Service metric analysis from structured logging schema of usage data
First Claim
1. A method executed at least in part in a computing device to provide a passive monitoring system employing, a logging schema to track requests at a service, the method comprising:
- detecting a request received by the service;
creating a logging entry for the request at a data store associated with the service;
detecting an error in processing the request at the service;
recording the detected error with the logging entry for the request;
classifying the detected error into an error bucket, wherein the error bucket denotes a failure scenario; and
determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described to provide a passive monitoring system employing a logging schema to track usage data in order to analyze performance and reliability of a service. The logging schema may be configured to track user requests as each request is received and processed at individual subsystems of the collaborative service. A logging entry may be created at a data store of the service, where the logging entry includes a subsystem name, an operation performed by the subsystem to fulfill the request, and start and end times of the operation. The logging schema may also detect errors fulfilling the requests, and may classify detected errors into a bucket, where each bucket denotes a failure scenario. Reliability of the service may be calculated based on analysis of the buckets to compute error rates. Reports may be generated to enable continuous monitoring of a performance and reliability of the system.
22 Citations
18 Claims
-
1. A method executed at least in part in a computing device to provide a passive monitoring system employing, a logging schema to track requests at a service, the method comprising:
-
detecting a request received by the service; creating a logging entry for the request at a data store associated with the service; detecting an error in processing the request at the service; recording the detected error with the logging entry for the request; classifying the detected error into an error bucket, wherein the error bucket denotes a failure scenario; and determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device to provide a passive monitoring system employing a logging schema to track requests at a service, the computing device comprising:
-
a memory; a processor coupled to the memory, the processor executing a logging application, wherein the logging application is configured to; detect a request received by the service; create a logging entry for the request at a data store associated with the service; determine whether the request is fulfilled by the service; if the request is fulfilled, classify the request as a success in a success bucket; if the request is not fulfilled, classify the request as a detected error in an error bucket, wherein the error bucket denotes a defined failure scenario; and determine a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable memory device with instructions stored thereon to provide a passive monitoring system employing a loping schema to track requests at a service, the instructions comprising:
-
detecting a request received by the service; creating a logging entry for the request at a data store associated with the service; determining whether the request is fulfilled by the service; if the request is fulfilled, classifying the request as a success in a success bucket; if the request is not fulfilled, classifying the request as a detected error in an error bucket, wherein the error bucket denotes a defined failure scenario; and determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (17, 18)
-
Specification