ON INTEGRATION OF EVOLVING INFRASTRUCTURE TOPOLOGY GRAPHS AND METRIC DATA STREAMS IN INFORMATION TECHNOLOGY INFRASTRUCTURE MANAGEMENT
DOI:
https://doi.org/10.17770/etr2021vol2.6607Keywords:
infrastructure monitoring, infrastructure topology, stream processing, evolving graphsAbstract
Modern cloud-based information technology (IT) infrastructure monitoring context and data are gathered from various systems. Typical monitoring systems provide a set of metrics characterizing the performance and health of a variety of infrastructure components. To understand the dependencies and relations among these measurements, the infrastructure topology can be analysed to provide context to the monitoring metrics. However, the metrics and the topology are updated at different time intervals and providing continuous merging and analysis of both data sets is a challenging task which is rarely addressed in the scientific literature. The paper elaborates a method for integration of infrastructure topology graph and monitoring metric data streams. The method is intended for application in the identification of anomalies in IT infrastructure.
Downloads
References
R. Harper and P. Tee, “A method for temporal event correlation,” 2019 IFIP/IEEE Symp. Integr. Netw. Serv. Manag. IM 2019, pp. 13–18, 2019.
S. Majumdar et al., Cloud security auditing, vol. 76. 2019.
J. Kampars and J. Grabis, “Near Real-Time Big-Data Processing for Data Driven Applications,” Proc. - 2017 Int. Conf. Big Data Innov. Appl. Innov. 2017, vol. 2018-Janua, pp. 35–42, 2018.
T. Niwa, Y. Kasuya, and T. Kitahara, “Anomaly detection for openstack services with process-related topological analysis,” 2017 13th Int. Conf. Netw. Serv. Manag. CNSM 2017, vol. 2018-Janua, pp. 1–5, 2017.
J. Schoenfisch, C. Meilicke, J. von Stülpnagel, J. Ortmann, and H. Stuckenschmidt, “Root cause analysis in IT infrastructures using ontologies and abduction in Markov Logic Networks,” Inf. Syst., vol. 74, pp. 103–116, 2018.
S. Bleikertz, C. Vogel, T. Gross, and S. Mödersheim, “Proactive security analysis of changes in virtualized infrastructures,” ACM Int. Conf. Proceeding Ser., vol. 7-11-Decem, pp. 51–60, 2015.
S. Bleikertz, C. Vogel, and T. Groß, “Cloud radar: Near real-time detection of security failures in dynamic virtualized infrastructures,” ACM Int. Conf. Proceeding Ser., vol. 2014-Decem, no. December, pp. 26–35, 2014.
P. Mensah, S. Dubus, W. Kanoun, C. Morin, G. Piolle, and E. Totel, “Connectivity graph reconstruction for networking cloud infrastructures,” 2017 IEEE 16th Int. Symp. Netw. Comput. Appl. NCA 2017, vol. 2017-Janua, pp. 1–9, 2017.
R. Mijumbi, A. Asthana, C. Bernal, and M. Castejon, “MAYOR: machine learning and analytics for automated operations and recovery,” Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2019-July, 2019.