Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example apparatus includes a service analyzer to: identify a first virtual machine in a first application definition, the first application definition identifying virtual machines included in a first application, the first virtual machine currently running in the first application; and detect a second virtual machine currently running in the first application, the second virtual machine not included in the first application definition; and a virtual machine analyzer to: generate a second application definition, the second application definition created by adding the second virtual machine to the first application definition; and store the second application definition in an application configuration database.
Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example method includes identifying a virtual machine in an application definition, automatically installing an agent on the virtual machine when the virtual machine is identified as having a designated configuration, automatically identifying, via the agent, a resource associated with the virtual machine and, based on the resource, applying a monitoring policy to the virtual machine to be executed by the agent.
Abstract:
In a method for secure ingestion of metrics of time series data, an ingestion request for ingesting at least one metric of time series data is received, the ingestion request including an identifier. The ingestion request is validated against a security policy according to the identifier. The ingestion request is updated to exclude any metric indicated in the security policy as excluded according to the identifier. The at least one metric of time series data is ingested according to the ingestion request.
Abstract:
In a method for secure access to metrics of time series data, an access request for accessing at least one metric of time series data is received, the access request including an identifier. The access request is validated against a security policy according to the identifier. The access request is updated to exclude any metric indicated in the security policy as excluded according to the identifier. Results of the access request are returned.
Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example apparatus includes a service analyzer to: identify a first virtual machine in a first application definition, the first application definition identifying virtual machines included in a first application, the first virtual machine currently running in the first application; and detect a second virtual machine currently running in the first application, the second virtual machine not included in the first application definition; and a virtual machine analyzer to: generate a second application definition, the second application definition created by adding the second virtual machine to the first application definition; and store the second application definition in an application configuration database.
Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example method includes identifying a first virtual machine in a first application definition. The example method also includes automatically installing an agent on a second virtual machine when (1) the second virtual machine is not included in the first application definition and (2) the second virtual machine is identified as having a designated configuration, and updating a status of the agent of the second virtual machine to indicate that the installed agent is running. The example method also includes applying a monitoring policy to the second virtual machine, the monitoring policy to be executed by the agent based on a resource automatically identified by the agent of the second virtual machine.
Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example method includes identifying a first virtual machine in a first application definition. The example method also includes automatically installing an agent on a second virtual machine when (1) the second virtual machine is not included in the first application definition and (2) the second virtual machine is identified as having a designated configuration, and updating a status of the agent of the second virtual machine to indicate that the installed agent is running. The example method also includes applying a monitoring policy to the second virtual machine, the monitoring policy to be executed by the agent based on a resource automatically identified by the agent of the second virtual machine.
Abstract:
Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example method includes identifying a virtual machine in an application definition, automatically installing an agent on the virtual machine when the virtual machine is identified as having a designated configuration, automatically identifying, via the agent, a resource associated with the virtual machine and, based on the resource, applying a monitoring policy to the virtual machine to be executed by the agent.