As more networks move to the cloud, it is more common for one corporation or other entity to have networks spanning multiple sites. Much like with single-site logical networks, administrators may want to troubleshoot these networks using flow tracing operations. As networks that span multiple sites may be more complicated, there are additional difficulties in properly visualizing these flow tracing operations across multiple sites.
Some embodiments of the invention provide a method for presenting a visualization of a flow tracing operation within a logical network that is implemented across multiple sites (e.g., multiple federated datacenters in different locations). The method receives flow tracing data regarding a data message flow that is sent from a source endpoint in a first one of the sites to a destination endpoint in a second one of the sites (possibly flowing through other sites as well) and that is processed according to logical forwarding elements (LFEs) implemented in at least the first and second sites. The method identifies the LFEs that process the data message flow in each site through which the data message flow passes and presents a visualization for the data message flow that includes a separate section for each of these sites. Each of these sections indicates the LFEs that process the data message flow in the corresponding site.
In some embodiments, the method is performed by a network management and control system that receives flow tracing data from physical forwarding elements (PFEs) that implement the LFEs that process the data message flow at each of the sites through which the data message flow passes. These PFEs (e.g., software and/or hardware forwarding elements) are configured by the network management and control system to send flow tracing data to a central controller or controller cluster at their respective site (e.g., directly, or via local controllers that execute on host computers alongside the PFEs). The network management and control system is also responsible for injecting flow tracing data messages at the source endpoint, which are marked (e.g., with a flag bit) in some embodiments so that (i) the PFEs that process the marked data messages know to provide flow tracing data to the network management and control system and (ii) the PFE at the destination endpoint does not actually deliver the data message to this endpoint.
The PFEs, in some embodiments, send the flow tracing data to the controllers as control messages that indicate that the forwarding element has performed a specific action or actions, such as physical receipt of a data message at a particular port, ingress of a packet to an LFE, logical forwarding of a data message according to an LFE, application of a firewall, access control, or other rule for an LFE to a data message, physical forwarding (e.g., encapsulation and output) of a data message, dropping a data message, delivery of a data message to its destination, etc. The controllers and/or network managers at each site aggregate the flow tracing data for a particular flow tracing operation and pass this data to a centralized controller and/or manager cluster in some embodiments. The centralized controller and/or manager cluster is thus able to use the data from all of the sites to generate the visualization of the processing of the data message flow across the multiple sites.
The visualization of the flow tracing operation, as mentioned, displays a separate section for each site through which the data message flow passes, as well as at least a subset of the LFEs that process the data message flow in each site. In some embodiments, these sections are presented as vertical segments of the visualization display, with the section corresponding to the source site (i.e., the site at which the source endpoint is located) on one side and the section corresponding to the destination site (i.e., the site at which the destination endpoint is located) on the other side of the display. Some embodiments also use arrows to indicate the direction of the flow, which can be useful when a data message flow is sent from a first site to one or more additional sites and then back to the first site. In this case, different embodiments either use a strictly unidirectional (e.g., left-to-right) orientation and di splay multiple sections corresponding to the first site or have the data message flow visualization indicate movement from the first section to the other sections and then back to the first section.
The LFEs that process the data message and are displayed within the sections of the visualization may include at least logical routers and logical switches. Logical switches that process a data message, in some embodiments, can include user-configured logical switches to which the network endpoints connect as well as auto-configured logical switches that are used to connect gateways of the same logical router across multiple sites (also referred to as backplane logical switches). When a logical switch (of any type) spans multiple sites, some embodiments use tunnels between logical network gateways (also referred to as remote tunnel endpoints, or RTEPs) at each site that handle communication across sites. When a data message is sent from a first PFE executing on a host computer in one site to a second PFE executing on a host computer in another site (based on logical switch processing performed by the first PFE), the first PFE transmits the data message to a first logical network gateway associated with the logical switch in the first site, which transmits the data message to a second logical network gateway associated with the logical switch in the second site via the RTEP channel, which then transmits the data message to the second PFE. Some embodiments display the logical network gateways in the flow tracing operation (e.g., as a single GUI item on the boundary between the two sites) in addition to the user-configured logical switches.
Logical routers, in some embodiments, may include tier-0 logical routers (which connect directly to external networks, such as the Internet) and tier-1 logical routers (which may be interposed between logical switches and tier-0 logical routers). Tier-1 logical routers, in some embodiments, may have only a distributed routing component (DR), or may have both distributed routing components as well as centralized routing components (also referred to as service routing components, or SRs). SRs, for tier-1 routers, allow for centralized (e.g., stateful) services to be performed on data messages sent between DCNs connected to logical switches that connect to the tier-1 logical router and either DCNs connected to other logical switches that do not connect to the tier-1 logical router or external network endpoints. Tier-1 logical routers may be connected to tier-0 logical routers in some embodiments which, as mentioned, handle data messages exchanged between the logical network DCNs and external network endpoints. These tier-0 logical routers may also have a DR as well as one or more SRs (e.g., SRs at each site spanned by the T0 logical router).
When a logical router has SRs in multiple sites, a separate SR is implemented on a separate host computer in each of the sites. Some embodiments designate one SR (i.e., one site) as the primary SR for each such logical router. In this case, many data messages sent from one site to another that require processing by the SR for a particular logical router are transmitted from their originating site to the site of the primary SR via the logical network gateways for a backplane logical switch that connects all of these SRs. In this case, the visualization of some embodiments displays a representation of the logical network gateways (i.e., of the RTEP channel) between the sections corresponding to these sites, in addition to showing the secondary and primary SRs in each of the sites that process the data message flow.
For example, a tracing operation data message flow sent from a source endpoint in a first site to a destination endpoint in a second site might be processed by a first logical switch to which the source endpoint connects, the DR of a first tier-1 logical router to which the first logical switch connects, the secondary SR of the first tier-1 logical router in the first site, the primary SR of the first tier-1 logical router in a third site (as well as the logical network gateways between these two SRs), the secondary SR of a tier-0 logical router in the third site, the primary SR of the tier-0 logical router in a fourth site (as well as the logical network gateways between these two SRs), the secondary SR of a second tier-1 logical router in the fourth site, the primary SR of the second tier-1 logical router in a fifth site (as well as the logical network gateways between these two SRs), the secondary SR of a second tier-1 logical router in the fifth site, the primary SR of the second tier-1 logical router in the second site (as well as the logical network gateways between these two SRs), the DR of the second tier-1 logical router in the second site, and a second logical switch to which the destination endpoint connects. Some embodiments display each logical switch, each set of logical network gateway (i.e., each RTEP channel between these logical network gateways), and each SR (both primary and secondary SRs) in the flow tracing visualization. It should be noted that many networks are configured such that the primary SRs for multiple logical routers are in the same site, so the data message flow does not have to pass through as many sites as in the above example. Other examples where the data message flow leaves one site and then comes back to that site are also possible, as described.
In some embodiments, each of the PFEs that implements the LFEs executes on a host computer at one of the sites. Specifically, in some embodiments the logical network gateways and SRs are implemented on edge devices (i.e., computing devices that handle the connections with external networks and between sites). These edge devices implement the distributed LFEs such as logical switches and DRs as well, which are also implemented by PFEs executing on the host computers. In some embodiments, the visualization provides an option for a user to view the physical computing device (e.g., edge devices, host computer) that implements each of the displayed LFEs that processes the data message flow.
When a data message flow passes through numerous sites, the visualization of the flow tracing operation can become crowded and difficult to follow because so many sections are required. In addition, an administrator may not be interested in viewing all of the different secondary and primary SRs that process the data message flow. As such, some embodiments present the sections for intermediate sites (i.e., any site that is not the first or last site through which a data message flow passes) as collapsible within the user interface. When the number of sites is above a threshold, some embodiments automatically display these sections as collapsed while providing a selectable item for expanding the section. Other embodiments do not automatically collapse any of the sections, but provide selectable items enabling collapse of each section. A collapsed section does not display any of the LFEs that process the data message flow at the corresponding site and is replaced in the visualization with the selectable expansion item. When expanded, a section displays its LFEs as normal. In addition, logical network gateways between collapsed and expanded sections are removed from the visualization in some embodiments.
The visualization of some embodiments can include additional details about the data message flow and the LFEs and physical elements that process the data message flow. In some embodiments, for example, a selectable option is provided to cause the visualization to display a number indicating the latency between sites. Additionally, or alternatively, the visualization provides a selectable option for displaying any alarms raised in the network. When selected, the visualization displays (e.g., by querying the network management system data store) indicators for any LFEs (or PFEs) on which alarms have been raised (e.g., by presenting the GUI items for these LFEs in a different color than the other LFEs).
The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, Detailed Description and the Drawings is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, Detailed Description, and the Drawings, but rather are to be defined by the appended claims, because the claimed subject matters can be embodied in other specific forms without departing from the spirit of the subject matters.
The novel features of the invention are set forth in the appended claims. However, for purpose of explanation, several embodiments of the invention are set forth in the following figures.
In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
Some embodiments of the invention provide a method for presenting a visualization of a data message flow within a logical network that is implemented across multiple sites (e.g., multiple federated datacenters in different locations). The method receives flow tracing data regarding a data message flow that is sent from a source endpoint in a first one of the sites to a destination endpoint in a second one of the sites (possibly flowing through other sites as well) and that is processed according to logical forwarding elements (LFEs) implemented in at least the first and second sites. The method identifies the LFEs that process the data message flow in each site through which the data message flow passes and presents a visualization for the data message flow that includes a separate section for each of these sites. Each of these sections indicates the LFEs that process the data message flow in the corresponding site.
Within each of the sections 105-115, the visualization 100 displays UI items representing LFEs that process the data message flow within the corresponding site. As shown, the data message flow (i.e., data messages belonging to the data message flow) is sent from the source VM (named “src_vm”) and is initially processed by a logical switch (“paris_seg1”). This processing typically occurs at a physical forwarding element (PFE) set (e.g., a set of virtual switches and/or virtual routers), executing on the same host computer as the source VM, and identifies that the packet is logically forwarded to a tier-1 (T1) logical router (“finance_t1”). The PFE set at the host also implements a distributed router (DR) of the T1 logical router, which in this case routes the data message flow to a centralized component of the T1 logical router implemented on an edge computing device in the same site. As described further below, in some embodiments when a logical router spans multiple sites, these centralized router (also called service routers, or SRs) are implemented in each of the spanned sites and one of the sites (and therefore one of the SRs) is designated as a primary SR, with all of the others designated as secondary SRs.
The primary SR for the T1 logical router “finance_t1” is located in the New York site, so the data message flow is routed to this primary SR via a tunnel between logical network gateways (also referred to as remote tunnel endpoints, or RTEPs). The visualization 100 displays indicators for the secondary SR in the Paris section 105, the primary SR in the New York section 110, and for the RTEP channel on the boundary between these two sections. These RTEP channels are shown using a single indicator in some embodiments, though they are each implemented as separate logical network gateways in each site (usually on the same edge device as the SRs that they connect).
Within the New York site, the primary T1 SR routes the data message flow to a tier-0 (TO) logical router (“corp_t0”). As with the T1 SR, the T0 SR in some embodiments includes a DR and a set of SRs (with a primary SR in one site and secondary SRs in other sites). Here, the primary SR of the T0 logical router is located at the London site, so the data message flow is routed from the secondary T0 SR in the New York site to the primary T0 in the London site, again via a tunnel between logical network gateways. The visualization 100 again includes indicators for the secondary T0 SR in the New York section 110, for the primary T0 SR in the London section 115, and for the RTEP which is shown on the boundary between these two sections.
The T0 router routes the data message flow to a different T1 logical router (“it_t1”), which also has its primary SR located at the London site. An indicator for the primary SR of this T1 is shown within the London section 100 of the visualization 100. This T1 logical router routes the data message flow to a logical switch (“london_seg1”) at the same London site, so this switch is shown in the visualization 100 as well. Finally, the logical switch forwards the data message flow to the destination VM (“dst_vm”), which executes on a host computer also located at the London site. It should be noted that the flow tracing operation data messages would not actually be delivered to the destination VM by the PFE set at this host computer (because they are flow tracing operation messages that do not need to be processed by the VM). Further description of the processing of data messages for logical networks that span multiple sites can be found in U.S. patent application Ser. No. 16/906,891, filed Jun. 19, 2020, now issued as U.S. Pat. No. 11,394,634, which is incorporated herein by reference.
In the example visualization 100, each of the LFEs shown is indicated by a shape (e.g., circle for logical routers and logical network gateways, rectangles for the logical switches) with lines connecting the segments and the order of processing moving from left to right as well as bottom to top and then back to bottom. It should be understood that this example as well as the various other example visualizations presented in this document are merely examples and that different embodiments may include different variations on these visualizations (e.g., different shapes to represent LFEs, description text inside the UI item representing an LFE rather than outside the UI item, different colors for different types of LFEs, etc.).
As shown, the process 200 begins by initiating (at 205) a flow tracing operation through a logical network from a source endpoint to a destination endpoint. In some embodiments, a user of the network management and control system specifies (e.g., through a graphical user interface) for the flow tracing operation to be performed and specifies source and destination endpoints for the operation. In some embodiments, the source and destination endpoints are data compute nodes (e.g., VMs, containers, bare metal computing devices, etc.) in the logical network managed by the network management and control system. These source and destination endpoints may be located at the same site or different sites when the logical network spans multiple sites.
The network management and control system is also responsible for injecting flow tracing data messages at the source endpoint which are addressed to the destination endpoint as though the source endpoint had actually sent the data messages. These data messages are also marked with a flag (e.g., a single bit) that indicates that they are generated for the flow tracing operation. In some embodiments, this flag causes (i) PFEs that process the data messages to provide flow tracing data to the network management and control system and (ii) the PFE connected to the destination endpoint to process the data message but not actually deliver the data message to the destination endpoint. The flow tracing operations of some embodiments are described in greater detail in U.S. Pat. Nos. 9,197,529 and 10,805,239, both of which are incorporated herein by reference.
As a result of initiating the flow tracing operation, the process 200 receives (at 210) flow tracing data for the data message flow from PFEs that process the flow tracing operation data messages. These PFEs (e.g., software and/or hardware forwarding elements, such as edge devices as well as virtual switches and virtual routers executing on host computers) are configured by the network management and control system to send flow tracing data to a central controller or controller cluster at their respective site (e.g., directly, or via local controllers that execute on host computers alongside the PFEs). The flag bit used to mark the flow tracing operation data messages specifies for the PFEs to send flow tracing data in response to processing these data messages.
The PFEs, in some embodiments, send the flow tracing data to the controllers as control messages that indicate that the forwarding element has performed a specific action or actions. These actions can include physical receipt of a data message at a particular port, ingress of a packet to an LFE, logical forwarding of a data message according to an LFE, application of a firewall, access control, or other rule for an LFE to a data message, physical forwarding (e.g., encapsulation and output) of a data message, dropping a data message, delivery of a data message to its destination, etc. The controllers and/or network managers at each site aggregate the flow tracing data for a particular flow tracing operation and pass this data to a centralized controller and/or manager cluster in some embodiments (e.g., the network manager cluster that generates the visualization of the flow tracing operation). The centralized controller and/or manager cluster is thus able to use the data from all of the sites to generate the visualization of the processing of the data message flow across the multiple sites. Description of a multi-site network management and control system can be found in U.S. patent application Ser. No. 16/906,925, filed Jun. 19, 2020, now published as U.S. Patent Publication 2021/0314212, which is incorporated herein by reference.
The process 200 then identifies (at 215) the sites from which flow tracing data was received. As mentioned, in some embodiments, the network managers and/or controllers at the sites provide flow tracing data to a centralized component of the network management and control system that generates a visualization of the flow tracing operation to provide to the user that requested the operation. Based on which sites provide flow tracing data, this central component can determine the sites that will be included in the visualization.
For each of these identified sites, the process 200 identifies (at 220) the LFEs that process the data messages at the site and the PFEs that implement these LFEs. In some embodiments, when a PFE provides flow tracing data for a particular operation, that operation specifies at least (i) the PFE and (ii) the LFE associated with the operation, if one exists (e.g., for a logical forwarding operation). Thus, when a PFE executing on the source host computer (i.e., the host computer at which the source endpoint executes) implements a logical switch by logically forwarding a data message to a logical router, that information is provided in a flow tracing control message. When the PFE encapsulates the data message to send the data message to an edge node at which the next hop SR executes, that information is also included in another flow tracing control message (or the same control message, for embodiments in which all of the operations are included in a single message from the PFE). Similarly, when an edge node performs logical routing for a particular SR, tunnels a data message to another site via an RTEP, performs logical switching, etc., this information is conveyed via flow tracing control messages.
Finally, the process 200 generates (at 225) a visualization of the flow tracing operation with a separate section for each identified site that indicates at least a subset of the LFEs that process the data messages at the site. This visualization is provided to the user within a graphical user interface (e.g., of a network management application). The process 200 then ends. In some embodiments, as shown in
This logical switch logically forwards the data message flow to the T1 logical router “finance_t1”, for which Paris is a secondary site. As such, after the data message flow is tunneled to the edge device implementing the T1 SR within the Paris site, this secondary T1 SR routes the data message to the primary T1 SR (and sends this data message via the tunnel between logical network gateways for the backplane logical switch connecting these SRs), which is located in the New York site. As such, the visualization 300 shows the data message flow being sent via an RTEP to the primary T1, for which the GUI item is displayed in the New York section 310. Because the destination network address of these data messages is an external address, the T1 SR routes the data messages to the T0 SR (“corp_t0”), for which the New York site is a secondary site. This secondary T0 SR could be implemented on the same edge device as the primary T1 SR or a different edge device. In either case, the secondary T0 SR routes the data message flow to the primary T0 SR, which in this case is located at the Paris site.
Thus, rather than continuing to show the data message flow trending rightward, the visualization 300 displays the flow going back to the Paris section 305 (to a primary T0 SR, via the tunnel between logical network gateways for connecting these T0 SRs). Finally, within this section 305, the visualization displays a cloud icon to indicate that the data message flow is sent to external networks. While this example shows a single section 305 corresponding to the Paris site, other embodiments display multiple separate sections for a site through which the data message flow passes multiple times. In some such embodiments, a second section corresponding to the Paris site would be displayed to the right of the New York section 310, and would include the UI items for the primary T0 SR as well as the external network cloud icon. Some embodiments also use arrows to indicate the direction of the flow, which can be useful for such a flow.
As noted, some embodiments do not display all of the LFEs that process a data message flow in the visualization for that flow. In some embodiments, only user-configured LFEs are shown in the visualization. These include logical switches to which network endpoints connect, logical routers, and RTEPs. However, the internal logical components of a logical router are not shown in some embodiments (i.e., the DR and SR are not differentiated, and neither the logical switch that connects these components nor the backplane logical switch that connects SRs across sites are indicated except as an RTEP). As described above by reference to
When a segment is stretched between sites and the source and destination endpoints are both connected to that segment, data messages are sent across sites via logical network gateways and the tunnel between these logical network gateways (the RTEP channel). Whereas the logical network gateways for a backplane logical switch between SRs of the same logical router are typically implemented as tunnel endpoints (RTEPs) on the same edge devices as the SRs, the logical network gateways for stretched logical switches are implemented as RTEPs on edge devices separate from the host computers that implement the logical switches for these data messages. Thus, rather than tunnel a data message directly from the source host computer at the source site to the destination host computer at the destination site, some such embodiments tunnel the data message from the source host computer to the edge device at the source site implementing the logical network gateway for the logical switch, which in turn tunnels the data message to the edge device at the destination site implementing the logical network gateway for the logical switch (via the RTEP channel between the sites), which then tunnels the data message to the destination host computer.
As described above, each LFE displayed in the flow tracing operation visualization is implemented by a PFE. While many of the LFEs are actually each implemented by many different PFEs at one or more sites, in the course of processing the data message flow each LFE as represented in the visualization is typically processed by one PFE (or possibly two PFEs). For example, a logical switch to which a source endpoint for a data message flow connects will typically be implemented (in the context of processing the data message flow) by the PFE set at the host computer on which the source endpoint executes. This PFE set also typically implements the logical router (i.e., the DR of the logical router) to which the logical switch connects, but if the data message flow is sent to an SR, then the edge device that implements the SR also implements the logical router.
In general, the logical network gateways and SRs are implemented on edge devices, while the logical switches shown in the flow tracing operation visualizations are implemented by the edge devices as well as the PFE sets executing on the source and/or destination endpoint host computers. In some embodiments, the visualization provides an option for a user to view the physical computing device (e.g., edge devices, host computers) that implements each of the displayed LFEs that processes the data message flow.
As shown in the figure, some embodiments display the physical devices using a dashed line (as opposed to the straight lines used to represent the LFEs) or use a different mechanism to differentiate the physical devices from the LFEs (e.g., different colors, different fonts for the names, etc.). The display also shows the type of physical device (e.g., either host node or edge node) as well as the name for the physical device in the network management and control system (e.g., HN1, EN2, etc.). In addition, as shown in the figure, some embodiments display the name of the physical device within a selectable item (in this case, a dotted line circle). This selectable item (i.e., the items showing “HN1”, “EN1”, etc.) is selectable in some embodiments to view additional details about that physical device (e.g., the type of computing device, the group of computing devices to which it belongs, etc.). It should be understood that different embodiments display such selectable items for the physical devices in different manners (e.g., with or without the device name, as solid shaded shapes rather than dotted or dashed lines, etc.).
The visualization 500 shows a data message flow following the same path as in
In this case, the edge node EN2 also implements the secondary SR for the T0 logical router “corp_t0” within the New York site. As in this example, some embodiments display two separate indicators for the same edge node when this occurs. However, other embodiments display a single indicator for an edge node when two consecutive SRs are implemented on the same edge node (e.g., an indicator that encompasses both of the SRs). Within the section 515 corresponding to the London site, two edge nodes EN3 and EN4 are displayed for the two SRs that process the packet at this site.
In addition, although the logical forwarding operations of the logical switch “london_seg1” are performed at the edge node EN4 for this data message flow, the UI item for the logical switch is displayed within the UI item for the destination host computer HN2 (the PFE set executing at this host computer does perform additional logical processing to deliver the data message to the destination endpoint “dst_vm”). Different embodiments, however, display the logical switch UI item within the indicator for the edge device EN4, as two separate UI items within both of the physical device indicators, or as a single item on the boundaries of these two physical device indicators. While the example shows the UI items representing the physical devices as encompassing the UI items representing the LFEs, other embodiments instead display indicators for the physical devices that abut the corresponding LFEs. It should be understood that many variations on the display shown in
When a data message flow passes through numerous sites, the visualization of the flow tracing operation can become crowded and difficult to follow because so many sections are required. In addition, an administrator may not be interested in viewing all of the different secondary and primary SRs that process the data message flow. As such, some embodiments present the sections for intermediate sites (i.e., any site that is not the first or last site through which a data message flow passes) as collapsible within the user interface.
In this example, each of these sections is fully displayed. However, when the number of sites is above a threshold (e.g., more than four sites, more than five sites, etc.), some embodiments automatically display some of the sections as collapsed while providing a selectable item for expanding the section.
In some embodiments, as shown, vertical dashed lines (or similar items used to separate sections of the visualization) are not displayed between expanded sections and collapsed sections. Rather, lines are used to indicate that the flow passes from one of the LFEs in the expanded section (e.g., the primary T1 SR in the Paris section 705) to the site represented by the collapsed section. In some embodiments, these lines are always shown in the middle of the visualization. In other embodiments, as with the line passing from the UI item 725 to the secondary T0 SR item in the Los Angeles section 710, these lines are displayed so as to connect to the previous/next LFE in the flow.
When a user selects one of the expandable UI items, the visualization is modified to display the corresponding section with the LFEs and their connections.
The flow tracing operation visualizations of some embodiments can include additional details about the data message flow and the LFEs and physical elements that process the data message flow, either as part of the standard display or as options for a user to select.
The selectable item 905 causes the display of latency information between the sections of the visualization 900. The visualization 900, in this example, is the same flow tracing operation as that shown in
The selectable item 910 causes the display of alarm information in the visualization 900. In this case, two LFEs have alarms raised: the secondary SR at the New York site for the TO logical router “corp_t0” and the primary SR at the London site for the T1 logical router “it_t1”. The UI items 930 and 935 for these LFEs are displayed in a different manner than the other LFEs so as to highlight that alarms are raised for the LFEs. In different embodiments, the presence of raised alarms may be shown by bolding or otherwise changing the font used within the UI items, changing the color, saturation, or other display characteristics of the UI items, making the UI items larger, etc. Alarms, in some embodiments, are events that the network management and control system detects and raises to indicate that the performance and system operation of a component (e.g., an LFE, PFE, etc.) is potentially affected. For instance, an edge device could be experiencing unusually high CPU usage or low available disk space, which could raise alarms on the physical edge device as well as the SRs implemented by that edge device. In some embodiments, the UI items indicating alarms raised are also selectable to provide information about the number of alarms raised, the types of alarms raised, etc.
The bus 1005 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 1000. For instance, the bus 1005 communicatively connects the processing unit(s) 1010 with the read-only memory 1030, the system memory 1025, and the permanent storage device 1035.
From these various memory units, the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments.
The read-only-memory (ROM) 1030 stores static data and instructions that are needed by the processing unit(s) 1010 and other modules of the electronic system. The permanent storage device 1035, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the electronic system 1000 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1035.
Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the permanent storage device 1035, the system memory 1025 is a read-and-write memory device. However, unlike storage device 1035, the system memory is a volatile read-and-write memory, such a random-access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in the system memory 1025, the permanent storage device 1035, and/or the read-only memory 1030. From these various memory units, the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
The bus 1005 also connects to the input and output devices 1040 and 1045. The input devices enable the user to communicate information and select commands to the electronic system. The input devices 1040 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 1045 display images generated by the electronic system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
Finally, as shown in
Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.
As used in this specification, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
This specification refers throughout to computational and network environments that include virtual machines (VMs). However, virtual machines are merely one example of data compute nodes (DCNs) or data compute end nodes, also referred to as addressable nodes. DCNs may include non-virtualized physical hosts, virtual machines, containers that run on top of a host operating system without the need for a hypervisor or separate operating system, and hypervisor kernel network interface modules.
VMs, in some embodiments, operate with their own guest operating systems on a host using resources of the host virtualized by virtualization software (e.g., a hypervisor, virtual machine monitor, etc.). The tenant (i.e., the owner of the VM) can choose which applications to operate on top of the guest operating system. Some containers, on the other hand, are constructs that run on top of a host operating system without the need for a hypervisor or separate guest operating system. In some embodiments, the host operating system uses name spaces to isolate the containers from each other and therefore provides operating-system level segregation of the different groups of applications that operate within different containers. This segregation is akin to the VM segregation that is offered in hypervisor-virtualized environments that virtualize system hardware, and thus can be viewed as a form of virtualization that isolates different groups of applications that operate in different containers. Such containers are more lightweight than VMs.
Hypervisor kernel network interface modules, in some embodiments, is a non-VM DCN that includes a network stack with a hypervisor kernel network interface and receive/transmit threads. One example of a hypervisor kernel network interface module is the vmknic module that is part of the ESXi™ hypervisor of VMware, Inc.
It should be understood that while the specification refers to VMs, the examples given could be any type of DCNs, including physical hosts, VMs, non-VM containers, and hypervisor kernel network interface modules. In fact, the example networks could include combinations of different types of DCNs in some embodiments.
While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. In addition, a number of the figures (including
Number | Date | Country | Kind |
---|---|---|---|
202141033335 | Jul 2021 | IN | national |
Number | Name | Date | Kind |
---|---|---|---|
5224100 | Lee et al. | Jun 1993 | A |
5245609 | Ofek et al. | Sep 1993 | A |
5265092 | Soloway et al. | Nov 1993 | A |
5504921 | Dev et al. | Apr 1996 | A |
5550816 | Hardwick et al. | Aug 1996 | A |
5729685 | Chatwani et al. | Mar 1998 | A |
5751967 | Raab et al. | May 1998 | A |
5781534 | Perlman et al. | Jul 1998 | A |
5805819 | Chin | Sep 1998 | A |
6104699 | Holender et al. | Aug 2000 | A |
6104700 | Haddock et al. | Aug 2000 | A |
6141738 | Munter et al. | Oct 2000 | A |
6219699 | McCloghrie et al. | Apr 2001 | B1 |
6430160 | Smith et al. | Aug 2002 | B1 |
6456624 | Eccles et al. | Sep 2002 | B1 |
6512745 | Abe et al. | Jan 2003 | B1 |
6539432 | Taguchi et al. | Mar 2003 | B1 |
6658002 | Ross et al. | Dec 2003 | B1 |
6680934 | Cain | Jan 2004 | B1 |
6721334 | Ketcham | Apr 2004 | B1 |
6785843 | McRae et al. | Aug 2004 | B1 |
6882642 | Kejriwal et al. | Apr 2005 | B1 |
6941487 | Balakrishnan et al. | Sep 2005 | B1 |
6963585 | Pennec et al. | Nov 2005 | B1 |
6999454 | Crump | Feb 2006 | B1 |
7013342 | Riddle | Mar 2006 | B2 |
7062559 | Yoshimura et al. | Jun 2006 | B2 |
7079544 | Wakayama et al. | Jul 2006 | B2 |
7180856 | Breslau et al. | Feb 2007 | B1 |
7197572 | Matters et al. | Mar 2007 | B2 |
7200144 | Terrell et al. | Apr 2007 | B2 |
7209439 | Rawlins et al. | Apr 2007 | B2 |
7243143 | Bullard | Jul 2007 | B1 |
7283473 | Arndt et al. | Oct 2007 | B2 |
7315985 | Gauvin et al. | Jan 2008 | B1 |
7342916 | Das et al. | Mar 2008 | B2 |
7360158 | Beeman | Apr 2008 | B1 |
7391771 | Orava et al. | Jun 2008 | B2 |
7450598 | Chen et al. | Nov 2008 | B2 |
7457870 | Lownsbrough et al. | Nov 2008 | B1 |
7463579 | Lapuh et al. | Dec 2008 | B2 |
7478173 | Delco | Jan 2009 | B1 |
7483370 | Dayal et al. | Jan 2009 | B1 |
7555002 | Arndt et al. | Jun 2009 | B2 |
7577131 | Joseph et al. | Aug 2009 | B2 |
7590133 | Hatae et al. | Sep 2009 | B2 |
7602723 | Mandato et al. | Oct 2009 | B2 |
7606260 | Oguchi et al. | Oct 2009 | B2 |
7627692 | Pessi | Dec 2009 | B2 |
7633955 | Saraiya et al. | Dec 2009 | B1 |
7639625 | Kaminsky et al. | Dec 2009 | B2 |
7643488 | Khanna et al. | Jan 2010 | B2 |
7649851 | Takashige et al. | Jan 2010 | B2 |
7706266 | Plamondon | Apr 2010 | B2 |
7710874 | Balakrishnan et al. | May 2010 | B2 |
7729245 | Breslau et al. | Jun 2010 | B1 |
7760735 | Chen et al. | Jul 2010 | B1 |
7764599 | Doi et al. | Jul 2010 | B2 |
7792987 | Vohra et al. | Sep 2010 | B1 |
7802000 | Huang et al. | Sep 2010 | B1 |
7808919 | Nadeau et al. | Oct 2010 | B2 |
7808929 | Wong et al. | Oct 2010 | B2 |
7818452 | Matthews et al. | Oct 2010 | B2 |
7826482 | Minei et al. | Nov 2010 | B1 |
7839847 | Nadeau et al. | Nov 2010 | B2 |
7885276 | Lin | Feb 2011 | B1 |
7936770 | Frattura et al. | May 2011 | B1 |
7937438 | Miller et al. | May 2011 | B1 |
7937492 | Kompella et al. | May 2011 | B1 |
7948986 | Ghosh et al. | May 2011 | B1 |
7953865 | Miller et al. | May 2011 | B1 |
7991859 | Miller et al. | Aug 2011 | B1 |
7995483 | Bayar et al. | Aug 2011 | B1 |
8024478 | Patel | Sep 2011 | B2 |
8027354 | Portolani et al. | Sep 2011 | B1 |
8031606 | Memon et al. | Oct 2011 | B2 |
8031633 | Bueno et al. | Oct 2011 | B2 |
8046456 | Miller et al. | Oct 2011 | B1 |
8054832 | Shukla et al. | Nov 2011 | B1 |
8055789 | Richardson et al. | Nov 2011 | B2 |
8060875 | Lambeth | Nov 2011 | B1 |
8131852 | Miller et al. | Mar 2012 | B1 |
8149737 | Metke et al. | Apr 2012 | B2 |
8155028 | Abu-Hamdeh et al. | Apr 2012 | B2 |
8161270 | Parker et al. | Apr 2012 | B1 |
8166201 | Richardson et al. | Apr 2012 | B2 |
8199750 | Schultz et al. | Jun 2012 | B1 |
8223668 | Allan et al. | Jul 2012 | B2 |
8224931 | Brandwine et al. | Jul 2012 | B1 |
8224971 | Miller et al. | Jul 2012 | B1 |
8254273 | Kaminsky et al. | Aug 2012 | B2 |
8265062 | Tang et al. | Sep 2012 | B2 |
8265075 | Pandey | Sep 2012 | B2 |
8281067 | Stolowitz | Oct 2012 | B2 |
8290137 | Yurchenko et al. | Oct 2012 | B2 |
8306043 | Breslau et al. | Nov 2012 | B2 |
8312129 | Miller et al. | Nov 2012 | B1 |
8339959 | Moisand et al. | Dec 2012 | B1 |
8339994 | Gnanasekaran et al. | Dec 2012 | B2 |
8345558 | Nicholson et al. | Jan 2013 | B2 |
8351418 | Zhao et al. | Jan 2013 | B2 |
8359576 | Prasad et al. | Jan 2013 | B2 |
8456984 | Ranganathan et al. | Jun 2013 | B2 |
8504718 | Wang et al. | Aug 2013 | B2 |
8565108 | Marshall et al. | Oct 2013 | B1 |
8571031 | Davies et al. | Oct 2013 | B2 |
8611351 | Gooch et al. | Dec 2013 | B2 |
8612627 | Brandwine | Dec 2013 | B1 |
8625594 | Safrai et al. | Jan 2014 | B2 |
8625603 | Ramakrishnan et al. | Jan 2014 | B1 |
8625616 | Vobbilisetty et al. | Jan 2014 | B2 |
8644188 | Brandwine et al. | Feb 2014 | B1 |
8645952 | Biswas et al. | Feb 2014 | B2 |
8750288 | Nakil et al. | Jun 2014 | B2 |
8762501 | Kempf et al. | Jun 2014 | B2 |
8806005 | Miri et al. | Aug 2014 | B2 |
8837300 | Nedeltchev et al. | Sep 2014 | B2 |
8838743 | Lewites et al. | Sep 2014 | B2 |
8929221 | Breslau et al. | Jan 2015 | B2 |
8934495 | Hilton et al. | Jan 2015 | B1 |
9059926 | Akhter et al. | Jun 2015 | B2 |
9197529 | Ganichev et al. | Nov 2015 | B2 |
9226220 | Banks et al. | Dec 2015 | B2 |
9258195 | Pendleton | Feb 2016 | B1 |
9280448 | Farrell et al. | Mar 2016 | B2 |
9282019 | Ganichev et al. | Mar 2016 | B2 |
9344349 | Ganichev et al. | May 2016 | B2 |
9407580 | Ganichev et al. | Aug 2016 | B2 |
9602334 | Benny | Mar 2017 | B2 |
9729433 | Polland | Aug 2017 | B2 |
9860151 | Ganichev et al. | Jan 2018 | B2 |
9898317 | Nakil et al. | Feb 2018 | B2 |
10044581 | Russell | Aug 2018 | B1 |
10181993 | Ganichev et al. | Jan 2019 | B2 |
10200306 | Nhu et al. | Feb 2019 | B2 |
10469342 | Lenglet et al. | Nov 2019 | B2 |
10608887 | Jain et al. | Mar 2020 | B2 |
10728121 | Chitalia et al. | Jul 2020 | B1 |
10778557 | Ganichev et al. | Sep 2020 | B2 |
10805239 | Nhu et al. | Oct 2020 | B2 |
11075847 | Kwan et al. | Jul 2021 | B1 |
11128550 | Lenglet et al. | Sep 2021 | B2 |
11196628 | Shen et al. | Dec 2021 | B1 |
11201808 | Ganichev et al. | Dec 2021 | B2 |
11336533 | Bogado et al. | May 2022 | B1 |
11336590 | Nhu et al. | May 2022 | B2 |
20010020266 | Kojima et al. | Sep 2001 | A1 |
20010043614 | Viswanadham et al. | Nov 2001 | A1 |
20020093952 | Gonda | Jul 2002 | A1 |
20020112060 | Kato | Aug 2002 | A1 |
20020194369 | Rawlins et al. | Dec 2002 | A1 |
20030041170 | Suzuki | Feb 2003 | A1 |
20030058850 | Rangarajan et al. | Mar 2003 | A1 |
20040073659 | Rajsic et al. | Apr 2004 | A1 |
20040098505 | Clemmensen | May 2004 | A1 |
20040186914 | Shimada | Sep 2004 | A1 |
20040267866 | Carollo et al. | Dec 2004 | A1 |
20040267897 | Hill et al. | Dec 2004 | A1 |
20050018669 | Arndt et al. | Jan 2005 | A1 |
20050027881 | Figueira et al. | Feb 2005 | A1 |
20050053079 | Havala | Mar 2005 | A1 |
20050083953 | May | Apr 2005 | A1 |
20050111445 | Wybenga et al. | May 2005 | A1 |
20050120160 | Plouffe et al. | Jun 2005 | A1 |
20050132044 | Guingo et al. | Jun 2005 | A1 |
20050149604 | Navada | Jul 2005 | A1 |
20050182853 | Lewites et al. | Aug 2005 | A1 |
20050220030 | Nagami | Oct 2005 | A1 |
20050220096 | Friskney et al. | Oct 2005 | A1 |
20050232230 | Nagami et al. | Oct 2005 | A1 |
20060002370 | Rabie et al. | Jan 2006 | A1 |
20060026225 | Canali et al. | Feb 2006 | A1 |
20060028999 | Iakobashvili et al. | Feb 2006 | A1 |
20060029056 | Perera et al. | Feb 2006 | A1 |
20060037075 | Frattura et al. | Feb 2006 | A1 |
20060174087 | Hashimoto et al. | Aug 2006 | A1 |
20060187908 | Shimozono et al. | Aug 2006 | A1 |
20060193266 | Siddha et al. | Aug 2006 | A1 |
20060206655 | Chappell et al. | Sep 2006 | A1 |
20060218447 | Garcia et al. | Sep 2006 | A1 |
20060221961 | Basso et al. | Oct 2006 | A1 |
20060282895 | Rentzis et al. | Dec 2006 | A1 |
20060291388 | Amdahl et al. | Dec 2006 | A1 |
20070050763 | Kagan et al. | Mar 2007 | A1 |
20070055789 | Claise et al. | Mar 2007 | A1 |
20070064673 | Bhandaru et al. | Mar 2007 | A1 |
20070097982 | Wen et al. | May 2007 | A1 |
20070156919 | Potti et al. | Jul 2007 | A1 |
20070260721 | Bose et al. | Nov 2007 | A1 |
20070286185 | Eriksson et al. | Dec 2007 | A1 |
20070297428 | Bose et al. | Dec 2007 | A1 |
20080002579 | Lindholm et al. | Jan 2008 | A1 |
20080002683 | Droux et al. | Jan 2008 | A1 |
20080021925 | Sweeney | Jan 2008 | A1 |
20080049614 | Briscoe et al. | Feb 2008 | A1 |
20080049621 | McGuire et al. | Feb 2008 | A1 |
20080049786 | Ram et al. | Feb 2008 | A1 |
20080059556 | Greenspan et al. | Mar 2008 | A1 |
20080071900 | Hecker et al. | Mar 2008 | A1 |
20080086726 | Griffith et al. | Apr 2008 | A1 |
20080112551 | Forbes et al. | May 2008 | A1 |
20080159301 | Heer | Jul 2008 | A1 |
20080240095 | Basturk | Oct 2008 | A1 |
20090010254 | Shimada | Jan 2009 | A1 |
20090100298 | Lange et al. | Apr 2009 | A1 |
20090109973 | Ilnicki | Apr 2009 | A1 |
20090150527 | Tripathi et al. | Jun 2009 | A1 |
20090245138 | Sapsford et al. | Oct 2009 | A1 |
20090248895 | Archer et al. | Oct 2009 | A1 |
20090249213 | Murase et al. | Oct 2009 | A1 |
20090292858 | Lambeth et al. | Nov 2009 | A1 |
20090327903 | Smith et al. | Dec 2009 | A1 |
20100128623 | Dunn et al. | May 2010 | A1 |
20100131636 | Suri et al. | May 2010 | A1 |
20100188976 | Rahman et al. | Jul 2010 | A1 |
20100214949 | Smith et al. | Aug 2010 | A1 |
20100232435 | Jabr et al. | Sep 2010 | A1 |
20100254385 | Sharma et al. | Oct 2010 | A1 |
20100275199 | Smith et al. | Oct 2010 | A1 |
20100306408 | Greenberg et al. | Dec 2010 | A1 |
20110022695 | Dalal et al. | Jan 2011 | A1 |
20110055710 | Kirkby et al. | Mar 2011 | A1 |
20110075664 | Lambeth et al. | Mar 2011 | A1 |
20110085557 | Gnanasekaran et al. | Apr 2011 | A1 |
20110085559 | Chung et al. | Apr 2011 | A1 |
20110085563 | Kotha et al. | Apr 2011 | A1 |
20110128959 | Bando et al. | Jun 2011 | A1 |
20110137602 | Desineni et al. | Jun 2011 | A1 |
20110194567 | Shen | Aug 2011 | A1 |
20110202920 | Takase | Aug 2011 | A1 |
20110261825 | Ichino | Oct 2011 | A1 |
20110299413 | Chatwani et al. | Dec 2011 | A1 |
20110299534 | Koganti et al. | Dec 2011 | A1 |
20110299537 | Saraiya et al. | Dec 2011 | A1 |
20110305167 | Koide | Dec 2011 | A1 |
20110317559 | Kern et al. | Dec 2011 | A1 |
20110317696 | Aldrin et al. | Dec 2011 | A1 |
20120079478 | Galles et al. | Mar 2012 | A1 |
20120151352 | Ramprasad et al. | Jun 2012 | A1 |
20120159454 | Barham et al. | Jun 2012 | A1 |
20120182992 | Cowart et al. | Jul 2012 | A1 |
20120275331 | Benkö et al. | Nov 2012 | A1 |
20120287791 | Xi et al. | Nov 2012 | A1 |
20120314599 | Vilke et al. | Dec 2012 | A1 |
20130010600 | Jocha et al. | Jan 2013 | A1 |
20130019008 | Jorgenson et al. | Jan 2013 | A1 |
20130024579 | Zhang et al. | Jan 2013 | A1 |
20130031233 | Feng et al. | Jan 2013 | A1 |
20130041934 | Annamalaisami et al. | Feb 2013 | A1 |
20130044636 | Koponen et al. | Feb 2013 | A1 |
20130054761 | Kempf et al. | Feb 2013 | A1 |
20130058346 | Sridharan et al. | Mar 2013 | A1 |
20130067067 | Miri et al. | Mar 2013 | A1 |
20130125120 | Zhang et al. | May 2013 | A1 |
20130163427 | Beliveau et al. | Jun 2013 | A1 |
20130163475 | Beliveau et al. | Jun 2013 | A1 |
20130294249 | Lin et al. | Nov 2013 | A1 |
20130332602 | Nakil et al. | Dec 2013 | A1 |
20130332983 | Koorevaar et al. | Dec 2013 | A1 |
20130339544 | Mithyantha | Dec 2013 | A1 |
20140019639 | Ueno | Jan 2014 | A1 |
20140029451 | Nguyen | Jan 2014 | A1 |
20140115578 | Cooper et al. | Apr 2014 | A1 |
20140119203 | Sundaram et al. | May 2014 | A1 |
20140126418 | Brendel et al. | May 2014 | A1 |
20140157405 | Joll et al. | Jun 2014 | A1 |
20140177633 | Manula et al. | Jun 2014 | A1 |
20140195666 | Dumitriu et al. | Jul 2014 | A1 |
20140207926 | Benny | Jul 2014 | A1 |
20140219086 | Cantu′ et al. | Aug 2014 | A1 |
20140281030 | Cui et al. | Sep 2014 | A1 |
20140282823 | Rash et al. | Sep 2014 | A1 |
20140297846 | Hoja et al. | Oct 2014 | A1 |
20140304393 | Annamalaisami et al. | Oct 2014 | A1 |
20140351415 | Harrigan et al. | Nov 2014 | A1 |
20150016286 | Ganichev et al. | Jan 2015 | A1 |
20150016287 | Ganichev et al. | Jan 2015 | A1 |
20150016298 | Ganichev et al. | Jan 2015 | A1 |
20150016469 | Ganichev et al. | Jan 2015 | A1 |
20150043378 | Bardgett et al. | Feb 2015 | A1 |
20150180755 | Zhang et al. | Jun 2015 | A1 |
20150195169 | Liu et al. | Jul 2015 | A1 |
20150263899 | Tubaltsev et al. | Sep 2015 | A1 |
20150271011 | Neginhal et al. | Sep 2015 | A1 |
20150281036 | Sun et al. | Oct 2015 | A1 |
20160105333 | Lenglet et al. | Apr 2016 | A1 |
20160119204 | Murasato et al. | Apr 2016 | A1 |
20160142291 | Polland | May 2016 | A1 |
20160149791 | Ganichev et al. | May 2016 | A1 |
20160226741 | Ganichev et al. | Aug 2016 | A1 |
20160274558 | Strohmenger et al. | Sep 2016 | A1 |
20160359880 | Pang et al. | Dec 2016 | A1 |
20170026270 | Handige Shankar | Jan 2017 | A1 |
20170126728 | Beam et al. | May 2017 | A1 |
20170222881 | Holbrook et al. | Aug 2017 | A1 |
20170288991 | Ganesh | Oct 2017 | A1 |
20170302530 | Wolting | Oct 2017 | A1 |
20170310574 | Wolting | Oct 2017 | A1 |
20170317954 | Masurekar et al. | Nov 2017 | A1 |
20170358111 | Madsen | Dec 2017 | A1 |
20170373950 | Szilagyi et al. | Dec 2017 | A1 |
20180062939 | Kulkarni et al. | Mar 2018 | A1 |
20180063188 | Karin et al. | Mar 2018 | A1 |
20180091388 | Levy et al. | Mar 2018 | A1 |
20180102959 | Ganichev et al. | Apr 2018 | A1 |
20180123903 | Holla et al. | May 2018 | A1 |
20180136798 | Aggour et al. | May 2018 | A1 |
20180219751 | Cavuto et al. | Aug 2018 | A1 |
20180262447 | Nhu et al. | Sep 2018 | A1 |
20180262594 | Nhu | Sep 2018 | A1 |
20180309637 | Gill et al. | Oct 2018 | A1 |
20180373961 | Wang et al. | Dec 2018 | A1 |
20190014029 | Burgio et al. | Jan 2019 | A1 |
20190109769 | Jain et al. | Apr 2019 | A1 |
20190140931 | Ganichev et al. | May 2019 | A1 |
20190158377 | Chau | May 2019 | A1 |
20200067799 | Lenglet et al. | Feb 2020 | A1 |
20200106744 | Miriyala et al. | Apr 2020 | A1 |
20200136943 | Banyai et al. | Apr 2020 | A1 |
20200169476 | Vela et al. | May 2020 | A1 |
20200204457 | Hu | Jun 2020 | A1 |
20200210195 | Lampert et al. | Jul 2020 | A1 |
20200304389 | Bauan et al. | Sep 2020 | A1 |
20200313985 | Jayakumar et al. | Oct 2020 | A1 |
20200322243 | Xi et al. | Oct 2020 | A1 |
20200322249 | Liu et al. | Oct 2020 | A1 |
20200336387 | Suzuki et al. | Oct 2020 | A1 |
20210014157 | Zhou | Jan 2021 | A1 |
20210029059 | Nhu et al. | Jan 2021 | A1 |
20210051100 | Chitalia et al. | Feb 2021 | A1 |
20210051109 | Chitalia et al. | Feb 2021 | A1 |
20210092064 | Sidebottom et al. | Mar 2021 | A1 |
20210216908 | Lu et al. | Jul 2021 | A1 |
20210218630 | Lu et al. | Jul 2021 | A1 |
20210218652 | Raut et al. | Jul 2021 | A1 |
20210226880 | Ramamoorthy et al. | Jul 2021 | A1 |
20210266259 | Renner, III et al. | Aug 2021 | A1 |
20210311764 | Rosoff et al. | Oct 2021 | A1 |
20220014451 | Naik et al. | Jan 2022 | A1 |
20220038368 | Shen et al. | Feb 2022 | A1 |
20220038501 | Shen et al. | Feb 2022 | A1 |
20220103452 | Ganichev et al. | Mar 2022 | A1 |
20220150136 | Chen | May 2022 | A1 |
20220165035 | Cui | May 2022 | A1 |
20220210120 | Nigam et al. | Jun 2022 | A1 |
20220224620 | Chhabra | Jul 2022 | A1 |
20220263721 | Bogado et al. | Aug 2022 | A1 |
Number | Date | Country |
---|---|---|
1154601 | Nov 2001 | EP |
2002141905 | May 2002 | JP |
2003069609 | Mar 2003 | JP |
2003124976 | Apr 2003 | JP |
2003318949 | Nov 2003 | JP |
9506989 | Mar 1995 | WO |
2012126488 | Sep 2012 | WO |
2013184846 | Dec 2013 | WO |
2015005968 | Jan 2015 | WO |
Entry |
---|
Non-Published commonly Owned U.S. Appl. No. 17/732,440, filed Apr. 28, 2022, 46 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/185,690, filed Feb. 25, 2021, 38 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/185,824, filed Feb. 25, 2021, 32 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/507,449, filed Oct. 21, 2021, 47 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/507,453, filed Oct. 21, 2021, 48 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/507,462, filed Oct. 21, 2021, 47 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/530,826, filed Nov. 19, 2021, 39 pages, VMware, Inc. |
Non-Published commonly Owned U.S. Appl. No. 17/548,400, filed Dec. 10, 2021, 55 pages, Nicira, Inc. |
Phaal, Peter, et al., “sFlow Version 5,” Jul. 2004, 46 pages, available at http://www.sflow.org/sflow_version_5.txt. |
Phan, Doantam, et al., “Visual Analysis of Network Flow Data with Timelines and Event Plots,” VizSEC 2007, Month Unknown 2007, 16 pages. |
Levin, Anna, et al., “Network Monitoring in Federated Cloud Environment,” 2017 IEEE International Conference on Smart Computing, May 29-31, 2017, 6 pages, IEEE, Hong Kong, China. |
Number | Date | Country | |
---|---|---|---|
20230023956 A1 | Jan 2023 | US |