Abstract: Data is often populated into Configuration Management Databases (CMDBs) from different sources. Because the data can come from a variety of sources, it may have inconsistencies—and may even be incomplete. A Normalization Engine (NE) may be able to automatically clean up the incoming data based on certain rules and knowledge. In one embodiment, the NE takes each Configuration Item (CI) or group of CIs that are to be normalized and applies a rule or a set of rules to see if the data may be cleaned up, and, if so, updates the CI or group of CIs accordingly. In particular, one embodiment may allow for the CI's data to be normalized by doing a look up against a Product Catalog and/or an Alias Catalog. In another embodiment, the NE architecture could be fully extensible, allowing for the creation of custom, rules-based plug-ins by users and/or third parties.
Type:
Grant
Filed:
January 11, 2010
Date of Patent:
October 8, 2013
Assignee:
BMC Software, Inc.
Inventors:
Govindarajan Rangarajan, Darius Wallace, Narayan Kumar, Douglas Mueller
Abstract: Methods and apparatus for automatically generating translation programs for translating computing services templates to service blueprints are disclosed. An example method includes generating a population of translation logic elements from a plurality of verified computing services template translation programs, where each of the verified programs is configured to correctly translate at least one computing services template of a plurality of known templates to a respective service blueprint. The example method further includes identifying a new computing services template and programmatically augmenting the population of translation logic elements. The example method also includes generating one or more additional translation programs based on the augmented population of translation logic elements and validating each of the one or more additional computing services template translation programs.
Abstract: Systems, methods and computer readable media for detecting customization of an application running on a customer's environment are described. An application's original source can maintain a master hash registry for an application. The master hash registry includes valid and invalid hash codes for all objects in the application across all versions of the application. This master hash registry may be provided to the customer. A customization detection system loads a master hash registry to memory. The customization detection system may then retrieve an application object from the application, generate hash values for the object and compare these values with the object's master hash registry values to determine whether the application object is new or whether it has been customized in a supportable or unsupportable manner. The customization detection system may then set the object's customization status based on the results of the comparison.
Abstract: In one general aspect, a computer-implemented method includes a computer-implemented method that includes executing, using at least one processor, instructions recorded on a non-transitory computer-readable storage medium. The method includes receiving a request to insert a data record within a database of a data collection system. The data record can be placed within a buffer in a main memory of the data collection system. A record data structure and a record index structure associated with the data record are defined. The record data structure and the record index structure are stored within a storage chunk in a storage medium of the database, and the storage medium is different than the main memory. The storage chunk has an associated index that can be used to retrieve the data record and the storage chunk can include other data records different than the data record associated with the received request.
Type:
Grant
Filed:
September 30, 2011
Date of Patent:
July 2, 2013
Assignee:
BMC Software, Inc.
Inventors:
Brian B. James, Eric T. Hardison, David L. Janicek
Abstract: A baseline adjusting technique allows automatically adjust the baselines of metrics affected by a configuration change a monitored system. If a configuration change is detected, a performance management system retrieves linkages between the changed configuration parameter and one or more metrics. The performance management system then adjusts the baselines of the metric using the baseline adjusting algorithm retrieved from the linkage.
Type:
Grant
Filed:
August 31, 2010
Date of Patent:
July 2, 2013
Assignee:
BMC Software, Inc.
Inventors:
Joseph A. Scarpelli, Alex Lefaive, Derek Dang, Sridhar Sodem
Abstract: Systems, methods and computer readable media that provide stateless fault tolerance and load balanced data collection using overlay namespaces are described. A cluster is used. Each node of the cluster may be a monitoring system. A data provider process may run on each node in the cluster. Each node has an overlay namespace which comprises one or more links to namespaces on other nodes, and local viewpoints of those linked namespaces. When a node detects a resource waiting to be monitored, it queries other nodes to determine whether object creation for that resource is allowed. It creates an object only if no other node is creating or has created an object for that resource.
Abstract: Systems and methods for improved batch flow management are described. At least some embodiments include a computer system for managing a job flow including a memory storing a plurality of batch queue jobs grouped into Services each including a job and a predecessor job. A time difference is the difference between a scheduled job start time and an estimated predecessor job end time. Jobs with a preceding time gap include jobs immediately preceded only by non-zero time differences. The job start depends upon the predecessor job completion. The computer system further includes a processing unit that identifies jobs preceded by a time gap, selects one of the Services, and traverses in reverse chronological order a critical path of dependent jobs within the Service until a latest job with a preceding time gap is identified or at least those jobs along the critical path preceded by another job are traversed.
Abstract: A method and system to convert an existing web service from a first web services implantation type to a second web services implementation type. Example implementation types include SOAP and Representational State Transfer (REST). This conversion is achieved by recognizing and classifying available information from each of the distinct implementation types. After proper recognition and classification as disclosed herein, a deterministic process may be utilized to assist in converting or translating the exposed interface; thereby assisting in developing an interface, based on a different interface type than the one already exposed, may be provided.
Abstract: Methods and systems to automate the deployment from one SMP/E installed run-time mainframe system logical partition (LPAR) to one or more different and distinct LPARs within a mainframe environment are described. Deployment may consist of distributing one or more installation items (e.g., complete products, product upgrades, patches and/or temporary fixes) from one installation environment to another target system. Also, the installed items may have optionally undergone further configuration after the initial installation and prior to actual automated deployment. Each of the target systems are communicatively coupled to the first (i.e., source) LPAR.
Abstract: Embodiments disclosed herein can significantly optimize a root cause analysis and substantially reduce the overall time needed to isolate the root cause or causes of service degradation in an IT environment. By building on the ability of an abnormality detection algorithm to correlate an alarm with one or more events, embodiments disclosed herein can apply data correlation to data points collected within a specified time window by data metrics involved in the generation of the alarm and the event(s). The level of correlation between the primary metric and the probable cause metrics may be adjusted using the ratio between theoretical data points and actual points. The final Root Cause Analysis score may be modified depending upon the adjusted correlation value and presented for user review through a user interface.
Type:
Grant
Filed:
October 29, 2009
Date of Patent:
June 11, 2013
Assignee:
BMC Software, Inc.
Inventors:
Joe Scarpelli, Sridhar Sodem, Ronald Alexander LeFaive
Abstract: An improved performance management technique allows automatic determination dynamic thresholds of a metric based on a baseline of the matching pattern. A pattern matching process is conducted against a set of baseline patterns to find the matching pattern. If a matching pattern is found, the baseline of the matching pattern is used as the dynamic threshold. A series of sanity checks are performed to reduce any false alarms. If the metric does not follow any pattern, a composite of baselines is selected as the dynamic threshold.
Type:
Grant
Filed:
July 30, 2010
Date of Patent:
June 4, 2013
Assignee:
BMC Software, Inc.
Inventors:
Derek Dang, Alex Lafaive, Joe Scarpelli, Sridhar Sodem
Abstract: In one aspect, a computer-implemented method for generating commands used to modify a plurality of limit key values includes determining a current value for each of the plurality of limit keys, determining a new value for each of the plurality of limit keys, and generating a normalized internal key for the current values and the new values of each of the limit keys. The method further includes iteratively determining a sequence order for each limit key using the current normalized internal keys and the new normalized limit keys and using the sequence order of each limit key to generate commands used to change the value of each limit key from the current value to the new value. The method may also include generating data used to indicate that a sequence order could not be determined.
Abstract: Systems and methods for deploying agents for a management system across IT infrastructure in an automated fashion are disclosed herein. Embodiments of the present invention allow agents to be substantially automatically deployed or configured in conjunction with previously unknown or newly added application components. More specifically, embodiments of the present invention may track traffic associated with application components to identify unknown application components. Agents may then be deployed to monitor these newly identified application components.
Abstract: A technique for collecting and correlating locking data collects and correlates information on a plurality of programs waiting on or holding a plurality of resources in a multi-computer database system. The technique identifies a program executing on one computer of the multi-computer database system that is waiting on a resource. The technique also identifies a second program, executing on another computer, as the ultimate holder of the resource. An operator display screen displays information corresponding to the first program and the second program. The operator display screen may be switched between a multiline display format and a single line display format. The collection, identification, and display of the locking data is performed periodically, to allow the operator to discover locking problems and take a desired corrective action.
Type:
Grant
Filed:
February 26, 2010
Date of Patent:
March 26, 2013
Assignee:
BMC Software, Inc.
Inventors:
Loc D. Tran, Gary B. Genest, Dale J. Stroyick
Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.
Abstract: This disclosure relates generally to the field of federated configuration management databases (CMDBs). To claim compliance with the CMDBf Standard (“the Standard”), a CMDB implementation must provide working and interoperable implementations of the interfaces defined in the Standard. To make a working implementation, certain non-obvious features are required that are not addressed by the Standard. Among these requirements are: registering management data repositories (MDRs) so that they can be federated; managing/maintaining the list of federated MDRs; querying an MDR for its Data Model; using such MDR Data Models to define mappings of one or more attributes from the MDR data model to one or more attributes of one or more of the CMDB's data models; identifying attributes and defining rules to be used when reconciliation is performed; and managing as well as storing data representative of those mappings. This disclosure addresses these and other deficiencies.
Abstract: Disclosed are embodiments of systems and methods to derive a semantic network from a CMDB relationship graph which can then be queried in a natural way from a linguistic standpoint (i.e., using natural language queries). Because disclosed embodiments combine natural language queries with an inferencing engine the disclosed systems and methods automatically “connect the dots” between disparate pieces of information and can allow for a richer user experience. In general, CMDB graph relationships can be converted into semantic networks. Once a semantic network is created, queries can be phrased to leverage the inferential relationships between objects in the semantic network.
Abstract: Disclosed are systems and methods to provide a persistent authorized server address space (ASAS). The ASAS can host components from product suites that are not able to execute in an authorized state. To host other product's components, the ASAS receives “messages” from the unauthorized product components in the form of a generic eXtensible Markup Language (XML) protocol. These messages may request product initialization/administration or performance of a function by the ASAS on behalf of the requesting product. Security constraints are also provided to ensure system and data integrity. Further, the ASAS is not tightly coupled to any requesting product so that flexibility of product update or update to the ASAS itself may not be unnecessarily constrained.
Type:
Grant
Filed:
April 28, 2010
Date of Patent:
January 8, 2013
Assignee:
BMC Software, Inc.
Inventors:
Chris Palmer, Michel Laviolette, Benton Thomas Porter
Abstract: A Method to redirect SRB routines from otherwise non-zIIP eligible processes on an IBM z/OS series mainframe to a zIIP eligible enclave is disclosed. This redirection is achieved by intercepting otherwise blocked operations and allowing them to complete processing without errors imposed by the zIIP processor configuration. After appropriately intercepting and redirecting these blocked operations more processing may be performed on the more financially cost effective zIIP processor by users of mainframe computing environments.
Abstract: A Method to redirect SRB routines from otherwise non-zIIP eligible processes on an IBM z/OS series mainframe to a zIIP eligible enclave is disclosed. This redirection is achieved by intercepting otherwise blocked operations and allowing them to complete processing without errors imposed by the zIIP processor configuration. After appropriately intercepting and redirecting these blocked operations more processing may be performed on the more financially cost effective zIIP processor by users of mainframe computing environments.