Detection of computing resource leakage in cloud computing architectures

Techniques and systems for detecting leakage of computing resources in cloud computing architectures are described. In some implementations, first data may be obtained that indicates usage of a computing resource, such as non-volatile memory, volatile memory, processor cycles, or network resources,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Dang, Yingnong, Ding, Justin, Yang, Xinsheng
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Techniques and systems for detecting leakage of computing resources in cloud computing architectures are described. In some implementations, first data may be obtained that indicates usage of a computing resource, such as non-volatile memory, volatile memory, processor cycles, or network resources, by a group of computing devices included in a cloud computing architecture. The first data may be used to determine reference data that may include a distribution of values of usage of the computing resource by the group of computing devices. Second data may also be collected that indicates usage of the computing resource by the group of computing devices during a subsequent time frame. The second data may be evaluated against the reference data to determine whether one or more conditions indicating a leak of the computing resource are satisfied.