Abstract: The present disclosure relates to a method and a system for alert optimization in a network. In one example, the method comprises collecting a data related to one or more metrics from one or more database clusters. Further, on successful collection of the data from the one or more database clusters, the method further comprises storing the data in a predefined format. The method further comprises configuring one or more thresholds for one or more alerts. The method further comprises defining one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts. The method further comprises applying one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches. The method further comprises detecting a configured notification channel in case of detection of one or more threshold breach(es). The method further comprises forwarding one or more alerts to a notification service in case the configured notification channel is detected. [FIG. 4]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR ALERT OPTIMIZATION IN A
NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
METHOD AND SYSTEM FOR ALERT OPTIMIZATION IN A NETWORK
FIELD OF INVENTION
[0001] Embodiments of the present disclosure relate generally to the field of network performance management systems. More particularly, embodiment of the present disclosure relates to a method and system for alert optimization in a network.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless
communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] As the 5G ecosystem expands with increasing user base, traditional monitoring systems may generate excessive alerts, overwhelming administrators and making it difficult to prioritize and respond to critical issues. Streamlined alerting helps focus on high-priority alerts, reducing noise and alert fatigue. Various database monitoring tools often come with their unique alerting mechanisms, which can create confusion and challenges in the effective management of alerts across the environment. Implementing centralized and streamlined alert and notification support simplifies the overall alert management process, thereby making it more efficient.
[0005] Configuring and managing alerts separately for each database, especially across various tools in the extensive 5G ecosystem with numerous database clusters, can be a time-consuming and error-prone task. Streamlined alerting streamlines this process by allowing for consistent configurations of alerts and notifications, reducing the complexity and potential for errors. Without effective alerting and notifications, administrators may not receive prompt updates about emerging issues, resulting in delayed responses and possible downtime. Additionally, critical alerts could be unintentionally ignored, giving rise to significant performance concerns. Handling alerts separately through different tools creates a fragmented monitoring process where administrators need to access and interact with multiple interfaces to handle alerts from different sources, causing complexity and preventing a holistic understanding of the monitoring environment. This can hinder the identification of patterns or critical issues across the ecosystem, thus making the alert management process complex.
[0006] Thus, there exists an imperative need in the art to develop methods and systems for streamlining alert administration and notifications.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0008] An aspect of the present disclosure may relate to a method for alert optimization in a network, the method comprising collecting, by a collection unit, a data related to one or more metrics from one or more database clusters. The method further comprises on successful collection of the data from the one or more database clusters, storing, by a storage unit, the data in a predefined format. The method further comprises configuring, by a configuration unit, one or more thresholds for one or more alerts. The method further comprises defining, by a defining unit, one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts. The method further comprises applying, by an application unit, one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches. The method further comprises detecting, by a detection unit, a configured notification channel in case of detection of one or more threshold breach(es). The method further comprises forwarding, by a transceiver unit, one or more alerts to a notification service in case the configured notification channel is detected.
[0009] In an exemplary aspect of the present disclosure, the data related to one or more metrics comprises one or more performance metrics, one or more status updates and a health data which are continuously collected from the one or more database clusters.
[0010] In an exemplary aspect of the present disclosure, the one or more performance metrics comprises at least one of a slow query event, a resource
utilisation metric, a query throughput, a replication, an open connection, a deadlock, an error rate, and a buffer pool usage.
[0011] In an exemplary aspect of the present disclosure, the method further comprises normalizing, by a normalization unit, the data collected from the one or more database clusters.
[0012] In an exemplary aspect of the present disclosure, the method further comprises sending, by the transceiver unit, to an interface, an error response and log the error response in case the data is not successfully collected from the one or more database clusters.
[0013] In an exemplary aspect of the present disclosure, the method further comprises defining, by the defining unit, one or more threshold conditions that triggers the one or more alerts.
[0014] In an exemplary aspect of the present disclosure, the method further comprises sending, by the transceiver unit, via an alert optimization module to an interface, an error response and log the error response in case at least one of: the one or more rules and the one or more thresholds are not defined; and an alert monitor service is not activated and not updated.
[0015] In an exemplary aspect of the present disclosure, the method further comprises upon defining the one or more rules and the one or more thresholds, further comprising activating, by an activation unit, an alert monitor service and update an alert monitor service.
[0016] In an exemplary aspect of the present disclosure, the one or more techniques analyse the data to identify one or more deviations from the one or more thresholds via an alert optimization module.
[0017] In an exemplary aspect of the present disclosure, the method further comprises displaying, by a display unit, via an alert optimization module and an interface, one or more notifications in case the configured notification channel is not detected.
[0018] In an exemplary aspect of the present disclosure, the method further comprises configuring, by a categorization unit, via an alert optimization module, the one or more alerts based on a severity value and a potential impact value.
[0019] In an exemplary aspect of the present disclosure, the method further comprises sending, by the transceiver unit, via the notification service, one or more alerts to the configured notification channel and delivering, by the transceiver unit, a prompt notification to a user with a relevant information upon receiving the one or more alerts by the configured notification channel.
[0020] In an exemplary aspect of the present disclosure, the method further comprises the one or more notifications comprises a relevant contextual information related to the one or more alerts.
[0021] In an exemplary aspect of the present disclosure, the prompt notification is delivered through one or more channels comprising at least one of an email, a short message service (SMS) for ensuring a clear and standardized delivery of the prompt notification.
[0022] Another aspect of the present disclosure may relate to a system for alert optimization in a network, the system comprising a collection unit configured to: collect a data related to one or more metrics from one or more database clusters. The system further comprises a storage unit connected at least to the collection unit, the storage unit is configured to: on successful collection of the data from the one or more database clusters, store the data in a predefined format. The system further comprises a configuration unit connected at least to the storage unit, the
configuration unit is configured to configure one or more thresholds for one or more alerts. The system further comprises a defining unit connected at least to the configuration unit, the defining unit is configured to define one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts. The system further comprises an application unit connected at least to the defining unit, the application unit is configured to apply, one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches. The system further comprises a detection unit connected at least to the application unit, the detection unit is configured to detect a configured notification channel in case of detection of one or more threshold breach(es). The system further comprises a transceiver unit connected at least to the detection unit, wherein the transceiver unit is further configured to forward one or more alerts to a notification service in case the configured notification channel is detected.
[0023] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for alert optimization in a network, the instructions include executable code which, when executed by one or more units of a system, causes: a collection unit of the system to: collect a data related to one or more metrics from one or more database clusters. Further, the instructions include executable code which, when executed causes a storage unit is to: on successful collection of the data from the one or more database clusters, store the data in a predefined format. Further, the instructions include executable code which, when executed causes a configuration to configure one or more thresholds for one or more alerts. Further, the instructions include executable code which, when executed causes a defining unit to define one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts. Further, the instructions include executable code which, when executed causes an application unit to apply, one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches. Further, the instructions include executable code which, when executed causes a detection to detect a configured notification channel in case of detection of one or more threshold
breach(es). Further, the instructions include executable code which, when executed causes a transceiver unit to forward one or more alerts to a notification service in case the configured notification channel is detected.
OBJECTS OF THE DISCLOSURE
[0024] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0025] It is an object of the present disclosure to provide a system and a method for alert optimization in a network.
[0026] It is another object of the present disclosure for real-time detection, centralizing data, customizable alert rules, intelligent prioritization, contextual notifications, consistent communication, automated responses, and a user-friendly dashboard. These steps collectively optimize alerting and notification processes in database monitoring.
[0027] It is yet another object of the present disclosure collectively optimizes alerting and notification processes in database monitoring.
DESCRIPTION OF THE DRAWINGS
[0028] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the
disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
5 [0029] FIG. 1 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure;
[0030] FIG. 2 illustrates an exemplary block diagram of a system for alert
10 optimization in a network, in accordance with exemplary implementations of the
present disclosure;
[0031] FIG. 3 illustrates an exemplary flow diagram of a method for alert
optimization in a network, in accordance with exemplary implementations of the
15 present disclosure;
[0032] FIG. 4 illustrates a method flow diagram for alert optimization in a network, in accordance with exemplary implementations of the present disclosure; and
20 [0033] FIG. 5 illustrates a system architecture diagram for remote monitoring
performance of a database system, in accordance with exemplary implementations of the present disclosure.
[0034] The foregoing shall be more apparent from the following more detailed
25 description of the disclosure.
DETAILED DESCRIPTION
[0035] In the following description, for the purposes of explanation, various
30 specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
9
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
address any of the problems discussed above or might address only some of the
5 problems discussed above.
[0036] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
10 the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
15 [0037] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the
20 embodiments in unnecessary detail.
[0038] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
25 a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
30 [0039] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
10
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
5 known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
10
[0040] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality
15 of microprocessors, one or more microprocessors in association with a Digital
Signal Processing (DSP) core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of
20 the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0041] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
25 “a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant,
30 tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
11
contain at least one input means configured to receive an input from unit(s) which are required to implement the features of the present disclosure.
[0042] As used herein, “storage unit” or “memory unit” refers to a machine or
5 computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
10 that may be required by one or more units of the system to perform their respective
functions.
[0043] As used herein “interface” or “user interface refers to a shared boundary
across which two or more separate components of a system exchange information
15 or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
20 [0044] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller,
25 Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
circuits (FPGA), any other type of integrated circuits, etc.
[0045] As used herein the transceiver unit include at least one receiver and at least
one transmitter configured respectively for receiving and transmitting data, signals,
30 information or a combination thereof between units/components within the system
and/or connected with the system.
12
[0046] As discussed in the background section, the current known solutions have
several shortcomings. The present disclosure aims to overcome the above-
mentioned and other existing problems in this field of technology by providing
5 method and system of alert optimization in a network.
[0047] The present disclosure provides functionality for real-time detection,
centralizing data, customizable alert rules, intelligent prioritization, contextual
notifications, consistent communication, automated responses, and a user-friendly
10 dashboard. These steps collectively optimize alerting and notification processes in
database monitoring.
[0048] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings.
15
[0049] FIG. 1 illustrates an exemplary block diagram of a computing device [100] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [100] may also implement a method for alert
20 optimization in a network utilising the system. In another implementation, the
computing device [100] itself implements the method for alert optimization in a network using one or more units configured within the computing device [100], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
25
[0050] The computing device [100] may include a bus [102] or other communication mechanism for communicating information, and a hardware processor [104] coupled with bus [102] for processing information. The hardware processor [104] may be, for example, a general-purpose microprocessor. The
30 computing device [100] may also include a main memory [106], such as a random-
access memory (RAM), or other dynamic storage device, coupled to the bus [102]
13
for storing information and instructions to be executed by the processor [104]. The
main memory [106] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [104]. Such instructions, when stored in non-transitory storage media
5 accessible to the processor [104], render the computing device [100] into a special-
purpose machine that is customized to perform the operations specified in the instructions. The computing device [100] further includes a read only memory (ROM) [108] or other static storage device coupled to the bus [102] for storing static information and instructions for the processor [104].
10
[0051] A storage device [110], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [102] for storing information and instructions. The computing device [100] may be coupled via the bus [102] to a display [112], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
15 Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [114], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [102] for communicating information and command selections to the processor [104]. Another type of user input device may be a cursor controller [116], such as a
20 mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [104], and for controlling cursor movement on the display [112]. The input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
25
[0052] The computing device [100] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computing device [100] causes or programs the computing device [100] to be a special-purpose machine.
30 According to one implementation, the techniques herein are performed by the
computing device [100] in response to the processor [104] executing one or more
14
sequences of one or more instructions contained in the main memory [106]. Such
instructions may be read into the main memory [106] from another storage medium,
such as the storage device [110]. Execution of the sequences of instructions
contained in the main memory [106] causes the processor [104] to perform the
5 process steps described herein. In alternative implementations of the present
disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[0053] The computing device [100] also may include a communication interface
10 [118] coupled to the bus [102]. The communication interface [118] provides a two-
way data communication coupling to a network link [120] that is connected to a
local network [122]. For example, the communication interface [118] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
15 telephone line. As another example, the communication interface [118] may be a
local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [118] sends and receives electrical,
electromagnetic or optical signals that carry digital data streams representing
20 various types of information.
[0054] The computing device [100] can send messages and receive data, including program code, through the network(s), the network link [120] and the communication interface [118]. In the Internet example, a server [130] might
25 transmit a requested code for an application program through the Internet [128], the
ISP [126], the local network [122], a host [124] and the communication interface [118]. The received code may be executed by the processor [104] as it is received, and/or stored in the storage device [110], or other non-volatile storage for later execution.
30
15
[0055] Referring to FIG. 2, an exemplary block diagram of a system [200] for alert
optimization in a network, is shown, in accordance with the exemplary
implementations of the present disclosure. In one example, the system [200] may
be in communication with other network entities/components known to a person
5 skilled in the art. Such network entities/components have not been depicted in FIG.
2 and have not been explained here for the sake of brevity.
[0056] Further, FIG. 3 illustrates an exemplary flow diagram of a system for alert
optimization in a network, in accordance with exemplary implementations of the
10 present disclosure.
[0057] It may be noted that FIG. 2 and FIG. 3 have been explained simultaneously and may be read in conjunction with each other.
15 [0058] As depicted in FIG 2, the system [200] comprises at least one collection unit
[202], at least one storage unit [204], at least one configuration unit [206], at least one defining unit [208], at least one application unit [210], at least one detection unit [212], at least one transceiver unit [214], at least one normalization unit [216], at least one activation unit [218], at least one display unit [220] and at least one
20 categorization unit [222].
[0059] Continuing further, also, all of the components/ units of the system [200] are assumed to be connected to each other unless otherwise indicated below. As shown in FIG. 2, all units shown within the system [200] should also be assumed
25 to be connected to each other. Also, in FIG. 2, only a few units are shown, however,
the system [200] may comprise multiple such units or the system [200] may comprise any such numbers of said units, as required to implement the features of the present disclosure. Further, in an implementation, the system [200] may be present in a user device/ user equipment [102] to implement the features of the
30 present disclosure.
16
[0060] The system [200] is configured for alert optimization in a network, with the help of the interconnection between the components/units of the system [200].
[0061] In an implementation of the present disclosure, the alert optimization refers
5 to a process or system design that reduces false alarms, prioritizes important
notifications, and improves the efficiency of managing alerts in a networked system.
[0062] In the context of the present example, in operation, the collection unit [202]
10 may collect a data related to one or more metrics from one or more database
clusters. This has been depicted by Step 302 in FIG. 3.
[0063] In an implementation of the present disclosure, the collection unit [202] may collect data from different sources, like nosql databases such as
15 mongodb/redis/kafka/cassandra. The one or more metrics refers to various
measurable parameters or indicators used to evaluate the different database clusters in the network. These metrics serve as inputs for monitoring and alerting system. The alert includes performance alerts for issues like high CPU usage or slow queries, error alerts for critical failures such as deadlocks, and status alerts for
20 service availability issues.
[0064] In an example, the data related to one or more metrics comprises one or more performance metrics, one or more status updates and a health data which are continuously collected from the one or more database clusters.
25
[0065] The performance metrics measures different aspects related to the system's operational performance (speed, resource usage, efficiency). The status updates refer to the information about the current state of the system (active/inactive, running/paused). The health data are the metrics that reflect the overall health and
30 stability of the system (e.g., uptime, error rates).
17
[0066] In another example, the one or more performance metrics comprises at least one of a slow query event, a resource utilisation metric, a query throughput, a replication, an open connection, a deadlock, an error rate, and a buffer pool usage.
5 [0067] The slow query event is a situation where a query takes longer than expected
to complete. The resource utilization metric measurement of how system resources (CPU, memory, disk I/O) are being used. The query throughput is the rate at which queries are processed by the system. The replication is the process of copying data from one database to another, and the performance of this operation. The open
10 connection is the number of active database connections. The deadlock is situation
where two or more operations are waiting for each other to release resources, causing a block. The error rate refers to the frequency of errors or failures in the system. The buffer pool usage is the amount of memory used for caching data to improve query performance.
15
[0068] Continuing further, a determination may then be made to ascertain if the data has been successfully collected from the one or more database clusters or not. This has been depicted by Step 304 in FIG. 3. In cases where the data has not been successfully collected from the one or more database clusters, the transceiver unit
20 [214] may send to an interface such as (a graphical user interface (GUI), a command
line interface, and the like. The GUI refers to an interface to interact with the system [100] by the user by visual or graphical representation of icons, menu, etc. The GUI is an interface that may be used within a smartphone, laptop, computer, etc. The CLI refers to a text-based interface to interact with the system [100] as by the user),
25 an error response and log the error response. This has been depicted by Step 306 in
FIG. 3.
[0069] The error response refers to an automated message or signal generated by
the system in case an error or failure is detected during one or more operations
30 related to data collection, alert configuration, or alert detection processes.
18
[0070] In another example, on determining that the data has been successfully collected from the one or more database clusters, the process of the present subject matter may proceed forward.
5 [0071] Continuing further, thereafter, a normalization unit [216] may normalize the
data collected from the one or more database clusters.
[0072] The normalization is the process of organizing and standardizing data to
make it uniform for further analysis. The normalization unit [216] transforms the
10 raw data into a uniform format, regardless of variations in structure or type from
different database clusters.
[0073] Thereafter, after normalization, the storage unit [204] may store the
normalized data in a predefined format. This has been depicted by Step 308 in FIG.
15 3.
[0074] For example, after normalization, the storage unit [204] stores the data in a
predefined format. The term ‘predefined format’ may refer to a structured way in
which the data is organized, processed, and stored. This format is determined in
20 advance, meaning that the system expects the data to follow certain rules, schemas,
or layouts to confirm consistency, compatibility, and ease of use during further operations such as analysis, reporting, or alert generation.
[0075] It may be noted that the process of normalizing the data collected from the
25 one or more database clusters is not mandatory, and the storage unit [204] may just
simply store the data, which was collected from the one or more database clusters, in the same format in which the data was collected.
[0076] Thereafter, the configuration unit [206] may configure one or more
30 thresholds for one or more alerts. This has been depicted by Step 310 in FIG. 3.
19
[0077] In an implementation of the present disclosure, the term ‘threshold’ refers to a predefined value or limit set for a particular metric. When this limit is reached or exceeded, an alert may need to be triggered to notify the system of a potential issue. 5
[0078] For example, the threshold may be set at 80% CPU utilization. If the CPU usage exceeds this value, an alert may have to be generated because the system may be approaching a critical load.
10 [0079] The one or more alerts refers to the system capability to generate one or
more notifications or warnings when specific conditions or events occur within the system, such as when predefined thresholds for certain metrics are exceeded.
[0080] For example, if the system detects that CPU utilization exceeds a predefined
15 threshold (e.g., 80%), an alert may trigger to notify administrators about potential
performance degradation.
[0081] Continuing further, thereafter, the defining unit [208] may define one or
more rules and the one or more thresholds for the one or more metrics that triggers
20 the one or more alerts.
[0082] In an implementation of the present disclosure, the rules are logical conditions or sets of conditions that define how thresholds may be applied, when analyzing the one or more metrics.
25
[0083] The defining process involves setting up specific rules and thresholds for various system metrics. The defining unit [208] establishes the conditions under which alerts may trigger, such as when CPU usage exceeds a certain percentage or when query execution time becomes too long.
30
20
[0084] In an example, the defining unit [208] may define one or more threshold conditions that triggers the one or more alerts.
[0085] The threshold conditions are specific criteria established for various system
5 metrics to determine when an alert may be triggered. Each metric, such as CPU
utilization or error rate, has a predefined threshold value.
[0086] For example, if one of the metrics, say the threshold for CPU utilization, is
set at 80%, an alert is generated whenever the CPU usage exceeds this limit.
10 Similarly, if the error rate threshold is set at 5%, an alert will be triggered if the
error rate surpasses this percentage.
[0087] Continuing further, a check may be made to ascertain if the one or more
rules and one or more thresholds are defined or not that triggers the one or more
15 alerts. This has been depicted by Step 312 in FIG. 3. As would be noted and
appreciated, such check may allow the approaches of the present subject matter to assess whether the process needs to proceed forward or needs to be terminated.
[0088] In cases where the rules and thresholds has not been defined that triggers
20 the one or more alerts, the transceiver unit [214] may send, via an alert optimization
module to the interface, the error response and log the error, and the process may be terminated. This has been depicted by Step 314 in FIG. 3. The alert optimization module is software or hardware module dedicated to managing and optimizing alerts based on threshold breaches. 25
[0089] In cases, where the determination has been made that the thresholds are
defined, an activation unit [218] may activate an alert monitor service and update
the alert monitor service. The alert monitor service may be referred to a service that
is responsible for monitoring defined thresholds and sending alerts when breaches
30 occur. In cases, where the alert monitor service is not already activated, the
activation unit [218] may activate such monitor service. In cases where the alert
21
monitor service is already present and active, the activation unit [218] may configure and update the alert monitor service. Updating the alert monitor service may refer to configuring the alert monitor service to be able to send alert when the defined thresholds are breached. 5
[0090] Again, a check may be made to ascertain whether the previous steps are in order and the alert monitor service is successfully created and updated, or not. This has been depicted by Step 316 in FIG. 3.
10 [0091] In cases where the alert monitor service is unable to be successfully created
or updated, the transceiver unit [214] may again send, via the alert optimization module to the interface, the error response and log the error, and the process may be terminated. This has been depicted by Step 314 in FIG. 3.
15 [0092] In cases where the alert monitor service is successfully created and updated,
the process may proceed forward.
[0093] Continuing further, thereafter, an application unit [210] may apply one or
more techniques on the data stored in the predefined format for detecting one or
20 more threshold breaches. This has been depicted by Step 318 in FIG. 3.
[0094] In an implementation of the present disclosure, the application unit [210]
may apply several techniques to the data stored in a predefined format to detect
threshold breaches. These techniques include statistical analysis, such as trend
25 analysis and anomaly detection, to identify deviations from normal patterns.
[0095] In an example, the one or more techniques analyse the data to identify one or more deviations from the one or more thresholds via the alert optimization module. 30
22
[0096] The one or more techniques analyse the data to identify deviations from the
thresholds via the alert optimization module. This involves comparing the stored
data against predefined threshold values to detect any significant deviations. The
techniques such as statistical analysis and machine learning are used to examine the
5 data for anomalies or patterns that indicate a threshold has been breached.
[0097] The deviations refer to instances where monitored metrics exceed or fall short of predefined thresholds, signalling potential issues.
10 [0098] For example, a slow query event occurs when a database query takes longer
than the acceptable time set by the system, impacting performance. Similarly, resource utilization deviations happen when CPU, memory, or disk usage surpasses or drops below expected limits, indicating inefficiencies or potential failures.
15 [0099] Continuing further, thereafter, a threshold breach may be detected. This has
been depicted by Step 320 in FIG. 3.
[0100] Thereafter, the detection unit [212] may detect a configured notification channel in case of detection of one or more threshold breach(es).
20
[0101] In an implementation of the present disclosure, the detection unit [212] is responsible for identifying the appropriate notification channel when a threshold breach is detected. Upon recognizing that one or more predefined thresholds have been exceeded, the detection unit [212] verifies the presence of a configured
25 notification channel, such as email or SMS. This has been depicted by Step 322 in
FIG. 3.
[0102] In case the configured notification channel is not detected, the display unit
[220] may display, via the alert optimization module and the interface, one or more
30 notifications, as depicted by Step 324 in FIG. 3.
23
[0103] However, in case the configured notification channel is detected, the transceiver unit [214] may forward one or more alerts to a notification service. This has been depicted by Step 326 in FIG. 3.
5 [0104] For example, if a notification channel is detected, the transceiver unit [214]
forwards alerts to the notification service. The notification service is a service
responsible for delivering notifications or alerts to users or other systems based on
predefined conditions or events. This service manages the distribution of messages
through various communication channels, such as email, SMS, push notifications,
10 or in-app alerts
[0105] In one example, the categorization unit [222], may categorize the one or more alerts, via the alert optimization module, based on a severity value and a potential impact value.
15
[0106] The categorization process involves assigning alerts to different categories based on their severity and potential impact on the system. Using the categorization unit [222], the system analyses the nature of the deviation such as a minor performance issue versus a critical failure and assigns a severity value (e.g., low,
20 medium, high). It then evaluates the potential consequences of the deviation, like
whether it affects a single user or the entire system, to assign a potential impact value.
[0107] The configuration process involves setting up thresholds, rules, and alert
25 parameters in the system [300] to monitor specific metrics.
[0108] In an implementation of the present disclosure, the severity value refers to the level of seriousness or criticality of an alert. It indicates how urgent or impactful the issue is, affecting the priority for response. 30
24
[0109] These values help prioritize alerts, ensuring that high-severity, high-impact issues receive immediate attention, while lower-priority alerts are handled accordingly.
5 [0110] For example, a severity value may range from low to high, where a high
severity value signifies a critical problem that requires immediate attention.
[0111] The potential impact value denotes the extent of the effect an alert may have
on the system, operations, or users. It measures the possible consequences of the
10 issue if not addressed.
[0112] This is determined by assessing the broader effect the deviation may have on users or services.
15 [0113] For example, if a slow query impacts a critical application used by many
users, the potential impact value may be higher.
[0114] Continuing further, after the transceiver unit [214] forwards the one or more
alerts to a notification service, the notification service may send the one or more
20 alerts to the configured notification channel (as depicted by Step 328 in FIG. 3) and
deliver a prompt notification to a user with a relevant information (as depicted by Step 330 in FIG. 3) upon receiving the one or more alerts by the configured notification channel.
25 [0115] The notification service confirm that the alert reaches the intended recipient
through the notification channel such as email, SMS, or a messaging app. The relevant information refers to the details included in a notification that are directly related to the alert and necessary for addressing the issue. It encompasses key facts and context about the alert, such as nature of the issue etc.
30
25
[0116] The prompt notification refers to the timely delivery of an alert or message to inform recipients about an issue or event as soon as it occurs.
[0117] In an example, the one or more notifications comprises a relevant contextual
5 information related to the one or more alerts.
[0118] It means that each notification provides detailed and relevant background information about the alert, such as details of the alert.
10 [0119] In another example, the prompt notification is delivered through one or
more channels comprising at least one of an email, a short message service (SMS) for ensuring a clear and standardized delivery of the prompt notification.
[0120] The standardized delivery confirm that notifications are delivered in a
15 uniform manner across different communication channels. This involves using
predefined formats and procedures for sending notifications, regardless of whether they are sent via email, SMS, or other channels.
[0121] Referring to FIG. 4, an exemplary method flow diagram [400] for alert
20 optimization in a network, in accordance with exemplary implementations of the
present disclosure is shown. In an implementation the method [400] is performed by the system [200]. Further, in an implementation, the system [200] may be present in a server device to implement the features of the present disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402]. 25
[0122] At step [404], the method [400] comprises, collecting, by a collection unit [202], a data related to one or more metrics from one or more database clusters.
[0123] In operation, the collection unit [202] may collect a data related to one or
30 more metrics from one or more database clusters. In an implementation of the
present disclosure, the collection unit [202] may collect data from different sources,
26
like database clusters. The one or more metrics refers to various measurable parameters or indicators used to evaluate the different database clusters in the network. These metrics serve as inputs for monitoring and alerting system.
5 [0124] In an example, the data related to one or more metrics comprises one or
more performance metrics, one or more status updates and a health data which are continuously collected from the one or more database clusters.
[0125] At step [406], the method [400] comprises, on successful collection of the
10 data from the one or more database clusters, storing, by a storage unit [204], the
data in a predefined format.
[0126] Continuing further, a determination may then be made to ascertain if the
data has been successfully collected from the one or more database clusters or not.
15 In cases where the data has not been successfully collected from the one or more
database clusters, the transceiver unit [214] may send to an interface, an error response and log the error response.
[0127] In another example, on determining that the data has been successfully
20 collected from the one or more database clusters, the process of the present subject
matter may proceed forward.
[0128] Thereafter, a normalization unit [216] may normalize the data collected
from the one or more database clusters. After normalization, the storage unit [204]
25 may store the normalized data in a predefined format.
[0129] At step [408], the method [400] comprises, configuring, by a configuration unit [206], one or more thresholds for one or more alerts.
30 [0130] Thereafter, the configuration unit [206] may configure one or more
thresholds for one or more alerts.
27
[0131] In an implementation of the present disclosure, the term ‘threshold’ refers
to a predefined value or limit set for a particular metric. When this limit is reached
or exceeded, an alert may need to be triggered to notify the system of a potential
5 issue.
[0132] For example, the threshold may be set at 80% CPU utilization. If the CPU usage exceeds this value, an alert may have to be generated because the system may be approaching a critical load. 10
[0133] The one or more alerts refers to the system capability to generate one or more notifications or warnings when specific conditions or events occur within the system, such as when predefined thresholds for certain metrics are exceeded.
15 [0134] For example, if the system detects that CPU utilization exceeds a predefined
threshold (e.g., 80%), an alert may trigger to notify administrators about potential performance degradation.
[0135] At step [410], the method [400] comprises, defining, by a defining unit
20 [208], one or more rules and the one or more thresholds for the one or more metrics
that triggers the one or more alerts
[0136] Continuing further, thereafter, the defining unit [208] may define one or
more rules and the one or more thresholds for the one or more metrics that triggers
25 the one or more alerts.
[0137] In an implementation of the present disclosure, the rules are logical conditions or sets of conditions that define how thresholds may be applied, when analysing the one or more metrics. 30
28
[0138] In an example, the defining unit [208] may define one or more threshold conditions that triggers the one or more alerts.
[0139] The threshold conditions are specific criteria established for various system
5 metrics to determine when an alert may be triggered. Each metric, such as CPU
utilization or error rate, has a predefined threshold value.
[0140] For example, if one of the metrics, say the threshold for CPU utilization, is
set at 80%, an alert is generated whenever the CPU usage exceeds this limit.
10 Similarly, if the error rate threshold is set at 5%, an alert will be triggered if the
error rate surpasses this percentage.
[0141] At step [412], the method [400] comprises, applying, by an application unit
[210], one or more techniques on the data stored in the predefined format for
15 detecting one or more threshold breaches.
[0142] Continuing further, a check may be made to ascertain if the one or more
rules and one or more thresholds are defined or not that triggers the one or more
alerts. As would be noted and appreciated, such check may allow the approaches of
20 the present subject matter to assess whether the process needs to proceed forward
or needs to be terminated.
[0143] In cases where the rules and thresholds has not been defined that triggers
the one or more alerts, the transceiver unit [214] may send, via an alert optimization
25 module to the interface, the error response and log the error, and the process may
be terminated. The alert optimization module is software or hardware module dedicated to managing and optimizing alerts based on threshold breaches.
[0144] In cases, where the determination has been made that the thresholds are
30 defined, an activation unit [218] may activate an alert monitor service and update
29
the alert monitor service. The term alert monitor service is a service responsible for monitoring defined thresholds and sending alerts when breaches occur.
[0145] Again, a check may be made to ascertain whether the previous steps are in
5 order and the alert monitor service is successfully created and updated, or not.
[0146] In cases where the alert monitor service is unable to be successfully created
or updated, the transceiver unit [214] may again send, via the alert optimization
module to the interface, the error response and log the error, and the process may
10 be terminated.
[0147] In cases where the alert monitor service is successfully created and updated, the process may proceed forward.
15 [0148] Continuing further, thereafter, an application unit [210] may apply one or
more techniques on the data stored in the predefined format for detecting one or more threshold breaches.
[0149] In an implementation of the present disclosure, the application unit [210]
20 may apply several techniques to the data stored in a predefined format to detect
threshold breaches. These techniques include statistical analysis, such as trend analysis and anomaly detection, to identify deviations from normal patterns.
[0150] In an example, the one or more techniques analyse the data to identify one
25 or more deviations from the one or more thresholds via the alert optimization
module.
[0151] The one or more techniques analyse the data to identify deviations from the
thresholds via the alert optimization module. This involves comparing the stored
30 data against predefined threshold values to detect any significant deviations. The
30
techniques such as statistical analysis and machine learning are used to examine the data for anomalies or patterns that indicate a threshold has been breached.
[0152] At step [414], the method [400] comprises, detecting, by a detection unit
5 [212], a configured notification channel in case of detection of one or more
threshold breach(es).
[0153] Continuing further, thereafter, a threshold breach may be detected.
Thereafter, the detection unit [212] may detect a configured notification channel in
10 case of detection of one or more threshold breach(es).
[0154] In an implementation of the present disclosure, the detection unit [212] is
responsible for identifying the appropriate notification channel when a threshold
breach is detected. Upon recognizing that one or more predefined thresholds have
15 been exceeded, the detection unit [212] verifies the presence of a configured
notification channel, such as email or SMS.
[0155] In case the configured notification channel is not detected, the display unit
[220] may display, via the alert optimization module and the interface, one or more
20 notifications.
[0156] However, in case the configured notification channel is detected, the transceiver unit [214] may forward one or more alerts to a notification service.
25 [0157] At step [416], the method [400] comprises, forwarding, by the transceiver
unit [214], one or more alerts to a notification service in case the configured notification channel is detected.
[0158] For example, if a notification channel is detected, the transceiver unit [214]
30 forwards alerts to the notification service. The notification service is a service
responsible for delivering notifications or alerts to users or other systems based on
31
predefined conditions or events. This service manages the distribution of messages through various communication channels, such as email, SMS, push notifications, or in-app alerts
5 [0159] In one example, the categorization unit [222], may categorize the one or
more alerts, via the alert optimization module, based on a severity value and a potential impact value.
[0160] In an implementation of the present disclosure, the severity value refers to
10 the level of seriousness or criticality of an alert. It indicates how urgent or impactful
the issue is, affecting the priority for response.
[0161] For example, a severity value might range from low to high, where a high severity value signifies a critical problem that requires immediate attention. 15
[0162] The potential impact value denotes the extent of the effect an alert may have on the system, operations, or users. It measures the possible consequences of the issue if not addressed.
20 [0163] Continuing further, after the transceiver unit [214] forwards the one or more
alerts to a notification service, the notification service may send the one or more alerts to the configured notification channel and deliver a prompt notification to a user with a relevant information upon receiving the one or more alerts by the configured notification channel.
25
[0164] The notification service confirm that the alert reaches the intended recipient through the communication channel such as email, SMS, or a messaging app. The relevant information refers to the details included in a notification that are directly related to the alert and necessary for addressing the issue. It encompasses key facts
30 and context about the alert, such as nature of the issue etc.
32
[0165] The prompt notification refers to the timely delivery of an alert or message to inform recipients about an issue or event as soon as it occurs.
[0166] In an example, the one or more notifications comprises a relevant contextual
5 information related to the one or more alerts.
[0167] It means that each notification provides detailed and relevant background information about the alert, such as details of the alert.
10 [0168] In another example, the prompt notification is delivered through one or
more channels comprising at least one of an email, a short message service (SMS) for ensuring a clear and standardized delivery of the prompt notification.
[0169] The standardized delivery confirm that notifications are delivered in a
15 uniform manner across different communication channels. This involves using
predefined formats and procedures for sending notifications, regardless of whether they are sent via email, SMS, or other channels.
[0170] Thereafter, the method terminates at step [418]. 20
[0171] FIG. 5 illustrates a system architecture diagram for remote monitoring performance of a database system, in accordance with exemplary implementations of the present disclosure.
25 [0172] It may be noted that the foregoing description of the FIG. 5 may be read and
understood in conjunction with the descriptions of FIGS. 2-4.
[0173] Users (User A, User B, User C): These are the end-users interacting with
the system through a User Interface. Each user can request specific operations
30 related to different database clusters, such as monitoring or configuring services.
33
[0174] User Interface [502]: The user interface [502] acts as the intermediary between the users and the system’s backend services. It collects user requests and sends them to the Manager Service for further processing.
5 [0175] Manager Service [504]: The manager service [504] coordinates and
manages the operations requested by the users. It is responsible for identifying the appropriate Database Service for each request and routing the requests accordingly.
[0176] Database Services (A, B, C) [506]: Database A Service [506-1], Database
10 B Service [506-2], and Database C Service [506-3] are specialized services that
manage specific database clusters (A, B, C). These services monitor the health status and topology of their respective clusters. Each service interacts with its corresponding Database Cluster to gather health status information, perform updates, and ensure the cluster’s integrity. 15
[0177] Database Clusters (A, B, C) [508]: Database A Cluster [508-1], Database
B Cluster [508-2], and Database C Cluster [508-3] represent the actual databases
that are being monitored and managed. These clusters consist of multiple
interconnected databases, and their health and performance are crucial to the
20 system’s operation.
[0178] Centralized Data Repository [510]: The centralized data repository [510]
is where data collected from various database clusters is normalized and stored.
This repository ensures that data is in a standard format, making it easier to analyze
25 and manage.
[0179] Notification Service [512]: The notification service [512] sends alerts to
users when specific events occur, such as changes in the health status or topology
of the database clusters. This service ensures that users are informed in real-time
30 about important changes.
34
[0180] The users interact with the system through the user interface, where they
submit requests for monitoring or configuring database clusters. The user interface
[502] forwards these requests to the manager service [504], which determines
which database service [506] is responsible for handling the specific database
5 cluster [508] associated with the request. The manager service [504] then routes the
request to the appropriate database service (A, B, or C) [506]. These services
directly interact with their corresponding database clusters [508] to fulfil the
request. The data collected from the database clusters [508], such as performance
metrics, node availability, and replication status, is normalized and stored in the
10 centralized data repository [510]. If any significant changes or events are detected
during the monitoring process, the notification service [512] alerts the users.
[0181] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for alert optimization in a network the
15 instructions include executable code which, when executed by one or more units of
a system [200], causes: a collection unit [202] of the system [200] to: collect a data related to one or more metrics from one or more database clusters. Further, the instructions include executable code which, when executed causes a storage unit [204] of the system [200] to on successful collection of the data from the one or
20 more database clusters, store the data in a predefined format. Further, the
instructions include executable code which, when executed causes a configuration unit [206] of the system [200] to configure one or more thresholds for one or more alerts. Further, the instructions include executable code which, when executed causes a defining unit [208] of the system [200] to define one or more rules and the
25 one or more thresholds for the one or more metrics that triggers the one or more
alerts. Further, the instructions include executable code which, when executed causes an application unit [210] of the system [200] to apply, one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches. Further, the instructions include executable code which, when
30 executed causes a detection unit [212] of the system [200] to detect a configured
notification channel in case of detection of one or more threshold breach(es).
35
Further, the instructions include executable code which, when executed causes a transceiver unit [214] of the system [200] to forward one or more alerts to a notification service in case the configured notification channel is detected.
5 [0182] As is evident from the above, the present disclosure provides a technically
advanced solution for alert optimization in a network. The present solution provides streamlined alerts simplify the configuration and management of notifications across multiple databases in large ecosystems like 5G, saving administrators time and ensuring consistent setups. These alerts enable prompt notification of emerging
10 issues, allowing immediate action to minimize downtime. The unified notifications
facilitate quick responses, faster troubleshooting, and prioritization of critical issues based on severity. They enhance the monitoring process by improving the user experience and keeping administrators well-informed about database health and performance. By delivering alerts accurately and on time, the system helps in
15 efficient resource allocation within the 5G infrastructure, optimizing performance
and reducing downtime.
[0183] While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and
20 that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
25
[0184] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various
30 configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
36
as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
We claim:
1. A method for alert optimization in a network, the method comprising:
- collecting, by a collection unit [202], a data related to one or more metrics from one or more database clusters;
- on successful collection of the data from the one or more database clusters, storing, by a storage unit [204], the data in a predefined format;
- configuring, by a configuration unit [206], one or more thresholds for one or more alerts;
- defining, by a defining unit [208], one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts;
- applying, by an application unit [210], one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches;
- detecting, by a detection unit [212], a configured notification channel in case of detection of one or more threshold breach(es); and
- forwarding, by a transceiver unit [214], one or more alerts to a notification service in case the configured notification channel is detected.
2. The method as claimed in claim 1, wherein the data related to one or more metrics comprises one or more performance metrics, one or more status updates and a health data which are continuously collected from the one or more database clusters.
3. The method as claimed in claim 2, wherein the one or more performance metrics comprises at least one of a slow query event, a resource utilisation metric, a query throughput, a replication, an open connection, a deadlock, an error rate, and a buffer pool usage.
4. The method as claimed in claim 1, further comprising: normalizing, by a normalization unit [216], the data collected from the one or more database clusters.
5. The method as claimed in claim 1, further comprising: sending, by the transceiver unit [214], to an interface, an error response and log an error response in case the data is not successfully collected from the one or more database clusters.
6. The method as claimed in claim 1, further comprising defining, by the defining unit [208], one or more threshold conditions that triggers the one or more alerts.
7. The method as claimed in claim 1, further comprising sending, by the transceiver unit [214], via an alert optimization module to an interface, an error response and log the error response in case at least one of: the one or more rules and the one or more thresholds are not defined; and an alert monitor service is not activated and not updated.
8. The method as claimed in claim 1, upon defining the one or more rules and the one or more thresholds, further comprising activating, by an activation unit [218], an alert monitor service and update an alert monitor service.
9. The method as claimed in claim 1, wherein the one or more techniques analyse the data to identify one or more deviations from the one or more thresholds via an alert optimization module.
10. The method as claimed in claim 1, further comprising displaying, by a display unit [220], via an alert optimization module and an interface, one or more notifications in case the configured notification channel is not detected.
11. The method as claimed in claim 1, further comprising: configuring, by a categorization unit [222], via an alert optimization module, the one or more alerts based on a severity value and a potential impact value.
12. The method as claimed in claim 1, further comprising:
- sending, by the transceiver unit [214], via the notification service, one or more alerts to the configured notification channel; and
- delivering, by the transceiver unit [214], a prompt notification to a user with a relevant information upon receiving the one or more alerts by the configured notification channel.
13. The method as claimed in claim 12, wherein the one or more notifications comprises a relevant contextual information related to the one or more alerts.
14. The method as claimed in claim 13, wherein the prompt notification is delivered through one or more channels comprising at least one of an email, a short message service (SMS) for ensuring a clear and standardized delivery of the prompt notification.
15. A system for alert optimization in a network, the system comprising:
- a collection unit [202] configured to: collect a data related to one or more metrics from one or more database clusters;
- a storage unit [204] connected at least to the collection unit [202], the storage unit [204] is configured to: on successful collection of the data from the one or more database clusters, store the data in a predefined format;
- a configuration unit [206] connected at least to the storage unit [204], the configuration unit [206] is configured to configure one or more thresholds for one or more alerts;
- a defining unit [208] connected at least to the configuration unit [206], the defining unit [208] is configured to define one or more rules and the one or more thresholds for the one or more metrics that triggers the one or more alerts;
- an application unit [210] connected at least to the defining unit [208], the application unit [210] is configured to apply, one or more techniques on the data stored in the predefined format for detecting one or more threshold breaches;
- a detection unit [212] connected at least to the application unit [210], the detection unit [212] is configured to detect a configured notification channel in case of detection of one or more threshold breach(es); and
- a transceiver unit [214] connected at least to the detection unit [212], wherein the transceiver unit [214] is further configured to forward one or more alerts to a notification service in case the configured notification channel is detected.
16. The system as claimed in claim 15, wherein the data related to one or more metrics comprises one or more performance metrics, one or more status updates and a health data which are continuously collected from the one or more database clusters.
17. The system as claimed in claim 16, wherein the one or more performance metrics comprises at least one of a slow query event, a resource utilisation metric, a query throughput, a replication, an open connection, a deadlock, an error rate, and a buffer pool usage.
18. The system as claimed in claim 15, further comprising a normalization unit [216], wherein the normalization unit [216] is configured to normalize the data collected from the one or more database clusters.
19. The system as claimed in claim 15, wherein the transceiver unit [214] is further configured to send to an interface an error response and log the error response in case the data is not successfully collected from the one or more database clusters.
20. The system as claimed in claim 15, wherein the defining unit [208] is further configured to define one or more threshold conditions that triggers the one or more alerts.
21. The system as claimed in claim 15, wherein the transceiver unit [214] is further configured to send, via an alert optimization module to an interface, an error response and log the error response in case at least one of: the one or more rules and the one or more thresholds are not defined; and an alert monitor service is not activated and not updated.
22. The system as claimed in claim 15, further comprising an activation unit [218] configured to: upon defining the one or more rules and the one or more thresholds, activate an alert monitor service and update an alert monitor service.
23. The system as claimed in claim 15, wherein the one or more techniques analyse the data to identify one or more deviations from the one or more thresholds via an alert optimization module.
24. The system as claimed in claim 15, further comprising a display unit [220] configured to display, via an alert optimization module and an interface, one or more notifications in case the configured notification channel is not detected.
25. The system as claimed in claim 15, wherein the system further comprises a categorization unit [222] connected at least to the configuration unit [206], the categorization unit [222], via an alert optimization module, is configured to categorize the one or more alerts based on a severity value and a potential impact value.
26. The system as claimed in claim 15, wherein the transceiver unit [214] is further configured to:
- send, via the notification service, one or more alerts to the configured notification channel; and
- deliver a prompt notification to a user with a relevant information upon receiving the one or more alerts by the configured notification channel.
27. The system as claimed in claim 26, wherein the one or more notifications comprises a relevant contextual information related to the one or more alerts.
28. The system as claimed in claim 27, wherein the prompt notification is delivered through one or more channels comprising at least one of an email, a short message service (SMS) for ensuring a clear and standardized delivery of the prompt notification.
| # | Name | Date |
|---|---|---|
| 1 | 202321061428-STATEMENT OF UNDERTAKING (FORM 3) [12-09-2023(online)].pdf | 2023-09-12 |
| 2 | 202321061428-PROVISIONAL SPECIFICATION [12-09-2023(online)].pdf | 2023-09-12 |
| 3 | 202321061428-POWER OF AUTHORITY [12-09-2023(online)].pdf | 2023-09-12 |
| 4 | 202321061428-FORM 1 [12-09-2023(online)].pdf | 2023-09-12 |
| 5 | 202321061428-FIGURE OF ABSTRACT [12-09-2023(online)].pdf | 2023-09-12 |
| 6 | 202321061428-DRAWINGS [12-09-2023(online)].pdf | 2023-09-12 |
| 7 | 202321061428-Proof of Right [06-02-2024(online)].pdf | 2024-02-06 |
| 8 | 202321061428-FORM-5 [11-09-2024(online)].pdf | 2024-09-11 |
| 9 | 202321061428-ENDORSEMENT BY INVENTORS [11-09-2024(online)].pdf | 2024-09-11 |
| 10 | 202321061428-DRAWING [11-09-2024(online)].pdf | 2024-09-11 |
| 11 | 202321061428-CORRESPONDENCE-OTHERS [11-09-2024(online)].pdf | 2024-09-11 |
| 12 | 202321061428-COMPLETE SPECIFICATION [11-09-2024(online)].pdf | 2024-09-11 |
| 13 | 202321061428-Request Letter-Correspondence [18-09-2024(online)].pdf | 2024-09-18 |
| 14 | 202321061428-Power of Attorney [18-09-2024(online)].pdf | 2024-09-18 |
| 15 | 202321061428-Form 1 (Submitted on date of filing) [18-09-2024(online)].pdf | 2024-09-18 |
| 16 | 202321061428-Covering Letter [18-09-2024(online)].pdf | 2024-09-18 |
| 17 | 202321061428-CERTIFIED COPIES TRANSMISSION TO IB [18-09-2024(online)].pdf | 2024-09-18 |
| 18 | Abstract 1.jpg | 2024-10-07 |
| 19 | 202321061428-FORM 3 [07-10-2024(online)].pdf | 2024-10-07 |
| 20 | 202321061428-ORIGINAL UR 6(1A) FORM 1 & 26-200125.pdf | 2025-01-24 |