Method, system and program product for monitoring and controlling access to a computer system resource
First Claim
1. A method for controlling access to a computer system resource, the method comprising:
- defining at least one environmental activation threshold metric, wherein the at least one environmental activation threshold metric is a workload characteristic of the computer system resource;
monitoring access to the computer system resource and determining whether usage of the computer system resource meets the at least one environmental activation threshold metric, and if so, then for a current transaction requiring access to the computer system resource;
collecting at least one identifying attribute of the transaction; and
employing the at least one identifying attribute in determining whether the transaction is for at least one entity having a predefined usage limit, and if so, throttling access of the at least one entity to the computer system resource when the predefined usage limit for the at least one entity is met, otherwise allowing the current transaction to proceed unthrottled, wherein the at least one entity is less than all entities accessing the computer system resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A facility for monitoring and controlling access of at least one entity to a computer system resource is provided employing at least one resource utilization threshold metric. The at least one resource utilization threshold metric is a workload characteristic of the computer system resource. Access of the at least one entity to the computer system resource is controlled in response to the at least one resource utilization threshold metric being met. The access control is automatic and may include at least one of assigning a lower priority to the entity in a computer resource scheduling algorithm, or waiting a predetermined period of time before the computer system resource provides a response to the at least one entity.
47 Citations
24 Claims
-
1. A method for controlling access to a computer system resource, the method comprising:
-
defining at least one environmental activation threshold metric, wherein the at least one environmental activation threshold metric is a workload characteristic of the computer system resource; monitoring access to the computer system resource and determining whether usage of the computer system resource meets the at least one environmental activation threshold metric, and if so, then for a current transaction requiring access to the computer system resource; collecting at least one identifying attribute of the transaction; and employing the at least one identifying attribute in determining whether the transaction is for at least one entity having a predefined usage limit, and if so, throttling access of the at least one entity to the computer system resource when the predefined usage limit for the at least one entity is met, otherwise allowing the current transaction to proceed unthrottled, wherein the at least one entity is less than all entities accessing the computer system resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to a computer system resource, the system comprising:
-
means for defining at least one environmental activation threshold metric, wherein the at least one environmental activation threshold metric is a workload characteristic of the computer system resource; means for monitoring access to the computer system resource and means for determining whether usage of the computer system resource meets the at least one environmental activation threshold metric, and if so, then for a current transaction requiring access to the computer system resource; means for collecting at least one identifying attribute of the transaction; and means for employing the at least one identifying attribute in determining whether the transaction is for at least one entity having a predefined usage limit, and if so, for throttling access of the at least one entity to the computer system resource when the predefined usage limit for the at least one entity is met, otherwise for allowing the current transaction to proceed unthrottled, wherein the at least one entity is less than all entities accessing the computer system resource. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. At least one program storage device readable by a machine tangibly embodying at least one program of instructions executable by the machine to perform a method of controlling access to a computer system resource, the method comprising:
-
defining at least one environmental activation threshold metric, wherein the at least one environmental activation threshold metric is a workload characteristic of the computer system resource; monitoring access to the computer system resource and determining whether usage of the computer system resource meets the at least one environmental activation threshold metric, and if so, then for a current transaction requiring access to the computer system resource; collecting at least one identifying attribute of the transaction; and employing the at least one identifying attribute in determining whether the transaction is for at least one entity having a predefined usage limit, and if so, throttling access of the at least one entity to the computer system resource when the predefined usage limit for the at least one entity is met, otherwise allowing the current transaction to proceed unthrottled, wherein the at least one entity is less than all entities accessing the computer system resource. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification