-
公开(公告)号:US20240241885A1
公开(公告)日:2024-07-18
申请号:US18155242
申请日:2023-01-17
Applicant: International Business Machines Corporation
Inventor: Fan Jing Meng , Guang Han Sui , Peng Hui Jiang , Xing Tian , Li Jian Wang , Cheng Fang Wang , Hua Ye , Ming Liang Zu , Jun Su
IPC: G06F16/2458 , G06F16/2455
CPC classification number: G06F16/2477 , G06F16/24564
Abstract: Disclosed embodiments provide techniques for dynamic data collection. The dynamic data collection includes determining a data generation temporal pattern. Based on the data generation temporal pattern, a data collection strategy is created. The data collection strategy can be based on one or more data collection goals. The data collection strategy can contain specific details on how data is to be collected. A data infrastructure evaluation is performed, which provides pricing models for resources such as electricity and/or network bandwidth. A data collection policy is created based on the data collection strategy and the data infrastructure evaluation. The data collection policy can contain specific details on when data is to be collected and what strategy to use for the collection. A data transfer schedule is created based on the data collection policy. The data transfer schedule determines when to collect data from one or more data source devices.
-
公开(公告)号:US11797538B2
公开(公告)日:2023-10-24
申请号:US17110431
申请日:2020-12-03
Applicant: International Business Machines Corporation
Inventor: Yuk L. Chan , Jia Qi Li , Lin Yang , Tian Wu , Lei Yu , Hong Min , Fan Jing Meng
IPC: G06F16/24 , G06F16/2455 , G06F40/253 , G06F40/284 , G06F40/30
CPC classification number: G06F16/24553 , G06F40/253 , G06F40/284 , G06F40/30
Abstract: Aspects of the invention include computer systems, computer-implemented methods, and computer program products configured to perform message correlation extraction for mainframe operation. A non-limiting example computer-implemented method includes receiving a first message log entry having a message identifier and message field data. The first message log entry is pre-processed to determine the message identifier and to tokenize the message field data. A second message log entry is identified based on at least one of the message identifier and the tokenized message field data. The method further includes determining that the second message log entry is correlated with the first message log entry and providing an output comprising the message correlation between the first message log entry and the second message log entry.
-
3.
公开(公告)号:US11636090B2
公开(公告)日:2023-04-25
申请号:US16819141
申请日:2020-03-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jia Qi Li , Fan Jing Meng , Pei Ni Liu , Zi Xiao Zhu , Matt Hogstrom , Dong Sheng Li
IPC: G06F16/23 , G06F16/901
Abstract: A computer-implemented method, system, and non-transitory machine readable medium for a graph-based analysis for an Information Technology (IT) operations includes generating a temporal graph by extracting one or more of operation objects, relations and attributes from operation data of workloads distributed across a plurality of levels of the IT operation within a predetermined time window. Anomalies are detected from the extracted operation data and annotating corresponding objects in the graph. A directional impact between corresponding objects on the temporal graph is determined, and the temporal graph is refined based on the determined directional impact. Accessible paths in the temporal graph indicating error propagation are searched, and potential causes for the detected anomalies in the temporal graph are identified. A list of the potential causes of the anomalies is generated, and a root cause ranked for each of the corresponding objects in the temporal graph.
-
公开(公告)号:US20230093666A1
公开(公告)日:2023-03-23
申请号:US17482533
申请日:2021-09-23
Applicant: International Business Machines Corporation
Inventor: Yuk Lung Chan , Tian Wu , Lei YU , Jia Qi Li , Hong Min , Fan Jing Meng
IPC: G06F21/60 , G06F40/186 , G06F40/169 , G06F40/211
Abstract: Embodiments of the invention are directed to annotating a log based on processing log documentation. Aspects include obtaining the data set and obtaining a set of templates, wherein one or more template of the set of templates includes a variable labeled as the data type. Aspects also include annotating the data set based on the set of templates, wherein the annotating includes labeling each value of the variable in the data set with the data type. Aspects further include creating an updated data set by replacing each value of the variable in the data set that is labeled with the data type with a new data value.
-
公开(公告)号:US20220179763A1
公开(公告)日:2022-06-09
申请号:US17110513
申请日:2020-12-03
Applicant: International Business Machines Corporation
Inventor: Yuk L. Chan , Lin Yang , Tian Wu , Jia Qi Li , Lei Yu , Hong Min , Fan Jing Meng
Abstract: Techniques include collecting current logs from distributed sources, selecting a group of the current logs that are from a related source of the distributed sources, and generating a feature vector using the group of the current logs. A current status model is created for the feature vector using the group of the current logs. One or more anomalies are determined in the group of the current logs based on a difference between the current status model and a reference status model, the reference status model being based on history logs.
-
公开(公告)号:US20210286819A1
公开(公告)日:2021-09-16
申请号:US16819143
申请日:2020-03-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jia Qi Li , Fan Jing Meng , Pei Ni Liu , Junmei Qu , Zi Xiao Zhu
IPC: G06F16/2455 , G06F16/215 , G06N20/00 , G06N5/04
Abstract: A method and system for operation objects discovery from operation data includes performing pattern matching of operation data with patterns in a database. Fields in the operation data are identified as having matching patterns with the database as first potential objects. Data profiling is performed on unmatched fields of the operation data to generate data profiles. The data profiles are field classified and second potential objects are generated. The first potential objects and the second potential objects are de-duplicated, and operation objects are generated.
-
公开(公告)号:US11029969B2
公开(公告)日:2021-06-08
申请号:US16030949
申请日:2018-07-10
Applicant: International Business Machines Corporation
Inventor: Ajay A. Apte , Chang Sheng Li , Fan Jing Meng , Joseph P. Wigglesworth , Jing Min Xu , Bo Yang , Xue Jun Zhuo
IPC: G06F9/445
Abstract: Determining a characteristic of a configuration file that is used to discover configuration files in a target machine, a computer identifies, using information associated with a configuration item of a machine, a candidate configuration file related to the configuration item of the machine, from among a plurality of files from the machine. The computer extracts a value of a feature of the candidate configuration file and aggregates the candidate configuration file with a second candidate configuration file related to the same configuration item identified from among a plurality of files from a second machine, based on the extracted value. The computer then determines a configuration file related to the configuration item from among the aggregated candidate configuration files based on a result of the aggregation, and determines a characteristic of the configuration file related to the configuration item.
-
公开(公告)号:US20210117260A1
公开(公告)日:2021-04-22
申请号:US17136974
申请日:2020-12-29
Applicant: International Business Machines Corporation
Inventor: Xiao Zhang , Fan Jing Meng , Lin Yang , Jing Min Xu
IPC: G06F11/07
Abstract: Embodiments facilitating performance anomaly detection are described. A computer-implemented method comprises: detecting, by a device operatively coupled to one or more processing units, based on monitoring data of a plurality of performance metrics of a monitored device, at least one trend within the monitoring data of the respective performance metrics; removing, by the device, the at least one trend from the monitoring data of the respective performance metrics to generate modified data of the respective performance metrics; and detecting, by the device, a performance anomaly based on the modified data of the respective performance metrics and a behavior clustering model comprising at least one steady state.
-
公开(公告)号:US20190129829A1
公开(公告)日:2019-05-02
申请号:US15802108
申请日:2017-11-02
Applicant: International Business Machines Corporation
Inventor: Peng Fei Chen , Fan Jing Meng , Jing Min Xu , Lin Yang
Abstract: Techniques for log-based diagnosis for declarative-deployed applications can comprise: based on a labeled deployment declaration, classifying, by a device operatively coupled to a processor, a runtime log associated with an application, resulting in a classified runtime log. Techniques can also comprise: based on the classified runtime log, training, by the device, an aggregation model to represent a defined state of the application.
-
公开(公告)号:US09729623B2
公开(公告)日:2017-08-08
申请号:US14214823
申请日:2014-03-15
Applicant: International Business Machines Corporation
Inventor: Yun-Wu Huang , Pu Jin , Fan Jing Meng , Michael Montinarelli , Kristiann J. Schultz , Bo Yang , Christopher C. Young , Xiaolan Zhang
CPC classification number: H04L67/1014 , G06F9/5061 , H04L67/1006
Abstract: A conformance checker is received on a system that contains hostable content, and is executed. One or more results provided by the conformance checker are evaluated; and the hostable content is migrated to a destination host in accordance with the evaluating step.
-
-
-
-
-
-
-
-
-