Not Applicable.
Not Applicable.
The invention disclosed broadly relates to the field of computer network management. More particularly, the present invention relates to hardware and software for monitoring and capturing the behavior of undesired events and event generating components or subsystems on a distributed system through indirect time stamping and performance of online and offline dynamic masking of the event information for probing and minimization of future undesirable events.
A distributed system typically contains a plurality of processors, subsystem components, instruments and other electronic devices. These may include a number of software and real-time system monitoring devices for system environmental parameters. These devices, processors, intra processor components, system software and hardware components need to be synchronized with one another in order to correlate the occurrence of any usual or unusual software or hardware events spanning over one or more independent functional units. Thus, the synchronization in time to a desired precision level affects both the design and the debugging of the distributed system before and after the hardware manufacture.
With respect to the occurrence of faults in large scale distributed systems, logging hardware and software events, isolating faults and identifying problems are some of the most difficult tasks to perform. In order to achieve these features, it is necessary to precisely order the events in terms of their occurrence through synchronized time stamps. Usually time stamps are obtained by issuing system calls to the operating system. However, this approach does not address problems such as, once a node fails, there is no guarantee that the system call will be able to obtain the time stamp successfully executed. In addition, there is a non-deterministic processing time to service the system call which makes precise time stamping difficult. Furthermore, multiple error events may get the same time stamp which prevents event ordering. Even if an ordering scheme through indirect time stamping can solve such a problem, it is time consuming to record the events, process these events and then take action for the system. Finally, if all events get the same treatment in terms of preprocessing and taking an action, the time required to take an action might be too long to prevent short term events accruing within a particular node. Hence there is a need, not only to precisely record the occurrences of faults without system intervention, but also to design a system which is able to address the long term and short term events in such a manner that the action plan is more effective. There is also a requirement to have the machine state of any distributed system properly frozen for future debugging and probing.
An embodiment of the present invention is directed toward a distributed network having a plurality of processors. A local counter is associated with each of a plurality of processors in the distributed network. An event register is associated with each of the local counters. A system monitor receives a counter value from the local counter in response to an event being registered in the event register. The system monitor includes an event logger for storing information concerning at least a portion of the events. The event logger preferably records data concerning a type of event registered by the event register and a time an event occurred. The event register remains frozen until the event register is read by a monitoring system. Masking mechanisms filter the event register outputs to differentiate between critical and non-critical events. The masking is dynamically updated during online processing. During offline analysis conditional probability calculations are done to prepare the conditional probability table. During online analysis conditional probability lookups are performed to determine if a probability of an event occurring has exceeded a threshold level and to determine if remedial or accommodative action needs to be taken. The counter is preferably 64 bits or more in width to insure an accurate time stamp. The event register preferably includes an error time stamp register that receives a value from the local counter when an event occurs and an error occurred register that indicates to the system monitor that an error event has occurred.
Another embodiment of the present invention is directed toward a method of producing a time stamp for an event occurring on a distributed network that includes a plurality of processors. According to the method, a local counter value is produced for each of a plurality of processors in the distributed network with an associated counter. The local counter at each of the processors is synchronized with a global clock. The local counter for a processor is frozen when an event associated with the processor occurs. The local counters are periodically polled with the system monitor. The events are dynamically filtered based on a recorded history of information associated with the occurrence of events such that only critical events are reported to the system monitor. During online analysis, conditional probability lookups are performed to determine if a probability that a critical event will occur exceeds a threshold level and preventative action is performed if such threshold is exceeded. Events that occur are dynamically masked based on conditional probabilistic lookups using machine learning algorithms during online analysis. The type of event that occurred is determined and whether or not to produce a global alert, synch stop or machine check alert signal is determined based upon the type of event that occurred. Offline analysis is used to update the history table and conditional probabilities and determine when online analysis of a problem is possible.
Yet another embodiment of the present invention is directed toward a distributed computer system having hardware and software for implementing a time stamping process to produce a time stamp associated with an occurrence of an error event. The distributed computer system includes a plurality of local counters wherein each counter is associated with a particular processor or system in the distributed computer system. An event register records event information concerning an occurrence of a critical event associated with the processor and event register. An event logger receives and logs information concerning the occurrence of the events. A global clock synchronizes the local counters. Dynamic masks or filters are created based upon historical event information to determine whether or not an event that occurred is a critical event. Software evaluates events based on conditional probabilistic calculations and schedules remedial or preventative action accordingly during online analysis.
The present invention provides hardware and software mechanisms that achieve accurate time stamping through indirect means and dynamic masking mechanisms for online event isolation and control. Both the hardware and software dynamic masking mechanisms are based on conditional probabilistic calculations using machine learning algorithms. The conditional probabilities and event histories are updated during offline analysis. Event prediction and process migration is performed during online analysis.
Referring to
The use of a dedicated register and counter 103 allows a more accurate time stamp to be obtained without a system call by the clock 104 to obtain the time stamp for an event that occurred. In accordance with the approach, the clock 104 is synchronized to a higher accuracy than the accuracy level at which the error events are collected. Thus, the clock's 104 accuracy level may be on the order of 1 microsecond throughout while the distributed system records the time in increments of seconds. To collect the events at a higher level of accuracy, the counters 103 are selected to be large enough to provide a high degree of resolution within the required recording accuracy time. Each counter 103 resets at the same time globally within the distributed system. Thus, all events, irrespective of the processor 102 at which they occur, can be time stamped at a particular instant and counter 103 value which is frozen when the event occurs at the particular processor 102 or chip. In addition, event information 108 is passed from the memory 106 to the registers 103 when an error event occurs. The registers 103 preferably include a device control register that stores event type information related to the occurrence of an event. Since the counter 103 value is frozen in the register 103, the accuracy of the system event recording can be independent of the frequency at which the events are polled from the processors 102 or chips to be recorded globally through the event logger 105. Although a global synchronized clock time is preferred, the approach can easily be extended to cluster systems that do not have such a clock 104.
The global event logger 105 registers the counter 103 based event logs in an order that is based on the counter values from the counters 103. The event logger 105 can be implemented using a history table which preferably contains an event identification number, event type and counter value in a standard text format. The event logger 105 obtains logging information such as that set forth above from the register counters 103 through links 122. The global clock 104 is used to synchronize the counters 103 through links 121. Thus, the global clock 104 time is related to the local counters' 103 counts. Event information 108 is passed from the hardware memory 106 to the registers 103. An example of such an event would be an interrupt due to a malfunction. The registers 103 can then be polled by a system monitor for event information according to a time-based schedule or in response to interrupt signals.
Referring now to
Referring now to
Referring now to
The mechanism then proceeds to step 408 as shown in the flow chart of
Referring now to
Based on offline and online analysis, global masks can be designed. The dynamic masking process identifies a particular set of critical events and the associated cloud of non-critical events occurring in the neighborhood of the critical event. Dynamic groups are then established based on the type of critical events and the associated non-critical events. The number of non-critical events to be included within the grouping mechanism is determined by the designer, type of system and the number of simultaneous events that are required to be listed as critical events.
Referring now to
Referring now to
What has been shown and discussed is a highly-simplified depiction of a programmable computer apparatus. Those skilled in the art will appreciate that other low-level components and connections are required in any practical application of a computer apparatus. Therefore, while there has been described what is presently considered to be the preferred embodiment, it will be understood by those skilled in the art that other modifications can be made within the spirit of the invention.
This invention was developed under Subcontract No. B517552 between the Regents of the University of California Lawrence Livermore National Laboratory and IBM T. J. Watson Research Center. The Government may have certain rights in this invention.
Number | Name | Date | Kind |
---|---|---|---|
5251144 | Ramamurthi | Oct 1993 | A |
5386542 | Brann | Jan 1995 | A |
5566092 | Wang et al. | Oct 1996 | A |
5778150 | Chan et al. | Jul 1998 | A |
5822381 | Parry et al. | Oct 1998 | A |
6125390 | Touboul | Sep 2000 | A |
6151424 | Hsu | Nov 2000 | A |
6294765 | Brenn | Sep 2001 | B1 |
6405329 | Colligan et al. | Jun 2002 | B1 |
6430712 | Lewis | Aug 2002 | B2 |
6529954 | Cookmeyer et al. | Mar 2003 | B1 |
6535122 | Bristol | Mar 2003 | B1 |
6539337 | Provan et al. | Mar 2003 | B1 |
6546507 | Coyle et al. | Apr 2003 | B1 |
6591354 | Mick et al. | Jul 2003 | B1 |
6600614 | Lenny et al. | Jul 2003 | B2 |
6633835 | Moran et al. | Oct 2003 | B1 |
6651182 | Chang et al. | Nov 2003 | B1 |
6751573 | Burch | Jun 2004 | B1 |
6789182 | Brothers et al. | Sep 2004 | B1 |
6801138 | Koike | Oct 2004 | B2 |
6801940 | Moran et al. | Oct 2004 | B1 |
6868367 | Yemini et al. | Mar 2005 | B2 |
6925367 | Fontius | Aug 2005 | B2 |
6925586 | Perrella et al. | Aug 2005 | B1 |
6934256 | Jacobson et al. | Aug 2005 | B1 |
6978302 | Chisholm et al. | Dec 2005 | B1 |
6978396 | Ruuth et al. | Dec 2005 | B2 |
6988090 | Yaginuma | Jan 2006 | B2 |
7058838 | Xu | Jun 2006 | B2 |
7117119 | Van Dyk et al. | Oct 2006 | B2 |
7194445 | Chan et al. | Mar 2007 | B2 |
7254514 | House et al. | Aug 2007 | B2 |
7457991 | Teague et al. | Nov 2008 | B1 |
20010032069 | Arweiler | Oct 2001 | A1 |
20020019870 | Chirashnya et al. | Feb 2002 | A1 |
20020042847 | Takats et al. | Apr 2002 | A1 |
20020065948 | Morris et al. | May 2002 | A1 |
20020174083 | Hellerstein et al. | Nov 2002 | A1 |
20020178403 | Floyd et al. | Nov 2002 | A1 |
20030005149 | Haas et al. | Jan 2003 | A1 |
20030014699 | Kallela et al. | Jan 2003 | A1 |
20030061514 | Bardsley et al. | Mar 2003 | A1 |
20030074439 | Grabarnik et al. | Apr 2003 | A1 |
20030145255 | Harty et al. | Jul 2003 | A1 |
20030204370 | Yemini et al. | Oct 2003 | A1 |
20030208523 | Gopalan et al. | Nov 2003 | A1 |
20040006724 | Lakshmanamurthy et al. | Jan 2004 | A1 |
20040044499 | House et al. | Mar 2004 | A1 |
20040064735 | Frazier et al. | Apr 2004 | A1 |
20040136379 | Liao et al. | Jul 2004 | A1 |
20040243548 | Hulten et al. | Dec 2004 | A1 |
20050055208 | Kibkalo et al. | Mar 2005 | A1 |
20050060619 | Liberty et al. | Mar 2005 | A1 |
20050091554 | Loukianov | Apr 2005 | A1 |
20060235629 | Walker et al. | Oct 2006 | A1 |
Number | Date | Country | |
---|---|---|---|
20050144532 A1 | Jun 2005 | US |