Intelligent performance monitoring based on user transactions
First Claim
Patent Images
1. A method for monitoring an application operating on a computer system, comprising the steps of:
- monitoring a first entry point of the application for a first transaction;
when the first entry point is reached by the application, acquiring a first token associated with the first transaction; and
monitoring the first transaction according to a monitoring policy of the first token.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method to allow an individual transaction in an instrumented software application to be monitored according to its own configuration. In one preferred embodiment, each transaction is associated with a token. The token includes the monitoring configuration that should be used for the associated transaction. When the application entry point is reached for the transaction, the token is looked up and retrieved, and the monitoring policy configuration of the token determines what data is gathered about the transaction.
-
Citations
18 Claims
-
1. A method for monitoring an application operating on a computer system, comprising the steps of:
-
monitoring a first entry point of the application for a first transaction;
when the first entry point is reached by the application, acquiring a first token associated with the first transaction; and
monitoring the first transaction according to a monitoring policy of the first token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for monitoring transactions in an application, the system including processor and memory, comprising:
-
a probe inserted into the application, wherein the probe monitors an entry point for a transaction of the application; and
a policy mapper that associates a token with the transaction, wherein the token includes monitoring policy configurations for the transaction. - View Dependent Claims (9, 10, 11)
-
-
12. A computer program product in a computer readable medium, comprising:
-
first instructions for monitoring a first entry point of the application for a first transaction;
second instructions for, when the first entry point is reached by the application, acquiring a first token associated with the first transaction; and
third instructions for monitoring the first transaction according to a monitoring policy of the first token. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification