Dynamic protection of one or more deployed copies of a master operating system image
First Claim
1. A method of dynamic protection of one or more deployed copies of a master operating system image, the method comprising:
- monitoring, by an image deployment monitor executing on a management server, an operational state of a first deployed copy of a master operating system (OS) image executing on a first client system, wherein the first client system is connected to the management server over a data communications network;
detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image executing on the first client system;
in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change in the operational state of the first deployed copy of the master OS image executing on the first client system from occurring in an operational state of a second deployed copy of the master OS image executing on a second client system, wherein the configuration recommendation recommends, for the second deployed copy of the master OS image executing on the second client system, a specific change in size of a resource allocation of a resource;
wherein the second deployed copy of the master OS image executing on the second client system includes an adjustment module configured to modify the second deployed copy of the master OS image based on the configuration recommendation; and
providing, by the image deployment monitor, the configuration recommendation to the second deployed copy of the master OS image executing on the second client system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image.
-
Citations
6 Claims
-
1. A method of dynamic protection of one or more deployed copies of a master operating system image, the method comprising:
-
monitoring, by an image deployment monitor executing on a management server, an operational state of a first deployed copy of a master operating system (OS) image executing on a first client system, wherein the first client system is connected to the management server over a data communications network; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image executing on the first client system; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change in the operational state of the first deployed copy of the master OS image executing on the first client system from occurring in an operational state of a second deployed copy of the master OS image executing on a second client system, wherein the configuration recommendation recommends, for the second deployed copy of the master OS image executing on the second client system, a specific change in size of a resource allocation of a resource;
wherein the second deployed copy of the master OS image executing on the second client system includes an adjustment module configured to modify the second deployed copy of the master OS image based on the configuration recommendation; andproviding, by the image deployment monitor, the configuration recommendation to the second deployed copy of the master OS image executing on the second client system. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification