Automated problem identification system
First Claim
1. A method for automated problem identification comprising:
- providing a set of information for a computer environment, wherein the set of information includes system configuration information;
performing a check of said set of information for the computer environment;
determining if said check is satisfied, wherein the determining includes comparing at least a portion of the set of information with a portion of an internal rules database, the internal rules database comprising known problems for a set of system configurations;
providing a notice, if said check is not satisfied.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides an automated problem identification system. The invention analyzes a customer'"'"'s computing environment, including administration practices, system configuration including hardware, software and the operating system. Then the invention compares the computing environment to an internal rules database. The internal rules database is a compilation of various problems that are known to exist on various configurations. Then, instead of calling an expert when there is a problem and repeating the process for every customer, the invention uses a proactive approach by analyzing a given system configuration and comparing it to a body of known problems, before the system breaks down.
74 Citations
65 Claims
-
1. A method for automated problem identification comprising:
-
providing a set of information for a computer environment, wherein the set of information includes system configuration information;
performing a check of said set of information for the computer environment;
determining if said check is satisfied, wherein the determining includes comparing at least a portion of the set of information with a portion of an internal rules database, the internal rules database comprising known problems for a set of system configurations;
providing a notice, if said check is not satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
determining if a computer room temperature is within an acceptable range.
-
-
5. The method of claim 1 wherein said performing comprises:
determining if a power and environmental certification has occurred within a range.
-
6. The method of claim 1 wherein said performing comprises:
determining if one or more grounding points reference a PDU ground.
-
7. The method of claim 1 wherein said performing comprises:
determining if a root password has been changed within a range.
-
8. The method of claim 1 wherein said performing comprises:
determining if a hard copy of an escalation procedure is available.
-
9. The method of claim 1 wherein said performing comprises:
determining if a server response time is fast enough.
-
10. The method of claim 1 wherein said performing comprises:
determining if a new hardware validation process occurs.
-
11. The method of claim 1 wherein said performing comprises:
determining if a file backup for an operating system of the computer environment occurs regularly.
-
12. The method of claim 1 wherein said performing comprises:
determining if a backup is tested regularly.
-
13. The method of claim 1 wherein said performing comprises:
determining if a document exists regarding OS and data set recovery.
-
14. The method of claim 1 wherein said performing comprises:
determining if a data center has its access controlled.
-
15. The method of claim 1 wherein said performing comprises:
determining if a data center has its access monitored and logged.
-
16. The method of claim 1 wherein said performing comprises:
determining if an access procedure for after hours personnel exists.
-
17. The method of claim 1 wherein said performing comprises:
determining if an escalation procedure document exists.
-
18. The method of claim 1 wherein said performing comprises:
determining if all members have an understanding of an escalation procedure.
-
19. The method of claim 1 wherein said performing comprises:
determining if a process for emergency changes exists.
-
20. The method of claim 1 wherein said performing comprises:
determining if a maintenance schedule exists.
-
21. The method of claim 1 wherein said performing comprises:
determining if a pre production review policy for mission critical systems exists.
-
22. The method of claim 1 wherein said performing comprises:
determining if a budget for training exists.
-
23. The method of claim 1 wherein said performing comprises:
determining if a potential for a security risk exists due to a local root access via a netpr exploit.
-
24. The method of claim 1 wherein said performing comprises:
determining if a disk array patch cluster is current.
-
25. The method of claim 1 wherein said performing comprises:
determining if a controller for a primary boot disk and a mirror are the same.
-
26. The method of claim 1 wherein said performing comprises:
determining if a raw disk device or a quick I/O also use ASYNC I/O.
-
27. The method of claim 1 wherein said performing comprises:
determining if a filesystem uses a quick I/O.
-
28. The method of claim 1 wherein said performing comprises:
determining if a quantity of host adapters is large.
-
29. The method of claim 1 wherein said performing comprises:
determining if a firmware for a disk drive is current.
-
30. The method of claim 1 wherein said performing comprises:
determining if a power supply for two differing disk arrays in the computer environment is the same.
-
31. The method of claim 1 wherein said performing comprises:
determining if a current restorable OS backup was restored with a file backup utility.
-
32. The method of claim 1 wherein said performing comprises:
determining if one or more cables are cleanly routed.
-
33. The method of claim 1 wherein said performing comprises:
determining if a system console is clearly labeled.
-
34. The method of claim 1 wherein said performing comprises:
determining if a fast Ethernet NIC is operating at a half duplex.
-
35. The method of claim 1 wherein said performing comprises:
determining if a NIC has an excessive amount of I/O errors.
-
36. The method of claim 1 wherein said performing comprises:
determining if an ability to print kernel routine names is enabled in case of a watchdog reset.
-
37. The method of claim 1 wherein said performing comprises:
determining if a Y2K OS patch is a minimum version.
-
38. The method of claim 1 wherein said performing comprises:
determining if a GBIC is a current version.
-
39. The method of claim 1 wherein said performing comprises:
determining if a firmware for a drive is a current version.
-
40. The method of claim 1 wherein said performing comprises:
determining if one or more cables are clearly labeled.
-
41. The method of claim 1 wherein said performing comprises:
determining if a log book exists and is current.
-
42. The method of claim 1 wherein said performing comprises:
determining if an OS mirror recovery process is documented.
-
43. The method of claim 1 wherein said performing comprises:
determining if an OS disk mirror recovery process is documented.
-
44. The method of claim 1 wherein said performing comprises:
determining if a diag-device and a boot-device value is the same.
-
45. The method of claim 1 wherein said performing comprises:
determining if a system is accessible.
-
46. The method of claim 1 wherein said performing comprises:
determining if a field information notice or a field change order applies to the computer environment.
-
47. The method of claim 1 wherein said performing comprises:
determining if a correctable ECC error exists.
-
48. The method of claim 1 wherein said performing comprises:
determining if an OS recovery process is documented.
-
49. The method of claim 1 wherein said performing comprises:
determining if a root user system prompt contains a system hostname.
-
50. The method of claim 1 wherein said performing comprises:
determining if a kernel state of a plex is disabled.
-
51. The method of claim 1 wherein said performing comprises:
determining if an ability to monitor a service, an application, and a host system exists.
-
52. The method of claim 1, wherein the notice includes a recommendation for dressing a problem identified by the not satisfied check.
-
53. An automated problem identification system for identifying and correcting problems in a computer environment comprising:
-
a store storing configuration and administration information for the computer environment;
a checks input module selectively providing a check configured to be applied to said configuration and administration information for said computer environment;
a knowledge engine determining if said check is satisfied; and
a notice generator generating a notice configured to be provided, if said check is not satisfied. - View Dependent Claims (54, 55)
an internal rules database configured to be consulted by the knowledge engine during the determining and comprising a compilation of various problems identified for configurations for computer environments.
-
-
55. The system of claim 53:
wherein the knowledge engine interacts with a knowledge base to determine if said check should be performed.
-
56. A computer program product comprising:
-
a computer usable medium having computer readable program code embodied therein configured to automatically identify a problem in a computer environment, said computer program product comprising;
computer readable code configured to cause a computer to provide information for the computer environment;
computer readable code configured to cause a computer to perform a check of said information for the computer environment;
computer readable code configured to cause a computer to determine if said check is satisfied, wherein the determining includes comparing a portion of the information with an internal rules database comprising previously-identified problems for varying configurations of computer environments; and
computer readable code configured to cause a computer to provide a notice, if said check is not satisfied. - View Dependent Claims (57, 58)
-
-
59. A method for inspecting a computer environment for potential problems identified for various configurations of other computer environments, comprising:
-
providing a set of checks for the potential problems, each of the checks including a rule for use in determining whether the checks are passed or failed;
receiving a set of information corresponding to computer software and hardware in the computer environment;
identifying a set of the checks based on the set of information that are applicable to the computer environment; and
determining whether the rules in the applicable checks are satisfied by the set of information for the computer environment to identify which ones of the applicable checks are failed. - View Dependent Claims (60, 61, 62, 63, 64, 65)
-
Specification