Command management in a networked computing environment
First Claim
1. A computer-implemented method for identifying commands for virtual resource instances in a networked computing environment, comprising:
- receiving a set of preferences from an end user comprising a set of rules indicating a set of commands that should be transmitted to a computer memory medium when executed by the end user, the set of commands comprising commands for an instance of a virtual resource provided by a resource provider for use by the end user in a networked computing environment,wherein the set of rules comprises one or more of;
at least one denied list comprising commands not to be transmitted;
a threshold of uses after which at least one command is to be transmitted;
at least one directory from which the command was executed to be transmitted;
at least one directory from which the command was executed not to be transmitted;
orat least one keyword indicating the command to be transmitted;
receiving, in the computer memory medium, at least one command of the set of commands in response to execution of the at least one command by the end user;
analyzing the received at least one command of the set of commands to identify information pertaining to the set of commands, the information identifying at least one of the following;
the set of commands, at least one directory in which the set of commands were executed, a base image associated with the instance, a set of demographic information about a set of users executing the set of commands, a status of at least one software program running on the instance, a set of tags associated with the set of commands, and at least one geographic location where the set of commands were executed;
storing the information in a computer storage device;
receiving, from a requester, a request to access at least a subset of the information;
retrieving the at least a subset of the information from the computer storage device; and
providing the at least a subset of the information to the requester.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource.
45 Citations
20 Claims
-
1. A computer-implemented method for identifying commands for virtual resource instances in a networked computing environment, comprising:
-
receiving a set of preferences from an end user comprising a set of rules indicating a set of commands that should be transmitted to a computer memory medium when executed by the end user, the set of commands comprising commands for an instance of a virtual resource provided by a resource provider for use by the end user in a networked computing environment, wherein the set of rules comprises one or more of; at least one denied list comprising commands not to be transmitted; a threshold of uses after which at least one command is to be transmitted; at least one directory from which the command was executed to be transmitted; at least one directory from which the command was executed not to be transmitted;
orat least one keyword indicating the command to be transmitted; receiving, in the computer memory medium, at least one command of the set of commands in response to execution of the at least one command by the end user; analyzing the received at least one command of the set of commands to identify information pertaining to the set of commands, the information identifying at least one of the following;
the set of commands, at least one directory in which the set of commands were executed, a base image associated with the instance, a set of demographic information about a set of users executing the set of commands, a status of at least one software program running on the instance, a set of tags associated with the set of commands, and at least one geographic location where the set of commands were executed;storing the information in a computer storage device; receiving, from a requester, a request to access at least a subset of the information; retrieving the at least a subset of the information from the computer storage device; and providing the at least a subset of the information to the requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for identifying commands for virtual resource instances in a networked computing environment, comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to the bus that when executing the instructions causes the system to; receive a set of preferences from an end user comprising a set of rules indicating a set of commands that should be transmitted to a computer memory medium when executed by the end user, the set of commands comprising commands for an instance of a virtual resource provided by a resource provider for use by the end user in a networked computing environment; wherein the set of rules comprises one or more of; at least one denied list comprising commands not to be transmitted; a threshold of uses after which at least one command is to be transmitted; at least one directory from which the command was executed to be transmitted; at least one directory from which the command was executed not to be transmitted;
orat least one keyword indicating the command to be transmitted; receive, in the computer memory medium, at least one command of the set of commands in response to execution of the at least one command by the end user; analyze the received at least one command of the set of commands to identify information pertaining to the set of commands, the information identifying at least one of the following;
the set of commands, at least one directory in which the set of commands were executed, a base image associated with the instance, a set of demographic information about a set of users executing the set of commands, a status of at least one software program running on the instance, a set of tags associated with the set of commands, and at least one geographic location where the set of commands were executed;store the information in a computer storage device; receive, from a requester, a request to access at least a subset of the information; retrieve the at least a subset of the information from the computer storage device; and provide the at least a subset of the information to the requester. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product for identifying commands for virtual resource instances in a networked computing environment, the computer program product comprising a computer readable hardware storage device, and program instructions stored on the computer readable hardware storage device, to:
-
receive a set of preferences from an end user comprising a set of rules indicating a set of commands that should be transmitted to a computer memory medium when executed by the end user, the set of commands comprising commands for an instance of a virtual resource provided by a resource provider for use by the end user in a networked computing environment wherein the set of rules comprises one or more of; at least one denied list comprising commands not to be transmitted; a threshold of uses after which at least one command is to be transmitted; at least one directory from which the command was executed to be transmitted; at least one directory from which the command was executed not to be transmitted;
orat least one keyword indicating the command to be transmitted; receive, in the computer memory medium, at least one command of the set of commands in response to execution of the at least one command by the end user; analyze the received at least one command of the set of commands to identify information pertaining to the set of commands, the information identifying at least one of the following;
the set of commands, at least one directory in which the set of commands were executed, a base image associated with the instance, a set of demographic information about a set of users executing the set of commands, a status of at least one software program running on the instance, a set of tags associated with the set of commands, and at least one geographic location where the set of commands were executed;store the information in a computer storage device; receive, from a requester, a request to access at least a subset of the information; retrieve the at least a subset of the information from the computer storage device; and provide the at least a subset of the information to the requester. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification