Abstract:
Systems and methods for enhancing the availability of multi-tier applications on cloud computing platforms are disclosed. An example method comprises identifying, using a processor, dependencies among application components in a multi-tier application; generating, using the processor, an application blueprint defining the multi-tier application based on the identified dependencies; generating a remediation policy based on the identified dependencies in the application blueprint, the remediation policy comprising instructions to restore availability of the multi-tier application; detecting unavailability of the multi-tier application; identifying, using the processor, one of the application components as being responsible for the unavailability of the multi-tier application; and restarting, using the processor, the identified one of the application components based on the remediation policy to restore availability of the multi-tier application.
Abstract:
Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes determining a first virtual machine within an application definition, automatically identifying a property for the first virtual machine, and generating an application blueprint based on the identified property of the virtual machine.
Abstract:
A management agent operates transparently in the background on each endpoint computing device that needs to be managed. The agent sets up a sandboxed environment on the endpoint computing device on which it is operating in order to capture applications that have been installed on the endpoint device. The application capture is performed after the applications have been installed on the endpoint device and therefore does not require installing the application on any dedicated staging machine, nor any recording of the pre-installation state. The application capture process involves running the application from an isolated sandboxed environment on the computing device in order to identify all necessary components of the application by monitoring accesses by the application to components located outside of the sandbox. The identified components can then be packaged together and managed as individual application packages.
Abstract:
Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes determining a first computing unit within an application definition, identifying a property for the first computing unit, and generating an application blueprint based on the identified property of the computing unit.
Abstract:
A management agent operates transparently in the background on each endpoint computing device that needs to be managed. The agent sets up a sandboxed environment on the endpoint computing device on which it is operating in order to capture applications that have been installed on the endpoint device. The application capture is performed after the applications have been installed on the endpoint device and therefore does not require installing the application on any dedicated staging machine, nor any recording of the pre-installation state. The application capture process involves running the application from an isolated sandboxed environment on the computing device in order to identify all necessary components of the application by monitoring accesses by the application to components located outside of the sandbox. The identified components can then be packaged together and managed as individual application packages.
Abstract:
Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes generating an application definition for an unmanaged application associated with a first computing unit, selecting a first logical template associated with an unmodified version of a service provided by the first computing unit, generating an application blueprint including the first logical template, modifying the first logical template included in the application blueprint based on a first property of the first computing unit, inserting a dependency between a first logical template representative of the first computing unit and a second logical template representative of a second computing unit, and deploying a managed application according to the application blueprint to implement the unmanaged application.
Abstract:
Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes determining a first computing unit within an application definition, identifying a property for the first computing unit, and generating an application blueprint based on the identified property of the computing unit.
Abstract:
Methods and systems to limit the duration of a service interruption caused by a failed middleware application server are disclosed. One example method and system includes monitoring the operational status of a first virtual machine operating as a primary server and the operational status of a second virtual machine operating as a stand-by server and, based on the monitored operational status of the first and second virtual machines, performing a hot-swap to cause the second virtual machine to operate as the primary server and the first virtual machine to operate as the stand-by server. The first and second virtual machines are implemented on a same host processing system. After the hot-swap, the first virtual machine is restarted. In some examples, the first virtual machine and the second virtual machine are implemented on a same host processing system. Performing the hot-swap can include causing the first virtual machine to be uncoupled from a network and causing the second virtual machine to be coupled to the network. In some examples, the method also includes causing copy of a first file system used by the primary server to be stored as a second file system for use by the stand-by server.
Abstract:
Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes generating an application definition for an unmanaged application associated with a first computing unit, selecting a first logical template associated with an unmodified version of a service provided by the first computing unit, generating an application blueprint including the first logical template, modifying the first logical template included in the application blueprint based on a first property of the first computing unit, inserting a dependency between a first logical template representative of the first computing unit and a second logical template representative of a second computing unit, and deploying a managed application according to the application blueprint to implement the unmanaged application.
Abstract:
A management agent operates transparently in the background on each endpoint computing device that needs to be managed. The agent sets up a sandboxed environment on the endpoint computing device on which it is operating in order to capture applications that have been installed on the endpoint device. The application capture is performed after the applications have been installed on the endpoint device and therefore does not require installing the application on any dedicated staging machine, nor any recording of the pre-installation state. The application capture process involves running the application from an isolated sandboxed environment on the computing device in order to identify all necessary components of the application by monitoring accesses by the application to components located outside of the sandbox. The identified components can then be packaged together and managed as individual application packages.