scholarly journals A Causality Mining and Knowledge Graph Based Method of Root Cause Diagnosis for Performance Anomaly in Cloud Applications

2020 ◽  
Vol 10 (6) ◽  
pp. 2166 ◽  
Author(s):  
Juan Qiu ◽  
Qingfeng Du ◽  
Kanglin Yin ◽  
Shuang-Li Zhang ◽  
Chongshu Qian

With the development of cloud computing technology, the microservice architecture (MSA) has become a prevailing application architecture in cloud-native applications. Many user-oriented services are supported by many microservices, and the dependencies between services are more complicated than those of a traditional monolithic architecture application. In such a situation, if an anomalous change happens in the performance metric of a microservice, it will cause other related services to be downgraded or even to fail, which would probably cause large losses to dependent businesses. Therefore, in the operation and maintenance job of cloud applications, it is critical to mine the causality of the problem and find its root cause as soon as possible. In this paper, we propose an approach for mining causality and diagnosing the root cause that uses knowledge graph technology and a causal search algorithm. We verified the proposed method on a classic cloud-native application and found that the method is effective. After applying our method on most of the services of a cloud-native application, both precision and recall were over 80%.

Author(s):  
Ardiono Roma Nugraha ◽  
Aini Suri Talita

Microservice is an architecture that can solve many problems in a monolithic architecture. One of the problems is the ability to handle many concurrent users. The existing monolithic application can be restructured into microservices to increase robustness in handling a lot of users, without exception native mobile application. This study aimed to restructure the existing native mobile application named TemanBisnis into microservices. The restructuring process can be done by splitting the application features according to its business domain into one service. Two microservice architecture designs were proposed in this study, named 3-1 architecture and 2-1-1 architecture. Both architectures can handle up to 100 concurrent users, although they start to produce errors. By performance, the 3-1 architecture is better than the 2-1-1 architecture. In the end, an existing native mobile application can be restructured into microservices. The 3-1 architecture should be adopted to achieve the best results between these two architectures.


2021 ◽  
Author(s):  
Wenpeng Gao ◽  
Wenhao Zhan ◽  
Haoquan Gong ◽  
Chao Liu ◽  
Kemin Wang ◽  
...  

Author(s):  
Anna Nikolajeva

The aim of the research was to develop a marketing strategy of the Zorge marketing tool and describe its usage in e-commerce. Zorge web application will be an automatic marketing tool that will use cloud computing technology. The main benefits of the tool will be its multiuse and ability to display adverts to users who use ad blockers and create an interaction of all ads, allowing users to show relevant advertising to their website visitors. Zorge web application will be used for advert construction - pop-ups, push notifications and inner website banners, that can be placed on a clients website. It can be done by pasting short JavaScript code in their website HTML file after users will be able to manage their adverts inside their Zorge web application. The author examined several topics to develop the web application architecture - digital marketing technology current developments, competitor home pages, competitor web applications and an economic embodiment were explored. Within the research was developed a marketing strategy for the Zorge web application.


2014 ◽  
Vol 651-653 ◽  
pp. 2510-2513 ◽  
Author(s):  
Li Ping Yang ◽  
Da Wei Xu ◽  
Wei Wang

Cloud computing is a model about the increase , usage and delivery of related services in Internet, usually provides dynamically scalable and often virtualized resources by the Internet. This paper first introduces the cloud computing technology, then discusses the system structure, system flow and system function, and finally expounds the cloud computing role and the realization of the examination system .


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Zheng Liu ◽  
Guisheng Fan ◽  
Huiqun Yu ◽  
Liqiong Chen

Microservice architecture is a cloud-native architectural style, which has attracted extensive attention from the scientific research and industry communities to benefit independent development and deployment. However, due to the complexity of cloud-based platforms, the design of fault-tolerant strategies for microservice-oriented cloud applications becomes challenging. In order to improve the quality of service, it is essential to focus on the microservice with more criticality and maximize the reliability of the entire cloud application. This paper studies the modeling and analysis of service reliability in the cloud environment. Firstly, a formal description language is defined to model microservice, user request, and container accurately. Secondly, the reliability analysis is conducted to measure a critical microservice’s fluctuation and vibration attributes within a period, and the related properties of the constructed model are analyzed. Thirdly, a fault-tolerant strategy with redundancy operation has been proposed to optimize cloud application reliability. Finally, the effectiveness of the method is verified by experiments. The simulation results show that the algorithm obtains the maximum benefits and has high performance through several experiments.


2021 ◽  
Vol 26 (3) ◽  
pp. 329-335
Author(s):  
Kanusu Srinivasa Rao ◽  
Mandapati Sridhar

In Visual Cryptography Schemes (VCSs), for message n transparencies are generated, such that the original message is visible if any k of them are stacked. VCS especially for large values of k and n, the pixel expansion’s reduction and enhancement of the recovered images’ display quality continue to be critical issues. In addition to this, it is challenging to develop a practical and systematic approach to threshold VCSs. An optimization-based pixel-expansion-free threshold VCSs approach has been proposed for binary secret images’ encryption. Along with contrast, blackness is also treated as a performance metric for assessing the recovered images’ display quality. An ideally secure technique for a secret image’s protection through its partition into shadow images (known as shadows) is the Visual Secret Sharing (VSS) scheme. Acquirement of a smaller shadow size or a higher contrast is the VSS schemes’ latest focus. The white pixels’ frequency has been utilized to demonstrate the recovered image’s contrast in this work. While the Probabilistic VSS (ProbVSS) scheme is non-expansible, it can also be readily deployed depending upon the traditional VSS scheme. Initially, this work has defined the problem as a mathematical optimization model such that, while contingent on blackness and density-balance constraints, there is the maximization of the recovered images’ contrast. Afterward, an algorithm dependent on the Tabu Search (TS) is devised in this work for this problem’s resolution. Multiple complicated combinatorial problems have been successfully resolved with the powerful TS algorithm. Moreover, this work has attempted to bolster the contrast through the density-balance constraint’s slight relaxation. Compared to the older techniques, the proposed optimization-based approach is superior regarding the recovered images’ display quality and the pixel expansion factor from the experimental outcomes.


2014 ◽  
Vol 20 (2) ◽  
pp. 122-134 ◽  
Author(s):  
Kevin M. Taaffe ◽  
Robert William Allen ◽  
Lindsey Grigg

Purpose – Performance measurements or metrics are that which measure a company's performance and behavior, and are used to help an organization achieve and maintain success. Without the use of performance metrics, it is difficult to know whether or not the firm is meeting requirements or making desired improvements. During the course of this study with Lockheed Martin, the research team was tasked with determining the effectiveness of the site's existing performance metrics that are used to help an organization achieve and maintain success. Without the use of performance metrics, it is difficult to know whether or not the firm is meeting requirements or making desired improvements. The paper aims to discuss these issues. Design/methodology/approach – Research indicates that there are five key elements that influence the success of a performance metric. A standardized method of determining whether or not a metric has the right mix of these elements was created in the form of a metrics scorecard. Findings – The scorecard survey was successful in revealing good metric use, as well as problematic metrics. In the quality department, the Document Rejects metric has been reworked and is no longer within the executive's metric deck. It was also recommended to add root cause analysis, and to quantify and track the cost of non-conformance and the overall cost of quality. In total, the number of site wide metrics has decreased from 75 to 50 metrics. The 50 remaining metrics are undergoing a continuous improvement process in conjunction with the use of the metric scorecard tool developed in this research. Research limitations/implications – The metrics scorecard should be used site-wide for an assessment of all metrics. The focus of this paper is on the metrics within the quality department. Practical implications – Putting a quick and efficient metrics assessment technique in place was critical. With the leadership and participation of Lockheed Martin, this goal was accomplished. Originality/value – This paper presents the process of metrics evaluation and the issues that were encountered during the process, including insights that would not have been easily documented without this mechanism. Lockheed Martin Company has used results from this research. Other industries could also apply the methods proposed here.


Sign in / Sign up

Export Citation Format

Share Document