Non-destructive synthetic transaction configuration
First Claim
1. A method for configuring synthetic transactions, comprising:
- intercepting web server traffic identifying a portion of the traffic that would not corrupt data as one or more synthetic transactions; and
generating synthetic transactions based on the identified portion of the traffic.
2 Assignments
0 Petitions
Accused Products
Abstract
Non-corrupting synthetic transactions are generated for testing a web service. The transactions do not corrupt data for a front end web server of the web service or a back end application server accessed by the web server. The synthetic transactions may be generated using code inserted into an application and a network traffic interceptor which intercepts traffic for a web service associated with the application. The synthetic transactions may also be generated by intercepting live traffic for the web server and monitoring application server behavior. The intercepted traffic and data associated with the monitored behavior data are processed. Transactions are then identified which would not corrupt data if used as a synthetic transaction. Transactions are identified by comparing the intercepted traffic data and monitored behavior data. The synthetic transactions are then transmitted to the web server when needed.
-
Citations
44 Claims
-
1. A method for configuring synthetic transactions, comprising:
-
intercepting web server traffic identifying a portion of the traffic that would not corrupt data as one or more synthetic transactions; and
generating synthetic transactions based on the identified portion of the traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising:
-
capturing web service request data associated with web server traffic received by a web server;
comparing the web service traffic information to application server behavior data; and
identifying web server traffic which does not cause data corruption associated with the application server. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus for processing data, comprising:
-
a communication interface;
a storage device; and
one or more processors in communication with said storage device and said communication interface, said one or more processors perform a method comprising;
inserting executable code into a managed application;
receiving a request which results in corruption of data by the managed application; and
reporting request information associated with the request by the executable code. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method of configuring synthetic transactions, comprising:
-
receiving transaction data for a web service, the web service associated with web server and an application server;
processing the transaction data to identify transactions which do no change the state of the application server; and
generating synthetic transactions from the identified transactions which do not corrupt data. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for creating synthetic transactions, comprising:
-
inserting monitoring code in an application to retrieve application behavior data;
identifying data corruption information using the monitoring code and a web server traffic interceptor; and
creating synthetic transactions from the data corruption information. - View Dependent Claims (38, 39, 40)
-
-
41. A method for constructing synthetic transactions, comprising:
-
receiving intercepted network traffic information for a web service;
receiving behavior data indicative of performance of an application;
constructing synthetic transactions from the intercepted network traffic information associated with the web server and the behavior data. - View Dependent Claims (42, 43, 44)
-
Specification