- Pleasanton CA, US Nikhil Gopinath Kurup - Tampa FL, US Hari Chandrasekhar - Highlands Ranch CO, US Benjamin Thomas - San Jose CA, US
Assignee:
Sedai Inc. - Pleasanton CA
International Classification:
G06F 9/50 G06N 3/08
Abstract:
Implementations described herein relate to methods, systems, and computer-readable media to manage a computing resource allocation for a software application. In some implementations, a method may include executing a first test function using the distributed computing system at a first plurality of allocation setpoints for the computing resource, based on the execution, obtaining one or more performance metrics for the first test function for each setpoint of the first plurality of allocation setpoints, training a machine learning model based on the obtained one or more performance metrics; and utilizing the trained machine learning model to manage the computing resource for a second function.
Cloud Management System With Autonomous Aberrant Behavior Detection
- Pleasanton CA, US Nikhil Gopinath Kurup - Tampa FL, US Hari Chandrasekhar - Highlands Ranch CO, US Benjamin Thomas - San Jose CA, US Vaibhav Desai - Fremont CA, US
Assignee:
Sedai Inc. - Pleasanton CA
International Classification:
G06F 11/07
Abstract:
Implementations described herein relate to methods, systems, and computer-readable media to identify anomalous applications. In some implementations, the methods may include obtaining application metric data that includes application level metrics and instance level metrics for each instance of a plurality of instances associated with a respective application of a plurality of applications operating over a distributed computing system, generating a first anomaly detection score based on the instance level metrics; generating a second anomaly detection score based on one or more input metrics associated with the respective application, generating a third anomaly detection score based on seasonal metric data associated with the respective application and identifying at least one application of the plurality of applications as an anomalous application based on the first anomaly detection score, the second anomaly detection score, and the third anomaly detection score.
- Pleasanton CA, US Nikhil Gopinath Kurup - Tampa FL, US Hari Chandrasekhar - Highlands Ranch CO, US Benjamin Thomas - San Jose CA, US
Assignee:
Sedai Inc. - Pleasanton CA
International Classification:
G06F 11/34 G06F 11/30
Abstract:
Implementations described herein relate to methods, systems, and computer-readable media to monitor a distributed computing system. In some implementations, a method may include obtaining a first plurality of monitoring metrics of a respective application of one or more applications executing over the distributed computing system, obtaining time-series data of the first plurality of monitoring metrics, programmatically analyzing the time-series data of the first plurality of monitoring metrics to determine a second plurality of monitoring metrics, wherein the second plurality of monitoring metrics is determined to be a predictive set of the first plurality of monitoring metrics, and monitoring the distributed computing system by monitoring the second plurality of monitoring metrics.