METHODS AND APPARATUS TO CONFIGURE VIRTUAL MACHINES

    公开(公告)号:US20250123874A1

    公开(公告)日:2025-04-17

    申请号:US18648112

    申请日:2024-04-26

    Applicant: VMware LLC

    Abstract: Methods and apparatus to configure virtual machines (VMs) are disclosed. Am example system to manage a plurality of virtual machines of a shared computing resource, the system includes interface circuitry, programmable circuitry, and machine readable instructions to cause the programmable circuitry to at least one of scan or monitor the plurality of virtual machines, determine whether a master application corresponding to the virtual machines has accepted a minion application corresponding to a first one of the virtual machines, and in response to the determination that the master application has not accepted the minion application, cause the master application to accept the minion application.

    METHODS AND APPARATUS TO ISOLATE STATE MANAGEMENT IN INFRASTRUCTURE AS CODE ENVIRONMENTS

    公开(公告)号:US20250124133A1

    公开(公告)日:2025-04-17

    申请号:US18651453

    申请日:2024-04-30

    Applicant: VMware LLC

    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to isolate state management in infrastructure as code environments. Disclosed is an apparatus comprising monitor a security infrastructure to determine a first state of the security infrastructure, the security infrastructure to control a function based on the first state, the function defined by an operating protocol; determine that the security infrastructure has transitioned to a second state, the second state associated with an alteration to the security infrastructure; determine whether the alteration of the security infrastructure associated with the second state is undesired, wherein the alteration being undesired corresponds to the function of the security infrastructure deviating from the operating protocol; and modify the security infrastructure by replacing the second state with a third state to counteract the deviation from the operating protocol corresponding to the second state.

    Performing firewall operations by sharing metadata between firewall processes

    公开(公告)号:US11916879B2

    公开(公告)日:2024-02-27

    申请号:US17567823

    申请日:2022-01-03

    Applicant: VMware LLC

    Abstract: Some embodiments of the invention provide a novel method for performing firewall operations on a computer. The method of some embodiments instantiates first and second firewall processes on the computer. These two processes are two separate processes, which in some embodiments have separate memory allocations in the memory system of the computer. The method uses the first firewall process to examine a data message to determine whether an encryption based firewall policy (e.g., a TLS-based firewall policy) has to be enforced on the data message. Based on a determination that the encryption-based firewall policy has to be enforced on the data message, the method provides metadata, which is produced by the first firewall process in its examination of the data message, to the second firewall process. The second firewall process then uses the provided metadata to perform an encryption-based firewall operation based on the encryption-based firewall policy. In some embodiments, the data message is encrypted, the first firewall process cannot decrypt the data message, and the second firewall process performs a decryption operation (e.g., a TLS-based decryption operation) to decrypt the data message.

Patent Agency Ranking