Inventory service for distributed infrastructure
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying instructions executable in at least one computing device, the instructions, when executed by the at least one computing device, causing the at least one computing device to at least:
- execute a plurality of machine instances within a computing environment that implements a split security model, a service provider of the computing environment and an inventory service being excluded from root access to the machine instance based on the split security model, wherein a monitoring service is executed within a respective machine instance of the plurality of machine instances;
generate, by the monitoring service executed in the respective machine instance, data that identifies a plurality of applications executed in the respective machine instance based at least in part on a plurality of process identifiers and an application table that relates process identifiers to applications, wherein a respective one of the plurality of process identifiers is associated with one of the plurality of applications;
query, by the monitoring service executed within the respective machine instance, a metadata service executed external to the computing environment of the plurality of machine instances, to obtain instance metadata corresponding to the respective machine instance, wherein the instance metadata obtained from the metadata service comprises a unique identifier of the respective machine instance and a customer identifier;
communicate, by the monitoring service, the instance metadata and data that identifies the plurality of applications to an inventory service that is executed external to the computing environment of the plurality of machine instances; and
generate, by the inventory service, a network site that provides analytics as a function of the data that identifies the plurality of applications and the instance metadata.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for an inventory application. Machine instances execute a monitoring service to determine the process names of applications executed in the machine instance. An inventory application identifies the applications executed on the machine instances as a function of data obtained from the monitoring services. Analytics reports can be generated from data embodying the identified applications.
-
Citations
21 Claims
-
1. A non-transitory computer-readable medium embodying instructions executable in at least one computing device, the instructions, when executed by the at least one computing device, causing the at least one computing device to at least:
-
execute a plurality of machine instances within a computing environment that implements a split security model, a service provider of the computing environment and an inventory service being excluded from root access to the machine instance based on the split security model, wherein a monitoring service is executed within a respective machine instance of the plurality of machine instances; generate, by the monitoring service executed in the respective machine instance, data that identifies a plurality of applications executed in the respective machine instance based at least in part on a plurality of process identifiers and an application table that relates process identifiers to applications, wherein a respective one of the plurality of process identifiers is associated with one of the plurality of applications; query, by the monitoring service executed within the respective machine instance, a metadata service executed external to the computing environment of the plurality of machine instances, to obtain instance metadata corresponding to the respective machine instance, wherein the instance metadata obtained from the metadata service comprises a unique identifier of the respective machine instance and a customer identifier; communicate, by the monitoring service, the instance metadata and data that identifies the plurality of applications to an inventory service that is executed external to the computing environment of the plurality of machine instances; and generate, by the inventory service, a network site that provides analytics as a function of the data that identifies the plurality of applications and the instance metadata. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
a computing environment comprising at least one computing device configured to at least; execute a machine instance within the computing environment, wherein the computing environment implements a split security model, a service provider of the computing environment and an inventory service being excluded from root access to the machine instance based on the split security model; generate, by a monitoring service executed within the machine instance, data that identifies at least one application being executed in the machine instance based at least in part on at least one process identifier and an application table that relates process identifiers to applications, wherein the at least one process identifier is associated with one of the applications; query, by the monitoring service, a metadata service executed external to the computing environment, to obtain metadata corresponding to the machine instance, the metadata comprising a unique identifier of the machine instance and a customer identifier; transmit, by the monitoring service, the metadata obtained from the metadata service and the data that identifies the at least one application to the inventory service external to the machine instance; and generate, by the inventory service, a network site that provides analytics as a function of the data that identifies the at least one application and the metadata. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method, comprising:
-
executing a plurality of machine instances within a computing environment comprising at least one computing device, wherein the computing environment implements a split security model, a service provider of the computing environment and an inventory service being excluded from root access to a respective machine instance of the plurality of machine instances based on the split security model; generating, by a monitoring service executed in the respective machine instance, data that identifies a particular application executed in the respective machine instance based at least in part on a plurality of process identifiers and an application table that relates process identifiers to applications, wherein a particular process identifier is associated with the particular application; querying, by the monitoring service executed in the respective machine instance, a metadata service executed external to the computing environment of the machine instance to obtain instance metadata associated with the respective machine instance, wherein the instance metadata obtained from the metadata service comprises a unique identifier of the respective machine instance and a customer identifier; communicating, by the monitoring service, the instance metadata and the data that identifies the particular application to the inventory service executed external to the machine instance; and generating, by the inventory service, a network site that provides analytics as a function of the data that identifies the particular application and the instance metadata. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification