摘要:
A system and method for managing dynamically allocated resources assigned to a service includes providing a service to be used by a plurality of sites in a federation. Usage information associated with the service is communicated to each of the plurality of sites. A disposition of the service is determined based on local policies and the usage information received from other sites by a service owner. The disposition of the service is updated across a plurality of sites in accordance with messages sent by the service owner to reduce resource usage.
摘要:
Identity context-based access control is implemented by generating an identity context expression from user identity data. In particular, users are clustered based on combinations of one or more attributes. These clusters comprise one or more identity context(s). Preferably, an intersection of attribute sets of each user in the cluster is formed. In addition, an intersection of attribute sets of each user not in the cluster also is formed. If the attribute set that is common across the cluster of users is not a subset of the attribute set that is common across the rest of the users, then the attribute set forms a unique identity context expression. To reduce the number of roles used in role-based access control (RBAC), at least one role is replaced with an identity context expression. Run-time access control is then enabled.
摘要:
A method of identifying at least one resource in a distributed computing system which is a potential root cause of performance degradation of the system includes the steps of: computing operational bounds for the system and operational bounds for at least one resource in the system; comparing current end-to-end system performance with the operational bounds for the system; when the current end-to-end system performance is outside of the operational bounds for the system, comparing current performance of the at least one resource in the system with the operational bounds for the at least one resource; and generating at least one output identifying the at least one resource in the system which is a potential root cause of performance degradation of the system.
摘要:
Techniques are disclosed for providing mapping of application components to a set of resources in a distributed environment using capacity driven provisioning using a layered approach. By way of example, a method for allocating resources to an application comprises the following steps. A first data structure is obtained representing a post order traversal of a dependency graph for the application and associated containers with capacity requirements. A second data structure is obtained representing a set of resources, and associated with each resource is a tuple representing available capacity. A mapping of the dependency graph data structure to the resource set is generated based on the available capacity such that resources of the set of resources are allocated to the application.
摘要:
Techniques for visualizing monitoring data are provided. The techniques include generating at least one context from the monitoring data based on a user-provided schema definition, mapping the data from a high dimensional space to a lower dimensional subspace using a topology preserving mapping, organizing the mapped data into a three-dimensional space to allow dynamic selection of a context resolution level across a hierarchy of the at least one context, using the mapped data to identify at least one trend in the data, wherein identifying the at least one trend comprises observing one or more changes over time in one or more activation patterns for each of the at least one context, and visualizing the at least one quantified trend in the data.
摘要:
A problem determination system and method reduces the time and effort required by system administrators to trouble shot transaction processing difficulties in a large distributed I/T environment by monitoring system component performance and computing operational performance threshold limits based on dependency graphs for the system. Using this data, a prioritized list of suspect components for the I/T system is generated.
摘要:
A problem determination system and method reduces the time and effort required by system administrators to trouble shot transaction processing difficulties in a large distributed I/T environment by monitoring system component performance and computing operational performance threshold limits based on dependency graphs for the system. Using this data, a prioritized list of suspect components for the I/T system is generated.
摘要:
Described are methods, apparatus and computer programs for determining run-time dependencies between logical components of a data processing environment. Components of the data processing environment are monitored by monitoring agents accessing run-time activity data via APIs of the managed system. A dependency generator identifies correlations between the run-time activity of the monitored components. For synchronous monitored systems, the dependency generator calculates an activity period for monitored components and determines which component's activity periods contain the activity periods of other components. Containment is used as an indicator of a likely dependency relationship, and a weighting is computed for each dependency relationship based on the consistency of containment.