Browse Prior Art Database

Methods and System for application agnostic transactions tracking based on security payload

IP.com Disclosure Number: IPCOM000236431D
Publication Date: 2014-Apr-25
Document File: 3 page(s) / 150K

Publishing Venue

The IP.com Prior Art Database

Abstract

The system here disclosed for application agnostic transactions tracking, is related to the area of the application monitoring over a distributed computing architecture. The system allows to track every single application transaction, providing topology and logging information. It is as transparent as possible to existing applications and it can be extended to others platforms.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 46% of the total text.

Page 01 of 3

Methods and System for application agnostic transactions tracking based on security payload

Scenario

Here are disclosed a method and system to simplify system management of complex Information Technology (IT) architectures such as distributed computing architectures. In such environment the applications generate deep matrix of relationships, making analysis and problem determination more complicated. To handle this issue, IT Operations teams need tools able to track every single application transaction and to reconstruct the application's flows. Existing system management solutions are commonly used to address this issue, however, they are not always seamless applicable to all platforms and they do not provide logging and topology information at a desired level. Correlating events and reconstructing application flows require the ability to propagate tracking information across a distributed architecture particularly when the applications trigger a huge number of flows (please, see Figure 1), where each flow is an ordered set of unit of work (UOW).

Figure 1


Tracking of flows is possible when all service consumers and service providers are able to send tracking events to a specific collector. Of course, tracking events must contain appropriate information about:

Nature of every single UOW (primary key and details about the action, like web service invocation, database access, etc)

Relationships between UOWs (how they are ordered)

Belonging of more UOWs to the same user session (time frame between user log-in and log-out)

The system for application agnostic transactions tracking

The core idea of the system is the usage of security aimed mechanisms to propagate tracking information across a distributed architecture. Security represents a perfect

1


Page 02 of 3

vehicle, because it relies on recognized standard and it is pervasive, allowing both infrastructure and application components to be aware and taking advantage of the carried information. In fact, a secured application runs with a subject (the security payload) and this subject contains a group of information about an authenticated entity. Looking at Figure 1, in a full secured distributed architecture, a subject passes through all interactions between components, due to authentication and authorization processes. Hence, attaching tracking information to the security payload is an efficient

way to easily propagate additional information over all the distributed architecture. Because software platforms usually handle security, this approach results easily applicable to existing scenarios.

Applying this system to application servers

The system is perfectly applicable to application servers, because they generally offer the possibility to extend/customize its run-time underlying services, making possible to handle the tracking events at their level. An application server generally uses containers to host application components and the container act as an interface between applicat...