-
公开(公告)号:US20180113728A1
公开(公告)日:2018-04-26
申请号:US15406812
申请日:2017-01-16
Applicant: VMWARE, INC.
Inventor: KAVYA REDDY MUSANI , AKASH KODENKIRI , RAMESH VEPURI LAKSHMINARAYANA , RAMESH JAGANNATHA SHETTY , CLEMENT JEBAKUMAR , RAVI SHANKAR NANDULA
IPC: G06F9/455
CPC classification number: G06F8/65 , G06F11/362
Abstract: System and methods for simulating an end-to-end upgrade process are provided. The method may include collecting, by an upgrade simulator, a system inventory from a production system. The system inventory includes the production system's hardware configuration. The method may include, in response to a determination that the system inventory is compatible with an upgrade software, configuring, by the upgrade simulator, a simulated system having a downsized hardware configuration compared to the production system's hardware configuration. The method may further include upgrading, by the upgrade simulator, the simulated system using the upgrade software, and evaluating, by the upgrade simulator, the simulated system operating with the upgrade software.
-
2.
公开(公告)号:US20200236145A1
公开(公告)日:2020-07-23
申请号:US16375855
申请日:2019-04-05
Applicant: VMWARE, INC.
Inventor: DINESH SHARMA , AMMAR RIZVI , AKASH KODENKIRI , RAUNAK RAVINDRA SINGWI , PRABHAVATHI GUTTALAHUNASE MUNIKEMPEGOWDA
Abstract: In one example, a cloud computing environment may be probed to detect an actual topology including connectivity between infrastructure security nodes and management nodes. Each management node may execute a corresponding centralized management service. Each infrastructure security node may execute a corresponding infrastructure security service that handles at least one infrastructure security function. Further, a set of candidate topologies may be generated based on the actual topology. Each candidate topology may indicate a way to replicate the infrastructure security service into the management nodes. Furthermore, a replication partner associated with each of the management nodes may be determined based on a selection of one of the candidate topologies. An operation to deploy the infrastructure security service on the management nodes may be executed based on the selected one of the candidate topologies and the determined replication partners to form an embedded linked mode architecture.
-
3.
公开(公告)号:US20230229478A1
公开(公告)日:2023-07-20
申请号:US17695851
申请日:2022-03-16
Applicant: VMWARE, INC.
Inventor: KRISHNENDU GORAI , IVAYLO RADOSLAVOV RADEV , AKASH KODENKIRI , AMMAR RIZVI , ANIL NARAYANAN NAIR , NIHARIKA NARASIMHAMURTHY
CPC classification number: G06F9/45558 , G06F9/505 , G06F9/5038 , G06F9/5072 , G06F2009/4557 , G06F2009/45595 , G06F2209/5011 , G06F2009/45579
Abstract: A method of on-boarding a virtual infrastructure management (VIM) server appliance in which VIM software for locally managing a software-defined data center (SDDC) is installed, to enable the VIM server appliance to be centrally managed through a cloud service includes upgrading the VIM server appliance from a current version to a higher version that supports communication with agents of the cloud service, modifying configurations of the upgraded VIM server appliance according to a prescriptive configuration required by the cloud service, and deploying a gateway appliance for running the agents of the cloud service that communicate with the cloud service and the upgraded VIM server appliance.
-
公开(公告)号:US20210294594A1
公开(公告)日:2021-09-23
申请号:US17332128
申请日:2021-05-27
Applicant: VMware, Inc.
Inventor: RAVI SHANKAR NANDULA , AKASH KODENKIRI , RAMESH VEPURI LAKSHMINARAYANA
Abstract: Aspects of updating or upgrading a management system for a virtualized computing environment are described. In some aspects, a virtualization management system that manages a virtualized computing environment can be upgraded or updated with limited downtime of the system by deploying a new instance of the system and subsequently assigning a network address of the previous instance to the new instance once it is deployed in the environment.
-
公开(公告)号:US20220107830A1
公开(公告)日:2022-04-07
申请号:US17101007
申请日:2020-11-23
Applicant: VMWARE, INC.
Inventor: AKASH KODENKIRI , AMMAR RIZVI , SACHIN JOHRI , KRISHNENDU GORAI , SANDEEP SINHA
IPC: G06F9/455
Abstract: In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user having a privilege to access the guarded object. Furthermore, the method may include controlling the access to the guarded object based on the determination.
-
公开(公告)号:US20170109188A1
公开(公告)日:2017-04-20
申请号:US15046475
申请日:2016-02-18
Applicant: VMWARE, INC.
Inventor: AVAKASH PREM CHAND , CLEMENT JEBAKUMAR , AKASH KODENKIRI , SHUBHA B S , RAMESH VEPURI LAKSHMINARAYANA , KAVYA REDDY MUSANI
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F9/44505 , G06F9/45533 , G06F2009/4557
Abstract: The present disclosure is related to systems, methods, and non-transitory machine readable media for virtual component revision. An example non-transitory machine readable medium can store instructions executable by a processing resource to cause a computing system store a change to a configuration setting among a plurality of configuration settings each associated with a configurable virtual component and store the plurality of configuration settings associated with the configurable virtual component.
-
7.
公开(公告)号:US20240020108A1
公开(公告)日:2024-01-18
申请号:US17979808
申请日:2022-11-03
Applicant: VMWARE, INC.
Inventor: SANDEEP SINHA , ANIKET AVINASH SAKHARDANDE , RAHUL KUMAR SINGH , CHANDRIKA MUTALIK , AKASH KODENKIRI , VASANTHA KUMARI TAMMANA
CPC classification number: G06F8/65 , G06F8/71 , G06F11/2023
Abstract: An example method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; setting, by the lifecycle management software, the first and second appliances as a preemptive pair, where the first appliance is protected and the second appliance is unprotected by fault domain management (FDM) software executing in the SDDC; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and setting, by the lifecycle management software, the first appliance as unprotected and the second appliance as protected by the FDM software.
-
8.
公开(公告)号:US20230336991A1
公开(公告)日:2023-10-19
申请号:US18214480
申请日:2023-06-26
Applicant: VMWARE, INC.
Inventor: KRISHNENDU GORAI , SANDEEP SINHA , VINOD R N , RAMESH VEPURI LAKSHMINARAYANA , AKASH KODENKIRI , SACHIN JOHRI
IPC: H04W12/06 , H04W12/69 , H04W12/0431 , H04W12/0433
CPC classification number: H04W12/068 , H04W12/69 , H04W12/0431 , H04W12/0433
Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. When a request with the second security token is sent from the first management entity to the second management entity, the second security token is validated using a public key from the first management entity at the second management entity. After validation, the request is processed at the second management entity and a response is transmitted to the first management entity.
-
公开(公告)号:US20220191093A1
公开(公告)日:2022-06-16
申请号:US17168218
申请日:2021-02-05
Applicant: VMWARE, INC.
Inventor: AMMAR RIZVI , ANMOL PARIKH , NIHARIKA NARASIMHAMURTHY , AKASH KODENKIRI
Abstract: A host computing system may include a processor and a memory coupled to the processor. The memory may include an auto-discovery module to broadcast a message to a set of management nodes in a data center. The message may include a configuration policy. Further, the auto-discovery module may receive an acknowledgment message from a management node. The acknowledgment message may indicate that the management node supports the configuration policy. Furthermore, the auto-discovery module may establish a trust relationship with the management node in response to receiving the acknowledgment message. Further, the auto-discovery module may enable the host computing system to add to a cluster managed by the management node upon establishing the trust relationship.
-
-
-
-
-
-
-
-