SYSTEM AND METHOD FOR GENERATING AND USING FINGERPRINTS FOR INTEGRITY MANAGEMENT
First Claim
1. A method comprising:
- capturing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure;
comparing the fingerprint to an incoming data stream; and
preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison;
wherein each rule describes the probability of a symptom for a specific time cut, each time cut being a number to time units prior to the occurrence of a problem.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event.
42 Citations
18 Claims
-
1. A method comprising:
-
capturing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure; comparing the fingerprint to an incoming data stream; and preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; wherein each rule describes the probability of a symptom for a specific time cut, each time cut being a number to time units prior to the occurrence of a problem. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-readable medium having program instructions stored thereon executable by a processing unit for:
-
capturing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure; comparing the fingerprint to an incoming data stream; and preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; wherein each rule describes the probability of a symptom for a specific time cut, each time cut being a number to time units prior to the occurrence of a problem. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A device comprising:
-
a fingerprint capturing module for capturing a fingerprint comprising a set of rules that describe the behavior of at least a portion of an IT infrastructure; a fingerprint comparison module for comparing the fingerprint to an incoming data stream; and a problem prediction module for preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; wherein each rule describes the probability of a symptom for a specific time cut, each time cut being a number to time units prior to the occurrence of a problem. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification