摘要:
The present invention makes it possible to analyze a problem spanning multiple domains. A management apparatus stores an analysis rule. The analysis rule defines a relationship between a causal event, which constitutes a cause of a problem, and multiple relevant events, which denote problems created by the causal event. A first management apparatus acquires a relevant event related to a prescribed node apparatus, which is not under management of the first management apparatus, from a second management apparatus, which manages the prescribed node apparatus. The first management apparatus analyzes a problem by applying the relevant event acquired from the second management apparatus and another relevant event related to a node apparatus under the management of the first management apparatus to the analysis rule.
摘要:
An object of the present invention is to create information for use in problem analysis only for a required event in a case where an event denoting a change in the configuration of a computer system has been detected. A management apparatus detects a configuration change of the computer system as an event and records this event in an event management table T30. The management apparatus holds an event propagation model for analyzing a problem, and records an event corresponding to the event propagation model in target event management information T34. The management apparatus executes a problem analysis process in a case where a detected event is registered in the target event management information.
摘要:
To provide a fault analysis result classification function capable of reducing the time required to eliminate a fault in a monitoring target apparatus. The fault analysis results (fault cause candidates) obtained during the fault analysis processing are classified for the influence range of each of the fault cause candidates by analyzing which of the other fault cause candidates relate to the fault events of the apparatus abnormal state, which are used as the basis to derive the each of the fault cause candidates. Further, the classification results are displayed on a GUI.
摘要:
A communication network system has a plurality of interconnected sub-networks, at least one mobile node having a care-of address dependent on a sub-network currently connected thereto and a home address independent of the connected sub-network, and a home agent. Upon detection of a sub-network connected to the mobile node, the latter determines a security method corresponding to the sub-network held in a node-side security application management table as a security method for ensuring the security for user data communicated between the mobile node and a home agent associated therewith. Then, the sub-network is notified to the home agent through a mobile node network signal. The home agent determines a security method corresponding to the sub-network from among security methods held in an agent-side security application management table as a security method used for ensuring the security for user data communicated between the home agent and the mobile node managed thereby.
摘要:
An active user support system includes a communication apparatus, shop system, support center system, and communication line. In the support center system, an address registration reception apparatus acquires the identification information of the communication apparatus when it is newly connected to the communication line. An address information storage apparatus stores the identification information. A customer/purchase information reception apparatus receives the customer information and purchase information transmitted from the shop system. A customer/purchase information storage apparatus stores the received customer information and purchase information. An extraction apparatus specifies, as a device to be supported, a communication apparatus for which a predetermined period has elapsed from the purchase date/time and whose identification information is not stored and extracts information about the specified communication apparatus from the customer/purchase information storage apparatus.
摘要:
In a configuration where a virtual storage array is formed in a physical storage array, if a physical storage administrator acquires a lock for all the physical storage arrays during update of information of multiple physical storage arrays, not only all the physical storage arrays but also all the virtual storage arrays formed therein cannot be manipulated while information update is executed. According to the present invention, when a virtual storage administrator executes change of configuration of the virtual storage array while the physical storage administrator is performing information update of all multiple physical storage arrays and management operation from the virtual storage administrator is not prohibited, the information of the changed configuration is stored in a temporary area of a configuration information database, and at the last of information update, the information of the temporary area is reflected to a normal area of the configuration information database.
摘要:
A communication network system has a plurality of interconnected sub-networks, at least one mobile node having a care-of address dependent on a sub-network currently connected thereto and a home address independent of the connected sub-network, and a home agent. Upon detection of a sub-network connected to the mobile node, the latter determines a security method corresponding to the sub-network held in a node-side security application management table as a security method for ensuring the security for user data communicated between the mobile node and a home agent associated therewith. Then, the sub-network is notified to the home agent through a mobile node network signal. The home agent determines a security method corresponding to the sub-network from among security methods held in an agent-side security application management table as a security method used for ensuring the security for user data communicated between the home agent and the mobile node managed thereby.
摘要:
A management system manages a computer system including multiple monitoring-target devices. A storage device of the management system stores a general rule, general plan information, unresolved information, and configuration information. A control device of the management system creates multiple expanded rules based on the general rule and the configuration information, and if an event related to any of the multiple monitoring-target devices has occurred, identifies, based on the multiple expanded rules, a first conclusion event constituting a candidate for the cause of the occurred event, creates, based on the general plan information, one or more expanded plans, which are recovery plans that can be implemented if the first conclusion event is a cause, identifies an unresolved event based on the unresolved information, identifies a risk site based on the identified unresolved event, and displays data showing the first conclusion event, expanded plan, and risk site.