Installing monitoring utilities using universal performance monitor
First Claim
1. A method, comprising:
- establishing, by a first computing device, a first secure channel between the first computing device and a second computing device, and a second secure channel between the first computing device and the second computing device;
identifying, by a processing device of the first computing device, a first monitoring tool to monitor one or more virtual machines and a second monitoring tool to monitor one or more physical devices;
determining, by the processing device, that the second computing device includes the first monitoring tool and does not include the second monitoring tool; and
transmitting to the second computing device an executable that is different than the first monitoring tool and the second monitoring tool and that, when executed by the second computing device, causes the second computing device to;
execute the first monitoring tool, direct output from the first monitoring tool to the first computing device via the first secure channel, obtain from a designated location the second monitoring tool, install the second monitoring tool, execute the second monitoring tool, and direct output from the second monitoring tool to the first computing device via the second secure channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A universal performance monitor includes an abstraction layer for managing multiple disparate monitoring tools on one or more computing devices. During runtime of the universal performance monitor on a first computing device, the universal performance monitor establishes a secure channel between the first computing device and a second computing device. The universal performance monitor queries the second computing device via the secure channel to determine whether the second computing device includes a specified monitoring tool. Upon determining that the second computing device does not include the specified monitoring tool, the universal performance monitor causes the second computing device to obtain the specified monitoring tool from a designated location, to install the specified monitoring tool with a particular configuration, to execute the specified monitoring tool and to redirect an output of the specified monitoring tool to the first computing device via the first secure channel.
-
Citations
19 Claims
-
1. A method, comprising:
-
establishing, by a first computing device, a first secure channel between the first computing device and a second computing device, and a second secure channel between the first computing device and the second computing device; identifying, by a processing device of the first computing device, a first monitoring tool to monitor one or more virtual machines and a second monitoring tool to monitor one or more physical devices; determining, by the processing device, that the second computing device includes the first monitoring tool and does not include the second monitoring tool; and transmitting to the second computing device an executable that is different than the first monitoring tool and the second monitoring tool and that, when executed by the second computing device, causes the second computing device to;
execute the first monitoring tool, direct output from the first monitoring tool to the first computing device via the first secure channel, obtain from a designated location the second monitoring tool, install the second monitoring tool, execute the second monitoring tool, and direct output from the second monitoring tool to the first computing device via the second secure channel. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium including instructions that, when executed by a processing device of a first computing device, cause the processing device to:
-
establish a first secure channel between the first computing device and a second computing device, and a second secure channel between the first computing device and the second computing device; identify, by the processing device, a first monitoring tool to monitor one or more virtual machines and a second monitoring tool to monitor one or more physical devices; determine, by the processing device, that the second computing device includes the first monitoring tool and does not include the second monitoring tool; and transmit to the second computing device an executable that is different than the first monitoring tool and the second monitoring tool and that, when executed by the second computing device, causes the second computing device to;
execute the first monitoring tool, direct output from the first monitoring tool to the first computing device via the first secure channel, obtain from a designated location the second monitoring tool, install the second monitoring tool, execute the second monitoring tool, and direct output from the second monitoring tool to the first computing device via the second secure channel. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A first computing device, comprising:
-
a network interface device; and a processing device, operatively coupled to the network interface device, to; establish a first secure channel between the first computing device and a second computing device, and a second secure channel between the first computing device and the second computing device; identify a first monitoring tool to monitor one or more virtual machines and a second monitoring tool to monitor one or more physical devices; determine that the second computing device includes the first monitoring tool and does not include the second monitoring tool; and transmit to the second computing device, via the network interface, an executable that is different than the first monitoring tool and the second monitoring tool and that, when executed by the second computing device, causes the second computing device to;
execute the first monitoring tool, direct output from the first monitoring tool to the first computing device via the first secure channel, obtain from a designated location the second monitoring tool, install the second monitoring tool, execute the second monitoring tool, and direct output from the second monitoring tool to the first computing device via the second secure channel. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification