Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual machine behavior monitoring and locking method

A virtual machine and behavior technology, applied in the field of cloud computing, can solve the problems of insufficient integration, inflexibility, and poor use experience between third-party tools and cloud platforms, and achieve the effect of improving behavior monitoring and locking and improving security.

Inactive Publication Date: 2018-03-16
G CLOUD TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) The integration of third-party tools and cloud platforms is not complete enough, and the user experience is poor
[0004] (2) Not flexible enough. Regardless of the behavior of the virtual machine, generally the virtual machine will be shut down or disconnected from the network if there is a problem. For example, after a public cloud user suffers a DDOS attack, the virtual machine is directly taken off the shelf by the public cloud platform administrator. , the user usually does not know the reason

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine behavior monitoring and locking method
  • Virtual machine behavior monitoring and locking method
  • Virtual machine behavior monitoring and locking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical scheme and advantages of the present invention clearer, the following will be further explained in detail in conjunction with the accompanying drawings and with actual implementation cases, such as figure 1 , 2 As shown, the specific implementation process is as follows:

[0019] 1. New behavior monitoring strategy for virtual machines;

[0020] The behavior monitoring strategy refers to a strategy for monitoring the behavior of a virtual machine, such as how much the CPU utilization rate is, how much the memory utilization rate is, how much is the IO read and write, and how much is the bandwidth transmission. The policy will be monitored by the monitoring policy component.

[0021] Call the / rule / create.do method to create a monitoring policy with the following parameters:

[0022] / *

[0023] *meter_name policy name String

[0024] *meter_type policy type, CPU, memory, disk IO, bandwidth

[0025] *threshold alarm threshold...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of cloud computing technology, in particular to a virtual machine behavior monitoring and locking method. According to the method, behavior monitoring strategies arenewly added for a virtual machine, and a locking strategy triggered after each monitoring strategy occurs is set; and finally a system locks the virtual machine according to the locking strategies. Through the method, the security of the virtual machine can be improved, and the virtual machine is flexible and extensible; and the method can be used for virtual machine behavior monitoring.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a virtual machine behavior monitoring and locking method. Background technique [0002] With the development of cloud computing technology, cloud computing security, especially virtual machine security is becoming more and more important. Since virtual machines have changed the usage mode of traditional application servers, the security of virtual machines has become uncontrollable and opaque from the perspective of users. At present, more and more attention is paid to the behavior security of virtual machines, but there is no good way to monitor the behavior of virtual machines on the market. Generally, cloud platforms use third-party tools, which have the following disadvantages: [0003] (1) The integration of third-party tools and the cloud platform is not complete enough, and the user experience is poor. [0004] (2) Not flexible enough. Regardless of the behavior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F9/455
CPCG06F9/45558G06F11/301G06F11/3024G06F11/3037G06F11/3041G06F2009/45575
Inventor 刘勇彬季统凯
Owner G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products