INFERRING APPLICATION INVENTORY
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising:
- code that obtains a disk configuration of one of a plurality of machine instances executing a plurality of applications;
obtaining, in the computing device, a network traffic permissions configuration of the one of machine instances, the network traffic permissions configuration defining at least one of an open port, a set of network addresses, or a networking protocol for which the one of the machine instances is configured to accept network traffic;
code that obtains a network traffic routing configuration associated with one of the machine instances, the network traffic routing configuration defining a network traffic flow between the one of the machine instances and a distinct one of the machine instances;
code that identifies, without an internal inspection of the machine instance, a first one of the applications based at least in part on the disk configuration, the network traffic routing configuration, the network traffic permissions configuration, and an identification of a second one of the identifications;
code that stores an identification of the first one of the applications as one of a plurality of identifications stored in a data store;
code that generates an analytics report embodying the identifications.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for an application inventory application. Computing resource usage data and configuration data is obtained for machine instances executed in a cloud computing architecture. The usage data and configuration data are used as factors to identify applications executed in the machine instance. Reports embodying the application identifications are generated.
33 Citations
24 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising:
-
code that obtains a disk configuration of one of a plurality of machine instances executing a plurality of applications; obtaining, in the computing device, a network traffic permissions configuration of the one of machine instances, the network traffic permissions configuration defining at least one of an open port, a set of network addresses, or a networking protocol for which the one of the machine instances is configured to accept network traffic; code that obtains a network traffic routing configuration associated with one of the machine instances, the network traffic routing configuration defining a network traffic flow between the one of the machine instances and a distinct one of the machine instances; code that identifies, without an internal inspection of the machine instance, a first one of the applications based at least in part on the disk configuration, the network traffic routing configuration, the network traffic permissions configuration, and an identification of a second one of the identifications; code that stores an identification of the first one of the applications as one of a plurality of identifications stored in a data store; code that generates an analytics report embodying the identifications. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
at least one computing device; an inventory application executable in the at least one computing device, the inventory application comprising; logic that obtains data embodying an interoperability between at least a subset of a plurality of machine instances; logic that generates an identification for at least one application executed in the one of the machine instances based at least in part on the data; and wherein the inventory application is executed external to the machine instances and does not perform an internal inspection of the machine instance. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising the steps of:
-
obtaining, in one or more computing devices, data embodying operational interoperability between a subset of a plurality of machine instances executing at least one application; and identifying, in the computing device, the at least one application based at least in part on the data without an internal inspection of the plurality of machine instances. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification