Patent classifications
G06F2201/875
CLONING AND RECOVERY OF DATA VOLUMES
Aspects of a data environment, such as the cloning, hibernation, and recovery of databases, are managed using a separate control environment. A monitoring component of the control environment can periodically communicate with the data environment to determine any necessary actions to be performed, such as to recover from faults or events for a data instance in the data environment. A workflow can be instantiated that includes tasks necessary to perform actions such as recovery, hibernation, resumption from hibernation, or backup or cloning. Tasks of the workflow can cause certain jobs to be performed by host managers in the data environment to affect calls made to the control environment.
Rule Violation Detection
A method for detecting a traffic ramp-up rule violation includes receiving data element retrieval requests from an information retrieval system and determining a requests per second (RPS) for a key range. The method also includes determining a moving average of RPS for the key range. The method also includes determining a number of delta violations, each delta violation comprising a respective beginning instance in time when the RPS exceeded a delta RPS limit. For each delta violation, the method includes determining a maximum conforming load for the key range over and determining whether the RPS exceeded the maximum conforming load for the key range based on the beginning instance in time of the respective delta violation. When the RPS has exceeded the maximum conforming load, the method includes determining that the delta violation corresponds to a full-history violation indicative of a degradation of performance of the information retrieval system.
System and methods for providing user analytics and performance feedback for web applications
A computing device may include a memory and a processor cooperating with the memory to communicate with a plurality of client devices, and determine a problem with a Web application based upon received data from the client devices. The processor may further cause at least one of the plurality of client devices to display a graphical overlay over a Web application, with the graphical overlay including content related to the determined problem.
Focus Events
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining focus events. One of the methods includes determining time spent by a user. A sequence of events occurring in multiple software services being accessed by a user is tracked. The sequence of events includes one or more events from each case of a group of cases handled by the user. Using information extracted from one or more interactions of the user with at least one service, focus events are determined that identify which case in the group of cases is being worked on by the user at various points in time, each focus event having a focus event duration. Using the extracted information, each focus event of the focus events is assigned to a particular case. A total period of time spent by the user on the particular case is determined based on a sum of focus events durations for the focus events assigned to the particular case.
CORRELATING CAPTURED PACKETS WITH SYNTHETIC APPLICATION TESTING
Correlating captured packets with synthetic application testing is provided. A device captures packets associated with a plurality of processes that include one or more synthetic transactions and one or more transactions responsive to user input. A packet capture data set can lack process identifiers (PIDs). The device captures first finger-printing data including first PIDs and attributes associated with the plurality of processes, and second finger-printing data comprising second PIDs corresponding to the one or more synthetic transactions. The device applies a first filter generated from the second PIDs in the second finger-printing data to a first finger-printing data set, and a second filter generated from the filtered attributes of a filtered finger-printing data set to the packet capture data set. The device provides a filtered packet capture data set to manage a performance of one or more processes of the plurality of processes.
AUTOMATIC SPAN CONTEXT PROPAGATION TO WORKER THREADS IN RICH-CLIENT APPLICATIONS
Disclosed techniques relate to tracing a subsidiary thread of a web page application. In an example, a method includes providing a web page application to a web browser. The method further includes creating, from the web page application, a global tracer configured to log tracing data for the web page application and a span. The method further includes instantiating, from the web page application, a wrapper for a subsidiary thread. The wrapper is configured to execute shim code before executing the subsidiary thread. The method further includes passing, from the wrapper to the shim code, configuration data of the global tracer. The method further includes creating a subsidiary tracer from the shim code and the configuration data. The subsidiary tracer configured to log tracing data for the subsidiary thread and a thread span.
Method and apparatus of monitoring interface performance of distributed application, device and storage medium
The present disclosure discloses a method and apparatus of monitoring an interface performance of a distributed application, a device and a storage medium, which relates to a field of computer technology, in particular to a field of cloud platform. The method includes: in case of detecting a caller request for calling an interface of the distributed application, obtaining a performance data of the interface for responding the caller request; updating a performance data distribution characteristic of the interface according to the performance data of the interface for responding the caller request, so as to obtain an updated performance data distribution characteristic; and monitoring the interface performance of the distributed application, according to the updated performance data distribution characteristic of the interface.
Real time application error identification and mitigation
A method may be performed by a network server and includes: applying historical raw user data as an input to a first application running in a simulation environment; receiving activity log entries from the first application in the simulation environment; identifying a first group of the activity log entries corresponding to an error of the first application; saving an error entry in non-volatile storage media in response to identifying the first group of the activity log entries, the error entry including the first group of the activity log entries and an identification of action to be taken in response to the error of the first application; and causing a monitoring system to generate a first alert corresponding to the error entry.
INTERNET BROWSING MONITORING SYSTEM
An Internet browsing monitoring system has a web server providing a web page in which some of the elements associated with the browsing monitoring are encoded in the web page by a CSS code, the web page includes a mechanism detecting interactions to be logged, and, when a type of interaction to be logged is detected, sends the CSS code associated with the considered element with at least one indicator of the detected interaction to an interaction logging server. The interaction logging server has an input memory receiving the CSS codes associated with a considered element and the at least one indicator of the detected interaction and an extractor analyzing each CSS code associated with a considered element and the at least one indicator of the detected interaction, split them into chunks, encode at least some of the chunks in the form of a number, and store the resulting sequence of numbers encoding the chunks in a database.
Controlling client access to a server application
An approach is provided for controlling a rate at which requests from a client computer will be received by a server application executed on a server computer. Requests are received by the server computer at different times from the client computer and time intervals between different pairs of successive requests are measured. Based on the time intervals, (1) a historical rate of requests from the client computer is determined and a limit on a rate for the server application to receive subsequent requests from the client computer is determined and enforced based on the historical rate of requests, or (2) a range of the time intervals is determined to be within a predefined range of time intervals and based on the range being within the predefined range, a denial of service attack or an overload of requests from the client computer is determined and blocked.