Methods and apparatus to manage asset capabilities in a computing environment using a common agent framework

ABSTRACT

Methods, apparatus, systems and articles of manufacture are disclosed to manage asset in a computing environment using a common agent framework. An example method includes maintaining a catalog of capabilities available to an asset based on plugins installed at the asset. The example method also includes determining whether a capability is installed at the asset based on the catalog of capabilities, and installing the capability at the asset when the capability is not installed at the asset. The example method also includes receiving, at the asset, a request to perform the capability, validating, via a processor, the request, and, in response to the validating, performing the capability.

RELATED APPLICATION

This patent arises from a continuation of U.S. patent application Ser.No. 14/824,049, (Now U.S. Pat. No. ______) which was filed on Aug. 11,2015. U.S. patent application Ser. No. 14/824,049 is hereby incorporatedherein by reference in its entirety. Priority to U.S. patent applicationSer. No. 14/824,049 is hereby claimed.

FIELD OF THE DISCLOSURE

This disclosure relates generally to computing environments, and, moreparticularly, to methods and apparatus to manage asset in a computingenvironment using a common agent framework.

BACKGROUND

Virtualizing computer systems provides benefits such as the ability toexecute multiple computer systems on a single hardware computer,replicating computer systems, moving computer systems among multiplehardware computers, and so forth. Example systems for virtualizingcomputer systems are described in U.S. patent application Ser. No.11/903,374, entitled “METHOD AND SYSTEM FOR MANAGING VIRTUAL AND REALMACHINES,” filed Sep. 21, 2007, and granted as U.S. Pat. No. 8,171,485,U.S. Provisional Patent Application No. 60/919,965, entitled “METHOD ANDSYSTEM FOR MANAGING VIRTUAL AND REAL MACHINES,” filed Mar. 26, 2007, andU.S. Provisional Patent Application No. 61/736,422, entitled “METHODSAND APPARATUS FOR VIRTUALIZED COMPUTING,” filed Dec. 12, 2012, all threeof which are hereby incorporated herein by reference in their entirety.

“Infrastructure-as-a-Service” (also commonly referred to as “IaaS”)generally describes a suite of technologies provided by a serviceprovider as an integrated solution to allow for elastic creation of avirtualized, networked, and pooled computing platform (sometimesreferred to as a “cloud computing platform”). Enterprises may use IaaSas a business-internal organizational cloud computing platform(sometimes referred to as a “private cloud”) that gives a developeraccess to infrastructure resources, such as virtualized servers,storage, and networking resources. By providing ready access to thehardware resources required to run an application, the cloud computingplatform enables developers to build, deploy, and manage the lifecycleof a web application (or any other type of networked application) at agreater scale and at a faster pace than ever before.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a block diagram of an example computing environmentconstructed in accordance with the teachings of this disclosure tofacilitate management of capabilities using a common agent framework.

FIG. 1B is a block diagram of an alternate example computing environmentconstructed in accordance with the teachings of this disclosure tofacilitate management of capabilities using a common agent framework.

FIG. 2 is a block diagram of an example implementation of the examplecapabilities management agent of FIGS. 1A and/or 1B constructed inaccordance with the teachings of the disclosure.

FIG. 3 illustrates an example plugin registration file that may be usedby the example capabilities management agent of FIGS. 1A, 1B and/or 2 toregister the example plugin of FIGS. 1A and/or 1B.

FIG. 4 illustrates an example plugin invoker file that may be used bythe example capabilities management agent of FIGS. 1A, 1B and/or 2 toinvoke the example plugin of FIGS. 1A and/or 1B.

FIG. 5 illustrates an example invoke request file that may be executedby the example capabilities management agent of FIGS. 1A, 1B and/or 2 toinvoke a capability.

FIG. 6 illustrates an example data table that may be employed by theexample plugins registrar of FIG. 2 to store registered plugins-invokermappings.

FIG. 7 illustrates an example schema of functions file that may be usedby the example capabilities management agent of FIGS. 1A, 1B and/or 2 todetermine the capabilities provided by the example plugin of FIGS. 1Aand/or 1B.

FIG. 8 illustrates an example data table that may be employed by theexample capabilities management agent of FIGS. 1A, 1B and/or 2 to storecapability-plugin mappings.

FIG. 9 is a flowchart representative of example machine-readableinstructions that may be executed to implement the example applicationof FIGS. 1A and/or 1B.

FIGS. 10 and 11 are flowcharts representative of examplemachine-readable instructions that may be executed to implement theexample capabilities management agent of FIGS. 1A and/or 1B.

FIG. 12 is a block diagram of an example processing platform capable ofexecuting the example machine-readable instructions of FIG. 9 toimplement the example application of FIGS. 1A and/or 1B.

FIG. 13 is a block diagram of an example processing platform capable ofexecuting the example machine-readable instructions of FIGS. 10 and/or11 to implement the example capabilities management agent of FIGS. 1A,1B and/or 2.

DETAILED DESCRIPTION

Examples disclosed herein facilitate a common agent framework to manageasset capabilities in an enterprise. For example, disclosed examplesinstall a capabilities management agent on one or more asset(s) in theenterprise to enable one or more application(s) to securely andefficiently add, discover and/or invoke capabilities available at theasset. In addition, disclosed examples implement the common agentframework in a platform-agnostic and/or language-agnostic manner. Forexample, the capabilities management agent may invoke capabilitieswritten in different languages (e.g., Java, python, C++, etc.) at thesame time.

Virtual computing services enable one or more assets to be hosted withina computing environment. As disclosed herein, an asset is a computingresource (physical or virtual) that may host a wide variety of differentapplications such as, for example, an email server, a database server, afile server, a web server, etc. Example assets include physical hosts(e.g., non-virtual computing resources such as servers, processors,computers, etc.), virtual machines, containers that run on top of a hostoperating system without the need for a hypervisor or separate operatingsystem, hypervisor kernel network interface modules, etc. In someexamples, an asset may be referred to as a compute node, an end-point, adata computer end-node or as an addressable node.

Virtual machines operate with their own guest operating system on a hostusing resources of the host virtualized by virtualization software(e.g., a hypervisor, virtual machine monitor, etc.). Numerous virtualmachines can run on a single computer or processor system in a logicallyseparated environment (e.g., separated from one another). A virtualmachine can execute instances of applications and/or programs separatefrom application and/or program instances executed by other virtualmachines on the same computer.

In examples disclosed herein, containers are virtual constructs that runon top of a host operating system without the need for a hypervisor or aseparate guest operating system. Containers can provide multipleexecution environments within an operating system. Like virtualmachines, containers also logically separate their contents (e.g.,applications and/or programs) from one another, and numerous containerscan run on a single computer or processor system. In some examples,utilizing containers, a host operating system uses namespaces to isolatecontainers from each other to provide operating-system level segregationof applications that operate within each of the different containers.This segregation can be viewed as a form of virtualization that isolatesdifferent groups of applications that operate in different containers.In some examples, such containers are more lightweight than virtualmachines. In some examples, a container OS may execute as a guest OS ina virtual machine.

Management applications provide administrators visibility into thecondition of assets in a computing environment (e.g., a data center).Administrators can inspect the assets, see the organizationalrelationships of a virtual application, filter log files, overlay eventsversus time, etc. In some examples, an application may install one ormore plugins (sometimes referred to herein as “agents”) at the asset toperform monitoring operations. For example, a first managementapplication may install a first monitoring agent at an asset to track aninventory of physical resources and logical resources in a computingenvironment, a second management application may install a secondmonitoring agent at the asset to provide real-time log management ofevents, analytics, etc., and a third management application may installa third monitoring agent to provide operational views of trends,thresholds and/or analytics of the asset, etc. However, executing thedifferent monitoring agents at the asset consumes resources (e.g.,physical resources) allocated to the asset. In addition, some monitoringagents may perform one or more similar task(s).

Examples disclosed herein facilitate a common agent framework in acomputing environment to enable management applications to securely andefficiently manage capabilities at the asset in the computingenvironment. For example, disclosed examples include a capabilitiesmanagement agent installed on the asset to maintain a catalog ofcapabilities (sometimes referred to herein as a “schema” or a “set ofcapabilities”) available at the asset.

In some disclosed examples, the example capabilities management agentfacilitates adding capabilities (sometimes referred to herein as“functions,” “tasks,” “processes” or “operations”) available at theasset. For example, in some disclosed examples, the example capabilitiesmanagement agent registers plugin(s) provided by the managementapplication in a plugins inventory. For example, the examplecapabilities management agent may record a plugin identifier (e.g.,included in a plugin registration file) in the plugins inventory. Insome examples, the plugin identifier may include a plugin namespaceidentifier, a plugin name identifier and a plugin version identifier.

In some disclosed examples, the plugin registration file also includes areference to a plugin invoker (e.g., a file, a script, a program, etc.)associated with the plugin (sometimes referred to herein as a “provider”or a “capabilities provider”). In some examples, the example plugininvoker may facilitate executing the plugin. For example, when called bythe example capabilities management agent, a plugin invoker may firstload resources (e.g., a python library) that may be used by the pluginand then call the plugin (e.g., a plugin written in python) to execute.

In some disclosed examples, in response to registering the plugin in theexample plugins inventory, the example capabilities management agentidentifies one or more new capabilities made available by the plugin forexecuting. For example, the capabilities management agent may executethe plugin (e.g., by calling the associated plugin invoker) and requestthat the plugin provide a schema of functions describing a set ofcapabilities made available by the plugin. In some disclosed examples,the example capabilities management agent records the set ofcapabilities in a catalog of capabilities based on the identifiers ofthe capabilities in the set. As used herein, a capability identifier mayinclude a class namespace, a class name, a class version and/or acapability name. A class (sometimes referred to as a “capability group”)is a set of capabilities that may be identified by the same namespace,name and version.

In some disclosed examples, the capabilities management agentfacilitates the management application discovering capabilitiesavailable to the asset by providing an updated catalog of capabilitiesto the management application. For example, when a new plugin isinstalled in the capabilities management agent at the asset, newcapabilities (e.g., functions, tasks, processes, operations, etc.) aremade available for executing. An example benefit of the capabilitiesmanagement agent providing an updated catalog of capabilities to themanagement application is to enable the management application todetermine whether to install their own plugin at the asset as thecapabilities available at the asset change. For example, when amanagement application connects with the capabilities management agent,the management application may request that the example capabilitiesmanagement agent provide the catalog of capabilities. In some disclosedexamples, when the asset already has the resources to perform thefunctions required by the management application, the managementapplication does not install a management application plugin at theasset, thereby enabling the asset to consume fewer of the resourcesallocated to the asset.

In some examples, the plugin may be a proactive plugin that continuously(or nearly continuously) executes at the asset. For example, a servicelevel agreement (SLA) monitoring agent may continuously execute on theasset to determine if and/or when utilization of the asset violates anSLA. In some examples, the plugin may be a reactive plugin that responds(e.g., executes at the asset) when requested. For example, an agentinstaller plugin may respond (e.g., install an agent) when requested andremain idle otherwise, thereby conserving resources (e.g., processingpower, memory, etc.) consumed at the asset. In some disclosed examples,the example capabilities management agent may limit resource utilizationat the asset (e.g., by the installed plugins) by disabling proactiveplugins. For example, while a plugin is performing a monitoring function(e.g., an SLA check), the example capabilities management agent maydisable the proactive plugin.

In some disclosed examples, in response to a request, the examplecapabilities management agent uses a capability identifier included inthe request to determine a particular plugin that is able to perform therequested task. For example, a management application may invoke acapability (e.g., request the capabilities management agent perform acapability) by providing the capability identifier and one or moreargument(s) needed to perform the task to the example capabilitiesmanagement agent. In some examples, the capabilities management agentqueries the example catalog of capabilities for a plugin identifier thatmaps to the capability identifier. In some disclosed examples, theexample capabilities management agent utilizes the plugin identifier todetermine the plugin invoker to be used to execute the plugin. Forexample, the capabilities management agent may retrieve an invokeridentifier from the plugins inventory. The example capabilitiesmanagement agent may then call the plugin invoker by providing theplugin invoker the capability identifier and the argument(s). Theexample capabilities management agent may also provide a location tostore the results of performing the task. For example, the plugin mayrecord (e.g., log) output in an example results data store provided bythe capabilities management agent.

FIG. 1A is a block diagram of an example computing environment 100employing virtual machines and a hypervisor. The example computingenvironment 100 of FIG. 1A includes an example network of storage arrays102 in communication with one or more example computing server(s) 104.The example network of storage arrays 102 may be implemented using anysuitable wired and/or wireless storage including, for example, one ormore Fiber Channel Storage Area Network (SAN) arrays, one or moreInternet Small Computer System Interface (iSCSI) SAN arrays, one or moreNetwork Attached Storage (NAS) arrays, etc. In the illustrated example,the network of storage arrays 102 are connected to and shared amonggroups of servers through an example network 106, thereby enablingaggregating storage resources and enabling increased flexibility inprovisioning the storage resources to, for example, one or more examplevirtual machine(s) 110.

In the illustrated example of FIG. 1A, the example computing server(s)104 may be implemented by any number of x86 or ARM (Acorn RISC Machinearchitecture) servers (e.g., one or more). The computing server(s) ofthe illustrated example are in communication with the example network ofstorage arrays 102 via the example network 106. While in the illustratedexample the computing server(s) 104 are illustrated as a single server,the computing server(s) 104 may be implemented by any number (e.g., 1,2, 3, etc.) and/or type(s) of servers. The example network 106 of FIG.1A may be implemented using any suitable wired and/or wirelessnetwork(s) such as, for example, one or more data buses, one or moreLocal Area Networks (LANs), one or more wireless LANs, one or morecellular networks, the Internet, an Intranet, etc. As used herein, thephrase “in communication,” and/or variations thereof, encompass directcommunication and/or indirect communication through one or moreintermediary components and do not require direct physical (e.g., wired)communication and/or constant communication, but rather additionallyinclude selective communication at periodic or aperiodic intervals, aswell as one-time events

In the illustrated example of FIG. 1A, one or more of the examplecomputing server(s) 104 executes an example virtualization platform 108.A virtualization platform (sometimes referred to as a “virtualizationlayer,” a “hypervisor” or a “virtual machine monitor”) abstractsprocessors, memory, storage and/or other resources of the computingenvironment into one or more virtual machines. In the illustratedexamples, the virtual machine(s) 110 include an operating system 114and/or execute one or more applications and/or services. In someexamples, the virtualization platform 108 may be installed on acomputing server without an intervening operating system (e.g., abare-metal hypervisor). In some examples, the virtualization platform108 may be installed on a storage device rather than on a computingserver.

The example virtualization platform 108 of FIG. 1A virtualizes andaggregates the underlying physical hardware resources (e.g., some or allof the example network of storage arrays 102 and/or the examplecomputing server(s) 104) across the physical computing environment andprovides pools of virtual resources available for use in the computingenvironment 100. Thus, by using the resources available from thephysical components of the computing environment 100, one or more of theexample virtual machine(s) 110 may request resources dynamically as aworkload increases, and/or may release resources dynamically as theworkload decreases.

In some examples disclosed herein, a lighter-weight virtualization isemployed by eliminating the virtualization platform 108 and usingcontainers in place of the virtual machine(s) 110. FIG. 1B is an exampleillustrating such a light-weight virtual computing environment 150. Inthe illustrated example of FIG. 1B, an example computing server 152provides a host operating system 154. One or more example container(s)156 of the example of FIG. 1B are software constructs that run on top ofthe host operating system 154 without the need for a virtualizationplatform or a separate guest operating system. Unlike virtual machines,the containers do not instantiate their own operating systems. Likevirtual machines, the container(s) 156 are logically separate from oneanother. Numerous containers can run on a single computer or processorsystem. Also like virtual machines, the container(s) 156 can executeinstances of applications or programs separate from application/programinstances executed by the other containers on the same computer orprocessing system.

In some examples, the host operating system 154 uses namespaces toisolate the container(s) 156 from each other. Such an approach providesoperating system level segregation of the different groups ofapplications that operate within the different container(s) 156. Thissegregation is akin to the virtual machine segregation that is offeredin hypervisor-based virtualized environments, and thus can be viewed asa form of virtualization that isolates different groups of applicationsthat operate in different containers. Other than the use of virtualmachines and a hypervisor instead of containers running on a host OS,the example of FIGS. 1A and 1B are similar. Thus, the followingdiscussion of like numbered components in FIG. 1A apply equally well tothe like numbered parts of FIG. 1B and, to avoid redundancy, FIG. 1Bwill not be separately described.

Returning to the illustrated example of FIG. 1A, the examplevirtualization platform 108 has provisioned the virtual machine(s) 110.While in the illustrated example the virtual machine(s) 110 areillustrated as a single virtual machine, the virtual machine(s) 110 mayrepresent any number of logical resources provisioned by thevirtualization platform 108. The example virtualization platform 108provisions the virtual machine(s) 110 and configures the respectivevirtual machine(s) 110 for operation in the computing environment 100.For example, the virtualization platform 108 may install and configurean example operating system 112 onto the virtual machine(s) 110.

In the illustrated example of FIG. 1A, to manage the computingenvironment 100, the example computing environment 100 of FIG. 1Aincludes an example virtualization manager 114. The examplevirtualization manager 114 provides a single point of control (or pointof access) to the computing environment 100. In the illustrated example,the virtualization manager 114 manages the assignments of virtualmachine(s) 110 to be virtualized on corresponding ones of the computingserver(s) 104, and manages the assignments of resources of the computingserver(s) 104 to the virtual machine(s) 110. In some examples, thevirtualization manager 114 includes one or more interfaces (e.g., aweb-access interface) that enable applications to manage the examplecomputing environment 100 and access the example virtualization platform108 and/or the example virtual machine(s) 110.

In the illustrated example of FIG. 1A, the example computing environment100 includes one or more example application(s) 116 that interface withthe virtualization manager 114 to manage and/or access the resources inthe computing environment 100. In the illustrated example, theapplication 116 is a management application (e.g., vRealize, LogInsight™ and Hyperic®, vSphere®/vCenter manager, which are commerciallyavailable products from VMware®, Inc.) that performs monitoringoperations to provide administrators visibility into the condition ofthe virtual machine(s) 110. As described above, in traditionalarchitectures, when a management application is installed to monitoroperations, the management application installs an agent at the virtualmachine(s) being managed. These agents provide the functions (e.g., themonitoring operations or processes) that are required by the managementapplication. This traditional architecture approach has severaldrawbacks. For instance, each application that is managing a virtualmachine may install respective agent(s) on the virtual machine, whichconsumes resources (e.g., physical resources) allocated to the virtualmachine. In addition, some functions provided by the agents may beredundant. For example, two management applications that provideanalytics at the managed virtual machine may both install functions tomonitor disk latency at the virtual machine.

In order to facilitate the common agent framework disclosed herein, thecomputing environment 100 of the illustrated example is provided with acapabilities management agent 118. For example, the virtualizationplatform 108 may install and configure the capabilities management agent118 at the provisioned virtual machine(s) 110. The example capabilitiesmanagement agent 118 maintains an example catalog of capabilities thatare available at the virtual machine 110 based on plugins installed atthe virtual machine 110. In some examples, when an application accessesthe virtual machine 110, the capabilities management agent 118 providesthe catalog of capabilities to the application, which may then determinewhether to install an agent or, if the functionality is alreadyavailable at the virtual machine 110, to not install an agent.

The example application 116 of the illustrated example of FIG. 1Aincludes an example agent installer 120, an example agent controller 122and an example data store 124.

The example agent installer 120 of the illustrated example of FIG. 1Ainstalls the functions (e.g., capabilities) required by the application116 at the virtual machine 110. In the illustrated example, when theagent installer 120 accesses the virtual machine 110, the agentinstaller 120 requests that the virtual machine 110 provide a catalog ofcapabilities representing the functions installed at the virtual machine110 and available to be invoked by the application 116. The exampleagent installer 120 of FIG. 1A compares the capabilities included in thecatalog to a schema of functions 126 required by the application 116 beavailable at the virtual machine 110. For example, the agent installer120 may retrieve the schema of functions 126 from the data store 124. Insome examples, the schema of functions 126 represents a set of functionsthat may be invoked by the application 116. For example, the schema offunctions 126 may be a list, a file, a database, etc.

In the illustrated example of FIG. 1A, when the agent installer 120determines that the required function(s) are not already available atthe virtual machine 110, the agent installer 120 provides an exampleplugin package 128 to the capabilities management agent 118 to installand make available the function(s) for invoking at the virtual machine110. The example plugin package 128 of the illustrated example includesan example plugin 130 to provide the functions required by theapplication 116 and an example plugin identifier 132 to uniquelyidentify the plugin 130. For example, the plugin identifier 132 mayinclude a plugin name, a plugin version and a plugin namespace. Such anapproach provides developer level segregation of the different pluginsthat are installed at the virtual machine 110. As a result, two pluginsinstalled at the virtual machine 110 may be differentiated based ontheir respective namespaces, their respective names and/or theirrespective version numbers. In some examples, the plugin identifier 132may be included in a file (e.g., a plugin registration file), a list, asmetadata in the plugin 130, etc. An example plugin registration file 300is described in connection with FIG. 3.

The example common agent framework disclosed herein is platform-agnosticand language-agnostic. As disclosed herein, while plugin developerswrite their plugins in a particular language for a particular platform,the plugin developers can write the plugins in the particular languageand/or platform of their choice. For example, plugin developersutilizing the techniques disclosed herein are not required to writetheir plugins in a specified language or for a specified platform. Inaddition, developers employing the common agent framework are notrequired to prepare specific versions of their plugins for differentplatforms and/or languages. For example, developers employing the commonagent framework are able to use whichever language is most appropriatefor a platform. For example, developers may develop a plugin for aWindows platform or a *nix platform in Java, python and/or C++. In otherexamples, developers that develop a plugin using the PowerShell languagemay be limited to the Windows platform.

In addition, application developers utilizing the techniques disclosedherein do not need to worry about the language and/or the platform forwhich a plugin was developed. As disclosed herein, by using a standardor common format for requests, responses and schema/catalogs, anyapplication developer aware of a plugin can invoke plugin capabilitiesat a later time.

To enable this platform and language independence, the example pluginpackage 128 includes an example invoker 134 that operates as atranslator to provide platform and language interoperability. Forexample, the example invoker 134 may be a shell script that enables aninstruction received in C++ to be executed by a plugin written inpython. In some examples, the example invoker 134 also providesresources that are needed by the plugin 130 to execute. For example, theinvoker 134 may retrieve and/or load a language interpreter (e.g., Java,Python, Perl, etc.) that can be utilized by the plugin 130 duringexecution (e.g., when called). In the illustrated example of FIG. 1A,the example invoker 134 includes an example invoker identifier 135 thatmay be used to call the invoker 134.

As described below in connection with FIGS. 2 and 4, the examplecapabilities management agent 118 may read the plugin identifier 132 todetermine the plugin invoker 134 to call. In some examples, the plugininvoker 134 prepares the language-specific path(s) (e.g., PYTHON_PATH,LD_LIBRARY_PATH) and calls the plugin in the language-specific manner.An implementation of an example plugin invoker 134 is described inconnection with FIG. 4.

The example agent controller 122 of the illustrated example of FIG. 1Aprovides requests 136 to the capabilities management agent 118 toperform monitoring operations. For example, the agent controller 122 mayinstruct the capabilities management agent 118 to kill a process runningat the virtual machine 110, to log resource utilization at the virtualmachine 110, etc. In the illustrated example of FIG. 1A, the examplerequest 136 includes a capability identifier 138 and one or moreargument(s) 140 used by the corresponding capability. For example, tokill a process running at the virtual machine 110, the example request136 may include a capability identifier 138 corresponding to the killoperation (e.g., “kill”) and an argument 140 corresponding to theparticular operation (e.g., “PID=1234”). In some examples, thecapability identifier 138 may include a class (e.g., a namespace (e.g.,“Application1”), a name (e.g., “process”) and a version number (e.g.,“1.0”). As used herein, a class represents a set of capabilities thatare identified by the same namespace, same name and same version. Forexample, an example class (e.g., “Application1/ process/ 1.0”) mayinclude a “kill” operation to kill a process and a “pause” operation topause a process. Including a class in the capability identifier 138 maybe useful in avoiding naming conflicts between different developers. Forexample, if two different developers want to implement a kill operationin different ways, the two developers may each name the capability“Kill” included in version “1.0” of a “Process” class, but there wouldnot be a naming conflict because each “process” class would reside in adifferent namespace (e.g., “Application1” and “Application2”). Anexample implementation of the invoke request 500 is described inconnection with FIG. 5.

In the illustrated example of FIG. 1A, the example request 136 does notinclude a plugin identifier. This approach may be useful if, forexample, an application 116 can use a plugin that was previouslyinstalled by another application. That is, to the application 116, itdoes not matter which plugin executes their monitoring operations, but,rather, that the requested monitoring operation can be performed at thevirtual machine 110. As described in connection with an example pluginsmonitor 245, the example plugins monitor 245 maintains a mapping betweencapabilities and the plugins that perform those capabilities. As aresult, developers (e.g., application developers) do not need to worryabout plugin names to call their functions. In addition, plugins may beused by applications that were unanticipated or unknown to developers atthe time the developers developed the plugins. For example, by using astandard or common format for requests, responses and schema/catalogs,any developer aware of a plugin can invoke the plugin capabilities at alater time. In addition, by storing the outcomes in a standard or commonformat, different developers (e.g., application developers) may be ableto utilize the outcomes already stored, for example, in the example datastore 260, rather than re-executing the same functions.

The example data store 124 of FIG. 1A is provided to store the exampleschema of functions 126, the example plugin package 128 and/or any otherinformation used by the application 116. The example data store 124 ofFIG. 1A may be implemented by a volatile memory (e.g., a SynchronousDynamic Random Access Memory (SDRAM), Dynamic Random Access Memory(DRAM), RAMBUS Dynamic Random Access Memory (RDRAM, etc.) and/or anon-volatile memory (e.g., flash memory)). The example data store 124may additionally or alternatively be implemented by one or more doubledata rate (DDR) memories, such as DDR, DDR2, DDR3, mobile DDR (mDDR),etc. The example data store 124 may additionally or alternatively beimplemented by one or more mass storage devices such as hard drivedisk(s), compact disk drive(s), digital versatile disk drive(s), etc.While, in the illustrated example, the example data store 124 isillustrated as a single database, the example data store 124 may beimplemented by any number and/or type(s) of databases.

In operation, the example agent installer 120 receives a catalog ofcapabilities from the example capabilities management agent 118 thatincludes a set of capabilities that are available at the virtual machine110. The example agent installer 120 retrieves the example schema offunctions 126 from the example data store 124 and compares the functionsin the catalog of capabilities to the functions included in the schema126. In response to determining that the schema of functions 126includes one or more function(s) that are not available at the virtualmachine 110 (e.g., not included in the catalog of capabilities), theexample agent installer 120 retrieves the plugin package 128 from thedata store 124 and provides the plugin package 128, which includes theplugin 130 to provide the one or more identified function(s), theexample plugin identifier 132 corresponding to the plugin 130 and theexample plugin invoker 134 associated with the plugin 130, to thecapabilities management agent 118.

In the illustrated example, the example agent controller 122, inresponse to a determination to invoke a capability at the capabilitiesmanagement agent 118, provides the example request 136 to thecapabilities management agent 118 to perform the capability. The request136 includes the capability identifier 138, which includes a classnamespace, a class name, a class version and/or a capability name. Theexample request 136 also includes one or more argument(s) 140 such aparameter (e.g., a variable name, a variable value, etc.) and/orattachment (e.g., a file). An example of an attachment is a capabilitythat installs patches and an example attachment is a patch.

As an illustrative example, consider an example application 116 thatperforms compliance assessment (e.g., Security Content AutomationProtocol (SCAP) compliance assessment) to determine if the virtualmachine 110 satisfies one or more hardening standards such as the HealthInsurance Portability and Accountability Act (HIPAA), Secure TechnicalImplementation Guides (STIGS) (provided by the Defense InformationSecurities Agency), vSphere Hardening Guide (VHG) (provided by VMware®,Inc.), etc. In some such examples, the application 116 may determinewhether the virtual machine 110 is in compliance or compliance violationby invoking an “assess” capability at the virtual machine 110. In theillustrated example, the results of performing the “assess” capabilityare provided to the application 116 in the SCAP format and theapplication 116 is able to determine which, if any, rules are violatedby the virtual machine 110. In some examples, if the application 116discovers a compliance violation, the example application 116 mayremediate the violation by invoking a capability at the virtual machine110 (e.g., by applying a patch, by upgrading one or more capabilitiesavailable at the virtual machine 110, by downgrading one or morecapabilities available at the virtual machine 110, etc.) via the examplecapabilities management agent 118 and, thereby, bringing the virtualmachine 110 into near real-time and ongoing compliance. For example, ifthe virtual machine 110 is out of compliance because password rules atthe virtual machine 110 are not stringent enough (e.g., do not satisfy athreshold), the application 116 may invoke a “changePasswordRule”capability at the virtual machine 110 to cause the capability managementagent 118 to upgrade the password rules at the virtual machine 110.

While an example manner of implementing the application 116 isillustrated in FIGS. 1A and/or 1B, one or more of the elements,processes and/or devices illustrated in FIGS. 1A and/or 1B may becombined, divided, re-arranged, omitted, eliminated and/or implementedin any other way. Further, the example agent installer 120, the exampleagent controller 122, the example data store 124 and/or, more generally,the example application 116 of FIGS. 1A and/or 1B may be implemented byhardware, software, firmware and/or any combination of hardware,software and/or firmware. Thus, for example, any of the example agentinstaller 120, the example agent controller 122, the example data store124 and/or, more generally, the example application 116 of FIGS. 1Aand/or 1B could be implemented by one or more analog or digitalcircuit(s), logic circuits, programmable processor(s), applicationspecific integrated circuit(s) (ASIC(s)), programmable logic device(s)(PLD(s)) and/or field programmable logic device(s) (FPLD(s)). Whenreading any of the apparatus or system claims of this patent to cover apurely software and/or firmware implementation, at least one of theexample agent installer 120, the example agent controller 122, theexample data store 124 and/or, more generally, the example application116 of FIGS. 1A and/or 1B is/are hereby expressly defined to include atangible computer readable storage device or storage disk such as amemory, a digital versatile disk (DVD), a compact disk (CD), a Blu-raydisk, etc. storing the software and/or firmware. Further still, theexample application 116 may include one or more elements, processesand/or devices in addition to, or instead of, those illustrated in FIGS.1A and/or 1B, and/or may include more than one of any or all of theillustrated elements, processes and devices

FIG. 2 is a block diagram of an example implementation of the examplecapabilities management agent 118 of FIGS. 1A and/or 1B constructed inaccordance with the teachings of this disclosure. In the illustratedexample of FIG. 2, the example capabilities management agent 118includes an example messaging interface 205, an example security engine210, an example package unpacker 215, an example plugins registrar 220,an example plugins repository 225, an example plugins inventory 230, anexample invokers repository 235, an example plugins monitor 245, anexample catalog 250, an example capabilities executor 255 and an exampleresults data store 260.

In the illustrated example of FIG. 2, the capabilities management agent118 includes the example communications interface 205 to enablecommunication with the application(s) 116 of FIGS. 1A and/or 1B. Forexample, the communications interface 205 may facilitate bi-directional,asynchronous messaging between the capabilities management agent 118 andthe application(s) 116. In the illustrated example, the communicationsinterface 205 communicates with the application(s) 116 using AdvancedMessage Queueing Protocol (AMQP) communications. In some examples, thecommunications interface 205 may communicate with the application(s) 116via a message broker such as a RabbitMQ server implementing AMQP.However, any other approach to communicate with and/or otherwisetransmit and/or receive instructions and/or results to and/or from theapplication(s) 116 (e.g., Representational state transfer (REST)protocols, ZeroMQ (e.g., socket-based) communications, etc.) mayadditionally or alternatively be used.

In the illustrated example of FIG. 2, the capabilities management agent118 includes the example security engine 210 to validate messagesreceived and/or transmitted via the communications interface 205. Theexample security engine 210 of the illustrated example of FIG. 2utilizes the Cryptographic Message Syntax (CMS) standard for protectingmessages. However, any other approach to protect communications mayadditionally or alternatively be used. For example, the security engine210 may use CMS to digitally sign, authenticate and/or encrypt/decryptmessages communicated between the application(s) 116 and the capabilitymanagement agent 118. In the illustrated example, the security engine210 encrypts and signs a message before the outgoing message istransmitted to the application(s) 116. The example security engine 210of FIG. 2 also validates and decrypts messages received from theapplication(s) 116. In some examples, validation of the messages by theexample security engine 210 may be useful to defend againstman-in-the-middle attacks and/or other attempts to perform unauthorizedactions.

In the illustrated example of FIG. 2, the example security engine 210also authenticates the example plugin package 128 and/or the exampleplugin 130 before the plugin 130 is able to execute at the virtualmachine 110. In the illustrated example, the security engine 210utilizes the CMS standard for authenticating the plugin 130. Forexample, the security engine 210 may determine whether a securitycertificate of the plugin package 128 and/or the plugin 130 matches acorresponding security certificate available to the security engine 210.In response to the security engine 210 determining that the securitycertificates do not match, the security engine 210 of the illustratedexample may prevent the plugin package 128 from installing and/or theplugin 130 from executing. In some examples, the security engine 210 mayattempt to validate the plugin package 128 until a time-out event isdetected or a threshold number of incorrect attempts is satisfied.

In some examples, the plugin 130 may be configured with permissionsrequired to execute the plugin 130 at the virtual machine 110. Forexample, the security engine 210 may prevent a user from accessing theplugin 130 when the user does not have sufficient permissions (e.g.,privileges). In the illustrated example of FIG. 2, the example securityengine 205 utilizes VGAuth (a product from VMware®, Inc.) to control thepermissions at which the plugin 130 can be executed. In the illustratedexample, the security engine 210 utilizes the Security Assertion MarkupLanguage (SAML) standard to authenticate and authorize access of a userto the plugin 130. For example, the security engine 210 may include analias store that maps user names to one or more aliases. In theillustrated example, when the security engine 210 of FIG. 2 validates auser (e.g., by comparing a digital signature of the user specified in aSAML Token included in, for example, the request 136) with a securitycertificate), the security engine 210 enables the user to run atappropriate permissions. For example, requests submitted by anadministrator may run as “root,” while requests submitted by a developermay run as “guest.”

An example benefit of such an approach (e.g., utilizing VGAuth tocontrol the permissions at which plugins can be executed) is thatadministrators at the virtual machine 110 are in control of thepermissions used on the virtual machine 110 that they administrators areresponsible for maintaining, rather than always being permitted to runas a high-privileged user (e.g., “root”). Another example benefit ofsuch an approach includes enabling an operating system (OS) to enforceauthorization to OS resources. For example, if a plugin 130 is runningas a low-privileged user (e.g., a “guest”), the OS will not let it killa process owned by a high-privileged user.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 includes the example package unpacker 215 tounpackage (e.g., decompress) the example plugin package 128. Forexample, the application 116 may provide the plugin package 128 as a*.zip file, a *.tar file, an *.ogg file, a *.rpm file, etc. The examplepackage unpacker 215 enables the capabilities management agent 118 toaccess different file types and not require only a single file type. Forexample, the package unpacker 215 may include and/or have access to oneor more de-compression tools to decompress the plugin package 128 basedon, for example, the file type of the plugin package 128. For example,if the package unpacker 215 determines that the plugin package 128 is a*.zip file, the example package unpacker 215 may call an “unzip” tool todecompress the plugin package 128. In some examples the developer (e.g.,a plugin developer) includes an instruction stating which script isappropriate for the particular plugin package 128. The example packageunpacker 215 of FIG. 2 provides decompressed components of the unpackedplugin package 128 (e.g., the plugin 130, the plugin identifier 132and/or the plugin invoker 134) to the example plugins registrar 220.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 includes the example plugins registrar 220 tomaintain a record of the plugins available (e.g., installed, loaded) tothe capabilities management agent 118 (e.g., to invoke). In theillustrated example, the plugins registrar 220 parses the components ofthe plugin package 128 provided by the example package unpacker 215 andidentifies the plugin 130, the plugin identifier 132 (e.g., a pluginregistration file) and the plugin invoker 134. The example pluginsregistrar 220 of FIG. 2 stores identified plugins 130 in the exampleplugins repository 225.

In the illustrated example, the example plugins registrar 220 stores theplugin identifier 132 in the example plugins inventory 230. For example,the plugins registrar 220 may record a namespace identifier, a nameidentifier and a version identifier of the plugin 130 in the pluginsinventory 230. In some examples, the plugins registrar 220 may log theplugin registration file 132 in the plugins inventory 230.

The example plugins registrar 220 stores the example plugin invoker 134in an example invokers repository 235. In some examples, the pluginsregistrar 220 stores the plugin invoker 134 at a location provided bythe application 116 (e.g., at the invoker identifier 135). For example,the plugins registrar 220 may parse the plugin registration file 132and, in response to an invoker identifier 135 (“app1_process_1_0_0”)identified in the plugin registration file 132, store the correspondingplugin invoker 134 in the invokers repository 235 (e.g., at a pathlocation “invokers repository/ app1_process_1_0_0”). The example pluginsregistrar 220 records the invoker identifier 135 with the correspondingplugin identifier 132 in the plugins inventory 230. An example datatable 600 representing registered plugins is shown in FIG. 6.

In some examples, the plugins registrar 220 may discard (e.g., delete,uninstall, replace, etc.) a previous version of a plugin. As usedherein, the version numbers follow the versioning rules where a changeto a minor version represents that, although some code may have changed(e.g., to fix a bug), the application interface is still unchanged. Insome such examples, if the application 116 updates a plugin to a newminor version (e.g., version 1.0.0 to version 1.0.1), the exampleplugins registrar 220 may replace the old plugin (e.g., version 1.0.0)with the new plugin (e.g., version 1.0.1). In contrast, a change to amajor version represents a change to the application interface so thatolder versions cannot be understood by the new version. For example, ifthe application 116 updates a plugin to a new major version (e.g.,version 1.0 to version 1.1), the example plugins registrar 220 willleave the old plugin (e.g., version 1.0) in the example pluginsrepository 225 and also install the new plugin (e.g., version 1.1) inthe plugins repository 225.

The example plugins repository 225 of FIG. 2 is provided to store theexample plugins 130 that are available to the capabilities managementagent 118. The example plugins 130 may be retrieved from the exampleplugins repository 225 during execution (e.g., by the correspondingplugin invoker 134). The example plugins repository 225 of FIG. 2 may beimplemented by a volatile memory (e.g., a Synchronous Dynamic RandomAccess Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUSDynamic Random Access Memory (RDRAM, etc.) and/or anon-volatile memory(e.g., flash memory)). The example plugins repository 225 mayadditionally or alternatively be implemented by one or more double datarate (DDR) memories, such as DDR, DDR2, DDR3, mobile DDR (mDDR), etc.The example plugins repository 225 may additionally or alternatively beimplemented by one or more mass storage devices such as hard drivedisk(s), compact disk drive(s), digital versatile disk drive(s), etc.While, in the illustrated example, the example plugins repository 225 isillustrated as a single database, the example plugins repository 225 maybe implemented by any number and/or type(s) of databases.

The example plugins inventory 230 of FIG. 2 is provided to store theexample plugin identifiers 132 and their corresponding invokeridentifiers 135. The example plugins inventory 230 of FIG. 2 may beimplemented by a volatile memory (e.g., a Synchronous Dynamic RandomAccess Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUSDynamic Random Access Memory (RDRAM, etc.) and/or a non-volatile memory(e.g., flash memory)). The example plugins inventory 230 mayadditionally or alternatively be implemented by one or more double datarate (DDR) memories, such as DDR, DDR2, DDR3, mobile DDR (mDDR), etc.The example plugins inventory 230 may additionally or alternatively beimplemented by one or more mass storage devices such as hard drivedisk(s), compact disk drive(s), digital versatile disk drive(s), etc.While, in the illustrated example, the example plugins inventory 230 isillustrated as a single database, the example plugins inventory 230 maybe implemented by any number and/or type(s) of databases.

The example invokers repository 235 of FIG. 2 is provided to store theexample plugin invokers 134 that are used to call their correspondingplugins 130. The example invokers repository 235 of FIG. 2 may beimplemented by a volatile memory (e.g., a Synchronous Dynamic RandomAccess Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUSDynamic Random Access Memory (RDRAM, etc.) and/or a non-volatile memory(e.g., flash memory)). The example invokers repository 235 mayadditionally or alternatively be implemented by one or more double datarate (DDR) memories, such as DDR, DDR2, DDR3, mobile DDR (mDDR), etc.The example invokers repository 235 may additionally or alternatively beimplemented by one or more mass storage devices such as hard drivedisk(s), compact disk drive(s), digital versatile disk drive(s), etc.While, in the illustrated example, the example invokers repository 235is illustrated as a single database, the example invokers repository 235may be implemented by any number and/or type(s) of databases.

To maintain an accurate catalog of capabilities 250 available at thecapabilities management agent 118, the example capabilities managementagent 118 includes the example plugins monitor 245 to monitor theplugins inventory 230 for changes (e.g., additions or removals) to theplugins 130 available to the capabilities management agent 118. Forexample, an authorized application may bypass the plugins registrar 220to store their plugin 130 in the plugins repository 225 and registertheir plugin 130 in the plugins inventory 230. In some such examples,the plugins registrar 220 may not be able to determine that a new plugin130 and capabilities corresponding to the new plugin 130 are availableto the capabilities management agent 118.

In the illustrated example of FIG. 2, the example plugins monitor 245detects when a new plugin 130 is installed in the plugins inventory 230via the capabilities management agent 118 (e.g., by the pluginsregistrar 220). In some examples, the example plugins monitor 245 maydetect a plugin 130 that was not installed via the capabilitiesmanagement agent 118. For example, a customer may use an Enterprisedeployment tool to install the plugin 130 in the plugins repository 225.In some examples, a user may copy the plugin 130 onto the virtualmachine 110 and install the plugin via a command-line instruction suchas “rpm -i.”

In the illustrated example of FIG. 2, in response to detecting a newplugin 130 in the plugins inventory 230, the example plugins monitor 245requests the new plugin 130 to identify the capabilities the plugin 130is able to perform (e.g., provide the schema of functions 126). Forexample, the example plugins monitor 245 may retrieve the invokeridentifier 135 from the plugins inventory 230 to call the correspondingplugin invoker 134. In the illustrated example of FIG. 2, the pluginsmonitor 245 records the retrieved capabilities in the example catalog ofcapabilities 250. An implementation of an example schema of functions700 is shown in FIG. 7.

In the illustrated example, the example plugins monitor 245 of FIG. 2also logs a mapping between the capabilities and their correspondingplugins 130 in the example catalog 250. As described above, when theexample application 116 sends the request 136 for invoking a capability,the example request 136 of the illustrated examples of FIGS. 1A and/or1B does not necessarily include a plugin identifier. Instead, theexample plugins monitor 245 maintains a mapping to associatecapabilities with particular plugins. For example, in response to arequest to invoke a capability, the example plugins monitor 245 mayutilize a mapping between the corresponding capability identifier and aplugin identifier to determine the available plugin 130 to perform thecapability. An example data table 800 representing capabilities andtheir plugin mappings are shown in FIG. 8.

In some examples, the plugins monitor 245 provides the example catalog250 to an application 116 in response to a capabilities request from theapplication 116. For example, when the application 116 connects with theexample capabilities management agent 118, the example application 116may request that the capabilities management agent 118 provide theexample catalog 250. In some examples, the plugins monitor 245 providesupdated catalogs 250 to the application(s) 116 in response to changes inthe catalog 250. For example, when the application 116 uninstalls theplugin 130 from the virtual machine 110, the corresponding capabilitiesperformed by the capabilities management agent 118 are removed from thecatalog 250. In some such examples, the example plugins monitor 245provides a new catalog 250 to the application(s) 116 accessing thecapabilities management agent 118. In some such examples, the pluginsmonitor 245 enables the application(s) 116 to determine, in nearreal-time, whether they need to install their respective plugins 130.For example, depending on the capabilities included in the new catalog250, an application 116 may determine to install plugin 130 for theapplication (e.g., the agent installer 120 may transmit the pluginpackage 128).

The example catalog of capabilities 250 is provided to store mappingsbetween capabilities and their corresponding plugin. The example catalogof capabilities 250 of FIG. 2 may be implemented by a volatile memory(e.g., a Synchronous Dynamic Random Access Memory (SDRAM), DynamicRandom Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM,etc.) and/or a non-volatile memory (e.g., flash memory)). The examplecatalog of capabilities 250 may additionally or alternatively beimplemented by one or more double data rate (DDR) memories, such as DDR,DDR2, DDR3, mobile DDR (mDDR), etc. The example results catalog ofcapabilities 250 may additionally or alternatively be implemented by oneor more mass storage devices such as hard drive disk(s), compact diskdrive(s), digital versatile disk drive(s), etc. While, in theillustrated example, the example catalog of capabilities 250 isillustrated as a single database, the example catalog of capabilities250 may be implemented by any number and/or type(s) of databases.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 includes the example capabilities executor 255 tofacilitate executing capabilities at the virtual machine 110. Asdescribed above, the example request 136 to perform a capabilityincludes the capability identifier 138 and one or more argument(s) 140(e.g., one or more parameter(s) and/or attachment(s)) for executing thecapability. In some examples, the request 136 may include an invokerequest file requesting execution of one or more capabilities. Animplementation of an example invoke request file 500 is described inconnection with FIG. 5.

In the illustrated example, the capabilities executor 255 utilizes thecapability identifier 138 to determine the corresponding plugin 130capable of executing the capability. For example, the capabilitiesexecutor 255 may utilize the example catalog 250 (e.g., by querying thecatalog 250, by retrieving information from the catalog 250, etc.) tomap the capability identifier 138 to the corresponding plugin identifier132. The example capabilities executor 255 of FIG. 2 uses the retrievedplugin identifier 132 to determine a plugin invoker 134 to call toexecute the plugin 130. For example, the capabilities executor 255 mayuse the example plugins inventory 230 to map the plugin identifier 132to the corresponding invoker identifier 135.

In the illustrated example, the capabilities executor 255 calls theplugin 130 to perform the requested capability. For example, the examplecapabilities executor 255 may use the invoker identifier 135 to call theplugin invoker 134 and provides the capability identifier 138, theargument(s) 140 and a location for the plugin 130 to store the outcomeof executing the capability. In some examples, the capabilities executor255 executes (e.g., calls) the plugin invoker 134 by passingcommand-line parameters indicating what tasks to perform (e.g., collectschema of functions, collect instances, invoke an operation, etc.),additional information (e.g., the argument(s) 140 passed to the plugininvoker 134 and the results directory. For example, the capabilitiesexecutor 255 may instruct the plugin 130 to store the outcome (e.g.,results) of executing the capability in the example results data store260.

In some examples, the results stored in the example results data store260 are stored using a standard format. In some such examples, using astandard format enables the results stored in the results data store 260to be accessed by other application(s) 116. For example, an applicationunknown to the developers of the requesting application 116 may also usethe outcomes in the results data store 260.

The example results data store 260 is provided to store the results(e.g., outcomes) of executing capabilities. In the illustrated example,the results data store 260 is controlled by the example capabilitiesmanagement agent 118 to ensure appropriate separation between requests,applications, etc. For example, the capabilities management agent 118may separate the results in the results data store 260 based on clients(e.g., via a client identifier that uniquely identifies the application116 that invoked the capability), asset (e.g., via a virtual machineidentifier that uniquely identifies the virtual machine where thecapability was invoked) and/or request (e.g., via a request identifierthat unique identifies the request 136 that caused the capability to beinvoked). The example results data store 260 of FIG. 2 may beimplemented by a volatile memory (e.g., a Synchronous Dynamic RandomAccess Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUSDynamic Random Access Memory (RDRAM, etc.) and/or a non-volatile memory(e.g., flash memory)). The example results data store 260 mayadditionally or alternatively be implemented by one or more double datarate (DDR) memories, such as DDR, DDR2, DDR3, mobile DDR (mDDR), etc.The example results data store 260 may additionally or alternatively beimplemented by one or more mass storage devices such as hard drivedisk(s), compact disk drive(s), digital versatile disk drive(s), etc.While, in the illustrated example, the example results data store 260 isillustrated as a single database, the example results data store 260 maybe implemented by any number and/or type(s) of databases.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 facilitates the application(s) 116 addingcapabilities available to the virtual machine 110. In operation, theexample communications interface 205 receives the example plugin package128 to install the plugin 130 at the capabilities management agent 118.The example security engine 210 processes the plugin package 128 tovalidate the plugin package 128 and provides the validated pluginpackage 128 to the example package unpacker 215. The package unpacker215 unpacks (e.g., decompresses) the validated plugin package 128 andprovides the package components (e.g., the example plugin 130, theexample plugin identifier 132 and the example plugin invoker 134) to theexample plugins registrar 220. The plugins registrar 220 registers thepackage components by storing the plugin 130 in the example pluginsrepository 225 and storing the plugin invoker 134 in the exampleinvokers repository 235. The example plugins registrar 220 also recordsthe plugin identifier 132 and the corresponding invoker identifier 135in the example plugins inventory 230. The example plugins monitor 245,in response to detecting a change in the plugins inventory 230, requeststhe new plugin 130 to provide a set of capabilities that it performs.The example plugins inventory 230 records the retrieved capabilities inthe example catalog of capabilities 250. The example plugins monitor 245also records a capability-plugin mapping in the catalog of capabilities250.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 facilitates the application(s) 116 discoveringcapabilities available to the virtual machine 110. For example, inresponse to detecting a change in the catalog of capabilities 250, theexample capabilities management agent 118 provides an updated listing ofcapabilities available at the capabilities management agent 118 to theone or more application(s) 116 in communication with the capabilitiesmanagement agent 118. In operation, the example plugins monitor 245retrieves the capability identifiers included in the catalog ofcapabilities 250. The example security engine 210 encrypts the retrievedcapability identifiers and the communications interface 205 transmitsthe encrypted set of capabilities to the one or more application(s) 116in communication with the capabilities management agent.

In the illustrated example of FIG. 2, the example capabilitiesmanagement agent 118 facilitates the application(s) 116 invokingcapabilities available to the virtual machine 110. In operation, theexample communications interface 205 receives the example request 136invoking a capability at the capabilities management agent 118. Theexample security engine 210 validates the request 136 and provides thevalidated request 136 to the example capabilities executor 255. Theexample capabilities executor 255 identifies the capability identifier138 included in the request 136 and maps the capability identifier 138to the corresponding plugin identifier 132 using the capability-pluginsmappings in the catalog of capabilities 250. The example capabilitiesexecutor 255 determines the plugin invoker 134 associated with theplugin identifier 132 using the example registered plugins-invokermappings in the example plugins inventory 230. The example capabilitiesexecutor 255 then calls the identified plugin invoker 134 and providesthe capability identifier 138 and one or more argument(s) 140 (e.g., aparameter such as a process identifier (PID), an attachment such as apatch, etc.) needed to perform the capability to the plugin invoker 134.In the illustrated example, the output of the plugin 130 performing thecapability is stored in the example results data store 260.

In some examples, the example plugins repository 225, the exampleplugins inventory 230, the example invokers repository 235, the examplecatalog of capabilities 250 and/or the example results data store 260may be organized by the example plugins registrar 220 using a directoryfile structure. For example, the different plugin identifiers 132included in the plugins inventory 230 may be stored in respectivefolders representing the different plugins 130 stored in the pluginsrepository 225 and the corresponding plugin invokers 134 stored in theinvokers repository 235. The one or more capabilities that are providedby the corresponding plugins 130 may be stored in respective folders inthe catalog of capabilities 250. The output(s) of performing thecapabilities may be stored in respective folders in the results datastore 260.

In some examples, the installed plugins 130 and their associated filesand/or data may be encapsulated in respective folders and/ordirectories. For example, a first directory corresponding to a firstplugin 130 may include a folder including the first plugin 130, a folderincluding the corresponding plugin identifier 132, a folder includingthe associated plugin invoker 134, a folder including the availablecapability identifiers 138 and a folder including the output ofperforming the respective capabilities.

In some examples, the plugin package 128 may be structured to includethe respective folders (e.g., a folder including the plugin 130, afolder including the plugin identifier 132, a folder including theplugin invoker 134, a folder including the capability identifiers 138and a folder to store the output of performing the respectivecapabilities). In some such examples, the application(s) 116 may addcapabilities at the virtual machine 110 my providing the plugin package128. The example application(s) 116 may discover the capabilitiesavailable at the virtual machine 110 by receiving one or more folder(s)including the capability identifiers 138 for the respective plugins 130from the capabilities management agent 118. In addition, an application116 can remove capabilities it provided to the capabilities managementagent by uninstalling (e.g., deleting) the folder from the capabilitiesmanagement agent 118.

While an example manner of implementing the capabilities managementagent 118 of FIGS. 1A and/or 1B is illustrated in FIG. 2, one or more ofthe elements, processes and/or devices illustrated in FIG. 2 may becombined, divided, re-arranged, omitted, eliminated and/or implementedin any other way. Further, the example messaging interface 205, theexample security engine 210, the example package unpacker 215, theexample plugins registrar 220, the example plugins repository 225, theexample plugins inventory 230, the example invokers repository 235, theexample plugins monitor 245, the example catalog 250, the examplecapabilities executor 255, the example results data store 260 and/or,more generally, the example capabilities management agent 118 of FIGS.1A and/or 1B may be implemented by hardware, software, firmware and/orany combination of hardware, software and/or firmware. Thus, forexample, any of the example messaging interface 205, the examplesecurity engine 210, the example package unpacker 215, the exampleplugins registrar 220, the example plugins repository 225, the exampleplugins inventory 230, the example invokers repository 235, the exampleplugins monitor 245, the example catalog 250, the example capabilitiesexecutor 255, the example results data store 260 and/or, more generally,the example capabilities management agent 118 of FIGS. 1A and/or 1Bcould be implemented by one or more analog or digital circuit(s), logiccircuits, programmable processor(s), application specific integratedcircuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)) and/or fieldprogrammable logic device(s) (FPLD(s)). When reading any of theapparatus or system claims of this patent to cover a purely softwareand/or firmware implementation, at least one of the example messaginginterface 205, the example security engine 210, the example packageunpacker 215, the example plugins registrar 220, the example pluginsrepository 225, the example plugins inventory 230, the example invokersrepository 235, the example plugins monitor 245, the example catalog250, the example capabilities executor 255, the example results datastore 260 and/or, more generally, the example capabilities managementagent 118 of FIGS. 1A and/or 1B is/are hereby expressly defined toinclude a tangible computer readable storage device or storage disk suchas a memory, a digital versatile disk (DVD), a compact disk (CD), aBlu-ray disk, etc. storing the software and/or firmware. Further still,the example capabilities management agent 118 of FIGS. 1A and/or 1B mayinclude one or more elements, processes and/or devices in addition to,or instead of, those illustrated in FIG. 2, and/or may include more thanone of any or all of the illustrated elements, processes and devices.

FIG. 3 illustrates an example plugin registration file 300 that may beused by the example capabilities management agent 118 of FIGS. 1A, 1Band/or 2 to register the example plugin 130. In some examples, theplugin registration file 300 is included in the example plugin package128 of FIGS. 1A and/or 1B (e.g., the plugin identifier 132). The exampleprovider registration file 300 of FIG. 3 includes an example pluginidentifier section 305 and an example invoker identifier line 340. Theexample plugin identifier section 305 defines the plugin identifier 132for the plugin 130. For example, the example plugin identifier section305 includes an example first line 310 to define an example pluginnamespace 315 for the plugin 130, an example second line 320 to definean example plugin name 325 for the plugin 130 and an example third line330 to define an example plugin version number 335 for the plugin 130.In the illustrated example of FIG. 3, the plugin namespace 315 is astring data type that identifies an entity (“Entity1”) that provided(e.g., developed, wrote, etc.) the plugin 130. However, other namespaceidentifiers may additionally or alternatively be used. For example, theplugin namespace 315 may identify the developers of the plugin 130and/or the application that installs the plugin 130. The example pluginname 325 is a string data type that identifies a name (“AgentInstaller”)for the plugin 130. The example plugin version number 330 is a stringdata type that identifies a version number (“1.0.0”) corresponding tothe plugin 130.

In the illustrated example of FIG. 3, the example invoker identifierline 340 defines an example invoker identifier 345(“Entity1_AgentInstaller_1_0_0”) used to call the example plugin invoker134 (FIGS. 1A and/or 1B) associated with the plugin 130. In someexamples, the invoker identifier 345 corresponds to a relative pathlocation (e.g., “Entity1_AgentInstaller_1_0_0”) to store thecorresponding plugin invoker 134 at an absolute path location (e.g.,“Invokers Repository/ Entity1_AgentInstaller_1_0_0”) in the exampleinvokers repository 235.

FIG. 4 illustrates an example plugin invoker file 400 that may be usedby the example capabilities management agent 118 of FIGS. 1A, 1B and/or2 to invoke the example plugin 130 of FIGS. 1A and/or 1B. In someexamples, the plugin invoker file 400 is included in the example pluginpackage 128 provided by the application 116 of FIGS. 1A and/or 1B to thecapabilities management agent 118 of FIGS. 1A, 1B and/or 2. In someexamples, the plugin invoker file 400 may be executed by thecapabilities management agent 118 to initiate the corresponding plugin130. In the illustrated example of FIG. 4, the example plugin invokerfile 400 includes an example execution setup line 405 that identifiesone or more libraries to load for executing the plugin 130 (e.g.,PYTHON_PATH, LD_LIBRARY_PATH). The example plugin invoker file 400 alsoincludes an example language setup line 410 to load a language in whichthe plugin 130 is written (e.g., python). The example plugin invokerfile 400 also includes an example plugin calling line 415 to call theplugin 130 in a language specific manner. As described above, in someexamples, when the capabilities management agent 118 invokes the plugininvoker 134, the capabilities management agent 118 provides theargument(s) 140 and a specific output directory (e.g., the exampleresults data store 260) to store the output.

FIG. 5 illustrates an example invoke request file 500 that may beexecuted by the example capabilities management agent 118 of FIGS. 1A,1B and/or 2 to invoke a capability (e.g., functions, tasks, processes,operations, etc.). In some examples, the invoke request file 500 may beprovided by the application 116 in the example request 136. In someexamples, the example agent controller 122 provides the invoke requestfile 500 to the capabilities management agent 118 to invoke acapabilities. In the illustrated example, the invoke request file 500includes an example capability identifier section 505 and examplearguments identifier section 535.

The example capability identifier section 505 defines the capabilityidentifier 138 being invoked. For example, the example capabilityidentifier section 505 includes an example first line 510 to define anexample class including an example class namespace 515 (e.g.,“Application1”), an example class name 520 (e.g., “AppAgent”) and anexample class version number 525 (e.g., “1.0.0”). In the illustratedexample of FIG. 5, the example class namespace 515 identifies an entity(“Application1”) that provided (e.g., developed, wrote, etc.) thecapabilities included in the class. However, other namespace identifiersmay additionally or alternatively be used. For example, the classnamespace 515 may identify the developers of the capabilities and/or theplugin 130, and/or the application that installs the plugin 130. Theexample class name 520 (“AppAgent”) identifies a name for the class. Theexample class version number 525 (“1.0.0”) identifies a version numbercorresponding to the class. The example capability identifier section505 includes an example second line 530 to define example capability 531(e.g., “installRpm”) being invoked in the request.

The example arguments identifier section 535 defines the arguments 140used in executing the capability 531. The example arguments identifiersection 535 of FIG. 5 includes an example parameter name 540 (e.g.,“rpmAttachmentName”), an example parameter data type 545 (e.g.,“String”) and an example parameter value (e.g., “rpmAttachment”).

Accordingly, the example invoke request file 500 of FIG. 5 is used torequest that the capabilities management agent 118 execute an“installRpm” capability 531 that is included in the “Application1/AppAgent/ 1.0.0” class. In addition, to execute the “installRpm”capability 531, the example invoke request file 500 provides the“string” type value (“rpmAttachment”) of the “rpmAttachmentName”parameter. In other words, the example invoke request file 500 of FIG.5, when executed, installs the rpm entitled “rpmAttachment.”

FIG. 6 illustrates an example data table 600 that may be employed by theexample plugins registrar 220 of FIG. 2 to store registeredplugins-invoker mappings. For example, the example plugins registrar 220may record the plugin identifier 132 and the invoker identifier 135 inthe example plugins inventory 230. In the illustrated example of FIG. 6,the plugin identifier 132 includes an example plugin namespace, anexample plugin name and an example plugin version number. The exampledata table 600 may be utilized by the example capabilities managementagent 118 to determine the plugin invoker 134 to call to execute thecorresponding plugin 130. For example, in response to determining toexecute a particular plugin 130 to perform a capability, the examplecapabilities management agent 118 may use the registered plugins-invokermapping of the data table 600 to determine the corresponding plugininvoker to call.

The example data table 600 includes an example plugin namespaceidentifier column 605, an example plugin name identifier column 610, anexample plugin version identifier column 615 and an example plugininvoker identifier column 620. In the illustrated example, the exampleplugin identifier columns 605, 610, 615 uniquely identify the plugin130. For example, two plugins may differ in their plugin namespace,their plugin name and/or their plugin version. The example pluginnamespace identifier column 605 indicates, for example, an entity thatdeveloped the plugin 130. The example plugin name identifier column 610indicates a name of the plugin 130. The example plugin versionidentifier column 615 indicates a version number of the plugin 130. Theexample plugin invoker identifier column 620 indicates the exampleinvoker identifier 135 that is called to execute the plugin 130.However, any other columns representing any other conditions and/orcharacteristics of the plugin 130 may additionally or alternatively beused. Moreover, the example column(s) of the example data table 600 maybe implemented in any other fashion (e.g., using a different datastructure).

The example data table 600 of the illustrated example of FIG. 6 includesthree example rows 650, 655, 660 corresponding to three differentplugins registered by the example plugins registrar 220. The examplefirst row 650 indicates that version “1.0.0” of an “AgentInstaller”plugin is installed at the capabilities management agent 118 and thatthe plugin (“AgentInstaller”) is associated with an “Entity1.” Theexample first row 650 also indicates that the example capabilitiesexecutor 255 is to call the plugin invoker(“Entity1_Agent_Installer_1_0_0”) to execute the plugin identified inthe example first row 650.

The example second row 655 indicates that version “1.3.5” of a“LatencyMonitor” plugin is installed at the capabilities managementagent 118 and that the plugin (“LatencyMonitor”) is associated with an“Application2.” The example second row 655 also indicates that theexample capabilities executor 255 is to call the plugin invoker(“App2_Latency_Monitor_1_3_5”) to execute the plugin identified in theexample second row 655.

The example third row 660 indicates that version “1.0.0” of an“AgentInstaller” plugin is installed at the capabilities managementagent 118 and that the plugin (“AgentInstaller”) is associated with an“Application2.” The example third row 660 also indicates that theexample capabilities executor 255 is to call the plugin invoker(“App2_Agent_Installer_1_0_0”) to execute the plugin identified in theexample third row 660.

The example data table 600 of FIG. 6 illustrates that using the pluginnamespace may be useful in limiting naming conflicts between, forexample, unrelated developers. For example, if two developers want aplugin to install agents in different ways, the two developers may eachname the plugin “AgentInstaller” with a plugin version “1.0.0,” butthere would not be a naming conflict because each plugin(“AgentInstaller”) would reside in a different plugin namespace (e.g.,“Entity1” and “Application2”).

FIG. 7 implements an example schema of functions file 700 that may beused by the example capabilities management agent 118 of FIGS. 1A, 1Band/or 2 to determine the capabilities provided by the example plugin130 of FIGS. 1A and/or 1B. In some examples, the example schema offunctions file 700 may be included in the plugin package 128 (e.g.,provided as the example schema of functions 126) and/or generated by theexample plugin 130 in response to a request by the example pluginsmonitor 245 of FIG. 2. The example schema of functions file 700 includesa capabilities identifier that identifies the class to which thecapabilities belong, and the one or more attachment(s) needed to performthe capability.

The example schema of functions file 700 of FIG. 7 includes an examplecapabilities definition section 705 that provides the capabilityidentifier 138 and the argument(s) 140 needed to execute thecorresponding capability. The example capabilities definition section705 includes a first line 710 that defines the class to which thecapabilities in the capabilities definition section 705 belong. Forexample, in the illustrated example, the capabilities are included in aclass identified by the class namespace (“Application1”), the class name(“AgentInstaller”) and the version number (“1.0.0”).

In the illustrated example, the class identified in the example firstline 710 (e.g., “Application1/ AgentInstaller/ 1.0.0”) includes twocapabilities (e.g., example capabilities sections 715, 730). Forexample, a second example line 720 indicates the first capability name(e.g., “installRpm”) and a third example line 725 indicates theargument(s) required to execute the corresponding capability (e.g., a“string” data type value for an “rpmAttachmentName” variable). Anexample fifth example line 735 indicates the second capability (e.g.,“uninstallRpm”) and a sixth example line 740 indicates the argumentsrequired to execute the second capability (e.g., a “string” data typevalue for an “rpmName” variable).

FIG. 8 illustrates an example data table 800 that may be employed by theexample capabilities management agent 118 of FIGS. 1A, 1B and/or 2 tostore capability-plugin mappings. For example, the example pluginsmonitor 245 of FIG. 2 may record the capability identifier 138 and theplugin identifier 132 corresponding to the plugin 130 to execute thecapability. In the illustrated example of FIG. 8, the capabilityidentifiers 138 include an example class namespace, an example classname, an example class version number and an example capability name.The plugin identifiers 132 of FIG. 8 include an example pluginnamespace, an example plugin name and an example plugin version number.The example data table 800 may be utilized by the example capabilitiesmanagement agent 118 to determine the plugin 130 (e.g., based on thecorresponding plugin identifier 132) associated with the respectivecapabilities. For example, in response to identifying a capability toperform, the example capabilities management agent 118 may use thecapability-plugin mappings of the data table 800 to determine the pluginidentifier corresponding to the plugin to perform the capability.

The example data table 800 includes an example class namespaceidentifier column 805, an example class name identifier column 810, anexample class version identifier column 815, an example capabilityidentifier column 820, an example plugin namespace identifier column825, an example plugin name identifier column 830 and an example pluginversion identifier column 835. In the illustrated example, the examplecapability identifier columns 805, 810, 815, 820 uniquely provide thecapability identifier 138. In addition, the example plugin identifiercolumns 825, 830, 835 uniquely identify the plugin identifier 132.

In the illustrated example of FIG. 8, the example class namespaceidentifier column 805 and the plugin namespace identifier 825 mayidentify the developers of the capabilities and/or the plugin 130,and/or the application that installs the plugin 130. The example classname identifier column 810 identifies a name for the class. The exampleclass version identifier column 815 identifies a version numbercorresponding to the class. The example capability identifier column 820identifies the capability name. The example plugin name identifiercolumn 830 indicates the name of the plugin 130. The example pluginversion identifier column 835 indicates a version number of the plugin130. However, any other columns representing any other conditions and/orcharacteristics of the capability and/or the plugin 130 may additionallyor alternatively be used. Moreover, the example column(s) of the exampledata table 800 may be implemented in any other fashion (e.g., using adifferent data structure).

The example data table 800 of the illustrated example of FIG. 8 includesthree example rows 850, 855, 860 corresponding to three differentcapability-plugin mappings stored in the example catalog 250 of FIG. 2.The example first row 850 indicates that the “Entity1/ AppAgent/ 1.0.0/installRpm” capability maps to the “Entity1/ AgentInstaller/ 1.0.0”plugin. That is, the example first row 850 indicates that the “Entity1/AgentInstaller/ 1.0.0” plugin performs the “Entity1/ AppAgent/ 1.0.0/installRpm” capability.

The example second row 855 indicates that the “Entity1/ AppAgent/ 1.0.0/uninstallRpm” capability maps to the “Entity1/ AgentInstaller/ 1.0.0”plugin. That is, the example second row 855 indicates that the “Entity1/AgentInstaller/ 1.0.0” plugin performs the “Entity1/ AppAgent/ 1.0.0/uninstallRpm” capability.

The example third row 860 indicates that the “Application2/MonitorAgent/ 1.0.0/ SLACheck” capability maps to the “Application2/LatencyMonitor/ 1.3.5” plugin. That is, the example third row 860indicates that the “Application2/ LatencyMonitor/ 1.3.5” plugin performsthe “Application2/ MonitorAgent/ 1.0.0/ SLACheck” capability.

A flowchart representative of example machine readable instructions forimplementing the application 116 of FIGS. 1A and/or 1B is shown in FIG.9. In this example, the machine readable instructions comprise a programfor execution by a processor such as the processor 1212 shown in theexample processor platform 1200 discussed below in connection with FIG.12. The programs may be embodied in software stored on a tangiblecomputer readable storage medium such as a CD-ROM, a floppy disk, a harddrive, a digital versatile disk (DVD), a Blu-ray disk, or a memoryassociated with the processor 1212, but the entire program and/or partsthereof could alternatively be executed by a device other than theprocessor 1212 and/or embodied in firmware or dedicated hardware.Further, although the example programs are described with reference tothe flowcharts illustrated in FIG. 9, many other methods of implementingthe example application 116 may alternatively be used. For example, theorder of execution of the blocks may be changed, and/or some of theblocks described may be changed, eliminated, or combined.

FIG. 9 is a flowchart representative of example machine-readableinstructions 900 that may be executed to implement the exampleapplication 116 of FIGS. 1A and/or 1B. The example instructions 900 ofthe illustrated example of FIG. 9 begin at block 902 when theapplication 116 retrieves the catalog of capabilities 250. For example,the example agent installer 120 may request the example capabilitiesmanagement agent 118 provide the example catalog of capabilities 250.The example agent installer 120 may retrieve the catalog of capabilities250 periodically (e.g., once a minute, once an hour, etc.),aperiodically (e.g., in response to the capabilities management agent118 detecting a change in the catalog of capabilities 250) and/or as aone-time event (e.g., upon establishing connection with the capabilitiesmanagement agent 118).

At block 904, the example agent installer 120 compares the catalog ofcapabilities 250, which represents the set of capabilities available atthe capabilities management agent 118, to the example schema offunctions 126, which represents the set of capabilities performed by theapplication 116. If, at block 906, the example agent installer 120determined that the catalog of capabilities 250 does not include thefunctions included in the schema of functions 126 (e.g., that thecapabilities management agent 118 is unable to execute the capabilitiesperformed by the application 116), then, at block 908, the agentinstaller 120 provides the functionality to the capabilities managementagent 118. For example, the agent installer 120 may retrieve the exampleplugin package 128 from the example data store 124 to transmit theexample plugin package 128 to the capabilities management agent 118.

At block 910, the example application 116 determines whether to invoke acapability at the capabilities management agent 118. For example, theagent controller 122 may instruct the capabilities management agent 118to execute a monitoring operation. If, at block 910, the example agentcontroller 122 determined not to invoke a capability, control returns toblock 902 to retrieve the catalog of capabilities 250.

If, at block 910, the example agent controller 122 determined to invokea capability at the capabilities management agent 118, then, at block912, the agent controller 122 transmits a request 136 to thecapabilities management agent 118 to invoke a capability. For example,the agent controller 122 may provide the capabilities management agent118 the capability identifier 138 (e.g., a class namespace, a classname, a class version and/or a capability name) and the argument(s) 140to execute the corresponding capability. Control then returns to block902 to retrieve the catalog of capabilities 250.

Flowcharts representative of example machine readable instructions forimplementing the capabilities management agent 118 of FIGS. 1A, 1Band/or 2 are shown in FIGS. 10 and/or 11. In these examples, the machinereadable instructions comprise a program for execution by a processorsuch as the processor 1312 shown in the example processor platform 1300discussed below in connection with FIG. 13. The programs may be embodiedin software stored on a tangible computer readable storage medium suchas a CD-ROM, a floppy disk, a hard drive, a digital versatile disk(DVD), a Blu-ray disk, or a memory associated with the processor 1312,but the entire program and/or parts thereof could alternatively beexecuted by a device other than the processor 1312 and/or embodied infirmware or dedicated hardware. Further, although the example programsare described with reference to the flowcharts illustrated in FIGS. 10and/or 11, many other methods of implementing the example capabilitiesmanagement agent 118 may alternatively be used. For example, the orderof execution of the blocks may be changed, and/or some of the blocksdescribed may be changed, eliminated, or combined.

As mentioned above, the example processes of FIG. 9 and/or FIGS. 10and/or 11 may be implemented using coded instructions (e.g., computerand/or machine readable instructions) stored on a tangible computerreadable storage medium such as a hard disk drive, a flash memory, aread-only memory (ROM), a compact disk (CD), a digital versatile disk(DVD), a cache, a random-access memory (RAM) and/or any other storagedevice or storage disk in which information is stored for any duration(e.g., for extended time periods, permanently, for brief instances, fortemporarily buffering, and/or for caching of the information). As usedherein, the term tangible computer readable storage medium is expresslydefined to include any type of computer readable storage device and/orstorage disk and to exclude propagating signals and to excludetransmission media. As used herein, “tangible computer readable storagemedium” and “tangible machine readable storage medium” are usedinterchangeably. Additionally or alternatively, the example processes ofFIG. 9 and/or FIGS. 10 and/or 11 may be implemented using codedinstructions (e.g., computer and/or machine readable instructions)stored on a non-transitory computer and/or machine readable medium suchas a hard disk drive, a flash memory, a read-only memory, a compactdisk, a digital versatile disk, a cache, a random-access memory and/orany other storage device or storage disk in which information is storedfor any duration (e.g., for extended time periods, permanently, forbrief instances, for temporarily buffering, and/or for caching of theinformation). As used herein, the term non-transitory computer readablemedium is expressly defined to include any type of computer readablestorage device and/or storage disk and to exclude propagating signalsand to exclude transmission media. As used herein, when the phrase “atleast” is used as the transition term in a preamble of a claim, it isopen-ended in the same manner as the term “comprising” is open ended.“Comprising” and all other variants of “comprise” are expressly definedto be open-ended terms. “Including” and all other variants of “include”are also defined to be open-ended terms. In contrast, the term“consisting” and/or other forms of “consist” are defined to beclose-ended terms.

FIG. 10 is a flowchart representative of example machine-readableinstructions 1000 that may be executed to implement the examplecapabilities management agent 118 of FIGS. 1A, 1B and/or 2 to addcapabilities available to the example virtual machine(s) 110 in thecomputing environment 100. The example instructions 1000 of theillustrated example of FIG. 10 begin at block 1002 when the capabilitiesmanagement agent 118 receives the example plugin package 128 from theexample application 116. For example, the example communicationsinterface 205 may receive, using AMQP communications, the plugin package128 including the example plugin 130, the example plugin identifier 132and the example plugin invoker 134. At block 1004, the security engine210 attempts to validate the plugin package 128. For example, thesecurity engine 210 may utilize CMS standards to validate and decryptthe plugin package 128. If, at block 1006, the security engine 210determined it was unable to validate the plugin package 128, the exampleprogram 1000 of FIG. 10 ends. In some examples, the security engine 210may attempt to validate the plugin package 128 until a time-out event isdetected or a threshold number of incorrect attempts is satisfied.

If, at block 1006, the security engine 210 was able to validate theplugin package 128, then, at block 1008, the example package unpacker215 unpacks the plugin package 128. For example, the package unpacker215 may execute an install script included in the plugin package 128 bythe application 116. At block 1010, the example plugin registrar 220registers the plugin 130. For example, the plugin registrar 220 maystore the plugin 130 in the example plugins repository 225 and theexample plugin invoker 134 in the example invokers repository 235. Theexample plugin registrar 220 also logs the plugin identifier 132 and thecorresponding invoker identifier 135 in the example plugins inventory230.

At block 1012, the example plugins monitor 245 retrieves the exampleschema of functions 126 from the plugin 130. For example, in response todetecting a change in the plugins inventory 235, the plugins monitor 245may query the plugin 130 for the schema of functions 126 (e.g., bycalling the plugin invoker 134). At block 1014, the example pluginsmonitor 245 updates the example catalog of capabilities 250 to includethe returned set of functions (e.g., the functions included in theschema of functions 126). In some examples, the plugin 130 records theschema of functions 126 in the catalog of capabilities 250. At block1016, the example plugins monitor 245 determines whether to publish theupdated catalog of capabilities 250. For example, the capabilitiesmanagement agent 118 may provide the catalog of capabilities 250 to theapplication(s) 116 when the plugins monitor 245 detects a change in thecatalog of capabilities 250. If, at block 1016, the example pluginsmonitor 245 determined not to publish the updated catalog ofcapabilities 250, the example program 1000 of FIG. 10 ends.

If, at block 1016, the example plugins monitor 245 determined to publishthe updated catalog of capabilities 250, then at block 1018, the examplesecurity engine 210 encrypts a message including the updated catalog ofcapabilities 250 for transmitting to the example application(s) 116. Forexample, the security engine 210 may encrypt the message using the CMSstandard for protecting messages. At block 1020, the examplecapabilities management agent 118 transmits the encrypted message. Forexample, the example communications interface 205 may transmit theencrypted message to the application(s) 116 using AMQP communications.The example program 1000 of FIG. 10 ends.

FIG. 11 is a flowchart representative of example machine-readableinstructions 1100 that may be executed to implement the examplecapabilities management agent 118 of FIGS. 1A, 1B and/or 2 to execute acapability available to the example virtual machine(s) 110 in thecomputing environment 100. The example instructions 1100 of theillustrated example of FIG. 11 begin at block 1102 when the capabilitiesmanagement agent 118 receives the example request 136 from theapplication 116. For example, the example communications interface 205may receive, using AMQP communications, the request including theexample capability identifier 138 and the example argument(s) 140. Atblock 1104, the security engine 210 attempts to validate the request136. For example, the security engine 210 may utilize CMS standards tovalidate and decrypt the request. If, at block 1106, the security engine210 determined it was unable to validate the request 136, the exampleprogram 1100 of FIG. 11 ends. In some examples, the security engine 210may attempt to validate the request 136 until a time-out event isdetected or a threshold number of incorrect attempts is satisfied.

If, at block 1106, the security engine 210 was able to validate therequest 136, then, at block 1108, the example capabilities executor 225identifies the capability in the catalog of capabilities 250. Forexample, the capabilities executor 225 may parse the example catalog ofcapabilities 250 using the capability identifier 138 included in therequest 136. At block 1110, the example capabilities executor 225determines the plugin 130 to execute the capability. For example, thecapabilities executor 225 may map the capability identifier 138 to aplugin identifier 132.

At block 1112, the example capabilities executor 225 determines theplugin invoker 134 to call to execute the plugin 130. For example, thecapabilities executor 225 may use the example plugins inventory 230 tomap the plugin identifier 132 to a corresponding invoker identifier 135.At block 1114, the example capabilities executor 225 calls the plugininvoker 134 to execute the capability. For example, the capabilitiesexecutor 225 may include the capability identifier 138 and theargument(s) 140 in the call to the plugin invoker 134 to execute thecapability. In some examples, the capabilities executor 225 may includea location in the example results data store 260 to store the output ofexecuting the capability. The example program 1100 of FIG. 11 then ends.

FIG. 12 is a block diagram of an example processor platform 1200 capableof executing the instructions of FIG. 9 to implement the application 116of FIGS. 1A and/or 1B. The processor platform 1200 can be, for example,a server, a personal computer, or any other type of computing device.

The processor platform 1200 of the illustrated example includes aprocessor 1212. The processor 1212 of the illustrated example ishardware. For example, the processor 1212 can be implemented by one ormore integrated circuits, logic circuits, microprocessors or controllersfrom any desired family or manufacturer.

The processor 1212 of the illustrated example includes a local memory1213 (e.g., a cache). The processor 1212 of the illustrated exampleexecutes the instructions to implement the example agent installer 120and the example agent controller 122. The processor 1212 of theillustrated example is in communication with a main memory including avolatile memory 1214 and a non-volatile memory 1216 via a bus 1218. Thevolatile memory 1214 may be implemented by Synchronous Dynamic RandomAccess Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUSDynamic Random Access Memory (RDRAM) and/or any other type of randomaccess memory device. The non-volatile memory 1216 may be implemented byflash memory and/or any other desired type of memory device. Access tothe main memory 1214, 1216 is controlled by a memory controller.

The processor platform 1200 of the illustrated example also includes aninterface circuit 1220. The interface circuit 1220 may be implemented byany type of interface standard, such as an Ethernet interface, auniversal serial bus (USB), and/or a PCI express interface.

In the illustrated example, one or more input devices 1222 are connectedto the interface circuit 1220. The input device(s) 1222 permit(s) a userto enter data and commands into the processor 1212. The input device(s)can be implemented by, for example, an audio sensor, a microphone, acamera (still or video), a keyboard, a button, a mouse, a touchscreen, atrack-pad, a trackball, isopoint and/or a voice recognition system.

One or more output devices 1224 are also connected to the interfacecircuit 1220 of the illustrated example. The output devices 1224 can beimplemented, for example, by display devices (e.g., a light emittingdiode (LED), an organic light emitting diode (OLED), a liquid crystaldisplay, a cathode ray tube display (CRT), a touchscreen, a tactileoutput device, a printer and/or speakers). The interface circuit 1220 ofthe illustrated example, thus, typically includes a graphics drivercard, a graphics driver chip or a graphics driver processor.

The interface circuit 1220 of the illustrated example also includes acommunication device such as a transmitter, a receiver, a transceiver, amodem and/or network interface card to facilitate exchange of data withexternal machines (e.g., computing devices of any kind) via a network1226 (e.g., an Ethernet connection, a digital subscriber line (DSL), atelephone line, coaxial cable, a cellular telephone system, etc.).

The processor platform 1200 of the illustrated example also includes oneor more mass storage devices 1228 for storing software and/or data.Examples of such mass storage devices 1228 include floppy disk drives,hard drive disks, compact disk drives, Blu-ray disk drives, RAIDsystems, and digital versatile disk (DVD) drives. The example massstorage 1228 implements the example data store 124.

The coded instructions 1232 of FIG. 9 may be stored in the mass storagedevice 1228, in the volatile memory 1214, in the non-volatile memory1216, and/or on a removable tangible computer readable storage mediumsuch as a CD or DVD.

FIG. 13 is a block diagram of an example processor platform 1300 capableof executing the instructions of FIGS. 10 and/or 11 to implement theexample capabilities management agent 118 of FIGS. 1A, 1B and/or 2. Theprocessor platform 1300 can be, for example, a server, a personalcomputer, or any other type of computing device.

The processor platform 1300 of the illustrated example includes aprocessor 1312. The processor 1312 of the illustrated example ishardware. For example, the processor 1312 can be implemented by one ormore integrated circuits, logic circuits, microprocessors or controllersfrom any desired family or manufacturer.

The processor 1312 of the illustrated example includes a local memory1313 (e.g., a cache). The processor 1312 of the illustrated exampleexecutes the instructions to implement the example messaging interface205, the example security engine 210, the example package unpacker 215,the example plugins registrar 220, the example plugins monitor 245 andthe example capabilities executor 255.

The processor 1312 of the illustrated example is in communication with amain memory including a volatile memory 1314 and a non-volatile memory1316 via a bus 1318. The volatile memory 1314 may be implemented bySynchronous Dynamic Random Access Memory (SDRAM), Dynamic Random AccessMemory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or anyother type of random access memory device. The non-volatile memory 1316may be implemented by flash memory and/or any other desired type ofmemory device. Access to the main memory 1314, 1316 is controlled by amemory controller.

The processor platform 1300 of the illustrated example also includes aninterface circuit 1320. The interface circuit 1320 may be implemented byany type of interface standard, such as an Ethernet interface, auniversal serial bus (USB), and/or a PCI express interface.

In the illustrated example, one or more input devices 1322 are connectedto the interface circuit 1320. The input device(s) 1322 permit(s) a userto enter data and commands into the processor 1312. The input device(s)can be implemented by, for example, an audio sensor, a microphone, acamera (still or video), a keyboard, a button, a mouse, a touchscreen, atrack-pad, a trackball, isopoint and/or a voice recognition system.

One or more output devices 1324 are also connected to the interfacecircuit 1320 of the illustrated example. The output devices 1324 can beimplemented, for example, by display devices (e.g., a light emittingdiode (LED), an organic light emitting diode (OLED), a liquid crystaldisplay, a cathode ray tube display (CRT), a touchscreen, a tactileoutput device, a printer and/or speakers). The interface circuit 1320 ofthe illustrated example, thus, typically includes a graphics drivercard, a graphics driver chip or a graphics driver processor.

The interface circuit 1320 of the illustrated example also includes acommunication device such as a transmitter, a receiver, a transceiver, amodem and/or network interface card to facilitate exchange of data withexternal machines (e.g., computing devices of any kind) via a network1326 (e.g., an Ethernet connection, a digital subscriber line (DSL), atelephone line, coaxial cable, a cellular telephone system, etc.).

The processor platform 1300 of the illustrated example also includes oneor more mass storage devices 1328 for storing software and/or data.Examples of such mass storage devices 1328 include floppy disk drives,hard drive disks, compact disk drives, Blu-ray disk drives, RAIDsystems, and digital versatile disk (DVD) drives. The example massstorage 1328 implements the example plugins repository 225, the exampleplugins inventory 230, the example invokers repository 235, the examplecatalog 250 and the example results data store 260.

The coded instructions 1332 of FIGS. 10 and/or 11 may be stored in themass storage device 1328, in the volatile memory 1314, in thenon-volatile memory 1316, and/or on a removable tangible computerreadable storage medium such as a CD or DVD.

From the foregoing, it will be appreciated that the above disclosedmethods, apparatus and articles of manufacture provide a common agentsframework for managing capabilities available at assets in computingenvironments.

The disclosed methods, apparatus and articles of manufacture facilitatemaintaining a catalog of capabilities available at an asset. Forexample, a capabilities management agent installed at the asset maydetermine tasks that may be performed at the asset based on plugin(s)loaded at the asset. In addition, the disclosed methods, apparatus andarticles of manufacture update the catalog of capabilities when a newplugin is added or detected. For example, the example capabilitiesmanagement agent may retrieve a set of capabilities that may beperformed by the new plugin. In some examples, the disclosed methods,apparatus and articles of manufacture reduce computing resources bymaintaining a catalog of capabilities at the respective assets in thecomputing environment, which enables reducing the number of pluginsinstalled at the assets, and reducing the number of plugins performingredundant capabilities at the assets. In some examples, the disclosedmethods apparatus and articles of manufacture reduce usage of computingresources by utilizing standard formats for providing the catalog ofcapabilities and for storing the output of performing the respectivecapabilities, which facilitates different applications accessing theresults rather than re-executing the capabilities. In some examples, thedisclosed methods apparatus and articles of manufacture reduce usage ofcomputing resources by enabling plugins to utilize plugin invokers,which facilitates support of plugins written in a variety of languages.

Furthermore, the example common agent framework disclosed herein isextensible. As described above, the example common agent frameworkdisclosed herein includes a communication interface, a management agentand one or more plugins installed at an asset. The communicationinterface can be extended to use a Rabbit AMQP Broker, a ZeroMQ(socket-based) communications, REST, etc. The management agentfacilitates extending by supporting additional scripts, libraries,decompression tools, etc. In addition, the management agent can supportnew plugins, thereby increasing the capabilities available forperforming at the asset, but also conserving resources allocated to theasset by not installing redundant capabilities.

Although certain example methods, apparatus and articles of manufacturehave been disclosed herein, the scope of coverage of this patent is notlimited thereto. On the contrary, this patent covers all methods,apparatus and articles of manufacture fairly falling within the scope ofthe claims of this patent.

1. (canceled)
 2. An apparatus comprising: memory including computerexecutable instructions; at least one processor to execute the computerexecutable instructions to: in response to a request from avirtualization asset management application, determine whether acapability identified in a list of capabilities of a virtualizationasset management application is installed at a virtualization assetbased on a catalog of capabilities available to the virtualizationasset, the catalog of capabilities available to the virtualization assetbased on plugins installed at the virtualization asset; when thecapability is not installed at the virtualization asset, install thecapability at the virtualization asset; and responsive to a request toperform the capability, record an output from performing the capability.3. The apparatus of claim 2, wherein the processor is further to executethe computer executable instructions to maintain the catalog ofcapabilities by: retrieving a set of capabilities provided by the one ormore of the plugins; and updating the catalog of capabilities to includethe set of capabilities by: logging the set of capabilities in thecatalog of capabilities; logging arguments needed to executecorresponding ones of the capabilities; and mapping the capabilities tocorresponding ones of the plugins.
 4. The apparatus of claim 2, whereinthe virtualization asset is to execute in a first container, the firstcontainer to operate on top of a host operating system without the needfor a hypervisor.
 5. The apparatus of claim 4, wherein the applicationis a first application, and the first container is to isolate thevirtualization asset from a second application in a second container,the second container to operate on top of the host operating system. 6.The apparatus of claim 2, wherein the first container does notinstantiate its own operating system.
 7. The apparatus of claim 2,wherein the application is a first application and the output isaccessible by a second application.
 8. The apparatus of claim 2, whereinthe capabilities include at least one of a function, task, process andoperation.
 9. A method to reduce computer resource usage, the methodcomprising: in response to a request from a virtualization assetmanagement application, determining whether a capability identified in alist of capabilities of the virtualization asset management applicationis installed at a virtualization asset based on a catalog ofcapabilities available to the virtualization asset based on pluginsinstalled at the virtualization asset; in response to determining thecapability is not installed at the virtualization asset, installing, byexecuting an instruction with the processor, the capability at thevirtualization asset; and responsive to a request to perform thecapability, recording, by executing an instruction with the processor,an output generated by performing the capability.
 10. A method asdefined in claim 9, further including: registering a plugin in aninventory of plugins; retrieving capabilities provided by the plugin;and updating the catalog of capabilities to include at least one of thecapabilities by: adding at least one of the capabilities to the catalog;logging an argument needed to execute the at least one of thecapabilities; and mapping the at least one of the capabilities to theplugin.
 11. The method of claim 9, wherein the virtualization asset isto execute in a first container, the first container to operate on topof a host operating system without the need for a hypervisor.
 12. Themethod of claim 11, wherein the application is a first application andthe first container is to isolate the virtualization asset from a secondapplication in a second container, the second container to operate ontop of the host operating system.
 13. The method of claim 9, wherein thefirst container does not instantiate its own operating system.
 14. Themethod of claim 9, wherein the application is a first application andthe output is accessible by a second application.
 15. A tangiblecomputer readable storage medium comprising instructions that, whenexecuted, cause a machine to at least: in response to a request from avirtualization asset management application, determine whether acapability identified in a list of capabilities of a virtualizationasset management application is installed at a virtualization assetbased on a catalog of capabilities available to the virtualizationasset, the catalog of capabilities available to the virtualization assetbased on plugins installed at the virtualization asset; when thecapability is not installed at the virtualization asset, install thecapability at the virtualization asset; and responsive to a request toperform the capability, record an output generated by performing thecapability.
 16. The tangible computer readable storage medium of claim15, wherein the instructions, when executed, further cause the machineto: retrieve a set of capabilities provided by the one or more of theplugins; and update the catalog of capabilities to include the set ofcapabilities by: logging the set of capabilities in the catalog ofcapabilities; logging arguments needed to execute corresponding ones ofthe capabilities; and mapping the capabilities to corresponding ones ofthe plugins.
 17. The tangible computer readable storage medium of claim15, wherein the virtualization asset is to execute in a first container,the first container to operate on top of a host operating system withoutthe need for a hypervisor.
 18. The tangible computer readable storagemedium of claim 17, wherein the application is a first application, andthe first container is to isolate the virtualization asset from a secondapplication in a second container, the second container to operate ontop of the host operating system.
 19. The tangible computer readablestorage medium of claim 15, wherein the first container does notinstantiate its own operating system.
 20. The tangible computer readablestorage medium of claim 15, wherein the application is a firstapplication and the output is accessible by a second application. 21.The tangible computer readable storage medium of claim 15, wherein thecapabilities include at least one of a function, task, process andoperation.