Abstract:
Restarting event and alert analysis after a shutdown in a distributed processing system includes identifying a shutdown condition of the distributed processing system; determining whether the shutdown was a planned shutdown or an unplanned shutdown; if the shutdown was planned, storing an identification of the last event in an event log that was injected in an event queue at the time of the planned shutdown and restarting event and alert analysis using the next event identified in the event log; and if the shutdown was unplanned, for each event analyzer, identifying the last event included in the last event pool that the event analyzer closed; and restarting event and alert analysis at the event analyzer using the next event received by the event analyzer after the identified last event.
Abstract:
Embodiments are described for a method for controlling access to memory in a processor-based system comprising monitoring a number of interference events, such as bank contentions, bus contentions, row-buffer conflicts, and increased write-to-read turnaround time caused by a first core in the processor-based system that causes a delay in access to the memory by a second core in the processor-based system; deriving a control signal based on the number of interference events; and transmitting the control signal to one or more resources of the processor-based system to reduce the number of interference events from an original number of interference events.
Abstract:
A present event management method includes: calculating, for each of plural execution intervals that are different each other, a number of events to be executed within a predetermined interval that is equal to or less than a shortest execution interval; reading n data blocks at the predetermined intervals from a storage device that stores, for each of plural events, a data block. “n” is a total number of calculated numbers. The data block is used to execute a corresponding event, and each of the plural events has either of the plural execution intervals. The present event management method further includes outputting an execution request including the read data blocks to an execution unit that executes an event.
Abstract:
A data processing system (1) is programmed with an interface (2) for capturing events which arise, and a process engine (3) for automatically monitoring captured events to identify completion of steps, each comprising a plurality of events linked by dependency relationships; and to identify completion of processes, each comprising a plurality of steps linked by dependency relationships. Software functions (5) execute in response to output of the process engine (3). The process engine (3) processes events to recognise a plurality of potential steps, but terminates other potential steps when completion of a step is determined. The process engine (3) processes steps to recognise a plurality of potential processes, but terminates other potential process when completion of a process is determined. The dependency relationships include Boolean AND operators and Boolean OR operators. There is a discrete start event for each step and a discrete start step for each process. The engine executes a plurality of processes simultaneously, applying captured events in real time to relevant steps, some events being applied to a plurality of steps.
Abstract:
A method for request profiling in service systems with kernel events includes collecting kernel events traces from a target system, the kernel event traces being obtainable from individual service machines by instrumenting core kernel functions, analyzing kernel event traces for constructing end-to-end request profiling traces consisting of kernel events belonging to service processes, and categorizing request traces responsive to the analyzing with the constructing including grouping requests based on marking kernel events used in the analyzing.
Abstract:
An approach is provided for controlling a rate at which requests from a client computer will be received by a server application executed on a server computer. Requests are received by the server computer at different times from the client computer and time intervals between different pairs of successive requests are measured. Based on the time intervals, (1) a historical rate of requests from the client computer is determined and a limit on a rate for the server application to receive subsequent requests from the client computer is determined and enforced based on the historical rate of requests, or (2) a range of the time intervals is determined to be within a predefined range of time intervals and based on the range being within the predefined range, a denial of service attack or an overload of requests from the client computer is determined and blocked.
Abstract:
A method for monitoring transaction based systems monitoring their system resource and transaction performance data with thresholds on metrics, said method comprising the steps of collecting system resource data and transaction performance data on a period basis and each time a transaction performance metric is passed, triggering the collection of the system resource and storing an identifier correlating the transaction performance data and the system resource data; merging the collected system resource and transaction performance data; calculating the mean value for each system resource or transaction performance metric of merged data; identifying the metrics for which there is a significant difference between mean value obtained with triggering or without triggering; according to the identified metric mean value, calculating new thresholds of system resource metrics to be used for monitoring.
Abstract:
An apparatus, system, and method are disclosed for defining normal usage of a computing system resource. A method for defining normal usage of a computing system resource includes receiving a repeating schedule that represents system usage of one or more computing resources and receiving one or more demand events that will affect the system usage of the one or more computer resources. The method also automatically creates a predictive temporal profile that represents the system usage of the one or more computer resources from information comprising the repeating schedule and the one or more demand events. The predictive temporal profile is displayed for the user to review.
Abstract:
Systems and methods for data analysis include correlating event data to provide process instances. The process instances are clustered, using a processor, by representing the process instances as strings and determining distances between strings to form a plurality of clusters. One or more metrics are computed on the plurality of clusters to monitor deviation of the event data.
Abstract:
To improve identifying and tracking errors on a computer, an operating system for a computer is programmed to have a framework allowing programmable monitors of events to be defined. These programmable monitors are programmed to detect one or more events or patterns of events, and have associated actions. When the pattern of events occurs, the monitor is triggered, and actions associated with the monitor can be performed. Various actions can be performed, including but not limited to data gathering about the events triggering the monitor, other events occurring during the same time period, and information about the configuration of the computer. Monitors can be dynamically updated remotely during operation of the computer. An operating system can be programmed to have any number of such monitors. Similarly, the actions that occur when a monitor is triggered also can be dynamically updated.