System and method for generating and using fingerprints for integrity management
First Claim
1. A method comprising:
- accessing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure, wherein at least one rule of the fingerprint describes the probability of a symptom for a specific time cut that corresponds to a number of time units prior to an occurrence of a problem, wherein the fingerprint is produced as a result of the problem in the IT infrastructure being identified, information related to the problem in the IT infrastructure being collected, and the set of rules being formed from the collected information;
comparing the fingerprint to an incoming data stream; and
preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison;
wherein at least one of the accessing, the comparing and the preemptively predicting is executed by a processor.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event.
44 Citations
18 Claims
-
1. A method comprising:
-
accessing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure, wherein at least one rule of the fingerprint describes the probability of a symptom for a specific time cut that corresponds to a number of time units prior to an occurrence of a problem, wherein the fingerprint is produced as a result of the problem in the IT infrastructure being identified, information related to the problem in the IT infrastructure being collected, and the set of rules being formed from the collected information; comparing the fingerprint to an incoming data stream; and preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; wherein at least one of the accessing, the comparing and the preemptively predicting is executed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine-readable medium having program instructions stored thereon executable by a processing unit for:
-
accessing a fingerprint comprising a set of rules that describe the behavior of at least one metric of an information technology (IT) infrastructure, wherein at least one rule of the fingerprint describes the probability of a symptom for a specific time cut that corresponds to a number of time units prior to an occurrence of a problem, wherein the fingerprint is produced as a result of the problem in the IT infrastructure being identified, information related to the problem in the IT infrastructure being collected, and the set of rules being formed from the collected information; comparing the fingerprint to an incoming data stream; and preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; wherein at least one of the accessing, the comparing and the preemptively predicting is executed by a processor. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system comprising:
-
a storage device for storing a fingerprint comprising a set of rules that describe the behavior of at least a portion of an IT infrastructure, wherein at least one rule of the fingerprint describes the probability of a symptom for a specific time cut that corresponds to a number of time units prior to an occurrence of a problem, wherein the fingerprint is produced as a result of the problem in the IT infrastructure being identified, information related to the problem in the IT infrastructure being collected, and the set of rules being formed from the collected information; a fingerprint comparison module for comparing the fingerprint to an incoming data stream; a problem prediction module for preemptively predicting a potential problem in the IT infrastructure based on the fingerprint comparison; and a processor configured to execute an operation of at least one of the fingerprint comparison module and the problem prediction module. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification