-
公开(公告)号:US11411833B1
公开(公告)日:2022-08-09
申请号:US17239366
申请日:2021-04-23
Applicant: VMware, Inc.
Inventor: Giri Prashanth Subramanian , Santhosh Prabhu Muraleedhara Prabhu , Ravi Singhal , Atul Jadhav , Rohit Reja
Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed herein to formally verify a network with both physical and virtual components. The modeling and formal verification is performed by an apparatus comprising: a topology generator to generate a network model including a plurality of devices connected in a network; a flow modeler to add a rule to the network model, the rule to define a flow of network packets through the network model; a reduction mapper to identify the rules common to ones of the devices; and a mapping verifier to verify the network meets a user specification.
-
公开(公告)号:US11483284B2
公开(公告)日:2022-10-25
申请号:US16436930
申请日:2019-06-11
Applicant: VMWARE, INC.
Inventor: Abhijit Sharma , Prahalad Deshpande , Atul Jadhav , Nikhil Bhalerao , Shashank Ranjan
IPC: H04L9/40 , H04L43/08 , H04L41/0806
Abstract: The present disclosure provides an approach for generating one or more firewall rules to regulate communication between containerized services running within containers. The approach includes determining which services communicate with each other, independently of in which containers the services execute. The determining occurs over a period of time. If two services communicated with each other during the period of time, then the firewall allows the services to continue communicating, but only over the same ports as used during the period of time. If two services did not communicate during the period of time, then the firewall does not allow the services to communicate after the expiration of the period of time. In some embodiments, redetermining the communication flow over a new period of time may occur after the initial period of time so as to refresh the firewall rules.
-
公开(公告)号:US11294719B2
公开(公告)日:2022-04-05
申请号:US16037298
申请日:2018-07-17
Applicant: VMware, Inc.
Inventor: Mageshwaran Rajendran , Sivaraj M , Karthik Seshadri , Atul Jadhav , Nibunan G S
Abstract: Various examples are disclosed for generating metrics for quantifying computing resource usage. A computing environment can identify a computing function that utilizes a plurality of computing services hosted in at least one virtual machine. The computing environment can determine a first cost metric for the at least one virtual machine based on hardware resources used by the at least one virtual machine and determine a second cost metric for individual ones of the computing services based on virtual machine resources used by the individual ones of the computing services and the first cost metric. A third cost metric can be determined for the computing function as a function of the second cost metric and a utilization ratio.
-
公开(公告)号:US11343231B2
公开(公告)日:2022-05-24
申请号:US16547634
申请日:2019-08-22
Applicant: VMWARE, INC.
Inventor: Prahalad Deshpande , Nikhil Bhalerao , Atul Jadhav , Abhijit Sharma , Shashank Ranjan
IPC: H04L29/06
Abstract: The present disclosure provides an approach for creating one or more firewall rules to regulate communication between containers. The approach includes calculating a trust score for each container. To generate a rule for any two containers, a difference between the trust scores is computed, and if the difference in trust levels is too large, then the more trustworthy container is not allowed to communicate with the less trustworthy container. If the difference in trust scores is not too large, then the trustworthy container is allowed to communicate with the other trustworthy container, or an untrustworthy container is allowed to communicate with another untrustworthy container.
-
公开(公告)号:US20200026565A1
公开(公告)日:2020-01-23
申请号:US16037298
申请日:2018-07-17
Applicant: VMware, Inc.
Inventor: Mageshwaran Rajendran , Sivaraj M. , Karthik Seshadri , Atul Jadhav , Nibunan G S
Abstract: Various examples are disclosed for generating metrics for quantifying computing resource usage. A computing environment can identify a computing function that utilizes a plurality of computing services hosted in at least one virtual machine. The computing environment can determine a first cost metric for the at least one virtual machine based on hardware resources used by the at least one virtual machine and determine a second cost metric for individual ones of the computing services based on virtual machine resources used by the individual ones of the computing services and the first cost metric. A third cost metric can be determined for the computing function as a function of the second cost metric and a utilization ratio.
-
公开(公告)号:US20230096394A1
公开(公告)日:2023-03-30
申请号:US17570336
申请日:2022-01-06
Applicant: VMware, Inc.
Inventor: Santhosh Prabhu Muraleedhara Prabhu , Giri Prashanth Subramanian , Atul Jadhav , Devraj N. Baheti
Abstract: Some embodiments provide a method. The method determines a forwarding path for a packet set by using a data plane model of a network. The method identifies a rule table implementing a step in the forwarding path of the packet set. The method retrieves an indexing file at a scalable storage based on the identified rule table. The indexing file stores rule entries for one or more rule tables of the network. The method retrieves provenance data regarding a rule of the rule table that is applicable to the packet set from the indexing file. The method presents the retrieved provenance information of the identified rule.
-
公开(公告)号:US20210006543A1
公开(公告)日:2021-01-07
申请号:US16547634
申请日:2019-08-22
Applicant: VMWARE, INC.
Inventor: Prahalad Deshpande , Nikhil Bhalerao , Atul Jadhav , Abhijit Sharma , Shashank Ranjan
IPC: H04L29/06
Abstract: The present disclosure provides an approach for creating one or more firewall rules to regulate communication between containers. The approach includes calculating a trust score for each container. To generate a rule for any two containers, a difference between the trust scores is computed, and if the difference in trust levels is too large, then the more trustworthy container is not allowed to communicate with the less trustworthy container. If the difference in trust scores is not too large, then the trustworthy container is allowed to communicate with the other trustworthy container, or an untrustworthy container is allowed to communicate with another untrustworthy container.
-
-
-
-
-
-