Enhancing Event Correlation and Automation in Netcool Operations Insight

Authors

  • Satyanarayana Murthy Polisetty  Jawaharlal Nehru Technological University, Kakinada, India

DOI:

https://doi.org/10.32628/CSEIT2282146

Keywords:

IBM Netcool Operations Insight (NOI), Netcool Omnibus, Docker Hub, Docker Engine, Docker registry

Abstract

This article investigates the application to enhance event correlation and automation within IBM Netcool environments. Drawing on real-world implementations, and it explores practical strategies for improving service management through advanced analytics, automation, and integration. The study focuses on leveraging Netcool Operations Insight (NOI), Netcool Omnibus, and related components to build robust managed services platforms. It details the development of custom Impact policies, the utilization of Cognos for advanced event analytics, and the automation of incident response through Perl and shell scripting. The findings demonstrate the significant benefits of an open shift driven approach in streamlining operations, reducing incident resolution times, and improving overall service reliability.

References

  1. Maniatis, P., & Baker, M. (2002). Enabling the long-term survivability of peers in structured peer-to-peer systems. In Proceedings of the 3rd USENIX conference on Internet technologies and systems (pp. 1-14).
  2. Fnu, Y., Saqib, M., Malhotra, S., Mehta, D., Jangid, J., & Dixit, S. (2021). Thread mitigation in cloud native application Develop- Ment. Webology, 18(6), 10160–10161, https://www.webology.org/abstract.php?id=5338s
  3. Cohen, E., & Shenker, S. (2002). Replication strategies in unstructured peer-to-peer networks. In Proceedings of the 2002 ACM SIGCOMM conference on Applications, technologies, architectures, and protocols for computer communications (pp. 383-394).  
  4. Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 149-160).  
  5. J. Jangid, "Efficient Training Data Caching for Deep Learning in Edge Computing Networks," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 7, no. 5, pp. 337–362, 2020. doi: 10.32628/CSEIT20631113
  6. Ranganathan, A., Campbell, R. H., & Nahrstedt, K. (2003). Resource management for application adaptation in mobile environments. IEEE transactions on parallel and distributed systems, 14(2), 163-180.
  7. Sachin Dixit, "The Impact of Quantum Supremacy on Cryptography : Implications for Secure Financial Transactions" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 4, pp.611-637, July-August-2020. Available at doi : https://doi.org/10.32628/CSEIT2064141
  8. Weis, T. (2004). Cloud computing. Networker, 8(1), 16-25.
  9. Infrastructure as Code: Managing Servers in the Cloud - by Kief Morris (2016)
  10. Effective Monitoring and Alerting: For Web Operations - by Slawek Ligus (2012)
  11. Site Reliability Engineering: How Google Runs Production Systems - by Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy (2016)

Downloads

Published

2021-12-30

Issue

Section

Research Articles

How to Cite

[1]
Satyanarayana Murthy Polisetty, " Enhancing Event Correlation and Automation in Netcool Operations Insight" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 6, pp.459-462, November-December-2021. Available at doi : https://doi.org/10.32628/CSEIT2282146