Abstract:
The disclosed technology relates to a process of providing dynamic machine learning on premise model selection. In particular, a set of machine learned models are generated and provided to an on premise computing device. The machine learned models are generated using a cluster of customer data (e.g. telemetric data) stored on a computing network having different ranges of computational complexity. One of the machine learned models from the set of machine learned models will be selected based on the current available computational resources detected at the on premise computing device. Different machine learned models from the set of machine learned models can then be selected based on changes in the available computational resources and/or customer feedback
Abstract:
In one embodiment, a network assurance service that monitors a network detects anomalies in the network by applying one or more machine learning models to telemetry data from the network. The network assurance service ranks feedback from a plurality of anomaly rankers regarding relevancy or criticality of the detected anomalies. The network assurance service clusters the plurality of anomaly rankers into clusters of similar rankers, based on the received ranking feedback. The network assurance service uses the clusters of similar rankers to assign reliability scores to each of the anomaly rankers. The network assurance service selects, based on the reliability scores, a subset of the plurality of anomaly rankers to receive an anomaly detection alert regarding a particular detected anomaly to be ranked. The network assurance service provides the anomaly detection alert to the selected subset of the plurality of anomaly rankers for ranking.
Abstract:
In one embodiment, a network assurance system discretizes parameter values of a plurality of time series of measurements obtained from a monitored network by assigning tags to the parameter values. The network assurance system detects occurrences of a particular type of failure event in the monitored network. The network assurance system identifies a set of the assigned tags that frequently co-occur with the occurrences of the particular type of failure event. The network assurance system determines, using a Bayesian framework, rankings for the tags in the identified set based on how well each of the tags acts as a predictor of the failure event. The network assurance system initiates performance of a corrective measure for the failure event based in part on the determined rankings for the tags in the identified set.
Abstract:
Systems, methods, and computer-readable media for an adaptive gossip protocol. A node in a cluster can detect a gossip protocol synchronization triggering event which can include an indication that the node has received data from a second node via a gossip protocol, an update to data maintained by nodes in the cluster, and/or an operation. In response to the triggering event, the node can determine a dynamic gossip interval for disseminating data from the node to other nodes via a gossip protocol, the dynamic gossip interval being based on a synchronization state associated with the cluster and/or one or more gossip protocol events associated with the cluster. Next, the node can select a third node in the cluster for disseminating the data from the node to the third node. The node can then transmit the data to the third node via the gossip protocol based on the dynamic gossip interval.
Abstract:
The disclosed technology relates to a process of providing dynamic machine learning on premise model selection. In particular, a set of machine learned models are generated and provided to an on premise computing device. The machine learned models are generated using a cluster of customer data (e.g. telemetric data) stored on a computing network having different ranges of computational complexity. One of the machine learned models from the set of machine learned models will be selected based on the current available computational resources detected at the on premise computing device. Different machine learned models from the set of machine learned models can then be selected based on changes in the available computational resources and/or customer feedback.
Abstract:
The disclosed technology relates to a process for metered training of fog nodes within the fog layer. The metered training allows the fog nodes to be continually trained within the fog layer without the need for the cloud. Furthermore, the metered training allows the fog node to operate normally as the training is performed only when spare resources are available at the fog node. The disclosed technology also relates to a process of sharing better trained machine learning models of a fog node with other similar fog nodes thereby speeding up the training process for other fog nodes within the fog layer.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for load balance resources amongst computing nodes. Various embodiments of the present technology can be used to, prior to assigning a first data shard included in a first cluster of data shards as a leader of the first cluster of data shards, determine whether a first computing node storing the first data shard also stores a second data shard designated as a leader of a second cluster of data shards, yielding a determination, and when the determination indicates that the first computing node stores the second data shard designated as the leader of the second cluster of data shards, designate the first data shard as non-electable to be the leader of the first cluster of data shards and electing an alternate data shard included in the first cluster of data shards as the leader of the first cluster of data shards.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for load balance resources amongst computing nodes. Various embodiments of the present technology can be used to, prior to assigning a first data shard included in a first cluster of data shards as a leader of the first cluster of data shards, determine whether a first computing node storing the first data shard also stores a second data shard designated as a leader of a second cluster of data shards, yielding a determination, and when the determination indicates that the first computing node stores the second data shard designated as the leader of the second cluster of data shards, designate the first data shard as non-electable to be the leader of the first cluster of data shards and electing an alternate data shard included in the first cluster of data shards as the leader of the first cluster of data shards.
Abstract:
Technologies for dynamically generating topology and location based network insights are provided. In some examples, a method can include determining statistical changes in time series data including a series of data points associated with one or more conditions or parameters of a network; determining a period of time corresponding to one or more of the statistical changes in the time series data; obtaining telemetry data corresponding to a segment of the network and one or more time intervals, wherein a respective length of each time interval is based on a length of the period of time corresponding to the one or more of the statistical changes in the time series data; and generating, based on the telemetry data, insights about the segment of the network, the insights identifying a trend or statistical deviation in a behavior of the segment of the network during the one or more time intervals.
Abstract:
In one embodiment, a network assurance service that monitors a network detects anomalies in the network by applying one or more machine learning models to telemetry data from the network. The network assurance service ranks feedback from a plurality of anomaly rankers regarding relevancy or criticality of the detected anomalies. The network assurance service clusters the plurality of anomaly rankers into clusters of similar rankers, based on the received ranking feedback. The network assurance service uses the clusters of similar rankers to assign reliability scores to each of the anomaly rankers. The network assurance service selects, based on the reliability scores, a subset of the plurality of anomaly rankers to receive an anomaly detection alert regarding a particular detected anomaly to be ranked. The network assurance service provides the anomaly detection alert to the selected subset of the plurality of anomaly rankers for ranking.