Systems and methods for efficient transfer of log data

    公开(公告)号:US11734012B2

    公开(公告)日:2023-08-22

    申请号:US17301377

    申请日:2021-03-31

    摘要: According to one general aspect, a non-transitory computer readable medium includes instructions that, when executed by at least one processor, cause a computing device to read a string of a log file for an application, where the log file comprises multiple strings of log data, compare the string to signatures stored in a memory to find a matching signature, where each of the signatures is encoded with a signature identifier (ID), determine a deviation between the string and the matching signature, encode the string with the signature identifier (ID) of the matching signature and the deviation, and transfer the string to a destination computing device using the signature identifier (ID) of the matching signature, the deviation, and a timestamp of the string.

    Behavioral analytics in information technology infrasturcture incident management systems

    公开(公告)号:US11657063B2

    公开(公告)日:2023-05-23

    申请号:US15476694

    申请日:2017-03-31

    摘要: A computer system for behavioral analytics of native Information Technology Service Management (ITSM) incident handling data includes a processor, a memory, a de-normalized target data source for behavioral analysis, a transformation processor, and a statistical processor. The transformation processor reads an identified portion of the ITSM data and creates new normalized fields for the de-normalized target data source by parsing selected text fields from the portion of ITSM data. The created new normalized fields include a working group field and an associated support level field. The transformation processor further creates new de-normalized aggregation fields for the incipient de-normalized target data source based on the newly created normalized fields. The newly created de-normalized aggregation fields include fields characterizing incident handling behavior. A statistical processor further processes target data for behavioral analytics. The transformation processor populates the target data source's de-normalized data fields with aggregated incident handling data and behavioral characterizations.

    Using an event graph schema for root cause identification and event classification in system monitoring

    公开(公告)号:US11640329B2

    公开(公告)日:2023-05-02

    申请号:US17444102

    申请日:2021-07-30

    摘要: An event graph schema for a technology landscape may be determined, where the technology landscape is characterized using scores assigned to performance metrics. The event graph schema may include a plurality of nodes corresponding to the performance metrics and the scores, and directional edges connecting node pairs of the plurality of nodes, with each directional edge having a score-dependent validity criteria defined by scores of a corresponding node pair. Anomalous scores associated with an event within the technology landscape may be used to find anomalous nodes. Valid edges connecting two of the anomalous nodes and satisfying the score-dependent validity criteria thereof may be used to determine at least one path that includes the valid edges and connected anomalous nodes. In this way, it is possible to traverse the at least one path to identify at least one of the connected anomalous nodes as a root cause node of the event.

    SYSTEMS AND METHODS FOR INFORMATION MANAGEMENT SYSTEM TRANSACTION SCHEDULING AS WAIT-FOR-INPUT OR PSEUDO-WAIT-FOR-INPUT

    公开(公告)号:US20230127920A1

    公开(公告)日:2023-04-27

    申请号:US17452398

    申请日:2021-10-26

    摘要: Systems and techniques for scheduling transactions as wait-for-input (WFI) or regions as pseudo-wait-for-input (P-WFI) include receiving a transaction report. The transactions from the transaction report are filtered using the plurality of metrics to generate a list of eligible WFI transactions or regions for running as P-WFI. The list of eligible WFI transactions or regions for running as P-WFI is filtered by applying a first system benchmark that is based on a total number of executed transactions to generate a list of top-eligible WFI transactions or regions for running as P-WFI. A total number of dedicated processing regions are calculated for each of the transactions on the list of top-eligible WFI transactions or regions for running as P-WFI. A scheduling report with a final list of top transactions eligible for scheduling as WFI or regions for running as P-WFI is generated based on the total number of dedicated processing regions.

    INDEX GENERATION AND USE WITH INDETERMINATE INGESTION PATTERNS

    公开(公告)号:US20230062227A1

    公开(公告)日:2023-03-02

    申请号:US17446600

    申请日:2021-08-31

    摘要: Described systems and techniques enable the intake of large numbers of files having widely varying structures and formats, as well as generation of dynamic slot indexes that enable fast and reliable searching of the files. Unique data patterns within the files are used to generate unique pattern models, which enable model-specific mappings of file fields to slots of a dynamic slot index. Accordingly, the dynamic slot indexes may reuse a single slot for multiple fields. Complex queries may then be processed in a time-efficient and resource-efficient manner, even when rapidly ingesting huge numbers of files having indeterminate data patterns from many different sources.

    ITERATIVE PERFORMANCE ANALYSIS WITH INTERVAL EXPANSION

    公开(公告)号:US20220398238A1

    公开(公告)日:2022-12-15

    申请号:US17304015

    申请日:2021-06-11

    发明人: Michael D. Behne

    摘要: Performance data characterizing operations of an application may be collected by time interval, and a plurality of keys may be associated with each element of the performance data. A first time interval may be received. An iterative group-and-filter search may be executed against the keyed elements within the first time interval, each iteration including an iteration key used to perform a key-based grouping operation followed by a group-based filter operation, wherein each iteration key is added to a composite key at each iteration. A selection of at least one keyed element within the first time interval and obtained from the iterative group-and-filter search may be received. A second time interval that precedes the first time interval may be received, and the keyed elements may be filtered using the composite key and within the second time interval to return the at least one keyed element within the second time interval.

    SYSTEMS AND METHODS FOR EFFICIENT TRANSFER OF LOG DATA

    公开(公告)号:US20220318019A1

    公开(公告)日:2022-10-06

    申请号:US17301377

    申请日:2021-03-31

    摘要: According to one general aspect, a non-transitory computer readable medium includes instructions that, when executed by at least one processor, cause a computing device to read a string of a log file for an application, where the log file comprises multiple strings of log data, compare the string to signatures stored in a memory to find a matching signature, where each of the signatures is encoded with a signature identifier (ID), determine a deviation between the string and the matching signature, encode the string with the signature identifier (ID) of the matching signature and the deviation, and transfer the string to a destination computing device using the signature identifier (ID) of the matching signature, the deviation, and a timestamp of the string.

    System and method for building business service model

    公开(公告)号:US11386077B2

    公开(公告)日:2022-07-12

    申请号:US15915754

    申请日:2018-03-08

    摘要: A modeling system has a database that: stores information of resources of a computer network service. A server f has a graphical user interface application for creating and editing service models. The application receives user-entered search criteria and searches information in the database based on the criteria. The search criteria can include a name, type, attribute, and other information of the resources. In addition, the search criteria can be a user-entered search query entered that has one or more logical or Boolean conditions relating resource attributes to attribute values. Using information obtained through searching, the application is used to create at least a portion of a service model of the computer network service. Once created, the application is used to initiate publishing of at least a portion of the service model to one or more impact managers of the computer network service.

    Graph expansion mini-view
    19.
    发明授权

    公开(公告)号:US11132820B2

    公开(公告)日:2021-09-28

    申请号:US16680083

    申请日:2019-11-11

    发明人: Ricky Poston

    摘要: A graphical representation of a service model provides a full view of a portion of the graphical representation. A sub graph view may be displayed for nodes of the graphical representation of the service model that are associated with a selected node, including nodes that may not be visible in the full view. The sub graph view may be interactive, providing additional information regarding the nodes displayed in the sub graph view, and allowing making nodes in the sub graph view visible or invisible in the full view. Information may be displayed in the sub graph view about the status of the components being modeled by the service model corresponding to nodes displayed in the sub graph view.

    Bi-directional communication between change management tool and implementation tools

    公开(公告)号:US11132192B2

    公开(公告)日:2021-09-28

    申请号:US14872869

    申请日:2015-10-01

    IPC分类号: G06F9/44 G06F8/71 G06F8/70

    摘要: Task implementation tools are registered to interface with a change management tool. The change management tool configures a plurality of tasks to implement a change to an information technology infrastructure's configuration, and sends a plurality of task instructions to the plurality of task implementation tools for performing the plurality of tasks. Each task instruction is directed to a targeted task implementation tool for performing a particular task and includes task-related information for the targeted implementation tool to perform the particular task. Registering the plurality of task implementation tools to interface with the change management tool includes registering each the plurality of task implementation tools to accept the task instruction for the particular task directed to it from the change management tool, to know what to do with the task instruction and to know how to respond to the task instruction.