current document is directed to methods and systems that sample log/event messages for downstream processing by log/event-message systems incorporated within distributed computer facilities. The data-collection, data-storage, and data-querying functionalities of log/event-message systems provide a basis for distributed log-analytics systems which, in turn, provide a basis for automated and semi-automated system-administration-and-management systems. By sampling log/event-messages, rather than processing and storing every log/event-message generated within a distributed computer system, a log/event-message system significantly decreases data-storage-capacity, computational-bandwidth, and networking-bandwidth overheads involved in processing and retaining large numbers of log/event messages that do not provide sufficient useful information to justify these costs. Increase in efficiencies of log/event-message systems obtained by sampling translate directly into increases in bandwidths of distributed computer systems, in general, and to increases in time periods during which useful log/event messages can be stored.
-
公开(公告)号:US20220179991A1
公开(公告)日:2022-06-09
申请号:US17115197
申请日:2020-12-08
Applicant: VMware, Inc.
Inventor: Ritesh Jha , Chandrashekhar Jha , Nikhil Jaiswal , Jobin Raju George , Vaidic Joshi
Abstract: The current document is directed to methods and systems that efficiently and accurately process log/event messages generated within distributed computer facilities. Various different types of initial processing steps may be applied to a stream of log/event messages received by a message-collector system and/or a message-ingestion-and-processing system, including masking sensitive fields to prevent exposure of confidential and sensitive information contained in log/event messages. Rule-based identification and masking of sensitive fields in log/event messages is currently provided by certain automated log/event-message systems, but current approaches suffer numerous deficiencies. The methods and systems to which the current document is directed automatically create sensitive-field dictionaries and associated logic and/or train machine-learning components to automatically identify and mask fields within log/event messages in order to address the deficiencies of traditional rule-based sensitive-field identification and masking.
-
3.
公开(公告)号:US11108642B2
公开(公告)日:2021-08-31
申请号:US16441041
申请日:2019-06-14
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Soumya Panigrahi , Nikhil Jaiswal , Pushkar Patil , Suchit Dhakate
Abstract: System and computer-implemented method for constructing a topology for an application distributed over multiple virtual computing instances in which a set of resource utilization metrics are collected for multiple computing instances. A propagation sequence caused by an execution of the application is determined based on the set of resource utilization metrics. A graph may be created with the propagation sequence, wherein each virtual computing instance in the multiple computing instances is a possible node in the graph and the graph includes all nodes associated with the application.
-
4.
公开(公告)号:US11025495B1
公开(公告)日:2021-06-01
申请号:US16802591
申请日:2020-02-27
Applicant: VMWARE, INC.
Inventor: Yash Bhatnagar , Hemani Katyal , Chandrashekhar Jha , Mageshwaran Rajendran , Ritesh Jha
Abstract: Example methods and apparatus to determine container priorities in virtualized computing environments are disclosed herein. Examples include: a cluster controller to classify a first container into a cluster based on the first container having a number of distinct allocated resources within a threshold number of distinct allocated resources corresponding to a second container; a container ranking generator to: determine resource utilization rank values for a resource usage type of a number of distinct allocated resources, the resource utilization rank values indicative that the first container utilizes the resource usage type more than the second container; determine an aggregated resource utilization rank value for the first container based on aggregating ones of the resource utilization rank values corresponding to the first container; and a container priority controller to generate a priority class for the first container based on the aggregated resource utilization rank value.
-
公开(公告)号:US20200320429A1
公开(公告)日:2020-10-08
申请号:US16423201
申请日:2019-05-28
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Priyank Agarwal , Vaidic Joshi , Suchit Dhakate , Jasmine Ejner
Abstract: The present disclosure provides an approach for training a machine learning model by first training the model on a generic dataset and then iteratively training the model on “easy” domain specific training data before moving on to “difficult” domain specific training data. Inputs of a domain-specific dataset are run on the generically-trained model to determine which inputs generate an accuracy score above a threshold. The inputs with an accuracy score above a threshold are used to retrain the model, along with the corresponding outputs. The retraining continues until all domain specific dataset has been used to train the model, or until no remaining inputs of the domain specific dataset generate an accuracy score, when run on the model, that is above a threshold.
-
公开(公告)号:US11782771B2
公开(公告)日:2023-10-10
申请号:US17326169
申请日:2021-05-20
Applicant: VMware, Inc.
Inventor: Ritesh Jha , Jobin Raju George , Pushkar Patil , Vaidic Joshi , Nikhil Jaiswal
CPC classification number: G06F9/542 , G06F9/5072 , G06F9/546 , G06F16/1805
Abstract: The current document is directed to methods and systems that efficiently process and store log/event messages generated within distributed computer facilities. Various different types of initial processing steps may be applied to a stream of log/event messages received by a message-collector system or a message-ingestion-and-processing subsystem. The currently disclosed methods and systems employ additional pre-processing steps to identify the types of received log/event messages, monitor event-type-associated log/event-message-usage-delay histories, and employ time-series-analysis-based and/or neural-network-based estimation of event-type-associated log/event-message usage to efficiently store log/event-messages in low-cost and low-latency storage facilities.
-
7.
公开(公告)号:US11665047B2
公开(公告)日:2023-05-30
申请号:US17151706
申请日:2021-01-19
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Nikhil Jaiswal , Jobin Raju George , Pushkar Patil , Vaidic Joshi
IPC: H04L41/069 , G06F9/54 , H04L67/10 , G06F16/245
CPC classification number: H04L41/069 , G06F9/542 , G06F9/546 , G06F16/245 , H04L67/10
Abstract: The current document is directed to methods and systems that efficiently process log/event messages within and among distributed computer facilities. Various different types of initial processing steps may be applied to a stream of log/event messages received by a message-collector system or a message-ingestion-and-processing system. By including a pre-processing step two identify the type of a received log/event message, and by specifying initial-processing-step criteria with respect to log/event-message types, significant increases in the efficiency of log/event-message preprocessing by message-collector systems and message-ingestion-and-processing systems is achieved.
-
8.
公开(公告)号:US11575576B2
公开(公告)日:2023-02-07
申请号:US17332771
申请日:2021-05-27
Applicant: VMWARE, INC.
Inventor: Yash Bhatnagar , Hemani Katyal , Chandrashekhar Jha , Mageshwaran Rajendran , Ritesh Jha
IPC: H04L41/0893 , G06F9/50 , G06F11/34
Abstract: An example apparatus includes memory, and at least one processor to execute instructions to assign first containers to a first cluster and second containers to a second cluster based on the first containers including first allocated resources that satisfy a first threshold number of allocated resources and the second containers including second allocated resources that satisfy a second threshold number of allocated resources, determine a representative interaction count value for a first one of the first containers, the representative interaction count value based on a first network interaction metric corresponding to an interaction between the first one of the first containers and a combination of at least one of the first containers and at least one of the second containers, and generate a priority class for the first one of the first containers based on the representative interaction count value.
-
公开(公告)号:US11500713B2
公开(公告)日:2022-11-15
申请号:US17133479
申请日:2020-12-23
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Nikhil Jaiswal , Jobin Raju George , Vaidic Joshi , Shivam Satija
IPC: G06F11/07
Abstract: Methods and systems that automatically rank log/event messages and log/event-message transactions to facilitate analysis of log/event-messages generated within distributed-computer systems are disclosed. A base-window dataset and current-window dataset are selected for diagnosis of a particular error or failure and processed to generate a transaction sequence for each dataset corresponding to log/event-message traces identified in the datasets. Then, frequencies of occurrence of log/event-message types relative to transaction types are generated for each dataset. From these two sets of relative frequencies of occurrence, changes in the relative frequency of occurrence for each log/event-message-type/transaction-type pair are generated. Normalized scores for log/event-message-type/transaction-type pairs and scores for transaction types are then generated from the changes in the relative frequency of occurrence. The generated scores reflect the relevance of log/event-messages in traces corresponding to particular transaction as well as the relevance of transaction types to the error or failure.
-
10.
公开(公告)号:US11106505B2
公开(公告)日:2021-08-31
申请号:US16424517
申请日:2019-05-29
Applicant: VMWARE, INC.
Inventor: Ritesh Jha , Jobin George , Shivanju Awasthi , Chandrashekhar Jha , Nikhil Jaiswal
Abstract: System and computer-implemented method for managing workloads in a computing environment use collected resource utilization metrics for a workload of a compute instance running in the computing environment that are superimposed to produce a unified time series of the resource utilization metrics for the workload. Undesired periodic patterns are then removed from the unified time series of the resource utilization metrics, which is used to identify the compute instance as a particular type of compute instances. Based on the identification, an action is recommended and implemented on the compute instance.
-
-
-
-
-
-
-
-
-