ANOMALY RECOGNITION IN INFORMATION TECHNOLOGY ENVIRONMENTS

    公开(公告)号:US20210406106A1

    公开(公告)日:2021-12-30

    申请号:US16915525

    申请日:2020-06-29

    IPC分类号: G06F11/07 G06F16/23

    摘要: A method comprises obtaining a set of log files for a software system. The set of log files applies to an extended window. A periodic pattern in a first set of error-event surges in the set of log files is identified. The error-event surges in the first set is identified as event noise. A second set of log files for the software system is obtained. The second set of log files applies to a shortened window. Timeseries analysis on the second set of log files is performed. A particular error-event surge in a detection period in the second set of log files that is abnormal as compared to the shortened window is detected based on the timeseries analysis. That the particular error-event surge does not fit into the periodic pattern is determined, the particular error-event surge is characterized as an anomaly, based on the determining.

    Automated deployment of a private modular cloud-computing environment

    公开(公告)号:US09858060B2

    公开(公告)日:2018-01-02

    申请号:US14273859

    申请日:2014-05-09

    IPC分类号: G06F9/445 G06F9/455

    摘要: A method and associated systems for automated deployment of a private modular cloud-computing environment. A processor receives and analyzes user requirements, then uses those requirements to select and optimize module packages that direct automatic installations & configurations of modules of the private modular cloud-computing environment. These packages provide resources and instructions that let the processor first validate a base computing platform as being able to physically support desired virtualized cloud platform and services, then automatically install and configure the cloud's virtualization layer, cloud-management stack, virtual infrastructure, cloud services, applications, middleware, and other components onto the base platform. The processor analyzes and confirms the success of each deployment step of each module package as the step is performed. Module packages may be saved, revised, and reused to identify, update, duplicate, or optimize modules of the deployed cloud platform.

    Anomaly recognition in information technology environments

    公开(公告)号:US11321164B2

    公开(公告)日:2022-05-03

    申请号:US16915525

    申请日:2020-06-29

    IPC分类号: G06F11/07 G06F16/23

    摘要: A method comprises obtaining a set of log files for a software system. The set of log files applies to an extended window. A periodic pattern in a first set of error-event surges in the set of log files is identified. The error-event surges in the first set is identified as event noise. A second set of log files for the software system is obtained. The second set of log files applies to a shortened window. Timeseries analysis on the second set of log files is performed. A particular error-event surge in a detection period in the second set of log files that is abnormal as compared to the shortened window is detected based on the timeseries analysis. That the particular error-event surge does not fit into the periodic pattern is determined, the particular error-event surge is characterized as an anomaly, based on the determining.