Patent classifications
G06F11/301
Techniques for securing virtual machines by application use analysis
A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.
Systems and methods for continuous data protection
Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
Service information processing method, apparatus, device and computer storage medium
The application discloses a service information processing method, apparatus, device, and computer storage medium, relating to the technical field of cloud computing. The specific implementation scheme is: sending polling information to a target process of a service running in a container according to a set time interval, wherein the target process is one of a plurality of processes running in the container; receiving reply information returned by the target process in response to the polling information; and obtaining the survival status of the target process according to the reply information.
Allocation of accelerator resources based on job type
A resource use method, an electronic device, and a computer program product are provided in embodiments of the present disclosure. The method includes determining a plurality of jobs requesting to use accelerator resources to accelerate data processing. The plurality of jobs are initiated by at least one virtual machine. The method further includes allocating available accelerator resources to the plurality of jobs based on job types of the plurality of jobs. The method further includes causing the plurality of jobs to be executed using the allocated accelerator resources. With the embodiments of the present disclosure, accelerator resources can be dynamically allocated, thereby improving the overall performance of a system.
Selection of computer system deployments to mock for testing
Systems and methods facilitating selection of computer system deployments to mock for testing are described herein. A method as described herein can include filtering, by a first system operatively coupled to a processor, data relating to deployments of respective second systems as collected from the respective second systems, wherein the filtering is based on relevancy of the deployments to a testing criterion and results in a filtered group of deployments; grouping, by the first system, respective ones of the filtered group of deployments into respective clusters according to a difference function, the difference function being defined according to respective properties of the respective ones of the filtered group of deployments; and designating, by the first system, selected ones of the filtered group of deployments from respective ones of the clusters for testing according to a selection criterion.
Live Migrating Virtual Machines to a Target Host Upon Fatal Memory Errors
The disclosed technology provides techniques, systems, and apparatus for containing and recovering from uncorrectable memory errors in distributed computing environment through migration of virtual machines and associated memory to a target host machine. An aspect of the disclosed technology includes a hypervisor or virtual machine manager that receives signaling of an uncorrectable memory error detected by a host machine. The virtual machine manager then uses information received via the signaling to identify virtual memory addresses or memory pages associated with the corrupted memory element so as to allow for containment and recovery from the error, and for live migration of the virtual machine.
SEVERITY LEVEL-BASED METRICS FILTERING
In one example, a computer implemented method may include receiving metrics of a monitored computing-instance from a monitoring agent running in the monitored computing-instance. The received metrics may include a first metric and a plurality of dependent metrics for the first metric. Further, a data structure representing a relationship between the first metric and a plurality of dependent metrics may be retrieved. The data structure may include multiple metric dependency levels with each metric dependency level mapped to a corresponding one of severity conditions. Furthermore, a severity level of the first metric may be determined based on the severity conditions in the data structure. Further, the received metrics may be filtered based on the data structure and the severity level of the first metric. Upon filtering, the filtered metrics may be ingested to a monitoring tool to monitor a health of the monitored computing-instance.
METHOD, APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR MIGRATING VIRTUAL MACHINES
A method and an apparatus for migrating virtual machine includes monitoring a status of a compute node; determining whether the compute node meets a trigger condition; wherein the trigger condition comprising a time period of lost connection of the compute node reaches a predetermined time period, or an unstable status of the compute node; and if the compute node meets the trigger condition, transmitting a message to a control node to migrate the VM.
Method and apparatus for monitoring memory access behavior of sample process
A method for monitoring memory access behavior of a sample process is provided. A processing unit of a computer device determines a page table of the sample process based on a page directory base address of the sample process, where each entry of the page table includes first information, the first information indicates whether the entry has been assigned a guest physical address, the entry that has been assigned the guest physical address includes second information that is used to indicate an access permission of the assigned guest physical address; determines a target entry from the page table, the target entry has been assigned a guest physical address, and an access permission is execution allowed; determines a target host physical address corresponding to the target guest physical address that is assigned to the target entry; and monitors behavior of accessing memory space indicated by the target host physical address.
Application change notifications based on application logs
Techniques for generating change notifications associated with applications based on application logs are disclosed. In one embodiment, a system may include a log analyzer to receive application logs generated by the applications running in a computing environment and analyze the received application logs to parse information about the applications. Further, the system may include a change detection unit communicatively coupled to the log analyzer to generate a change notification indicating that a change has been occurred to an application running on a compute node in the computing environment using the parsed information and send the change notification indicating the changed application to a subscriber.