Transaction correlation using three way handshake
First Claim
1. A method for communicating data between servers, comprising:
- detecting by a first computer a request to a second computer;
sending the request and an unknown service identifier to the second computer by the first computer, the unknown service identifier generated by the first computer to identify the second computer in response to determining that an identity of the second computer is not known to the first computer, wherein the unknown service identifier is part of a call chain sent from the first computer to the second computer;
transmitting the unknown service identifier and request information to a server by the first computer;
transmitting the unknown service identifier and a second computer identifier to the server by the second computer, the second computer identifier identifying the second computer; and
receiving the second computer identifier by the first computer from the server, the first computer sending a subsequent request to the second computer with the second computer identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
The present technology monitors a web application provided by one or more services. A service may be provided by applications. The monitoring system provides end-to-end business transaction visibility, identifies performance issues quickly and has dynamical scaling capability across monitored systems including cloud systems, virtual systems and physical infrastructures. A method for communicating data between servers may detect by a first computer a request to a second computer. The request and a first name may be sent to the second computer by the first computer. The first name and request information may be sent to a server by the first computer. The first name and a second computer identifier may be transmitted to the server by the second computer.
-
Citations
27 Claims
-
1. A method for communicating data between servers, comprising:
-
detecting by a first computer a request to a second computer; sending the request and an unknown service identifier to the second computer by the first computer, the unknown service identifier generated by the first computer to identify the second computer in response to determining that an identity of the second computer is not known to the first computer, wherein the unknown service identifier is part of a call chain sent from the first computer to the second computer; transmitting the unknown service identifier and request information to a server by the first computer; transmitting the unknown service identifier and a second computer identifier to the server by the second computer, the second computer identifier identifying the second computer; and receiving the second computer identifier by the first computer from the server, the first computer sending a subsequent request to the second computer with the second computer identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 18)
-
-
10. A non-transitory computer readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for correlating a distributed transaction, the method comprising:
-
detecting by a first computer a request to a second computer; sending the request and an unknown service identifier to the second computer by the first computer, the unknown service identifier generated by the first computer to identify the second computer in response to determining that an identity of the second computer is not known to the first computer, wherein the unknown service identifier is part of a call chain sent from the first computer to the second computer; transmitting the unknown service identifier and request information to a server by the first computer; transmitting the unknown service identifier and a second computer identifier to the server by the second computer, the second computer identifier identifying the second computer; and receiving the second computer identifier by the first computer from the server, the first computer sending a subsequent request to the second computer with the second computer identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
19. A system comprising:
-
one or more processors; a memory associated with each of the one or more processors; and one or more modules stored in the memory and executed by the one or more processors to detect by a first computer a request to a second computer, send the request and a unknown service identifier to the second computer by the first computer, the unknown service identifier generated by the first computer to identify the second computer in response to determining that an identity of the second computer is not known to the first computer, wherein the unknown service identifier is part of a call chain sent from the first computer to the second computer, transmit the unknown service identifier and request information to a server by the first computer, transmit the unknown service identifier and a second computer identifier to the server by the second computer, the second computer identifier identifying the second computer, and receive the second computer identifier by the first computer from the server, the first computer sending a subsequent request to the second computer with the second computer identifier. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification