Abstract:
Methods, apparatus, systems and articles of manufacture to monitor virtual computing environments are described. An example method includes determining a computing resource status of a computing host that is operating a container engine, comparing the computing resource status to a threshold, and in response to determining that computing resource status does not exceed the threshold, executing a monitoring operation in a container hosted by the container engine.
Abstract:
The present disclosure is related to systems and methods for analysis of anomalous usage of a resource. An example system can include a plurality of virtual computing instances (VCIs) deployed in a software defined data center and a respective monitoring agent associated with each of the plurality of VCIs. The monitoring agent can be configured to collect information regarding resources used by a plurality of processes running on an associated VCI, maintain a sliding window of top resource users among the plurality of processes, analyze the top resource users among the plurality of processes for anomalous usage of the resources, and take an action in response to the anomalous usage.
Abstract:
Methods and systems to limit the duration of a service interruption caused by a failed middleware application server are disclosed. One example method and system includes monitoring the operational status of a first virtual machine operating as a primary server and the operational status of a second virtual machine operating as a stand-by server and, based on the monitored operational status of the first and second virtual machines, performing a hot-swap to cause the second virtual machine to operate as the primary server and the first virtual machine to operate as the stand-by server. The first and second virtual machines are implemented on a same host processing system. After the hot-swap, the first virtual machine is restarted. In some examples, the first virtual machine and the second virtual machine are implemented on a same host processing system. Performing the hot-swap can include causing the first virtual machine to be uncoupled from a network and causing the second virtual machine to be coupled to the network. In some examples, the method also includes causing copy of a first file system used by the primary server to be stored as a second file system for use by the stand-by server.
Abstract:
The present disclosure is related to systems and methods for analysis of anomalous usage of a resource. An example system can include a plurality of virtual computing instances (VCIs) deployed in a software defined data center and a respective monitoring agent associated with each of the plurality of VCIs. The monitoring agent can be configured to collect information regarding resources used by a plurality of processes running on an associated VCI, maintain a sliding window of top resource users among the plurality of processes, analyze the top resource users among the plurality of processes for anomalous usage of the resources, and take an action in response to the anomalous usage.
Abstract:
Systems and methods for enhancing the availability of multi-tier applications on cloud computing platforms are disclosed. An example method comprises identifying, using a processor, dependencies among application components in a multi-tier application; generating, using the processor, an application blueprint defining the multi-tier application based on the identified dependencies; generating a remediation policy based on the identified dependencies in the application blueprint, the remediation policy comprising instructions to restore availability of the multi-tier application; detecting unavailability of the multi-tier application; identifying, using the processor, one of the application components as being responsible for the unavailability of the multi-tier application; and restarting, using the processor, the identified one of the application components based on the remediation policy to restore availability of the multi-tier application.
Abstract:
Methods and systems to limit the duration of a service interruption caused by a failed middleware application server are disclosed. One example method and system includes monitoring the operational status of a first virtual machine operating as a primary server and the operational status of a second virtual machine operating as a stand-by server and, based on the monitored operational status of the first and second virtual machines, performing a hot-swap to cause the second virtual machine to operate as the primary server and the first virtual machine to operate as the stand-by server. The first and second virtual machines are implemented on a same host processing system. After the hot-swap, the first virtual machine is restarted. In some examples, the first virtual machine and the second virtual machine are implemented on a same host processing system. Performing the hot-swap can include causing the first virtual machine to be uncoupled from a network and causing the second virtual machine to be coupled to the network. In some examples, the method also includes causing copy of a first file system used by the primary server to be stored as a second file system for use by the stand-by server.
Abstract:
Systems and methods for enhancing the availability of multi-tier applications on cloud computing platforms are disclosed. An example method comprises identifying, using a processor, dependencies among application components in a multi-tier application; generating, using the processor, an application blueprint defining the multi-tier application based on the identified dependencies; generating a remediation policy based on the identified dependencies in the application blueprint, the remediation policy comprising instructions to restore availability of the multi-tier application; detecting unavailability of the multi-tier application; identifying, using the processor, one of the application components as being responsible for the unavailability of the multi-tier application; and restarting, using the processor, the identified one of the application components based on the remediation policy to restore availability of the multi-tier application.
Abstract:
Methods, apparatus, systems and articles of manufacture to monitor virtual computing environments are described. An example method includes determining a computing resource status of a computing host that is operating a container engine, comparing the computing resource status to a threshold, and in response to determining that computing resource status does not exceed the threshold, executing a monitoring operation in a container hosted by the container engine.