摘要:
A system includes a windowing module that divides time series data for each metric into portions. Each portion corresponds to a respective window of time. A hash module calculates a hash value for each of the portions for each of the metrics. An identification module compares the hash values for each pair of metrics and, for a selected pair of metrics, counts how many windows of time in which the hash values of the selected pair of metrics are equal. A pair is identified as a candidate pair in response to the count exceeding a threshold. A metric graph module creates a first edge in a graph based on the candidate pair of metrics. Each of the metrics is a node in the graph and direct relationships between each pair of the metrics are edges in the graph. An anomaly combination module analyzes an anomaly condition based on the graph.
摘要:
Systems and methods for generating a fingerprint including multiple tracking identifiers. Control circuitry receives a first tracking identifier from a first component of a network. The first tracking identifier is associated with a data request sent to the first component. The control circuitry identifies parameters based on a configuration of the first component. The control circuitry transmits an application programming interface (API) request for information related to the parameters from the first component. The control circuitry receives information related to the parameters for the first component in response to the API request. The control circuitry determines a second tracking identifier based on the first tracking identifier and the information related to the parameters for the first component. The control circuitry transmits the second tracking identifier to the first component. The first tracking identifier and the second tracking identifier are combined to generate a fingerprint in connection with the data request.
摘要:
An image forming apparatus transmits a log thereof relating to a status detected thereby to a log collection server, and sets a storage period of each transmitted log in the log collection server. The image forming apparatus acquires a total amount of logs thereof stored in the log collection server and a storage period of each log from the log collection server, and deletes the log thereof stored in the log collection server based on the storage period of each log before transmitting a log if a sum total including the total amount and a total amount of logs to be transmitted reaches an upper limit.
摘要:
Database change test system that includes an SQL performance analyzer (SPA) to efficiently test execute workload set of queries on a production or test database management system (DBMS) and report to a user the impact of database changes, is provided. Techniques are described that limit the resource consumption of test execution of workload set of queries, especially to enable such test execution on a production DBMS. A method and apparatus for storing in persistent storage query test profile that specifies query test restrictions and execution plan parameters, which indicate how to generate execution plan operators for query execution plans; storing a workload set of queries in persistent storage; establishing a session with a database management systems; retrieving the query test profile; configuring the session according to the test profile; receiving user input requesting to execute the workload set; and executing the queries according to the query test profile, is also provided.
摘要:
In a system that provides network-based computer infrastructure services, a monitoring agent is installed on a computer to gather and report operational metrics from various sources, which may include infrastructure support services as well as elements of the computer itself. Metrics to be gathered and reported by the monitoring agent, as well as the format in which metrics are to be reported, are specified declaratively so that they can be changed without altering the procedural aspects of the monitoring agent.
摘要:
Methods and apparatus for an account state simulation service for cloud computing environments are disclosed. A system includes a plurality of service managers coordinating respective distributed network-accessible services, and a metadata manager. The metadata manager receives an account state change simulation request, indicating (a) an initial account state of a client account and (b) a collection of operations to be simulated. The metadata manager generates a response to the account change state simulation request, comprising at least one of (a) a representation of an expected end state of the client account reachable as a result of performing the collection of operations (b) an indication of an expected failure of a particular operation of the collection of operations or (c) an estimate of an expected billing amount associated with an implementation of the collection of operations.
摘要:
An improved technique for communicating with components of an electronic system includes operating a driver according to a designated protocol but agnostically to the components themselves. Information about particular system components is supplied to the driver by respective data sources. To obtain discovery information about a component, the driver accesses a data source for the component and communicates with the component using the designated protocol. The driver thus operates merely as a conduit for component-specific information, which is supplied by the data sources rather than by the driver itself.
摘要:
Embodiments of the present invention provide an approach for an image provider to specify data (e.g., commands to run, files to read), etc., about an image of a virtual resource (e.g., virtual machine, etc.) in a networked computing environment (e.g., a cloud computing environment). Such data may be used (e.g., at runtime) by a client application to obtain specific information about a running instance that is provisioned based on the image (e.g., operating system health, middleware health, etc.).
摘要:
In a method for determining information about a computing system, a designated process in the computing system is monitored. A determination whether a selected event has occurred in the designated process is made. State information and configuration information regarding the computing device is collected in response to a determination that the selected event has occurred. Meta information associated with the designated process is determined in response to a determination that the selected event has occurred. The state information, the configuration information and the meta information is recorded in an accessible file.
摘要:
A method begins by a dispersed storage (DS) processing module collecting an event record, a record regarding processing of an event request, and a plurality of records regarding processing of a plurality of sub-event requests to produce a collection of records. The event record includes information regarding an event, wherein the event is a user access operation or a system administrative operation initiated by a device affiliated with the DSN. The record regarding processing of the event request includes information regarding a dispersed storage (DS) processing module of the DSN processing the event request to produce the plurality of sub-event requests. The plurality of records regarding processing of the plurality of sub-event requests includes information regarding a plurality of DS units of the DSN processing the plurality of sub-event requests. The method continues with the DS processing module evaluating the collection of records to produce performance information regarding the DSN.