Automatic correlation of service level agreement and operating level agreement
First Claim
1. A computer-implemented method, comprising:
- collecting traffic monitoring data over a period of time by monitoring traffic between a client device and an application which runs at an application server, wherein the traffic comprises a request from the client device to the application server, the application responds to the request by communicating a response to the client device, the response comprises a request-response pair identifier of the request and the response;
comparing the traffic monitoring data to a set of service level thresholds;
based on the comparing, identifying a portion of the traffic monitoring data which violates a service level threshold of the set of service level thresholds;
determining a first transaction which is associated with the portion of the traffic monitoring data;
collecting application runtime data of the application over the period of time by monitoring execution of the application;
comparing the application runtime data to a set of operating level thresholds; and
automatically correlating the portion of the traffic monitoring data to a portion of the application runtime data, wherein the automatically correlating comprises using the request-response pair identifier to identify the portion of the application runtime data as being associated with the first transaction and classifying the traffic monitoring data and the application runtime data according to a set of transaction definitions.
2 Assignments
0 Petitions
Accused Products
Abstract
Data collected during runtime and associated with a service level agreement and operating level agreement for a network service are automatically correlated together. A network monitoring system monitors the network service during runtime to determine SLA and OLA violations. An SLA is tested against traffic monitoring data derived from monitoring traffic between a network service system and one or more users of the system. An OLA is tested against application runtime data generated from monitoring a transaction occurring between an application server and a backend or other internal entity of the network service system. The data collected during runtime can be correlated using a hierarchy based on business transactions or in some other manner. Because the traffic monitoring data and application runtime data are organized using a similar data hierarchy, the traffic monitoring data corresponding to an SLA may be correlated to the application runtime data corresponding to the same business transaction and one or more OLAs.
22 Citations
35 Claims
-
1. A computer-implemented method, comprising:
-
collecting traffic monitoring data over a period of time by monitoring traffic between a client device and an application which runs at an application server, wherein the traffic comprises a request from the client device to the application server, the application responds to the request by communicating a response to the client device, the response comprises a request-response pair identifier of the request and the response; comparing the traffic monitoring data to a set of service level thresholds; based on the comparing, identifying a portion of the traffic monitoring data which violates a service level threshold of the set of service level thresholds; determining a first transaction which is associated with the portion of the traffic monitoring data; collecting application runtime data of the application over the period of time by monitoring execution of the application; comparing the application runtime data to a set of operating level thresholds; and automatically correlating the portion of the traffic monitoring data to a portion of the application runtime data, wherein the automatically correlating comprises using the request-response pair identifier to identify the portion of the application runtime data as being associated with the first transaction and classifying the traffic monitoring data and the application runtime data according to a set of transaction definitions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A processor readable storage device comprising processor readable code embodied on the processor readable storage devices, the processor readable code for programming a processor to perform a method comprising:
-
determining whether a portion of traffic monitoring data collected over a period of time satisfies a set of service level thresholds associated with a network transaction, the traffic monitoring data is collected by monitoring traffic between a client device and an application which runs at an application server, the traffic comprises a request sent from the client device to the application server and a corresponding response sent from the application server to the client device, the response comprises identifying data of the application server, and the monitoring comprises retrieving the identifying data of the application server; accessing application runtime data associated with a set of operating level thresholds for a transaction initiated by the application, wherein the application runtime data is generated by monitoring execution of the application, the application runtime data is indexed to the identifying data, each application transaction is initiated by the network transaction and the accessing application runtime data comprises classifying the application runtime data according to a set of transaction definitions; and automatically correlating the portion of traffic monitoring data and the application runtime data that correspond to a same network transaction using the application runtime data. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer-implemented method, comprising:
-
configuring service level thresholds to be satisfied by traffic between a client and a network server, and a period of time over which to measure compliance to the service level thresholds, the service level thresholds are configured from a set of transaction definitions; monitoring the traffic to provide traffic monitoring data; configuring operating level thresholds to be satisfied by an application which responds to a request in the traffic from the client; monitoring execution of the application to provide application runtime data; classifying the traffic monitoring data and the application runtime data according to the set of transaction definitions; triggering a violation event when one of the service level thresholds has not been satisfied by the network server over the period of time; and in response to the violation event, automatically providing a portion of the traffic monitoring data which is associated with the violation event to a service level agreement manager, the service level agreement manager responding to the violation event by determining a business transaction associated with the portion of the traffic monitoring data, and automatically determining one of the operating level thresholds that corresponds to the business transaction. - View Dependent Claims (28, 29)
-
-
30. A computer-implemented method, comprising:
-
accessing traffic monitoring data derived from monitoring network server traffic and associated with a set of service level thresholds, the network server traffic comprises requests sent from client devices to an application running at an application server, and corresponding responses sent from the application server to the client devices, the responses comprise identifying data of the application server, and the monitoring network server traffic comprises retrieving the identifying data from the responses; identifying transaction information, comprising the identifying data from the responses, from the traffic monitoring data; and using the identifying data to automatically access application runtime data generated from monitoring the application when the application processes the network server traffic, wherein the application runtime data is associated with the transaction information, the traffic monitoring data is classified by a transaction hierarchy and the application runtime data is organized into a hierarchy associated with business transactions. - View Dependent Claims (31, 32, 33)
-
-
34. A computer-implemented method, comprising:
-
receiving requests at an application which executes on a network server, the requests are from clients over a period of time, the application processing the requests by sending corresponding requests from the application to a remote system, the remote system returning information to the application for responding to the requests, an agent associated with the application correlating the requests from the clients with the requests to the remote system, and the agent providing application runtime data relating to communications between the application and the network server for the period of time; comparing the application runtime data to a set of operating level thresholds; and responsive to the agent, classifying the application runtime data with the requests from the clients, the requests to the remote system, an identifier of the application and an identifier of the remote system. - View Dependent Claims (35)
-
Specification