Sponsored Content
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News Business rule execution: stateless/transactional, stateful/monitoring, or both? Post 302172472 by Linux Bot on Monday 3rd of March 2008 10:50:07 PM
Old 03-03-2008
Business rule execution: stateless/transactional, stateful/monitoring, or both?

vincent
Mon, 03 Mar 2008 21:30:11 +0000
TIBCO was recently invited to discuss the technology needs for a large rule-driven insurance risk management system. Interestingly, the specified requirements had nothing to do with CEP, and everything to do with traditional (stateless) business rules execution:
  • replace an existing rule engine
  • map existing rules to the new rule engine
  • migrate to standardized server platforms.
.
So why would a rule-driven CEP engine even considered for this problem? Lets take a look at some of the longer term needs of such an organization:
  1. exploit the huge amounts of operational data being collected
  2. increase straight-through-processing transaction rate, avoiding manual intervention
  3. move to more customer-centric, portfolio-based underwriting (rather than simply policy-based).
.
These don’t necessarily align best with conventional stateless rule services.
1. Business activity and business performance monitoring: direct feedback over time / time periods / regions / etc of which rules are used and which aren’t, and information on trends for different regions, policy types, take-up rates, etc. This requires monitoring large amounts of events over time, and is best done by correlating events directly in the rule engine.
2. Increased “Complex Rule Processing”: to automate more policy decisions, more rules are likely to be required on more “data”. Naturally, hitting a database with multiple transactions to get different views required for different decisions is going to be bad news for the rule server, development team, database administrators, and the database itself. Storing event-related information in situ (or transparently via a high performance distributed cache) would make complex rule processing easier to implement and (crucially) maintain.
3. Customer-centric (portfolio-based) view of policies: if a customer is acquiring overlapping policies, does the carrier want to know about it, or even let the customer know? Or if a customer has policies that have gaps, shouldn’t they/their insurance agent be informed? This again is easiest to achieve by maintaining state about the customer between transactions.
So it looks like stateful rule services, for monitoring business events wider than the current transactional (stateless) context, might be useful after all.
Notes:
CEP can also be used in insurance to support the standard insurance carrier’s investment activities, in areas like BAM such as for documentation track ‘n trace.
Image

Source...
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Monitoring umask execution

Good Day! I would like to ask, is there a way to find out the list of users or scripts that executed a umask command for a given time? Our server has been having issues about files being written with 000 access, and we need to find out if it's because someone or some code is playing around with... (4 Replies)
Discussion started by: mike_s_6
4 Replies

2. Shell Programming and Scripting

rsync - transactional sync with multiple nodes

Hi Everyone, We have a requirement to sync files with multiple nodes. We need to run the rsync sequentially on each node, if one of the node fails we need to recover the files to previous state in all nodes. I know that we have backup option in rsync which takes the backup of files before... (0 Replies)
Discussion started by: MVEERA
0 Replies

3. Homework & Coursework Questions

Protect service with statefull, stateless

how to protect service dns with filtering tables (statefull, stateless)? iptables -L iptables ...? (1 Reply)
Discussion started by: nini
1 Replies

4. Red Hat

Cron entry for every 10 mints on business day business hour

Could you “crontab” it to run every 10 minutes on work days (Mo - Fr) between 08:00 and 18:00 i know to run every 10 mints but can any one guide me how to achieve the above one (2 Replies)
Discussion started by: venikathir
2 Replies

5. Shell Programming and Scripting

Stateless process

Hi Folks I'm trying to monitor that a process is running, using ps. Astonishingly the process, which is checked every 15 minutes, is runnnig but without a state about 2-3 times a day. Extract from the script : #!/bin/ksh # edii_pid is PID of process to monitor. # Checking if pid... (6 Replies)
Discussion started by: MDominok
6 Replies
IP-RULE(8)							       Linux								IP-RULE(8)

NAME
ip-rule - routing policy database management SYNOPSIS
ip [ OPTIONS ] rule { COMMAND | help } ip rule [ list | add | del | flush ] SELECTOR ACTION SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ] [ iif STRING ] [ oif STRING ] [ pref NUMBER ] ACTION := [ table TABLE_ID ] [ nat ADDRESS ] [ prohibit | reject | unreachable ] [ realms [SRCREALM/]DSTREALM ] TABLE_ID := [ local | main | default | NUMBER ] DESCRIPTION
ip rule manipulates rules in the routing policy database control the route selection algorithm. Classic routing algorithms used in the Internet make routing decisions based only on the destination address of packets (and in theory, but not in practice, on the TOS field). In some circumstances we want to route packets differently depending not only on destination addresses, but also on other packet fields: source address, IP protocol, transport protocol ports or even packet payload. This task is called 'policy routing'. To solve this task, the conventional destination based routing table, ordered according to the longest match rule, is replaced with a 'routing policy database' (or RPDB), which selects routes by executing some set of rules. Each policy routing rule consists of a selector and an action predicate. The RPDB is scanned in the order of increasing priority. The selector of each rule is applied to {source address, destination address, incoming interface, tos, fwmark} and, if the selector matches the packet, the action is performed. The action predicate may return with success. In this case, it will either give a route or failure indi- cation and the RPDB lookup is terminated. Otherwise, the RPDB program continues on the next rule. Semantically, natural action is to select the nexthop and the output device. At startup time the kernel configures the default RPDB consisting of three rules: 1. Priority: 0, Selector: match anything, Action: lookup routing table local (ID 255). The local table is a special routing table con- taining high priority control routes for local and broadcast addresses. Rule 0 is special. It cannot be deleted or overridden. 2. Priority: 32766, Selector: match anything, Action: lookup routing table main (ID 254). The main table is the normal routing table containing all non-policy routes. This rule may be deleted and/or overridden with other ones by the administrator. 3. Priority: 32767, Selector: match anything, Action: lookup routing table default (ID 253). The default table is empty. It is reserved for some post-processing if no previous default rules selected the packet. This rule may also be deleted. Each RPDB entry has additional attributes. F.e. each rule has a pointer to some routing table. NAT and masquerading rules have an attribute to select new IP address to translate/masquerade. Besides that, rules have some optional attributes, which routes have, namely realms. These values do not override those contained in the routing tables. They are only used if the route did not select any attributes. The RPDB may contain rules of the following types: unicast - the rule prescribes to return the route found in the routing table referenced by the rule. blackhole - the rule prescribes to silently drop the packet. unreachable - the rule prescribes to generate a 'Network is unreachable' error. prohibit - the rule prescribes to generate 'Communication is administratively prohibited' error. nat - the rule prescribes to translate the source address of the IP packet into some other value. ip rule add - insert a new rule ip rule delete - delete a rule type TYPE (default) the type of this rule. The list of valid types was given in the previous subsection. from PREFIX select the source prefix to match. to PREFIX select the destination prefix to match. iif NAME select the incoming device to match. If the interface is loopback, the rule only matches packets originating from this host. This means that you may create separate routing tables for forwarded and local packets and, hence, completely segregate them. oif NAME select the outgoing device to match. The outgoing interface is only available for packets originating from local sockets that are bound to a device. tos TOS dsfield TOS select the TOS value to match. fwmark MARK select the fwmark value to match. priority PREFERENCE the priority of this rule. Each rule should have an explicitly set unique priority value. The options preference and order are synonyms with priority. table TABLEID the routing table identifier to lookup if the rule selector matches. It is also possible to use lookup instead of table. realms FROM/TO Realms to select if the rule matched and the routing table lookup succeeded. Realm TO is only used if the route did not select any realm. nat ADDRESS The base of the IP address block to translate (for source addresses). The ADDRESS may be either the start of the block of NAT addresses (selected by NAT routes) or a local host address (or even zero). In the last case the router does not translate the pack- ets, but masquerades them to this address. Using map-to instead of nat means the same thing. Warning: Changes to the RPDB made with these commands do not become active immediately. It is assumed that after a script finishes a batch of updates, it flushes the routing cache with ip route flush cache. ip rule flush - also dumps all the deleted rules. This command has no arguments. ip rule show - list rules This command has no arguments. The options list or lst are synonyms with show. SEE ALSO
ip(8) AUTHOR
Original Manpage by Michail Litvak <mci@owl.openwall.com> iproute2 20 Dec 2011 IP-RULE(8)
All times are GMT -4. The time now is 08:49 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy