US20030154177A1 - Combined issue identifying analyzer and intelligent report generator - Google Patents

Combined issue identifying analyzer and intelligent report generator Download PDF

Info

Publication number
US20030154177A1
US20030154177A1 US10/367,048 US36704803A US2003154177A1 US 20030154177 A1 US20030154177 A1 US 20030154177A1 US 36704803 A US36704803 A US 36704803A US 2003154177 A1 US2003154177 A1 US 2003154177A1
Authority
US
United States
Prior art keywords
analyzer
report
nodes
reports
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/367,048
Inventor
Paul Holland
Adam Carr
Mark McDowell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Priority to US10/367,048 priority Critical patent/US20030154177A1/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARR, ADAM MICHAEL, HOLLAND, PAUL EDWARD, MCDOWELL, MARK WILLIAM
Publication of US20030154177A1 publication Critical patent/US20030154177A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S706/00Data processing: artificial intelligence
    • Y10S706/902Application using ai with detail of the ai system
    • Y10S706/919Designing, planning, programming, CAD, CASE
    • Y10S706/922Computer program preparation

Definitions

  • the present invention relates generally to the field of auditing a configuration of an enterprise, and more particularly, to a method and system for analyzing the configuration information of an enterprise based on expert knowledge.
  • a company may desire to perform an audit of the configuration of its infrastructure.
  • the infrastructure may, for example, include a cluster configuration consisting of three nodes.
  • a cluster configuration is a group of nodes that are arranged to “back up” and substitute for the execution of a program in the event a node is unable to execute that program or the node is unavailable.
  • This company may perform the audit or may typically hire an outside company firm to perform the audit.
  • the audit usually involves the following five steps:
  • Action Plan creating an action plan to address the issues found.
  • Configuration The next issue concerns how to obtain the configuration information. In some circumstances the information has been previously obtained. However, this configuration information may likely be in a format unusable for analysis. In the absence of this information, it must be retrieved. In the event the audit is being performed by an outside company, manual interaction with a customer's system should be avoided even if the customer permits access. There is a risk that the interaction may cause a problem with the customer's platform. The customer will likely blame the outside company for problems with the system regardless of fault.
  • the analysis of the configuration is not limited to the individual systems.
  • differences between system or node configurations e.g., installed software, memory size, kernel configuration, etc.
  • the nodes in a cluster must be compared against each other. With no tools in place to do this, it will be a manual effort to extract certain configuration information and possibly to write scripts to do a comparison and provide the results in a presentable way. This is a laborious and time consuming process, but a necessary task.
  • the report presented should be consistently formatted.
  • Technical personnel should not have to spend their time writing reports, when their technical skills may be used in better ways. This would therefore require additional resources for personnel skilled in technical writing.
  • the reports must cater to the audience requesting the audit.
  • the audience may include technical and non-technical management, sales people, and many others.
  • a system is desired that is capable of crafting different reports, with the results of the analysis in accordance with an auditor's request.
  • Action Plan Typically, the company performing the audit must prepare an action plan to resolve the issues that were determined. If the company does not act aggressively, the company may lose the business. However, in many situations, the company may have little assistance available from the audited company for the creation of an action plan. The preparation of the action plan is facilitated when a scenario is available with the steps to resolve a specific issue, together with the means to find additional reference material.
  • the present invention comprises, in one embodiment, a method of generating a variety of reports descriptive of issues arising in monitored nodes of an enterprise or group of nodes.
  • the method comprises the steps of analyzing node-specific information derived from one or more nodes, guided by rules of analysis, to detect the presence of one or more issues; presenting at least some issue identification information together with node identification information; providing several report template and/or rule sets each set defining the organization and contents of a class of reports; and then, using two or more of these report templates and/or rule sets as a guide, and also guided by enterprise, node group, and/or node information that includes at least some of said issue and node identification information, generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.
  • Another embodiment of the invention is a system that generates a variety of reports descriptive of issues arising in the monitored nodes of an enterprise or group of nodes.
  • This system comprises several analyzers which, when presented with data derived from a node, and when exercised under the guidance of rules of analysis, analyze the node data and generate output data signaling the presence of one or more issues indicated by the analysis.
  • the system further comprises a harness which exercises at least some the analyzers, providing them during each exercise with data gathered from a different node or group of nodes, and that presents issue data generated by an analyzer together with data identifying the node or group of nodes where the issue originated, to thereby generate an issues database.
  • the system further comprises report templates and/or rule sets each defining the organization and contents of a class of reports. And it also comprises a report generator, guided by two or more report templates and/or rule sets and by data retrieved from the issues database, through the process of generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.
  • FIG. 1 presents an overview block diagram of an enterprise analyzer system that periodically collects information from the nodes in an enterprise, analyzes that information, and uses the issues which result from the analysis as a basis for generating a variety of reports.
  • FIG. 2 is a hardware block diagram illustrating the nodes in an enterprise linked to an analyzer server and a report generator server.
  • FIG. 3 is a hardware block diagram illustrating the computers and other nodes in an enterprise having a support node.
  • FIG. 4 illustrates the organization of a collector database.
  • FIG. 5 illustrates a process of creating a collector.
  • FIG. 6 illustrates a process of installing a collector on an enterprise.
  • FIG. 7 is a flow diagram of the process of periodically executing collectors within an enterprise.
  • FIG. 8 is a software block diagram of the elements of the analysis server together with certain elements of the report generator server and an HAO Server.
  • FIG. 9 illustrates the organization of the tracker database.
  • FIG. 10 illustrates the process of an auditor designing an assessment task to analyze an enterprise and to generate reports.
  • FIG. 11 a continuation of FIG. 10, illustrates the process an auditor goes through to define the reports that are to be generated.
  • FIG. 12 is a flow diagram illustrating the process of creating a new analyzer.
  • FIG. 13 is a continuation of FIG. 12 illustrating the process of creating a new analyzer.
  • FIG. 14 is a table listing the user interface tools which are desirable to aid in analyzer creation.
  • FIG. 15 is a flow diagram of the general process executed by the analyzer harness when it performs the analysis of the nodes in an enterprise.
  • FIG. 16 illustrates the process of creating a report template.
  • FIG. 17 is a continuation of FIG. 16 illustrating the process of creating a report template.
  • FIG. 18 is a continuation of FIGS. 16 and 17 illustrating the process of creating a report template.
  • FIG. 19 is a flow diagram illustrating how reports are generated.
  • FIG. 20 is a continuation of FIG. 19 illustrating how reports are generated.
  • FIG. 21 is an overview block diagram of the elements involved in the execution of analyzers including the analyzer loader, the analyzer descriptor, and the analyzer argument manager.
  • FIG. 22 presents a flow diagram of the detailed steps carried out by elements of the analyzer harness (shown in FIG. 21) when it executes an analyzer.
  • FIG. 23 is a continuation of FIG. 22 illustrating the steps carried out by the analyzer harness when it executes an analyzer.
  • FIG. 24 is a continuation of FIGS. 22 and 23 illustrating the steps carried out by the analyzer harness when it executes an analyzer.
  • FIG. 25 illustrates an XML hierarchy which can be used to generate varying scope assessments of an enterprise.
  • FIG. 26 illustrates a process of defining a task in the environment of the XML hierarchy shown in FIG. 25.
  • Analyzers are processes, defined by rules or programs, that analyze selected configuration information gathered by one or more collectors to one or more nodes, and that identify and report issues which may require attention.
  • Analyzer Harness is a framework or system which encapsulates, or wraps, and then executes an analyzer, providing the analyzer with collector data relating to a specific node or nodes of a specific enterprise each time an analyzer is encapsulated or wrapped and then executed.
  • Audit This term is normally used for a formal examination or verification of financial accounts, in this context it means a very thorough examination or verification.
  • an audit typically takes a significant amount of time.
  • Resources that perform Audits typically are subject matter experts with a lot of experience. Depending on the areas of coverage this is done by one person or by a team. Typically, this will require a team of multiple specialists.
  • a collector is a command, or a series of commands, that causes programs installed at one or more nodes to gather configuration information about the node and that return reports defining the node's configuration.
  • Configuration Any information specific to the static or the dynamic configuration of one or more nodes (or field computers, hardware, software, firmware, databases, storage systems, etc.) at a given point in time.
  • Configuration Tracker A tool which gathers configuration information from one or more nodes and which highlights changes between snapshots of the information gathered at different times.
  • Daemon A Unix term that refers to a specific type of program or agent designed to work in the background.
  • Enterprise Collection of computers, software, and networking that comprises the computing environment of a business.
  • Enterprise Name A name that identifies a particular enterprise and that may be used as a retrieval key to access the configuration information of the enterprise.
  • Field computers or nodes are computers or nodes installed at enterprise sites and whose operations are monitored from a central site.
  • Framework This is a symbolic structure in which expert knowledge and experience is placed such that it may be automatically used to analyze enterprise configuration information gathered by collectors to identify issues that may require management attention. More specifically, in the context of this embodiment, expert system rules called analyzers are placed into a harness or framework and supplied with configuration information from enterprise nodes and are thereby enabled to report any issues that may have arisen within the enterprise.
  • High Availability Observatory is a software entity installed on a support node within an enterprise that periodically causes the execution of collectors on the enterprise nodes, captures the reports which the collectors generate, and transfers those reports back to a centralized tracker database for later use and analysis. It is noted that the HAO is merely one of many possible ways in which configuration information may be collected and analyzed in accordance with the teachings of the present invention.
  • An issue is any matter that may need to be investigated by or reported to the management of an enterprise.
  • An analyzer performs tests upon configuration data gathered from the nodes of an enterprise by collectors. Those tests determine if there are any issues that need to be drawn to management's attention.
  • An issues database is a database containing issue information generated by analyzers when they process configuration information generated by collectors operating on the nodes of an enterprise.
  • a managed element is one or more physical devices (CPU, node, computer, etc.) or logical devices (program, volume, thread, process, etc.) that are monitored and/or managed. Each analyzer operates upon a particular class of managed elements, which may be a single node. A set of analyzers can be assigned to analyze all the members of a managed element of an enterprise.
  • a node is a particular device in an enterprise, such as a server, work station, printer, router, switch, or hub.
  • a multi-processor may be configured either as a single node or as multiple nodes.
  • a tracker database is a database containing configuration information gathered from one or more nodes of one or more enterprises.
  • FIG. 1 an overview block diagram is shown of an automated method 100 for repeatedly analyzing the configuration of an enterprise.
  • the method 100 may generally be broken into three stages: collection, analysis, and reporting, as is shown in FIG. 1 by the dashed lines.
  • step 102 of the method enterprise configuration information is collected from field nodes.
  • the collection step utilizes a set of collectors 104 to gather the desired configuration information.
  • the collectors 104 are each commands or programs stored on a support node in the enterprise.
  • the collectors 104 are run at periodic intervals on each node of the enterprise.
  • the collectors 104 gather desired configuration information and store it as files in the tracker database 106 .
  • step 108 configuration information is analyzed by an analyzer harness 806 (FIG. 2) to identify issues within the field nodes.
  • the analyzers 110 are used to investigate particular issues associated with the field nodes.
  • the analyzers 110 are developed or written by experts to identify an issue or issues. The experts possess knowledge and information which is captured in written form as analyzers addressed to specific issues.
  • the analyzers are then stored in an analyzer database 804 (FIG. 2) for later use by the analyzer harness 806 .
  • An important aspect of the present invention is that the reports generated by this arrangement focus on specific issues rather than upon the status of an enterprise. Accordingly, the support engineers do not have to wade through large amounts of configuration information to isolate problems. Providing support for the enterprise is thus transformed from configuration gathering and manual analysis to executing a specified set of analyzers and allowing the framework “expert” to diagnose the problem and identify the pertinent issues.
  • the analyzer harness 806 executes the desired analyzer 110 with the configuration information stored in the tracker database 106 and generates a report 2126 (FIG. 21) in XML format.
  • the report 2126 identifies issues relating to the field nodes. This issue identifying report 2126 is then stored as a file in an issue database 112 . If an issue has not arisen with respect to any node, the issue will be absent from the report 2126 .
  • the report 2126 generated by step 108 may be used to generate a full report along with text descriptions of the issues, as desired by an auditor.
  • the XML report 2126 from the analyzer harness 806 is sent to a report generator 206 (FIG. 2).
  • the report generator 206 may use report templates and rules database 204 to generate reports 208 (FIG. 2) addressing specific issues for each field node. These reports 208 identify the analyzers 110 used, the node from which the collector information is gathered, optionally the actual output of the collector 104 , and the issue identified.
  • the issues stored in the issues database 112 may be used in another way to review the overall performance of the enterprise.
  • the issues are analyzed using rules written by the experts, and a report is generated as desired by the auditor.
  • the reports are generated from templates stored in the report templates and rules database 204 .
  • the reports may be presented in step 118 to enterprise management, technical management, the field engineering team, and to a workflow system or healer system (self-healing technology). This self healing technology will help the computer industry achieve the goal of providing servers and other node that repair themselves automatically, thereby staying in service without the need of human intervention over many years.
  • the present invention by automatically identifying issues that can indicate the possible future failure of nodes in enterprises and by generating reports of the type that can control the operations of other nodes which can download software to reinitialize disk drives and to perform other maintenance services automatically, moves the computer industry a giant step closer to providing servers and other nodes that maintain and repair themselves automatically with only minimal human intervention.
  • FIG. 2 there is shown a hardware block diagram for implementing the method in FIG. 1.
  • An enterprise 300 is located on a customer site, and it includes a support node 308 which may be operated by the manufacturer of the computers at the customer site.
  • the support node 308 includes the customary components of a computer system including a CPU, a display or other I/O device, a network or communications interface, RAM or ROM or other memory, as well as stable storage devices such as disk or CD-ROM drives.
  • Other servers or nodes described may also include the same customary components.
  • HEO High Availability Officer
  • the support node 308 is connected to the nodes 302 and 304 by a network which enables the collectors 104 to gather configuration information.
  • the enterprise 300 has a firewall 324 to act as a barrier to prevent unwarranted access to the enterprise 300 and to act as a central point of presence for maintenance and e-mail connectivity. Note that use of a support node in this manner is one of many ways in which configuration information may be collected and subjected to analysis.
  • FIG. 2 also illustrates the components located at a central site.
  • the central site includes an analyzer server 800 situated remote from the enterprise 300 .
  • the analyzer server 800 is linked (in this embodiment, indirectly through the tracker database 106 as is shown in FIG. 2) to the enterprise 300 via an ISDN line or some other form of wide area network.
  • An HAO server 105 , a report generator server 202 , and a legacy server 210 are also part of the central site.
  • the HAO server 105 is linked to the support node 308 by the ISDN line.
  • Files of configuration information generated by the collectors 104 are saved in a tracker database 106 . These files are retrieved from the tracker database 106 by the analyzer server 800 , as is described below.
  • the analyzer server 800 includes an analyzer database 804 which stores the analyzers 110 and an analyzer harness 806 for wrapping the analyzers 110 retrieved from the analyzer database 804 with the files of configuration information retrieved from the tracker database 106 .
  • the analyzer harness 806 generates an issue report file in XML format which is placed into the issues database 112 . As discussed more fully below, this report may be used to generate a full issue report as described above with respect to FIG. 1.
  • the legacy server 210 includes a legacy database 212 .
  • the legacy database 212 stores configuration information files obtained during prior manual collections or other means.
  • the legacy database 212 can be linked to the analyzer harness 806 .
  • configuration information files can be retrieved from the legacy database 212 . This information, however, is only as current as the most recent manual collection. But other automated techniques may be used to place node configuration information into the legacy database 212 .
  • HAO is only one way in which configuration information may be gathered from an enterprise. This can and should be done for every node in each enterprise so that the benefits of configuration information collection and analysis can be brought to bear universally.
  • the report generator server 202 is also a part of the central site.
  • the report generator server 202 is linked to the analyzer server 800 through the (XML) issues database 112 .
  • the report generator server 202 includes a report generator 206 for receiving the XML issue reports from the database 112 .
  • the report generator 206 may generate a full report concerning the identified issues including more detailed information about each issue.
  • a report templates and rules database 204 is part of the report generator server 202 .
  • the server 202 stores various report templates and rules which are developed by subject matter experts. These can be field personnel or product development personnel. The application of these rules helps to determine the overall performance of the enterprise 300 .
  • the report generator 206 will retrieve (1) the rules from the report templates and rules database 204 and (2) the issues stored in the issues database 112 , and will then generate a report 208 using the templates from the report templates and rules database 204 .
  • the report may be in any desired format, such as Microsoft Word, Excel, PowerPoint, or HTML or in some special format designed for delivery to some other computer or node for use in automatic control.
  • the report may identify all the issues with the enterprise 300 to enable the auditor determine the overall performance of the enterprise 300 .
  • the cluster configuration example described above, along with an analysis of the enterprise configuration, will now be discussed in more detail.
  • the nodes 302 , 304 , 306 and several personal computers 314 - 322 are linked through a network 312 .
  • the nodes 302 , 304 , 306 include utilities 303 , 305 , 307 , respectively to set up and configure the nodes properly.
  • the enterprise 300 also includes a file server 326 with a volume 328 for storing programs.
  • the file server 326 is linked to the nodes 302 , 304 , 306 to enable these nodes to access the programs from the volume 328 on the file server 326 .
  • the HAO support node 308 is also part of the enterprise 300 , and it includes a collector database 310 .
  • the HAO support node 308 is linked to the HAO server 105 on the central site via an ISDN line or other means of connection.
  • a firewall 324 is installed on the enterprise 300 for the reason described above.
  • the three nodes 302 , 304 , 306 are arranged in a cluster configuration.
  • the nodes are each configured as a back-up to each other to ensure that executable programs can be run on a back-up node if the node assigned to run a program fails.
  • the utilities of each node must be set up to ensure that the node recognizes or “sees” the program on the volume 328 .
  • the volume 328 of the file server 326 must be “attached” to each of the nodes 302 , 304 , 306 to enable each to run a program or access a program on the volume 328 .
  • a PC 314 for example, is using a program through the network 312 that is normally run on the node 302 , the volume 328 must be attached to the node 304 to run that program in the event the node 302 fails or is otherwise unable to execute that program.
  • the cluster configuration is realized using a Hewlett-Packard Company program known as MC/ServiceGuard.
  • the MC/ServiceGuard program creates a cluster configuration which ensures that this type of back-up occurs.
  • the collectors 104 from the collector database 310 on the HAO support node 308 are sent to the nodes 302 , 304 , and 306 to gather configuration information.
  • This information in file form, is then returned and is sent to the central HAO server 105 (FIG. 2) to be stored as files on the tracker database 106 .
  • the tracker database 106 identifies the node from which the information was gathered, and the files contain facts concerning what was collected, such as storage or memory capacity, etc.
  • the analyzer harness 806 retrieves the desired configuration information files and the desired analyzers 110 from the analyzer database 804 and wraps them together, forming a framework that can generate issue reports 2126 in XML format.
  • Each issue report 2126 indicates typically that a particular problem exists within a particular node. For example, the report 2126 may report that the node 304 does not recognize the volume 328 on the file server 326 because it has not attached this volume 328 . If the node 304 cannot recognize or “see” the volume 328 , node 304 cannot run a program in the event that the node 302 fails.
  • the collectors 104 are commands or sets of commands that can run on each of the nodes of an enterprise, testing the configurations of those nodes, both static and dynamic, and generating collector reports reporting their findings.
  • the reports generated by these collectors in the form of files, are collected and are transmitted to a centralized tracker database 106 where they are stored.
  • Many types of collectors can be used in this manner.
  • a family of collectors 104 that are run at a particular enterprise site are defined by the service engineers at that site and may be the very same programs that the service engineers run when they visit the site and manually run tests to learn about the system configuration.
  • the analyzers 110 read and analyze the collector information contained in the tracker database 106 .
  • Each analyzer is created by an expert in system testing and maintenance to evaluate the information generated by one or more collectors and to look for one or a few specific potential problems that may be present. These problems are called “issues”.
  • issues As a simple example used throughout the remainder of this specification and in the appendices, an issue that might be of concern to the management of an enterprise could be the fact that one or more volumes attached to one or more nodes are filled to within five percent of their maximum capacity and are in danger of possibly running out of room to store additional files. Different analyzers test for different conditions and focus upon different issues.
  • the analyzers are called upon to analyze the configuration information in the tracker database 106 and to thereby generate issue information which is stored in an issues database 112 .
  • the present invention contemplates the use of additional rules and report templates 116 . These enable the performance, at step 114 , of a further analysis of the issue information using rules written by experts; and the generation of a variety of useful reports directed to different audiences.
  • one of these reports might be a summary report, written in laymen's language, directed to the non-technical management of an enterprise to advise them of critical problems and trends.
  • This report may indicate general conditions that exist, and it may suggest reasons why this management should be concerned about these conditions through the use of simple examples and explanations.
  • Other possible reports would be reports for technical management which might be fairly detailed, indicating in technical terms precisely what problems exist and what solutions might be considered.
  • a separate set of reports might be generated for the field engineering team documenting the status of the enterprise, indicating points that need to be watched, and possibly suggesting field corrections.
  • An issue description database 117 may be provided which can supply the report generating software with highly detailed descriptions of every issue that may arise, including examples and also explanations of why these issues are of concern to management, written in non-technical language that can be understood by non-technical managers.
  • the issue descriptions in the database 117 thus supplement the very brief issue descriptions which result from analysis and which appear in the issues database 112 .
  • reports may be generated directly from the underlying tracker database 106 such that the reports may indicate the status of the enterprise as well as the occurrence of issues of interest to management.
  • status information from the tracker database 106 may be used to supplement and augment reports otherwise based upon the occurrence of issues.
  • a machine-readable output of the report generator might be sent directly to the work flow system to cause it to generate work orders that cause service personnel to be sent immediately to the site to carry out time critical maintenance.
  • reports of failed disk drives in disk arrays can be transformed automatically into work orders that schedule a repair team to visit the site and to replace the drives before a mission-critical enterprise is shut down by further failures.
  • some reports may be generated which become instructions to the healer system that cause immediate correction, through automated means, of certain problems to ensure continued operation of servers that are mission critical to the enterprise. For example, corrupted files can be downloaded and reinstalled automatically, and non-bootable systems may be repaired.
  • Technical reports can provide action plans which explain precisely how a problem can be addressed or a machine repaired.
  • an electronic report can trigger the automatic ordering of parts and the scheduling a technician to visit the site to install the parts. It is only a small step beyond this to provide for automatic repair and correction of defects such that the nodes become substantially self healing.
  • FIG. 2 presents an overview hardware diagram of both an enterprise 300 located at one or more business sites and of an analyzer server 800 and report generator server 202 which might typically be located at a central site but which could be also located at an enterprise site.
  • the nodes 302 and 304 and possibly many other nodes exist at the enterprise site 300 . These nodes would typically be servers, but they could be routers, printers, and other computational devices that are to be monitored. Also at the enterprise site 300 , a support node 308 is networked together to the other nodes 302 and 304 .
  • the support node 308 includes tools (the HAO system) that enable the collectors 104 to run periodically upon the nodes 302 and 304 and other enterprise nodes, thereby generating information defining the static and dynamic configuration of the nodes 302 and 304 and other nodes.
  • the support node program 402 (FIG.
  • Some enterprises 300 may not be equipped with support nodes having the HAO program 402 and collectors 104 or their equivalent. Some or all of the configuration information for such enterprises 300 may be maintained upon a legacy database 212 (FIG. 2) within a legacy server 210 . This information may also be used to support an analysis of an enterprise.
  • an analyzer server 800 contains an analyzer database 804 which contains analyzers 110 . These are rules or programs that implement tests defined by technical experts.
  • the analyzer server 800 also contains an analyzer harness 806 which is able to harness individual analyzers 110 or rules together with configuration information gathered from specific nodes 302 and 304 . This information is retrieved from the tracker database 106 or the legacy database 212 .
  • the analyzers 110 analyze this information and thereby determine whether there are any issues that need to be addressed.
  • the analyzer harness 806 may receive an issue report each time an analyzer 110 is run if there are any conditions that need attention.
  • the analyzer harness 806 adds to those issue reports information identifying the particular nodes 302 and 304 and the issue or error messages associated with the analyzer 110 and passes the issue reports out as XML reports 2126 . These reports are is both human and machine readable. They list all of the issues which may need management attention. These are stored in an (XML) issues database 112 .
  • the XML issue report is passed on to a report generator 206 within a report generator server 202 .
  • the report generator 202 includes a report templates and rules database 204 that controls the generation of a wide variety of different reports for different audiences, as was explained above. For example, some reports may simply restate each of the issues in a nicer format and sorted in a particular order for presentation to a technical team that needs to gain a detailed understanding of all the issues which have arisen. Other templates may be assembled under the control of elaborate rules which first scan and analyze the information contained within the XML issue report, possibly comparing it to previous similar reports generated on earlier occasions, to spot trends and various conditions that are in need of attention, thereby functioning as a configuration tracker.
  • FIGS. 3 to 7 explain how the collectors are created and then used to gather configuration information and to feed that information into the tracker database 106 .
  • FIG. 3 presents a more detailed description of an enterprise 300 .
  • the enterprise 300 includes three servers 302 , 304 , and 306 which are identified as “nodes” in FIG. 3.
  • nodes Illustrative of the many possible servers, routers, printers, switches, and other audible devices that may be included within an enterprise, the nodes are tied together by a network 312 which also connects to a large number of work stations or PCS 314 , 316 , 318 , 320 , and 322 . These work stations or PCS also qualify as nodes and may also be monitored by the present invention.
  • a number of utilities 303 , 305 , and 307 are installed upon each of the nodes 302 , 304 , and 306 . While many utilities may be present on a particular machine, of particular concern to this description are utilities that might be useful to service personnel when investigating the configuration of the machine. These are utilities that can be run by service personnel and that would then generate reports which the service personnel might view on the monitor or print out and then use in the course of diagnosing various system problems.
  • a report is generated such as that shown in Appendix E. This report indicates the volume that is mounted, its size, how much of its capacity is utilized by files, how much is available for further storage, and the percent of the storage area that is utilized.
  • This database 310 includes HAO collector program 402 which is capable of launching a collector command, such as the “bdf” command illustrated in the preceding paragraph, upon any of the nodes 302 , 304 , or 306 and also upon the PCs 314 , 316 , etc.
  • This collector program periodically causes collectors to run upon each of the nodes that are being supervised by this particular support node 308 . This is done in accordance with a collection schedule 404 .
  • the nodes examined are included in a node list 406 .
  • the collector portion of the collector database 310 is shown at 408 . It contains a list of all the collectors that are to be executed, together with a logical name and an ID number for each collector, as is shown for the “disk usage” collector “bdf-il” assigned the ID number “100024”.
  • a collector may not be a simple command, such as illustrated above, but it may a series of commands to run certain programs or utilities in a certain order.
  • Such a list of commands can be stored in a file which can be called a complex collector.
  • Complex collector files are stored at 410 and are also stored within the utilities areas 303 , 305 , and 307 on the nodes 302 , 304 , and 306 .
  • the list of collectors 408 includes the name of the file that contains the list of commands which comprise the complex collector, rather than the actual collector commands themselves.
  • FIG. 5 illustrates the process of creating a new collector.
  • a new collector is created by simply adding it to the list of collectors 408 .
  • the collector command 506 is typed in along with a name for the collector 504 and its I.D. number 508 .
  • a new collector is added to the list of collectors 408 , it becomes active.
  • a collector Once a collector is created, it may be installed upon an enterprise 300 , at step 602 , by installing it upon the support node 308 of the enterprise within the collector database 310 , and in particular in the portion 408 of the database 310 reserved for collectors.
  • Complex collectors consisting of multiple commands, must be stored as script files on the nodes 302 , 304 , and 306 with the names of the script files added to the list of collectors 408 .
  • the collector is scheduled for execution periodically in the schedule 404 .
  • FIG. 7 illustrates the execution of collectors against the nodes 302 , etc. in an enterprise 300 .
  • Execution is typically triggered by a timer 702 .
  • execution may also be triggered by things like a configuration item which the system has determined has changed its state such that the change in state of the configuration item causes a related analysis to be carried out.
  • a timer expires, the node list 406 within the collector database 310 is referenced, and the nodes are processed one at a time.
  • a node is selected.
  • the list of collectors 408 is referred to, and a first collector is selected for execution.
  • a command is sent to the node 302 being audited to execute the designated collector.
  • a collection agent and a collection daemon are installed on each node (see U.S. Pat. No. 6,148,402 which issued on Nov. 14, 2000 to Randall B. Campbell and which is hereby incorporated by reference).
  • the support node collector program 402 sends a collector 104 to the collection daemon on the node 302 to be audited.
  • the daemon passes the collector 104 on to a collection agent.
  • the collection agent executes the collector 104 , captures its standard output and standard error outputs (STDOUT and STDERR), and returns the collected output information to the daemon, which returns it to the collection program 402 running upon the support node 308 .
  • step 710 if there are more collectors, then program control branches back to step 706 where additional collectors are caused to be executed upon that same node 302 . Then, at step 712 , if there are more nodes 304 , etc. to be audited, then program control returns to step 704 where the next node 304 is selected, and the analysis proceeds as described above.
  • collector output is transferred to the central tracker database 106 at a central site for further analysis.
  • FIG. 8 The analysis process is set forth in block diagram form in FIG. 8, this Figure shows the various databases and programs that are involved in the analysis and report generation processes.
  • the analyzer server 800 is shown at the top of the figure and contains the analyzer database 804 and the analyzer harness 806 .
  • the HAO server 105 is shown which contains the tracker database 106 that contains all of the configuration information with respect to the nodes 302 and 304 , etc. in the enterprise 300 .
  • the report generator server 202 is shown together with the database 204 that contains the report templates and rules and the report generator 206 .
  • the first step in the analysis process is that of creating the analyzers 110 and creating the report generation rules and templates 116 that will generate the reports 208 .
  • content experts 812 use analyzer creation utilities 802 to create the various documents that define the analyzers 110 and store them in the analyzer database 804 .
  • These and other content experts 812 also generate the rules that govern report generation as well as the templates for the reports, and they store them in the database 204 within the report generator server 202 .
  • Each analyzer 110 focuses upon a particular issue or set of related issues that can arise within the nodes 302 , etc. in the enterprise 300 .
  • Each analyzer is designed to generate an XML report whenever an issue is found to be present and in need of consideration by management.
  • the system may then be called upon to do an assessment of the enterprise 300 .
  • An auditor 814 who may be an engineer or some other person desirous of learning about the condition of the nodes 302 , etc. in the enterprise 300 , requests an audit by using a task definition system 810 to create an assessment task.
  • an assessment task A is shown.
  • the assessment task 814 includes, in its definition, a list of the enterprises that are to be analyzed, a list of the nodes at each enterprise which are to be subjected to analysis, and a list of the analysis that is to be performed in the form of the actual names of the analyzers which are to be executed.
  • the assessment task 814 includes a list of the reports that are to be generated following the analysis. Report generation may be done at the time of the analysis, or the reports may be generated at a later time in a separate session.
  • the list of enterprises, nodes, and analyzers are passed to the analyzer harness 806 .
  • the analyzer harness 806 then proceeds by picking up the analyzers 110 from the database 804 , one at a time, and with each analyzer 110 the analyzer harness 806 proceeds through the nodes 302 , etc. one at a time.
  • the harness 806 creates a framework linking the analyzer 110 to configuration information files that are retrieved from the tracker database 106 . Using this framework, the harness 806 wraps the analyzer 110 in this environment and causes it to be executed in the context of the list of configuration information files that contain configuration information gathered from the node 302 that is being currently analyzed.
  • the analyzer 110 calls upon special subroutines that generate short XML reports of any issue which warrants management attention and also of any error condition which may arise.
  • the analyzer harness 806 takes these small issue XML reports and expands them, using issue text templates retrieved from the analyzer database 804 and also information as to the identity of the node and the identity of the assessment task, and creates an expanded XML report which is stored in the (XML) issues database 112 after the analysis have been run against all of the nodes 302 , etc.
  • an extended issue report is generated in an XML format that is both human readable and also that lends itself to being incorporated into a database for automated retrieval and manipulation.
  • the list of reports from the task definition 814 is passed to the report generator 206 .
  • the report generator 206 also has access to the report templates and rules database 204 and to the XML issue report which can be retrieved from the (XML) issues database 112 .
  • an expert system engine within, or supplementing, the report generator 206 evaluates the rules and, under their guidance, examines the issue information, generating high-level conclusions for management concerning the general state of the enterprise.
  • the report generator 206 prepares a variety of reports, as has been explained, setting forth the status of the enterprise 300 and its nodes 302 , etc. These are then fed to various recipients of the reports 817 .
  • FIG. 9 illustrates the contents of the tracker database 106 .
  • a tracker database 106 is established for the United States, another for Europe, and another for Asia. These tracker databases 106 are connected by conventional networking to the various enterprises 300 to which they relate so that they can collect information 24 hours a day and thus remain current.
  • the tracker database 106 information is organized first by enterprise, within the enterprise by node, within the node by the collector, and within collector by the output files each collector has generated, each time and date stamped such that there may be a historical collection of configuration information.
  • the analyzer harness 806 is able to request the information file generated by any collector 104 when running on any node 302 , etc. within any enterprise 300 .
  • FIG. 10 presents a flow chart of the process by which an auditor 814 defines the assessment task that is to be carried out by the analysis server 800 during any given processing operation.
  • the auditor 814 begins by specifying the type of assessment that is to be carried out.
  • a first type of assessment is the “full audit request.”
  • the full audit request looks at all aspects of the enterprise 300 , right down to the smallest details. It also generates high level reports for management and for others, drawing general conclusions about the state of the enterprise, the nature of the problems found, and the possible solutions that may be considered.
  • a second type of assessment is called simply an “assessment.”
  • An assessment involves the use of large numbers of collectors 104 whose output is processed by a fairly large number of analyzers 110 . A detailed report of all the issues identified is then generated.
  • a third type of assessment is the health check, which states in fairly summary terms whether the nodes within an enterprise are OK or whether there are problems that need to be addressed. This a fairly simple “go” or “no go” type of evaluation that looks primarily at critical values only and that generates a minimal report.
  • the auditor 814 may select any one of several different types of coverage for each of these assessments.
  • An overall assessment runs all the analyzers 110 and generates a large amount of issue information about all aspects of an enterprise 300 .
  • a hardware and operating system assessment runs only those analyzers 110 that focus upon the hardware and operating system elements, as opposed to their programs, file systems, networks, etc.
  • a networking assessment focuses upon the networking aspects of an enterprise 300 , including such things as network load, network slow-down, and the conditions of the various network routers and switches.
  • a file management and storage assessment focuses upon the condition of the disk drives, the availability of space within the file system, and other such issues.
  • the assessment hierarchy available for task definition can match the assessment XML hierarchy of XML control information for the individual analyzers, as is illustrated in FIG. 25 and as is explained at a later point.
  • step 1004 selecting a tentative list of analyzers consistent with the assessment type selected.
  • the tentative list of analyzers 110 is selected automatically by the task definition system 810 and is displayed with check boxes beside each analyzer name; and then the auditor is permitted to view and to modify the list of the analyzers that will actually be processed by possibly adding some, and by possibly eliminating some that are not required or essential to a given audit. Only the analyzers with their check boxes checked are actually executed.
  • the location of the assessment is designated.
  • a region (United States, Europe, etc.) is selected, or possibly a legacy database 212 source of information is selected if real-time monitoring of the enterprise 300 to be audited is not presently implemented.
  • one or more enterprises 300 within the selected region are selected for auditing.
  • a listing of the enterprise 300 nodes 302 , etc. is automatically generated and displayed, again with check boxes, such that the auditor may go in and remove some nodes from the audit, and add other nodes to the audit.
  • the auditors enter information identifying themselves and also comments, such as a general statement of why the audit is being conducted. For example, if the customer has been experiencing certain difficulties, the auditor may wish to summarize this at this point so that the reason for the audit appears in the final report.
  • the nature of the report or reports desired is selected.
  • the auditor may only report a management summary report, or he or she may request a technical summary report. On the other hand, the auditor may wish to see all of the technical details.
  • a special marketing report indicating areas where the enterprise may be persuaded to purchase additional software or hardware, can also be generated.
  • a detailed manufacturer's report would report on the update level and versions of all the software and hardware and might contain information concerning failures that might be useful for future maintenance of the enterprise, or that might suggest the need for improvements in system component design.
  • a format for the report is also selected.
  • the text report can be generated in the form of a word processing document suitable for printing in color.
  • High-level reports might be generated in presentation format for projection and display to management.
  • An HTML report might link to underlying explanatory details from a general report.
  • the auditor 814 may wish to request that statistical information be presented in tabular, graphic, or chart form to make it easier to understand.
  • the report format will also vary depending upon the target of the report. Thus, the above report formats have assumed that humans are to receive the report. However, if the report is destined for a database, it would, of courses, be generated as an XML document suitable for simple database entry or possibly be fed directly into an SQL or other type of database. If a work flow system exists that can generate work orders for service personnel, it may be desirable to generate a machine-readable file containing information from the report that can be directly transferred into the work flow system to directly result in the scheduling of maintenance or repair. This can be done in particular for critical issues that need immediate attention.
  • a healer system facility that can go out and reconfigure or load new software onto nodes
  • a machine-readable version of a report may be generated in a format that is acceptable as input to the healer system so that such repairs can be commenced immediately. This is desirable to achieve fail-safe operation of the nodes 302 , etc. not just in mission-critical applications, but in most or all applications.
  • the present invention thus can be used as a crucial feedback link in the realization of truly self-healing systems.
  • a delivery mechanism is selected.
  • the reports may be printed, of course, or they may be e-mailed to a recipient list that needs to be supplied.
  • the Internet address of the recipient computers must be provided.
  • FIGS. 12 and 13 The analyzer creation process is shown in flowchart form in FIGS. 12 and 13, and FIG. 14 presents a list of user interface facilities which can aid in the process of creating new analyzers.
  • Appendices A, B, C and D present simple examples of the various components of an analyzer.
  • Appendix E the simple textual report that is illustrated in Appendix E. Simply stated, this report lists, for every file system volume attached to a given node, the name of the volume and, among other things, the percentage of the volume's file storage area that is filled with files. Appendices A-D illustrate the details of an analyzer that is assigned to look at the report shown in Appendix E, to extract records concerning all volumes whose occupancy level exceeds the 90 or 95 percent or that are full, and which are therefore in danger of overflow.
  • This analyzer 110 will test the numeric information on each line of the report shown in Appendix E, locate the percentage figure, compare it to 90 and 95 and 100 percent, and then generate a issue report if and only if the amount of storage occupied exceeds the 90 or 95 or 100 percent limit.
  • this issue report is generated by the analyzer within a framework environment where the analyzer does not really “know” which node 302 , etc. it is evaluating. Accordingly, the report is then embedded into a larger XML report generated by the analyzer harness 806 that identifies the node and that also includes textual messages explaining the nature of the issue which has arisen.
  • the analyzer creation process preferably begins with the content expert 812 using a word processor to prepare a textual description of the analyzer 110 , explaining what it is to do in human-readable terms.
  • This textual report appears in Appendix A for the exemplary analyzer that is designed to accept and to analyze the report shown in Appendix E provided by the collector “bdf-il” which evaluates the usage of volume storage space.
  • the expert content that is put into the analyzers covers formal and systematic knowledge that can be easily communicated and codified and is readily available (explicit knowledge) and personal information that is based on experience and learning and is often unrecorded and unarticulated (tacit knowledge) and is more difficult to formalize.
  • step 1204 the analyzer creation utilities 802 gather information identifying the content expert 812 of this analyzer 110 as well as creation revision dates and other background information.
  • the designer 812 is presented with a list of all the collectors, organized by managed element class, and is invited to select which collectors will provide input information to this analyzer.
  • a single analyzer may accept input information from one or any number of collectors 104 and may then process that information in any number of complex ways. Dozens of collector-generated node configuration files may be fed into an analyzer that may be a huge computer program written in “C” or “C++” and compiled from numerous “C” or “C++” program files under the control of a “make” file.
  • an analyzer may be a very simple program written in “java” or “perl.” To keep the example being developed here simple, the analyzer will collect information only from the collector identified as “disk usage” and assigned the identification number “100024”.
  • the designer creates one or more analyzer issue templates, which may contain placeholders for the insertion of variable information.
  • a template is illustrated in Appendix D, where three templates are preceded by template numbers. These templates contain, within their text, delimiters marking where variable information may be inserted. In this case, the variable information identifies the file system directory that has given rise to an issue.
  • the source code (with comments) for the analyzer is created.
  • a typical source code file is illustrated in Appendix B. This source code file is either compiled or interpreted or otherwise executed after having been harnessed and wrapped in a framework that provides it with the proper input information to do its analysis of a particular node. The source code file does not know the identity of the node whose configuration information it is analyzing. It simply knows that a list of file name arguments has been passed in and, from their order, it knows from which collectors those files originated.
  • the argument is a single file name, the name of a file that contains the report which appears in Appendix E and which contains information defining the identity of the attached file systems and how close their volumes are to overflowing, as has been explained.
  • a series of source files developed by a series of different collectors would be passed as arguments into the analyzer code for execution.
  • the analyzer code is written independently of any particular node, in most cases, so that the same analyzer may be used repeatedly to analyze hundreds of different nodes having thousands of different configurations.
  • the analyzer harness 806 is written in “Java,” and accordingly, “java” may be used as one of the languages in which an analyzer may be written.
  • Byte code compiled versions of such “java” analyzers are simply loaded and executed directly by the analyzer harness 806 and are passed the list of file names as an input.
  • an analyzer in the “C” or “C++” programming languages, or it may be desirable to adapt an existing program written in “C” or “C++” that is already being used for field testing to serve as an analyzer.
  • Such executable files are compiled and linked under make file control in the normal manner and are placed into operation by the analyzer harness 806 which calls a conventional operating system “shell” utility to launch such executable analyzers.
  • Such “C” or “C++” programs may be highly complex and may include a source module as well as additional code modules and a make utility for controlling compiling and linking. Provisions in the analyzer creation utilities 802 are made to include all of these analyzer file components in the analyzer database 804 and to re-compile them as needed for execution whenever changes are made to the source code, just as in a standard program development environment.
  • the analyzer may be written in an interpretable language such as perl or “kshell” rather than in “Java” or “C” or “C++”.
  • the analyzer harness 806 launches an interpreter program and passes to it the argument list containing the names of the files containing the collector configuration information that is to be processed.
  • step 1210 the present invention accepts analyzers written in “java,” “C” or “C++,” “perl,” or “kshell” and stores them in the analyzer database 804 complied (if necessary) and ready to be executed.
  • step 1212 calls upon the designer 812 of an analyzer 110 to specify which nodes 302 it is to analyze, if necessary.
  • the default is that an analyzer 110 processes all nodes 302 , and then the analyzer 110 is called upon by the analyzer harness 806 to process files generated by the collectors 104 for all of the nodes 302 , 304 , 306 , (etc.) in sequence, with the analyzer 110 being executed one time for each node with different input file argument lists provided each time the analyzer 110 runs.
  • a given analyzer may operate on a subset of managed elements, which may be specified as a collection of nodes included in a list of managed elements.
  • a given analyzer processes input data received from all nodes in a cluster simultaneously.
  • the content expert 812 having completed the process of defining the analyzer 110 , it now remains to store the information defining an analyzer 110 in the analyzer database 804 .
  • the template text (Appendix D) and the source code (Appendix B) along with the textual description (Appendix A) of the analyzer are simply stored as separate files in the analyzer database 804 and are linked to the name of the analyzer in a directory.
  • This information in the form of an XML analyzer descriptor file, is also saved in the analyzer database at step 1214 .
  • An exemplary XML file appears in Appendix C.
  • this XML file portion of the analyzer definition includes the following:
  • analyzer source text, binary (“C” or “C++”), or byte code (“java”);
  • the sources of input in the form of a list of collector names or numbers.
  • the XML file set forth here defines completely how the analyzer harness 806 is to execute a particular analyzer after it wraps in a frame and sets it to examining the information relating to a particular node or series of nodes.
  • This XML file may be thought of as a control program for the analyzer harness 806 that governs the execution of the corresponding analyzer 110 .
  • step 1216 all of the information just described is saved in the analyzer database 804 as part of the analyzer 110 definition.
  • This embodiment of the invention provides a number of optional but useful tools to the analyzer designer in the form of user interfaces and utilities. These are listed in FIG. 14:
  • a general utility facilitates the creation of new analyzers and the modification or deletion of existing analyzers at 1402 and is similar to such tools provided in any program development environment.
  • an XML descriptor creation utility 1404 When one is done entering the information concerning an analyzer, an XML descriptor creation utility 1404 generates the XML file, such as that illustrated in Appendix C, automatically.
  • Managers are provided at 1408 for program source code, auxiliary source code, and make files that are similar to those to be found in any general purpose program development environment. Additionally, a manager is provided to assist in creating template text files, such as that shown in Appendix D, which includes provision for embedding variable space holders into such a text file. For example, an analyzer might pull out of a collector document a piece of information and then arrange for the information to be inserted at the variable insertion point within such a text-file template, so that the template contains node-specific information in addition to background boilerplate information defining a given issue.
  • a collector search facility 1410 that facilitates searching through collectors both by the Unix or other command assigned to a collector (for example, “bdf”) and also by the logical names and numbers assigned to a collector.
  • a simple analyzer development environment which encapsulates an analyzer in a framework and provides it with live sample information obtained from editable stored samples of collector output files input so that a prototype analyzer may be tested in a safe environment to see how it performs.
  • a particularly useful tool is one that facilitates the creation of the lists of collector output configuration information files that are fed into the analyzers as their information input and that helps the designer to arrange the names of those collector output files in the proper order expected by the analyzers.
  • This facility 1414 presents, in tabular form, a vertical list of analyzers on the left and a vertical list of collector reports on the right, and it permits one, by clicking the mouse, to connect each analyzer to one or more collector reports, and to indicate by the ordering of those connections the order in which collector reports are to be fed into each analyzer as arguments that are passed to an analyzer each time an analyzer is executed.
  • Another useful utility simply provides the designer with views of sample collector reports at 1416 . Since the analyzers must go into those reports and extract text from the middle of the reports using programming commands, it is essential that the designers of the analyzers have access to sample reports so they can see how the text is positioned and then come up with the proper text extraction code for cutting excerpts out of the reports for analysis and for possible inclusion in the issue statements. In the future, the framework will parse the information and the analyzers will just receive the piece of information they need to do their analysis.
  • a manager is provided that groups analyzers into logical groups and thereby permits analyzers to be assigned to a particular assessment type.
  • This tool facilitates the arrangement of analyzers such that when an auditor 813 performs task definition using the system 810 , the auditor 813 may make an intelligent decision at step 1002 (FIG. 10) as to what task is to be performed and come up with an appropriate set of analyzers, which may be modified at step 1004 as has previously been explained.
  • FIGS. 16 - 18 illustrate in flow chart manner the process of creating template reports and also the rules that govern the assembly of templates and that perform a high-level analysis of the issues identified by the individual analyzers.
  • the ability of the system to generate readable, meaningful, summary management reports largely depends upon this portion of the system.
  • a third-party program for example, Crystal Reports or BusinessObjects
  • This program includes analysis tools that can examine trends, expose relationships, and zero in on important facts. It thus combines rules and report templates into a single “batch” oriented report generator that can be driven by the issues database transferred from XML file form into a Microsoft Access database system.
  • Other rule and template based report generators can also be used, such as “Crystal Reports” (from Krystal Decisions, Palo Alto, Calif.), “Business Objects” (from Business Objects Americas, San Jose, Calif.), or “Caps Author” and “Hot docs” (from Capsoft Development Corporation, Provo, Utah).
  • the report templates themselves can embed the rules internally and create the desired reports directly from the XML file, avoiding the database entirely.
  • the incoming information is presumed to be in some form of a database.
  • the database is Microsoft's Access database program.
  • the XML issues file is simply read and its contents are fed directly into Access.
  • the XML issues file itself can act as the database.
  • the template documents designed in accordance with the report generator specifications, contain large amounts of boilerplate or background text. They may also contain embedded commands analogous to the programming language commands “if”, “else”, and “end if” which are used in programs to select which sections of code are to be executed or to be skipped over or performed in the alternative. In the case of document templates, these same types of commands determine which text ends up in a report and which boilerplate text is cut out and left on the cutting room floor.
  • Such report generators also provide for the generation of repetitive passages through the use of commands analogous to the “repeat” and “end repeat” language commands found in programming languages.
  • templates may contain various types of placeholders for expressions which are evaluated and then inserted into the boilerplate to become part of the finished report.
  • the first step at 1602 is to make available to the author of the report the symbolic names of the analyzer output information that is to be used both embedded into the report templates and also to control report template boilerplate selection. These information values necessarily come out of the analysis system.
  • Appendix F Part 2 of Appendix F presents the XML information output that comes from issues detected through the execution of analysis programs on configuration information gathered by collectors. This information structure is transferred into a Microsoft Access database from which the values can be retrieved using identifiers the same as or similar to those which appear in the XML information structure.
  • the author needs to be provided with sample issue reports of the kind shown in Part 2 of Appendix F for each and every one of the available analyzers and for each and every one of the issues that each such analyzer is capable of reporting.
  • This information enables the template and rule author to come up with a set of rules which can analyze and summarize the issues database 112 information as well as pick up detailed information from there and incorporate it into any arbitrary type of report that may be necessary or desirable.
  • step 1604 the author develops a set of rules that can review the overall performance of an enterprise 300 .
  • the author clearly, must be an experienced enterprise technical expert who knows what to look for in the issue information generated by a large computer enterprise installation and who knows how to write rules that will perform the same types of analyses that the expert himself or herself would have performed in person had they been able to go to the enterprise site.
  • the expert then moves on to develop a management summary report template that states, in a readable form, the general state of the system.
  • This report ideally should be readable by lay individuals, such as the chief operating officers of the company that owns and manages the enterprise. It should point out general problems, and it should then give examples of why these problems merit the attention of management. It may then provide general overview suggestions as to how those problems should be managed.
  • Built into this report is clearly the experience of an expert in enterprise system design and management. It may present cost estimates for configuration changes that can improve enterprise performance.
  • an additional template can be developed which produces a completely detailed presentation of all the specific issues for each of the nodes or groups of nodes that were analyzed.
  • this report may include reasons why certain issues need to be addressed, costs of implementing changes, and possibly a detailed explanation of these issues, which may be through a hypertext linkage to other documents. Snippets of the actual collector configuration information may be included, as needed, to clarify an issue.
  • step 1612 it is desirable to develop a variety of master report templates intended for differing audiences and business needs that include varying combinations of the reports just described, as well as possible additional introductory and explanatory reports hyperlinked to background information.
  • a single report may contain multiple parts destined for different individuals and may be printed and delivered as a unit to the owners and managers of an enterprise.
  • the report generation process triggered by the auditor 813 , is carried out by the report generator 206 which, in this embodiment of the invention, is the program “Crystal Reports”.
  • the report generator 206 receives a list of reports from the assessment task 814 and begins by calling forth from the report template and rules database 204 the templates and rules needed for generating the desired reports, at step 1902 .
  • the report generator 206 goes to the (XML) issues database 112 and obtains the necessary XML issues information that was generated by the analyzers 110 , and it transfers this information content into a Microsoft Access database for convenient access and retrieval by the report generator 206 .
  • the report generator 206 may read this information directly into memory from the XML file.
  • the report generator 206 also obtains from the task definition system 810 additional information about this audit, its author, and so on and transfers this information into the Access database for convenient retrieval by the report generator 206 .
  • the report generator 206 again at the direction of the task definition system 810 , may obtain directly from the tracker database 106 background information on the specific enterprise and nodes being audited for inclusion in the reports, placing this information into the Access database along with the rest.
  • the list of enterprises, the list of nodes and the list of analyzers in the assessment task 814 can be added to the Access database and included in a report at an appropriate place.
  • the program operates in batch mode as a template and rule processor controlled by the templates and rules and by the content of the Access database to generate all the necessary and required reports.
  • FIG. 15 presents, in program flowchart form, the steps executed by the analyzer harness 806 and the analyzers 110 to illustrate in general terms how the individual analyzers are called upon to process information provided by the individual nodes. (FIG. 15 does not address the task of describing the complex interactions that occur between the individual analyzers and analyzer harness 806 .)
  • FIG. 21 presents a software element block diagram that illustrates the precise relationship which exists between the three subcomponents 2102 , 2104 , 2106 of the analyzer harness 806 and the various types of analyzers 2110 , 2112 , and 2114 supported in the present embodiment of the invention.
  • FIGS. 22 - 24 present a flow diagram of the steps that are carried out by the analyzer harness 806 components illustrated in FIG. 21, addressing the issue not addressed by FIG. 15.
  • the information processing operations carried out by the analyzer harness 806 are shown in a conventional software flow diagram.
  • the process begins at 1502 when the task definition system 810 passes to the analyzer harness 806 the assessment task 814 that lists the enterprises, nodes, and analyses which are to be performed. This enables the analyzer harness 806 to set up a triple set of nested loops, as shown, branching back at step 1522 after each node is processed, after each analyzer is processed against every node, and after each enterprise is processed.
  • the overall process begins at step 1504 when a first enterprise 300 is selected. Then at step 1506 , a first analyzer 110 is selected. Next, at step 1508 , the definitions of the analyzer and information concerning how it is to be executed (see Appendices B and C) are retrieved from the analyzer database 804 along with the template (Appendix D) containing issue messages for the analyzer. Next, at step 1510 , the names of the collectors designated by that analyzer in the analyzer's XML descriptor (Appendix C) are collected as an indication of where the input information is to come from. At step 1512 , if the analyzer is computing a trend over time, then a designated set of times and dates or range of times and dates are also picked up.
  • Program control then commences at the step 1514 , and the steps 1514 through 1522 are repeated for each node 302 , etc. that is to be analyzed by this particular analyzer.
  • step 1516 the names of the designated collector report files for this particular node are retrieved from the tracker database 106 and are listed as input arguments to the analyzer's execution. Then on step 1518 , the analyzer code is actually executed in the context of the collector reports provided in this input argument list. At step 1520 , if any issues or failures arise, the analyzer generates small XML reports and returns them to the analyzer harness 806 which augments them with information such as the name of the node and the template issue text (See Appendix D). Looping then proceeds from step 1522 until all of the nodes are processed by this analyzer.
  • the analyzer harness 806 moves on to the next analyzer and repeats steps 1506 through 1522 until all of the analyzers have been processed. It moves on to the next enterprise and repeats the steps 1504 through 1522 until all of the enterprises have been processed, if there is more than one.
  • step 1524 the analyzer XML output report is stored as a file in the (XML) issues database 112 .
  • FIG. 21 a detailed illustration of the structure of the analyzer harness 806 is presented that illustrates its relationship to the analyzers and also illustrates how the various different types of analyzers are processed. This figure will be discussed in the context of the flowchart of analyzer harness operation presented in FIGS. 22 - 24 .
  • the analyzer harness 806 is shown to have three major components.
  • An analyzer loader 2102 is the primary component that manages the loading and execution of the analyzers during the processing of configuration information. This analyzer loader 2102 calls upon an analyzer descriptor 2104 to obtain from the analyzer database 804 the XML information for a particular analyzer 110 and to put that information into a database from which the analyzer loader can have easy access to it as it determines how to harness and encapsulate into a framework a particular analyzer 110 that is to be executed.
  • the analyzer loader 2102 also calls upon an argument manager 2106 to reach out into the tracker database 106 to find collector reports 2108 and to arrange for those reports, or the file names for those reports, to be passed as incoming arguments to the analyzers 110 when they are executed by the analyzer loader 2102 .
  • the loader 2102 being written in “java”, executes “java” executable analyzers 2110 directly. It calls upon a standard operating system “shell” utility to execute analyzers 2112 written in the “C” or “C++” programming languages. It calls upon an operating system interpreter to interpret and execute analyzer written in “perl” or “kshell” or other interpretive languages 2114 .
  • the output of an analyzer is shown to be an XML output at 2124 which is generated by special XML output sub-routines 2116 that are called by the analyzer 110 regardless of its form to generate XML “issues” output messages and also error output messages.
  • the output 2124 does not include identification of the relevant node, nor does it include textual information about an issue, since that information is not available to the analyzers 110 when they are executing.
  • the analyzer loader 2102 accepts the XML output of the analyzers 2124 and generates an expanded XML report 2126 that include the issue defining language taken from the analyzer issue templates 2122 as well as the identification of the node being processed and also the name of the assessment task 814 .
  • the analyzer loader 2102 receives the name of an analyzer 110 that it is to load and process. This corresponds generally to the step 1506 shown in FIG. 15.
  • the loader passes the name to an analyzer descriptor program 2104 .
  • the analyzer descriptor program 2104 locates and reads in the corresponding XML database for the analyzer (see Appendix C) and thereby creates in its own internal information structure an analyzer descriptor object which is passed back to the analyzer loader 2102 .
  • the loader 2102 next calls upon the argument manager 2106 to retrieve from the tracker database 106 the appropriate collector reports for the collectors designated in the descriptor object for a particular node (designated in step 1514 of FIG. 15).
  • the collector reports 2108 are identified by file name, and these file names are organized in order as an input argument list for the analyzer 110 to read these files in order and process them.
  • the file names are passed back to the loader 2102 .
  • the analyzer loader 2102 calls upon an appropriate entity to execute the analyzer 110 in accordance with the nature of the analyzer, passing the list of file names as an input argument.
  • step 2210 if the analyzer is written in “java,” then it is simply called as a “java” subroutine, and it is passed the input list of file names as an input argument at 2212 . If the analyzer is not written in “java”, then step 2214 checks to see if it is interpretable. If so, then an appropriate interpreter for “perl” or “kshell” is run at step 2218 , and again the input argument list of file names is passed to the interpreter as input for the execution of the analyzer 110 .
  • an operating system “shell” utility is called upon to launch the executable analyzer program, again providing it with the list of file names as an input argument to the executing program.
  • the analyzer 110 performs its tests and thereby checks to see if any issue reports need to be generated. If so, or if any errors occur, the analyzer calls upon special routines 2116 that normalize the analyzer output as XML structures such as that shown in Part 1 of Appendix F.
  • the issue list or failure list XML output (See Sample 1 in Appendix F) is captured and is returned to the analyzer loader 2102 in the form of an XML output 2124 .
  • the analyzer loader 2102 expands the size of this XML output by adding to it information defining the name of the node 302 from which the collector configuration information came, the name of the assessment task 814 launched by the auditor 813 , and other such background information.
  • the analyzer loader 2102 also retrieves the analyzer issue templates 2122 (Appendix D) for this analyzer from the analyzer database 804 and from this set of templates retrieves, by number, the particular text template that identifies and corresponds to the particular issue which triggered the XML output. If there are any variable space holders in that text template, the analyzer loader 2102 looks to the XML output 2124 to see what value is to be inserted at that point, and it inserts the value into the template, transforming it into an issue message. The analyzer loader 2102 then generates a new segment for a growing output XML report 2126 that includes all of the above added information added to the analyzer XML output 2124 . A sample of such a report can be seen in Part 2 of Appendix F.
  • the analyzer loader 2102 then proceeds on to the next node at step 2224 and continues until all of the nodes have been analyzed by this particular analyzer 110 . It then proceeds to the next analyzer 110 at step 2226 and thereby continues until all of the analyzers have been processed against all of the nodes.
  • the XML report 2126 is then stored in the (XML) issues database 112 where it is made available to the report generator 206 , as has been explained.
  • An analyzer as described above, consists of four parts: A textual description of the analyzer and its functions (See Appendix A), the source code of the analyzer 2120 (See Appendix B), the template 2122 text which defines the issues of an analyzer (See Appendix D), and an XML file that defines, for the analyzer harness 806 , how the analyzer is to be processed and what information it requires.
  • the analyzers 110 may be organized hierarchically to correspond to various broad and narrow arrangements or sets of managed elements within a given enterprise.
  • the assessment tasks are defined, the assessment types are broken down into overall, hardware/operating system, networking, file management and storage, and so on. These assessments each correspond to a particular set or collection of managed elements.
  • These sets can be still further subdivided.
  • the file system can be broken down into logical volumes, file system usage analysis, and logical volume management.
  • hardware may be broken down into memory, CPU, and other categories. Networking can be similarly subdivided.
  • an XML control file can be created which includes, as its base or lowest elements, all of the links to the analyzer XML definitions of other sub-components of an audit contained in the analyzer database 804 .
  • This XML file might include, as its main heading, “Enterprise”, or some such general title; and it might then have links to the XML files for secondary headings such as “Operating System”, “File System”, and so on. Then each of these subheadings could be linked further to sub-subheadings, and so on such that many different possibilities for audits through various collections of managed elements of the enterprise can be contemplated.
  • This XML file becomes a major tool for controlling the operations of the analyzer harness 806 , causing it to do a particular auditing on a particular collection of managed elements. No changes will be needed by the framework to handle these multiple combinations of assessments when this is implemented. The only changes that are needed involve the set of analyzer/heading definitions contained in the XML files which can be swapped in and out without affecting the framework.
  • the task definition system 814 is modified such that at step 2602 (which replaces step 1002 in FIG. 10) one merely specifies a desired assessment type in the outline structure defined by the large XML structure 2502 shown in FIG. 25.
  • This task assessment type corresponds to a set of managed elements which correspond to a subpart of the XML hierarchy shown in FIG. 25 and which contains all the analyzers 110 for the set of managed elements.
  • XML data 2118 for the “Disk Usage” analyzer appears beneath “File System”, “Logical Volumes”, and “File System Usage Analyses” in the exemplary XML structure shown symbolically at 2502 in FIG. 25.
  • step 2604 which replaces step 1502 in FIG. 15
  • the analyzer harness 806 then carries out these assessments automatically, covering as much or as little of the system hardware and software as the auditor desires to have covered in any given analysis operation, controlled entirely and continuously by the XML structure of FIG. 25 and by that portion of this structure which the auditor has designated for execution.
  • this embodiment of the invention includes a number of additional analyzers which are described below as examples of the many possible analyzers that can be created. Clearly, many other types of analyzers can and should be developed.
  • This analyzer checks to ensure that there are both a primary boot disk and an alternate boot disk. Further, this analyzer checks to ensure that the primary boot disk and the alternate boot disk are not installed on the same hardware path. Thus, an issue is flagged when there is a primary disk installed without an alternate disk. Also, an issue is flagged when the primary and alternate boot disks are installed on the same hardware path.
  • This analyzer inspects the MC/ServiceGuard timing parameters for accuracy and supportability. The following issues are flagged: an issue is flagged when the value of NODE_TIMEOUT is set to the default value, which is typically two seconds; an issue is flagged when the NETWORK_POLLING parameter is configured to be greater than or equal to the NODE_TIMEOUT parameter; an issue is flagged when any of the values of HEARTBEAT_INTERVAL, NODE_TIMEOUT, AUTO_START_TIMEOUT, and NETWORK_POLLING_INTER-VAL is set below a predetermined value, which predetermined value is typically a time less than or equal to one second; and an issue is flagged when the value of the NODE_TIMEOUT is set to less than at least twice the value of the HEARTBEAT_INTERVAL parameter.
  • This analyzer checks the installed MC/ServiceGuard version on all nodes and ensures that the latest version is installed for a specific release of HP-UX (Hewlett-Packard Company's version of Unix) and that it is the same on all nodes in the cluster. An issue is flagged when MC/ServiceGuard does not appear to be installed, when there is a newer version of MC/ServiceGuard available for the operating system, or when any node in the cluster is running a different MC/ServiceGuard release than the others.
  • HP-UX Hewlett-Packard Company's version of Unix
  • This analyzer checks the configuration of the packages within a MC/ServiceGuard cluster. An issue is flagged when the default package subdirectory does not exist, when the package switching is disabled, or when separate package control run and halt scripts exist for the package.
  • This analyzer checks to determine whether or not the MC/ServiceGuard daemon(s) are running. Using a daemon, a program can simply hand off data to a smaller program and go on to other work. Where the MC/ServiceGuard daemon ‘cmcld’ is not running on the node in the cluster system, an issue will be flagged.
  • This analyzer checks the MC/ServiceGuard cluster status, node status, and package status. An issue will be flagged if: the cluster is down, the cluster is running on a subset of the nodes, one or more packages of the cluster are not running, global package switching is disabled, a package has node switching disabled for one or more nodes, a package is not running on its primary node or when no alternative node is available to which the package can be switched.
  • This analyzer checks the configuration of the MC/SwitchGuard cluster for correct configuration. An issue will be flagged when: the ASCII (American Standard Code for Information Interchange) configuration file is not found at the default location and/or with the default name, when the ASCII configuration file does not correspond to the binary cluster configuration file, when the ASCII cluster configuration file is not the same on all nodes in the cluster, when the binary cluster configuration does not exist on one or more nodes in the cluster, when the binary cluster configuration file is not the same on all nodes in the cluster, or when incorrect ownership and/or permissions exist on the binary cluster configuration file.
  • ASCII American Standard Code for Information Interchange
  • This analyzer verifies that the root volume is mirrored at least once, ensures that each mirror is bootable, ensures that an entry exists in /stand/bootconf for each mirror, and checks for single point of failure related to the boot disks. An issue is flagged when: there is no mirror found for the root logical volume, the boot mirror device is missing from /stand/bootconf, there is a non-bootable mirror of the root drive, there is a primary boot disk installed without an alternate disk, or the primary and alternate boot disks are installed on the same hardware path.
  • This analyzer extracts information from the CPU (Central Processing Unit) hardware logs of each processor installed in the system.
  • CPU specific information gathered includes the number of processors installed, PDC (Processor Dependent Code) revision level, the hardware model number (translated into English for the report), the processor chip revision, and the slot number in which the processor(s) are installed.
  • the analyzer gathers HPMC (High Priority Machine Check) error information specific to the CPU, Memory, and I/O (Input/Output) error logs. Also, the analyzer identifies that the processor fast boot status flag has been set, which indicates that the memory self-test has been disabled during the system self-test portion of the PDC boot code.
  • Processor chip revision is gathered, and may be used to proactively identify processors associated with class problems and/or known defects. An issue is flagged when: the processor PDC revision level is not the latest supported revision, a valid HPMC exists in the hardware logs, a valid memory error exists in the hardware logs, a valid fatal I/O error exists in the hardware logs, or if the fast boot flag has been set.
  • This analyzer checks for the existence of single and double bit errors in the hardware logs, and also verifies the number of available entries in the page allocation table (PDT). An issue is typically flagged if: a single-bit memory error exists and its count is greater than or equal to 1000, a double-bit memory error exists and its count is greater than or equal to 1, or the number of PDT entries used exceeds 50% of the PDT total size, which by default is set to a maximum entry value of 50.
  • This analyzer does basic tests on the LVM (Logical Volume Management) configuration such as comparing the content of /etc/lvmtab with the output of the lvm (logical volume management) commands in order to find volume groups, or physical volumes not activated or incoherencies. Also, it may run basic checks for each volume group, physical volume or logical volume.
  • LVM Logical Volume Management
  • This analyzer verifies the data reported by lvlnboot. “lvlnboot-v” displays the root, boot, swap and dump lvm configuration of an LVM enabled boot device. An issue is flagged if no dump device(s) has been configured.
  • the analyzer may, where desired, verify Boot, Root, and Swap also.
  • This analyzer verifies that standard and backup kernel files are in place. An issue is flagged when: a standard kernel file is not in place, a standard backup kernel file is not in place, or a standard kernel could not be identified as a kernel.
  • This analyzer compares and displays differences between kernel parameter settings for a list of hosts. An issue is flagged if some kernel parameters have different values.
  • This analyzer analyzes general errors and I/O error entries in the command line Support Tool Manager, i.e.: CSTM-logfile.
  • CSTM is an online support tool platform which operates under the control of the hp-ux Operating System. It provides automatic configuration mapping, a set of device verifiers, exercisers, information modules, expert tools, utilities, and firmware update tools for the system components and peripheral devices that are installed on hp-ux systems.
  • the I/O error entries are part of the CSTM information module.
  • the I/O error entries log specific device performance information for devices and system components which are exhibiting abnormal operational behavior.) The issue will typically be flagged if: the number of uncorrectable errors logged for a DLT or DDS tape drive device is greater than or equal to one, it has been less than 30 days since the data and time of the last entry in the formatted raw logfile (if not flagged, the analyzer is aborted), the number of overtemp entries is greater than or equal to one, the number of I/O error entries for the system components or peripheral devices is greater than or equal to ten, or the number of LPMC (Low Priority Machine Check) entries is greater than or equal to ten.
  • LPMC Low Priority Machine Check
  • An LPMC is a recoverable error in the Main Memory of CACHE components of the CPU.
  • PDC Processor Dependent Code
  • An LPMC is a recoverable error in the Main Memory of CACHE components of the CPU.
  • PDC Processor Dependent Code
  • a combined interaction between PDC and the hp-ux Operating System identify the type of recoverable error that occurred, triggers PDC code to execute a hardware retry to fetch critical data from the supplying hardware component and reinsert the date into the component at fault, to log the event that occurred, and then to re-initiate normal system operation.
  • the LPMC is therefore a mechanism which provides a “hardware retry” of certain processor and memory errors which are not classified as fatal.
  • This analyzer is capable of analyzing, detecting, and reporting the presence of system hardware abnormalities and I/O errors.
  • This analyzer checks the file systems in /etc/fstab for problems and checks whether they are correctly configured. An issue will be flagged if: a file system listed in /etc/fstab is not mounted, a file system is mounted that is not included in the /etc/fstab file, there is a conflict in the file system mount order, or a CDFS (CD file system) file system is mounted via /etc/fstab.
  • CDFS CD file system
  • This analyzer verifies the firmware revision of all devices with write-able firmware that are installed in, and attached to, the system, including: internal and external SCSI (Small Computer Systems Interface) hard disks, disk array controller modules, internal array SCSI disk modules, and the status of fans, power supplies, batteries, DRAM (Dynamic Random Access Memory), and NVRAM (Non-Volatile Random Access Memory) on array controllers and array chassis. Also, where desired, this analyzer may be used to verify that each device is a supported Hewlett-Packard Company product.
  • the FIRMWARE ANALYZER typically flags an issue if: the product is not a supported Hewlett-Packard Company product, the firmware revision of the disk is not the current release, there are read, write, verify or non-medium errors logged on a SCSI disk and the number of errors is greater than or equal to one, if there is a bad status for an array fan, power supply, battery, DRAM, or NVRAM, or if the disk array is a Model 12 Hewlett Packard Company (“HP”) product. Unlike older models of HP arrays, the Model 12 can operate properly with internal SCSI disk modules that do not contain the current revision of device firmware. This is accomplished by the array controller firmware which is a separate hardware component from the internal disk modules. If the analyzer detects a Model 12, it performs only checks on the array controllers and aborts the firmware checks on internal disk modules.
  • This analyzer checks that the file system pass number parameters are correctly configured and supportable. An issue is typically flagged if: the file system check pass number is set to zero, the file system check pass number for the root file system is set to zero, the file system check pass number for non-root file systems is set to one, the file system check pass number is missing, identical pass numbers for file systems are on the same disk drives, or file system check pass numbers are not optimized for parallel fsck (file system check).
  • This analyzer checks that the file system used by savecrash is large enough. An issue is flagged when no dump device is configured or when the file system too small for a dump. The size of the file system that may be used to save the dump is checked, taking into account a compression of 75% if compression is enabled, and a kernel of 80 Mb. The calculation is made on the worse case based on total memory size.
  • This analyzer captures system error messages from dmesg (a UNIX command that displays the contents of a circular buffer that contains diagnostic information). Also, this analyzer verifies that there is support for capturing the dmseg output incrementally to ensure that none of the system buffer information is lost. If the support for capturing this information exists, the analyzer verifies that it is configured correctly.
  • An issue is flagged if: there is no entry in the crontab file (a configuration file to schedule tasks in UNIX to run commands at specific times) to incrementally capture the dmesg output, if there is an entry in the crontab to capture the dmeswg, but it is not being written to the default location, there is an entry in the crontab to capture the dmesg, but the interval to collect it is greater than a predetermined recommended value, or there is an entry in the crontab to capture the dmesg output, but the execution of the dmesg command does not capture the incremental changes.
  • the crontab file a configuration file to schedule tasks in UNIX to run commands at specific times
  • This analyzer checks whether or not online diagnostics have been installed and are running. An issue will be flagged if: the online diagnostics are not installed completely, one or both diagnostic daemons (Diagmond and Memlogd) are not running, or the version of diagnostic software is not the latest released revision.
  • This analyzer is one of the required checks which, when combined with the other appropriate analyzers, will ensure that the system is configured correctly to perform a successful system dump. An issue will be flagged if: the system dump device(s) fail to have adequate space to hold the system dump, or the minimum necessary classes have not been enabled in fastdump.
  • This analyzer checks the internal processor hardware logs and reports on the status of the CPU fans, power supplies, and CPU processor module deconfiguration.
  • the de-configuration state of a processor module is archived in the internal processor hardware logs.
  • the possible states are “C” which indicates the processor module is configured and operating normally, and “D” which indicates the processor module has been de-configured by the PDC as a result of the occurrence of a PDC detected hardware error.
  • There is an additional subset of the de-configuration status flags (RS) which monitors if the CPU processor module has been de-configured by the PDC as a result of a recoverable non-fatal hardware error, or if the CPU processor module has never been reconfigured by the PDC after physical replacement.
  • the RS flag indicates that the state of the processor is currently de-configured, but is pending reconfiguration and activation by physically restarting the system. Since it is possible for multiple CPU processor modules, fans, and power supplies to be installed in a CPU chassis, the physical location of each failed component is also reported.
  • An issue will be flagged if: the CPU processor modules that are installed have a “D” status bit set, if the CPU processor modules that are installed have both “D” and “RS” status bits set, if the “F” (failed) status bit for a cabinet fan failure is set, or if the “F” status bit for a cabinet power supply is set.
  • the “D”, “RS”, and “F” status bits will only be set by the PDC if the CPU module, fan, or power supply is physically installed in the system processor chassis.
  • This analyzer verifies that the boot configuration scripts in /etc/rc.config.d have optimal configuration for an HA (High Availability) system. Where desired, this analyzer may only check the crashconf and savecrash configuration, but it is desirable to check all boot scripts. An issue will be flagged if: crashconf is not configured to run, savecrash is not configured to run, savecrash is not configured to run in the foreground, at least one dump device fails to be configured, the dump devices fail to be large enough for a full dump, the dump devices fail to be large enough for a dump, or the dump devices are unable to hold all physical memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A method is provided for auditing the configuration of an enterprise comprising the steps of: collecting information relating to the configuration of the enterprise, analyzing the configuration information based on expert knowledge; and providing the result of the analysis in the form of reports, and other results of the analyses.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation-in-part of application serial number 09/851,963 filed on May 10, 2001. This application incorporates by reference U.S. Pat. No. 6,148,402 which issued on Nov. 14, 2000 to Randall B. Campbell and which is owned by the same assignee as the present application.[0001]
  • FIELD OF THE INVENTION
  • The present invention relates generally to the field of auditing a configuration of an enterprise, and more particularly, to a method and system for analyzing the configuration information of an enterprise based on expert knowledge. [0002]
  • BACKGROUND OF THE INVENTION
  • The core business of companies today is more and more dependent on information technology (“IT”) services. As such, the impact of outages or interruptions in service is more and more significant. Businesses therefore require continuous operation of an infrastructure or system. Because of this requirement, an infrastructure that is “always on” is becoming the norm rather than the exception. The technology underlying that infrastructure must be configured to maintain continuous and optimal operation (configured “always right”) of that infrastructure. [0003]
  • To obtain optimal configuration, a company may desire to perform an audit of the configuration of its infrastructure. The infrastructure may, for example, include a cluster configuration consisting of three nodes. In general, a cluster configuration is a group of nodes that are arranged to “back up” and substitute for the execution of a program in the event a node is unable to execute that program or the node is unavailable. This company may perform the audit or may typically hire an outside company firm to perform the audit. In this example, the audit usually involves the following five steps: [0004]
  • Resources—finding someone with the right skill level to do this system configuration audit. [0005]
  • Configuration—looking at a complex enterprise configuration either directly or by collecting all the relevant configuration information needed for the investigation. [0006]
  • Analysis—coming to conclusions. [0007]
  • Reporting—documenting the findings and presenting this information to a company requesting the audit. [0008]
  • Action Plan—creating an action plan to address the issues found. [0009]
  • Unfortunately, there are several issues or problems along the way that need to be overcome to make a successful audit. [0010]
  • Resources. A company must find the right personnel. To audit a system configuration a person requires practical experience with the underlying technology. The successful candidate must have sufficient technical and professional skills along with practical experience. Typically, no single person possesses expertise in all required areas. Time and money constraints limit the number of resources on an audit activity, limiting in turn the content of the delivery (depth, breath, . . . ) and also the quality. The audit may come to a halt if multiple people decide to change jobs. High turnover usually translates into a knowledge drain unless such knowledge is documented. In the event of a departure, a company must invest in training which is time consuming. This is no guarantee that the company actually captured the knowledge and expertise of the departing employee. This knowledge is an asset to the company that is lost forever. Not only must this knowledge be captured and kept, but it must also be utilized effectively. It must be accessible, and automatic access is highly desirable. [0011]
  • Configuration. The next issue concerns how to obtain the configuration information. In some circumstances the information has been previously obtained. However, this configuration information may likely be in a format unusable for analysis. In the absence of this information, it must be retrieved. In the event the audit is being performed by an outside company, manual interaction with a customer's system should be avoided even if the customer permits access. There is a risk that the interaction may cause a problem with the customer's platform. The customer will likely blame the outside company for problems with the system regardless of fault. [0012]
  • Today, there are software tools available for the collection of configuration information. If such a tool was developed locally, reliability and maintenance is a concern largely because such tools are incomplete when they are developed. Also, the quality of a local tool will be limited by the local expertise. [0013]
  • The tools described require installation on a customer system which may make the system unavailable or may cause it to crash. In addition, the customer may challenge the reason why he/she requires the tool to be installed on his/her systems. Customers with rigid change management in place will not allow the installation of any tools on short notice. [0014]
  • Analysis. Even if one is successful collecting configuration information, there are other obstacles. The analysis performed at the customer site will likely require multiple visits. This is valuable time lost. In addition, there are typically limited available resources on-site. Further, analysis typically requires the application of several analyzers to identify issues. Then there is the question of what parts of the node must be checked or analyzed and what issues should be identified. Both questions are typically answered by a single individual. Because of the limited knowledge of that individual, the system checks and issues identified may not be fully exhaustive. It is important, however, to rely on a well defined list of items to be checked and criteria of satisfaction to ensure a reliable and stable environment. It would be advantageous to use input from multiple sources of expertise, but this is rarely ever practical. [0015]
  • As it concerns a cluster configuration, the analysis of the configuration is not limited to the individual systems. In cluster configurations, differences between system or node configurations (e.g., installed software, memory size, kernel configuration, etc.) are important. Therefore, the nodes in a cluster must be compared against each other. With no tools in place to do this, it will be a manual effort to extract certain configuration information and possibly to write scripts to do a comparison and provide the results in a presentable way. This is a laborious and time consuming process, but a necessary task. [0016]
  • Reporting. If the analysis is accomplished and a list is generated identifying issues (problems) with the cluster configuration, there are still other obstacles. The issues identified are not organized in any logical way or according to customer requirements. Information should be sufficient to provide an adequate description that is to the point, professional and accurate, and that caters to different audiences (technical & non-technical). [0017]
  • More information may be included as desired. Descriptions in the reports, however, may reflect an individual's personal vision as opposed to a company's uniform recommended practice. This will result in inconsistencies among deliverables, sending mixed messages to customers. Further, it is also important to assign the correct description to each piece of information. This would appear obvious but becomes less so when handling similar pieces of information for different systems. [0018]
  • Now, the report presented should be consistently formatted. Technical personnel should not have to spend their time writing reports, when their technical skills may be used in better ways. This would therefore require additional resources for personnel skilled in technical writing. Further, the reports must cater to the audience requesting the audit. The audience may include technical and non-technical management, sales people, and many others. A system is desired that is capable of crafting different reports, with the results of the analysis in accordance with an auditor's request. [0019]
  • Action Plan. Typically, the company performing the audit must prepare an action plan to resolve the issues that were determined. If the company does not act aggressively, the company may lose the business. However, in many situations, the company may have little assistance available from the audited company for the creation of an action plan. The preparation of the action plan is facilitated when a scenario is available with the steps to resolve a specific issue, together with the means to find additional reference material. [0020]
  • In summary, in today's world, companies are relying more and more on their IT systems for core parts of their business. This produces ever increasing requirements for reliability, availability, scalability, and performance. Therefore, companies are increasingly becoming more demanding because the consequences are severe when their IT systems suffer downtime. Also, the speed at which things are done is increasing, and accordingly the turnaround time for consulting deliveries is decreasing. [0021]
  • It would be desirable to provide an automated system that overcomes the disadvantages described above. [0022]
  • It would also be desirable to achieve an automated system that performs a complete audit of a system configuration generating the necessary and desired audit reports automatically. [0023]
  • SUMMARY OF THE INVENTION
  • Briefly, the present invention comprises, in one embodiment, a method of generating a variety of reports descriptive of issues arising in monitored nodes of an enterprise or group of nodes. The method comprises the steps of analyzing node-specific information derived from one or more nodes, guided by rules of analysis, to detect the presence of one or more issues; presenting at least some issue identification information together with node identification information; providing several report template and/or rule sets each set defining the organization and contents of a class of reports; and then, using two or more of these report templates and/or rule sets as a guide, and also guided by enterprise, node group, and/or node information that includes at least some of said issue and node identification information, generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences. [0024]
  • Another embodiment of the invention is a system that generates a variety of reports descriptive of issues arising in the monitored nodes of an enterprise or group of nodes. This system comprises several analyzers which, when presented with data derived from a node, and when exercised under the guidance of rules of analysis, analyze the node data and generate output data signaling the presence of one or more issues indicated by the analysis. The system further comprises a harness which exercises at least some the analyzers, providing them during each exercise with data gathered from a different node or group of nodes, and that presents issue data generated by an analyzer together with data identifying the node or group of nodes where the issue originated, to thereby generate an issues database. The system further comprises report templates and/or rule sets each defining the organization and contents of a class of reports. And it also comprises a report generator, guided by two or more report templates and/or rule sets and by data retrieved from the issues database, through the process of generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.[0025]
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 presents an overview block diagram of an enterprise analyzer system that periodically collects information from the nodes in an enterprise, analyzes that information, and uses the issues which result from the analysis as a basis for generating a variety of reports. [0026]
  • FIG. 2 is a hardware block diagram illustrating the nodes in an enterprise linked to an analyzer server and a report generator server. [0027]
  • FIG. 3 is a hardware block diagram illustrating the computers and other nodes in an enterprise having a support node. [0028]
  • FIG. 4 illustrates the organization of a collector database. [0029]
  • FIG. 5 illustrates a process of creating a collector. [0030]
  • FIG. 6 illustrates a process of installing a collector on an enterprise. [0031]
  • FIG. 7 is a flow diagram of the process of periodically executing collectors within an enterprise. [0032]
  • FIG. 8 is a software block diagram of the elements of the analysis server together with certain elements of the report generator server and an HAO Server. [0033]
  • FIG. 9 illustrates the organization of the tracker database. [0034]
  • FIG. 10 illustrates the process of an auditor designing an assessment task to analyze an enterprise and to generate reports. [0035]
  • FIG. 11, a continuation of FIG. 10, illustrates the process an auditor goes through to define the reports that are to be generated. [0036]
  • FIG. 12 is a flow diagram illustrating the process of creating a new analyzer. [0037]
  • FIG. 13 is a continuation of FIG. 12 illustrating the process of creating a new analyzer. [0038]
  • FIG. 14 is a table listing the user interface tools which are desirable to aid in analyzer creation. [0039]
  • FIG. 15 is a flow diagram of the general process executed by the analyzer harness when it performs the analysis of the nodes in an enterprise. [0040]
  • FIG. 16 illustrates the process of creating a report template. [0041]
  • FIG. 17 is a continuation of FIG. 16 illustrating the process of creating a report template. [0042]
  • FIG. 18 is a continuation of FIGS. 16 and 17 illustrating the process of creating a report template. [0043]
  • FIG. 19 is a flow diagram illustrating how reports are generated. [0044]
  • FIG. 20 is a continuation of FIG. 19 illustrating how reports are generated. [0045]
  • FIG. 21 is an overview block diagram of the elements involved in the execution of analyzers including the analyzer loader, the analyzer descriptor, and the analyzer argument manager. [0046]
  • FIG. 22 presents a flow diagram of the detailed steps carried out by elements of the analyzer harness (shown in FIG. 21) when it executes an analyzer. [0047]
  • FIG. 23 is a continuation of FIG. 22 illustrating the steps carried out by the analyzer harness when it executes an analyzer. [0048]
  • FIG. 24 is a continuation of FIGS. 22 and 23 illustrating the steps carried out by the analyzer harness when it executes an analyzer. [0049]
  • FIG. 25 illustrates an XML hierarchy which can be used to generate varying scope assessments of an enterprise. [0050]
  • FIG. 26 illustrates a process of defining a task in the environment of the XML hierarchy shown in FIG. 25.[0051]
  • DETAILED DESCRIPTION
  • Definition of Terms [0052]
  • The following terms used in this application shall have the respective meanings ascribed to them below unless otherwise expressly defined in this application. [0053]
  • Analyzers. Analyzers are processes, defined by rules or programs, that analyze selected configuration information gathered by one or more collectors to one or more nodes, and that identify and report issues which may require attention. [0054]
  • Analyzer Harness. An analyzer harness is a framework or system which encapsulates, or wraps, and then executes an analyzer, providing the analyzer with collector data relating to a specific node or nodes of a specific enterprise each time an analyzer is encapsulated or wrapped and then executed. [0055]
  • Audit. This term is normally used for a formal examination or verification of financial accounts, in this context it means a very thorough examination or verification. One can expect a high depth of coverage and typically (but not necessarily) a significant breadth of coverage (i.e., multiple domains). Given the details, an audit typically takes a significant amount of time. Resources that perform Audits typically are subject matter experts with a lot of experience. Depending on the areas of coverage this is done by one person or by a team. Typically, this will require a team of multiple specialists. [0056]
  • Collectors. A collector is a command, or a series of commands, that causes programs installed at one or more nodes to gather configuration information about the node and that return reports defining the node's configuration. [0057]
  • Configuration. Any information specific to the static or the dynamic configuration of one or more nodes (or field computers, hardware, software, firmware, databases, storage systems, etc.) at a given point in time. [0058]
  • Configuration Tracker. A tool which gathers configuration information from one or more nodes and which highlights changes between snapshots of the information gathered at different times. [0059]
  • Daemon. A Unix term that refers to a specific type of program or agent designed to work in the background. [0060]
  • Enterprise. Collection of computers, software, and networking that comprises the computing environment of a business. [0061]
  • Enterprise Name. A name that identifies a particular enterprise and that may be used as a retrieval key to access the configuration information of the enterprise. [0062]
  • Field Computers or Field Nodes. Field computers or nodes are computers or nodes installed at enterprise sites and whose operations are monitored from a central site. [0063]
  • Framework. This is a symbolic structure in which expert knowledge and experience is placed such that it may be automatically used to analyze enterprise configuration information gathered by collectors to identify issues that may require management attention. More specifically, in the context of this embodiment, expert system rules called analyzers are placed into a harness or framework and supplied with configuration information from enterprise nodes and are thereby enabled to report any issues that may have arisen within the enterprise. [0064]
  • High Availability Observatory (“HAO”). In this embodiment of the invention, the High Availability Observatory is a software entity installed on a support node within an enterprise that periodically causes the execution of collectors on the enterprise nodes, captures the reports which the collectors generate, and transfers those reports back to a centralized tracker database for later use and analysis. It is noted that the HAO is merely one of many possible ways in which configuration information may be collected and analyzed in accordance with the teachings of the present invention. [0065]
  • Issue. An issue is any matter that may need to be investigated by or reported to the management of an enterprise. An analyzer performs tests upon configuration data gathered from the nodes of an enterprise by collectors. Those tests determine if there are any issues that need to be drawn to management's attention. [0066]
  • Issues Database. An issues database is a database containing issue information generated by analyzers when they process configuration information generated by collectors operating on the nodes of an enterprise. [0067]
  • Managed Element. A managed element is one or more physical devices (CPU, node, computer, etc.) or logical devices (program, volume, thread, process, etc.) that are monitored and/or managed. Each analyzer operates upon a particular class of managed elements, which may be a single node. A set of analyzers can be assigned to analyze all the members of a managed element of an enterprise. [0068]
  • Node. A node is a particular device in an enterprise, such as a server, work station, printer, router, switch, or hub. A multi-processor may be configured either as a single node or as multiple nodes. [0069]
  • Tracker Database. A tracker database is a database containing configuration information gathered from one or more nodes of one or more enterprises. [0070]
  • Overview of the System [0071]
  • Referring to FIG. 1, an overview block diagram is shown of an [0072] automated method 100 for repeatedly analyzing the configuration of an enterprise. The method 100 may generally be broken into three stages: collection, analysis, and reporting, as is shown in FIG. 1 by the dashed lines.
  • In [0073] step 102 of the method, enterprise configuration information is collected from field nodes. The collection step utilizes a set of collectors 104 to gather the desired configuration information. The collectors 104 are each commands or programs stored on a support node in the enterprise. The collectors 104 are run at periodic intervals on each node of the enterprise. The collectors 104 gather desired configuration information and store it as files in the tracker database 106. Specifically, for each node, there is a configuration information file stored on the tracker database 106 associated with each and every collector that generates configuration information.
  • In [0074] step 108, configuration information is analyzed by an analyzer harness 806 (FIG. 2) to identify issues within the field nodes. As part of this process, the analyzers 110 are used to investigate particular issues associated with the field nodes. The analyzers 110 are developed or written by experts to identify an issue or issues. The experts possess knowledge and information which is captured in written form as analyzers addressed to specific issues. The analyzers are then stored in an analyzer database 804 (FIG. 2) for later use by the analyzer harness 806.
  • An important aspect of the present invention is that the reports generated by this arrangement focus on specific issues rather than upon the status of an enterprise. Accordingly, the support engineers do not have to wade through large amounts of configuration information to isolate problems. Providing support for the enterprise is thus transformed from configuration gathering and manual analysis to executing a specified set of analyzers and allowing the framework “expert” to diagnose the problem and identify the pertinent issues. [0075]
  • As will be discussed in greater detail below, the [0076] analyzer harness 806 executes the desired analyzer 110 with the configuration information stored in the tracker database 106 and generates a report 2126 (FIG. 21) in XML format. The report 2126 identifies issues relating to the field nodes. This issue identifying report 2126 is then stored as a file in an issue database 112. If an issue has not arisen with respect to any node, the issue will be absent from the report 2126.
  • At this stage, the [0077] report 2126 generated by step 108 may be used to generate a full report along with text descriptions of the issues, as desired by an auditor. The XML report 2126 from the analyzer harness 806 is sent to a report generator 206 (FIG. 2). The report generator 206 may use report templates and rules database 204 to generate reports 208 (FIG. 2) addressing specific issues for each field node. These reports 208 identify the analyzers 110 used, the node from which the collector information is gathered, optionally the actual output of the collector 104, and the issue identified.
  • Now, the issues stored in the [0078] issues database 112 may be used in another way to review the overall performance of the enterprise. To this end, in step 114 the issues are analyzed using rules written by the experts, and a report is generated as desired by the auditor. Generally speaking, the reports are generated from templates stored in the report templates and rules database 204. The reports may be presented in step 118 to enterprise management, technical management, the field engineering team, and to a workflow system or healer system (self-healing technology). This self healing technology will help the computer industry achieve the goal of providing servers and other node that repair themselves automatically, thereby staying in service without the need of human intervention over many years. The present invention, by automatically identifying issues that can indicate the possible future failure of nodes in enterprises and by generating reports of the type that can control the operations of other nodes which can download software to reinitialize disk drives and to perform other maintenance services automatically, moves the computer industry a giant step closer to providing servers and other nodes that maintain and repair themselves automatically with only minimal human intervention.
  • Referring to FIG. 2, there is shown a hardware block diagram for implementing the method in FIG. 1. An [0079] enterprise 300 is located on a customer site, and it includes a support node 308 which may be operated by the manufacturer of the computers at the customer site. Note that the support node 308 includes the customary components of a computer system including a CPU, a display or other I/O device, a network or communications interface, RAM or ROM or other memory, as well as stable storage devices such as disk or CD-ROM drives. Other servers or nodes described may also include the same customary components.
  • Software known as High Availability Observatory (“HAO”) available from Hewlett-Packard Company is stored on the [0080] support node 308, and it manages the collectors 104 that gather configuration information. In the enterprise 300, the support node 308 is connected to the nodes 302 and 304 by a network which enables the collectors 104 to gather configuration information. Note that the enterprise 300 has a firewall 324 to act as a barrier to prevent unwarranted access to the enterprise 300 and to act as a central point of presence for maintenance and e-mail connectivity. Note that use of a support node in this manner is one of many ways in which configuration information may be collected and subjected to analysis.
  • FIG. 2 also illustrates the components located at a central site. The central site includes an [0081] analyzer server 800 situated remote from the enterprise 300. The analyzer server 800 is linked (in this embodiment, indirectly through the tracker database 106 as is shown in FIG. 2) to the enterprise 300 via an ISDN line or some other form of wide area network. An HAO server 105, a report generator server 202, and a legacy server 210 are also part of the central site. The HAO server 105 is linked to the support node 308 by the ISDN line. Files of configuration information generated by the collectors 104 are saved in a tracker database 106. These files are retrieved from the tracker database 106 by the analyzer server 800, as is described below.
  • The [0082] analyzer server 800 includes an analyzer database 804 which stores the analyzers 110 and an analyzer harness 806 for wrapping the analyzers 110 retrieved from the analyzer database 804 with the files of configuration information retrieved from the tracker database 106. The analyzer harness 806 generates an issue report file in XML format which is placed into the issues database 112. As discussed more fully below, this report may be used to generate a full issue report as described above with respect to FIG. 1.
  • The [0083] legacy server 210 includes a legacy database 212. The legacy database 212 stores configuration information files obtained during prior manual collections or other means. The legacy database 212 can be linked to the analyzer harness 806. In the event that the HAO collectors are unavailable or not present to automatically and continually generate configuration information files, configuration information files can be retrieved from the legacy database 212. This information, however, is only as current as the most recent manual collection. But other automated techniques may be used to place node configuration information into the legacy database 212.
  • Note that the HAO is only one way in which configuration information may be gathered from an enterprise. This can and should be done for every node in each enterprise so that the benefits of configuration information collection and analysis can be brought to bear universally. [0084]
  • The [0085] report generator server 202 is also a part of the central site. The report generator server 202 is linked to the analyzer server 800 through the (XML) issues database 112. The report generator server 202 includes a report generator 206 for receiving the XML issue reports from the database 112. As discussed above with respect to FIG. 1, the report generator 206 may generate a full report concerning the identified issues including more detailed information about each issue.
  • Now, the issue reports are stored in an [0086] issue database 112 as described. A report templates and rules database 204 is part of the report generator server 202. The server 202 stores various report templates and rules which are developed by subject matter experts. These can be field personnel or product development personnel. The application of these rules helps to determine the overall performance of the enterprise 300. At an auditor's request, the report generator 206 will retrieve (1) the rules from the report templates and rules database 204 and (2) the issues stored in the issues database 112, and will then generate a report 208 using the templates from the report templates and rules database 204. The report may be in any desired format, such as Microsoft Word, Excel, PowerPoint, or HTML or in some special format designed for delivery to some other computer or node for use in automatic control. The report may identify all the issues with the enterprise 300 to enable the auditor determine the overall performance of the enterprise 300.
  • Referring to FIG. 3, the cluster configuration example described above, along with an analysis of the enterprise configuration, will now be discussed in more detail. As part of the [0087] enterprise 300, three nodes 302, 304, 306 and several personal computers 314-322 are linked through a network 312. The nodes 302, 304, 306 include utilities 303, 305, 307, respectively to set up and configure the nodes properly. The enterprise 300 also includes a file server 326 with a volume 328 for storing programs. The file server 326 is linked to the nodes 302, 304, 306 to enable these nodes to access the programs from the volume 328 on the file server 326. As discussed above, the HAO support node 308 is also part of the enterprise 300, and it includes a collector database 310. The HAO support node 308 is linked to the HAO server 105 on the central site via an ISDN line or other means of connection. A firewall 324 is installed on the enterprise 300 for the reason described above.
  • The three [0088] nodes 302, 304, 306 are arranged in a cluster configuration. In this configuration, the nodes are each configured as a back-up to each other to ensure that executable programs can be run on a back-up node if the node assigned to run a program fails. To configure the cluster configuration properly, the utilities of each node must be set up to ensure that the node recognizes or “sees” the program on the volume 328. In other words, the volume 328 of the file server 326 must be “attached” to each of the nodes 302, 304, 306 to enable each to run a program or access a program on the volume 328. If a PC 314, for example, is using a program through the network 312 that is normally run on the node 302, the volume 328 must be attached to the node 304 to run that program in the event the node 302 fails or is otherwise unable to execute that program. The cluster configuration is realized using a Hewlett-Packard Company program known as MC/ServiceGuard. The MC/ServiceGuard program creates a cluster configuration which ensures that this type of back-up occurs.
  • Now, in this example, it is desired to analyze the configuration information of the cluster arrangement. To this end, the [0089] collectors 104 from the collector database 310 on the HAO support node 308 are sent to the nodes 302, 304, and 306 to gather configuration information. This information, in file form, is then returned and is sent to the central HAO server 105 (FIG. 2) to be stored as files on the tracker database 106. The tracker database 106 identifies the node from which the information was gathered, and the files contain facts concerning what was collected, such as storage or memory capacity, etc. At an auditor's request, the analyzer harness 806 (of analyzer server 800) retrieves the desired configuration information files and the desired analyzers 110 from the analyzer database 804 and wraps them together, forming a framework that can generate issue reports 2126 in XML format. Each issue report 2126 indicates typically that a particular problem exists within a particular node. For example, the report 2126 may report that the node 304 does not recognize the volume 328 on the file server 326 because it has not attached this volume 328. If the node 304 cannot recognize or “see” the volume 328, node 304 cannot run a program in the event that the node 302 fails.
  • Another [0090] exemplary report 2126, discussed below, might indicate that the storage or memory capacity of the volume 328 attached to the node 304 is a less than 5% of its total capacity. This capacity level may not be sufficient to provide for expected growth in the number or size of the files stored on this volume.
  • Detailed Discussion of System Elements [0091]
  • With reference once again to FIG. 1, the [0092] collectors 104 are commands or sets of commands that can run on each of the nodes of an enterprise, testing the configurations of those nodes, both static and dynamic, and generating collector reports reporting their findings. At step 102, the reports generated by these collectors, in the form of files, are collected and are transmitted to a centralized tracker database 106 where they are stored. Many types of collectors can be used in this manner. A family of collectors 104 that are run at a particular enterprise site are defined by the service engineers at that site and may be the very same programs that the service engineers run when they visit the site and manually run tests to learn about the system configuration.
  • At the central site, the [0093] analyzers 110 read and analyze the collector information contained in the tracker database 106. Each analyzer is created by an expert in system testing and maintenance to evaluate the information generated by one or more collectors and to look for one or a few specific potential problems that may be present. These problems are called “issues”. As a simple example used throughout the remainder of this specification and in the appendices, an issue that might be of concern to the management of an enterprise could be the fact that one or more volumes attached to one or more nodes are filled to within five percent of their maximum capacity and are in danger of possibly running out of room to store additional files. Different analyzers test for different conditions and focus upon different issues. At step 108, the analyzers are called upon to analyze the configuration information in the tracker database 106 and to thereby generate issue information which is stored in an issues database 112.
  • In addition to the [0094] collectors 104, which define what tests are run upon the individual nodes of an enterprise, and in addition to the analyzers 110, which search through the configuration information gathered by the collectors 104 looking for issues that may need to be brought to the attention of management, the present invention contemplates the use of additional rules and report templates 116. These enable the performance, at step 114, of a further analysis of the issue information using rules written by experts; and the generation of a variety of useful reports directed to different audiences.
  • As indicated at [0095] step 118, one of these reports might be a summary report, written in laymen's language, directed to the non-technical management of an enterprise to advise them of critical problems and trends. This report may indicate general conditions that exist, and it may suggest reasons why this management should be concerned about these conditions through the use of simple examples and explanations. Other possible reports would be reports for technical management which might be fairly detailed, indicating in technical terms precisely what problems exist and what solutions might be considered. A separate set of reports might be generated for the field engineering team documenting the status of the enterprise, indicating points that need to be watched, and possibly suggesting field corrections.
  • An [0096] issue description database 117 may be provided which can supply the report generating software with highly detailed descriptions of every issue that may arise, including examples and also explanations of why these issues are of concern to management, written in non-technical language that can be understood by non-technical managers. The issue descriptions in the database 117 thus supplement the very brief issue descriptions which result from analysis and which appear in the issues database 112.
  • In addition to being based upon the occurrence of issue information in the [0097] database 112, reports may be generated directly from the underlying tracker database 106 such that the reports may indicate the status of the enterprise as well as the occurrence of issues of interest to management. In addition, status information from the tracker database 106 may be used to supplement and augment reports otherwise based upon the occurrence of issues.
  • If work orders for the field engineers are generated through computers or other nodes in a work flow system, a machine-readable output of the report generator might be sent directly to the work flow system to cause it to generate work orders that cause service personnel to be sent immediately to the site to carry out time critical maintenance. For example, reports of failed disk drives in disk arrays can be transformed automatically into work orders that schedule a repair team to visit the site and to replace the drives before a mission-critical enterprise is shut down by further failures. If automated tools or “healer system” exist for making corrections to the nodes in the field, then some reports may be generated which become instructions to the healer system that cause immediate correction, through automated means, of certain problems to ensure continued operation of servers that are mission critical to the enterprise. For example, corrupted files can be downloaded and reinstalled automatically, and non-bootable systems may be repaired. [0098]
  • Technical reports can provide action plans which explain precisely how a problem can be addressed or a machine repaired. Through computer linkage, an electronic report can trigger the automatic ordering of parts and the scheduling a technician to visit the site to install the parts. It is only a small step beyond this to provide for automatic repair and correction of defects such that the nodes become substantially self healing. [0099]
  • FIG. 2 presents an overview hardware diagram of both an [0100] enterprise 300 located at one or more business sites and of an analyzer server 800 and report generator server 202 which might typically be located at a central site but which could be also located at an enterprise site.
  • In FIG. 3, the [0101] nodes 302 and 304 and possibly many other nodes exist at the enterprise site 300. These nodes would typically be servers, but they could be routers, printers, and other computational devices that are to be monitored. Also at the enterprise site 300, a support node 308 is networked together to the other nodes 302 and 304. The support node 308 includes tools (the HAO system) that enable the collectors 104 to run periodically upon the nodes 302 and 304 and other enterprise nodes, thereby generating information defining the static and dynamic configuration of the nodes 302 and 304 and other nodes. The support node program 402 (FIG. 4) captures the reports generated by the collectors 104 and transfers them through the firewall 324 and over some form of wide area network to the tracker database 106 within an HAO server 105 that is typically located at a central site. Accordingly, the tracker database 106 contains an up-to-date series of collector reports defining the configuration of the nodes 302 and 304 within the enterprise. This configuration information is available for service personnel to peruse and to study when trying to decide what types of services are needed to support enterprise 300 operations.
  • Some [0102] enterprises 300 may not be equipped with support nodes having the HAO program 402 and collectors 104 or their equivalent. Some or all of the configuration information for such enterprises 300 may be maintained upon a legacy database 212 (FIG. 2) within a legacy server 210. This information may also be used to support an analysis of an enterprise.
  • At the central site, an [0103] analyzer server 800 contains an analyzer database 804 which contains analyzers 110. These are rules or programs that implement tests defined by technical experts. The analyzer server 800 also contains an analyzer harness 806 which is able to harness individual analyzers 110 or rules together with configuration information gathered from specific nodes 302 and 304. This information is retrieved from the tracker database 106 or the legacy database 212. The analyzers 110 analyze this information and thereby determine whether there are any issues that need to be addressed. The analyzer harness 806 may receive an issue report each time an analyzer 110 is run if there are any conditions that need attention. The analyzer harness 806 adds to those issue reports information identifying the particular nodes 302 and 304 and the issue or error messages associated with the analyzer 110 and passes the issue reports out as XML reports 2126. These reports are is both human and machine readable. They list all of the issues which may need management attention. These are stored in an (XML) issues database 112.
  • The XML issue report is passed on to a [0104] report generator 206 within a report generator server 202. The report generator 202 includes a report templates and rules database 204 that controls the generation of a wide variety of different reports for different audiences, as was explained above. For example, some reports may simply restate each of the issues in a nicer format and sorted in a particular order for presentation to a technical team that needs to gain a detailed understanding of all the issues which have arisen. Other templates may be assembled under the control of elaborate rules which first scan and analyze the information contained within the XML issue report, possibly comparing it to previous similar reports generated on earlier occasions, to spot trends and various conditions that are in need of attention, thereby functioning as a configuration tracker. These reports may generate high level explanations of the state of the enterprise computers and that may be read and understood by lay people, including the management of the enterprise. Trends in the information not apparent in the detailed issue report may also be spotted and brought to light in this manner. Accordingly, a wide variety of technical and non-technical reports 208 in a wide variety of differing formats and levels of detail may be generated and passed on to management and to technical personnel, as well as to automated systems that may automate the scheduling of servicing or even cause the actual repair of the nodes in the field.
  • Collectors—Gathering Configuration Information [0105]
  • The next part of this detailed description focuses upon FIGS. [0106] 3 to 7 which explain how the collectors are created and then used to gather configuration information and to feed that information into the tracker database 106.
  • FIG. 3 presents a more detailed description of an [0107] enterprise 300. The enterprise 300 includes three servers 302, 304, and 306 which are identified as “nodes” in FIG. 3. Illustrative of the many possible servers, routers, printers, switches, and other audible devices that may be included within an enterprise, the nodes are tied together by a network 312 which also connects to a large number of work stations or PCS 314, 316, 318, 320, and 322. These work stations or PCS also qualify as nodes and may also be monitored by the present invention.
  • A number of [0108] utilities 303, 305, and 307 are installed upon each of the nodes 302, 304, and 306. While many utilities may be present on a particular machine, of particular concern to this description are utilities that might be useful to service personnel when investigating the configuration of the machine. These are utilities that can be run by service personnel and that would then generate reports which the service personnel might view on the monitor or print out and then use in the course of diagnosing various system problems.
  • While many such utilities would be useful, for the purpose of simplifying the present description of the invention, only one utility will be discussed in detail and used as an example throughout the description of the invention which follows. Clearly, many dozens of other utilities could be used in the same manner to generate all kinds of reports and to support all kinds of analysis of these nodes and the generation of all kinds of reports. [0109]
  • The selected utility is one called “bdf”. With reference to the Appendices, and in particular to Appendix E, the command [0110]
  • bdf-il [0111]
  • typed on a line by itself as a command issued to any computer or node gives a report on what [0112] volumes 328 from various file servers 326 are “mounted” upon a particular node 302, 304, or 306 whose configuration is being determined. A report is generated such as that shown in Appendix E. This report indicates the volume that is mounted, its size, how much of its capacity is utilized by files, how much is available for further storage, and the percent of the storage area that is utilized.
  • With references to lines [0113] 14 and 16 of Appendix E, it will be seen that two of the volumes have 96 percent of their available storage space filled with files. Given the importance of maintaining additional available storage space in file systems for the addition of additional files, service personnel examining this machine would probably conclude that the volumes were overly full and that adjustments must be made to ensure that additional files added to these volumes do not cause the volumes to overflow and to produce errors and to not accept any more files.
  • Within the [0114] support node 308, there exists a collector database 310, the contents of which are illustrated in FIG. 4. This database 310 includes HAO collector program 402 which is capable of launching a collector command, such as the “bdf” command illustrated in the preceding paragraph, upon any of the nodes 302, 304, or 306 and also upon the PCs 314, 316, etc. This collector program periodically causes collectors to run upon each of the nodes that are being supervised by this particular support node 308. This is done in accordance with a collection schedule 404. The nodes examined are included in a node list 406. The collector portion of the collector database 310 is shown at 408. It contains a list of all the collectors that are to be executed, together with a logical name and an ID number for each collector, as is shown for the “disk usage” collector “bdf-il” assigned the ID number “100024”.
  • In some cases, a collector may not be a simple command, such as illustrated above, but it may a series of commands to run certain programs or utilities in a certain order. Such a list of commands can be stored in a file which can be called a complex collector. Complex collector files are stored at [0115] 410 and are also stored within the utilities areas 303, 305, and 307 on the nodes 302, 304, and 306. In the case of a complex collector, the list of collectors 408 includes the name of the file that contains the list of commands which comprise the complex collector, rather than the actual collector commands themselves.
  • FIG. 5 illustrates the process of creating a new collector. At [0116] step 502, a new collector is created by simply adding it to the list of collectors 408. The collector command 506 is typed in along with a name for the collector 504 and its I.D. number 508. As soon as a new collector is added to the list of collectors 408, it becomes active. Of course, there may be several lists for different collectors that are run more frequently or less frequently on any given enterprise system.
  • Once a collector is created, it may be installed upon an [0117] enterprise 300, at step 602, by installing it upon the support node 308 of the enterprise within the collector database 310, and in particular in the portion 408 of the database 310 reserved for collectors. Complex collectors, consisting of multiple commands, must be stored as script files on the nodes 302, 304, and 306 with the names of the script files added to the list of collectors 408. Finally, at step 604, the collector is scheduled for execution periodically in the schedule 404.
  • FIG. 7 illustrates the execution of collectors against the [0118] nodes 302, etc. in an enterprise 300. Execution is typically triggered by a timer 702. (Execution may also be triggered by things like a configuration item which the system has determined has changed its state such that the change in state of the configuration item causes a related analysis to be carried out.) When a timer expires, the node list 406 within the collector database 310 is referenced, and the nodes are processed one at a time. At step 704, a node is selected. At step 706, the list of collectors 408 is referred to, and a first collector is selected for execution. A command is sent to the node 302 being audited to execute the designated collector. This can be done, for example, using a utility such as Telnet over an Internet network, but great care must be taken that the collectors are safe to execute and do not interfere with normal operations of mission critical nodes. In the HAO embodiment of the invention, a collection agent and a collection daemon (not shown) are installed on each node (see U.S. Pat. No. 6,148,402 which issued on Nov. 14, 2000 to Randall B. Campbell and which is hereby incorporated by reference). The support node collector program 402 sends a collector 104 to the collection daemon on the node 302 to be audited. The daemon passes the collector 104 on to a collection agent. The collection agent executes the collector 104, captures its standard output and standard error outputs (STDOUT and STDERR), and returns the collected output information to the daemon, which returns it to the collection program 402 running upon the support node 308.
  • At [0119] step 710, if there are more collectors, then program control branches back to step 706 where additional collectors are caused to be executed upon that same node 302. Then, at step 712, if there are more nodes 304, etc. to be audited, then program control returns to step 704 where the next node 304 is selected, and the analysis proceeds as described above.
  • Finally, after all the [0120] collectors 104 have been run at all the nodes 304, etc. to be audited, and all of the information from the collectors 104 has been gathered, the collector output is transferred to the central tracker database 106 at a central site for further analysis.
  • Analyzing the Configuration Information [0121]
  • The analysis process is set forth in block diagram form in FIG. 8, this Figure shows the various databases and programs that are involved in the analysis and report generation processes. [0122]
  • With reference to FIG. 8, the [0123] analyzer server 800 is shown at the top of the figure and contains the analyzer database 804 and the analyzer harness 806. In the lower right portion of FIG. 8, the HAO server 105 is shown which contains the tracker database 106 that contains all of the configuration information with respect to the nodes 302 and 304, etc. in the enterprise 300. To the left in FIG. 8, the report generator server 202 is shown together with the database 204 that contains the report templates and rules and the report generator 206.
  • The first step in the analysis process is that of creating the [0124] analyzers 110 and creating the report generation rules and templates 116 that will generate the reports 208. As shown in the Figure, content experts 812 use analyzer creation utilities 802 to create the various documents that define the analyzers 110 and store them in the analyzer database 804. These and other content experts 812 also generate the rules that govern report generation as well as the templates for the reports, and they store them in the database 204 within the report generator server 202. Each analyzer 110 focuses upon a particular issue or set of related issues that can arise within the nodes 302, etc. in the enterprise 300. Each analyzer is designed to generate an XML report whenever an issue is found to be present and in need of consideration by management. When all of the issue information for a particular set of nodes are present within the (XML) issues database 112, then all of this information may be analyzed by a higher-level set of templates and rules 118 that are stored in the database 204 and that control the generation -of high level reports 208 summarizing the condition of the enterprise 300 in ways that the management of the enterprise can understand.
  • Once the [0125] analyzers 110 are created and installed and the report templates and rules 116 are put in place, the system may then be called upon to do an assessment of the enterprise 300. An auditor 814, who may be an engineer or some other person desirous of learning about the condition of the nodes 302, etc. in the enterprise 300, requests an audit by using a task definition system 810 to create an assessment task. At 814, an assessment task A is shown. The assessment task 814 includes, in its definition, a list of the enterprises that are to be analyzed, a list of the nodes at each enterprise which are to be subjected to analysis, and a list of the analysis that is to be performed in the form of the actual names of the analyzers which are to be executed. In addition, the assessment task 814 includes a list of the reports that are to be generated following the analysis. Report generation may be done at the time of the analysis, or the reports may be generated at a later time in a separate session.
  • Once a [0126] task 814 is defined and initiated, the list of enterprises, nodes, and analyzers are passed to the analyzer harness 806. The analyzer harness 806 then proceeds by picking up the analyzers 110 from the database 804, one at a time, and with each analyzer 110 the analyzer harness 806 proceeds through the nodes 302, etc. one at a time. For each node, the harness 806 creates a framework linking the analyzer 110 to configuration information files that are retrieved from the tracker database 106. Using this framework, the harness 806 wraps the analyzer 110 in this environment and causes it to be executed in the context of the list of configuration information files that contain configuration information gathered from the node 302 that is being currently analyzed. During its execution, the analyzer 110 calls upon special subroutines that generate short XML reports of any issue which warrants management attention and also of any error condition which may arise. After the analyzer 110 terminates, the analyzer harness 806 takes these small issue XML reports and expands them, using issue text templates retrieved from the analyzer database 804 and also information as to the identity of the node and the identity of the assessment task, and creates an expanded XML report which is stored in the (XML) issues database 112 after the analysis have been run against all of the nodes 302, etc. In this manner, an extended issue report is generated in an XML format that is both human readable and also that lends itself to being incorporated into a database for automated retrieval and manipulation.
  • The list of reports from the [0127] task definition 814 is passed to the report generator 206. The report generator 206 also has access to the report templates and rules database 204 and to the XML issue report which can be retrieved from the (XML) issues database 112. Using all of these materials, an expert system engine within, or supplementing, the report generator 206 evaluates the rules and, under their guidance, examines the issue information, generating high-level conclusions for management concerning the general state of the enterprise. Then, using the report templates, the report generator 206 prepares a variety of reports, as has been explained, setting forth the status of the enterprise 300 and its nodes 302, etc. These are then fed to various recipients of the reports 817.
  • FIG. 9 illustrates the contents of the [0128] tracker database 106. In the embodiment, a tracker database 106 is established for the United States, another for Europe, and another for Asia. These tracker databases 106 are connected by conventional networking to the various enterprises 300 to which they relate so that they can collect information 24 hours a day and thus remain current. As illustrated in the figure, the tracker database 106 information is organized first by enterprise, within the enterprise by node, within the node by the collector, and within collector by the output files each collector has generated, each time and date stamped such that there may be a historical collection of configuration information. With this organization, the analyzer harness 806 is able to request the information file generated by any collector 104 when running on any node 302, etc. within any enterprise 300.
  • FIG. 10 presents a flow chart of the process by which an [0129] auditor 814 defines the assessment task that is to be carried out by the analysis server 800 during any given processing operation.
  • The [0130] auditor 814 begins by specifying the type of assessment that is to be carried out. At 1002, a first type of assessment is the “full audit request.” The full audit request looks at all aspects of the enterprise 300, right down to the smallest details. It also generates high level reports for management and for others, drawing general conclusions about the state of the enterprise, the nature of the problems found, and the possible solutions that may be considered. It is the full audit request or full audit of portions of an enterprise that takes full advantage of the present invention's ability not only to collect lots of configuration information using collectors 104 about an enterprise 300 and to analyze that information using multiple analyzers 110, but also to have rules associated with a report generator 206 that can look over the issues developed by the analyzer 110, scan the issue information looking for statistical indications and trends, and also compare present and past issue information to see trends over time, generating meaningful reports about where the enterprise 300 is headed and what can be done to prevent its failure and to improve its flow operations and reliability. Once this information is known, communicated, and polished, it is possible to move into the realm of self-healing systems. In this realm, an issue is detected automatically, the recommended action is known, and the issue is fixed before it becomes a problem. The customer is notified of the fix rather than the issue.
  • A second type of assessment is called simply an “assessment.” An assessment involves the use of large numbers of [0131] collectors 104 whose output is processed by a fairly large number of analyzers 110. A detailed report of all the issues identified is then generated.
  • A third type of assessment is the health check, which states in fairly summary terms whether the nodes within an enterprise are OK or whether there are problems that need to be addressed. This a fairly simple “go” or “no go” type of evaluation that looks primarily at critical values only and that generates a minimal report. [0132]
  • The [0133] auditor 814 may select any one of several different types of coverage for each of these assessments. An overall assessment runs all the analyzers 110 and generates a large amount of issue information about all aspects of an enterprise 300. A hardware and operating system assessment runs only those analyzers 110 that focus upon the hardware and operating system elements, as opposed to their programs, file systems, networks, etc. A networking assessment focuses upon the networking aspects of an enterprise 300, including such things as network load, network slow-down, and the conditions of the various network routers and switches. A file management and storage assessment focuses upon the condition of the disk drives, the availability of space within the file system, and other such issues. The assessment hierarchy available for task definition can match the assessment XML hierarchy of XML control information for the individual analyzers, as is illustrated in FIG. 25 and as is explained at a later point.
  • The next step in the task definition process is [0134] step 1004, selecting a tentative list of analyzers consistent with the assessment type selected. The tentative list of analyzers 110 is selected automatically by the task definition system 810 and is displayed with check boxes beside each analyzer name; and then the auditor is permitted to view and to modify the list of the analyzers that will actually be processed by possibly adding some, and by possibly eliminating some that are not required or essential to a given audit. Only the analyzers with their check boxes checked are actually executed.
  • Next, the location of the assessment is designated. At [0135] step 1006, a region (United States, Europe, etc.) is selected, or possibly a legacy database 212 source of information is selected if real-time monitoring of the enterprise 300 to be audited is not presently implemented. At step 1008, one or more enterprises 300 within the selected region are selected for auditing. At step 1010, a listing of the enterprise 300 nodes 302, etc. is automatically generated and displayed, again with check boxes, such that the auditor may go in and remove some nodes from the audit, and add other nodes to the audit. Next, at step 1012 in FIG. 11, the auditors enter information identifying themselves and also comments, such as a general statement of why the audit is being conducted. For example, if the customer has been experiencing certain difficulties, the auditor may wish to summarize this at this point so that the reason for the audit appears in the final report.
  • At [0136] step 1014, the nature of the report or reports desired is selected. The auditor may only report a management summary report, or he or she may request a technical summary report. On the other hand, the auditor may wish to see all of the technical details. A special marketing report, indicating areas where the enterprise may be persuaded to purchase additional software or hardware, can also be generated. A detailed manufacturer's report would report on the update level and versions of all the software and hardware and might contain information concerning failures that might be useful for future maintenance of the enterprise, or that might suggest the need for improvements in system component design.
  • A format for the report is also selected. The text report can be generated in the form of a word processing document suitable for printing in color. High-level reports might be generated in presentation format for projection and display to management. An HTML report might link to underlying explanatory details from a general report. Additionally, the [0137] auditor 814 may wish to request that statistical information be presented in tabular, graphic, or chart form to make it easier to understand.
  • The report format will also vary depending upon the target of the report. Thus, the above report formats have assumed that humans are to receive the report. However, if the report is destined for a database, it would, of courses, be generated as an XML document suitable for simple database entry or possibly be fed directly into an SQL or other type of database. If a work flow system exists that can generate work orders for service personnel, it may be desirable to generate a machine-readable file containing information from the report that can be directly transferred into the work flow system to directly result in the scheduling of maintenance or repair. This can be done in particular for critical issues that need immediate attention. Alternatively, if a healer system facility is available that can go out and reconfigure or load new software onto nodes, a machine-readable version of a report may be generated in a format that is acceptable as input to the healer system so that such repairs can be commenced immediately. This is desirable to achieve fail-safe operation of the [0138] nodes 302, etc. not just in mission-critical applications, but in most or all applications. The present invention thus can be used as a crucial feedback link in the realization of truly self-healing systems.
  • Finally, at [0139] step 1016, a delivery mechanism is selected. The reports may be printed, of course, or they may be e-mailed to a recipient list that needs to be supplied. In the case of machine readable reports destined for work flow system or healer system or databases, the Internet address of the recipient computers must be provided.
  • Creating New Analyzers [0140]
  • The analyzer creation process is shown in flowchart form in FIGS. 12 and 13, and FIG. 14 presents a list of user interface facilities which can aid in the process of creating new analyzers. In addition, Appendices A, B, C and D present simple examples of the various components of an analyzer. [0141]
  • As a simple example of how an analyzer can be created, the “disk usage” [0142] collector number 100024, whose creation was illustrated at 500 in FIG. 5 and whose storage in the collector database 310 is illustrated at 408 in FIG. 4, can be used as a source of input information for an analyzer 110 created to illustrate the process.
  • Recall that the “disk usage” [0143] collector 104, when executed upon a node 302, generates the simple textual report that is illustrated in Appendix E. Simply stated, this report lists, for every file system volume attached to a given node, the name of the volume and, among other things, the percentage of the volume's file storage area that is filled with files. Appendices A-D illustrate the details of an analyzer that is assigned to look at the report shown in Appendix E, to extract records concerning all volumes whose occupancy level exceeds the 90 or 95 percent or that are full, and which are therefore in danger of overflow. This analyzer 110 will test the numeric information on each line of the report shown in Appendix E, locate the percentage figure, compare it to 90 and 95 and 100 percent, and then generate a issue report if and only if the amount of storage occupied exceeds the 90 or 95 or 100 percent limit. As will be explained, this issue report is generated by the analyzer within a framework environment where the analyzer does not really “know” which node 302, etc. it is evaluating. Accordingly, the report is then embedded into a larger XML report generated by the analyzer harness 806 that identifies the node and that also includes textual messages explaining the nature of the issue which has arisen.
  • Referring now to FIG. 12, the analyzer creation process preferably begins with the [0144] content expert 812 using a word processor to prepare a textual description of the analyzer 110, explaining what it is to do in human-readable terms. This textual report appears in Appendix A for the exemplary analyzer that is designed to accept and to analyze the report shown in Appendix E provided by the collector “bdf-il” which evaluates the usage of volume storage space.
  • The expert content that is put into the analyzers covers formal and systematic knowledge that can be easily communicated and codified and is readily available (explicit knowledge) and personal information that is based on experience and learning and is often unrecorded and unarticulated (tacit knowledge) and is more difficult to formalize. [0145]
  • Next, [0146] step 1204, the analyzer creation utilities 802 gather information identifying the content expert 812 of this analyzer 110 as well as creation revision dates and other background information.
  • At [0147] step 1206, the designer 812 is presented with a list of all the collectors, organized by managed element class, and is invited to select which collectors will provide input information to this analyzer. In general, a single analyzer may accept input information from one or any number of collectors 104 and may then process that information in any number of complex ways. Dozens of collector-generated node configuration files may be fed into an analyzer that may be a huge computer program written in “C” or “C++” and compiled from numerous “C” or “C++” program files under the control of a “make” file. On the other hand, an analyzer may be a very simple program written in “java” or “perl.” To keep the example being developed here simple, the analyzer will collect information only from the collector identified as “disk usage” and assigned the identification number “100024”.
  • Next, at [0148] step 1208, the designer creates one or more analyzer issue templates, which may contain placeholders for the insertion of variable information. Such a template is illustrated in Appendix D, where three templates are preceded by template numbers. These templates contain, within their text, delimiters marking where variable information may be inserted. In this case, the variable information identifies the file system directory that has given rise to an issue.
  • Next, at [0149] step 1210, the source code (with comments) for the analyzer is created. A typical source code file is illustrated in Appendix B. This source code file is either compiled or interpreted or otherwise executed after having been harnessed and wrapped in a framework that provides it with the proper input information to do its analysis of a particular node. The source code file does not know the identity of the node whose configuration information it is analyzing. It simply knows that a list of file name arguments has been passed in and, from their order, it knows from which collectors those files originated. In this simple example, the argument is a single file name, the name of a file that contains the report which appears in Appendix E and which contains information defining the identity of the attached file systems and how close their volumes are to overflowing, as has been explained. In a more complex case, a series of source files developed by a series of different collectors would be passed as arguments into the analyzer code for execution. The analyzer code is written independently of any particular node, in most cases, so that the same analyzer may be used repeatedly to analyze hundreds of different nodes having thousands of different configurations.
  • In this embodiment of the invention, the [0150] analyzer harness 806 is written in “Java,” and accordingly, “java” may be used as one of the languages in which an analyzer may be written. Byte code compiled versions of such “java” analyzers are simply loaded and executed directly by the analyzer harness 806 and are passed the list of file names as an input.
  • In some cases, it may be desirable to write an analyzer in the “C” or “C++” programming languages, or it may be desirable to adapt an existing program written in “C” or “C++” that is already being used for field testing to serve as an analyzer. Such executable files are compiled and linked under make file control in the normal manner and are placed into operation by the [0151] analyzer harness 806 which calls a conventional operating system “shell” utility to launch such executable analyzers. Such “C” or “C++” programs may be highly complex and may include a source module as well as additional code modules and a make utility for controlling compiling and linking. Provisions in the analyzer creation utilities 802 are made to include all of these analyzer file components in the analyzer database 804 and to re-compile them as needed for execution whenever changes are made to the source code, just as in a standard program development environment.
  • In other cases, the analyzer may be written in an interpretable language such as perl or “kshell” rather than in “Java” or “C” or “C++”. In these cases, the [0152] analyzer harness 806 launches an interpreter program and passes to it the argument list containing the names of the files containing the collector configuration information that is to be processed.
  • As [0153] step 1210 indicates, the present invention accepts analyzers written in “java,” “C” or “C++,” “perl,” or “kshell” and stores them in the analyzer database 804 complied (if necessary) and ready to be executed.
  • With reference to FIG. 13, [0154] step 1212 calls upon the designer 812 of an analyzer 110 to specify which nodes 302 it is to analyze, if necessary. The default is that an analyzer 110 processes all nodes 302, and then the analyzer 110 is called upon by the analyzer harness 806 to process files generated by the collectors 104 for all of the nodes 302, 304, 306, (etc.) in sequence, with the analyzer 110 being executed one time for each node with different input file argument lists provided each time the analyzer 110 runs.
  • In some cases, a given analyzer may operate on a subset of managed elements, which may be specified as a collection of nodes included in a list of managed elements. Alternatively, in a system where nodes are clustered together to back each other up and to provide alternate platforms for executing programs when one or another of the nodes in a cluster is out of service, it may be that a given analyzer processes input data received from all nodes in a cluster simultaneously. [0155]
  • The [0156] content expert 812 having completed the process of defining the analyzer 110, it now remains to store the information defining an analyzer 110 in the analyzer database 804. The template text (Appendix D) and the source code (Appendix B) along with the textual description (Appendix A) of the analyzer are simply stored as separate files in the analyzer database 804 and are linked to the name of the analyzer in a directory. There remains the other information provided by the user defining the conditions under which the analyzer is to run, the names of the files containing the templates and source code, the author of the code, the particular language in which the template is written, and other things. This information, in the form of an XML analyzer descriptor file, is also saved in the analyzer database at step 1214. An exemplary XML file appears in Appendix C.
  • With reference to Appendix C, this XML file portion of the analyzer definition includes the following: [0157]
  • A standard XML header; [0158]
  • The analyzer name and version number; [0159]
  • The author's e-mail address; [0160]
  • A one line description of the analyzer; [0161]
  • A link or pointer to the ASCII template that defines the issues (see Appendix D); [0162]
  • A link or pointer to the analyzer code file; [0163]
  • The particular programming language (“kshell”, “java”, “C”, “perl”) used in writing the analyzer; [0164]
  • The type of analyzer source—text, binary (“C” or “C++”), or byte code (“java”); [0165]
  • The “purpose” of this analyzer file—main, auxiliary, or make, and whether it is executable; [0166]
  • (Repetitions of the above four lines for each separate analyzer program file.) [0167]
  • The number of nodes that can be processed simultaneously; and [0168]
  • The sources of input in the form of a list of collector names or numbers. [0169]
  • As can be seen, the XML file set forth here defines completely how the [0170] analyzer harness 806 is to execute a particular analyzer after it wraps in a frame and sets it to examining the information relating to a particular node or series of nodes. This XML file may be thought of as a control program for the analyzer harness 806 that governs the execution of the corresponding analyzer 110.
  • Finally, at [0171] step 1216, all of the information just described is saved in the analyzer database 804 as part of the analyzer 110 definition.
  • This embodiment of the invention provides a number of optional but useful tools to the analyzer designer in the form of user interfaces and utilities. These are listed in FIG. 14: [0172]
  • A general utility facilitates the creation of new analyzers and the modification or deletion of existing analyzers at [0173] 1402 and is similar to such tools provided in any program development environment.
  • When one is done entering the information concerning an analyzer, an XML [0174] descriptor creation utility 1404 generates the XML file, such as that illustrated in Appendix C, automatically.
  • Managers are provided at [0175] 1408 for program source code, auxiliary source code, and make files that are similar to those to be found in any general purpose program development environment. Additionally, a manager is provided to assist in creating template text files, such as that shown in Appendix D, which includes provision for embedding variable space holders into such a text file. For example, an analyzer might pull out of a collector document a piece of information and then arrange for the information to be inserted at the variable insertion point within such a text-file template, so that the template contains node-specific information in addition to background boilerplate information defining a given issue.
  • To assist in managing the many collectors that may be available, a [0176] collector search facility 1410 is provided that facilitates searching through collectors both by the Unix or other command assigned to a collector (for example, “bdf”) and also by the logical names and numbers assigned to a collector.
  • To facilitate the testing of analyzers, at [0177] 1412 there is provided a simple analyzer development environment which encapsulates an analyzer in a framework and provides it with live sample information obtained from editable stored samples of collector output files input so that a prototype analyzer may be tested in a safe environment to see how it performs.
  • A particularly useful tool is one that facilitates the creation of the lists of collector output configuration information files that are fed into the analyzers as their information input and that helps the designer to arrange the names of those collector output files in the proper order expected by the analyzers. This [0178] facility 1414 presents, in tabular form, a vertical list of analyzers on the left and a vertical list of collector reports on the right, and it permits one, by clicking the mouse, to connect each analyzer to one or more collector reports, and to indicate by the ordering of those connections the order in which collector reports are to be fed into each analyzer as arguments that are passed to an analyzer each time an analyzer is executed.
  • Another useful utility simply provides the designer with views of sample collector reports at [0179] 1416. Since the analyzers must go into those reports and extract text from the middle of the reports using programming commands, it is essential that the designers of the analyzers have access to sample reports so they can see how the text is positioned and then come up with the proper text extraction code for cutting excerpts out of the reports for analysis and for possible inclusion in the issue statements. In the future, the framework will parse the information and the analyzers will just receive the piece of information they need to do their analysis.
  • Finally, at [0180] step 1418, a manager is provided that groups analyzers into logical groups and thereby permits analyzers to be assigned to a particular assessment type. This tool facilitates the arrangement of analyzers such that when an auditor 813 performs task definition using the system 810, the auditor 813 may make an intelligent decision at step 1002 (FIG. 10) as to what task is to be performed and come up with an appropriate set of analyzers, which may be modified at step 1004 as has previously been explained.
  • Creating Template Reports [0181]
  • FIGS. [0182] 16-18 illustrate in flow chart manner the process of creating template reports and also the rules that govern the assembly of templates and that perform a high-level analysis of the issues identified by the individual analyzers. The ability of the system to generate readable, meaningful, summary management reports largely depends upon this portion of the system.
  • In this embodiment of the invention, a third-party program (for example, Crystal Reports or BusinessObjects) is used to transform template documents into finished reports under database control. This program includes analysis tools that can examine trends, expose relationships, and zero in on important facts. It thus combines rules and report templates into a single “batch” oriented report generator that can be driven by the issues database transferred from XML file form into a Microsoft Access database system. Other rule and template based report generators can also be used, such as “Crystal Reports” (from Krystal Decisions, Palo Alto, Calif.), “Business Objects” (from Business Objects Americas, San Jose, Calif.), or “Caps Author” and “Hot docs” (from Capsoft Development Corporation, Provo, Utah). Alternatively, the report templates themselves can embed the rules internally and create the desired reports directly from the XML file, avoiding the database entirely. [0183]
  • The setting up of these systems involves two aspects. First of all, the incoming information is presumed to be in some form of a database. In this embodiment of the invention, the database is Microsoft's Access database program. The XML issues file is simply read and its contents are fed directly into Access. Alternatively, the XML issues file itself can act as the database. [0184]
  • The template documents, designed in accordance with the report generator specifications, contain large amounts of boilerplate or background text. They may also contain embedded commands analogous to the programming language commands “if”, “else”, and “end if” which are used in programs to select which sections of code are to be executed or to be skipped over or performed in the alternative. In the case of document templates, these same types of commands determine which text ends up in a report and which boilerplate text is cut out and left on the cutting room floor. [0185]
  • Such report generators also provide for the generation of repetitive passages through the use of commands analogous to the “repeat” and “end repeat” language commands found in programming languages. Finally, templates may contain various types of placeholders for expressions which are evaluated and then inserted into the boilerplate to become part of the finished report. [0186]
  • In addition, most such systems have the facility to provide for separate rules which compute not only values to be inserted into the reports but also values that control the inclusion or exclusion of boilerplate text as well as the inclusion of repetitive insertions. These rule systems can be quite elaborate, constituting “backward chaining” expert systems which may include hundreds of rules and which may perform very detailed and elaborate analyses upon the incoming analyzer information which is presumed to be stored in a Microsoft Access database (any other database system on any platform could be used here). A final provision of these systems provides for the insertion of tables into the text of a report, where the tables are extracted from the Access database or the XML file itself. For example, such a detailed technical issue report might include a table that summarizes each and every one of the issue reports generated through analysis, as is illustrated at the end of Appendix G. [0187]
  • At the beginning of the process of report template creation, the first step at [0188] 1602 is to make available to the author of the report the symbolic names of the analyzer output information that is to be used both embedded into the report templates and also to control report template boilerplate selection. These information values necessarily come out of the analysis system. With reference to Appendix F, Part 2 of Appendix F presents the XML information output that comes from issues detected through the execution of analysis programs on configuration information gathered by collectors. This information structure is transferred into a Microsoft Access database from which the values can be retrieved using identifiers the same as or similar to those which appear in the XML information structure. Accordingly, the author needs to be provided with sample issue reports of the kind shown in Part 2 of Appendix F for each and every one of the available analyzers and for each and every one of the issues that each such analyzer is capable of reporting. This information enables the template and rule author to come up with a set of rules which can analyze and summarize the issues database 112 information as well as pick up detailed information from there and incorporate it into any arbitrary type of report that may be necessary or desirable.
  • Using this information concerning the names of variables, at [0189] step 1604 the author develops a set of rules that can review the overall performance of an enterprise 300. The author, clearly, must be an experienced enterprise technical expert who knows what to look for in the issue information generated by a large computer enterprise installation and who knows how to write rules that will perform the same types of analyses that the expert himself or herself would have performed in person had they been able to go to the enterprise site.
  • Having developed rules to control report generation, at [0190] step 1606, the expert then moves on to develop a management summary report template that states, in a readable form, the general state of the system. This report ideally should be readable by lay individuals, such as the chief operating officers of the company that owns and manages the enterprise. It should point out general problems, and it should then give examples of why these problems merit the attention of management. It may then provide general overview suggestions as to how those problems should be managed. Built into this report is clearly the experience of an expert in enterprise system design and management. It may present cost estimates for configuration changes that can improve enterprise performance.
  • For the technical manager, the expert develops a different template that lists all the critical technical points in summary form, states their degree of criticality, and then presents brief explanations and costs estimates for their correction. This report will not include the background explanations needed by the lay managers. It will be much more concise and to the point, and it will also include a level of technical detail that is omitted from the previous report. [0191]
  • At [0192] step 1610, an additional template can be developed which produces a completely detailed presentation of all the specific issues for each of the nodes or groups of nodes that were analyzed. In addition to the statement of issues obtained directly from the analyzers, this report may include reasons why certain issues need to be addressed, costs of implementing changes, and possibly a detailed explanation of these issues, which may be through a hypertext linkage to other documents. Snippets of the actual collector configuration information may be included, as needed, to clarify an issue. As is illustrated in both Parts 1 and 2 of Appendix F, such snippets can be readily incorporated into the XML output of an analyzer and may then be passed out and included in the technical report to assist the technical experts in understanding any of the issues not addressed by the report generation rules.
  • Finally, at [0193] step 1612, it is desirable to develop a variety of master report templates intended for differing audiences and business needs that include varying combinations of the reports just described, as well as possible additional introductory and explanatory reports hyperlinked to background information. Thus, a single report may contain multiple parts destined for different individuals and may be printed and delivered as a unit to the owners and managers of an enterprise.
  • The report generation process, triggered by the [0194] auditor 813, is carried out by the report generator 206 which, in this embodiment of the invention, is the program “Crystal Reports”. Referring now to FIGS. 19 and 20, the report generator 206 receives a list of reports from the assessment task 814 and begins by calling forth from the report template and rules database 204 the templates and rules needed for generating the desired reports, at step 1902. Next, at step 1904, the report generator 206 goes to the (XML) issues database 112 and obtains the necessary XML issues information that was generated by the analyzers 110, and it transfers this information content into a Microsoft Access database for convenient access and retrieval by the report generator 206. Alternatively, it may read this information directly into memory from the XML file. The report generator 206 also obtains from the task definition system 810 additional information about this audit, its author, and so on and transfers this information into the Access database for convenient retrieval by the report generator 206. Next, at step 1908, the report generator 206, again at the direction of the task definition system 810, may obtain directly from the tracker database 106 background information on the specific enterprise and nodes being audited for inclusion in the reports, placing this information into the Access database along with the rest. In addition, the list of enterprises, the list of nodes and the list of analyzers in the assessment task 814 can be added to the Access database and included in a report at an appropriate place.
  • Finally, at [0195] step 1910, the program operates in batch mode as a template and rule processor controlled by the templates and rules and by the content of the Access database to generate all the necessary and required reports. This could also be a non-paper-based report such as a workflow management system.
  • The Analyzer Harness [0196]
  • The analyzer harness is described from three different perspectives. First, FIG. 15 presents, in program flowchart form, the steps executed by the [0197] analyzer harness 806 and the analyzers 110 to illustrate in general terms how the individual analyzers are called upon to process information provided by the individual nodes. (FIG. 15 does not address the task of describing the complex interactions that occur between the individual analyzers and analyzer harness 806.) Secondly, FIG. 21 presents a software element block diagram that illustrates the precise relationship which exists between the three subcomponents 2102, 2104, 2106 of the analyzer harness 806 and the various types of analyzers 2110, 2112, and 2114 supported in the present embodiment of the invention. Finally, FIGS. 22-24 present a flow diagram of the steps that are carried out by the analyzer harness 806 components illustrated in FIG. 21, addressing the issue not addressed by FIG. 15.
  • Referring now to FIG. 15, the information processing operations carried out by the [0198] analyzer harness 806 are shown in a conventional software flow diagram. The process begins at 1502 when the task definition system 810 passes to the analyzer harness 806 the assessment task 814 that lists the enterprises, nodes, and analyses which are to be performed. This enables the analyzer harness 806 to set up a triple set of nested loops, as shown, branching back at step 1522 after each node is processed, after each analyzer is processed against every node, and after each enterprise is processed.
  • The overall process begins at [0199] step 1504 when a first enterprise 300 is selected. Then at step 1506, a first analyzer 110 is selected. Next, at step 1508, the definitions of the analyzer and information concerning how it is to be executed (see Appendices B and C) are retrieved from the analyzer database 804 along with the template (Appendix D) containing issue messages for the analyzer. Next, at step 1510, the names of the collectors designated by that analyzer in the analyzer's XML descriptor (Appendix C) are collected as an indication of where the input information is to come from. At step 1512, if the analyzer is computing a trend over time, then a designated set of times and dates or range of times and dates are also picked up.
  • Program control then commences at the [0200] step 1514, and the steps 1514 through 1522 are repeated for each node 302, etc. that is to be analyzed by this particular analyzer.
  • At [0201] step 1516, the names of the designated collector report files for this particular node are retrieved from the tracker database 106 and are listed as input arguments to the analyzer's execution. Then on step 1518, the analyzer code is actually executed in the context of the collector reports provided in this input argument list. At step 1520, if any issues or failures arise, the analyzer generates small XML reports and returns them to the analyzer harness 806 which augments them with information such as the name of the node and the template issue text (See Appendix D). Looping then proceeds from step 1522 until all of the nodes are processed by this analyzer.
  • Next, the [0202] analyzer harness 806 moves on to the next analyzer and repeats steps 1506 through 1522 until all of the analyzers have been processed. It moves on to the next enterprise and repeats the steps 1504 through 1522 until all of the enterprises have been processed, if there is more than one.
  • When processing is complete, at [0203] step 1524, the analyzer XML output report is stored as a file in the (XML) issues database 112.
  • Referring now to FIG. 21, a detailed illustration of the structure of the [0204] analyzer harness 806 is presented that illustrates its relationship to the analyzers and also illustrates how the various different types of analyzers are processed. This figure will be discussed in the context of the flowchart of analyzer harness operation presented in FIGS. 22-24.
  • In FIG. 21, the [0205] analyzer harness 806 is shown to have three major components. An analyzer loader 2102 is the primary component that manages the loading and execution of the analyzers during the processing of configuration information. This analyzer loader 2102 calls upon an analyzer descriptor 2104 to obtain from the analyzer database 804 the XML information for a particular analyzer 110 and to put that information into a database from which the analyzer loader can have easy access to it as it determines how to harness and encapsulate into a framework a particular analyzer 110 that is to be executed. The analyzer loader 2102 also calls upon an argument manager 2106 to reach out into the tracker database 106 to find collector reports 2108 and to arrange for those reports, or the file names for those reports, to be passed as incoming arguments to the analyzers 110 when they are executed by the analyzer loader 2102. The loader 2102, being written in “java”, executes “java” executable analyzers 2110 directly. It calls upon a standard operating system “shell” utility to execute analyzers 2112 written in the “C” or “C++” programming languages. It calls upon an operating system interpreter to interpret and execute analyzer written in “perl” or “kshell” or other interpretive languages 2114. The output of an analyzer is shown to be an XML output at 2124 which is generated by special XML output sub-routines 2116 that are called by the analyzer 110 regardless of its form to generate XML “issues” output messages and also error output messages. The output 2124 does not include identification of the relevant node, nor does it include textual information about an issue, since that information is not available to the analyzers 110 when they are executing. Accordingly, the analyzer loader 2102 accepts the XML output of the analyzers 2124 and generates an expanded XML report 2126 that include the issue defining language taken from the analyzer issue templates 2122 as well as the identification of the node being processed and also the name of the assessment task 814. This may be seen in Appendix F, where the XML output of an analyzer 110 is shown in Part 1, and the XML report 2126 of the analyzer loader 2102 is shown in Part 2 for the simple analyzer that has been used as an exemplary analyzer throughout this patent application.
  • Referring now to FIGS. [0206] 22-24, the process of the analyzer harness 806 executing an analyzer 110 will be described. At step 2202, the analyzer loader 2102 (FIG. 21) receives the name of an analyzer 110 that it is to load and process. This corresponds generally to the step 1506 shown in FIG. 15. The loader passes the name to an analyzer descriptor program 2104.
  • At [0207] step 2204, the analyzer descriptor program 2104 locates and reads in the corresponding XML database for the analyzer (see Appendix C) and thereby creates in its own internal information structure an analyzer descriptor object which is passed back to the analyzer loader 2102.
  • At [0208] step 2206, the loader 2102 next calls upon the argument manager 2106 to retrieve from the tracker database 106 the appropriate collector reports for the collectors designated in the descriptor object for a particular node (designated in step 1514 of FIG. 15). The collector reports 2108 are identified by file name, and these file names are organized in order as an input argument list for the analyzer 110 to read these files in order and process them. The file names are passed back to the loader 2102.
  • Finally, at [0209] Step 2208, the analyzer loader 2102 calls upon an appropriate entity to execute the analyzer 110 in accordance with the nature of the analyzer, passing the list of file names as an input argument.
  • Referring to the top of FIG. 23, the XML analyzer information which now resides within the descriptor object is now referred to in an effort to determine what kind of analyzer is at hand. At [0210] step 2210, if the analyzer is written in “java,” then it is simply called as a “java” subroutine, and it is passed the input list of file names as an input argument at 2212. If the analyzer is not written in “java”, then step 2214 checks to see if it is interpretable. If so, then an appropriate interpreter for “perl” or “kshell” is run at step 2218, and again the input argument list of file names is passed to the interpreter as input for the execution of the analyzer 110. Finally, if the analyzer is not interpretable but is executable, as in the case of a compiled “C” or “C++” program, then at 2216 an operating system “shell” utility is called upon to launch the executable analyzer program, again providing it with the list of file names as an input argument to the executing program.
  • Thus wrapped by the [0211] harness 806 in a framework that includes input collector configuration information files obtained from the appropriate node 302, the analyzer 110 performs its tests and thereby checks to see if any issue reports need to be generated. If so, or if any errors occur, the analyzer calls upon special routines 2116 that normalize the analyzer output as XML structures such as that shown in Part 1 of Appendix F.
  • The arguments passed through the [0212] output routine 2116 include:
  • The issue ID number; [0213]
  • Zero or more arguments for later insertion into [0214] analyzer issue templates 2122; and
  • An optional snippet taken from a collector report, or an explanatory text string, or a null string. [0215]
  • At [0216] step 2222, the issue list or failure list XML output (See Sample 1 in Appendix F) is captured and is returned to the analyzer loader 2102 in the form of an XML output 2124. At step 2222, the analyzer loader 2102 expands the size of this XML output by adding to it information defining the name of the node 302 from which the collector configuration information came, the name of the assessment task 814 launched by the auditor 813, and other such background information. The analyzer loader 2102 also retrieves the analyzer issue templates 2122 (Appendix D) for this analyzer from the analyzer database 804 and from this set of templates retrieves, by number, the particular text template that identifies and corresponds to the particular issue which triggered the XML output. If there are any variable space holders in that text template, the analyzer loader 2102 looks to the XML output 2124 to see what value is to be inserted at that point, and it inserts the value into the template, transforming it into an issue message. The analyzer loader 2102 then generates a new segment for a growing output XML report 2126 that includes all of the above added information added to the analyzer XML output 2124. A sample of such a report can be seen in Part 2 of Appendix F.
  • The [0217] analyzer loader 2102 then proceeds on to the next node at step 2224 and continues until all of the nodes have been analyzed by this particular analyzer 110. It then proceeds to the next analyzer 110 at step 2226 and thereby continues until all of the analyzers have been processed against all of the nodes. The XML report 2126 is then stored in the (XML) issues database 112 where it is made available to the report generator 206, as has been explained.
  • Hierarchical Organization of Analyzer XML Information [0218]
  • An analyzer, as described above, consists of four parts: A textual description of the analyzer and its functions (See Appendix A), the source code of the analyzer [0219] 2120 (See Appendix B), the template 2122 text which defines the issues of an analyzer (See Appendix D), and an XML file that defines, for the analyzer harness 806, how the analyzer is to be processed and what information it requires.
  • In a different embodiment of the invention, which has been suggested above but has not been fully described, the [0220] analyzers 110 may be organized hierarchically to correspond to various broad and narrow arrangements or sets of managed elements within a given enterprise. For example, in FIG. 10, where the assessment tasks are defined, the assessment types are broken down into overall, hardware/operating system, networking, file management and storage, and so on. These assessments each correspond to a particular set or collection of managed elements. These sets can be still further subdivided. For example, as shown in FIG. 25 at 2502, the file system can be broken down into logical volumes, file system usage analysis, and logical volume management. Similarly, hardware may be broken down into memory, CPU, and other categories. Networking can be similarly subdivided.
  • To facilitate these types of assessment audits of the subparts of a large system, an XML control file can be created which includes, as its base or lowest elements, all of the links to the analyzer XML definitions of other sub-components of an audit contained in the [0221] analyzer database 804. This XML file might include, as its main heading, “Enterprise”, or some such general title; and it might then have links to the XML files for secondary headings such as “Operating System”, “File System”, and so on. Then each of these subheadings could be linked further to sub-subheadings, and so on such that many different possibilities for audits through various collections of managed elements of the enterprise can be contemplated. This XML file, indicated symbolically in Appendix G, then becomes a major tool for controlling the operations of the analyzer harness 806, causing it to do a particular auditing on a particular collection of managed elements. No changes will be needed by the framework to handle these multiple combinations of assessments when this is implemented. The only changes that are needed involve the set of analyzer/heading definitions contained in the XML files which can be swapped in and out without affecting the framework.
  • The actual hierarchy would actually be created by links in the assessment type XML file to the Operating System, File System, . . . components which would in turn have links to their sub-components, until the link to the actual analyzer is reached—See Appendix H. [0222]
  • Accordingly, one achieves the conceptual assessment XML hierarchy shown at [0223] 2502 in FIG. 25 with little change to the current harness. Then, in FIG. 26, the task definition system 814 is modified such that at step 2602 (which replaces step 1002 in FIG. 10) one merely specifies a desired assessment type in the outline structure defined by the large XML structure 2502 shown in FIG. 25. This task assessment type corresponds to a set of managed elements which correspond to a subpart of the XML hierarchy shown in FIG. 25 and which contains all the analyzers 110 for the set of managed elements. Note that the XML data 2118 (see Appendix C) for the “Disk Usage” analyzer appears beneath “File System”, “Logical Volumes”, and “File System Usage Analyses” in the exemplary XML structure shown symbolically at 2502 in FIG. 25. At step 2604 (which replaces step 1502 in FIG. 15), one simply passes to the analyzer harness 806 the lists of enterprises and nodes, along with the larger XML structure 2502 that includes, as a substructure, the list of the analyzers that are to perform in accordance with FIG. 25, including the portion of the XML structure in FIG. 25 which the auditor has designated for execution. The analyzer harness 806 then carries out these assessments automatically, covering as much or as little of the system hardware and software as the auditor desires to have covered in any given analysis operation, controlled entirely and continuously by the XML structure of FIG. 25 and by that portion of this structure which the auditor has designated for execution.
  • Description of the Analyzers [0224]
  • In addition to the “disk usage” analyzer which has been used as an exemplary analyzer throughout this specification, this embodiment of the invention includes a number of additional analyzers which are described below as examples of the many possible analyzers that can be created. Clearly, many other types of analyzers can and should be developed. [0225]
  • Single Points of Failure Analyzer [0226]
  • This analyzer checks to ensure that there are both a primary boot disk and an alternate boot disk. Further, this analyzer checks to ensure that the primary boot disk and the alternate boot disk are not installed on the same hardware path. Thus, an issue is flagged when there is a primary disk installed without an alternate disk. Also, an issue is flagged when the primary and alternate boot disks are installed on the same hardware path. [0227]
  • MC/ServiceGuard Timing Parameters Analyzer [0228]
  • This analyzer inspects the MC/ServiceGuard timing parameters for accuracy and supportability. The following issues are flagged: an issue is flagged when the value of NODE_TIMEOUT is set to the default value, which is typically two seconds; an issue is flagged when the NETWORK_POLLING parameter is configured to be greater than or equal to the NODE_TIMEOUT parameter; an issue is flagged when any of the values of HEARTBEAT_INTERVAL, NODE_TIMEOUT, AUTO_START_TIMEOUT, and NETWORK_POLLING_INTER-VAL is set below a predetermined value, which predetermined value is typically a time less than or equal to one second; and an issue is flagged when the value of the NODE_TIMEOUT is set to less than at least twice the value of the HEARTBEAT_INTERVAL parameter. [0229]
  • MC/ServiceGuard Release Analyzer [0230]
  • This analyzer checks the installed MC/ServiceGuard version on all nodes and ensures that the latest version is installed for a specific release of HP-UX (Hewlett-Packard Company's version of Unix) and that it is the same on all nodes in the cluster. An issue is flagged when MC/ServiceGuard does not appear to be installed, when there is a newer version of MC/ServiceGuard available for the operating system, or when any node in the cluster is running a different MC/ServiceGuard release than the others. [0231]
  • MC/ServiceGuard Package Configuration Analyzer [0232]
  • This analyzer checks the configuration of the packages within a MC/ServiceGuard cluster. An issue is flagged when the default package subdirectory does not exist, when the package switching is disabled, or when separate package control run and halt scripts exist for the package. [0233]
  • MC/ServiceGuard Daemon Checker [0234]
  • This analyzer checks to determine whether or not the MC/ServiceGuard daemon(s) are running. Using a daemon, a program can simply hand off data to a smaller program and go on to other work. Where the MC/ServiceGuard daemon ‘cmcld’ is not running on the node in the cluster system, an issue will be flagged. [0235]
  • MC/ServiceGuard Cluster Status [0236]
  • This analyzer checks the MC/ServiceGuard cluster status, node status, and package status. An issue will be flagged if: the cluster is down, the cluster is running on a subset of the nodes, one or more packages of the cluster are not running, global package switching is disabled, a package has node switching disabled for one or more nodes, a package is not running on its primary node or when no alternative node is available to which the package can be switched. [0237]
  • MC/ServiceGuard Cluster Configuration Analyzer [0238]
  • This analyzer checks the configuration of the MC/SwitchGuard cluster for correct configuration. An issue will be flagged when: the ASCII (American Standard Code for Information Interchange) configuration file is not found at the default location and/or with the default name, when the ASCII configuration file does not correspond to the binary cluster configuration file, when the ASCII cluster configuration file is not the same on all nodes in the cluster, when the binary cluster configuration does not exist on one or more nodes in the cluster, when the binary cluster configuration file is not the same on all nodes in the cluster, or when incorrect ownership and/or permissions exist on the binary cluster configuration file. [0239]
  • Root Mirror Analyzer [0240]
  • This analyzer verifies that the root volume is mirrored at least once, ensures that each mirror is bootable, ensures that an entry exists in /stand/bootconf for each mirror, and checks for single point of failure related to the boot disks. An issue is flagged when: there is no mirror found for the root logical volume, the boot mirror device is missing from /stand/bootconf, there is a non-bootable mirror of the root drive, there is a primary boot disk installed without an alternate disk, or the primary and alternate boot disks are installed on the same hardware path. [0241]
  • Processor Analyzer [0242]
  • This analyzer extracts information from the CPU (Central Processing Unit) hardware logs of each processor installed in the system. CPU specific information gathered includes the number of processors installed, PDC (Processor Dependent Code) revision level, the hardware model number (translated into English for the report), the processor chip revision, and the slot number in which the processor(s) are installed. In addition, the analyzer gathers HPMC (High Priority Machine Check) error information specific to the CPU, Memory, and I/O (Input/Output) error logs. Also, the analyzer identifies that the processor fast boot status flag has been set, which indicates that the memory self-test has been disabled during the system self-test portion of the PDC boot code. Processor chip revision is gathered, and may be used to proactively identify processors associated with class problems and/or known defects. An issue is flagged when: the processor PDC revision level is not the latest supported revision, a valid HPMC exists in the hardware logs, a valid memory error exists in the hardware logs, a valid fatal I/O error exists in the hardware logs, or if the fast boot flag has been set. [0243]
  • Memory Analyzer [0244]
  • This analyzer checks for the existence of single and double bit errors in the hardware logs, and also verifies the number of available entries in the page allocation table (PDT). An issue is typically flagged if: a single-bit memory error exists and its count is greater than or equal to 1000, a double-bit memory error exists and its count is greater than or equal to 1, or the number of PDT entries used exceeds 50% of the PDT total size, which by default is set to a maximum entry value of 50. [0245]
  • Lvmgeneral [0246]
  • This analyzer does basic tests on the LVM (Logical Volume Management) configuration such as comparing the content of /etc/lvmtab with the output of the lvm (logical volume management) commands in order to find volume groups, or physical volumes not activated or incoherencies. Also, it may run basic checks for each volume group, physical volume or logical volume. An issue will be flagged if: not all the volume groups listed in lvmtab (logical volume management tab) are activated, not all the physical volumes in a VG (Volume Groups) are currently active, a physical volume is missing in /etc/lvmtab, an activated VG is not defined in /etc/lvmtab, not all the volume groups listed in lvmtab are activated, or bad block relocation is not set to NONE for LV (Logical Volume) on EMC (Electric Machine Control, Inc.) drives. [0247]
  • Lvlnboot Analyzer [0248]
  • This analyzer verifies the data reported by lvlnboot. “lvlnboot-v” displays the root, boot, swap and dump lvm configuration of an LVM enabled boot device. An issue is flagged if no dump device(s) has been configured. The analyzer may, where desired, verify Boot, Root, and Swap also. [0249]
  • Kernelinplace [0250]
  • This analyzer verifies that standard and backup kernel files are in place. An issue is flagged when: a standard kernel file is not in place, a standard backup kernel file is not in place, or a standard kernel could not be identified as a kernel. [0251]
  • Kernelcompare [0252]
  • This analyzer compares and displays differences between kernel parameter settings for a list of hosts. An issue is flagged if some kernel parameters have different values. [0253]
  • General Errors Analyzer [0254]
  • This analyzer analyzes general errors and I/O error entries in the command line Support Tool Manager, i.e.: CSTM-logfile. (CSTM is an online support tool platform which operates under the control of the hp-ux Operating System. It provides automatic configuration mapping, a set of device verifiers, exercisers, information modules, expert tools, utilities, and firmware update tools for the system components and peripheral devices that are installed on hp-ux systems. The I/O error entries are part of the CSTM information module. The I/O error entries log specific device performance information for devices and system components which are exhibiting abnormal operational behavior.) The issue will typically be flagged if: the number of uncorrectable errors logged for a DLT or DDS tape drive device is greater than or equal to one, it has been less than 30 days since the data and time of the last entry in the formatted raw logfile (if not flagged, the analyzer is aborted), the number of overtemp entries is greater than or equal to one, the number of I/O error entries for the system components or peripheral devices is greater than or equal to ten, or the number of LPMC (Low Priority Machine Check) entries is greater than or equal to ten. In PA-RISC system architecture, there are recoverable and non-recoverable hardware errors. Detection of an HPMC (High Priority Machine Check) by PDC (Processor Dependent Code) is a fatal error which immediately stops the further execution of instructions by the CPU hardware. An LPMC is a recoverable error in the Main Memory of CACHE components of the CPU. When an LPMC occurs, a combined interaction between PDC and the hp-ux Operating System identify the type of recoverable error that occurred, triggers PDC code to execute a hardware retry to fetch critical data from the supplying hardware component and reinsert the date into the component at fault, to log the event that occurred, and then to re-initiate normal system operation. The LPMC is therefore a mechanism which provides a “hardware retry” of certain processor and memory errors which are not classified as fatal. [0255]
  • This analyzer is capable of analyzing, detecting, and reporting the presence of system hardware abnormalities and I/O errors. [0256]
  • Fstab Analyzer [0257]
  • This analyzer checks the file systems in /etc/fstab for problems and checks whether they are correctly configured. An issue will be flagged if: a file system listed in /etc/fstab is not mounted, a file system is mounted that is not included in the /etc/fstab file, there is a conflict in the file system mount order, or a CDFS (CD file system) file system is mounted via /etc/fstab. [0258]
  • Firmware Analyzer [0259]
  • This analyzer verifies the firmware revision of all devices with write-able firmware that are installed in, and attached to, the system, including: internal and external SCSI (Small Computer Systems Interface) hard disks, disk array controller modules, internal array SCSI disk modules, and the status of fans, power supplies, batteries, DRAM (Dynamic Random Access Memory), and NVRAM (Non-Volatile Random Access Memory) on array controllers and array chassis. Also, where desired, this analyzer may be used to verify that each device is a supported Hewlett-Packard Company product. [0260]
  • The FIRMWARE ANALYZER typically flags an issue if: the product is not a supported Hewlett-Packard Company product, the firmware revision of the disk is not the current release, there are read, write, verify or non-medium errors logged on a SCSI disk and the number of errors is greater than or equal to one, if there is a bad status for an array fan, power supply, battery, DRAM, or NVRAM, or if the disk array is a Model 12 Hewlett Packard Company (“HP”) product. Unlike older models of HP arrays, the Model 12 can operate properly with internal SCSI disk modules that do not contain the current revision of device firmware. This is accomplished by the array controller firmware which is a separate hardware component from the internal disk modules. If the analyzer detects a Model 12, it performs only checks on the array controllers and aborts the firmware checks on internal disk modules. [0261]
  • File System Check Pass Numbers Analyzer [0262]
  • This analyzer checks that the file system pass number parameters are correctly configured and supportable. An issue is typically flagged if: the file system check pass number is set to zero, the file system check pass number for the root file system is set to zero, the file system check pass number for non-root file systems is set to one, the file system check pass number is missing, identical pass numbers for file systems are on the same disk drives, or file system check pass numbers are not optimized for parallel fsck (file system check). [0263]
  • Dumpfilesystem [0264]
  • This analyzer checks that the file system used by savecrash is large enough. An issue is flagged when no dump device is configured or when the file system too small for a dump. The size of the file system that may be used to save the dump is checked, taking into account a compression of 75% if compression is enabled, and a kernel of 80 Mb. The calculation is made on the worse case based on total memory size. [0265]
  • Dmesg Analyzer [0266]
  • This analyzer captures system error messages from dmesg (a UNIX command that displays the contents of a circular buffer that contains diagnostic information). Also, this analyzer verifies that there is support for capturing the dmseg output incrementally to ensure that none of the system buffer information is lost. If the support for capturing this information exists, the analyzer verifies that it is configured correctly. An issue is flagged if: there is no entry in the crontab file (a configuration file to schedule tasks in UNIX to run commands at specific times) to incrementally capture the dmesg output, if there is an entry in the crontab to capture the dmeswg, but it is not being written to the default location, there is an entry in the crontab to capture the dmesg, but the interval to collect it is greater than a predetermined recommended value, or there is an entry in the crontab to capture the dmesg output, but the execution of the dmesg command does not capture the incremental changes. [0267]
  • Diagnostics Configuration Analyzer [0268]
  • This analyzer checks whether or not online diagnostics have been installed and are running. An issue will be flagged if: the online diagnostics are not installed completely, one or both diagnostic daemons (Diagmond and Memlogd) are not running, or the version of diagnostic software is not the latest released revision. [0269]
  • Crashconf Analyzer [0270]
  • This analyzer is one of the required checks which, when combined with the other appropriate analyzers, will ensure that the system is configured correctly to perform a successful system dump. An issue will be flagged if: the system dump device(s) fail to have adequate space to hold the system dump, or the minimum necessary classes have not been enabled in fastdump. [0271]
  • CPU Chassis Analyzer [0272]
  • This analyzer checks the internal processor hardware logs and reports on the status of the CPU fans, power supplies, and CPU processor module deconfiguration. The de-configuration state of a processor module is archived in the internal processor hardware logs. The possible states are “C” which indicates the processor module is configured and operating normally, and “D” which indicates the processor module has been de-configured by the PDC as a result of the occurrence of a PDC detected hardware error. There is an additional subset of the de-configuration status flags (RS) which monitors if the CPU processor module has been de-configured by the PDC as a result of a recoverable non-fatal hardware error, or if the CPU processor module has never been reconfigured by the PDC after physical replacement. If the RS flag is set, it indicates that the state of the processor is currently de-configured, but is pending reconfiguration and activation by physically restarting the system. Since it is possible for multiple CPU processor modules, fans, and power supplies to be installed in a CPU chassis, the physical location of each failed component is also reported. [0273]
  • An issue will be flagged if: the CPU processor modules that are installed have a “D” status bit set, if the CPU processor modules that are installed have both “D” and “RS” status bits set, if the “F” (failed) status bit for a cabinet fan failure is set, or if the “F” status bit for a cabinet power supply is set. The “D”, “RS”, and “F” status bits will only be set by the PDC if the CPU module, fan, or power supply is physically installed in the system processor chassis. [0274]
  • Bootscript Analyzer [0275]
  • This analyzer verifies that the boot configuration scripts in /etc/rc.config.d have optimal configuration for an HA (High Availability) system. Where desired, this analyzer may only check the crashconf and savecrash configuration, but it is desirable to check all boot scripts. An issue will be flagged if: crashconf is not configured to run, savecrash is not configured to run, savecrash is not configured to run in the foreground, at least one dump device fails to be configured, the dump devices fail to be large enough for a full dump, the dump devices fail to be large enough for a dump, or the dump devices are unable to hold all physical memory. [0276]
  • The foregoing description of an embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the embodiment disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiments were chosen to explain the principles of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto, and their equivalents. [0277]
    Figure US20030154177A1-20030814-P00001
    Figure US20030154177A1-20030814-P00002
  • There may be nothing to do nowadays from a customer point of view with large disk farms. Even if the thresholds have been reached, there could still be 5 GB of disk space available, for example, on a file system of 100 GB. The issues should be recommendations instead of definite errors. [0278]
    Figure US20030154177A1-20030814-P00003
    Figure US20030154177A1-20030814-P00004
    Figure US20030154177A1-20030814-P00005
    Figure US20030154177A1-20030814-P00006
    Figure US20030154177A1-20030814-P00007
    Figure US20030154177A1-20030814-P00008
    Figure US20030154177A1-20030814-P00009
    Figure US20030154177A1-20030814-P00010
    Figure US20030154177A1-20030814-P00011
    Figure US20030154177A1-20030814-P00012
    Figure US20030154177A1-20030814-P00013
    Figure US20030154177A1-20030814-P00014
    Figure US20030154177A1-20030814-P00015
    Figure US20030154177A1-20030814-P00016
    Figure US20030154177A1-20030814-P00017

Claims (21)

What is claimed is:
1. A method of generating a variety of reports descriptive of issues arising in monitored nodes of an enterprise or group of nodes, said method comprising the steps of:
analyzing node-specific information derived from one or more nodes, guided by rules of analysis, to detect the presence of one or more issues;
presenting at least some issue identification information together with node identification information;
providing several report template and/or rule sets each set defining the organization and contents of a class of reports; and
using two or more of these report templates and/or rule sets as a guide, and also guided by enterprise, node group, and/or node information that includes at least some of said issue and node identification information, generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.
2. A method in accordance with claim 1 which includes the steps of providing at least one master report template and/or rule set directed to a particular audience and business need that includes varying combinations of subsidiary reports defined by other report templates and/or rule sets as well as introductory and explanatory information, and under its guidance generating at least one such master report.
3. A method in accordance with claim 1 wherein the method includes the steps of
providing at least one management summary report template and/or rule set, and
under its guidance generating one or more management summary reports that indicate, in a readable format, the general state of the enterprise or group of nodes.
4. A method in accordance with claim 1 wherein the method includes the steps of
providing at least one technical management summary report template and/or rule set, and
under its guidance generating one or more technical reports that list critical points in summary form.
5. A method in accordance with claim 4 wherein the method includes the step of providing within at least one such technical management summary report, in addition to the list of critical points, statements of their degrees of criticality.
6. A method in accordance with claim 4 wherein the method includes the step of providing within at least one such technical management summary report, in addition to the list of critical points, cost estimates for their resolution.
7. A method in accordance with claim 1 wherein the method includes the steps of
providing at least one technical detail report template and/or rule set, and
under its guidance generating one or more technical detail reports that state in detailed form at least some the specific issues for each of the nodes or group of nodes.
8. A method in accordance with claim 7 wherein the method includes the step of providing within at least one such technical detail report at least some snippets of node-specific information as needed to clarify an issue.
9. A method in accordance with claim 7 wherein the method includes the step of providing within at least one such technical detail report the motivation and/or the costs to address at least some issues.
10. A method in accordance with claim 7 wherein the method includes the step of providing within at least one such technical detail report details relating to at least some issues.
11. A system that generates a variety of reports descriptive of issues arising in the monitored nodes of an enterprise or group of nodes, said system comprising:
several analyzers which, when presented with data derived from a node, and when exercised under the guidance of rules of analysis, analyze the node data and generate output data signaling the presence of one or more issues indicated by the analysis;
a harness which exercises at least some the analyzers, providing them during each exercise with data gathered from a different node or group of nodes, and that presents issue data generated by an analyzer together with data identifying the node or group of nodes where the issue originated, to thereby generate an issues database;
report templates and/or rule sets each defining the organization and contents of a class of reports; and
a report generator guided by two or more report templates and/or rule sets and by data retrieved from the issues database through the process of generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.
12. A system in accordance with claim 11 which further includes at least one master report template and/or rule set directed to a particular audience and business need that includes varying combinations of subsidiary reports defined by other templates and/or rule sets as well as introductory and explanatory information.
13. A system in accordance with claim 11 which further includes at least one management summary report template and/or rule set designed to be readable and to present the general state of the enterprise or group of nodes.
14. A system in accordance with claim 11 which further includes at least one technical management summary report template and/or rule set designed to list critical points in summary form.
15. A system in accordance with claim 14 in which at least one such technical management summary report, in addition to the list of critical points, contains statements of their degrees of criticality.
16. A system in accordance with claim 14 in which at least one such technical management summary report, in addition to the list of critical points, contains cost estimates.
17. A system in accordance with claim 11 which further includes at least one technical detail report template and/or rule set containing one or more technical detail reports capable of stating in detailed form at least some of the specific issues that may arise at each of the different nodes or group of nodes.
18. A system in accordance with claim 17 in which at least one such technical detail report contains at least some snippets of node-specific information as needed to clarify an issue that may arise.
19. A system in accordance with claim 17 in which at least one such technical detail report contains the motivations and/or the costs to address at least some of the issues that may arise.
20. A system in accordance with claim 17 in which at least one such technical detail report contains the details of at least some issues that may arise.
21. A system that generates a variety of reports descriptive of issues arising in the monitored nodes of an enterprise or group of nodes, said system comprising:
several analyzer means, designed to accept data derived from a node, for analyzing the node data, and for generating output data signaling the presence of one or more issues indicated by the analysis;
harness means for exercising at least some the analyzers, for providing them during each exercise with data gathered from a different node or group of nodes, and for presenting issue data generated by an analyzer together with data identifying the node or group of nodes where the issue originated, thereby generating an issues database;
report template and/or rule set means for defining the organization and contents of a class of reports; and
report generator means guided by two or more report templates and/or rule sets and by data retrieved from the issues database for generating two or more reports that present the information arranged, summarized, and/or supplemented in ways that suit the specialized needs of different audiences.
US10/367,048 2001-05-10 2003-02-14 Combined issue identifying analyzer and intelligent report generator Abandoned US20030154177A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/367,048 US20030154177A1 (en) 2001-05-10 2003-02-14 Combined issue identifying analyzer and intelligent report generator

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/851,963 US20020169738A1 (en) 2001-05-10 2001-05-10 Method and system for auditing an enterprise configuration
US10/367,048 US20030154177A1 (en) 2001-05-10 2003-02-14 Combined issue identifying analyzer and intelligent report generator

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/851,963 Continuation-In-Part US20020169738A1 (en) 2001-05-10 2001-05-10 Method and system for auditing an enterprise configuration

Publications (1)

Publication Number Publication Date
US20030154177A1 true US20030154177A1 (en) 2003-08-14

Family

ID=25312153

Family Applications (10)

Application Number Title Priority Date Filing Date
US09/851,963 Abandoned US20020169738A1 (en) 2001-05-10 2001-05-10 Method and system for auditing an enterprise configuration
US10/152,214 Abandoned US20040015908A1 (en) 2001-05-10 2002-05-21 Apparatus and method for analysis driven issue report generation
US10/151,803 Abandoned US20020169739A1 (en) 2001-05-10 2002-05-21 Method and apparatus for composite analysis using hierarchically organized directives
US10/151,802 Abandoned US20040015907A1 (en) 2001-05-10 2002-05-21 Method and apparatus for automatic system configuration analysis using descriptors of analyzers
US10/152,556 Expired - Fee Related US7028221B2 (en) 2001-05-10 2002-05-21 Apparatus and method for capturing knowledge through an expert interface
US10/353,907 Abandoned US20030135476A1 (en) 2001-05-10 2003-01-29 Flexible and dynamic policies for assessment execution
US10/353,874 Expired - Fee Related US7146350B2 (en) 2001-05-10 2003-01-29 Static and dynamic assessment procedures
US10/367,048 Abandoned US20030154177A1 (en) 2001-05-10 2003-02-14 Combined issue identifying analyzer and intelligent report generator
US10/372,475 Expired - Lifetime US6952689B2 (en) 2001-05-10 2003-02-21 Automating expert knowledge with analyzer harness
US10/612,189 Abandoned US20040006546A1 (en) 2001-05-10 2003-07-02 Process for gathering expert knowledge and automating it

Family Applications Before (7)

Application Number Title Priority Date Filing Date
US09/851,963 Abandoned US20020169738A1 (en) 2001-05-10 2001-05-10 Method and system for auditing an enterprise configuration
US10/152,214 Abandoned US20040015908A1 (en) 2001-05-10 2002-05-21 Apparatus and method for analysis driven issue report generation
US10/151,803 Abandoned US20020169739A1 (en) 2001-05-10 2002-05-21 Method and apparatus for composite analysis using hierarchically organized directives
US10/151,802 Abandoned US20040015907A1 (en) 2001-05-10 2002-05-21 Method and apparatus for automatic system configuration analysis using descriptors of analyzers
US10/152,556 Expired - Fee Related US7028221B2 (en) 2001-05-10 2002-05-21 Apparatus and method for capturing knowledge through an expert interface
US10/353,907 Abandoned US20030135476A1 (en) 2001-05-10 2003-01-29 Flexible and dynamic policies for assessment execution
US10/353,874 Expired - Fee Related US7146350B2 (en) 2001-05-10 2003-01-29 Static and dynamic assessment procedures

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/372,475 Expired - Lifetime US6952689B2 (en) 2001-05-10 2003-02-21 Automating expert knowledge with analyzer harness
US10/612,189 Abandoned US20040006546A1 (en) 2001-05-10 2003-07-02 Process for gathering expert knowledge and automating it

Country Status (2)

Country Link
US (10) US20020169738A1 (en)
DE (1) DE10220938A1 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020169738A1 (en) * 2001-05-10 2002-11-14 Giel Peter Van Method and system for auditing an enterprise configuration
US20030212734A1 (en) * 2002-05-07 2003-11-13 Gilbert Mark Stewart Decoupled routing network method and system
US20040049477A1 (en) * 2002-09-06 2004-03-11 Iteration Software, Inc. Enterprise link for a software database
US20050114859A1 (en) * 2003-11-24 2005-05-26 International Business Corporation Collaborative planning actions and recipes
US20050138054A1 (en) * 2003-12-18 2005-06-23 Godwin Ian F. Device control support information acquisition
US20060265641A1 (en) * 2005-05-17 2006-11-23 International Business Machines Corporation Custom report generation
US20070038857A1 (en) * 2005-08-09 2007-02-15 Gosnell Thomas F Data archiving system
US20080091733A1 (en) * 2006-10-16 2008-04-17 Scott Shelton Reusable data query language statements
US20080208906A1 (en) * 2007-02-28 2008-08-28 Business Objects, S.A. Apparatus and method for defining and processing publication objects
US20090089247A1 (en) * 2007-09-28 2009-04-02 Terrence Lynn Blevins Methods and apparatus to standardize data properties in a process control environment
US20090150800A1 (en) * 2007-12-05 2009-06-11 Glenn Wood Apparatus, Method and Computer Program Product for Generating Debriefing Charts
US20090216573A1 (en) * 2005-05-04 2009-08-27 Abb Research Ltd. Method and device for automatic event detection and report generation
US7668917B2 (en) 2002-09-16 2010-02-23 Oracle International Corporation Method and apparatus for ensuring accountability in the examination of a set of data elements by a user
US7899879B2 (en) 2002-09-06 2011-03-01 Oracle International Corporation Method and apparatus for a report cache in a near real-time business intelligence system
US7904823B2 (en) 2003-03-17 2011-03-08 Oracle International Corporation Transparent windows methods and apparatus therefor
US7912899B2 (en) 2002-09-06 2011-03-22 Oracle International Corporation Method for selectively sending a notification to an instant messaging device
US7941542B2 (en) 2002-09-06 2011-05-10 Oracle International Corporation Methods and apparatus for maintaining application execution over an intermittent network connection
US7945846B2 (en) 2002-09-06 2011-05-17 Oracle International Corporation Application-specific personalization for data display
US8001185B2 (en) 2002-09-06 2011-08-16 Oracle International Corporation Method and apparatus for distributed rule evaluation in a near real-time business intelligence system
US8165993B2 (en) 2002-09-06 2012-04-24 Oracle International Corporation Business intelligence system with interface that provides for immediate user action
US8255454B2 (en) 2002-09-06 2012-08-28 Oracle International Corporation Method and apparatus for a multiplexed active data window in a near real-time business intelligence system
US8402095B2 (en) 2002-09-16 2013-03-19 Oracle International Corporation Apparatus and method for instant messaging collaboration
US8433750B1 (en) * 2010-04-22 2013-04-30 Imdb.Com, Inc. Collecting client-side performance metrics and latencies
US20130132337A1 (en) * 2011-11-21 2013-05-23 Yusaku Masuda Report generation apparatus, report generation system, and computer program product
US20150212663A1 (en) * 2014-01-30 2015-07-30 Splunk Inc. Panel templates for visualization of data within an interactive dashboard
US20150293830A1 (en) * 2014-04-15 2015-10-15 Splunk Inc. Displaying storage performance information

Families Citing this family (187)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321457B2 (en) * 2000-09-08 2012-11-27 Oracle International Corporation Techniques for automatically developing a web site
JP2002157415A (en) * 2000-11-21 2002-05-31 Noboru Konno Knowledge creation supporting and knowledge property managing system
US20020167896A1 (en) * 2001-05-11 2002-11-14 Arvind Puntambekar Methods and apparatus for configuration information recovery
US7584425B2 (en) * 2001-07-31 2009-09-01 Verizon Business Global Llc Systems and methods for generating reports
US7111206B1 (en) * 2001-09-19 2006-09-19 Juniper Networks, Inc. Diagnosis of network fault conditions
US20030115087A1 (en) * 2001-11-02 2003-06-19 Toshiba Tec Kabushiki Kaisha Technical support system
US6829617B2 (en) * 2002-02-15 2004-12-07 International Business Machines Corporation Providing a snapshot of a subset of a file system
US7512932B2 (en) * 2002-03-22 2009-03-31 Sun Microsystems, Inc. Language and object model for describing MIDlets
US7305671B2 (en) * 2002-03-22 2007-12-04 Sun Microsystems, Inc. Conversion of an object model to a source file generation model
US20030182626A1 (en) * 2002-03-22 2003-09-25 Eran Davidov On-demand creation of MIDlets
US20030181196A1 (en) * 2002-03-22 2003-09-25 Eran Davidov Extensible framework for code generation from XML tags
US7565647B2 (en) * 2002-03-22 2009-07-21 Sun Microsystems, Inc. Markup compiler that outputs MIDlets
US20040133492A1 (en) * 2002-09-25 2004-07-08 Markus Stricker Method and apparatus for public information dynamic financial analysis
US7506302B2 (en) * 2002-10-22 2009-03-17 The Boeing Company System and methods for business process modeling
US7024583B2 (en) * 2002-10-31 2006-04-04 Hewlett-Packard Development Company, L.P. Method and apparatus for detecting file system corruption
JP2004215231A (en) * 2002-12-16 2004-07-29 Konica Minolta Holdings Inc File management program
US20040158545A1 (en) * 2003-02-12 2004-08-12 Symantec Corporation System and method for an expert architecture
US8307064B2 (en) * 2003-02-21 2012-11-06 Verizon Services Corp. Methods and apparatus for automated software generic information retrieval
US20040167990A1 (en) * 2003-02-21 2004-08-26 Peer Francis Wayne Methods and apparatus for network time synchronization
US9137033B2 (en) 2003-03-18 2015-09-15 Dynamic Network Services, Inc. Methods and systems for monitoring network routing
US8161152B2 (en) * 2003-03-18 2012-04-17 Renesys Corporation Methods and systems for monitoring network routing
US7526540B2 (en) * 2003-04-22 2009-04-28 International Business Machines Corporation System and method for assigning data collection agents to storage area network nodes in a storage area network resource management system
GB2402294B (en) * 2003-05-02 2006-01-11 Entuity Ltd Data collection in a computer network
US7415484B1 (en) 2003-05-09 2008-08-19 Vignette Corporation Method and system for modeling of system content for businesses
US7676486B1 (en) * 2003-05-23 2010-03-09 Vignette Software Llc Method and system for migration of legacy data into a content management system
US7475390B2 (en) * 2004-01-12 2009-01-06 International Business Machines Corporation System and method for automatic natural language translation during information transfer
US8689125B2 (en) * 2003-10-23 2014-04-01 Google Inc. System and method for automatic information compatibility detection and pasting intervention
US7496230B2 (en) * 2003-06-05 2009-02-24 International Business Machines Corporation System and method for automatic natural language translation of embedded text regions in images during information transfer
US7506210B1 (en) * 2003-06-26 2009-03-17 Xilinx, Inc. Method of debugging PLD configuration using boundary scan
CA2435655A1 (en) * 2003-07-21 2005-01-21 Symbium Corporation Embedded system administration
US7873668B2 (en) * 2003-08-15 2011-01-18 Laszlo Systems, Inc. Application data binding
US20050131818A1 (en) * 2003-08-21 2005-06-16 Desal Nishith M. Method for performing Due diligence and legal, financial and other types of audits
US6912482B2 (en) * 2003-09-11 2005-06-28 Veritas Operating Corporation Data storage analysis mechanism
US7395527B2 (en) 2003-09-30 2008-07-01 International Business Machines Corporation Method and apparatus for counting instruction execution and data accesses
US8381037B2 (en) * 2003-10-09 2013-02-19 International Business Machines Corporation Method and system for autonomic execution path selection in an application
US20050091346A1 (en) * 2003-10-23 2005-04-28 Brijesh Krishnaswami Settings management infrastructure
US20050102630A1 (en) * 2003-11-06 2005-05-12 International Busainess Machines Corporation Meta window for merging and consolidating multiple sources of information
US7478336B2 (en) * 2003-11-06 2009-01-13 International Business Machines Corporation Intermediate viewer for transferring information elements via a transfer buffer to a plurality of sets of destinations
US20050102488A1 (en) * 2003-11-07 2005-05-12 Bullis George A. Firmware description language for accessing firmware registers
US7464330B2 (en) * 2003-12-09 2008-12-09 Microsoft Corporation Context-free document portions with alternate formats
US7340685B2 (en) * 2004-01-12 2008-03-04 International Business Machines Corporation Automatic reference note generator
US7346853B2 (en) * 2004-01-12 2008-03-18 International Business Machines Corporation Online learning monitor
US7206977B2 (en) 2004-01-13 2007-04-17 International Business Machines Corporation Intelligent self-configurable adapter
US7415705B2 (en) 2004-01-14 2008-08-19 International Business Machines Corporation Autonomic method and apparatus for hardware assist for patching code
US7895382B2 (en) 2004-01-14 2011-02-22 International Business Machines Corporation Method and apparatus for qualifying collection of performance monitoring events by types of interrupt when interrupt occurs
US7246256B2 (en) * 2004-01-20 2007-07-17 International Business Machines Corporation Managing failover of J2EE compliant middleware in a high availability system
US6996502B2 (en) * 2004-01-20 2006-02-07 International Business Machines Corporation Remote enterprise management of high availability systems
US7661096B2 (en) * 2004-02-13 2010-02-09 Microsoft Corporation Interaction with nested and non-nested streams
US7584382B2 (en) * 2004-02-19 2009-09-01 Microsoft Corporation Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
US7392295B2 (en) 2004-02-19 2008-06-24 Microsoft Corporation Method and system for collecting information from computer systems based on a trusted relationship
US7266727B2 (en) * 2004-03-18 2007-09-04 International Business Machines Corporation Computer boot operation utilizing targeted boot diagnostics
US7082376B1 (en) * 2004-03-31 2006-07-25 Microsoft Corporation State full test method executor
US7383500B2 (en) * 2004-04-30 2008-06-03 Microsoft Corporation Methods and systems for building packages that contain pre-paginated documents
US7512878B2 (en) * 2004-04-30 2009-03-31 Microsoft Corporation Modular document format
US8661332B2 (en) * 2004-04-30 2014-02-25 Microsoft Corporation Method and apparatus for document processing
US20050256935A1 (en) * 2004-05-06 2005-11-17 Overstreet Matthew L System and method for managing a network
US20050275877A1 (en) * 2004-06-12 2005-12-15 Harpreet Singh System and method for intelligent queuing of documents for processing thereof
FI20040888A0 (en) * 2004-06-28 2004-06-28 Nokia Corp Management of services in a packet switching data network
US20060010172A1 (en) * 2004-07-07 2006-01-12 Irene Grigoriadis System and method for generating text
US8677496B2 (en) * 2004-07-15 2014-03-18 AlgoSec Systems Ltd. Method and apparatus for automatic risk assessment of a firewall configuration
US20060015934A1 (en) * 2004-07-15 2006-01-19 Algorithmic Security Inc Method and apparatus for automatic risk assessment of a firewall configuration
US7574694B2 (en) * 2004-09-28 2009-08-11 Electronic Data Systems Corporation Method for application and infrastructure rationalization
US7480843B1 (en) 2004-09-29 2009-01-20 Xilinx, Inc. Configuration access from a boundary-scannable device
US7676497B2 (en) * 2004-09-30 2010-03-09 Business Objects Software Ltd. Apparatus and method for report publication in a federated cluster
US7617450B2 (en) * 2004-09-30 2009-11-10 Microsoft Corporation Method, system, and computer-readable medium for creating, inserting, and reusing document parts in an electronic document
US7315853B2 (en) * 2004-10-11 2008-01-01 Sap Ag Service-oriented architecture for accessing reports in legacy systems
US20060100982A1 (en) * 2004-11-08 2006-05-11 International Business Machines Corporation Storage configuration loader with automatic error recovery
US20060136816A1 (en) * 2004-12-20 2006-06-22 Microsoft Corporation File formats, methods, and computer program products for representing documents
US7617451B2 (en) * 2004-12-20 2009-11-10 Microsoft Corporation Structuring data for word processing documents
US7617229B2 (en) * 2004-12-20 2009-11-10 Microsoft Corporation Management and use of data in a computer-generated document
US7752632B2 (en) * 2004-12-21 2010-07-06 Microsoft Corporation Method and system for exposing nested data in a computer-generated document in a transparent manner
US7770180B2 (en) * 2004-12-21 2010-08-03 Microsoft Corporation Exposing embedded data in a computer-generated document
KR20060084040A (en) * 2005-01-17 2006-07-21 삼성전자주식회사 Apparatus and method for dynamic qos management
US7310669B2 (en) 2005-01-19 2007-12-18 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US8520512B2 (en) 2005-01-26 2013-08-27 Mcafee, Inc. Network appliance for customizable quarantining of a node on a network
US20060164199A1 (en) * 2005-01-26 2006-07-27 Lockdown Networks, Inc. Network appliance for securely quarantining a node on a network
US7810138B2 (en) 2005-01-26 2010-10-05 Mcafee, Inc. Enabling dynamic authentication with different protocols on the same port for a switch
US9182480B2 (en) * 2005-01-28 2015-11-10 Hewlett-Packard Development Company, L.P. Information technology (IT) equipment positioning system
US7457809B2 (en) * 2005-02-24 2008-11-25 Microsoft Corporation System and method for retrieving and analyzing data from a variety of different sources
CA2504333A1 (en) * 2005-04-15 2006-10-15 Symbium Corporation Programming and development infrastructure for an autonomic element
US20070022128A1 (en) * 2005-06-03 2007-01-25 Microsoft Corporation Structuring data for spreadsheet documents
US20060277452A1 (en) * 2005-06-03 2006-12-07 Microsoft Corporation Structuring data for presentation documents
US20070055653A1 (en) * 2005-09-02 2007-03-08 Guerra Currie Anne-Marie P System and method of generating automated document analysis tools
US20070118633A1 (en) * 2005-11-10 2007-05-24 Kumar C P V Cluster command testing
US20070130622A1 (en) * 2005-11-21 2007-06-07 Docomo Communications Laboratories Usa, Inc. Method and apparatus for verifying and ensuring safe handling of notifications
US7853926B2 (en) * 2005-11-21 2010-12-14 International Business Machines Corporation Automated context-sensitive operating system switch
US7899820B2 (en) * 2005-12-14 2011-03-01 Business Objects Software Ltd. Apparatus and method for transporting business intelligence objects between business intelligence systems
US7856100B2 (en) * 2005-12-19 2010-12-21 Microsoft Corporation Privacy-preserving data aggregation using homomorphic encryption
US20070156835A1 (en) * 2005-12-30 2007-07-05 Sebastian Pulkowski Exchanging data between enterprise computing systems and service provider systems
US7805400B2 (en) * 2006-01-31 2010-09-28 Microsoft Corporation Report generation using metadata
US7555495B2 (en) * 2006-04-12 2009-06-30 Business Objects Software Ltd. Apparatus and method for routing composite objects to a report server
US7784022B2 (en) * 2006-04-25 2010-08-24 Sap Ag Mapping a new user interface onto an existing integrated interface
US20070277167A1 (en) * 2006-05-23 2007-11-29 International Business Machines Corporation System and method for computer system maintenance
US20070288288A1 (en) * 2006-06-07 2007-12-13 Tetsuro Motoyama Use of schedule editors in a network-based project schedule management system
US8799043B2 (en) 2006-06-07 2014-08-05 Ricoh Company, Ltd. Consolidation of member schedules with a project schedule in a network-based management system
US8050953B2 (en) * 2006-06-07 2011-11-01 Ricoh Company, Ltd. Use of a database in a network-based project schedule management system
US9177270B2 (en) * 2006-06-30 2015-11-03 A.I. Solutions, Inc. Engineering review information system
US8423831B2 (en) * 2006-07-11 2013-04-16 Oracle America, Inc. System and method for performing auditing and correction
US7676702B2 (en) * 2006-08-14 2010-03-09 International Business Machines Corporation Preemptive data protection for copy services in storage systems and applications
US8127278B2 (en) 2006-09-28 2012-02-28 Sap Ag System and method for extending legacy applications with undo/redo functionality
US20080120323A1 (en) * 2006-11-17 2008-05-22 Lehman Brothers Inc. System and method for generating customized reports
US7856450B2 (en) * 2006-12-18 2010-12-21 Business Objects Software Ltd. Apparatus and method for distributing information between business intelligence systems
US8136146B2 (en) * 2007-01-04 2012-03-13 International Business Machines Corporation Secure audit log access for federation compliance
US20080229149A1 (en) * 2007-03-14 2008-09-18 Clifford Penton Remote testing of computer devices
US9152433B2 (en) * 2007-03-15 2015-10-06 Ricoh Company Ltd. Class object wrappers for document object model (DOM) elements for project task management system for managing project schedules over a network
US8826282B2 (en) * 2007-03-15 2014-09-02 Ricoh Company, Ltd. Project task management system for managing project schedules over a network
US7882393B2 (en) * 2007-03-28 2011-02-01 International Business Machines Corporation In-band problem log data collection between a host system and a storage system
US7725770B2 (en) * 2007-04-01 2010-05-25 International Business Machines Corporation Enhanced failure data collection system apparatus and method
US7779308B2 (en) * 2007-06-21 2010-08-17 International Business Machines Corporation Error processing across multiple initiator network
US7818616B2 (en) * 2007-07-25 2010-10-19 Cisco Technology, Inc. Warm reboot enabled kernel dumper
US20090089772A1 (en) * 2007-09-28 2009-04-02 International Business Machines Corporation Arrangement for scheduling jobs with rules and events
US8091094B2 (en) 2007-10-10 2012-01-03 Sap Ag Methods and systems for ambistateful backend control
US20090307508A1 (en) * 2007-10-30 2009-12-10 Bank Of America Corporation Optimizing the Efficiency of an Organization's Technology Infrastructure
US8402065B2 (en) * 2008-01-24 2013-03-19 Oracle International Corporation Electronic control batch record
US20090217241A1 (en) * 2008-02-22 2009-08-27 Tetsuro Motoyama Graceful termination of a web enabled client
US20090217240A1 (en) * 2008-02-22 2009-08-27 Tetsuro Motoyama Script generation for graceful termination of a web enabled client by a web server
US8166459B2 (en) * 2008-02-27 2012-04-24 Sap Ag Apparatus and method of generating self-debugging computer software
US20090271698A1 (en) * 2008-04-23 2009-10-29 Alcatel Lucent System reporter-repository auditor
US20090287522A1 (en) * 2008-05-16 2009-11-19 Tetsuro Motoyama To-Do List Representation In The Database Of A Project Management System
US8321257B2 (en) * 2008-05-16 2012-11-27 Ricoh Company, Ltd. Managing project schedule data using separate current and historical task schedule data
US8706768B2 (en) * 2008-05-16 2014-04-22 Ricoh Company, Ltd. Managing to-do lists in task schedules in a project management system
US7941445B2 (en) 2008-05-16 2011-05-10 Ricoh Company, Ltd. Managing project schedule data using separate current and historical task schedule data and revision numbers
US8352498B2 (en) * 2008-05-16 2013-01-08 Ricoh Company, Ltd. Managing to-do lists in a schedule editor in a project management system
US8862489B2 (en) * 2008-09-16 2014-10-14 Ricoh Company, Ltd. Project management system with inspection functionality
US20100070328A1 (en) * 2008-09-16 2010-03-18 Tetsuro Motoyama Managing Project Schedule Data Using Project Task State Data
US20100088197A1 (en) * 2008-10-02 2010-04-08 Dehaan Michael Paul Systems and methods for generating remote system inventory capable of differential update reports
US7783752B2 (en) * 2008-10-15 2010-08-24 Microsoft Corporation Automated role based usage determination for software system
US8775574B2 (en) * 2008-11-26 2014-07-08 Red Hat, Inc. Remote network management having multi-node awareness
US8713687B2 (en) * 2008-12-17 2014-04-29 Symantec Corporation Methods and systems for enabling community-tested security features for legacy applications
US8719392B2 (en) * 2009-02-27 2014-05-06 Red Hat, Inc. Searching a managed network for setting and configuration data
US9280399B2 (en) * 2009-05-29 2016-03-08 Red Hat, Inc. Detecting, monitoring, and configuring services in a netwowk
US8566459B2 (en) * 2009-05-29 2013-10-22 Red Hat, Inc. Systems and methods for integrated console management interface
US8694831B2 (en) * 2009-05-29 2014-04-08 Red Hat, Inc. Automatic bug reporting tool
KR20120084663A (en) * 2009-06-19 2012-07-30 유에스 스파인 인크. Triple lead bone screw
US20120101864A1 (en) * 2009-07-02 2012-04-26 Milojicic Dejan S Method and apparatus for supporting a computer-based product
US8463885B2 (en) * 2009-08-31 2013-06-11 Red Hat, Inc. Systems and methods for generating management agent installations
US8914787B2 (en) * 2009-08-31 2014-12-16 Red Hat, Inc. Registering software management component types in a managed network
US8166341B2 (en) * 2009-08-31 2012-04-24 Red Hat, Inc. Systems and methods for testing results of configuration management activity
US8607093B2 (en) * 2009-08-31 2013-12-10 Red Hat, Inc. Systems and methods for detecting machine faults in network using acoustic monitoring
US8336030B1 (en) * 2009-09-11 2012-12-18 The Mathworks, Inc. System and method for coding standard testing
US8997077B1 (en) * 2009-09-11 2015-03-31 Symantec Corporation Systems and methods for remediating a defective uninstaller during an upgrade procedure of a product
US8037343B2 (en) * 2009-09-15 2011-10-11 Verizon Patent And Licensing, Inc. Trap-based configuration audit
US9967169B2 (en) * 2009-09-30 2018-05-08 Red Hat, Inc. Detecting network conditions based on correlation between trend lines
US8719782B2 (en) 2009-10-29 2014-05-06 Red Hat, Inc. Integrated package development and machine configuration management
US9003377B2 (en) * 2010-01-07 2015-04-07 Microsoft Technology Licensing, Llc Efficient resumption of co-routines on a linear stack
US8386504B1 (en) 2010-07-06 2013-02-26 The Mathworks, Inc. System and method for file differencing with importance ranking
US8776017B2 (en) * 2010-07-26 2014-07-08 Check Point Software Technologies Ltd Scripting language processing engine in data leak prevention application
KR101440299B1 (en) * 2010-11-16 2014-09-17 한국전자통신연구원 System and method for self-healing
US9063787B2 (en) * 2011-01-28 2015-06-23 Oracle International Corporation System and method for using cluster level quorum to prevent split brain scenario in a data grid cluster
CN102650984A (en) * 2011-02-24 2012-08-29 鸿富锦精密工业(深圳)有限公司 Test report generation system and method
US8453048B2 (en) * 2011-03-07 2013-05-28 Microsoft Corporation Time-based viewing of electronic documents
US20150169598A1 (en) 2012-01-17 2015-06-18 Oracle International Corporation System and method for providing a persistent snapshot of a running system in a distributed data grid
US9477670B2 (en) * 2012-04-02 2016-10-25 Hewlett Packard Enterprise Development Lp Information management policy based on relative importance of a file
US20130282600A1 (en) * 2012-04-23 2013-10-24 Sap Ag Pattern Based Audit Issue Reporting
US8743893B2 (en) 2012-05-18 2014-06-03 Renesys Path reconstruction and interconnection modeling (PRIM)
US9043263B2 (en) 2012-07-24 2015-05-26 General Electric Company Systems and methods for control reliability operations using TMR
US9218233B2 (en) 2012-07-24 2015-12-22 Paul Venditti Systems and methods for control reliability operations
US9665090B2 (en) 2012-07-24 2017-05-30 General Electric Company Systems and methods for rule-based control system reliability
US20140157238A1 (en) * 2012-11-30 2014-06-05 Microsoft Corporation Systems and methods of assessing software quality for hardware devices
US9201113B2 (en) 2012-12-17 2015-12-01 General Electric Company Systems and methods for performing redundancy tests on turbine controls
US10015063B1 (en) * 2012-12-31 2018-07-03 EMC IP Holding Company LLC Methods and apparatus for monitoring and auditing nodes using metadata gathered by an in-memory process
US9135324B1 (en) * 2013-03-15 2015-09-15 Ca, Inc. System and method for analysis of process data and discovery of situational and complex applications
US9832728B2 (en) * 2013-05-10 2017-11-28 Elwha Llc Dynamic point to point mobile network including origination user interface aspects system and method
US9405636B2 (en) 2013-05-31 2016-08-02 Oracle International Corporation Recovering step and batch-based processes
CN104217276A (en) * 2013-06-05 2014-12-17 上海宝信软件股份有限公司 Rule-based automatic auditing method and system
US20150026077A1 (en) * 2013-07-18 2015-01-22 Netapp, Inc. Centralized Method for Customer Assistance and System Verification
US20150026076A1 (en) * 2013-07-18 2015-01-22 Netapp, Inc. System and Method for Providing Customer Guidance in Deploying a Computing System
US9621424B2 (en) 2013-10-04 2017-04-11 Microsoft Technologies Licensing, LLC Providing a common interface for accessing and presenting component configuration settings
US9584367B2 (en) * 2013-11-05 2017-02-28 Solarwinds Worldwide, Llc Node de-duplication in a network monitoring system
US9874414B1 (en) 2013-12-06 2018-01-23 Google Llc Thermal control system
US9912733B2 (en) 2014-07-31 2018-03-06 General Electric Company System and method for maintaining the health of a control system
US9800473B2 (en) * 2015-01-30 2017-10-24 Appdynamics Llc Network based virtual collaborative problem solving space
US10318653B1 (en) * 2015-02-26 2019-06-11 The Mathworks, Inc. Systems and methods for creating harness models for model verification
US10536357B2 (en) * 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US9529662B1 (en) * 2015-07-31 2016-12-27 Netapp, Inc. Dynamic rule-based automatic crash dump analyzer
CN106156502B (en) * 2016-07-05 2018-11-06 东软集团股份有限公司 A kind of appraisal procedure and device of report audit
US11550820B2 (en) 2017-04-28 2023-01-10 Oracle International Corporation System and method for partition-scoped snapshot creation in a distributed data computing environment
US10382262B1 (en) * 2017-05-10 2019-08-13 Appian Corporation Dynamic application configuration techniques
US10769019B2 (en) 2017-07-19 2020-09-08 Oracle International Corporation System and method for data recovery in a distributed data computing environment implementing active persistence
KR102042739B1 (en) * 2017-09-22 2019-11-08 서강대학교산학협력단 Apparatus and method for communication using message history-based security key using blockchain
US10862965B2 (en) 2017-10-01 2020-12-08 Oracle International Corporation System and method for topics implementation in a distributed data computing environment
US10846211B2 (en) * 2018-03-21 2020-11-24 Microsoft Technology Licensing, Llc Testing kernel mode computer code by executing the computer code in user mode
CN111064957B (en) * 2018-10-17 2021-03-23 杭州海康威视数字技术股份有限公司 Equipment state monitoring method and device
US11113037B2 (en) 2019-11-08 2021-09-07 International Business Machines Corporation Software performance modification
CN111813824B (en) * 2020-06-02 2022-09-02 国网江西省电力有限公司电力科学研究院 Method and system for automatically detecting missing report of power failure event of 10kV line outgoing line
US20230350895A1 (en) * 2022-04-29 2023-11-02 Volvo Car Corporation Computer-Implemented Method for Performing a System Assessment

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787253A (en) * 1996-05-28 1998-07-28 The Ag Group Apparatus and method of analyzing internet activity
US5821937A (en) * 1996-02-23 1998-10-13 Netsuite Development, L.P. Computer method for updating a network design
US5862325A (en) * 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure
US5999734A (en) * 1997-10-21 1999-12-07 Ftl Systems, Inc. Compiler-oriented apparatus for parallel compilation, simulation and execution of computer programs and hardware models
US6006230A (en) * 1997-01-15 1999-12-21 Sybase, Inc. Database application development system with improved methods for distributing and executing objects across multiple tiers
US6016394A (en) * 1997-09-17 2000-01-18 Tenfold Corporation Method and system for database application software creation requiring minimal programming
US6148402A (en) * 1998-04-01 2000-11-14 Hewlett-Packard Company Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls
US6151688A (en) * 1997-02-21 2000-11-21 Novell, Inc. Resource management in a clustered computer system
US20020005867A1 (en) * 2000-05-22 2002-01-17 Yaniv Gvily Snippet selection
US20020156799A1 (en) * 2001-04-24 2002-10-24 Stephen Markel System and method for verifying and correcting websites
US6498657B1 (en) * 1999-03-17 2002-12-24 Prout Ag Programmable data extractor, data analyzer, and printer report generator
US6502102B1 (en) * 2000-03-27 2002-12-31 Accenture Llp System, method and article of manufacture for a table-driven automated scripting architecture
US6529954B1 (en) * 1999-06-29 2003-03-04 Wandell & Goltermann Technologies, Inc. Knowledge based expert analysis system
US6542898B1 (en) * 1999-05-12 2003-04-01 Motive Communications, Inc. Technical support chain automation with guided self-help capability using active content developed for specific audiences
US6571282B1 (en) * 1999-08-31 2003-05-27 Accenture Llp Block-based communication in a communication services patterns environment
US6601234B1 (en) * 1999-08-31 2003-07-29 Accenture Llp Attribute dictionary in a business logic services environment
US6658568B1 (en) * 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US6766319B1 (en) * 2000-10-31 2004-07-20 Robert J. Might Method and apparatus for gathering and evaluating information
US6925443B1 (en) * 2000-04-26 2005-08-02 Safeoperations, Inc. Method, system and computer program product for assessing information security

Family Cites Families (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6822553B1 (en) * 1985-10-16 2004-11-23 Ge Interlogix, Inc. Secure entry system with radio reprogramming
US4893815A (en) * 1987-08-27 1990-01-16 Larry Rowan Interactive transector device commercial and military grade
US4949278A (en) * 1988-12-29 1990-08-14 International Business Machines Corporation Expert system architecture
US5131087A (en) * 1988-12-29 1992-07-14 Storage Technology Corporation Computer system having apparatus for automatically redistributing data records stored therein
US5159685A (en) * 1989-12-06 1992-10-27 Racal Data Communications Inc. Expert system for communications network
US5560009A (en) * 1990-09-21 1996-09-24 Hewlett-Packard Company Generating symbolic debug information by merging translation and compiler debug information
US5790633A (en) * 1995-07-25 1998-08-04 Bell Atlantic Network Services, Inc. System for proactively maintaining telephone network facilities in a public switched telephone network
US5644686A (en) * 1994-04-29 1997-07-01 International Business Machines Corporation Expert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications
US5715373A (en) * 1994-10-20 1998-02-03 Tandem Computers Incorporated Method and apparatus for preparing a suite of test scripts for testing a proposed network management application
US5937413A (en) * 1994-11-30 1999-08-10 Electronics And Telecommunications Research Institure Data audits based on timestamp criteria in replicated data bases within digital mobile telecommunication system
US5701400A (en) * 1995-03-08 1997-12-23 Amado; Carlos Armando Method and apparatus for applying if-then-else rules to data sets in a relational data base and generating from the results of application of said rules a database of diagnostics linked to said data sets to aid executive analysis of financial data
US5842193A (en) * 1995-07-28 1998-11-24 Sterling Software, Inc. Knowledge based planning and analysis (KbPA)™
US5813009A (en) * 1995-07-28 1998-09-22 Univirtual Corp. Computer based records management system method
US5758150A (en) * 1995-10-06 1998-05-26 Tele-Communications, Inc. System and method for database synchronization
JPH09214493A (en) * 1996-02-08 1997-08-15 Hitachi Ltd Network system
US5960200A (en) * 1996-05-03 1999-09-28 I-Cube System to transition an enterprise to a distributed infrastructure
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5764908A (en) * 1996-07-12 1998-06-09 Sofmap Future Design, Inc. Network system containing program modules residing in different computers and executing commands without return results to calling modules
US6202174B1 (en) * 1996-09-16 2001-03-13 Advanced Micro Devices Inc Method for identifying and correcting errors in a central processing unit
US6298376B1 (en) * 1997-03-07 2001-10-02 General Electric Company Fault tolerant communication monitor for a master/slave system
US6389112B1 (en) * 1997-05-07 2002-05-14 Nortel Networks Limited Method and apparatus for on-line monitoring of telecommunication network switches
US5966532A (en) * 1997-07-10 1999-10-12 National Instruments Corporation Graphical code generation wizard for automatically creating graphical programs
JPH11194089A (en) * 1997-08-20 1999-07-21 Daimler Benz Ag Determining method of road surface condition
US6574621B1 (en) * 1997-09-23 2003-06-03 Unisys Corporation Survey analysis system and method
US6714979B1 (en) * 1997-09-26 2004-03-30 Worldcom, Inc. Data warehousing infrastructure for web based reporting tool
US6131087A (en) * 1997-11-05 2000-10-10 The Planning Solutions Group, Inc. Method for automatically identifying, matching, and near-matching buyers and sellers in electronic market transactions
US6178486B1 (en) * 1998-02-19 2001-01-23 Quantum Corporation Time allocation shared memory arbitration for disk drive controller
US6256635B1 (en) * 1998-05-08 2001-07-03 Apple Computer, Inc. Method and apparatus for configuring a computer using scripting
US6748451B2 (en) * 1998-05-26 2004-06-08 Dow Global Technologies Inc. Distributed computing environment using real-time scheduling logic and time deterministic architecture
US6577711B1 (en) * 1998-05-28 2003-06-10 Bellsouth Intellectual Property Corporation Methods for detecting defective communications lines
US6360332B1 (en) * 1998-06-22 2002-03-19 Mercury Interactive Corporation Software system and methods for testing the functionality of a transactional server
US6225911B1 (en) * 1998-07-30 2001-05-01 Canon Kabushiki Kaisha Information processing apparatus and its control method for cooling inside apparatus with fan
US6463470B1 (en) * 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6427230B1 (en) * 1998-11-09 2002-07-30 Unisys Corporation System and method for defining and managing reusable groups software constructs within an object management system
US6605120B1 (en) * 1998-12-10 2003-08-12 International Business Machines Corporation Filter definition for distribution mechanism for filtering, formatting and reuse of web based content
US6341287B1 (en) * 1998-12-18 2002-01-22 Alternative Systems, Inc. Integrated change management unit
US6442714B1 (en) * 1999-03-17 2002-08-27 Cisco Technology Web-based integrated testing and reporting system
US6446200B1 (en) * 1999-03-25 2002-09-03 Nortel Networks Limited Service management
US6807549B2 (en) * 1999-06-03 2004-10-19 B.I.S. Advanced Software Systems Ltd. General purpose interpreter and database for accessing enterprise servers over an internet protocol network
US6470388B1 (en) * 1999-06-10 2002-10-22 Cisco Technology, Inc. Coordinated extendable system for logging information from distributed applications
US6523027B1 (en) * 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US6601233B1 (en) * 1999-07-30 2003-07-29 Accenture Llp Business components framework
US7139999B2 (en) * 1999-08-31 2006-11-21 Accenture Llp Development architecture framework
US6662357B1 (en) * 1999-08-31 2003-12-09 Accenture Llp Managing information in an integrated development architecture framework
US6560774B1 (en) * 1999-09-01 2003-05-06 Microsoft Corporation Verifier to check intermediate language
US6735630B1 (en) * 1999-10-06 2004-05-11 Sensoria Corporation Method for collecting data using compact internetworked wireless integrated network sensors (WINS)
US6578199B1 (en) * 1999-11-12 2003-06-10 Fujitsu Limited Automatic tracking system and method for distributable software
US20020013782A1 (en) * 2000-02-18 2002-01-31 Daniel Ostroff Software program for internet information retrieval, analysis and presentation
US6757357B1 (en) * 2000-02-29 2004-06-29 Bellsouth Intellectual Property Corporation Failure response procedure and system
US6449620B1 (en) * 2000-03-02 2002-09-10 Nimble Technology, Inc. Method and apparatus for generating information pages using semi-structured data stored in a structured manner
US6701514B1 (en) * 2000-03-27 2004-03-02 Accenture Llp System, method, and article of manufacture for test maintenance in an automated scripting framework
US6961765B2 (en) * 2000-04-06 2005-11-01 Bbx Technologies, Inc. System and method for real time monitoring and control of networked computers
WO2001091438A1 (en) * 2000-05-19 2001-11-29 Synapse Wireless, Inc. Method and apparatus for generating dynamic graphical representations and real-time notification of the status of a remotely monitored system
US7565326B2 (en) * 2000-05-25 2009-07-21 Randle William M Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access
US6751661B1 (en) * 2000-06-22 2004-06-15 Applied Systems Intelligence, Inc. Method and system for providing intelligent network management
US6785683B1 (en) * 2000-07-06 2004-08-31 International Business Machines Corporation Categorization and presentation tool for code resources
US6944662B2 (en) * 2000-08-04 2005-09-13 Vinestone Corporation System and methods providing automatic distributed data retrieval, analysis and reporting services
US6662235B1 (en) * 2000-08-24 2003-12-09 International Business Machines Corporation Methods systems and computer program products for processing complex policy rules based on rule form type
US7599851B2 (en) * 2000-09-05 2009-10-06 Renee Frengut Method for providing customized user interface and targeted marketing forum
US6477575B1 (en) * 2000-09-12 2002-11-05 Capital One Financial Corporation System and method for performing dynamic Web marketing and advertising
WO2002027470A2 (en) * 2000-09-26 2002-04-04 Z Force Corporation Reusable parts for assembled software systems
US20020099829A1 (en) * 2000-11-27 2002-07-25 Richards Kenneth W. Filter proxy system and method
DE10062471A1 (en) * 2000-12-14 2002-07-04 Witzig & Frank Gmbh Machining facility and machine control program
US6816871B2 (en) * 2000-12-22 2004-11-09 Oblix, Inc. Delivering output XML with dynamically selectable processing
US7194683B2 (en) * 2001-03-02 2007-03-20 International Business Machines Corporation Representing and managing dynamic data content for web documents
US20020169738A1 (en) * 2001-05-10 2002-11-14 Giel Peter Van Method and system for auditing an enterprise configuration
US8141144B2 (en) * 2001-05-10 2012-03-20 Hewlett-Packard Development Company, L.P. Security policy management for network devices
US20020176377A1 (en) * 2001-05-22 2002-11-28 Hamilton Thomas E. Service platform on wireless network
US6585527B2 (en) * 2001-05-31 2003-07-01 Samtec, Inc. Compliant connector for land grid array
US7194503B2 (en) * 2001-06-29 2007-03-20 Microsoft Corporation System and method to query settings on a mobile device
US6778979B2 (en) * 2001-08-13 2004-08-17 Xerox Corporation System for automatically generating queries
US6732090B2 (en) * 2001-08-13 2004-05-04 Xerox Corporation Meta-document management system with user definable personalities
US6973587B1 (en) * 2002-05-03 2005-12-06 American Megatrends, Inc. Systems and methods for out-of-band booting of a computer

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6658568B1 (en) * 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US6229540B1 (en) * 1996-02-23 2001-05-08 Visionael Corporation Auditing networks
US5821937A (en) * 1996-02-23 1998-10-13 Netsuite Development, L.P. Computer method for updating a network design
US5862325A (en) * 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure
US5787253A (en) * 1996-05-28 1998-07-28 The Ag Group Apparatus and method of analyzing internet activity
US6006230A (en) * 1997-01-15 1999-12-21 Sybase, Inc. Database application development system with improved methods for distributing and executing objects across multiple tiers
US6151688A (en) * 1997-02-21 2000-11-21 Novell, Inc. Resource management in a clustered computer system
US6016394A (en) * 1997-09-17 2000-01-18 Tenfold Corporation Method and system for database application software creation requiring minimal programming
US5999734A (en) * 1997-10-21 1999-12-07 Ftl Systems, Inc. Compiler-oriented apparatus for parallel compilation, simulation and execution of computer programs and hardware models
US6148402A (en) * 1998-04-01 2000-11-14 Hewlett-Packard Company Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls
US6498657B1 (en) * 1999-03-17 2002-12-24 Prout Ag Programmable data extractor, data analyzer, and printer report generator
US6542898B1 (en) * 1999-05-12 2003-04-01 Motive Communications, Inc. Technical support chain automation with guided self-help capability using active content developed for specific audiences
US6529954B1 (en) * 1999-06-29 2003-03-04 Wandell & Goltermann Technologies, Inc. Knowledge based expert analysis system
US6571282B1 (en) * 1999-08-31 2003-05-27 Accenture Llp Block-based communication in a communication services patterns environment
US6601234B1 (en) * 1999-08-31 2003-07-29 Accenture Llp Attribute dictionary in a business logic services environment
US6502102B1 (en) * 2000-03-27 2002-12-31 Accenture Llp System, method and article of manufacture for a table-driven automated scripting architecture
US6925443B1 (en) * 2000-04-26 2005-08-02 Safeoperations, Inc. Method, system and computer program product for assessing information security
US20020005867A1 (en) * 2000-05-22 2002-01-17 Yaniv Gvily Snippet selection
US6766319B1 (en) * 2000-10-31 2004-07-20 Robert J. Might Method and apparatus for gathering and evaluating information
US20020156799A1 (en) * 2001-04-24 2002-10-24 Stephen Markel System and method for verifying and correcting websites

Cited By (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7146350B2 (en) 2001-05-10 2006-12-05 Hewlett-Packard Development Company, L.P. Static and dynamic assessment procedures
US20020169739A1 (en) * 2001-05-10 2002-11-14 Carr Adam Michael Method and apparatus for composite analysis using hierarchically organized directives
US20030140278A1 (en) * 2001-05-10 2003-07-24 Holland Paul Edward static and dynamic assessment procedures
US20040015908A1 (en) * 2001-05-10 2004-01-22 Giel Peter Van Apparatus and method for analysis driven issue report generation
US20020169738A1 (en) * 2001-05-10 2002-11-14 Giel Peter Van Method and system for auditing an enterprise configuration
US20030212734A1 (en) * 2002-05-07 2003-11-13 Gilbert Mark Stewart Decoupled routing network method and system
US7668899B2 (en) * 2002-05-07 2010-02-23 Alcatel-Lucent Usa Inc. Decoupled routing network method and system
US7912899B2 (en) 2002-09-06 2011-03-22 Oracle International Corporation Method for selectively sending a notification to an instant messaging device
US9094258B2 (en) 2002-09-06 2015-07-28 Oracle International Corporation Method and apparatus for a multiplexed active data window in a near real-time business intelligence system
US20040049477A1 (en) * 2002-09-06 2004-03-11 Iteration Software, Inc. Enterprise link for a software database
US8255454B2 (en) 2002-09-06 2012-08-28 Oracle International Corporation Method and apparatus for a multiplexed active data window in a near real-time business intelligence system
US8577989B2 (en) 2002-09-06 2013-11-05 Oracle International Corporation Method and apparatus for a report cache in a near real-time business intelligence system
US8165993B2 (en) 2002-09-06 2012-04-24 Oracle International Corporation Business intelligence system with interface that provides for immediate user action
US7454423B2 (en) * 2002-09-06 2008-11-18 Oracle International Corporation Enterprise link for a software database
US7899879B2 (en) 2002-09-06 2011-03-01 Oracle International Corporation Method and apparatus for a report cache in a near real-time business intelligence system
US8001185B2 (en) 2002-09-06 2011-08-16 Oracle International Corporation Method and apparatus for distributed rule evaluation in a near real-time business intelligence system
US7945846B2 (en) 2002-09-06 2011-05-17 Oracle International Corporation Application-specific personalization for data display
US7941542B2 (en) 2002-09-06 2011-05-10 Oracle International Corporation Methods and apparatus for maintaining application execution over an intermittent network connection
US8566693B2 (en) 2002-09-06 2013-10-22 Oracle International Corporation Application-specific personalization for data display
US8402095B2 (en) 2002-09-16 2013-03-19 Oracle International Corporation Apparatus and method for instant messaging collaboration
US7668917B2 (en) 2002-09-16 2010-02-23 Oracle International Corporation Method and apparatus for ensuring accountability in the examination of a set of data elements by a user
US7904823B2 (en) 2003-03-17 2011-03-08 Oracle International Corporation Transparent windows methods and apparatus therefor
US7543297B2 (en) * 2003-11-24 2009-06-02 International Business Machines Corporation Collaborative planning actions and recipes
US20090178055A1 (en) * 2003-11-24 2009-07-09 International Business Machines Corporation Collaborative planning actions and recipes
US8219607B2 (en) 2003-11-24 2012-07-10 International Business Machines Corporation Collaborative planning actions and recipes
US20050114859A1 (en) * 2003-11-24 2005-05-26 International Business Corporation Collaborative planning actions and recipes
US20050138054A1 (en) * 2003-12-18 2005-06-23 Godwin Ian F. Device control support information acquisition
US7581116B2 (en) * 2003-12-18 2009-08-25 International Business Machines Corporation Device control support information acquisition
US20090216573A1 (en) * 2005-05-04 2009-08-27 Abb Research Ltd. Method and device for automatic event detection and report generation
US20060265641A1 (en) * 2005-05-17 2006-11-23 International Business Machines Corporation Custom report generation
US7680823B2 (en) * 2005-05-17 2010-03-16 International Business Machines Corporation Custom report generation
US8843461B2 (en) 2005-08-09 2014-09-23 Nexsan Technologies Canada Inc. Data archiving system
US8086578B2 (en) * 2005-08-09 2011-12-27 Nexsan Technologies Canada Inc. Data archiving system
US7801871B2 (en) * 2005-08-09 2010-09-21 Nexsan Technologies Canada Inc. Data archiving system
US20070038857A1 (en) * 2005-08-09 2007-02-15 Gosnell Thomas F Data archiving system
US20100299315A1 (en) * 2005-08-09 2010-11-25 Nexsan Technologies Canada Inc. Data archiving system
US20080091733A1 (en) * 2006-10-16 2008-04-17 Scott Shelton Reusable data query language statements
US20080208906A1 (en) * 2007-02-28 2008-08-28 Business Objects, S.A. Apparatus and method for defining and processing publication objects
US8234569B2 (en) * 2007-02-28 2012-07-31 Business Objects Software Ltd. Apparatus and method for defining and processing publication objects
US20090089247A1 (en) * 2007-09-28 2009-04-02 Terrence Lynn Blevins Methods and apparatus to standardize data properties in a process control environment
US20090150800A1 (en) * 2007-12-05 2009-06-11 Glenn Wood Apparatus, Method and Computer Program Product for Generating Debriefing Charts
US8433750B1 (en) * 2010-04-22 2013-04-30 Imdb.Com, Inc. Collecting client-side performance metrics and latencies
US9160640B1 (en) 2010-04-22 2015-10-13 Imdb.Com, Inc. Collecting client-side performance metrics and latencies
JP2013131210A (en) * 2011-11-21 2013-07-04 Ricoh Co Ltd Report generation apparatus, report generation system, and report generation program
US20130132337A1 (en) * 2011-11-21 2013-05-23 Yusaku Masuda Report generation apparatus, report generation system, and computer program product
US9195659B2 (en) * 2011-11-21 2015-11-24 Ricoh Company, Limited Report generation apparatus, report generation system, and computer program product
US11216453B2 (en) 2014-01-30 2022-01-04 Splunk Inc. Data visualization in a dashboard display using panel templates
US20150212663A1 (en) * 2014-01-30 2015-07-30 Splunk Inc. Panel templates for visualization of data within an interactive dashboard
US9836502B2 (en) * 2014-01-30 2017-12-05 Splunk Inc. Panel templates for visualization of data within an interactive dashboard
US11797532B1 (en) 2014-01-30 2023-10-24 Splunk Inc. Dashboard display using panel templates
US20150293830A1 (en) * 2014-04-15 2015-10-15 Splunk Inc. Displaying storage performance information
US10552287B2 (en) 2014-04-15 2020-02-04 Splunk Inc. Performance metrics for diagnosing causes of poor performing virtual machines
US11314613B2 (en) 2014-04-15 2022-04-26 Splunk Inc. Graphical user interface for visual correlation of virtual machine information and storage volume information
US11645183B1 (en) 2014-04-15 2023-05-09 Splunk Inc. User interface for correlation of virtual machine information and storage information
US9990265B2 (en) * 2014-04-15 2018-06-05 Splunk Inc. Diagnosing causes of performance issues of virtual machines

Also Published As

Publication number Publication date
US20020169739A1 (en) 2002-11-14
US20040015908A1 (en) 2004-01-22
US6952689B2 (en) 2005-10-04
US20030177106A1 (en) 2003-09-18
US7146350B2 (en) 2006-12-05
US20040006546A1 (en) 2004-01-08
DE10220938A1 (en) 2003-01-02
US20030135476A1 (en) 2003-07-17
US20030140278A1 (en) 2003-07-24
US20020169734A1 (en) 2002-11-14
US20040015907A1 (en) 2004-01-22
US7028221B2 (en) 2006-04-11
US20020169738A1 (en) 2002-11-14

Similar Documents

Publication Publication Date Title
US6952689B2 (en) Automating expert knowledge with analyzer harness
US6859893B2 (en) Service guru system and method for automated proactive and reactive computer system analysis
CA2391125C (en) Method for computer-assisted testing of software application components
US8539282B1 (en) Managing quality testing
RU2375744C2 (en) Model based management of computer systems and distributed applications
US7895470B2 (en) Collecting and representing knowledge
US8312322B2 (en) System for automated generation of computer test procedures
US7673179B2 (en) Online testing unification system with remote test automation technology
US4766595A (en) Fault diagnostic system incorporating behavior models
US20060106796A1 (en) Knowledge stores for interactive diagnostics
Ghoshal et al. Provenance from log files: a BigData problem
JPH0644242B2 (en) How to solve problems in computer systems
US20020032802A1 (en) Method and system for a programmatic feedback process for end-user support
US8412808B2 (en) Method and framework for service-based remote support delivery
Górski et al. Towards automation of IT systems repairs
Liu Fault diagnosis using process mining
Dolado Tool Support for the Typed Generic Process Model D. Rodriguez. R. Harrison, M. Satpathy The University of Reading Reading, RG6 6A), UK E-mails:/drodriguez-garcia, r. harrison, m. satpathy/(a) rdgac. uk
US20040194091A1 (en) System and method for capturing and managing a process flow
Barton Implementing a relational database for an accelerated-life-test facility
Dev et al. ert Syste
Gilmartin et al. Preliminary architecture for the predictive failures and advanced diagnostics program
Saib Future Ada environments
Saib Future Ada TM environments
Vasyutynskyy et al. Troubleshooting in MES of a Semiconductor Factory

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HOLLAND, PAUL EDWARD;CARR, ADAM MICHAEL;MCDOWELL, MARK WILLIAM;REEL/FRAME:013744/0604

Effective date: 20030616

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION