METHODS AND APPARATUS TO DETERMINE A DURATION ESTIMATE AND RISK ESTIMATE OF PERFORMING A MAINTENANCE OPERATION IN A NETWORKED COMPUTING ENVIRONMENT
First Claim
1. An apparatus comprising:
- a client data datastore to store telemetry data associated with performing a maintenance operation, system configuration data, and a first secret, the telemetry data, the system configuration data, and the first secret received from a first virtual computing component operating within a virtual computing environment, and the system configuration data identifying a current configuration of a portion of the virtual computing environment;
a configuration comparator to identify configuration changes between a previous configuration of the portion of the virtual computing environment and the current configuration of the at least the portion of the virtual computing environment;
a client data analyzer to;
select, based on the configuration changes, an analysis model;
apply the analysis model to the telemetry data to generate analysis results, the analysis results including at least one of a duration estimate for a maintenance operation to be performed at the virtual computing environment and a risk of failure of the maintenance operation to be performed at the virtual computing environment; and
store the analysis results in association with the first secret, and in association with the system configuration data; and
a result interface to, in response to a request for the analysis results including a second secret;
retrieve the stored analysis result associated with the first secret that matches the second secret; and
transmit the stored analysis result to a source of the request.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, and systems are disclosed for determining a duration and/or risk estimate of performing a maintenance operation in a networked computing environment. An example apparatus includes a client data datastore to store telemetry data, associated with the maintenance operation, system configuration data, and a first secret, all received from a first virtual computing component operating in a virtual computing environment. The apparatus further includes a configuration comparator to identify configuration changes between a previous and current configuration of the virtual computing environment. A client data analyzer selects, based on the changes, an analysis model, and applies the model to generate results including the duration estimate or a risk of failure. The client data analyzer stores the results with the first secret and the configuration data, and a result interface retrieves and transmits the stored analysis results associated with the first secret matching a second secret included in a request.
13 Citations
20 Claims
-
1. An apparatus comprising:
-
a client data datastore to store telemetry data associated with performing a maintenance operation, system configuration data, and a first secret, the telemetry data, the system configuration data, and the first secret received from a first virtual computing component operating within a virtual computing environment, and the system configuration data identifying a current configuration of a portion of the virtual computing environment; a configuration comparator to identify configuration changes between a previous configuration of the portion of the virtual computing environment and the current configuration of the at least the portion of the virtual computing environment; a client data analyzer to; select, based on the configuration changes, an analysis model; apply the analysis model to the telemetry data to generate analysis results, the analysis results including at least one of a duration estimate for a maintenance operation to be performed at the virtual computing environment and a risk of failure of the maintenance operation to be performed at the virtual computing environment; and store the analysis results in association with the first secret, and in association with the system configuration data; and a result interface to, in response to a request for the analysis results including a second secret; retrieve the stored analysis result associated with the first secret that matches the second secret; and transmit the stored analysis result to a source of the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable medium comprising instructions that, when executed, cause a machine to at least:
-
store telemetry data, and a first secret, the telemetry data and the first secret received from first a virtual computing component operating within a virtual computing environment; select, based on a maintenance operation to be performed within the virtual computing environment, an analysis model; apply the analysis model to the telemetry data to determine an analysis result; and store the analysis results in association with the first secret; and in response to a request for the analysis requests including a second secret; retrieve the stored analysis results when the first secret matches the second secret; and transmit the stored analysis results to a source of the request. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method to process telemetry data in networked computing environments, the method comprising:
-
storing, by executing an instruction with at least one processor, telemetry data and a first secret, the telemetry data and the first secret received from first a virtual computing component operating within a virtual computing environment; selecting, by executing an instruction with the at least one processor, based on the maintenance operation, an analysis model; applying, by executing an instruction with the at least one processor, an analysis model to the telemetry data to determine an analysis result, the analysis results including at least one of a duration estimate for the maintenance operation to be performed at the virtual computing environment and a risk of failure of the maintenance operation to be performed at the virtual computing environment; storing, by executing an instruction with the at least one processor, the analysis results in association with the first secret; and in response to a request including a second secret; retrieving, by executing an instruction with the at least one processor, the stored analysis results associated with the first secret that matches the second secret; and transmitting, by executing an instruction with the at least one processor, the stored analysis results to a source of the request. - View Dependent Claims (17, 18, 19, 20)
-
Specification