G06F9/45545

Resource Migration Method and System, and Device
20230004419 · 2023-01-05 ·

A resource migration method includes obtaining virtual resource utilization of a virtual machine, inputting the virtual resource utilization of the virtual machine into an identification model, determining a resource type of the virtual machine, obtaining physical resource utilization of the at least one physical host, inputting the physical resource utilization of the at least one physical host into the identification model, determining a resource type of each of the at least one physical host, and migrating the virtual machine to one of the at least one physical host based on the resource type of the virtual machine and the resource type of each of the at least one physical host.

Formally Verified Trusted Computing Base with Active Security and Policy Enforcement
20230004418 · 2023-01-05 ·

A formally verified trusted computing base with active security and policy enforcement is described. The formally verified trusted computing base includes a formally verified microkernel and multiple formally verified hyper-processes including a virtual machine monitor (VMM), virtual machine introspection (VMI), policy enforcers including an active security policy enforcer (ASPE), and a virtual switch. The active security and policy enforcement continuously monitors for semantic behavior detection or policy violations and enforces the policies at the virtualization layer. Further, policies can be attached to the network layer to provide granular control of the communication of the computing device.

APPLICATION COMPONENT IDENTIFICATION AND ANALYSIS IN A VIRTUALIZED COMPUTING SYSTEM

An example method of application identification in a virtualized computing system having a cluster of hosts, the hosts including virtualization layers supporting virtual machines (VMs), is described. The method includes: executing, by application analysis software, process discovery agents for the VMs; receiving, at the application analysis software from the process discovery agents, process metadata describing processes executing on the VMs; generating signatures for the processes based on the process metadata; and determining components of an application based on the signatures.

System and method for improving content fetching by selecting tunnel devices
11711233 · 2023-07-25 · ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

DYNAMIC RESOURCE MANAGEMENT ACROSS SOFTWARE-DEFINED DATA CENTERS
20230026183 · 2023-01-26 ·

Described herein are systems, methods, and software to dynamically manage resources across software-defined data centers. In one implementation, a monitoring service obtains flow information associated with physical network interfaces (PNICs) and virtual networking interfaces (VNICs) across a plurality of software-defined data centers (SDDCs). The monitoring service further determines when the flow information associated with the one or more workloads satisfy criteria and, in response to satisfying criteria, generates an update to a configuration associated with at least one SDDC of the plurality of SDDCs based on the flow information.

MIGRATION OF VIRTUAL COMPUTING STORAGE RESOURCES USING SMART NETWORK INTERFACE CONTROLLER ACCELERATION

An information handling system may include a processor; a network interface; and a physical storage resource having data stored thereon that is usable by a virtual resource that is executable on the processor. The network interface may accelerate migration of the data to a destination system by, in response to a command from a virtual machine manager: offloading, from the processor, a copying process configured to copy the data to the destination system; tracking portions of the data that are changed by the virtual resource during the copying process; notifying the virtual machine manager that a designated checkpoint has been reached in the copying process; causing the virtual resource to pause; completing the copying process; and causing the virtual resource to resume and use the copied data at the destination instead of the data on the physical storage resource.

PRE-POPULATED SECURITY POLICIES FOR VIRTUAL DESKTOP SESSIONS
20230229468 · 2023-07-20 ·

In an example, a management node includes a processor and a memory communicatively coupled to the processor. The memory may include an advisory module to receive data related to a login pattern of a user over a period of time and predict a time to launch a virtual desktop session for the user based on the received data. Further, the advisory module may fetch, via a network, a security policy from a cloud-based endpoint protection platform prior to the predicted time. Furthermore, the advisory module may populate a virtual machine with the security policy before the user logs into the virtual desktop session. Then, the advisory module may create the virtual desktop session using the virtual machine populated with the security policy in response to a determination that the user logged into the virtual desktop session prior to an expiration of a timer.

APPLICATION TOPOLOGY DERIVATION IN A VIRTUALIZED COMPUTING SYSTEM

An example method of determining application topology in a virtualized computing system having a cluster of hosts with hypervisors supporting virtual machines (VMs), the method including: executing agents on the VMs to obtain process metadata describing processes executing in the VMs; receiving, at an application analysis system, the process metadata; receiving network flow metadata from the agents on the VMs and/or from a network analyzer in the virtualized computing system; parsing the network flow metadata to identify a source VM and a destination VM of the VMs; relating the network flow metadata to portions of the process metadata associated with the source and the destination VMs to identify a source process and a destination process; and generating a topology of a source component connected to a destination component, the source component identifying the source VM and the source process, the destination component identifying the destination VM and the destination process.

AUTONOMOUS CLUSTER CONTROL PLANE IN A VIRTUALIZED COMPUTING SYSTEM

An example method of creating an autonomous cluster of hosts in a virtualized computing system includes: enabling, by a virtualization management server executing a cross cluster control plane (xCCP), an infravisor in a seed host of the hosts, the infravisor a component of a hypervisor executing on the seed host; running, by the infravisor, a cluster control plane (CCP) pod on the seed host executing a CCP; providing, by the infravisor, a CCP configuration to the CCP pod; applying, by an initialization script of the CCP pod, the CCP configuration to the CCP to create the autonomous cluster having the seed host as a single node thereof; and extending the autonomous cluster with remaining hosts of the hosts other than the seed host as additional nodes thereof, the CCP applying a cluster personality to each of the remaining hosts derived from the seed host.

Creating virtual machine groups based on request

Embodiments of the present invention provide a method, a system, and an apparatus for creating a virtual machine. The method includes: receiving a virtual machine creation request to create a plurality of virtual machines; dividing the plurality of virtual machines into a plurality of virtual machine groups; determining a home physical rack for each virtual machine group, where one virtual machine group corresponds to one home physical rack; and creating each virtual machine group on the home physical rack of each virtual machine group. Because each virtual machine group is created on a home physical rack to which each virtual machine group belongs, each virtual machine group is equivalent to one physical rack.