Patent application number | Description | Published |
20090292720 | Service Model Flight Recorder - A method, system and medium for recording events in a system management environment is described. As system events are detected in an enterprise computing environment they are stored in a manner allowing them to be “replayed” either forward or reverse to assist a system administrator or other user to determine the chain of events that affected the enterprise. The system engineer and business process owner are therefore presented with pertinent information for monitoring, administrating and diagnosing system activities and their correlation to business services. | 11-26-2009 |
20110148880 | Smart Impact Views - A technique for allowing collapse or expansion of a multi-node subgraph of a directed acyclic graph is disclosed. The subgraph may be collapsed or expanded with a single user interaction, retaining the important service context information and relations, while minimizing information of lesser importance in the service model. | 06-23-2011 |
20110161928 | Method to Provide Transparent Process I/O Context on a Remote OS While Retaining Local Processing - Systems and methods are disclosed that implement a data collection infrastructure that supports both agent-based and agentless data collection. Existing data collection scripts may be used, whether agent-based or agentless, and new scripts may be created that include commands that may execute either locally or remotely, as desired. These scripts, while executed locally, may interact with either the local machine or another remote machine for performing data collection, corrective actions, or other desired functionality. An execution context defines whether commands executed by the script are to execute locally or remotely, and a context handler allows processing those commands either locally or remotely depending on the execution context, transparently to the script. Data generated by remote execution may be transported back to the local machine for manipulation locally, transparently to the script. | 06-30-2011 |
20110239275 | Centrally Managed Impersonation - Systems, methods and computer readable media for centrally managed impersonation are described. Examples include a system having a central server and a remote shell daemon running on a remote machine, wherein a trust relationship is established between the central server and the remote shell daemon. Examples also include a method wherein a user sends the management system a request to act upon a remote machine. The management system determines whether the user is authenticated for the requested action. Upon authentication, the management system identifies an impersonation policy based on user profile and the remote machine. The management system connects to the remote machine, impersonates an elevated privilege account if required, and executes the user action on the remote machine. | 09-29-2011 |
20120198049 | System and Method for Stateless, Fault Tolerance and Load Balanced Data Collection Using Overlay Namespaces - Systems, methods and computer readable media that provide stateless fault tolerance and load balanced data collection using overlay namespaces are described. A cluster is used. Each node of the cluster may be a monitoring system. A data provider process may run on each node in the cluster. Each node has an overlay namespace which comprises one or more links to namespaces on other nodes, and local viewpoints of those linked namespaces. When a node detects a resource waiting to be monitored, it queries other nodes to determine whether object creation for that resource is allowed. It creates an object only if no other node is creating or has created an object for that resource. A node may stop monitoring more resources if the load on the node reaches a specified threshold. The node may also stop monitoring a resource if it determines the load level on another node is at a predefined low level compared with its own load level. | 08-02-2012 |
20120259960 | Dynamic Self-Configuration of Heterogenous Monitoring Agent Networks - A centralized, policy-driven approach allows dynamic self-configuration and self-deployment of large scale, complex, heterogeneous monitoring agent networks. Such an approach resolves the scalability and manageability issues of manually configured conventional agents. Embodiments of the agents can be self-configuring using a dynamic, adaptive technique. An administrator can group hosts on which agents into groups that have similarly configured agents. | 10-11-2012 |
20130290527 | SYSTEM AND METHOD FOR STATELESS, FAULT TOLERANCE AND LOAD BALANCED DATA COLLECTION USING OVERLAY NAMESPACES - A resource monitoring method may include receiving a request to perform a read operation on an object at a first monitoring node of a plurality of monitoring nodes, and determining whether or not a copy of the object is present in a namespace associated with the first monitoring node. The namespace may include an overlay namespace and a local namespace. The local namespace may identify objects being monitored by the first monitoring node. The overlay namespace may include local viewpoints for other monitoring nodes of the plurality of monitoring nodes. Each local viewpoint may identify one or more objects that are monitored by a respective other monitoring node. The method may further include performing, by the first monitoring node, the read operation on the object if the copy of the object is determined as present in the namespace associated with the first monitoring node. | 10-31-2013 |
20130290528 | SYSTEM AND METHOD FOR STATELESS, FAULT TOLERANCE AND LOAD BALANCED DATA COLLECTION USING OVERLAY NAMESPACES - A resource monitoring method may include determining, at a first monitoring node, a load level for each monitoring node of a plurality of monitoring nodes including the first monitoring node and a second monitoring node based on a namespace associated with the first monitoring node. The namespace may include an overlay namespace and a local namespace. The local namespace may identify objects being monitored by the first monitoring node. The overlay namespace may include local viewpoints for other monitoring nodes of the plurality of monitoring nodes including the second monitoring node. Each local viewpoint may identify one or more objects that are monitored by a respective other monitoring node. The method may further include prohibiting the first monitoring node from instituting a new object creation request if the load level of the second monitoring node is lower than the load level of the first monitoring node. | 10-31-2013 |