G06F11/301

Processes and systems that detect abnormal behavior of objects of a distributed computing system

Automated processes and systems for detecting abnormally behaving objects of a distributed computing system are described. Processes and systems obtain metrics that are generated in a historical time window and are associated with an object of the distributed computing system. Processes and system use the metrics to compute a time-dependent system indicator over the historical time window. Each value of the system indicator corresponds to a point in time of the historical time window when the object was in a normal or an abnormal state. Processes and systems use the normal and abnormal states of the system indicator in the historical time window to train a state classifier that is used to detect run-time abnormal behavior of the object. When the state classifier identifies abnormal behavior of the object, an alert is generated, indicating the abnormal behavior of the object.

Virtual machine
11604700 · 2023-03-14 · ·

A computer-implemented method for executing a software application in a virtual machine executing on a data processing device includes receiving software code for a software application, determining application programming interfaces referenced by the software code, determining portions of an operating system accessed by the software code and creating an application container in the virtual machine. The method also includes application programming interfaces referenced by the software code inside the application container, portions of the operating system accessed by the software code inside the application container and executing the software application inside the application container on the virtual machine.

Distributed streaming parallel database restores

A streaming distributed decentralized database task system can perform multiple tasks of parallel jobs on clusters of nodes without overloading the clusters' computational resources, such as disk, memory, processors, and network bandwidth. A cluster master can manage a job and add items to node queues. A node manager accepts or rejects queue items based on streaming task limits that are applied at the node level.

POWER MANAGEMENT FOR VIRTUALIZED COMPUTER SYSTEMS
20230131953 · 2023-04-27 ·

Aspects of the disclosure provide for mechanisms for memory protection of virtual machines in a computer system. A method of the disclosure includes: determining a plurality of host latency times for a plurality of processor power states of a processor of a host computer system; comparing, by a hypervisor executed on the host computer system, each of the host latency times to a target latency time associated with a virtual machine running on the host computer system; mapping the plurality of processor power states to a plurality of host power states in view of the comparison; and providing the host power states to the virtual machine.

VIRTUAL FUNCTION PERFORMANCE ANALYSIS SYSTEM AND ANALYSIS METHOD THEREOF

A virtual function performance analysis system and an analysis method thereof are disclosed. The virtual function performance analysis method includes: monitoring performance of at least one virtual function of a virtual network function application on a virtual platform having at least one physical resource and at least one virtual resource; monitoring and recording an actual value of each of performance indicators of each of physical resources, each of virtual resources and each of virtual functions; comparing the actual value of each of performance indicators with the associated expected value and/or threshold value to obtain a comparison result; and analyzing system performance according to the comparison result.

Data protection automatic optimization system and method

A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.

Virtual Machines Recoverable From Uncorrectable Memory Errors
20230121338 · 2023-04-20 ·

The disclosed technology provides techniques, systems, and apparatus for containing and recovering from uncorrectable memory errors in distributed computing environment. An aspect of the disclosed technology includes a hypervisor or virtual machine manager that receives signaling of an uncorrectable memory error detected by a host machine. The virtual machine manager then uses information received via the signaling to identify virtual memory addresses or memory pages associated with the corrupted memory element so as to allow for containment and recovery from the error.

USING ORCHESTRATORS FOR FALSE POSITIVE DETECTION AND ROOT CAUSE ANALYSIS
20230061099 · 2023-03-02 ·

An alert that is generated by a first orchestrator associated with a first subsystem or received from one or more distributed orchestrators that are associated with one or more corresponding subsystems is analyzed. The alert is triggered by a change in behavior determined by a behavioral analysis algorithm associated with the first orchestrator or corresponding behavior analysis algorithms associated with the one or more distributed orchestrators. It is determined whether an alert is indicative of a false positive based on an objective associated with the first orchestrator, an algorithm associated with the first orchestrator and one or more constraints associated with the first orchestrator. The alert is filtered in response to determining that the alert is indicative of the false positive.

COMPUTE INSTANCE WARMUP OPERATIONS
20230066698 · 2023-03-02 ·

Methods, apparatuses, and computer program products are described. An application server may create a compute instance associated with a pool of compute instances. The application server may select, based on one or more operation usage metrics that may indicate operations previously performed by compute instances in the pool of compute instances, a set of initialization operations from a plurality of available initialization operations. The application server may retrieve, at the compute instance, the set of initialization operations based on the selecting. The application server may perform the set of initialization operations with the compute instance as part of a compute instance warmup process in response to the compute instance being created. The application server may indicate the compute instance as an available compute instance in the pool of compute instances based on the compute instance warmup process.

METHOD OF OPTIMIZING SCHEDULE FOR STORAGE RESOURCE, SERVER, AND COMPUTER READABLE STORAGE MEDIUM APPLYING METHOD
20230069336 · 2023-03-02 ·

A method of optimizing the scheduling of storage resource for a server used in cloud computing obtains a first input/output operations per seconds (IOPS) value of a virtual disk in an instance. A warning message is generated when the first IOPS value is larger than a predefined threshold value, which represents an overloaded state of the virtual disk. An predicted IOPS value is obtained and the predicted IOPS value is set as the maximum IOPS value for limiting the IOPS value of the virtual disk, thus other virtual disks are not affected by a virtual disk being overloaded, and storing efficiency of the server is improved. A server and a computer readable storage medium applying the method are also disclosed.