Problem determination in distributed enterprise applications
First Claim
1. A method for problem determination for applications running in a distributed environment, comprising:
- receiving, from a user, selection of a data collector for custom configuration; and
in response to the selection of the data collector for custom configuration,displaying a data collector configuration page;
prompting the user to enter an exclude list of first class names of applications not to be monitored unless the first class names are listed in an exclude override list;
prompting the user to enter the exclude override list of second class names to be monitored, wherein the second class names are a subset of the first class names in the exclude list; and
monitoring the applications of the second class names without monitoring the applications of the first class names.
2 Assignments
0 Petitions
Accused Products
Abstract
Problem determination in an enterprise computer system in a distributed environment is provided. Information is obtained regarding the enterprise applications, and high-level information is presented to a user, with one or more prompts provided to the user for more detailed information. In response to a request from a user for more detailed information about the application, more detailed information is provided to the user. Several levels of more detailed information about applications, including information as to individual threads, is available. The method also includes the steps of receiving instructions from an administrator to establish an account for a user, associating one or more servers with the account, and providing access to the corresponding user only to the associated servers. In the method, searches may be conducted for strings and requests, and identified strings and requests may be sorted by a variety of criteria.
73 Citations
9 Claims
-
1. A method for problem determination for applications running in a distributed environment, comprising:
-
receiving, from a user, selection of a data collector for custom configuration; and in response to the selection of the data collector for custom configuration, displaying a data collector configuration page; prompting the user to enter an exclude list of first class names of applications not to be monitored unless the first class names are listed in an exclude override list; prompting the user to enter the exclude override list of second class names to be monitored, wherein the second class names are a subset of the first class names in the exclude list; and monitoring the applications of the second class names without monitoring the applications of the first class names. - View Dependent Claims (2, 3)
-
-
4. A system for problem determination for applications running in a distributed environment, comprising:
-
a processor; and computer hardware configured for; receiving, from a user, selection of a data collector for custom configuration; and in response to the selection of the data collector for custom configuration, displaying a data collector configuration page; prompting a user to enter an exclude list of first class names of applications not to be monitored unless the first class names are listed in an exclude override list; prompting the user to enter the exclude override list of second class names to be monitored, wherein the second class names are a subset of the first class names in the exclude list; and monitoring the applications of the second class names without monitoring the applications of the first class names. - View Dependent Claims (5, 6)
-
-
7. A computer program for problem determination for applications running in a distributed environment, said computer program consisting of instructions stored on a non-transitory medium, said instructions, when executed on a processor, cause the processor to execute:
-
receiving, from a user, selection of a data collector for custom configuration; and in response to the selection of the data collector for custom configuration, displaying a data collector configuration page; prompting the user to enter an exclude list of first class names of applications not to be monitored unless the first class names are listed in an exclude override list; prompting the user to enter the exclude override list of second class names to be monitored, wherein the second class names are a subset of the first class names in the exclude list; and monitoring the applications of the second class names without monitoring the applications of the first class names. - View Dependent Claims (8, 9)
-
Specification