H04L41/5032

Service level objective platform

Techniques for generating and monitoring service level objectives (SLOs) are disclosed. The techniques include an SLO platform performing: storing a first SLO definition of a first SLO including a first error budget for a first metric associated with a first service; storing a second SLO definition of a second SLO including a second error budget for a second metric associated with a second service; obtaining first telemetry data from a first data source associated with the first service; obtaining second telemetry data from a second data source associated with the second service; monitoring the first SLO at least by computing the first metric based on the first telemetry data and evaluating the first metric against the first error budget; and monitoring the second SLO at least by computing the second metric based on the second telemetry data and evaluating the second metric against the second error budget.

Threshold-based determination of key performance indicator values
11651011 · 2023-05-16 · ·

One or more processing devices derive values indicative of various aspects of how a particular service in an information technology (IT) environment is performing at a point in time or for a period of time. The values are derived by a search query over machine data associated with the one or more entities that provide the service. The one or more processing devices define and apply time varying static thresholds in respect to the values. A user (e.g., IT manager) may be enabled to manipulate or define multiple sets of KPI thresholds that vary over time.

Cloud Gateway Outage Risk Detector

A cloud gateway outage risk detector can receive, by an event listener module, user session data associated with a plurality of user sessions over a cloud gateway. The event listener module can store the data in a database. A run-time collection module can obtain at least a portion of the data. The run-time collection module can provide the portion of the data to a run-time risk criteria evaluation module that can determine, based upon the portion of the data, a run-time outage risk criteria for the cloud gateway. A baseline risk criteria evaluation module can obtain historical data from the database. The baseline risk criteria evaluation module can determine, based upon the data, a baseline outage risk criteria for the cloud gateway. The run-time risk criteria evaluation module can determine whether the run-time outage risk criteria meets or exceeds an outage risk threshold.

MONITORING ENTERPRISE NETWORKS WITH ENDPOINT AGENTS

Techniques for monitoring enterprise networks with endpoint agents are disclosed. In some embodiments, a system, process, and/or computer program product for monitoring enterprise networks with endpoint agents includes deploying a plurality of endpoint agents to a plurality of endpoint devices; collecting test results from each of the plurality of endpoint agents, wherein the test results are based on tests executed on each of the plurality of endpoint devices for monitoring network activity; and generating a graphical visualization of an application delivery state for one or more application delivery layers based on the test results, generating an alert based on the test results, or generating a report based on the test results.

Feedback prioritization system

The present disclosure generally relates to a feedback processing service that can receive customer input, as customer feedback corresponds to a service context. The feedback processing service aggregates semantically similar feedback as a cluster. Then, the feedback processing service can prioritize each of the clusters by ranking each of the clusters.

Selection of Service Providers for Message Transmission on Online Social Networks

In one embodiment, a method includes identifying a mobile service provider network (SPN) and a geographic location of an online social network user and accessing a service-provider table associated with the identified mobile SPN and with the geographic location. The service-provider table indexes a reliability score and a sampling amount for multiple messaging-service providers in the geographic location. The method further determines, based on the service-provider table, whether any of the messaging-service providers has a sampling amount below a threshold sampling amount and sends messaging traffic via the determined messaging-service provider until the sampling amount is greater than or equal to the threshold sampling amount. The messaging traffic is used to update the reliability score for the messaging-service provider. The method further includes selecting a messaging-service provider based on the updated reliability scores of the messaging-service providers and sending a message to the user via the selected messaging service-provider.

DATA STRUCTURES FOR EFFICIENT STORAGE AND UPDATING OF PARAGRAPH VECTORS

Systems and methods involving data structures for efficient management of paragraph vectors for textual searching are described. A database may contain records, each associated with an identifier and including a text string and timestamp. A look-up table may contain entries for text strings from the records, each entry associating: a paragraph vector for a respective unique text string, a hash of the respective unique text string, and a set of identifiers of records containing the respective unique text string. A server may receive from a client device an input string, compute a hash of the input string, and determine matching table entries, each containing a hash identical to that of the input string, or a paragraph vector similar to one calculated for the input string. A prioritized list of identifiers from the matching entries may be determined based on timestamps, and the prioritized list may be returned to the client.

Automating a Software-Defined Wide Area Network Policy for Internet of Things End Points

The present disclosure is directed to managing industrial internet of things end points and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more switches to perform operations comprising: identifying a first end point using a protocol associated with the first end point, determining a classification for the identified first end point based on one or more attributes of the first end point, identifying one or more related end points having the classification in common with the first end point, segmenting the first end point with the identified one or more related end points, and applying one or more policies to the segmented first end point and the one or more related end points.

Connection management between applications and service resources

Systems, methods, and software technology are disclosed herein for monitoring for and reporting on degraded connections between applications and application resources. In an implementation, a connection service receives requests from an application to ascertain whether or not a connection between the application and an application resource has become degraded. The service probabilistically determines whether or not the connection has become degraded and replies to the application with information indicative of the same.

Adaptive service subscription management

A system, method, and computer-readable medium for performing a data center monitoring and management operation. The data center monitoring and management operation includes: selecting a service subscription to manage; monitoring asset resource utilization of the service subscription; generating an adaptive service subscription schedule recommendation; and, managing the service subscription based upon the adaptive service schedule recommendation.