1. Field of the Invention
The field of the invention is data processing, or, more specifically, methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image.
2. Description of Related Art
In modern data centers, system administrators often maintain a collection of master operating system (OS) images that are reserved for deployment unto new systems as these systems become operational. A master OS image is a boot device image that includes a representation of a computer program and its related data such as a kernel, file system, and libraries at a particular given point in time. Master OS images or “Golden” master OS images imply a degree of trust and stability based on prior quality assessments performed against them. After creating a master OS image, threats may arise that challenge the integrity of the configuration of the master OS image.
Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of exemplary embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of exemplary embodiments of the invention.
Exemplary methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image in accordance with the present invention are described with reference to the accompanying drawings, beginning with
Stored in RAM (168) is an image deployment monitor (199) that includes computer program instructions for dynamic protection of one or more deployed copies of a master operating system image according to embodiments of the present invention. Specifically, the image deployment monitor (199) includes computer program instructions that when executed by the computer processor (156) cause the image deployment monitor (199) to carry out the step of monitoring an operational state of a deployed copy of a master operating system (OS) image. In the example of
The image deployment monitor (199) also includes computer program instructions that when executed by the computer processor (156) cause the image deployment monitor (199) to carry out the step of detecting a change in the operational state of the deployed copy (191, 192) of the master OS image (194). An operational state of a deployed copy may be any type of monitorable characteristics related to the deployed copy, such as a physical state of the system upon which the copy is deployed; server performance; network performance; and security. Examples of changes in the operational state of a deployed copy include system errors or failure to communicate with a peripheral device.
The image deployment monitor (199) also includes computer program instructions that when executed by the computer processor (156) cause the image deployment monitor (199) to carry out the steps of generating in response to detecting the change, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor (199), the configuration recommendation to the one or more other deployed copies of the master OS image.
By using a configuration recommendation to prevent a change detected in a deployed copy of a master OS image (194), from occurring in other concurrently deployed copies, the image deployment monitor (199) may protect the other deployed copies against threats that have arisen after the creation of the master OS image. Thus, the image deployment monitor provides dynamic protection to the deployed copies of the master OS image.
Also stored in RAM (168) is an operating system (154). Operating systems useful dynamic protection of one or more deployed copies of a master operating system image according to embodiments of the present invention include UNIX™, Linux™, Microsoft XP™, AIX™, IBM's i5/OS™, and others as will occur to those of skill in the art. The operating system (154) and the image deployment monitor (199) in the example of
The management server (152) of
The example management server (152) of
The exemplary management server (152) of
For further explanation, therefore,
The system of
In the example of
During operation, the image deployment monitor (299) may receive one or more alerts (230) from the first deployed copy (291). An alert may indicate an operational state of the deployed copy (291). Examples of operational states may include a system error or loss of contact with a peripheral device. An alert may also indicate a configuration change in the first deployed copy (291). Examples of configuration changes may include installation of a software component, such as a device driver, or modification of a resource allocation, such as changing the size of memory, CPU bandwidth, or network bandwidth.
Based on information within one or more alerts (230), the image deployment monitor (299) may generate a configuration recommendation (232). For example, the image deployment monitor (299) may determine that the first deployed copy (291) installed a device driver and shortly afterwards experienced a system crash. In this example, the image deployment monitor (299) may conclude that the installation of the device driver was the cause of the system crash. Based on this conclusion, the configuration recommendation generated by the image deployment monitor (299) may specify an action designed to prevent the crash from occurring in other concurrently deployed copies of the master OS image. For example, the configuration recommendation may include an instruction to add the device driver to the blacklist (280) associated with the second deployed copy (276) and the blacklist (260) associated with the third deployed copy (246).
The image deployment monitor (299) may provide the configuration recommendation (232) to the other deployed copies (276, 246). For example, the other deployed copies (276, 246) may utilize adjustment modules (274, 244) to examine the blacklists (280, 260), the default configurations (282, 262), and other meta data (284, 264), respectively, to determine which installations of software modules to prevent, which hardware and software configurations to apply, and other rules or information associated with deployment. The adjustment modules (274, 244) are capable of utilizing information gathered from other deployed copies. That is, the adjustment modules (274, 244) are capable of modifying a deployed copy of a master OS image using special instructions or via deployment policy settings. In the example of
For further explanation,
An operational state may be any type of monitorable characteristics related to the deployed copy. For example, an operational state may indicate a physical state of the system upon which the deployed copy resides, such as temperatures, chassis integrity, power supply, and fan speed. As another non-limiting example, an operational state may be related to server performance, such as SNMP monitoring, hard disk utilization, file integrity and size, memory utilization, CPU utilization, cache utilization, and other processes related to server performance. An operational state may be related to performance of a particular service, such as DNS, HTTP, FTP, Telnet, NNTP, SMTP. An operational state may also relate to network monitoring such as network throughput, current logons, failover/cluster monitoring or web site monitoring, such as hit rate, page content verification, database connection verification, and cache rate. Security parameters may also be indicated by an operational state, such as intrusion monitoring and login error monitoring.
The method of
The method of
The method of
For further explanation,
In the method of
In the method of
Exemplary embodiments of the present invention are described largely in the context of a fully functional computer system for dynamic protection of one or more deployed copies of a master operating system image. Readers of skill in the art will recognize, however, that the present invention also may be embodied in a computer program product disposed upon computer readable storage media for use with any suitable data processing system. Such computer readable storage media may be any storage medium for machine-readable information, including magnetic media, optical media, or other suitable media. Examples of such media include magnetic disks in hard drives or diskettes, compact disks for optical drives, magnetic tape, and others as will occur to those of skill in the art. Persons skilled in the art will immediately recognize that any computer system having suitable programming means will be capable of executing the steps of the method of the invention as embodied in a computer program product. Persons skilled in the art will recognize also that, although some of the exemplary embodiments described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative embodiments implemented as firmware or as hardware are well within the scope of the present invention.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present invention without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present invention is limited only by the language of the following claims.
This application is a continuation application of and claims priority from U.S. patent application Ser. No. 13/645,808, filed on Oct. 5, 2012.
Number | Name | Date | Kind |
---|---|---|---|
6272626 | Cobbett | Aug 2001 | B1 |
6330715 | Razzaghe-Ashrafi | Dec 2001 | B1 |
6513115 | Nock et al. | Jan 2003 | B2 |
7240107 | Chase-Salerno | Jul 2007 | B2 |
7600216 | Shlomai | Oct 2009 | B2 |
7694280 | James et al. | Apr 2010 | B2 |
7757214 | Palczak et al. | Jul 2010 | B1 |
7802246 | Kennedy et al. | Sep 2010 | B1 |
7890951 | Vinberg | Feb 2011 | B2 |
8117168 | Stringham | Feb 2012 | B1 |
8181174 | Liu | May 2012 | B2 |
8219983 | Sobel et al. | Jul 2012 | B1 |
8239509 | Ferris et al. | Aug 2012 | B2 |
8296251 | Athayde | Oct 2012 | B1 |
8347280 | Swarna | Jan 2013 | B2 |
8352608 | Keagy et al. | Jan 2013 | B1 |
8381191 | Mondal | Feb 2013 | B2 |
8423958 | Velupillai | Apr 2013 | B2 |
8429630 | Nickolov | Apr 2013 | B2 |
8468518 | Wipfel | Jun 2013 | B2 |
8612566 | Ferris et al. | Dec 2013 | B2 |
8627293 | Perrone et al. | Jan 2014 | B2 |
8635686 | Sriram | Jan 2014 | B2 |
8869135 | Fitzgerald et al. | Oct 2014 | B1 |
8990772 | Bennah | Mar 2015 | B2 |
8990796 | Lamantia | Mar 2015 | B2 |
20020124245 | Maddux | Sep 2002 | A1 |
20030051128 | Rodriguez et al. | Mar 2003 | A1 |
20040025154 | Sedlack | Feb 2004 | A1 |
20040153478 | Igouchkine | Aug 2004 | A1 |
20040162876 | Kohavi | Aug 2004 | A1 |
20040181776 | Atkin et al. | Sep 2004 | A1 |
20040230731 | Arimilli et al. | Nov 2004 | A1 |
20050235352 | Staats et al. | Oct 2005 | A1 |
20060037016 | Saha | Feb 2006 | A1 |
20060161895 | Speeter et al. | Jul 2006 | A1 |
20060184937 | Abels et al. | Aug 2006 | A1 |
20060248139 | Sundar | Nov 2006 | A1 |
20060248513 | Foster et al. | Nov 2006 | A1 |
20070180509 | Swartz et al. | Aug 2007 | A1 |
20070226358 | Krywaniuk | Sep 2007 | A1 |
20070240151 | Marl | Oct 2007 | A1 |
20070283324 | Geisinger | Dec 2007 | A1 |
20070283329 | Caprihan et al. | Dec 2007 | A1 |
20080052675 | Wookey | Feb 2008 | A1 |
20080098379 | Newman et al. | Apr 2008 | A1 |
20080104573 | Singla et al. | May 2008 | A1 |
20080141010 | Crowell et al. | Jun 2008 | A1 |
20080141217 | Goetz et al. | Jun 2008 | A1 |
20080155534 | Boss et al. | Jun 2008 | A1 |
20080184200 | Burns et al. | Jul 2008 | A1 |
20090016220 | Uysal et al. | Jan 2009 | A1 |
20090019438 | Madduri et al. | Jan 2009 | A1 |
20090019535 | Mishra et al. | Jan 2009 | A1 |
20090037680 | Colbert et al. | Feb 2009 | A1 |
20090048993 | Lohrbach et al. | Feb 2009 | A1 |
20090089624 | Austen et al. | Apr 2009 | A1 |
20090100420 | Sapuntzakis et al. | Apr 2009 | A1 |
20090118839 | Accapadi et al. | May 2009 | A1 |
20090228868 | Drukman et al. | Sep 2009 | A1 |
20090265707 | Goodman et al. | Oct 2009 | A1 |
20090300057 | Friedman | Dec 2009 | A1 |
20090300149 | Ferris et al. | Dec 2009 | A1 |
20090300151 | Friedman et al. | Dec 2009 | A1 |
20090300607 | Ferris et al. | Dec 2009 | A1 |
20090300641 | Friedman et al. | Dec 2009 | A1 |
20090300707 | Garimella et al. | Dec 2009 | A1 |
20100037207 | Chambers et al. | Feb 2010 | A1 |
20100153443 | Gaffga et al. | Jun 2010 | A1 |
20100192143 | Ingle et al. | Jul 2010 | A1 |
20100229175 | Gonzalez et al. | Sep 2010 | A1 |
20100257523 | Frank | Oct 2010 | A1 |
20100274890 | Patel et al. | Oct 2010 | A1 |
20100325410 | Fitzgerald et al. | Dec 2010 | A1 |
20100332637 | Doi et al. | Dec 2010 | A1 |
20100332890 | Chen et al. | Dec 2010 | A1 |
20110016414 | Ernst et al. | Jan 2011 | A1 |
20110126168 | Ilyayev | May 2011 | A1 |
20110131301 | Klein et al. | Jun 2011 | A1 |
20110145789 | Rasch et al. | Jun 2011 | A1 |
20110154320 | Verma | Jun 2011 | A1 |
20110161952 | Poddar et al. | Jun 2011 | A1 |
20110173605 | Bourne | Jul 2011 | A1 |
20120030459 | Aldridge et al. | Feb 2012 | A1 |
20120030672 | Zygmuntowicz et al. | Feb 2012 | A1 |
20120054868 | Ramalingam | Mar 2012 | A1 |
20120079474 | Gold et al. | Mar 2012 | A1 |
20120084414 | Brock et al. | Apr 2012 | A1 |
20120084752 | Arnold et al. | Apr 2012 | A1 |
20120102160 | Breh et al. | Apr 2012 | A1 |
20120102481 | Mani et al. | Apr 2012 | A1 |
20120131577 | Arcese et al. | May 2012 | A1 |
20120159471 | de Souza et al. | Jun 2012 | A1 |
20120167048 | Walsh et al. | Jun 2012 | A1 |
20120246619 | Thirumalai et al. | Sep 2012 | A1 |
20120278797 | Secrist et al. | Nov 2012 | A1 |
20120284405 | Ferris et al. | Nov 2012 | A1 |
20130067049 | Ghosh et al. | Mar 2013 | A1 |
20130080619 | Assuncao et al. | Mar 2013 | A1 |
20130080997 | Dattathreya | Mar 2013 | A1 |
20130125107 | Bandakka et al. | May 2013 | A1 |
20130138718 | Mallur et al. | May 2013 | A1 |
20130332921 | Khutornenko et al. | Dec 2013 | A1 |
20140033188 | Beavers et al. | Jan 2014 | A1 |
20140033189 | Buswell | Jan 2014 | A1 |
20140040438 | Donahue et al. | Feb 2014 | A1 |
20140052683 | Kirkham et al. | Feb 2014 | A1 |
20140075172 | Knichel et al. | Mar 2014 | A1 |
20140101421 | Bennah et al. | Apr 2014 | A1 |
20140101428 | Bennah et al. | Apr 2014 | A1 |
20140101429 | Bennah et al. | Apr 2014 | A1 |
20140101430 | Bennah et al. | Apr 2014 | A1 |
20140101431 | Bennah et al. | Apr 2014 | A1 |
20140108774 | Bennah et al. | Apr 2014 | A1 |
20140108779 | Bennah et al. | Apr 2014 | A1 |
20140108951 | Dharawat et al. | Apr 2014 | A1 |
20140157056 | Bennah et al. | Jun 2014 | A1 |
20140259009 | Bhattiprolu | Sep 2014 | A1 |
Number | Date | Country |
---|---|---|
WO 2012048030 | Apr 2012 | WO |
Entry |
---|
Choi, H., et al., “Autonomous Learning for Efficient Resource Utilization of Dynamic VM Migration”, ICS'08, Jun. 2008, pp. 185-194, ACM, USA. |
Venners, B., “Inside the Java Virtual Machine”, Chapter 5 of Inside the Java Virtual Machine, www.artima.com (online), [accessed Jul. 6, 2012], 1-53 pp., URL: http://www.artima.com/insidejvm/ed2/jvmP.html. |
Hudson, “Hyper-V Virtual Machine (VM) Parent-Child Configuration Using Differencing Disks”, Microsoft TechNet Article, Sep. 2010, [accessed Aug. 7, 2012], 2 pp., URL: http://social.technet.microsoft.com/wiki/contents/articles/1393.hyper-v-virtual-machine-vm-parent-child-configuration-using-differencing-disks.aspx. |
“vsphere 5: Updating/Installing profile or vib using esxcli”, virtualvm.info (online), May 2012, [accessed Aug. 7, 2012], 3 pp., URL: http://virtualvm.info/?p=170. |
Office Action, U.S. Appl. No. 13/645,808, Jul. 24, 2014, pp. 1-12. |
Office Action, U.S. Appl. No. 13/646,020, May 23, 2014, pp. 1-16. |
Office Action, U.S. Appl. No. 13/653,090, May 30, 2014, pp. 1-25. |
Office Action, U.S. Appl. No. 13/658,937, May 21, 2014, pp. 1-21. |
Oasysadmin, “Copying, moving and replicating the MDT 2010 deployment share”, Nov. 2011, pp. 1-9, oasysadmin.com (online), URL: oasysadmin.com/2011/11/03/copying-moving-and-replicating-the-mdt-2010-deployment-share/. |
Bell et al., “Configuration Description, Deployment, and Lifecycle Management (CDDLM) Foundation Document”, GFD.50, Aug. 2005, 37 pages, Global Grid Forum (online), URL: www.ogf.org/documents/GFD.50.pdf. |
Rasmussen et al., “Managing WebSphere DataPower Device configurations for high availability, consistency, and control, Part 2: Application promotion strategies”, IBM developerWorks, WebSphere Technical Library, Apr. 2009, 15 pages, IBM developerWorks (online), URL: www.ibm.com/developerworks/websphere/library/techarticles/0904—rasmussen/0904—rasmussen.html. |
Zhang et al., “CCOA: Cloud Computing Open Architecture”, IEEE International Conference on Web Services (ICWS), Jul. 2009, pp. 607-616, IEEE Xplore Digital Library (online), DOI: 10.1109/ICWS.2009.144. |
Waldspurger, “Memory Resource Management in VMware ESX Server”, ACM SIGOPS Operating Systems Review—OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation, Dec. 2002, pp. 181-194, vol. 36, Issue SI, ACM New York NY, DOI: 10.1145/844128.844146. |
Badger et al., “Draft Cloud Computing Synopsis and Recommendations”, National Institute of Standards and Technology (NIST) special publication 800-146, May 2012, 84 pages, nist.gov (online), URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.232.3178&rep=rep1 &type=pdf. |
Makris et al., “Dynamic and Adaptive Updates of Non-Quiescent Subsystems in Commodity Operating System Kernels”, Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys'07), vol. 41, Issue 3, Jun. 2007, pp. 327-340, ACM New York, NY, USA. |
Chieu et al., “Virtual Machines with Sharable Operating System”, Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion (OOPSLA'11), Oct. 2011, pp. 109-114, 5 pages, ACM New York, NY, USA. |
White, “How to Deploy Entire Systems in Mac OS X 10.5”, chapter from Apple Training Series: Mac OS X Deployment v10.5, peachpit.com (online), Aug. 20, 2008, pp. 1-9, Pearson Education, Peachpit Press, San Francisco, CA, USA. |
Wentzlaff et al., “An Operating System for Multicore and Clouds: Mechanisms and Implementation”, Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC'10), Jun. 2010, pp. 1-10, ACM New York, NY, USA. |
Scarfone et al., “Guide to Security for Full Virtualization Technologies”, Jan. 2011, 35 pages, National Institute of Standards and Technology, Gaithersburg, MD, USA. |
Number | Date | Country | |
---|---|---|---|
20140101422 A1 | Apr 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13645808 | Oct 2012 | US |
Child | 13659116 | US |