ANOMALOUS USAGE OF RESOURCES BY A PROCESS IN A SOFTWARE DEFINED DATA CENTER
First Claim
1. A system, comprising:
- a plurality of virtual computing instances (VCIs) deployed in a software defined data center; and
a respective monitoring agent associated with each of the plurality of VCIs, wherein the monitoring agent is configured to;
collect information regarding resources used by a plurality of processes running on an associated VCI;
maintain a sliding window of top resource users among the plurality of processes;
analyze the top resource users among the plurality of processes for anomalous usage of the resources; and
take an action in response to the anomalous usage.
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure is related to systems and methods for analysis of anomalous usage of a resource. An example system can include a plurality of virtual computing instances (VCIs) deployed in a software defined data center and a respective monitoring agent associated with each of the plurality of VCIs. The monitoring agent can be configured to collect information regarding resources used by a plurality of processes running on an associated VCI, maintain a sliding window of top resource users among the plurality of processes, analyze the top resource users among the plurality of processes for anomalous usage of the resources, and take an action in response to the anomalous usage.
21 Citations
20 Claims
-
1. A system, comprising:
-
a plurality of virtual computing instances (VCIs) deployed in a software defined data center; and a respective monitoring agent associated with each of the plurality of VCIs, wherein the monitoring agent is configured to; collect information regarding resources used by a plurality of processes running on an associated VCI; maintain a sliding window of top resource users among the plurality of processes; analyze the top resource users among the plurality of processes for anomalous usage of the resources; and take an action in response to the anomalous usage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
identifying, via a respective monitoring agent associated with each of a plurality of virtual computing instances (VCIs), anomalous processes running on respective VCIs among the plurality of VCIs; and analyzing the amount of resources consumed by each of the anomalous processes periodically in response to the determination that the amount of resources consumed by the anomalous processes exceeds the threshold resource consumption value. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
an anomalous process engine configured to; allocate resources to a plurality of virtual computing instances (VCIs); monitor the resources allocated to the VCIs; and receive an indication for each of a plurality of anomalous processes running on the plurality of VCIs; a collection engine configured to collect resource consumption metrics associated with the anomalous processes in response to the indication; and an analysis engine configured to; maintain a sliding window of a configurable number of top resource users among the plurality of anomalous processes based, at least in part, on the resource consumption metrics; and analyze the plurality of anomalous processes. - View Dependent Claims (17, 18, 19, 20)
-
Specification