LIVE MIGRATION OF VIRTUAL MACHINES ACROSS HETEROGENEOUS VIRTUAL MACHINE MANAGEMENT DOMAINS

    公开(公告)号:US20190340003A1

    公开(公告)日:2019-11-07

    申请号:US15968704

    申请日:2018-05-01

    申请人: VMware, Inc.

    IPC分类号: G06F9/455 G06F17/30

    摘要: A method of migrating a virtual machine (VM) having a virtual disk from a source data center to a destination data center includes generating a snapshot of the VM to create a base disk and a delta disk in which writes to the virtual disk subsequent to the snapshot are recorded, and copying the base disk to a destination data store. The method further includes, in response to a request to migrate the VM, preparing a migration specification at the source and transmitting the migration specification to the destination, the migration specification including a VM identifier and a current content ID of the base disk, and determining that a content ID of the copied base disk matches the current content ID of the base disk included in the migration specification and updating the migration specification to indicate that the base disk does not need to be migrated.

    PREVENT NETWORK SPREAD OF MALWARE BY RESTRICTING IT TO ONE PATIENT ONLY

    公开(公告)号:US20230229771A1

    公开(公告)日:2023-07-20

    申请号:US17966822

    申请日:2022-10-15

    申请人: VMware, Inc.

    IPC分类号: G06F21/56 G06F21/53

    摘要: Some embodiments provide a method of preventing network spread of malware files. At a host computer executing in a datacenter, the method receives a request from a particular compute machine executing on the host computer to open a file that was downloaded to the host computer for the particular machine. The method determines whether the file is a known file that has been previously assessed to contain malware. Based on a determination that the file is unknown, the method allows the particular compute machine to open the file while also (i) creating a record to identify the file as a file that is currently being analyzed to assess whether the file contains malware, and (ii) distributing the record to other host computers in the datacenter to ensure that the file cannot be opened on the other host computers until it has been analyzed to confirm that the file does not contain malware.

    PER-NAMESPACE IP ADDRESS MANAGEMENT METHOD FOR CONTAINER NETWORKS

    公开(公告)号:US20230231741A1

    公开(公告)日:2023-07-20

    申请号:US17684160

    申请日:2022-03-01

    申请人: VMware, Inc.

    摘要: Some embodiments of the invention provide a method of sending data in a network that includes multiple worker nodes, each worker node executing at least one set of containers, a gateway interface, and a virtual local area network (VLAN) tunnel interface. The method configures the gateway interface of each worker node to associate the gateway interface with multiple subnets. Each subnet is associated with a namespace, a first worker node executes a first set of containers of a first namespace, and a second worker node executes a second set of containers of the first namespace and a third set of containers of a second namespace. The method sends data between the first set of containers and the second set of containers through a VLAN tunnel between the first and second worker nodes. The method sends data between the first set of containers and the third set of containers through the gateway interface.

    METHOD TO HANDLE HETEROGENEOUS INPUT/OUTPUT (I/O) LOAD FOR CONTAINERS RUNNING IN A VIRTUALIZED ENVIRONMENT

    公开(公告)号:US20240362050A1

    公开(公告)日:2024-10-31

    申请号:US18306950

    申请日:2023-04-25

    申请人: VMware, Inc.

    发明人: Kashish Bhatia

    IPC分类号: G06F9/455 G06F13/16

    摘要: The disclosure provides a method for handling heterogeneous input/output (I/O) load for containers running in a virtualized environment. The method generally includes receiving, from an application running in a container, an I/O indicating to write data to a persistent volume backed by a virtual disk file in storage, determining a maximum number of in-flight write I/Os allowed for the persistent volume based on a share of a total write I/O bandwidth assigned to the virtual disk file and allocated to the persistent volume, determining a current number of in-flight write I/Os for the persistent volume, and determining whether the current number of in-flight write I/Os for the persistent volume is greater than or equal to the maximum number of in-flight write I/Os allowed for the persistent volume to determine whether the received I/O is to be rejected or processed.

    METHODS AND SYSTEMS FOR INTELLIGENT ROAMING USING RADIO ACCESS NETWORK INTELLIGENT CONTROLLERS

    公开(公告)号:US20240357339A1

    公开(公告)日:2024-10-24

    申请号:US18305089

    申请日:2023-04-21

    申请人: VMware, Inc.

    IPC分类号: H04W8/08

    CPC分类号: H04W8/08

    摘要: This disclosure is directed to methods and system for intelligent roaming of user equipment (“UE”) of a home network onto a visited network. The methods and systems monitor performance of voice and data services for UEs in coverage areas of edge cell sites of the home network. The methods and systems determine which UEs in the coverage areas of the edge cell sites to roam on the visited network based on decreases in voice and data services. The UEs in the coverage areas selected for roaming are pushed to roam on the visited network by sending a signal that instructs selected UEs to switch into roaming mode while the UEs are still in the coverage areas of the edge cell sites.

    RAPID RANSOMWARE DETECTION AND RECOVERY
    7.
    发明公开

    公开(公告)号:US20240354411A1

    公开(公告)日:2024-10-24

    申请号:US18335130

    申请日:2023-06-15

    申请人: VMware, Inc.

    IPC分类号: G06F21/56 G06F9/455 G06F21/55

    摘要: Solutions for rapid ransomware detection and recovery include: receiving a first set of in-memory changed data blocks; identifying, within the first set of in-memory changed data blocks, a second set of in-memory changed data blocks addressed for storage within a file index for a virtual machine (VM) disk; determining, relative to a change history of the file index, an anomalous condition; based on at least determining the anomalous condition, identifying a third set of blocks within the file index that are changed between two versions of the VM disk; determining that changes in the third set of blocks indicate ransomware; and based on at least determining that changes in the third set of blocks indicate ransomware, generating an alert. Machine learning (ML) models may perform anomaly/ransomware detection. Remediation activities may include disk restoration storing the VM memory.

    DECENTRALIZED GOVERNANCE OF SHARED INFRASTRUCTURE

    公开(公告)号:US20240330272A1

    公开(公告)日:2024-10-03

    申请号:US18194259

    申请日:2023-03-31

    申请人: VMware, Inc.

    IPC分类号: G06F16/23 G06F21/60 G06F21/62

    摘要: Various shared infrastructure governance decision-making systems and methods are disclosed. One such method comprises receiving, by at least one blockchain node from a client device, a reconfiguration request for changing infrastructure of a blockchain service by performing a reconfiguration action; triggering, by the at least one blockchain node, an infrastructure governance approval process to approve or deny the reconfiguration request for changing the infrastructure of the blockchain service; and invoking, by the at least one blockchain node, initiation of the reconfiguration action by the blockchain service upon approval of the reconfiguration request. Other methods and system are also disclosed.

    DYNAMIC BUFFER LIMIT CONFIGURATION OF MONITORING AGENTS

    公开(公告)号:US20240320025A1

    公开(公告)日:2024-09-26

    申请号:US18195394

    申请日:2023-05-10

    申请人: VMWARE, INC.

    IPC分类号: G06F9/455

    摘要: An example system may include a first endpoint executing a remote collector and a second endpoint in communication with the first endpoint. The remote collector may monitor the second endpoint. The remote collector may include an agent installation unit to install a monitoring agent with configuration data on the second endpoint. The configuration data may specify a configuration for the monitoring agent to monitor a first program executing in the second endpoint. Further, the second endpoint may include a buffer limit configuration unit to execute the monitoring agent in a test mode to determine a first number of metrics to be collected in one cycle based on the configuration data. Furthermore, the buffer limit configuration unit may configure a buffer limit of the monitoring agent based on the first number of metrics and, upon configuring the buffer limit, enable the monitoring agent to monitor the first program.