Service metric analysis from structured logging schema of usage data
First Claim
1. A method executed at least in part in a computing device to provide a passive monitoring system employing a logging schema to track requests at a service, the method comprising:
- detecting a request received by the service from a user;
creating a logging entry for the request at a data store associated with the service;
in response to a determination that the request is not fulfilled, detecting an error in processing the request at the service;
recording the detected error with the logging entry for the request;
determining an error type of the detected error;
classifying the detected error into an error bucket by;
classifying the detected error into a pre-existing error bucket based on the error type;
elsein response to a determination that the error type is unique from prior detected errors, create a new error bucket and classify the detected error into the new error bucket;
providing an alert to the user if a number of detected errors exceeds a predefined threshold value; and
determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies are generally described to provide a passive monitoring system employing a logging schema to track usage data in order to analyze performance and reliability of a service. The logging schema may be configured to track user requests as each request is received and processed at individual subsystems of the collaborative service. A logging entry may be created at a data store of the service, where the logging entry includes a subsystem name, an operation performed by the subsystem to fulfill the request, and start and end times of the operation. The logging schema may also detect errors fulfilling the requests, and may classify detected errors into a bucket, where each bucket denotes a failure scenario. Reliability of the service may be calculated based on analysis of the buckets to compute error rates. Reports may be generated to enable continuous monitoring of a performance and reliability of the system.
-
Citations
20 Claims
-
1. A method executed at least in part in a computing device to provide a passive monitoring system employing a logging schema to track requests at a service, the method comprising:
-
detecting a request received by the service from a user; creating a logging entry for the request at a data store associated with the service; in response to a determination that the request is not fulfilled, detecting an error in processing the request at the service; recording the detected error with the logging entry for the request; determining an error type of the detected error; classifying the detected error into an error bucket by; classifying the detected error into a pre-existing error bucket based on the error type;
elsein response to a determination that the error type is unique from prior detected errors, create a new error bucket and classify the detected error into the new error bucket; providing an alert to the user if a number of detected errors exceeds a predefined threshold value; and determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing device to provide a passive monitoring system employing a logging schema to track requests at a service, the computing device comprising:
-
a memory; a processor coupled to the memory, the processor executing a logging application, wherein the logging application is configured to; detect a request received by the service from a user; create a logging entry for the request at a data store associated with the service; determine whether the request is fulfilled by the service; in response to a determination that the request is fulfilled, classify the request as a success in a success bucket; and in response to a determination that the request is not fulfilled, classify the request as a detected error in one of a pre-existing error bucket and a newly created error bucket based on an error type of the detected error; provide at least one of an alert to the user, a troubleshooting message to the user, and a healing script to the service, wherein the alert, the troubleshooting message, and healing script are associated with the detected error; and determine a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method executed at least in part in a computing device to provide a passive monitoring system employing a logging schema to track requests at a service, the instructions comprising:
-
detecting a request received by the service from a user; creating a logging entry for the request at a data store associated with the service; determining whether the request is fulfilled by the service; if the request is fulfilled, classifying the request as a success in a success bucket; if the request is not fulfilled, classifying the request as a detected error in an error bucket by one of; classifying the detected error into a pre-existing error bucket based on an error type;
elsein response to a determination that the error type is unique from prior detected errors, creating a new error bucket and classify the detected error into the new error bucket; providing at least one of an alert to the user, a troubleshooting message to the user, and a healing script to the service, wherein the alert, the troubleshooting message, and healing script are associated with the detected error; and determining a reliability of the service based on a percentage of success buckets and error buckets, wherein synthetic requests are distinguished from real user requests and synthetic request data is removed to provide an accurate determination of the reliability of the service. - View Dependent Claims (19, 20)
-
Specification