Compound alarms
First Claim
Patent Images
1. A method of generating a computing alarm, comprising:
- determining whether a new instance of an element has been added to a computing network, wherein the computing network comprises a plurality of elements and the computing network is to be monitored, wherein the element comprises a physical or logical element communicatively coupled to a monitoring node via the computing network and wherein the new instance of the element comprises a new connection of the element to a resource of the computing network;
determining a hierarchical position of the new instance of the element within a network topology;
creating alarm thresholds for the new instance of the element that are inherited from parent nodes of the new instance of the element, wherein the alarm thresholds are based upon another element sharing access to the resource associated with the new connection;
determining identities of peer elements of the new instance of the element, wherein a peer element has one or more parent or grandparent nodes in common with the new instance of the element;
determining identities of other elements of the system that are using the resource associated with the new connection;
determining existing alarms of the peer elements of the new instance of the element;
modifying alarms of the other elements using the resource associated with the new connection to take into account demands of the new connection; and
automatically creating alarm thresholds for the new instance of the element that are equivalent to the existing alarms of the peer elements,wherein the alarm thresholds are usable to;
monitor a characteristic of the elements in the computing network;
compare the monitored characteristic to the alarm thresholds; and
in response to determining the monitored characteristic exceeds the alarm thresholds, provide an indication that an alarm has been triggered.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with the teachings of the present disclosure, a method of generating a computer alarm is disclosed. The method includes determining a new instance of a characteristic of an element of a computing network to be monitored, identifying a relationship of the element to other elements of the computing network, and automatically creating an alarm threshold for the new instance of the characteristic based upon the relationship of the element to the other elements of the computing network.
23 Citations
15 Claims
-
1. A method of generating a computing alarm, comprising:
-
determining whether a new instance of an element has been added to a computing network, wherein the computing network comprises a plurality of elements and the computing network is to be monitored, wherein the element comprises a physical or logical element communicatively coupled to a monitoring node via the computing network and wherein the new instance of the element comprises a new connection of the element to a resource of the computing network; determining a hierarchical position of the new instance of the element within a network topology; creating alarm thresholds for the new instance of the element that are inherited from parent nodes of the new instance of the element, wherein the alarm thresholds are based upon another element sharing access to the resource associated with the new connection; determining identities of peer elements of the new instance of the element, wherein a peer element has one or more parent or grandparent nodes in common with the new instance of the element; determining identities of other elements of the system that are using the resource associated with the new connection; determining existing alarms of the peer elements of the new instance of the element; modifying alarms of the other elements using the resource associated with the new connection to take into account demands of the new connection; and automatically creating alarm thresholds for the new instance of the element that are equivalent to the existing alarms of the peer elements, wherein the alarm thresholds are usable to; monitor a characteristic of the elements in the computing network; compare the monitored characteristic to the alarm thresholds; and in response to determining the monitored characteristic exceeds the alarm thresholds, provide an indication that an alarm has been triggered. - View Dependent Claims (2, 3, 4, 15)
-
-
5. A non-transitory computer-readable storage medium, comprising computer-executable instructions carried on the non-transitory computer readable medium, the instructions readable by a processor and, when read and executed, configured to cause the processor to:
-
determine whether a new instance of an element has been added to a computing network, wherein the computing network comprises a plurality of elements and the computing network is to be monitored, wherein the element comprises a physical or logical element communicatively coupled to a monitoring node via the computing network and wherein the new instance of the element results from a new connection of the element to a resource of the computing network; determine a hierarchical position of the new instance of the element within a network topology; create alarm thresholds for the new instance of the element that are inherited from parent nodes of the new instance of the element, wherein the alarm thresholds are based upon another element sharing access to the resource associated with the new connection; determine identities of peer elements of the new instance of the element, wherein a peer element has one or more parent or grandparent nodes in common with the new instance of the element; determine identities of other elements of the system that are using the resource associated with the new connection; determine existing alarms of the peer elements of the new instance of the element; modify alarms of the other elements using the resource associated with the new connection to take into account demands of the new connection; automatically create alarm thresholds for the new instance of the element that are equivalent to the existing alarms of the peer elements; monitor a characteristic of the elements in the computing network; compare the monitored characteristic to the alarm thresholds; and in response to determining the monitored characteristic exceeds the alarm thresholds, provide an indication that an alarm has been triggered. - View Dependent Claims (6, 7, 8, 9)
-
-
10. An apparatus for generating an alarm in a computer system, the apparatus comprising:
-
a processor; and a memory communicatively coupled to the processor, the memory comprising instructions operable, when executed by the processor, to cause the processor to; determine whether a new instance of an element has been added to a computing network, wherein the computing network comprises a plurality of elements and the computing network is to be monitored, wherein the element comprises a physical or logical element communicatively coupled to a monitoring node via the computing network, and wherein the new instance of the element results from a new connection of the element to a resource of the computing network; determine a hierarchical position of the new instance of the element within a network topology; create alarm thresholds for the new instance of the element that are inherited from parent nodes of the new instance of the element, wherein the alarm thresholds are based upon another element sharing access to the resource associated with the new connection; determine identities of peer elements of the new instance of the element, wherein a peer element has one or more parent or grandparent nodes in common with the new instance of the element; determine identities of other elements of the system that are using the resource associated with the new connection; determine existing alarms of the peer elements of the new instance of the element; modify alarms of the other elements using the resource associated with the new connection to take into account demands of the new connection; automatically create alarm thresholds for the new instance of the element that are equivalent to the existing alarms of the peer elements; monitor a characteristic of the elements in the computing network; compare the monitored characteristic to the alarm thresholds; and in response to determining the monitored characteristic exceeds the alarm thresholds, provide an indication that an alarm has been triggered. - View Dependent Claims (11, 12, 13, 14)
-
Specification