Methods and Systems of Tracking and Verifying Records of System Change Events in a Distributed Network System
First Claim
1. A method for detecting orphaned resources on a host device component of a distributed network system, the method comprising:
- observing one or more update messages transmitted within the distributed network system, the update messages comprising state information for resources located on the host;
generating a record of the state of the resources located on the host based on the observed update messages, wherein the generated record of state indicates utilization of the individual resources;
receiving a resource list from the host on a periodic basis, the resource list comprising a listing of resources supported by the host; and
comparing the resource list with the record of the state of the resources to identify individual orphaned resources that are supported by the host but are not utilized.
4 Assignments
0 Petitions
Accused Products
Abstract
This disclosure has reference to verifying records of system change events in a distributed network system providing cloud services. In one embodiment, the methods and systems observe system update messages sent and received among components of the distributed network system, generate a record of the state of the object in response to the update messages, and compare the record of the state of the object with information from a periodic system status message to verify the accuracy of the periodic system status message. Advantageously, the present embodiments provide increased reliability for system status tracking, resource management, and billing for consumption of resources in distributed network systems. Additional benefits and advantages of the present embodiments will become evident in the following description.
-
Citations
20 Claims
-
1. A method for detecting orphaned resources on a host device component of a distributed network system, the method comprising:
-
observing one or more update messages transmitted within the distributed network system, the update messages comprising state information for resources located on the host; generating a record of the state of the resources located on the host based on the observed update messages, wherein the generated record of state indicates utilization of the individual resources; receiving a resource list from the host on a periodic basis, the resource list comprising a listing of resources supported by the host; and comparing the resource list with the record of the state of the resources to identify individual orphaned resources that are supported by the host but are not utilized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for detecting use of unauthorized network resources in a distributed network system, the method comprising:
-
observing one or more update messages transmitted within the distributed network system, the update messages comprising state information for network resources utilized by a user account in the distributed network system; generating a record of the state of the network resources based on the observed update messages, wherein the generated record of state indicates utilization of the network resources by the user account; receiving a list of network resources on a periodic basis, the list of network resources comprising a listing of network addresses authorized for use by the user account; and comparing the network resource list with the record of the state of the network resources to identify unauthorized utilization of network resources by the user account. - View Dependent Claims (11, 12, 13)
-
-
14. A method for allocating a plurality virtual machines within a plurality of nodes within a distributed network system, the method comprising:
-
selecting a first virtual machine from the plurality of virtual machines, wherein the first virtual machine is associated with a first set constraints; calculating a plurality of costs associated with allocating the first virtual machine to each node of the plurality of nodes, wherein the cost is calculated based on the capabilities of each node relative to the first set constraints for the first virtual machine; identifying a node of the plurality of nodes with the lowest calculated cost for allocation of the first virtual machine; allocating the first virtual machine to the identified node with the lowest calculated cost and depleting the capabilities of the identified node based on the first set of constraints of the first virtual machine; and calculating a second cost associated with allocating a second virtual machine to the identified node, wherein the second cost is calculated based on the depleted capabilities of the identified node and a second set of constraints for the second virtual machine. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification