Method and apparatus for exposing monitoring violations to the monitored application
First Claim
1. A method in a data processing system for exposing monitoring violations to a monitored application, the method comprising:
- configuring a monitored application to interact with a monitoring application;
initiating a transaction in the monitored application;
querying a status of the transaction at the monitored application from the monitoring application;
receiving a notification of the status at the monitored application from the monitoring application; and
determining if the transaction is in a violation state based on the status at the monitored application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for exposing monitoring violations to monitored applications is provided. A monitored application may detect that a monitoring application has been applied to monitor a transaction. Based on a defined policy or a threshold within policy, the monitored application may determine if the transaction is in a violation state. If the transaction is in a violation state, the mechanism of the present invention enables the monitoring application to notify the monitored application, such that the monitored application may take corrective action to correct the violation.
-
Citations
26 Claims
-
1. A method in a data processing system for exposing monitoring violations to a monitored application, the method comprising:
-
configuring a monitored application to interact with a monitoring application;
initiating a transaction in the monitored application;
querying a status of the transaction at the monitored application from the monitoring application;
receiving a notification of the status at the monitored application from the monitoring application; and
determining if the transaction is in a violation state based on the status at the monitored application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A data processing system for exposing monitoring violations to a monitored application, the data processing system comprising:
-
configuring means for configuring a monitored application to interact with a monitoring application;
initiating means for initiating a transaction in the monitored application;
querying means for querying a status of the transaction at the monitored application from the monitoring application;
receiving a notification of the status at die monitored application from the monitoring application;
determining means for determining if the transaction is in a violation state based on the status at the monitored application. - View Dependent Claims (15, 16, 17)
-
-
18-22. -22. (canceled)
-
23. A computer program product in a computer readable medium for exposing monitoring violations to a monitored application, the computer program product comprising:
-
first instructions for configuring a monitored application to interact with a monitoring application;
second instructions for initiating a transaction in the monitored application;
third instructions for querying a status of the transaction at the monitored application from the monitoring application;
fourth instructions for receiving a notification of the status at the monitored application from the monitoring application; and
fifth instructions determining if the transaction is in a violation state based on the status. - View Dependent Claims (24, 25)
-
-
26-31. -31. (canceled)
Specification