ServiceNow, Inc.
DETECTION AND NOTIFICATION OF ANOMALIES IN SHARED COMPUTER NETWORKS
Last updated:
Abstract:
A computational instance of a remote network management platform may be dedicated to a managed network. The computational instance may include persistent storage that contains: (i) mappings between end-user networks, services available to the end-user networks, and allocation identifiers, (ii) mappings between end-user networks, computing resources allocated to the end-user networks, and resource identifiers, and (iii) mappings between the respective allocation identifiers and the respective resource identifiers. Using the mappings, the computational instance may able to (i) determine that a particular computing resource is exhibiting an anomaly, (ii) determine a resource identifier associated with the particular computing resource, (iii) determine a allocation identifier based on the resource identifier, (iv) determine a particular end-user network associated with the allocation identifier; and (v) provide, to the managed network, an indication that the particular end-user network is potentially impacted by the anomaly.
Utility
3 May 2019
5 Nov 2020