This disclosure relates generally to virtual machine computing and, more particularly, to methods and apparatus to manage monitoring agents in a virtual machine computing cloud.
“Infrastructure-as-a-Service” (also commonly referred to as “IaaS”) generally describes a suite of technologies provided by a service provider as an integrated solution to allow for elastic creation of a virtualized, networked, and pooled computing platform (sometimes referred to as a “cloud computing platform”). Enterprises may use IaaS as a business-internal organizational cloud computing platform (sometimes referred to as a “private cloud”) that gives an application developer access to infrastructure resources, such as virtualized servers, storage, and networking resources. By providing ready access to the hardware resources required to run an application, the cloud computing platform enables developers to build, deploy, and manage the lifecycle of a web application (or any other type of networked application) at a greater scale and at a faster pace than before.
Deployment tools currently in use are usually a patchwork of various software products from different vendors and/or homegrown solutions. Such tools are generally process-driven with heavy reliance on custom scripts and property files. Traditional deployment tools are also not configured for automation with cloud computing platforms that dynamically provision virtual computing resources.
Wherever possible, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts.
Monitoring agents are installed on computing units (e.g., virtual machines (VM), physical machines (PM), etc.) to, for example, monitor the performance of applications. Because monitoring agents are resource intensive, virtual infrastructure administrators typically install monitoring agents on computing units running important services (e.g., web servers, application servers, database servers, application components, etc.) that need to be monitored (and typically do not install monitoring agents on other less important computing units). Currently, the virtual infrastructure administrators manually install and configure monitoring agents on the computing units with services to be monitored. Because virtual environments are dynamic, applications (e.g., multi-tiered applications) and services may be scaled out automatically (e.g., by adding additional resources, services, applications, etc.). The automatic scaling of the applications and the services may require the installation of new monitoring agent(s) across new computing units and/or may require existing monitoring agents to be reconfigured for the new services and/or applications. Additionally, as services and/or applications are moved and/or removed, monitoring agents may require reconfiguration or removal from a computing unit.
To accommodate management of monitoring agents (e.g., without user intervention), in examples disclosed herein, a user (e.g., the virtual infrastructure administrator) defines service rules. The service rules may, for example, define the service(s) that require monitoring agents, the computing units and/or groups to monitor for the service(s), and/or criteria for installation (e.g., install/configure a monitoring agent for every detected instance of a service, install a monitoring agent only when a service is newly installed, etc.). The service rule may also define configuration information (e.g., IP address, installation source, credentials, etc.) relating to a monitoring agent server, service metrics to be reported to the monitoring agent server, and/or configuration properties for the monitoring agent server.
A virtual infrastructure navigator (VIN), as disclosed herein, may automatically discover services executing on computing units specified by the service rules. Example systems for automatically discovering services are discussed in U.S. application Ser. No. 14/231,018 entitled “Methods and Apparatus to Automatically Configure Monitoring of a Virtual Machine,” which is incorporated by reference herein in its entirety. If a discovered service satisfies a service rule (e.g., matches the defined application and/or service, is running on a specified computing unit, and meets the specified criteria), an agent installer installs a monitoring agent on a target computing unit and/or configures the monitoring agent according to the service rule.
In some examples disclosed herein, the VIN causes discovery scripts to be executed by the computing units. In some such examples, the VIN detects changes in the configuration (e.g., detects that a service has been installed, detects that a service has been removed, etc.) of the computing units. In some such examples, automatically installing a monitoring agent on a computing unit is triggered by the VIN detecting changes in the configuration of the computing unit.
In some examples disclosed herein, the VIN automatically discovers the installation of multi-tiered applications. In some such examples, the VIN identifies services installed as part of the multi-tiered applications, identifies computing units corresponding to the services, and installs and/or configures monitoring agents on computing units with services that satisfy one or more service rules.
In some examples disclosed herein, the VIN automatically detects when a service has been removed from a computing unit. The example VIN determines whether, according to a service rule, a monitoring agent was installed and/or configured for the service on the computing unit. In some such examples, without user intervention, the monitoring agent is reconfigured so that the monitoring agent does not attempt to monitor the removed service. Additionally, or alternatively, the monitoring agent is removed from the computing unit. In this manner, unnecessary monitoring agents are removed from the deployment environment and resources are freed.
Example methods and apparatus disclosed herein facilitate the automatic management of monitoring agents deployed in a deployment environment. Example methods and apparatus enable a user (e.g., a virtual infrastructure administrator, etc.) to define service rules for services and/or applications that are monitored. In some example methods and apparatus, a VIN (e.g., vCenter™ Infrastructure Navigator™, a commercially available product from VMWare®, Inc.) or similar component automatically detects services running on a computing unit (e.g., a virtual machine, a physical machine, etc.). In some examples, the automatically detected services are compared to the defined service rules. If an automatically detected service satisfies a service rule (e.g., the automatically detected service is identified in the service rule), a monitoring agent is installed and/or configured on the computing unit running the service without further intervention from the user.
Example methods disclosed herein include determining if a first service is installed on computing unit (e.g., a virtual machine, a physical machine, etc.) that corresponds to a service rule, the service rule to specify a service identifier and configuration for a monitoring agent, determining if the virtual machine includes the monitoring agent, and in response to determining that the first service matches the service identifier and determining that the monitoring agent is not installed on the virtual machine, initiating installation of the monitoring agent on the virtual machine.
Example apparatus disclosed herein include a service analyzer to determine whether if a virtual machine has a first service installed that corresponds to a service rule and to determine if the virtual machine has a monitoring agent corresponding to the first service, the service rule to specify a service identifier and a configuration for the monitoring agent, and an agent installer to, in response to the first service matching the service identified specified by the service rule and the monitoring agent not installed on the virtual machine, initiate installation of the monitoring agent on the virtual machine.
As used herein, the term “node” or “logical node” refers to a computing unit or a cluster of computing units defined in a service rule to be monitored for a specified service.
As used herein, the term “service” refers to scripted software that can be installed on a computing unit and may be reused in multiple applications.
As used herein, the term “properties” refers to configuration variables used by scripts to set parameters on a script and run various configurations. For example, setting an installation path property value causes installation scripts to use the property to specify the path to use to install a monitoring agent.
As used herein, the term “deployment environment” refers to a computing environment in a cloud provider. For example, separate deployment environments may be used for development, testing, staging, and/or production. A cloud provider can have one or multiple deployment environments.
The example cloud computing platform provider 106 provisions virtual and/or physical computing resources (e.g., the computing units 104) to provide the deployment environments 108 in which the administrator 114 and/or developer 116 can deploy multi-tiered application(s). One particular example of a deployment environment that may be used to implement the deployment environments 112 of
In the example illustrated in
In the example illustrated in
In the example illustrated in
In the example illustrated in
The example service analyzer 118 compares the service(s) 117 running on the example computing units 104 to the service rules in the service rule database 124. If a service satisfies a service rule (e.g., meets the criteria defined in the service rule), the example service analyzer 118 directs the example agent installer 112 to initiate installation and/or configuration of an example monitoring agent 102 on example the computing unit 104 corresponding to the service. For example, a service 117 may satisfy a service rule when the service matches a service identifier included in the service rule. In some examples, the service analyzer 118 also detects when services have been removed from the computing units 104. In some such examples, the example service analyzer 118 directs the example agent installer 122 to initiate removal of the example monitoring agent 102 from the corresponding example computing unit 104 (e.g., when no other service is being monitored by the example monitoring agent 102) and/or to reconfigure the example monitoring agent 102 (e.g., when another service is being monitored by the example monitoring agent 102). In some examples, the service analyzer 118 does not respond to detecting that a service 117 has been removed from a computing unit 104 (e.g., does not remove the example monitoring agent).
In the example illustrated in
After the example agent installer 122 of
In some examples, the example monitoring agent server 110 of
In some examples, the VIN 112 of
In the example illustrated in
While an example manner of implementing the system 100 is illustrated in
The example service rule name 302 is provided to facilitate the example administrator 114 and/or the example developer 116 to assign a name to the example service rule (e.g., in accordance with cloud provider administration policies). The identifier 304 is provided to enable the example administrator 114 and/or the example developer 116 to define one or more applications and/or services to be monitored. For example, a service rule may be defined for one or more services 117, such as, MySQL 5.x servers and MySQL 4.x servers. For example, a service rule may be defined for a multi-tiered application, such as, Exchange 2010 (e.g., including agent server configuration information 312, metrics to be monitored 314, and/or configuration properties 316 for the services related to Exchange 2010). In the illustrated example, a node field 306 and/or a group field 308 are provided to display a selection of nodes and/or groups to define the computing units (e.g., the computing units 104 of
One or more agent server configuration information fields 312 are provided to allow the example administrator 114 and/or the example developer 116 to define configuration information (e.g., an IP address of the example monitoring agent server 110 of
Flowchart representative of example machine readable instructions for implementing the example VIN 112, the example monitoring agent server 110 and/or the example discovery script repository 126 of
As mentioned above, the example processes of
At block 408, the example service analyzer 118 determines whether a monitoring agent (e.g., the example monitoring agent 102 of
At block 506, the example service analyzer 118 (
At block 508, the service analyzer 118 detects services(s) and corresponding computing units 104 related to the installation of the multi-tiered application. In some examples, the service analyzer 118 receives an application definition (e.g., a list of the example services 117 and the example computing units 104 on which those services 117 were installed, etc.). In some examples, the service analyzer 118 causes example discovery scripts (e.g., the discovery scripts stored in the discovery script repository 126 of
At block 512, the service analyzer 118 determines whether a monitoring agent (e.g., the example monitoring agent 102 of
At block 514, without intervention from a user (e.g., the administrator 114 or the developer 116, etc.), the agent installer 122 (
At block 516, without intervention from a user (e.g., the administrator 114 or the developer 116, etc.), the agent installer 122 configures the monitoring agent 102 according to the configuration information 312-316 (
At block 606, the service analyzer 118 determines whether the monitoring agent 102 installed on the computing unit 104 detected at block 602 is monitoring another service. If the monitoring agent 102 is monitoring another service, then program control advances to block 608. Otherwise, if the monitoring agent 102 is not monitoring another service, program control advances to block 610.
At block 608, the agent installer 122 (
At block 610, the agent installer 122 initiates removal of the monitoring agent 102 from the computing unit 104 detected at block 602. In some examples, the agent installer 122 initiates removal of the monitoring agent without intervention from the user. The example program 600 of
The processor platform 700 of the illustrated example includes a processor 712. The processor 712 of the illustrated example is hardware. For example, the processor 712 can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer.
The processor 712 of the illustrated example includes a local memory 713 (e.g., a cache). The processor 712 of the illustrated example is in communication with a main memory including a volatile memory 714 and a non-volatile memory 716 via a bus 718. The volatile memory 714 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory 716 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 714, 716 is controlled by a memory controller.
The processor platform 700 of the illustrated example also includes an interface circuit 720. The interface circuit 720 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
In the illustrated example, one or more input devices 722 are connected to the interface circuit 720. The input device(s) 722 permit(s) a user to enter data and commands into the processor 812. The input device(s) can be implemented by, for example, a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 724 are also connected to the interface circuit 720 of the illustrated example. The output devices 724 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer and/or speakers). The interface circuit 720 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip or a graphics driver processor.
The interface circuit 720 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 726 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
The processor platform 700 of the illustrated example also includes one or more mass storage devices 728 for storing software and/or data. Examples of such mass storage devices 728 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives.
The coded instructions 732 of
From the foregoing, it will be appreciated that examples disclosed herein dynamically (e.g., without intervention from a user) scale monitoring of services executing on virtual machines implementing multi-tiered applications. In such examples, user error and oversight are minimized by detecting installation of important services so that, for example, the important services are monitored in the dynamic environment.
Although examples herein disclose managing monitoring agents without user intervention, alternatively, some limited user intervention (e.g., entering credentials, starting and/or stopping the automated installation of monitoring agents, starting and/or stopping automation software, starting and/or stopping automated services, starting and/or stopping computing devices, etc.) may be used without departing from the scope of the disclosure. For example, a user may intervene to start the VIN 112 of
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
This application is a continuation of U.S. patent application Ser. No. 17/005,791 filed Aug. 28, 2020, which is a continuation of U.S. patent application Ser. No. 15/784,719, filed Oct. 16, 2017, now U.S. Pat. No. 10,761,870 issued on Sep. 1, 2020, which is a continuation of U.S. patent application Ser. No. 15/186,978, filed Jun. 20, 2016, now U.S. Pat. No. 9,792,144 issued on Oct. 17, 2017, which is a continuation of U.S. patent application Ser. No. 14/319,326, filed Jun. 30, 2014, now abandoned, all entitled “Methods And Apparatus To Manage Monitoring Agents”, all of which are incorporated by reference herein in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
6708215 | Hingorani et al. | Mar 2004 | B1 |
7082464 | Hasan et al. | Jul 2006 | B2 |
7356679 | Le et al. | Apr 2008 | B1 |
7805419 | Newman | Sep 2010 | B2 |
7930381 | Attanasio et al. | Apr 2011 | B2 |
8175863 | Ostermeyer et al. | May 2012 | B1 |
8209687 | Yuyitung et al. | Jun 2012 | B2 |
8225317 | Chiueh et al. | Jul 2012 | B1 |
8285929 | Kaneko et al. | Oct 2012 | B2 |
8429140 | Lolayekar et al. | Apr 2013 | B1 |
8429649 | Feathergill et al. | Apr 2013 | B1 |
8448170 | Wipfel et al. | May 2013 | B2 |
8544002 | Edwards et al. | Sep 2013 | B2 |
8560671 | Yahalom et al. | Oct 2013 | B1 |
8615589 | Adogla et al. | Dec 2013 | B1 |
8620851 | Brown et al. | Dec 2013 | B2 |
8650562 | Hou et al. | Feb 2014 | B2 |
8725898 | Vincent | May 2014 | B1 |
8789022 | Neogi | Jul 2014 | B2 |
8826274 | Moriki et al. | Sep 2014 | B2 |
8832279 | Baba et al. | Sep 2014 | B2 |
8856319 | Huang et al. | Oct 2014 | B1 |
8874704 | Nath et al. | Oct 2014 | B2 |
8904518 | Maeda et al. | Dec 2014 | B2 |
8914768 | Kamik et al. | Dec 2014 | B2 |
9003406 | Hodge et al. | Apr 2015 | B1 |
9015712 | Hodge et al. | Apr 2015 | B1 |
9043786 | Hodge et al. | May 2015 | B1 |
9047133 | Winterfeldt et al. | Jun 2015 | B2 |
9052961 | Mangtani et al. | Jun 2015 | B2 |
9237060 | Wu et al. | Jan 2016 | B2 |
9330013 | Li et al. | May 2016 | B2 |
9557879 | Wang et al. | Jan 2017 | B1 |
9665356 | Kunze et al. | May 2017 | B2 |
9792144 | Hassine | Oct 2017 | B2 |
10191828 | Uriel | Jan 2019 | B2 |
10362046 | Srinivasan | Jul 2019 | B1 |
10761870 | Hassine | Sep 2020 | B2 |
11507410 | Hassine | Nov 2022 | B2 |
20020169644 | Greene | Nov 2002 | A1 |
20030028624 | Hasan et al. | Feb 2003 | A1 |
20050203921 | Newman et al. | Sep 2005 | A1 |
20050251867 | Sastry et al. | Nov 2005 | A1 |
20050289540 | Nguyen et al. | Dec 2005 | A1 |
20060036941 | Neil | Feb 2006 | A1 |
20060041885 | Broquere et al. | Feb 2006 | A1 |
20060047665 | Neil | Mar 2006 | A1 |
20060085530 | Garrett | Apr 2006 | A1 |
20060085668 | Garrett | Apr 2006 | A1 |
20060085785 | Garrett | Apr 2006 | A1 |
20060184936 | Abels et al. | Aug 2006 | A1 |
20060184937 | Abels et al. | Aug 2006 | A1 |
20060190526 | Neil et al. | Aug 2006 | A1 |
20060190527 | Neil et al. | Aug 2006 | A1 |
20060294238 | Naik et al. | Dec 2006 | A1 |
20070244926 | Vitanov et al. | Oct 2007 | A1 |
20070250833 | Araujo et al. | Oct 2007 | A1 |
20080020737 | Neil et al. | Jan 2008 | A1 |
20080134175 | Fitzgerald et al. | Jun 2008 | A1 |
20080189700 | Schmidt et al. | Aug 2008 | A1 |
20080209016 | Karve et al. | Aug 2008 | A1 |
20090144420 | Attanasio et al. | Jun 2009 | A1 |
20090169017 | Smith et al. | Jul 2009 | A1 |
20090260006 | Hotra | Oct 2009 | A1 |
20090265707 | Goodman et al. | Oct 2009 | A1 |
20090265756 | Zhang et al. | Oct 2009 | A1 |
20090300063 | Neil | Dec 2009 | A1 |
20090328030 | Fries | Dec 2009 | A1 |
20100125844 | Mousseau et al. | May 2010 | A1 |
20100205240 | Loefstrand | Aug 2010 | A1 |
20110060878 | Kaneko et al. | Mar 2011 | A1 |
20110126197 | Larsen et al. | May 2011 | A1 |
20110126207 | Wipfel et al. | May 2011 | A1 |
20110185292 | Chawla et al. | Jul 2011 | A1 |
20110251992 | Bethlehem et al. | Oct 2011 | A1 |
20110255538 | Srinivasan et al. | Oct 2011 | A1 |
20110307617 | Wu et al. | Dec 2011 | A1 |
20120066487 | Brown et al. | Mar 2012 | A1 |
20120066681 | Levy et al. | Mar 2012 | A1 |
20120109958 | Thakur et al. | May 2012 | A1 |
20120117212 | Fries | May 2012 | A1 |
20120117566 | Maeda et al. | May 2012 | A1 |
20120131193 | Ferris et al. | May 2012 | A1 |
20120222084 | Beaty et al. | Aug 2012 | A1 |
20120254353 | Baba et al. | Oct 2012 | A1 |
20120266156 | Spivak et al. | Oct 2012 | A1 |
20120284713 | Ostermeyer et al. | Nov 2012 | A1 |
20120311475 | Wong | Dec 2012 | A1 |
20120311576 | Shu et al. | Dec 2012 | A1 |
20120317611 | Kashyap | Dec 2012 | A1 |
20120331388 | Nedelcu et al. | Dec 2012 | A1 |
20130007265 | Benedetti et al. | Jan 2013 | A1 |
20130007740 | Kikuchi et al. | Jan 2013 | A1 |
20130042003 | Franco et al. | Feb 2013 | A1 |
20130054426 | Rowland et al. | Feb 2013 | A1 |
20130111468 | Davis et al. | May 2013 | A1 |
20130145008 | Kannan et al. | Jun 2013 | A1 |
20130185715 | Dunning et al. | Jul 2013 | A1 |
20130185816 | Maeda et al. | Jul 2013 | A1 |
20130198637 | Childers, Jr. et al. | Aug 2013 | A1 |
20130219363 | Wu et al. | Aug 2013 | A1 |
20130227566 | Higuchi et al. | Aug 2013 | A1 |
20130227710 | Barak et al. | Aug 2013 | A1 |
20130232463 | Nagaraja et al. | Sep 2013 | A1 |
20130232480 | Winterfeldt et al. | Sep 2013 | A1 |
20130232497 | Jalagam et al. | Sep 2013 | A1 |
20130232498 | Mangtani et al. | Sep 2013 | A1 |
20130275968 | Petev et al. | Oct 2013 | A1 |
20130283102 | Krajec et al. | Oct 2013 | A1 |
20130283263 | Elemary | Oct 2013 | A1 |
20130325885 | Levy et al. | Dec 2013 | A1 |
20140019597 | Nath et al. | Jan 2014 | A1 |
20140040656 | Ho et al. | Feb 2014 | A1 |
20140047436 | Jayachandran et al. | Feb 2014 | A1 |
20140165054 | Wang et al. | Jun 2014 | A1 |
20140237472 | Adogla et al. | Aug 2014 | A1 |
20140245423 | Lee | Aug 2014 | A1 |
20140380308 | Hassine et al. | Dec 2014 | A1 |
20150154039 | Zada et al. | Jun 2015 | A1 |
20150242204 | Hassine | Aug 2015 | A1 |
20150378708 | Nagaraja | Dec 2015 | A1 |
20150378743 | Zellermayer et al. | Dec 2015 | A1 |
20150378763 | Hassine et al. | Dec 2015 | A1 |
20160364263 | Cao et al. | Dec 2016 | A1 |
20170359198 | Sato | Dec 2017 | A1 |
20180365044 | Movsisyan | Dec 2018 | A1 |
Number | Date | Country |
---|---|---|
2562973 | Feb 2013 | EP |
Entry |
---|
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 14/231,018, filed Mar. 16, 2016, 17 pages. |
United States Patent and Trademark Office, “Final Office Action,” issued in connection with U.S. Appl. No. 14/191,020, filed Feb. 10, 2016, 24 pages. |
Novell, “A Blueprint for Better Management from the Desktop to the Data Center”, Feb. 2007, Novell, Inc., 17 pages. |
Hu et al. “JAVA Blueprint Procedure Pattern”, 2013 IEEE 4th International Electronics Information and Emergency Communication (ICEIEC), Nov. 15-17, 2013, 5 pages. |
VMware, Inc., “Using VMware vFabric Application Director—vFabric Application Director 5.0,” 2012, 164 pages. |
VMware, Inc., “vCloud Director User's Guide—vCloud Director 5.1,” 2010-2012, 126 pages. |
VMware, Inc., “Infrastructure Navigator User's Guide—vCenter Infrastructure Navigator 2.0.0,” 2012-2013, 38 pages. |
Puppet Labs, “What is Puppet?”<http://info.puppetlabs.com/download-pe.html>, 2014, 4 pages. |
Puppet Labs, “Puppet Enterprise,” <http://info.puppetlabs.com/download-pe.html>, 2014, 4 pages. |
Mitchell, “DynamicOps Cloud Development Kit: Overview and Concepts—Extending Your Cloud to New Use Cases,” DynamicOps.com, Jun. 2012, 12 pages. |
Bourdeau, “DynamicOps Extensibility Overview: Enable, Adapt, and Extend your Infrastructure into a Business Relevant Cloud,” DynamicOps.com, May 2012, 12 pages. |
VMware, “vCloud Automation Center Introduced by VMware: vCloud Automation Center—leverages CD to provision applications to virtual datacenters,” retrieved from <http://www.vladan.fr/vcloudautomation-center-introduced-by-vmware/>, retrieved on Nov. 30, 2012, 7 pages. |
DynamicOps, “DynamicOps Cloud Automation Center Design Center Data Sheet,” DynamicOps.com, Apr. 12, 2011, retrieved from <http://www.dabcc.com/article.aspx?id=I 7668>, retrieved on Mar. 27, 2014, 6 pages. |
VMware, Inc, “VMware vCenter Infrastructure Navigator,” 2013, 1 page. |
VMware, Inc, “VMware vFabric™ Application Director -Application Provisioning for Hybrid Clouds,” 2013, 2 pages. |
vFabric Documentation Center, “Introduction to Hyperic Monitoring,” vFabric Hyperic Overview, retrieved from <http://pubs.vmware.com/vfabric5/index.j sp?topic=/ com. vmware. vfabric.hyperic.4.6/Introduction_to_ Hyperic Monitoring.html>, retrieved May 12, 2014, 3 pages. |
International Searching Authority, “International Search Report and Written Opinion,” issued in connection with Application No. PCT/US2014/067322, Feb. 17, 2015, 14 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 14/191,020, filed Jul. 30, 2015, 14 pages. |
International Searching Authority, “International Preliminary Report on Patentability,” issued in connection with Application No. PCT/US2014/067322, Jun. 7, 2016, 9 pages. |
United States Patent and Trademark Office, “Final Office Action,” issued in connection with U.S. Appl. No. 14/319,326, filed Mar. 29, 2016, 7 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 14/319,326, filed Sep. 25, 2015, 9 pages. |
IBM, “Tivoli IBM Tivoli Monitoring for Virtual Servers: Vmware VI Agent”, version 6.2.1, 2009, International Business Machines Corporation, 207 pages. |
MSDN Blogs, “How to Configure VM Monitoring in Windows Server 2012- Clustering and High-Availability,” Apr. 18, 2012, retrieved from <http://blogs.msdn.com/b/clustering/archive/2012/04/ 18/10295158.aspx>, retrieved on Sep. 18, 2015, 8 pages. |
Microsoft, “Add-ClusterVMMonitoredltem-Windows Server2012 R2 and Windows 8.1,” Oct. 17, 2013, 11 pages. |
Microsoft, “Tech Net Library”, Oct. 2013, including sections, Add-ClusterVMMonitoredltem, Get ClusterVMMonitoredItem, and Remove-ClusterVMMonitoredltem, retrieved from http://web.archive.org/web/20131111124419/http://technet.microsoft.com/en-us/library, 11 pages. |
Bhattacharya, “Clustering and High-Availability”, 2012, MSDN biogs, including sections, How to configure VM Monitoring in Windows Server 2012, and VM Monitoring in Windows Server 2012—Frequently Asked Questions, 8 pages. |
Fok et al., “Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications”, 2005 Retrieved on Jun. 18, 2018, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=143712610, pp. 1-10. |
Manvi et al., “Applications of agent technology in communications: a review”, 2004, Retrieved on Jun. 18, 2018, https://ac.els-cdn.com/S0 140366404001914/1-s2.0-S0140366404001914-main.pdf?, pp. 1493-1508. |
Oracle, “Oracle® Enterprise Manager Administration”, 10g, Release 5 (10.2.0.5), Oracle, Aug. 2009, 318 pages. |
Wu et al., “Virtual Machine Management Based on Agent Service”, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, Wuhan, China, 2010, IEEE, pp. 199-204. |
Meera et al., “Agent based Resource Monitoring system in IaaS Cloud Environment”, 2013, Science Direct, www.sciencedirect.com, Procedia Technology, vol. 10, 2013, pp. 200-207. |
Number | Date | Country | |
---|---|---|---|
20230089995 A1 | Mar 2023 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17005791 | Aug 2020 | US |
Child | 18057715 | US | |
Parent | 15784719 | Oct 2017 | US |
Child | 17005791 | US | |
Parent | 15186978 | Jun 2016 | US |
Child | 15784719 | US | |
Parent | 14319326 | Jun 2014 | US |
Child | 15186978 | US |