HEALTH ANALYTICS FOR EASIER HEALTH MONITORING OF A NETWORK

    公开(公告)号:US20240039813A1

    公开(公告)日:2024-02-01

    申请号:US17875344

    申请日:2022-07-27

    Applicant: VMware, Inc.

    CPC classification number: H04L43/08 H04L43/20

    Abstract: Some embodiments provide a novel method of assessing health of a software managed network (SMN) that includes multiple forwarding elements that exchange data messages with each other. A health analytics manager collects performance metrics from control-plane components of the SMN that configure the forwarding elements of the SMN to forward data messages. The health analytics manager also collects performance metrics from data-plane components including the forwarding elements of the SMN. Then, the health analytics manager generates one health score from the collected performance metrics of the control-plane and data-plane components to express an overall health of the SMN.

    Modifying health monitoring through user interface

    公开(公告)号:US11750489B1

    公开(公告)日:2023-09-05

    申请号:US17875360

    申请日:2022-07-27

    Applicant: VMware, Inc.

    CPC classification number: H04L43/0817 H04L43/045 H04L43/16

    Abstract: Some embodiments provide a novel method for monitoring health of an SMN that includes multiple networking components. A health analytics manager identifies a set of one or more metrics associated with the network components of the SMN. The health analytics manager uses the set of metrics to compute a first health score for the SMN. Then, the health analytics manager presents the first health score in a UI along with (1) data regarding how the first health score was computed, and (2) a set of one or more parameters for a user to modify how the health for the SMN is computed. After receiving from the user one or more modifications to at least one of the parameters, the health analytics manager computes a second health score for the SMN based on the modified set of parameters.

    DETECTING THREATS TO DATACENTER BASED ON ANALYSIS OF ANOMALOUS EVENTS

    公开(公告)号:US20230011957A1

    公开(公告)日:2023-01-12

    申请号:US17372271

    申请日:2021-07-09

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for detecting a threat to a datacenter. The method receives a set of connections between a set of DCNs in the datacenter over a particular time period. The set of DCNs includes at least a first DCN at which a first anomalous event was detected. The method analyzes a set of detected anomalous events to identify additional anomalous events detected at other DCNs in the set of DCNs during the particular time period. Based on the first anomalous event and identified additional anomalous events, the method determines whether the anomalous events indicate a threat to the datacenter.

    DETECTION OF THREATS BASED ON RESPONSES TO NAME RESOLUTION REQUESTS

    公开(公告)号:US20230131894A1

    公开(公告)日:2023-04-27

    申请号:US17507548

    申请日:2021-10-21

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. The method receives flow attribute sets for multiple flows from multiple host computers in the datacenter on which data compute nodes (DCNs) execute. Each flow attribute set indicates at least a source DCN for the flow. The method identifies flow attribute sets that correspond to DCNs responding to name resolution requests. For each DCN of a set of DCNs executing on the host computers, the method determines whether the DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the DCN based on the identified flow attribute sets. When a particular DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the particular DCN, the method identifies the particular DCN as a security threat to the datacenter.

    ANALYSIS SYSTEM DETECTING THREATS TO DATACENTER

    公开(公告)号:US20230011397A1

    公开(公告)日:2023-01-12

    申请号:US17372264

    申请日:2021-07-09

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a system for detecting threats to a datacenter. The system includes a set of processing units and a set of non-transitory machine-readable media storing an analysis appliance. The analysis appliance includes multiple event detectors that analyze information received from host computers in the datacenter to identify anomalous events occurring in the datacenter. The analysis appliance includes a graph generation module that generates a graph of connections between data compute nodes (DCNs) in the datacenter based on the information received from the host computers. The analysis appliance includes a lateral movement threat detection module that (i) uses the graph of connections to identify a set of connections between a set of the DCNs based on a particular anomalous event and (ii) uses the set of connections and the identified anomalous events to determine whether the set of connections is indicative of a lateral movement attack on the datacenter.

    AUTOMATIC IDENTIFICATION OF POLICY MISCONFIGURATION

    公开(公告)号:US20220417096A1

    公开(公告)日:2022-12-29

    申请号:US17355829

    申请日:2021-06-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for identifying policy misconfiguration in a datacenter. Based on flow data received for a plurality of data compute nodes (DCNs) in the datacenter, the method determines that an anomalous amount of data traffic relating to a particular DCN has been dropped. The method uses (i) the received flow data for the particular DCN and (ii) a set of recent policy configuration changes to determine policy configuration changes that contributed to the anomalous amount of dropped data traffic relating to the particular DCN. The method generates an alert for presentation to a user indicating the anomalous amount of data traffic and the contributing policy configuration changes.

    Nested host manager in a hyper-converged infrastructure

    公开(公告)号:US11182191B2

    公开(公告)日:2021-11-23

    申请号:US16288139

    申请日:2019-02-28

    Applicant: VMWARE, INC.

    Abstract: In a computer-implemented method for using a nested host manager in a hyper converged infrastructure to streamline the upgrade process for one or more hosts in a workload domain, a first workload domain having one or more hosts is chosen, and at least one host of the one or more hosts is designated for an upgrade. The resource allotment of the at least one host is evaluated and a nested host having a comparable resource allotment is selected and provided in a second workload domain. Communication is redirected from the at least one host to the nested host. The at least one host is placed in a maintenance mode, updated, and returned to an operational mode.

    HEALTH ANALYTICS FOR EASIER HEALTH MONITORING OF LOGICAL FORWARDING ELEMENTS

    公开(公告)号:US20240039824A1

    公开(公告)日:2024-02-01

    申请号:US17875352

    申请日:2022-07-27

    Applicant: VMware, Inc.

    CPC classification number: H04L43/20 H04L43/04

    Abstract: Some embodiments provide a novel method for monitoring health of LFEs of a logical network. For an LFE implemented by multiple PFEs, a health analytics manager identifies a set of one or more metrics associated with each PFE implementing the LFE. The health analytics manager uses the set of metrics to compute a health score for the LFE. Then, the health analytics manager provides the health score in a report to provide an indication regarding the monitored health of the LFE. The set of metrics used to compute the health score for the LFE includes, in some embodiments, at least one metric for each PFE implementing the LFE.

    Detection of threats based on responses to name resolution requests

    公开(公告)号:US11792151B2

    公开(公告)日:2023-10-17

    申请号:US17507548

    申请日:2021-10-21

    Applicant: VMware, Inc.

    CPC classification number: H04L61/10 H04L61/2521 H04L61/2571 H04L61/5053

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. The method receives flow attribute sets for multiple flows from multiple host computers in the datacenter on which data compute nodes (DCNs) execute. Each flow attribute set indicates at least a source DCN for the flow. The method identifies flow attribute sets that correspond to DCNs responding to name resolution requests. For each DCN of a set of DCNs executing on the host computers, the method determines whether the DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the DCN based on the identified flow attribute sets. When a particular DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the particular DCN, the method identifies the particular DCN as a security threat to the datacenter.

Patent Agency Ranking