Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
In an embodiment, a data processing method comprises transmitting, from a monitoring computer system that is programmed for monitoring one or more services, a request for information relating to new services to a cluster of computing nodes that are managing the one or more services; receiving from the cluster of nodes an indication that a new service not included in the one or more services has been created; in response to receiving the indication, creating a monitoring subsystem for performing one or more functions, which may include monitoring the new service, verifying security and/or compliance, logging the new security, and network management; assigning the monitoring subsystem to the new service; sending access information for the monitoring subsystem to one or more user computers.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
In an embodiment, a data processing method comprises transmitting, from a monitoring computer system that is programmed for monitoring one or more services, a request for information relating to new services to a cluster of computing nodes that are managing the one or more services; receiving from the cluster of nodes an indication that a new service not included in the one or more services has been created; in response to receiving the indication, creating a monitoring subsystem for performing one or more functions, which may include monitoring the new service, verifying security and/or compliance, logging the new security, and network management; assigning the monitoring subsystem to the new service; sending access information for the monitoring subsystem to one or more user computers.
Abstract:
Techniques related to communication between independent containers are provided. In an embodiment, a first programmatic container includes one or more first namespaces in which an application program is executing. A second programmatic container includes one or more second namespaces in which a monitoring agent is executing. The one or more first namespaces are independent of the one or more second namespaces. A monitoring agent process hosts the monitoring agent. The monitoring agent is programmed to receive an identifier of the application program. The monitoring agent is further programmed to switch the monitoring agent process from the one or more second namespaces to the one or more first namespaces. After the switch, the monitoring agent process continues to execute in the second programmatic container, but communication is enabled between the application program and the monitoring agent via the monitoring agent process.
Abstract:
In an embodiment, a data processing method comprises creating and storing a scoring threshold value that is associated with determining whether a baseline operation rule is to be generated. Receiving, from service monitoring processes, datasets of operations performed on digital objects by processors associated with computer applications. Aggregating operations and identifying operation properties from the aggregated operations to generate an aggregated baseline dataset that represents operation properties from aggregated operations. Assigning score values to each of the operation properties, wherein each assigned score value represents whether a particular operation property is a candidate for generating a rule that defines expected operation property values for the particular operation property. Automatically generating a set of baseline operations rules for only those operation properties that have assigned values that exceed the score threshold value. The set of baseline operations rules programmed to detect anomalous operations that contain unexpected operation property values.
Abstract:
Systems, methods, and graphical user interfaces for application topology mapping in hosted computing environments. In one embodiment, for example, a computer graphical user interface comprises an application topology map of an application deployed on a plurality of a hosts in a hosted computing environment, the application topology map comprising a plurality of nodes and edges there between, the plurality of nodes representing a plurality of identified application components of the application, the edges representing identified logical dependencies between the plurality of application components.