Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.
Abstract:
In an embodiment, a data processing method comprises transmitting, from a monitoring computer system that is programmed for monitoring one or more services, a request for information relating to new services to a cluster of computing nodes that are managing the one or more services; receiving from the cluster of nodes an indication that a new service not included in the one or more services has been created; in response to receiving the indication, creating a monitoring subsystem for performing one or more functions, which may include monitoring the new service, verifying security and/or compliance, logging the new security, and network management; assigning the monitoring subsystem to the new service; sending access information for the monitoring subsystem to one or more user computers.
Abstract:
In an embodiment, a data processing method comprises creating and storing a scoring threshold value that is associated with determining whether a baseline operation rule is to be generated; receiving, from service monitoring processes, datasets of operations performed on digital objects by processors associated with computer applications; aggregating operations and identifying operation properties from the aggregated operations to generate an aggregated baseline dataset that represents operation properties from aggregated operations; assigning score values to each of the operation properties, wherein each assigned score value represents whether a particular operation property is a candidate for generating a rule that defines expected operation property values for the particular operation property; automatically generating a set of baseline operations rules for only those operation properties that have assigned values that exceed the score threshold value. The set of baseline operations rules is programmed to detect anomalous operations that contain unexpected operation property values.
Abstract:
A computer-implemented method of monitoring programmatic containers (containers) performed through executing a monitoring component in a user space is disclosed. The method comprises selecting, by a processor, one or more execution points from a plurality of execution points; causing, by the processor, a computer programs to be loaded into a virtual machine, the virtual machine verifying execution of the computer program before running the computer program in a kernel space; causing the computer program to be executed directly in the kernel space when execution of a process associated with one of a plurality of containers reaches the one execution point, each of the plurality of containers being associated with a distinct set of resources of a kernel of the kernel space, the computer program storing specific data in one or more memory buffers managed directly by the kernel and shared by the kernel space and the user space, the specific data including trace data related to execution of the process at the one execution point and container data related to the one container; receiving the specific data from the one or more memory buffers; causing a display of the container-specific trace data.
Abstract:
In an embodiment, a data processing method comprises transmitting, from a monitoring computer system that is programmed for monitoring one or more services, a request for information relating to new services to a cluster of computing nodes that are managing the one or more services; receiving from the cluster of nodes an indication that a new service not included in the one or more services has been created; in response to receiving the indication, creating a monitoring subsystem for performing one or more functions, which may include monitoring the new service, verifying security and/or compliance, logging the new security, and network management; assigning the monitoring subsystem to the new service; sending access information for the monitoring subsystem to one or more user computers.
Abstract:
In an embodiment, a data processing method comprises creating and storing a scoring threshold value that is associated with determining whether a baseline operation rule is to be generated. Receiving, from service monitoring processes, datasets of operations performed on digital objects by processors associated with computer applications. Aggregating operations and identifying operation properties from the aggregated operations to generate an aggregated baseline dataset that represents operation properties from aggregated operations. Assigning score values to each of the operation properties, wherein each assigned score value represents whether a particular operation property is a candidate for generating a rule that defines expected operation property values for the particular operation property. Automatically generating a set of baseline operations rules for only those operation properties that have assigned values that exceed the score threshold value. The set of baseline operations rules programmed to detect anomalous operations that contain unexpected operation property values.
Abstract:
Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page.