US20070060367A1 - End-to-end transaction tracking in the enterprise - Google Patents

End-to-end transaction tracking in the enterprise Download PDF

Info

Publication number
US20070060367A1
US20070060367A1 US11/227,854 US22785405A US2007060367A1 US 20070060367 A1 US20070060367 A1 US 20070060367A1 US 22785405 A US22785405 A US 22785405A US 2007060367 A1 US2007060367 A1 US 2007060367A1
Authority
US
United States
Prior art keywords
token
execution
unit
communication
communication event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/227,854
Inventor
Jean-Jacques Heler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/227,854 priority Critical patent/US20070060367A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HELER, JEAN-JACQUES
Publication of US20070060367A1 publication Critical patent/US20070060367A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3419Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment by assessing time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/87Monitoring of transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet

Definitions

  • This invention relates to tracking transactions; and in particular, to tracking individual transactions as they are processed across various application environments.
  • legacy software systems comprise IBM® (Registered trademark of International Business Machines Corporation) Customer Information Control System (CICS® (Registered trademark of International Business Machines Corporation)), IBM Information Management System (IMSTM (Trademark of International Business Machines Corporation)), and DB2® (Registered trademark of International Business Machines Corporation).
  • IBM® Registered trademark of International Business Machines Corporation
  • CICS® Customer Information Control System
  • IMSTM IBM Information Management System
  • DB2® Registered trademark of International Business Machines Corporation
  • the distributed environment has increased the need for software systems such as Web servers and application servers, for example, Java® 2 Platform Enterprise Edition (J2EE® (Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc.
  • a legacy software system is a non-J2EE software system.
  • IBM WebSphere® Registered trademark of International Business Machines Corporation
  • MQSeries® Registered trademark of International Business Machines Corporation
  • a legacy software system is a non-J2EE software system.
  • the processing of the business transaction typically flows from a Web server to an application server all the way to the legacy software system and back.
  • the advent of the Internet has greatly increased the volume of such transactions twenty-four hours a day, seven days a week. IT organizations need to provide an acceptable end-to-end response time for processing transactions. Therefore, there is a need for IT organizations to track the processing of transactions should problems such as bottlenecks, deadlocks and hangs occur.
  • Monitoring from the resource point-of-view comprises monitoring the memory utilization, central processing unit (CPU) time, and connection pools of the software system.
  • Monitoring from the application point-of-view comprises monitoring transaction performance metrics, such as response time, or tracing the execution of a single instance.
  • a servlet is a Java program for providing additional features to a Web server and can be used to access existing business systems.
  • One conventional J2EE monitor is able to identify the servlets which have requested external services from CICS.
  • Another conventional CICS monitor is able to detect activities in CICS.
  • neither the J2EE monitor nor the CICS monitor is able to associate any servlet with any CICS tasks that the servlet has invoked or sent messages to. When a problem occurs, it becomes difficult, if not impossible, to identify the problem or know what action to take in order correct the problem. Therefore there is a need for an improved technique which allows the processing of transactions to be tracked across various software systems.
  • a managing server receives an originator communication event record from a first collector associated with a first application environment having a first unit of execution.
  • the first communication event record comprises a first unit of execution identifier and a first token.
  • the managing server receives a second communication event record from a second collector associated with a second application environment having a second unit of execution.
  • the second communication event record comprises a second unit of execution identifier and a second token.
  • the managing server determines whether the first unit of execution and the second unit of execution are associated with processing a transaction based on the first token and the second token. In some embodiments, the managing server determines that the first unit of execution and the second unit of execution are associated with the processing of the same transaction in response to the first token matching the second token.
  • FIG. 1 depicts a diagram illustrating a managing server and application environments
  • FIG. 2 depicts an embodiment of a unit of execution (UOE) tag comprising a UOE identifier and a timestamp;
  • UOE unit of execution
  • FIG. 3A depicts a diagram of an embodiment of a UOE tag comprising a hosting thread identifier as the UOE identifier, and a timestamp;
  • FIG. 3B depicts a diagram of another embodiment of a UOE tag comprising a task control area number as the UOE identifier, and a timestamp;
  • FIG. 4 depicts a diagram of an embodiment of a native token
  • FIG. 5 depicts a diagram of an embodiment of a guest token
  • FIG. 6 depicts a diagram of another embodiment of a guest token
  • FIG. 7 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to an attempt to communicate with a receiving UOE in a receiving application environment;
  • FIG. 8 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with a receiving UOE in a receiving application environment in response to receiving a communication from an originating UOE in an originating application environment;
  • FIG. 9 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with the receiving application environment in response to the receiving UOE attempting to send a communication which indicates that the receiving UOE is suspending or stopping execution;
  • FIG. 10 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to receiving a communication that indicates that the receiving UOE is suspending or stopping execution;
  • FIG. 11 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to an asynchronous sending of a message using a message queue;
  • FIG. 12 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with a receiving application environment in response to the asynchronous receiving of a message from a message queue;
  • FIG. 13 depicts a flowchart of an embodiment of the correlation of receiver and originator communication event records by a managing server
  • FIG. 14 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using synchronous communication
  • FIG. 15 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using non-message driven asynchronous and synchronous communication;
  • FIG. 16 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using message driven asynchronous communication
  • FIG. 17 comprises FIGS. 17A, 17B and 17 C which collectively depict an embodiment of a graphical user interface, generated by a global publishing server, which illustrates an exemplary trace of the processing of a transaction across various units of execution in different application environments; and
  • FIG. 18 depicts an illustrative computer system which uses various embodiments of the present invention.
  • a managing server receives an originator communication event record from a first collector associated with a first application environment having a first unit of execution.
  • the first communication event record comprises a first unit of execution identifier and a first token.
  • the managing server receives a second communication event record from a second collector associated with a second application environment having a second unit of execution.
  • the second communication event record comprises a second unit of execution identifier and a second token.
  • the managing server determines whether the first unit of execution and the second unit of execution are associated with processing the same transaction based on the first token and the second token. In some embodiments, the managing server determines that the first unit of execution and the second unit of execution are associated with the processing of the same transaction when the first token matches the second token.
  • FIG. 1 depicts a diagram illustrating a managing server 20 and application environments (AE) 32 , 34 and 36 .
  • the managing server 24 is in computer system 22 .
  • Application environments 32 and 34 are in another computer system 24 .
  • Application environment 36 is in yet another computer system 26 .
  • the managing server 20 also has at least one application environment.
  • An “application environment” is a software environment in which applications are executed.
  • a “region” is an address space, that is, a portion of memory.
  • a “region” is a process, for example, a Unix (Unix is a registered trademark of the Open Group in the United States and other countries) process.
  • an application environment 32 and 34 comprises a single region 38 and 39 , respectively.
  • an application environment 36 comprises a plurality of regions 40 and 41 .
  • An application environment 32 , 34 and 36 is associated with a collector 62 , 64 and 66 which monitors the application environment 32 , 34 and 36 , respectively.
  • Examples of a single region application environment 38 and 39 include, and are not limited to, a CICS region and a distributed J2EE application server.
  • a CICS region is an area of memory of the computer system in which CICS system programs have been loaded (and executed), with other memory allocated for the CICS region to use.
  • the CICS region comprises a named collection of resources controlled by CICS as a unit.
  • the resources in a CICS region comprise programs, Basic Mapping Support map sets, transactions, terminals, files, transient data queues, temporary storage queues and journals.
  • the application environment also known as the application server instance, the application environment comprises one address space (or process or Java Virtual Machine (JVM)).
  • JVM Java Virtual Machine
  • an application environment comprises a plurality of regions.
  • multi-region application environments include, and are not limited to, an IBM WebSphere Application Server (WAS/z) and IMS.
  • WAS/z IBM WebSphere Application Server
  • IMS IMS
  • one application server instance has one control region and one or more JVMs, each JVM occupying one servant region.
  • one IMS application environment has one control region and one or more dependent regions, where the IMS applications are executed.
  • a single collector is associated with the servant regions of the application environment; and, the control region is not associated with a collector.
  • the IMS case a single collector is associated with the control region; and, the dependent regions report to that collector via MVS® (Registered Trademark of International Business Machines Corporation) operating system cross memory-services.
  • MVS® Registered Trademark of International Business Machines Corporation
  • a region 38 , 39 , 40 and 41 comprises at least one unit of execution (UOE) 42 - 44 , 46 - 48 , 50 - 52 , and 54 - 56 , respectively.
  • UOE unit of execution
  • a unit of execution is a group of instructions which are executed as a unit, and have a beginning and an end.
  • a UOE has a host mechanism for execution and a unique existence in time, for example, an instance.
  • the host mechanism for execution is a process, a thread, an operating system task control block (TCB) (MVS operating system, z/OS® (Registered Trademark of International Business Machines Corporation) operating system), a task control area (TCA) (CICS) or task (MVS operating system, z/OS operating system, CICS, IMS).
  • TB operating system task control block
  • CICS task control area
  • VMS operating system z/OS operating system
  • IMS IMS
  • a transaction is a set of input data and output data with a beginning and an end point in time, originated by a request and terminated when a response is returned to that request.
  • the request can be a message or an invocation, depending on the embodiment.
  • a transaction is executed in one or more application environments.
  • a transaction which is executed in a single application environment is referred to as a local transaction (“local” to that particular application environment).
  • a transaction that is executed in multiple application environments is referred to as a composite transaction. Therefore a composite transaction is composed of a plurality of local transactions.
  • a composite transaction may also be referred to as a business transaction.
  • a UOE executes in an application environment, and hosts a local transaction in that application environment.
  • the local transaction is executed as a sequence of one or more programs (CICS), methods (Java), functions (C/C++), or subroutines (COBOL, PL/I) in the application environment.
  • a UOE hosts one local transaction.
  • a UOE hosts more than one local transaction, for example, a server (as in the client-server architecture).
  • a server UOE is a long executing task which “serves” multiple external requests, each request resulting in a single local transaction; in these embodiments, an external request is from a different application environment from the application environment in which the server UOE is executing.
  • An internal request is originated from the same application environment as the server UOE.
  • the server UOE exists, that is, is executing, before the initiation of each local transaction that the server UOE hosts and exists after the completion of each local transaction that the server UOE hosts. If a UOE does not exist prior to and after completion of the local transaction, then the UOE hosts a single transaction.
  • a UOE comprises a set of one or more programs, subroutines, functions or methods, which host one or more transactions.
  • the host mechanism for execution of a UOE is a thread.
  • a thread is either in an active state or a “dormant” state and is identified by a thread identifier (id).
  • id thread identifier
  • a thread remains “dormant” in a thread pool in a process until the thread is associated with a UOE, in which case the thread becomes an active thread hosting a UOE.
  • the UOE terminates the thread is no longer active and is returned to the thread pool and remains in the thread pool under the same thread id, until the thread is associated with another UOE.
  • the UOE hosts transactions, whereas the thread is the software mechanism under which programs are executed.
  • an executing thread “hosts” a UOE (or is referred to as being associated with a UOE).
  • the host mechanism for execution is a TCB, TCA or task, rather than a thread.
  • the host mechanism for execution is not meant to be limited to a thread, TCB, TCA or task; and the invention will work with other embodiments of a host mechanism for execution.
  • an application environment comprises one or more regions.
  • a region is a host to one or more threads or tasks or TCBs or TCAs, which typically remain in a pool ready to be associated with a UOE.
  • a UOE executes in a region as an active thread, task, TCB, or TCA, depending on the embodiment.
  • a UOE is associated with an active thread, task, TCB, or TCA, depending on the embodiment, which is said to host the UOE.
  • a UOE hosts one or more transactions. During its lifetime, the UOE can host one transaction, or the UOE can host more than one transaction.
  • a UOE can originate or instantiate zero or more transactions.
  • the transactions may be local or composite transactions.
  • a unit of execution may cause one or more other units of execution in other application environments to be executed.
  • a TCB represents an operating system task, and there is at least one TCB per address space (the main TCB).
  • a CICS region is an address space, that is, an application environment, with several TCB's. One specific TCB will execute the client requests which will take turns using that TCB in a round robin fashion.
  • Each of these client requests which are also referred to as CICS transactions, is identified by a CICS task number (not an operating system task), for which the information is to be found in the task control area (TCA).
  • a CICS task is also referred to as a TCA, the same way as an MVS or z/OS operating system task is also referred to as a TCB.
  • a CICS transaction is identified by its task number, that is, its TCA number.
  • An IMS transaction is typically a local transaction which comprises a group of TCBs in different address spaces in a single IMS region.
  • a Unix process is a UOE of an application environment which contains multiple UOEs; or alternately, a Unix process can be a single UOE of an application environment.
  • multiple transactions can be performed by the same thread, and each performance of the transaction by that thread is a separate unit of execution.
  • An application environment 32 , 34 and 36 is typically monitored by an associated collector 62 , 64 and 66 , respectively.
  • the collector 62 , 64 and 66 gathers data about the units of execution 42 and 44 , 46 and 48 , 50 and 52 , 54 and 56 of its associated application environment 32 , 34 , 36 and 38 , respectively, and publishes data comprising communication event records as indicated by arrows 67 , 68 and 69 , to the managing server 20 .
  • the information gathered by the collector 62 , 64 and 66 is used to provide a trace of the processing of a transaction within an application environment. Whenever a unit of execution inside a monitored application environment requests an external service from another unit of execution in a different application environment, the processing is said to leave the application environment.
  • the processing of individual transactions is tracked across units of execution in different application environments 32 , 34 and 36 using tokens.
  • a “composite” trace of the processing associated with a transaction is provided across the various application environments. For example, in various embodiments, using a graphical user interface, a user can view a method trace of a servlet within a J2EE container, see that the servlet made a request to a CICS region, switch to view a trace of the processing associated with that request in the CICS region where a CICS transaction or task is executed on its behalf, and follow a program trace of the CICS transaction.
  • the CICS transaction could send an MQ Series message to IMS through an MQ-IMS bridge, which invokes an IMS transaction which can be tracked in the same context as the servlet and the CICS transaction.
  • an end-to-end view of the processing of transactions across various application environments is provided with the ability to drill down to view the processing inside the various monitored application environments. Therefore, the processing related to a transaction can be viewed in the same context across different application environments in a computing network.
  • the collector 62 , 64 and 66 is implemented in an application management system (AMS) 72 , 74 and 76 , respectively, for example, WebSphere Studio Application Monitor (WSAM) or Tivoli® (Registered trademark of International Business Machines Corporation) Monitoring for Transaction Performance (TMTP).
  • AMS application management system
  • WSAM WebSphere Studio Application Monitor
  • Tivoli® Registered trademark of International Business Machines Corporation
  • TMTP Transaction Performance
  • the application management system is not meant to be limited to WSAM or Tivoli TMTP, and other application management systems may be used.
  • a UOE has a UOE identifier.
  • the UOE identifier is unique within an application environment.
  • a thread is associated with a thread identifier;
  • a TCA is associated with a TCA number; and
  • a TCB is associated with a TCB number.
  • the UOE identifier is a thread identifier, a TCA number or a TCB number.
  • FIG. 2 depicts an embodiment of a UOE tag 82 which comprises a UOE identifier 84 and a timestamp (Timestamp) 86 .
  • FIG. 3A depicts an embodiment of a UOE tag 90 comprising a hosting thread identifier 92 as the UOE identifier, and a timestamp (Timestamp) 94 .
  • FIG. 3B depicts another embodiment of a UOE tag 96 which comprises a TCA number 98 as the UOE identifier, and a timestamp 100 .
  • a TCB number is used as the UOE identifier instead of a TCA number.
  • thread identifiers, TCA numbers and TCB numbers are reusable; therefore, a UOE identifier of an application environment may not be unique for that application environment.
  • the thread identifiers, TCA numbers and TCB numbers are unique within an application environment for a sufficient duration of time so that, when used as a UOE identifier, their associated threads, TCAs, and TCBs, respectively, can be correctly identified.
  • the managing server 20 communicates with and manages the collectors.
  • the managing server 20 stores communication event records in addition to other information.
  • a global publishing server (GPS) 80 correlates the processing of transactions across application environments 32 , 34 and 36 , respectively, based on the communication event records.
  • Correlating the processing of transactions across application environments refers to associating the UOEs with each other based on their communications, either through invocation (synchronous or asynchronous) or through messaging.
  • a token is generated. The token is sent from the originating UOE to the receiving UOE with the communication. The token is also sent to the managing server as part of a communication event record.
  • each token which is generated by a collector is distinct.
  • the tokens are distinct for a sufficient period of time so that the managing server 20 , in particular, the GPS 80 , can correctly correlate the processing of the transaction across the UOEs in different application environments.
  • the collectors send a communication event record comprising the token, a UOE identifier and timestamp, or UOE tag, to the managing server to notify the managing server of the attempt to communicate.
  • a token is generated and exchanged between the originating UOE and the receiving UOE.
  • tokens are either generated by the collector using fields which are managed by that collector or generated using information from fields which are not managed by the collector.
  • the term “native token” refers to a token which is generated by the collector using fields which are managed by that collector.
  • guest token refers to a token which is generated by the collector using information from fields which are not managed by that collector, for example, using information from the communications interface structure which is managed by other applications.
  • a guest token is derived from fields in the communications interface structure the combination of which is “reasonably” unique. In other words, the guest token is sufficiently unique so that the associated UOEs and application environments can be correctly correlated. In some embodiments, the guest token allows the associated UOEs and application environments to be correctly correlated in excess of a desired probability.
  • FIG. 4 depicts an embodiment of a native token 102 .
  • the native token 102 has an application environment identifier 104 and a trip counter 106 .
  • the native token 102 has a predetermined length. In some embodiments, the predetermined length is four bytes; however, the predetermined length is not meant to be limited to four bytes and other numbers of bytes may be used.
  • the native token 102 contains binary (non character) data.
  • the application environment identifier 104 uniquely identifies the application environment originating a request. In various embodiments, the application environment identifier for each application environment associated with a managing server is distinct. In some embodiments, the application environment identifier 104 comprises the first n most significant bits of the token 102 .
  • the number of bits n is a configurable value and depends on the site transaction volume and the number of collectors managed by the managing server. For example, if n is equal to ten, there can be up to 1,024 collectors; if n is equal to eleven, the number of collectors is doubled to 2,048.
  • the remaining bits (32-n) are used as the trip counter 106 .
  • the trip counter 106 In response to any unit of execution in an application environment making a request to leave that application environment, such as an invoke, the trip counter 106 is incremented by one. For example, if a request is made by a thread to leave its region, the trip counter 106 is incremented by one. If n is equal to ten, the trip counter 106 has a maximum value of 4,194,304 before wraparound.
  • the managing server maintains a list which associates the application environment identifiers with their respective application environment names, and in some embodiments, other associated information.
  • an application environment comprises multiple regions
  • a plurality of collectors are associated with a plurality of regions
  • the collectors associated with those regions use a single application environment identifier, typically stored in shared memory, which is used to represent all the regions, and the collectors use a single trip counter, which is also stored in shared memory.
  • non-message queue based communication uses native tokens 102 for both synchronous and asynchronous communication.
  • FIG. 5 depicts an embodiment of a guest token 110 .
  • the guest token 110 comprises a message identifier (MsgId) 112 and a correlation identifier (CorrelId) 114 .
  • guest tokens 110 are used for messaging system, that is, message queue, based interactions between application environments.
  • the messaging system is Websphere MQ Series; however, in other embodiments, other messaging systems may be used.
  • a guest token 110 has the following properties: the guest token 110 is unique within the application environment monitored by the collector to avoid collisions within the application environment; the guest token 110 has a length that is greater than the predetermined length of the native token to avoid collisions with native tokens; the guest token 110 remains with the message between putting the message on a message queue and retrieving the message from the message queue; and the guest token 100 contains binary data not subject to changes or conversion. In some embodiments, the guest token 110 has a length that is less than the predetermined length of the native token.
  • the message identifier 112 is a byte string that is used to distinguish one message from another message. Typically, each message has a different message identifier 112 . In some embodiments, the message identifier 112 is generated by the queue manager of the messaging system; and in other embodiments, the message identifier 112 is generated by the application or system.
  • a correlation identifier 114 is a byte string that an application can use to relate one message to another message, or to relate the message to other work that the application is performing.
  • the correlation identifier 114 is either not generated and a value of (24 ⁇ ‘ 00 ’) is used, or alternately, the correlation identifier 114 is generated by the queue manager, or in some embodiments, the application.
  • the messaging system sends the message identifier 112 and correlation identifier 114 with the message. Therefore, in this embodiment, the collector does not modify any information in the message header.
  • a message queue message descriptor for example, an MQSeries message descriptor (MQMD) is available with the PUT-message options (MQPMO) or the GET-message options (MQGMO).
  • MQMD MQSeries message descriptor
  • the message identifier 112 and correlation identifier 114 are available in the PUT-message options or the GET-message options which are associated with a message.
  • FIG. 6 depicts another embodiment of a guest token 120 .
  • the guest token 120 comprises the correlation identifier 114 and message type 122 .
  • This embodiment of a guest token 120 is used when a communication is a response message from an MQ-IMS bridge.
  • the message type 122 is typically set by the application and indicates whether the message is a reply to a prior message.
  • a native token is used.
  • this J2EE application was to use MQSeries through the MQ-IMS Bridge, a guest token is used.
  • the guest token is derived from the CorrelId and MsgType fields in the MQSeries message descriptor and has a predetermined TOKEN LENGTH, which in some embodiments, is twenty-eight bytes.
  • the guest token is derived from the MsgID and CorrelId fields in the MQSeries message descriptor and has a predetermined TOKEN LENGTH, which in some embodiments, is forty-eight bytes.
  • the TOKEN LENGTH is not meant to be limited to twenty-eight or forty-eight bytes, and in other embodiments, other values for the TOKEN LENGTH may be used.
  • the collector communicates with the managing server according to a communication protocol comprising communication event records.
  • the collector sends communication event records to the managing server.
  • a communication event record comprises an event type, a UOE identifier and a token, and in some embodiments, a timestamp.
  • An originator communication event record is a communication event record which is sent by the originating UOE to the managing server.
  • a receiver communication event record is a communication event record which is sent by the receiving UOE to the managing server.
  • the originator communication event record comprises an originator event type, an originating UOE identifier, a token, and, in some embodiments, a timestamp.
  • Originator event types comprise GPS_INVOKE_START, GPS_PUT_START, GPS_INVOKE_END and GPS_PUT_END event records.
  • a receiver communication event record comprises a receiver event type, a receiving UOE identifier, a token, and, in some embodiments, a timestamp.
  • Receiver event types comprise GPS_RECEIVE_START, GPS_RECEIVE_END, GPS_GET_START and GPS_GET_END.
  • the event types may also be classified as start event types and end event types.
  • Start event types comprise GPS_INVOKE_START, GPS_PUT_START, GPS_RECEIVE_START and GPS_GET_START.
  • End event types comprise GPS_INVOKE_END, GPS_RECEIVE_END, GPS_PUT_END and GPS_GET_END.
  • the event types may be classified as message-based and non-message based.
  • the message-based event types indicate that a messaging system is used to send the communication.
  • the message-based event types comprise GPS_PUT_START, GPS_PUT_END, GPS_GET_START and GPS_GET_END.
  • the non-message-based event types indicate that a communication is not sent by a messaging system, for example, the communication may be sent through invocation (synchronous or asynchronous).
  • the non-message-based event types comprise GPS_INVOKE_START, GPS_INVOKE_END, GPS_RECEIVE_START and GPS_RECEIVE_END.
  • traps are configured to transfer control to the collector associated with an application environment in response to a unit of execution of that application environment attempting to communicate with another application environment, for example, by invocation or by sending a message. Traps are also configured to transfer control to the collector associated with an application environment in response to a unit of execution of that application environment receiving a communication from another application environment, for example, by returning from an invocation or by receiving a message. In some embodiments, traps are configured to transfer control to the collector associated with an application environment in response to returning from a call to a communication application programming interface (API).
  • API application programming interface
  • a trip counter in a collector is set to zero, or alternately, the trip counter in a collector is set equal to one. In various embodiments, the first, that is, initial, value of the token cannot be equal to zero.
  • the collector associated with the application environment containing an originating UOE sends an originator communication event record comprising a GPS_INVOKE_START event type, the originating UOE identifier, a token and a timestamp, to the managing server in response to trapping a CICS or IMS request which is to be sent to a receiving UOE.
  • the collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_RECEIVE_START, a receiving UOE identifier, the received token and a timestamp, to the managing server in response to trapping the receipt of the request from the originating UOE.
  • the receiving UOE processes the request.
  • the request comprises the token.
  • the collector associated with the application environment containing the receiving UOE in response to trapping the suspension or stopping of the processing at the receiving UOE to return control to the originating UOE, the collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_RECEIVE_END, the receiving UOE identifier, the token that was received in the request and a timestamp, to the managing server.
  • the receiving UOE returns control to the originating UOE by sending a communication to the originating UOE with the token that was received in the request.
  • the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_INVOKE_END, the originating UOE identifier, the token that was passed in the communication from the receiving UOE and a timestamp, to the managing server, and control is returned to the originating UOE.
  • the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_PUT_START, the originating UOE identifier, a token and timestamp, to the managing server in response to sending a message using a message queue of a messaging system by, for example, issuing a PUT request or PUT API.
  • the collector associated with the application environment containing the receiving UOE sends a communication event record comprising an event type of GPS_GET_START, the receiving UOE identifier, the received token and a timestamp, to the managing server in response to retrieving the message from the message queue.
  • a GET request or GET API is used to retrieve a message.
  • the receiver communication event record also indicates whether the GET request or API is destructive, for example, a “read” from a queue, or non-destructive, for example, a “browse” of the queue. Several units of execution in different regions can issue a browse against the same message in the queue, and those UOEs will share the same token.
  • the receiving UOE performs the request.
  • the collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_GET_END, the receiving UOE identifier, the received token and a timestamp to the managing server after regaining control from the GET request or API which retrieved the message from the message queue.
  • the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_PUT_END, the originating UOE identifier, the token used in the communication event record having an event type of GPS_PUT_START and a timestamp, to the managing server after the UOE regains control from the PUT API or request to put a message on the message queue. Therefore, the originating UOE sends the originator communication event record having an event type of GPS_PUT_END asynchronously with respect to the receiving UOE.
  • FIG. 7 depicts a flowchart of an embodiment of the sending of an originator communication event record by a collector at an originating application environment in response to an attempt to communicate with a receiving UOE in a receiving application environment.
  • a communication API is typically invoked to send the communication from the originating UOE to the receiving UOE.
  • step 132 in response to a UOE of the originating application environment attempting to communicate with a receiving UOE in a receiving application environment, the attempt to communicate is trapped and the collector associated with the originating application environment is activated or invoked.
  • the receiving application environment is different from the originating application environment.
  • the collector In step 134 , the collector generates a token.
  • the token contains the application environment identifier of the originating application environment, and the value of the trip counter in the collector is incremented by one and stored in the token.
  • the token is derived from environment variables, such as a message identifier and correlation identifier as described above.
  • the token is hosted by, that is, contained in, a communication structure which depends on the nature of the communication.
  • the token is hosted, that is, stored, in the COMMAREA; in MQSeries, the token is part of the MQSeries message descriptor; and if IMS is the target of the request, the token is hosted by the Open Transaction Manager Access (OTMA) prefix user data.
  • OTMA Open Transaction Manager Access
  • the collector sends an originator communication event record to the managing server.
  • the originator communication event record has an event type of GPS_INVOKE_START or GPS_PUT_START, the UOE identifier of the originating UOE, the token and a timestamp.
  • the timestamp indicates when the request or message was sent by the UOE; in other embodiments, the timestamp indicates when the associated communication event record was sent to the managing server.
  • the UOE identifier and timestamp are contained in a UOE tag.
  • the token is a native token which contains the application environment identifier associated with the originating UOE and a trip counter as described above. In other embodiments, the token is a guest token.
  • the collector sends an originator communication event record having an event type of GPS_INVOKE_START in response to a request for an IMS or CICS service and uses a native token.
  • the collector sends an originator communication event record having an event type of GPS_PUT_START in response to a sending a message using the messaging system and uses a guest token.
  • the originator communication event record also contains the queue name.
  • the collector exits.
  • step 140 the communication is then sent to the receiving UOE with the token.
  • the communication API which implements the communication passes the communication structure from the originating UOE to the receiving UOE.
  • the communication structure contains the token as described above.
  • FIG. 8 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector of a receiving UOE in a receiving application environment in response to receiving a communication from an originating UOE in an originating application environment.
  • step 142 the receipt of a communication comprising a token from an originating UOE in an originating application environment by a receiving UOE in a receiving application environment is trapped, and the collector associated with the receiving application environment is activated.
  • the receiving application environment is different from the originating application environment.
  • the collector extracts the token from the communication.
  • the collector acknowledges receipt of the communication by sending a receiver communication event record comprising an event type of GPS_RECEIVE_START or GPS_GET_START, the receiving UOE identifier, the received token and a timestamp, to the managing server.
  • the timestamp indicates when the request or message was received, or alternately, when the receiver communication event record was sent to the managing server.
  • the UOE identifier and the timestamp are contained in a UOE tag.
  • the event type in response to the request being an invocation of an IMS or CICS service, the event type is GPS_RECEIVE_START.
  • the event type is GPS_GET_START.
  • the execution of the receiving UOE is initiated in response to the request or message; in other embodiments, the receiving UOE is already executing prior to receiving the request or message.
  • the collector exits. The unit of execution of the application environment processes the request or message.
  • FIG. 9 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector of the receiving application environment in response to the receiving UOE attempting to send a communication which indicates that the receiving UOE is suspending or stopping execution.
  • step 152 an attempt to send a communication which indicates that the receiving UOE is suspending or stopping execution is trapped at the receiving application environment containing the receiving UOE, and the collector associated with the receiving application environment is activated.
  • step 154 the collector retrieves the token which was received in the communication from the originating UOE to provide a received token.
  • the collector stores the token in the communications structure associated with the communication which indicates that the receiving UOE is suspending or stopping execution.
  • the collector sends a receiver communication event record to the managing server.
  • the receiver communication event record comprises an event type, the receiving UOE identifier, the received token and a timestamp.
  • the timestamp indicates when the receiver communication event record was sent.
  • the event type is GPS_RECEIVE_END.
  • the collector exits.
  • the communication which indicates that the receiving UOE is suspending or stopping execution is sent to the originating UOE with the token.
  • FIG. 10 depicts a flowchart of an embodiment of sending an originator communication event record by a collector at an originating application environment in response to receiving a communication that indicates that a receiving UOE is suspending or stopping execution.
  • step 164 at the originating UOE of an originating application environment, the receipt of a communication that execution of a receiving UOE has been suspended or stopped, is trapped.
  • the communication comprises a token.
  • the collector associated with originating application environment is activated.
  • the collector associated with the originating application environment extracts the token from the communication.
  • the collector associated with the originating application environment sends an originator communication event record to the managing server.
  • the originator communication event record comprises a GPS_INVOKE_END event type, the originating UOE identifier, the token and a timestamp indicating when the originator communication event was sent.
  • step 170 the collector exits.
  • FIG. 11 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to the originating UOE receiving control back from sending a communication asynchronously.
  • the return from an API to send a communication to the receiving UOE using a messaging system is trapped at the originating application environment, and a collector associated with the originating application environment is activated.
  • the API is a PUT API to place a message in a message queue.
  • the collector associated with the originating application environment extracts the token from the communication.
  • the collector associated with the originating application environment sends an originator communication event record to the managing server comprising an event type, the originating UOE identifier, the token and a timestamp.
  • the collector exits.
  • the event type is GPS_PUT_END.
  • asynchronous invocation is used rather than a messaging system.
  • the return from an API to send a communication to the receiving UOE using asynchronous invocation is trapped; and in step 176 , the event type is GPS_INVOKE_END.
  • FIG. 12 depicts a flowchart of an embodiment of the sending of a receiver communication event record by a collector associated with a receiving application environment in response to a UOE receiving control back from an API to receive an asynchronous communication.
  • the return from the API to receive the communication is trapped at the receiving application environment, and the collector associated with the receiving application environment is activated.
  • the return is from a GET API to receive a communication from a messaging system.
  • the return is from an API which receives a communication from an asynchronous invocation.
  • the collector extracts the token from the communication.
  • the collector sends a receiver communication event record to the managing server.
  • the receiver communication event record comprises an event type, the receiving UOE identifier, the token and a timestamp.
  • the event type is GPS_GET_END if a messaging system is used; and in other embodiments, the event type is GPS_RECEIVE_END if asynchronous invocation is used.
  • the collector exits.
  • steps 134 - 138 of FIG. 7 , steps 144 - 148 of FIG. 8 , steps 154 - 160 of FIG. 9 , steps 166 - 170 of FIG. 10 , steps 174 - 178 of FIG. 11 and steps 182 - 186 of FIG. 12 are implemented in a single collector.
  • FIG. 13 depicts a flowchart of an embodiment of the managing server.
  • the managing server receives and stores originator and receiver communication event records. Each communication event record has a token.
  • the GPS correlates UOEs across application environments based on the originator and receiver communication event records.
  • the GPS determines whether two UOEs are correlated by matching the tokens of the receiver and originator communication event records. For example, a UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_INVOKE_START is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_RECEIVE_START if the tokens of the originator and receiver communication event records are the same.
  • a UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_INVOKE_END is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_RECEIVE_END if the tokens of the originator and receiver communication event records are the same.
  • a UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_PUT_START is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_GET_START if the tokens of the originator and receiver communication event records are the same.
  • a UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_PUT_END is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_GET_END if the tokens of the originator and receiver communication event records are the same.
  • the GPS identifies the originating and receiving UOEs based on the UOE identifier sent in the originator and receiver communication event records, respectively.
  • the managing server receives other protocol messages from the data collector which are used to establish the identity of a thread, TCA or TCB within an application environment.
  • the collector identifies itself uniquely to the managing server, including the type of the collector, that is, the type of application environment that the collector is associated with, such as, J2EE, CICS or IMS.
  • the managing server receives a communication event record, the managing server identifies which collector is sending the communication event record, and therefore which application environment is associated with the communication event record.
  • the managing server can identify the UOE and the application environment associated with the communication event record.
  • the managing server maintains information such as the names of the UOEs, their associated UOE identifiers, the name of their associated application environments and their associated application environments identifier.
  • the GPS also determines what type of connection is used (synchronous/asynchronous invocation or messaging) by the event type of the communication event record.
  • the GPS determines the order of events based on the timestamp. In some embodiments, the GPS determines whether a communication is synchronous or asynchronous based on the timestamp.
  • step 196 the managing server provides a visual indication of the correlation between the originator and receiver communication event records, and therefore indicates the correlation between UOEs in different application environments.
  • the communication protocol works with synchronous and asynchronous communication.
  • One difference between synchronous and asynchronous communication may be indicated by the difference in the timestamp.
  • the timestamp will be such that in some instances the communication event record with an event type of GPS_INVOKE_END from the originating UOE will have a timestamp with a value which is prior to the value of the timestamp of the communication event record having an event type of GPS_RECEIVE_END from the receiving UOE.
  • the originating UOE does not “block” while the receiving UOE is executing.
  • the GPS can determine whether a communication is synchronous or asynchronous based on the timestamp.
  • FIG. 14 depicts a sequence diagram 200 illustrating an embodiment of tracking the processing of a transaction across application environments using synchronous communication.
  • the vertical axis 202 represents time.
  • FIG. 14 has three units of execution, UOE1, UOE2 and UOE3, 204 , 206 and 208 , respectively, and each unit of execution is in a different application environment.
  • FIG. 14 also indicates when the UOEs 204 , 206 and 208 start and stop executing with a “Start” label 212 and a “Stop” label 214 .
  • Table 1 illustrates the communication event records of FIG. 14 which are sent to and stored by the managing server.
  • the communication event records are associated with an event record number (EVR) 210 having a value from one through sixteen which correspond to the order in which the event records are issued.
  • EVR event record number
  • the EVRs 210 are enclosed in a circle.
  • the originating UOEs suspend execution until control is returned to them.
  • a dashed line 216 indicates that the execution of a UOE is suspended.
  • Table 1 below depicts various exemplary communication event records, including the event type, an exemplary UOE identifier with the TCA or TCB number, timestamp, and an exemplary token with the application environment identifier (AE id) and trip counter.
  • the timestamp contains an illustrative value as “hhmm” where “hh” represents the hour using a twenty-four hour clock and “mm” represents the minute.
  • TABLE 1 Communication event records For Synchronous Communication Communication event record UOE tag TCA or Token TCB Time Trip EVR Event Type number stamp AE id counter 1 GPS_INVOKE_START 1 1300 1 1 2 GPS_RECEIVE_START 2 1302 1 1 3 GPS_INVOKE_START 2 1304 2 1 4 GPS_RECEIVE_START 3 1305 2 1 5 GPS_RECEIVE_END 3 1308 2 1 6 GPS_INVOKE_END 2 1309 2 1 7 GPS_INVOKE_START 2 1310 2 2 8 GPS_RECEIVE_START 3 1311 2 2 9 GPS_RECEIVE_END 3 1312 2 2 10 GPS_INVOKE_END 2 1313 2 2 11 GPS_INVOKE_START 2 1314 2 3 12 GPS_RECEIVE_START 3 1315 2 3 13 GPS_RECE
  • a first unit of execution UOE1 204 of a first application environment attempts to communicate with a second unit of execution UOE2 206 of a second application environment.
  • the collector associated with the first application environment UOE1 204 sends a communication event record having a GPS INVOKE_START event type to the managing server.
  • the execution of the first unit of execution UOE1 204 is suspended as indicated by dashed line 216 .
  • the collector associated with the second unit of execution UOE2 206 of the second application environment sends a communication event record having an event type of GPS_RECEIVE_START to the managing server.
  • the second unit of execution UOE2 206 attempts to communicate with the third unit of execution UOE3 208 .
  • the collector associated with the second unit of execution UOE2 206 sends a communication event record having an event type of GPS_INVOKE_START to the managing server.
  • the execution of the second unit of execution UOE2 206 is suspended.
  • the collector associated with the third unit of execution UOE3 208 sends a communication event record having an event type of GPS_RECEIVE_START to the managing server.
  • the collector associated with the third unit of execution UOE3 208 sends a communication event record having an event type of GPS_RECEIVE_END to the managing server as indicated by event record number five. Control is transferred back to the second unit of execution UOE2 206 . In response to control being transferred back to the second unit of execution UOE2 206 , the collector associated with the second unit of execution UOE2 206 sends a communication event record having an event type of GPS_INVOKE_END event record to the managing server as indicated by event record number six. As shown by event record numbers seven to sixteen, the processing continues until control returns to the first unit of execution UOE1 204 .
  • FIG. 15 depicts a sequence diagram 220 illustrating an embodiment of tracking the processing of a transaction across application environments using non-message driven asynchronous and synchronous communication.
  • FIG. 15 illustrates three units of execution, UOE1, UOE2 and UOE3, 222 , 224 and 226 , respectively, and each unit of execution is in a different application environment.
  • the start and stop time of the UOEs 222 , 224 and 226 is also illustrated.
  • the communication event records below are numbered with an event record number (EVR) from one through sixteen, however, the event record numbers of FIG. 15 and Table 2 do not reflect the order in which the communication event records were issued.
  • EMR event record number
  • the event record numbers are used to associate the communication event records of Table 2 with FIG. 15 .
  • UOE1 222 communicates using asynchronous invocation and does not suspend execution after invoking UOE2 224 , as illustrated by the solid line 225 which indicates that UOE1 222 continues processing after the communication event record associated with event record number sixteen 228 is sent to the managing server.
  • UOE2 224 and UOE3 226 communicate using synchronous invocation.
  • UOE1 222 is operating asynchronously with respect to UOE2 224 and UOE3 226 .
  • the communication event record having an event type of GPS_INVOKE_END (labeled as event record number sixteen) 228 corresponding to the communication event record having an event type of GPS_INVOKE_START (labeled as event record number one) of UOE1 222 has a timestamp prior to the timestamp of the communication event records having event record numbers of 3 to 15 which indicates that UOE1 222 is not suspended while UOE2 224 and UOE3 226 are executing. Therefore UOE1 222 operates asynchronously, and the communication between UOE1 222 and UOE2 224 is asynchronous.
  • UOE2 224 and UOE3 226 operate synchronously as described above with reference to FIG. 14 .
  • FIG. 16 depicts a sequence diagram 230 illustrating an embodiment of tracking the processing of a transaction across application environments using message driven asynchronous communication.
  • UOE1 and UOE2, 232 and 234 are executing asynchronously in different application environments and communicate with each other through messaging.
  • the start and stop times of UOE1 232 and UOE2 234 are also illustrated in FIG. 16 .
  • the dashed lines 238 of FIG. 16 indicate a time delay between sending and receiving a communication between UOE1 232 and UOE2 234 .
  • Table 3 depicts communication event records of FIG. 16 which were received and stored by the managing server.
  • event record numbers (EVRs) are enclosed in a circle.
  • the event record numbers of Table 3 are used to indicate corresponding communication event records in FIG. 16 .
  • the event record numbers do not correspond to the order in which the communication event records are sent to the managing server.
  • the token is a guest token comprising a message identifier and a correlation identifier.
  • UOE1 232 attempts to send a message 237 to UOE2 using asynchronous messaging.
  • the collector associated with UOE1 sends an originator communication event record, as shown by event record number 1 236 , to the managing server.
  • the collector associated with UOE2 234 sends a communication event record, indicated by event record number 2 to the managing server.
  • communication event records as indicated by event record numbers 4 and 5, respectively, are sent to the managing server.
  • UOE1 232 and UOE2 234 continue processing.
  • UOE1 234 attempts to send another message 239 to UOE2 234 , and communication event records corresponding to event record numbers 5, 6, 7 and 8 are sent to the managing server in connection with message 239 .
  • UOE2 234 attempts to send a message 240 to UOE1 222 , and the communication event records associated with event record number numbers 9, 10, 11 and 12 are sent to the managing server in connection with message 240 .
  • messages are sent to IMS using an MQ-IMS bridge.
  • a J2EE process sends a request message with a token (MsgID, CorrellID) to IMS through the MQ-IMS bridge using a PUT API, and the collector associated with the J2EE process sends an originator communication event record comprising an event type of GPS_PUT_START, the hosting thread identifier of the J2EE process, the token (MsgID, CorrellID) and timestamp to the managing server.
  • the request message is routed to IMS with the token (MsgID, CorrellID), and IMS invokes a GET API to retrieve the message.
  • the collector associated with the IMS application sends a receiver communication event record comprising an event type of GPS_GET_START, the UOE identifier of the IMS application, the received token (MsgID, CorrellID) and timestamp to the managing server. Since the request message does not come from IMS, the IMS application considers the token for that request message to be (MsgID, CorrellID). Because the messaging is asynchronous, the collector associated with the J2EE process sends an originator communication event record comprising an event type of GPS_PUT_END, the hosting thread identifier of the J2EE process, the token (MsgID, CorrellID), and timestamp to the managing server in response to the PUT API returning control to the J2EE process.
  • the collector associated with the IMS application sends a receiver communication event record comprising a GPS_GET_END event type, the IMS application identifier, the received token (MsgID, CorrellID) and a timestamp to the managing server upon returning control from the GET API to the IMS application.
  • the IMS application processes a transaction associated with the request message.
  • the request message specified that a response message is to be returned to the J2EE process.
  • the IMS application sends a response message using a PUT API to the J2EE process using the MQ-IMS bridge.
  • the PUT API is trapped and the collector associated with the IMS application is invoked.
  • the collector generates a token (CorrellID, Msgtype) to avoid ambiguity between the token of the request message.
  • the collector associated with the IMS application sends an originator communication event record comprising an event type of GPS_PUT_START, the IMS region identifier, the token (CorrellID, Msgtype) and timestamp to the managing server.
  • the IMS application sends the response message to the J2EE application through the IMS bridge.
  • the J2EE process is waiting for a response from the IMS application.
  • the collector associated with the J2EE process sends an receiver communication event record comprising an event type of GPS_RECEIVE_START, the hosting thread identifier of the J2EE process, the received token (CorrellID, Msgtype) and timestamp to the managing server.
  • the collectors associated with the receiving and originating UOEs send communication event records comprising event types of GPS_GET_END and GPS PUT_END to the managing server, respectively. In this way, the communication event records for the request and reply messages can be distinguished.
  • FIG. 17 comprises FIGS. 17A, 17B and 17 C which collectively depict a graphical user interface, generated by the GPS, which illustrates an exemplary trace of the processing of an exemplary transaction across three units of execution in different application environments.
  • the graphical user interface of FIG. 17 is displayed in step 196 of FIG. 13 .
  • the graphical user interface 250 depicts an exemplary trace 252 of a first unit of execution 254 in a first application environment 256 .
  • the first unit of execution 252 is a Java thread, in this example a servlet, and the first application environment is a Java process.
  • the name of the first application environment 256 is “ADCDPL.M2L2.M212 servqa.76.”
  • the event data 258 indicates that the name of the first unit of execution 254 is “/CTGTesterEC1Web/CTGTesterECIServlet”, at a depth 260 of zero with an event type 262 of “servlet entry”.
  • the depth 260 indicates the level of a call. For example, a depth of one with an event type of “Method Entry” indicates that the first UOE named “/CTGTesterECIWeb/CTGTesterECIServlet” called method “itso/cics/etci/testereci/CTGTesterECIServlet.doPost”.
  • An originating arrow 270 indicates that the servlet 254 has invoked a second unit of execution in a CICS application server which is a second application environment.
  • the originating arrow 270 indicates that the first UOE is correlated with the second UOE.
  • the originating arrow points to the right and indicates that the communication event record associated with the communication has an event type of start and indicates that the communication is an invocation.
  • the GPS correlated the first unit of execution 254 named “/CTGTesterECIWeb/CTGTesterECIServlet” in a first application environment named “ADCDPL.M2L2.M212 servqa.76” 256 with the second UOE named “CIC23QA1.DPLCIC1A” in a second application environment named “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” 272 based on the token as described above.
  • the uniform resource indicator (URI) 275 within the arrow 254 provides information naming the second application environment, the application server, and the type of event, in this example, an invoke. Clicking on the URI 256 causes a trace of the invoked UOE outside the current application environment, that is, the second UOE, to be displayed.
  • URI uniform resource indicator
  • the elapsed times are equal to zero because the events occurred within one millisecond of each other and the timestamp granularity of the managing server is one millisecond.
  • the elapsed time between the servlet entry of the “/CTGTesterECIWeb/CTGTesterECIServlet” servlet and the method entry of the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is less than a millisecond; therefore, the elapsed time associated with the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is shown as zero.
  • the CPU time represents the amount of time used by the CPU in processing at a depth before proceeding to another depth.
  • the amount of CPU time used by “/CTGTesterECIWeb/CTGTesterECIServlet” servlet at depth 0 prior to calling the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is less than a millisecond; therefore, the CPU time associated with the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” servlet at depth 0 is shown as zero.
  • queue names match 273 is part of the page caption and indicates whether the names of the put and get queues match if box 274 is checked. If the names of the put and get queues do not match, then the box 276 associated with the “queues do not match” caption 277 is checked.
  • FIG. 17B depicts a graphical user interface 280 illustrating a trace 282 of the processing performed in the CICS region in response to the invocation from the first UOE of FIG. 17A .
  • a receiving arrow 284 contains a URI which, when clicked on, causes the trace of FIG. 17A to be displayed. The receiving arrow points to the left and indicates that the communication event record associated with the receiving UOE has an event type of start. By clicking on the URI in an originating or receiving arrow, a user can graphically follow the trace of various units of execution across different application environments.
  • FIG. 17B depicts a graphical user interface 280 illustrating a trace 282 of the processing performed in the CICS region in response to the invocation from the first UOE of FIG. 17A .
  • a receiving arrow 284 contains a URI which, when clicked on, causes the trace of FIG. 17A to be displayed. The receiving arrow points to the left and indicates that the communication event record associated with the receiving UOE has an event type of start.
  • the trace 282 is of the second UOE, named “CIC23QA1.DPLCIC1A” 286 , in the second application environment, named “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” 288 .
  • An originating arrow 290 indicates that the second UOE named “CIC23QA1.DPLCIC1A” in the “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” application environment invokes a third UOE named “CIC23QA2.DPLCIC2A” in a third application environment, which is a CICS region named “ADCDPL.M2L2.M2L2.CIC23QA2.bc3”.
  • FIG. 17C is a graphical user interface 300 which depicts a trace 302 of the processing performed in the third application environment, that is, another CICS region, in response to the invocation from the second UOE of FIG. 17B .
  • the receiving arrow 304 contains a URI which, when clicked on, causes the trace of the second UOE of FIG. 17B to be displayed.
  • the third UOE 306 is named “CIC23QA2.DPLCIC2A” and is in a third application environment, that is, a CICS region, named “ADCDPL.M2L2.M2L2.CIC23QA2.bc3” 308 .
  • FIG. 17 illustrates synchronous communication. However, if, in FIG. 17A , an asynchronous call was made from the servlet, that is, the first unit of execution in FIG. 17A , the first originating arrow 270 ( FIG. 17A ) is displayed, and a receiving arrow back to the first unit of execution under the first originating arrow 270 , with the same contents as the originating arrow, is also displayed to indicate the return from the PUT API.
  • the receiving arrow is displayed even though the third unit of execution is in a “hang” state, because the first unit of execution is not waiting for the second unit of execution or the third unit of execution to complete.
  • a receiving arrow is displayed in a graphical user interface which displays a trace of processing of the receiving UOE, and an originating arrow is displayed in the graphical user interface which displays a trace of the processing of the originating UOE.
  • FIG. 18 depicts an embodiment of an illustrative computer system 360 which uses various embodiments of the present invention.
  • the computer system 360 comprises a processor 362 , display 364 , input interfaces (I/F) 366 , communications interface 368 , memory 370 and output interface(s) 372 , all conventionally coupled by one or more buses 374 .
  • the input interfaces 366 comprise a keyboard 376 and a mouse 378 .
  • the output interface 372 comprises a printer 380 .
  • the communications interface 368 is a network interface (NI) that allows the computer 360 to communicate via the network 382 .
  • the communications interface 368 may be coupled to the network 382 via a transmission medium 384 such as a network transmission line, for example twisted pair, coaxial cable or fiber optic cable.
  • the communications interface 368 provides a wireless interface, that is, the communications interface 368 uses a wireless transmission medium.
  • the memory 370 generally comprises different modalities, illustratively semiconductor memory, such as random access memory (RAM), and disk drives.
  • the memory 370 stores an operating system 388 and the managing server 20 which comprises the GPS 80 , an application environment 400 and associated collector 402 .
  • Computer systems 390 and 392 are coupled to the network 382 via transmission mediums 394 and 396 , respectively.
  • Each computer system 390 and 392 comprises an application environment 32 and 36 and an associated collector 62 and 66 , respectively.
  • the application environments 32 and 36 and their associated collectors 62 and 66 are stored in a memory on computer systems 390 and 392 , respectively.
  • the specific software instructions, data structures and data that implement various embodiments of the present invention are typically incorporated in the managing server 20 and collectors 62 , 66 and 402 .
  • an embodiment of the present invention is tangibly embodied in a computer-readable medium, for example, the memory 370 , and is comprised of instructions which, when executed by the processor 362 , cause the computer system 360 to utilize the present invention.
  • the memory 370 may store the software instructions, data structures and data for any of the operating system 388 , managing server 20 , application environment 400 and collector 402 in semiconductor memory, in disk memory, or a combination thereof. Other computer memory devices presently known or that become known in the future, or combination thereof, may be used for memory 370 .
  • the operating system 388 may be implemented by any conventional operating system such as the AIX® (Registered Trademark of International Business Machines Corporation), UNIX, Windows® (Registered Trademark of Microsoft Corporation), Linux® (Registered trademark of Linus Torvalds), Solaris® (Registered trademark of Sun Microsystems Inc.), HP-UX® (Registered trademark of Hewlett-Packard Development Company, L.P.), z/OS and MVS operating systems.
  • AIX® Registered Trademark of International Business Machines Corporation
  • Windows® Registered Trademark of Microsoft Corporation
  • Linux® Registered trademark of Linus Torvalds
  • Solaris® Registered trademark of Sun Microsystems Inc.
  • HP-UX® Registered trademark of Hewlett-Packard Development Company, L.P.
  • z/OS and MVS operating systems such as the AIX® (Registered Trademark of International Business Machines Corporation), UNIX, Windows® (Registered Trademark of Microsoft Corporation), Linux® (Registered trademark of Linus Torvalds), Solaris®
  • the present invention may be implemented as a method, computer system, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof.
  • article of manufacture (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier or media.
  • the software in which various embodiments are implemented may be accessible through the transmission medium, for example, from a server over the network.
  • the article of manufacture in which the code is implemented also encompasses transmission media, such as the network transmission line and wireless transmission media.
  • the article of manufacture also comprises the medium in which the code is embedded.
  • FIG. 18 The exemplary computer system illustrated in FIG. 18 is not intended to limit the present invention. Other alternative hardware environments may be used without departing from the scope of the present invention.

Abstract

Various embodiments of a method, system and article of manufacture track the processing of a transaction. A managing server receives an originator communication event record from a first collector associated with a first application environment having a first unit of execution. The first communication event record is associated with a first unit of execution identifier and a first token. The managing server receives a second communication event record from a second collector associated with a second application environment having a second unit of execution. The second communication event record is associated with a second unit of execution identifier and a second token. The managing server determines whether the first unit of execution and the second unit of execution are associated with processing a same transaction based on the first token and the second token.

Description

    BACKGROUND OF THE INVENTION
  • 1.0 Field of the Invention
  • This invention relates to tracking transactions; and in particular, to tracking individual transactions as they are processed across various application environments.
  • 2.0 Description of the Related Art
  • With the advent of the Internet and Web computing, enterprises have had to expand their information technology (IT) to a more distributed environment, while keeping most of their business logic in a traditional mainframe environment using legacy software systems. Exemplary legacy software systems comprise IBM® (Registered trademark of International Business Machines Corporation) Customer Information Control System (CICS® (Registered trademark of International Business Machines Corporation)), IBM Information Management System (IMS™ (Trademark of International Business Machines Corporation)), and DB2® (Registered trademark of International Business Machines Corporation). The distributed environment has increased the need for software systems such as Web servers and application servers, for example, Java® 2 Platform Enterprise Edition (J2EE® (Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both)) servers, to satisfy on-line access through the World Wide Web. However, transactions are still processed through the legacy software systems, using synchronous gateways or asynchronous messaging systems such as IBM WebSphere® (Registered trademark of International Business Machines Corporation) MQSeries® (Registered trademark of International Business Machines Corporation). A legacy software system is a non-J2EE software system. As a result, the processing of a business transaction is rarely confined to one application server or system. The processing of the business transaction typically flows from a Web server to an application server all the way to the legacy software system and back. In addition, the advent of the Internet has greatly increased the volume of such transactions twenty-four hours a day, seven days a week. IT organizations need to provide an acceptable end-to-end response time for processing transactions. Therefore, there is a need for IT organizations to track the processing of transactions should problems such as bottlenecks, deadlocks and hangs occur.
  • Traditional solutions have typically consisted of separately monitoring a software system either from the resource point-of-view or from the application point-of-view to provide information regarding the behavior of transactions while the transactions are being processed by that software system. Monitoring from the resource point-of-view comprises monitoring the memory utilization, central processing unit (CPU) time, and connection pools of the software system. Monitoring from the application point-of-view comprises monitoring transaction performance metrics, such as response time, or tracing the execution of a single instance.
  • Some conventional monitors only have a view of the specific software system that they are monitoring and are not able to correlate the processing across various software systems. A servlet is a Java program for providing additional features to a Web server and can be used to access existing business systems. One conventional J2EE monitor is able to identify the servlets which have requested external services from CICS. Another conventional CICS monitor is able to detect activities in CICS. However, neither the J2EE monitor nor the CICS monitor is able to associate any servlet with any CICS tasks that the servlet has invoked or sent messages to. When a problem occurs, it becomes difficult, if not impossible, to identify the problem or know what action to take in order correct the problem. Therefore there is a need for an improved technique which allows the processing of transactions to be tracked across various software systems.
  • SUMMARY OF THE INVENTION
  • To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, various embodiments of a method, system and article of manufacture which track the processing of a transaction are provided. A managing server receives an originator communication event record from a first collector associated with a first application environment having a first unit of execution. The first communication event record comprises a first unit of execution identifier and a first token. The managing server receives a second communication event record from a second collector associated with a second application environment having a second unit of execution. The second communication event record comprises a second unit of execution identifier and a second token. The managing server determines whether the first unit of execution and the second unit of execution are associated with processing a transaction based on the first token and the second token. In some embodiments, the managing server determines that the first unit of execution and the second unit of execution are associated with the processing of the same transaction in response to the first token matching the second token.
  • In this way, the processing of transactions can be tracked across various units of execution in different application environments, and therefore, the processing of transactions can be tracked across various software systems.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The teachings of the present invention can be readily understood by considering the following description in conjunction with the accompanying drawings, in which:
  • FIG. 1 depicts a diagram illustrating a managing server and application environments;
  • FIG. 2 depicts an embodiment of a unit of execution (UOE) tag comprising a UOE identifier and a timestamp;
  • FIG. 3A depicts a diagram of an embodiment of a UOE tag comprising a hosting thread identifier as the UOE identifier, and a timestamp;
  • FIG. 3B depicts a diagram of another embodiment of a UOE tag comprising a task control area number as the UOE identifier, and a timestamp;
  • FIG. 4 depicts a diagram of an embodiment of a native token;
  • FIG. 5 depicts a diagram of an embodiment of a guest token;
  • FIG. 6 depicts a diagram of another embodiment of a guest token;
  • FIG. 7 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to an attempt to communicate with a receiving UOE in a receiving application environment;
  • FIG. 8 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with a receiving UOE in a receiving application environment in response to receiving a communication from an originating UOE in an originating application environment;
  • FIG. 9 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with the receiving application environment in response to the receiving UOE attempting to send a communication which indicates that the receiving UOE is suspending or stopping execution;
  • FIG. 10 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to receiving a communication that indicates that the receiving UOE is suspending or stopping execution;
  • FIG. 11 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to an asynchronous sending of a message using a message queue;
  • FIG. 12 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector associated with a receiving application environment in response to the asynchronous receiving of a message from a message queue;
  • FIG. 13 depicts a flowchart of an embodiment of the correlation of receiver and originator communication event records by a managing server;
  • FIG. 14 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using synchronous communication;
  • FIG. 15 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using non-message driven asynchronous and synchronous communication;
  • FIG. 16 depicts a sequence diagram illustrating an embodiment of tracking the processing of a transaction across application environments using message driven asynchronous communication;
  • FIG. 17 comprises FIGS. 17A, 17B and 17C which collectively depict an embodiment of a graphical user interface, generated by a global publishing server, which illustrates an exemplary trace of the processing of a transaction across various units of execution in different application environments; and
  • FIG. 18 depicts an illustrative computer system which uses various embodiments of the present invention.
  • To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to some of the figures.
  • DETAILED DESCRIPTION
  • After considering the following description, those skilled in the art will clearly realize that the teachings of the various embodiments of the present invention can be utilized to track the processing of a transaction. A managing server receives an originator communication event record from a first collector associated with a first application environment having a first unit of execution. The first communication event record comprises a first unit of execution identifier and a first token. The managing server receives a second communication event record from a second collector associated with a second application environment having a second unit of execution. The second communication event record comprises a second unit of execution identifier and a second token. The managing server determines whether the first unit of execution and the second unit of execution are associated with processing the same transaction based on the first token and the second token. In some embodiments, the managing server determines that the first unit of execution and the second unit of execution are associated with the processing of the same transaction when the first token matches the second token.
  • FIG. 1 depicts a diagram illustrating a managing server 20 and application environments (AE) 32, 34 and 36. The managing server 24 is in computer system 22. Application environments 32 and 34 are in another computer system 24. Application environment 36 is in yet another computer system 26. In some embodiments, the managing server 20 also has at least one application environment. An “application environment” is a software environment in which applications are executed. In various embodiments, a “region” is an address space, that is, a portion of memory. In some embodiments, a “region” is a process, for example, a Unix (Unix is a registered trademark of the Open Group in the United States and other countries) process. In various embodiments, an application environment 32 and 34 comprises a single region 38 and 39, respectively. In some embodiments, an application environment 36 comprises a plurality of regions 40 and 41. An application environment 32, 34 and 36 is associated with a collector 62, 64 and 66 which monitors the application environment 32, 34 and 36, respectively.
  • Examples of a single region application environment 38 and 39 include, and are not limited to, a CICS region and a distributed J2EE application server. A CICS region is an area of memory of the computer system in which CICS system programs have been loaded (and executed), with other memory allocated for the CICS region to use. The CICS region comprises a named collection of resources controlled by CICS as a unit. The resources in a CICS region comprise programs, Basic Mapping Support map sets, transactions, terminals, files, transient data queues, temporary storage queues and journals. In the distributed J2EE application server environment, also known as the application server instance, the application environment comprises one address space (or process or Java Virtual Machine (JVM)).
  • In another example, in some embodiments, an application environment comprises a plurality of regions. Examples of multi-region application environments include, and are not limited to, an IBM WebSphere Application Server (WAS/z) and IMS. In the WAS/z case, one application server instance has one control region and one or more JVMs, each JVM occupying one servant region. In another example, one IMS application environment has one control region and one or more dependent regions, where the IMS applications are executed. In the WAS/z case a single collector is associated with the servant regions of the application environment; and, the control region is not associated with a collector. On the other hand, in the IMS case a single collector is associated with the control region; and, the dependent regions report to that collector via MVS® (Registered Trademark of International Business Machines Corporation) operating system cross memory-services.
  • A region 38, 39, 40 and 41 comprises at least one unit of execution (UOE) 42-44, 46-48, 50-52, and 54-56, respectively. In general, a unit of execution is a group of instructions which are executed as a unit, and have a beginning and an end. A UOE has a host mechanism for execution and a unique existence in time, for example, an instance. In various embodiments, the host mechanism for execution is a process, a thread, an operating system task control block (TCB) (MVS operating system, z/OS® (Registered Trademark of International Business Machines Corporation) operating system), a task control area (TCA) (CICS) or task (MVS operating system, z/OS operating system, CICS, IMS).
  • In various embodiments, a transaction is a set of input data and output data with a beginning and an end point in time, originated by a request and terminated when a response is returned to that request. The request can be a message or an invocation, depending on the embodiment. A transaction is executed in one or more application environments. A transaction which is executed in a single application environment is referred to as a local transaction (“local” to that particular application environment). A transaction that is executed in multiple application environments is referred to as a composite transaction. Therefore a composite transaction is composed of a plurality of local transactions. A composite transaction may also be referred to as a business transaction.
  • In general, a UOE executes in an application environment, and hosts a local transaction in that application environment. In various embodiments, the local transaction is executed as a sequence of one or more programs (CICS), methods (Java), functions (C/C++), or subroutines (COBOL, PL/I) in the application environment. In some embodiments, a UOE hosts one local transaction. In other embodiments, a UOE hosts more than one local transaction, for example, a server (as in the client-server architecture). In various embodiments, a server UOE is a long executing task which “serves” multiple external requests, each request resulting in a single local transaction; in these embodiments, an external request is from a different application environment from the application environment in which the server UOE is executing. An internal request is originated from the same application environment as the server UOE. The server UOE exists, that is, is executing, before the initiation of each local transaction that the server UOE hosts and exists after the completion of each local transaction that the server UOE hosts. If a UOE does not exist prior to and after completion of the local transaction, then the UOE hosts a single transaction.
  • In various embodiments, a UOE comprises a set of one or more programs, subroutines, functions or methods, which host one or more transactions. In some embodiments, the host mechanism for execution of a UOE is a thread. A thread is either in an active state or a “dormant” state and is identified by a thread identifier (id). A thread remains “dormant” in a thread pool in a process until the thread is associated with a UOE, in which case the thread becomes an active thread hosting a UOE. When the UOE terminates, the thread is no longer active and is returned to the thread pool and remains in the thread pool under the same thread id, until the thread is associated with another UOE. The UOE hosts transactions, whereas the thread is the software mechanism under which programs are executed. Hence, an executing thread “hosts” a UOE (or is referred to as being associated with a UOE). In other embodiments, the host mechanism for execution is a TCB, TCA or task, rather than a thread. However, the host mechanism for execution is not meant to be limited to a thread, TCB, TCA or task; and the invention will work with other embodiments of a host mechanism for execution.
  • Therefore, an application environment comprises one or more regions. In various embodiments, a region is a host to one or more threads or tasks or TCBs or TCAs, which typically remain in a pool ready to be associated with a UOE. A UOE executes in a region as an active thread, task, TCB, or TCA, depending on the embodiment. In order to execute, a UOE is associated with an active thread, task, TCB, or TCA, depending on the embodiment, which is said to host the UOE. In various embodiments, a UOE hosts one or more transactions. During its lifetime, the UOE can host one transaction, or the UOE can host more than one transaction.
  • In some embodiments, during execution, a UOE can originate or instantiate zero or more transactions. The transactions may be local or composite transactions. In various embodiments, a unit of execution may cause one or more other units of execution in other application environments to be executed.
  • In the MVS and z/OS operating systems, a TCB represents an operating system task, and there is at least one TCB per address space (the main TCB).
  • A CICS region is an address space, that is, an application environment, with several TCB's. One specific TCB will execute the client requests which will take turns using that TCB in a round robin fashion. Each of these client requests, which are also referred to as CICS transactions, is identified by a CICS task number (not an operating system task), for which the information is to be found in the task control area (TCA). A CICS task is also referred to as a TCA, the same way as an MVS or z/OS operating system task is also referred to as a TCB. In various embodiments, a CICS transaction is identified by its task number, that is, its TCA number.
  • An IMS transaction is typically a local transaction which comprises a group of TCBs in different address spaces in a single IMS region.
  • In some embodiments, a Unix process is a UOE of an application environment which contains multiple UOEs; or alternately, a Unix process can be a single UOE of an application environment. In various embodiments, multiple transactions can be performed by the same thread, and each performance of the transaction by that thread is a separate unit of execution.
  • An application environment 32, 34 and 36 is typically monitored by an associated collector 62, 64 and 66, respectively. The collector 62, 64 and 66 gathers data about the units of execution 42 and 44, 46 and 48, 50 and 52, 54 and 56 of its associated application environment 32, 34, 36 and 38, respectively, and publishes data comprising communication event records as indicated by arrows 67, 68 and 69, to the managing server 20. The information gathered by the collector 62, 64 and 66 is used to provide a trace of the processing of a transaction within an application environment. Whenever a unit of execution inside a monitored application environment requests an external service from another unit of execution in a different application environment, the processing is said to leave the application environment.
  • In various embodiments, the processing of individual transactions is tracked across units of execution in different application environments 32, 34 and 36 using tokens. In some embodiments, a “composite” trace of the processing associated with a transaction is provided across the various application environments. For example, in various embodiments, using a graphical user interface, a user can view a method trace of a servlet within a J2EE container, see that the servlet made a request to a CICS region, switch to view a trace of the processing associated with that request in the CICS region where a CICS transaction or task is executed on its behalf, and follow a program trace of the CICS transaction. At this point the CICS transaction could send an MQ Series message to IMS through an MQ-IMS bridge, which invokes an IMS transaction which can be tracked in the same context as the servlet and the CICS transaction. In various embodiments, using the tokens, an end-to-end view of the processing of transactions across various application environments is provided with the ability to drill down to view the processing inside the various monitored application environments. Therefore, the processing related to a transaction can be viewed in the same context across different application environments in a computing network.
  • In some embodiments, the collector 62, 64 and 66, is implemented in an application management system (AMS) 72, 74 and 76, respectively, for example, WebSphere Studio Application Monitor (WSAM) or Tivoli® (Registered trademark of International Business Machines Corporation) Monitoring for Transaction Performance (TMTP). However, the application management system is not meant to be limited to WSAM or Tivoli TMTP, and other application management systems may be used.
  • In various embodiments, a UOE has a UOE identifier. In some embodiments, the UOE identifier is unique within an application environment. A thread is associated with a thread identifier; a TCA is associated with a TCA number; and a TCB is associated with a TCB number. In various embodiments, the UOE identifier is a thread identifier, a TCA number or a TCB number.
  • FIG. 2 depicts an embodiment of a UOE tag 82 which comprises a UOE identifier 84 and a timestamp (Timestamp) 86. FIG. 3A depicts an embodiment of a UOE tag 90 comprising a hosting thread identifier 92 as the UOE identifier, and a timestamp (Timestamp) 94. FIG. 3B depicts another embodiment of a UOE tag 96 which comprises a TCA number 98 as the UOE identifier, and a timestamp 100. In another embodiment, a TCB number is used as the UOE identifier instead of a TCA number. In some embodiments thread identifiers, TCA numbers and TCB numbers are reusable; therefore, a UOE identifier of an application environment may not be unique for that application environment. However, the thread identifiers, TCA numbers and TCB numbers are unique within an application environment for a sufficient duration of time so that, when used as a UOE identifier, their associated threads, TCAs, and TCBs, respectively, can be correctly identified.
  • Referring back to FIG. 1, the managing server 20 communicates with and manages the collectors. The managing server 20 stores communication event records in addition to other information. In the managing server 20, a global publishing server (GPS) 80 correlates the processing of transactions across application environments 32, 34 and 36, respectively, based on the communication event records. Correlating the processing of transactions across application environments refers to associating the UOEs with each other based on their communications, either through invocation (synchronous or asynchronous) or through messaging. To correlate the processing of transactions across UOEs in different application environments, a token is generated. The token is sent from the originating UOE to the receiving UOE with the communication. The token is also sent to the managing server as part of a communication event record. In some embodiments, each token which is generated by a collector is distinct. In other embodiments, the tokens are distinct for a sufficient period of time so that the managing server 20, in particular, the GPS 80, can correctly correlate the processing of the transaction across the UOEs in different application environments. In various embodiments, the collectors send a communication event record comprising the token, a UOE identifier and timestamp, or UOE tag, to the managing server to notify the managing server of the attempt to communicate.
  • In various embodiments, to track composite transactions, a token is generated and exchanged between the originating UOE and the receiving UOE. Depending on the nature of the interaction, tokens are either generated by the collector using fields which are managed by that collector or generated using information from fields which are not managed by the collector. In some embodiments, the term “native token” refers to a token which is generated by the collector using fields which are managed by that collector. In other embodiments, the term “guest token” refers to a token which is generated by the collector using information from fields which are not managed by that collector, for example, using information from the communications interface structure which is managed by other applications. In some embodiments, if there is no available field in the communication interface structure which can be used to host a native token, a guest token is derived from fields in the communications interface structure the combination of which is “reasonably” unique. In other words, the guest token is sufficiently unique so that the associated UOEs and application environments can be correctly correlated. In some embodiments, the guest token allows the associated UOEs and application environments to be correctly correlated in excess of a desired probability.
  • FIG. 4 depicts an embodiment of a native token 102. The native token 102 has an application environment identifier 104 and a trip counter 106. In various embodiments, the native token 102 has a predetermined length. In some embodiments, the predetermined length is four bytes; however, the predetermined length is not meant to be limited to four bytes and other numbers of bytes may be used. In various embodiments, the native token 102 contains binary (non character) data. The application environment identifier 104 uniquely identifies the application environment originating a request. In various embodiments, the application environment identifier for each application environment associated with a managing server is distinct. In some embodiments, the application environment identifier 104 comprises the first n most significant bits of the token 102. The number of bits n is a configurable value and depends on the site transaction volume and the number of collectors managed by the managing server. For example, if n is equal to ten, there can be up to 1,024 collectors; if n is equal to eleven, the number of collectors is doubled to 2,048. The remaining bits (32-n) are used as the trip counter 106. In response to any unit of execution in an application environment making a request to leave that application environment, such as an invoke, the trip counter 106 is incremented by one. For example, if a request is made by a thread to leave its region, the trip counter 106 is incremented by one. If n is equal to ten, the trip counter 106 has a maximum value of 4,194,304 before wraparound. The managing server maintains a list which associates the application environment identifiers with their respective application environment names, and in some embodiments, other associated information. In some embodiments, in which an application environment comprises multiple regions, and a plurality of collectors are associated with a plurality of regions, the collectors associated with those regions use a single application environment identifier, typically stored in shared memory, which is used to represent all the regions, and the collectors use a single trip counter, which is also stored in shared memory.
  • For example, in various embodiments, non-message queue based communication uses native tokens 102 for both synchronous and asynchronous communication.
  • FIG. 5 depicts an embodiment of a guest token 110. In various embodiments, the guest token 110 comprises a message identifier (MsgId) 112 and a correlation identifier (CorrelId) 114. In some embodiments, guest tokens 110 are used for messaging system, that is, message queue, based interactions between application environments. In various embodiments, the messaging system is Websphere MQ Series; however, in other embodiments, other messaging systems may be used. In some embodiments, a guest token 110 has the following properties: the guest token 110 is unique within the application environment monitored by the collector to avoid collisions within the application environment; the guest token 110 has a length that is greater than the predetermined length of the native token to avoid collisions with native tokens; the guest token 110 remains with the message between putting the message on a message queue and retrieving the message from the message queue; and the guest token 100 contains binary data not subject to changes or conversion. In some embodiments, the guest token 110 has a length that is less than the predetermined length of the native token.
  • In various embodiments, the message identifier 112 is a byte string that is used to distinguish one message from another message. Typically, each message has a different message identifier 112. In some embodiments, the message identifier 112 is generated by the queue manager of the messaging system; and in other embodiments, the message identifier 112 is generated by the application or system.
  • In some embodiments, a correlation identifier 114 is a byte string that an application can use to relate one message to another message, or to relate the message to other work that the application is performing. The correlation identifier 114 is either not generated and a value of (24ב00’) is used, or alternately, the correlation identifier 114 is generated by the queue manager, or in some embodiments, the application.
  • The messaging system sends the message identifier 112 and correlation identifier 114 with the message. Therefore, in this embodiment, the collector does not modify any information in the message header. After executing instructions to place a message in the message queue such as MQPUT or MQPUT1, or instructions to retrieve a message such as MQGET, a message queue message descriptor, for example, an MQSeries message descriptor (MQMD), is available with the PUT-message options (MQPMO) or the GET-message options (MQGMO). In various embodiments, the message identifier 112 and correlation identifier 114 are available in the PUT-message options or the GET-message options which are associated with a message.
  • FIG. 6 depicts another embodiment of a guest token 120. In this embodiment, the guest token 120 comprises the correlation identifier 114 and message type 122. This embodiment of a guest token 120 is used when a communication is a response message from an MQ-IMS bridge. The message type 122 is typically set by the application and indicates whether the message is a reply to a prior message.
  • The following pseudo-code illustrates the generation of the guest tokens described in FIGS. 5 and 6 by a collector.
    If (PutApplType=MQAT_IMS_BRIDGE or
    PutApplType=MQAT_XCF)
    and (MsgType = MQMT_REPLY)
    TOKEN = CorrelId || MsgType
    TOKEN LENGTH = MQ_CORREL_ID_LENGTH + 4
    Else
    TOKEN = MsgID || CorrelId
    TOKEN LENGTH = MsgID_LENGTH + CorrelID_LENGTH
  • For example, when a J2EE application is initiating an IMS transaction through IMS Connect (via IMS Connect for Java (IC4J)), a native token is used. If this J2EE application was to use MQSeries through the MQ-IMS Bridge, a guest token is used. For a reply message, the guest token is derived from the CorrelId and MsgType fields in the MQSeries message descriptor and has a predetermined TOKEN LENGTH, which in some embodiments, is twenty-eight bytes. Otherwise, the guest token is derived from the MsgID and CorrelId fields in the MQSeries message descriptor and has a predetermined TOKEN LENGTH, which in some embodiments, is forty-eight bytes. However, the TOKEN LENGTH is not meant to be limited to twenty-eight or forty-eight bytes, and in other embodiments, other values for the TOKEN LENGTH may be used.
  • The collector communicates with the managing server according to a communication protocol comprising communication event records. The collector sends communication event records to the managing server. In various embodiments, a communication event record comprises an event type, a UOE identifier and a token, and in some embodiments, a timestamp. An originator communication event record is a communication event record which is sent by the originating UOE to the managing server. A receiver communication event record is a communication event record which is sent by the receiving UOE to the managing server. In various embodiments, the originator communication event record comprises an originator event type, an originating UOE identifier, a token, and, in some embodiments, a timestamp. Originator event types comprise GPS_INVOKE_START, GPS_PUT_START, GPS_INVOKE_END and GPS_PUT_END event records. A receiver communication event record comprises a receiver event type, a receiving UOE identifier, a token, and, in some embodiments, a timestamp. Receiver event types comprise GPS_RECEIVE_START, GPS_RECEIVE_END, GPS_GET_START and GPS_GET_END.
  • The event types may also be classified as start event types and end event types. Start event types comprise GPS_INVOKE_START, GPS_PUT_START, GPS_RECEIVE_START and GPS_GET_START. End event types comprise GPS_INVOKE_END, GPS_RECEIVE_END, GPS_PUT_END and GPS_GET_END.
  • In addition the event types may be classified as message-based and non-message based. The message-based event types indicate that a messaging system is used to send the communication. The message-based event types comprise GPS_PUT_START, GPS_PUT_END, GPS_GET_START and GPS_GET_END. The non-message-based event types indicate that a communication is not sent by a messaging system, for example, the communication may be sent through invocation (synchronous or asynchronous). The non-message-based event types comprise GPS_INVOKE_START, GPS_INVOKE_END, GPS_RECEIVE_START and GPS_RECEIVE_END.
  • In various embodiments, traps are configured to transfer control to the collector associated with an application environment in response to a unit of execution of that application environment attempting to communicate with another application environment, for example, by invocation or by sending a message. Traps are also configured to transfer control to the collector associated with an application environment in response to a unit of execution of that application environment receiving a communication from another application environment, for example, by returning from an invocation or by receiving a message. In some embodiments, traps are configured to transfer control to the collector associated with an application environment in response to returning from a call to a communication application programming interface (API). In addition, at initialization, in some embodiments, a trip counter in a collector is set to zero, or alternately, the trip counter in a collector is set equal to one. In various embodiments, the first, that is, initial, value of the token cannot be equal to zero.
  • In some embodiments, the collector associated with the application environment containing an originating UOE sends an originator communication event record comprising a GPS_INVOKE_START event type, the originating UOE identifier, a token and a timestamp, to the managing server in response to trapping a CICS or IMS request which is to be sent to a receiving UOE. The collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_RECEIVE_START, a receiving UOE identifier, the received token and a timestamp, to the managing server in response to trapping the receipt of the request from the originating UOE. The receiving UOE processes the request. The request comprises the token. In various embodiments, in response to trapping the suspension or stopping of the processing at the receiving UOE to return control to the originating UOE, the collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_RECEIVE_END, the receiving UOE identifier, the token that was received in the request and a timestamp, to the managing server. The receiving UOE returns control to the originating UOE by sending a communication to the originating UOE with the token that was received in the request. In response to trapping the receipt of the communication from the receiving UOE which indicates that the execution of the request by the receiving UOE was stopped or suspended, the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_INVOKE_END, the originating UOE identifier, the token that was passed in the communication from the receiving UOE and a timestamp, to the managing server, and control is returned to the originating UOE.
  • In other embodiments, the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_PUT_START, the originating UOE identifier, a token and timestamp, to the managing server in response to sending a message using a message queue of a messaging system by, for example, issuing a PUT request or PUT API. The collector associated with the application environment containing the receiving UOE sends a communication event record comprising an event type of GPS_GET_START, the receiving UOE identifier, the received token and a timestamp, to the managing server in response to retrieving the message from the message queue. In various embodiments, a GET request or GET API is used to retrieve a message. In some embodiments, the receiver communication event record also indicates whether the GET request or API is destructive, for example, a “read” from a queue, or non-destructive, for example, a “browse” of the queue. Several units of execution in different regions can issue a browse against the same message in the queue, and those UOEs will share the same token. The receiving UOE performs the request. The collector associated with the application environment containing the receiving UOE sends a receiver communication event record comprising an event type of GPS_GET_END, the receiving UOE identifier, the received token and a timestamp to the managing server after regaining control from the GET request or API which retrieved the message from the message queue. Meanwhile, the collector associated with the application environment containing the originating UOE sends an originator communication event record comprising an event type of GPS_PUT_END, the originating UOE identifier, the token used in the communication event record having an event type of GPS_PUT_START and a timestamp, to the managing server after the UOE regains control from the PUT API or request to put a message on the message queue. Therefore, the originating UOE sends the originator communication event record having an event type of GPS_PUT_END asynchronously with respect to the receiving UOE.
  • FIG. 7 depicts a flowchart of an embodiment of the sending of an originator communication event record by a collector at an originating application environment in response to an attempt to communicate with a receiving UOE in a receiving application environment. A communication API is typically invoked to send the communication from the originating UOE to the receiving UOE. In step 132, in response to a UOE of the originating application environment attempting to communicate with a receiving UOE in a receiving application environment, the attempt to communicate is trapped and the collector associated with the originating application environment is activated or invoked. The receiving application environment is different from the originating application environment.
  • In step 134, the collector generates a token. In some embodiments, the token contains the application environment identifier of the originating application environment, and the value of the trip counter in the collector is incremented by one and stored in the token. In an alternate embodiment, the token is derived from environment variables, such as a message identifier and correlation identifier as described above. The token is hosted by, that is, contained in, a communication structure which depends on the nature of the communication. For example, in a request for a CICS service, the token is hosted, that is, stored, in the COMMAREA; in MQSeries, the token is part of the MQSeries message descriptor; and if IMS is the target of the request, the token is hosted by the Open Transaction Manager Access (OTMA) prefix user data.
  • In step 136, the collector sends an originator communication event record to the managing server. The originator communication event record has an event type of GPS_INVOKE_START or GPS_PUT_START, the UOE identifier of the originating UOE, the token and a timestamp. In some embodiments, the timestamp indicates when the request or message was sent by the UOE; in other embodiments, the timestamp indicates when the associated communication event record was sent to the managing server. In some embodiments, the UOE identifier and timestamp are contained in a UOE tag. In various embodiments, the token is a native token which contains the application environment identifier associated with the originating UOE and a trip counter as described above. In other embodiments, the token is a guest token. The collector sends an originator communication event record having an event type of GPS_INVOKE_START in response to a request for an IMS or CICS service and uses a native token. The collector sends an originator communication event record having an event type of GPS_PUT_START in response to a sending a message using the messaging system and uses a guest token. In some embodiments using a message queue, the originator communication event record also contains the queue name. In step 138, the collector exits.
  • In step 140, the communication is then sent to the receiving UOE with the token. The communication API which implements the communication passes the communication structure from the originating UOE to the receiving UOE. The communication structure contains the token as described above.
  • FIG. 8 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector of a receiving UOE in a receiving application environment in response to receiving a communication from an originating UOE in an originating application environment. In step 142, the receipt of a communication comprising a token from an originating UOE in an originating application environment by a receiving UOE in a receiving application environment is trapped, and the collector associated with the receiving application environment is activated. The receiving application environment is different from the originating application environment.
  • In step 144, the collector extracts the token from the communication. In step 146, the collector acknowledges receipt of the communication by sending a receiver communication event record comprising an event type of GPS_RECEIVE_START or GPS_GET_START, the receiving UOE identifier, the received token and a timestamp, to the managing server. The timestamp indicates when the request or message was received, or alternately, when the receiver communication event record was sent to the managing server. In various embodiments, the UOE identifier and the timestamp are contained in a UOE tag. In some embodiments, in response to the request being an invocation of an IMS or CICS service, the event type is GPS_RECEIVE_START. In other embodiments, in response to the request being a message from a messaging system, the event type is GPS_GET_START. In some embodiments, the execution of the receiving UOE is initiated in response to the request or message; in other embodiments, the receiving UOE is already executing prior to receiving the request or message. In step 148, the collector exits. The unit of execution of the application environment processes the request or message.
  • FIG. 9 depicts a flowchart of an embodiment of sending a receiver communication event record by a collector of the receiving application environment in response to the receiving UOE attempting to send a communication which indicates that the receiving UOE is suspending or stopping execution. In step 152, an attempt to send a communication which indicates that the receiving UOE is suspending or stopping execution is trapped at the receiving application environment containing the receiving UOE, and the collector associated with the receiving application environment is activated. In step 154, the collector retrieves the token which was received in the communication from the originating UOE to provide a received token. In step 156, the collector stores the token in the communications structure associated with the communication which indicates that the receiving UOE is suspending or stopping execution. In step 158, the collector sends a receiver communication event record to the managing server. The receiver communication event record comprises an event type, the receiving UOE identifier, the received token and a timestamp. The timestamp indicates when the receiver communication event record was sent. In various embodiments, the event type is GPS_RECEIVE_END. In step 160, the collector exits. In step 162, the communication which indicates that the receiving UOE is suspending or stopping execution is sent to the originating UOE with the token.
  • FIG. 10 depicts a flowchart of an embodiment of sending an originator communication event record by a collector at an originating application environment in response to receiving a communication that indicates that a receiving UOE is suspending or stopping execution. In step 164, at the originating UOE of an originating application environment, the receipt of a communication that execution of a receiving UOE has been suspended or stopped, is trapped. The communication comprises a token. The collector associated with originating application environment is activated. In step 166, the collector associated with the originating application environment extracts the token from the communication. In step 168, the collector associated with the originating application environment sends an originator communication event record to the managing server. The originator communication event record comprises a GPS_INVOKE_END event type, the originating UOE identifier, the token and a timestamp indicating when the originator communication event was sent. In step 170, the collector exits.
  • FIG. 11 depicts a flowchart of an embodiment of sending an originator communication event record by a collector associated with an originating application environment in response to the originating UOE receiving control back from sending a communication asynchronously. In step 172, the return from an API to send a communication to the receiving UOE using a messaging system is trapped at the originating application environment, and a collector associated with the originating application environment is activated. In some embodiments, the API is a PUT API to place a message in a message queue. In step 174, the collector associated with the originating application environment extracts the token from the communication. In step 176, the collector associated with the originating application environment sends an originator communication event record to the managing server comprising an event type, the originating UOE identifier, the token and a timestamp. In step 178, the collector exits. In some embodiments, the event type is GPS_PUT_END.
  • In an alternate embodiment, asynchronous invocation is used rather than a messaging system. In this embodiment, in step 172, the return from an API to send a communication to the receiving UOE using asynchronous invocation is trapped; and in step 176, the event type is GPS_INVOKE_END.
  • FIG. 12 depicts a flowchart of an embodiment of the sending of a receiver communication event record by a collector associated with a receiving application environment in response to a UOE receiving control back from an API to receive an asynchronous communication. In step 180, the return from the API to receive the communication is trapped at the receiving application environment, and the collector associated with the receiving application environment is activated. In some embodiments, the return is from a GET API to receive a communication from a messaging system. In other embodiments, the return is from an API which receives a communication from an asynchronous invocation. In step 182, the collector extracts the token from the communication. In step 184, the collector sends a receiver communication event record to the managing server. The receiver communication event record comprises an event type, the receiving UOE identifier, the token and a timestamp. In some embodiments, the event type is GPS_GET_END if a messaging system is used; and in other embodiments, the event type is GPS_RECEIVE_END if asynchronous invocation is used. In step 186, the collector exits.
  • In some embodiments, steps 134-138 of FIG. 7, steps 144-148 of FIG. 8, steps 154-160 of FIG. 9, steps 166-170 of FIG. 10, steps 174-178 of FIG. 11 and steps 182-186 of FIG. 12 are implemented in a single collector.
  • FIG. 13 depicts a flowchart of an embodiment of the managing server. In step 192, the managing server receives and stores originator and receiver communication event records. Each communication event record has a token.
  • In step 194, in the managing server, the GPS correlates UOEs across application environments based on the originator and receiver communication event records. The GPS determines whether two UOEs are correlated by matching the tokens of the receiver and originator communication event records. For example, a UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_INVOKE_START is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_RECEIVE_START if the tokens of the originator and receiver communication event records are the same. A UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_INVOKE_END is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_RECEIVE_END if the tokens of the originator and receiver communication event records are the same. A UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_PUT_START is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_GET_START if the tokens of the originator and receiver communication event records are the same. A UOE associated with the UOE identifier of an originator communication event record which has an event type of GPS_PUT_END is correlated with a UOE associated with the UOE identifier of a receiver communication event record which has an event type of GPS_GET_END if the tokens of the originator and receiver communication event records are the same.
  • The GPS identifies the originating and receiving UOEs based on the UOE identifier sent in the originator and receiver communication event records, respectively. The managing server receives other protocol messages from the data collector which are used to establish the identity of a thread, TCA or TCB within an application environment. When a collector starts, the collector identifies itself uniquely to the managing server, including the type of the collector, that is, the type of application environment that the collector is associated with, such as, J2EE, CICS or IMS. When the managing server receives a communication event record, the managing server identifies which collector is sending the communication event record, and therefore which application environment is associated with the communication event record. Therefore, based on which collector sent the communication event record and the UOE identifier of a communication event record, the managing server can identify the UOE and the application environment associated with the communication event record. In various embodiments, the managing server maintains information such as the names of the UOEs, their associated UOE identifiers, the name of their associated application environments and their associated application environments identifier. The GPS also determines what type of connection is used (synchronous/asynchronous invocation or messaging) by the event type of the communication event record. The GPS determines the order of events based on the timestamp. In some embodiments, the GPS determines whether a communication is synchronous or asynchronous based on the timestamp.
  • In step 196, the managing server provides a visual indication of the correlation between the originator and receiver communication event records, and therefore indicates the correlation between UOEs in different application environments.
  • Various examples of the communication protocol between the collectors and the managing server will now be described. The communication protocol works with synchronous and asynchronous communication. One difference between synchronous and asynchronous communication may be indicated by the difference in the timestamp. For example, for asynchronous communication the timestamp will be such that in some instances the communication event record with an event type of GPS_INVOKE_END from the originating UOE will have a timestamp with a value which is prior to the value of the timestamp of the communication event record having an event type of GPS_RECEIVE_END from the receiving UOE. In other words, the originating UOE does not “block” while the receiving UOE is executing. In synchronous invocation, the originating UOE waits until the receiving UOE finishes executing the invocation, whereas in asynchronous invocation, the originating UOE does not wait and can perform other activities, such as invoking another UOE. Therefore, in some instances, the GPS can determine whether a communication is synchronous or asynchronous based on the timestamp.
  • FIG. 14 depicts a sequence diagram 200 illustrating an embodiment of tracking the processing of a transaction across application environments using synchronous communication. The vertical axis 202 represents time. FIG. 14 has three units of execution, UOE1, UOE2 and UOE3, 204, 206 and 208, respectively, and each unit of execution is in a different application environment. FIG. 14 also indicates when the UOEs 204, 206 and 208 start and stop executing with a “Start” label 212 and a “Stop” label 214. Table 1 illustrates the communication event records of FIG. 14 which are sent to and stored by the managing server. In the sequence diagram 200 of FIG. 14 and in Table 1, the communication event records are associated with an event record number (EVR) 210 having a value from one through sixteen which correspond to the order in which the event records are issued. In FIG. 14, the EVRs 210 are enclosed in a circle. In synchronous communication, the originating UOEs suspend execution until control is returned to them. In FIG. 14, a dashed line 216 indicates that the execution of a UOE is suspended. Table 1 below depicts various exemplary communication event records, including the event type, an exemplary UOE identifier with the TCA or TCB number, timestamp, and an exemplary token with the application environment identifier (AE id) and trip counter. In the example below, the timestamp contains an illustrative value as “hhmm” where “hh” represents the hour using a twenty-four hour clock and “mm” represents the minute.
    TABLE 1
    Communication event records For Synchronous Communication
    Communication event record
    UOE tag
    TCA or Token
    TCB Time Trip
    EVR Event Type number stamp AE id counter
    1 GPS_INVOKE_START 1 1300 1 1
    2 GPS_RECEIVE_START 2 1302 1 1
    3 GPS_INVOKE_START 2 1304 2 1
    4 GPS_RECEIVE_START 3 1305 2 1
    5 GPS_RECEIVE_END 3 1308 2 1
    6 GPS_INVOKE_END 2 1309 2 1
    7 GPS_INVOKE_START 2 1310 2 2
    8 GPS_RECEIVE_START 3 1311 2 2
    9 GPS_RECEIVE_END 3 1312 2 2
    10 GPS_INVOKE_END 2 1313 2 2
    11 GPS_INVOKE_START 2 1314 2 3
    12 GPS_RECEIVE_START 3 1315 2 3
    13 GPS_RECEIVE_END 3 1316 2 3
    14 GPS_INVOKE_END 2 1317 2 3
    15 GPS_RECEIVE_END 2 1318 1 1
    16 GPS_INVOKE_END 1 1319 1 1
  • For example, a first unit of execution UOE1 204 of a first application environment attempts to communicate with a second unit of execution UOE2 206 of a second application environment. In response, as indicated by event record number one 216, the collector associated with the first application environment UOE1 204 sends a communication event record having a GPS INVOKE_START event type to the managing server. The execution of the first unit of execution UOE1 204 is suspended as indicated by dashed line 216. In response to receiving the communication from the first unit of execution UOE1 204, as indicated by event record number two, the collector associated with the second unit of execution UOE2 206 of the second application environment sends a communication event record having an event type of GPS_RECEIVE_START to the managing server. The second unit of execution UOE2 206 attempts to communicate with the third unit of execution UOE3 208. In response, as indicated by event record number three, the collector associated with the second unit of execution UOE2 206 sends a communication event record having an event type of GPS_INVOKE_START to the managing server. The execution of the second unit of execution UOE2 206 is suspended. In response to receiving the communication from the second unit of execution UOE2 206, as indicated by event record number four, the collector associated with the third unit of execution UOE3 208 sends a communication event record having an event type of GPS_RECEIVE_START to the managing server. In response to the third unit of execution UOE3 208 suspending execution, the collector associated with the third unit of execution UOE3 208 sends a communication event record having an event type of GPS_RECEIVE_END to the managing server as indicated by event record number five. Control is transferred back to the second unit of execution UOE2 206. In response to control being transferred back to the second unit of execution UOE2 206, the collector associated with the second unit of execution UOE2 206 sends a communication event record having an event type of GPS_INVOKE_END event record to the managing server as indicated by event record number six. As shown by event record numbers seven to sixteen, the processing continues until control returns to the first unit of execution UOE1 204.
  • FIG. 15 depicts a sequence diagram 220 illustrating an embodiment of tracking the processing of a transaction across application environments using non-message driven asynchronous and synchronous communication. FIG. 15 illustrates three units of execution, UOE1, UOE2 and UOE3, 222, 224 and 226, respectively, and each unit of execution is in a different application environment. In FIG. 15, the start and stop time of the UOEs 222, 224 and 226, is also illustrated. In the sequence diagram and in Table 2, the communication event records below are numbered with an event record number (EVR) from one through sixteen, however, the event record numbers of FIG. 15 and Table 2 do not reflect the order in which the communication event records were issued. The event record numbers are used to associate the communication event records of Table 2 with FIG. 15. In FIG. 15, UOE1 222 communicates using asynchronous invocation and does not suspend execution after invoking UOE2 224, as illustrated by the solid line 225 which indicates that UOE1 222 continues processing after the communication event record associated with event record number sixteen 228 is sent to the managing server. UOE2 224 and UOE3 226 communicate using synchronous invocation.
    TABLE 2
    Communication Event Records for Asynchronous
    and Synchronous Communication
    Communication Event Record
    UOE tag
    TCA or Token
    TCB Time Trip
    EVR Event Type number stamp AE id counter
    1 GPS_INVOKE_START 1 1300 1 1
    2 GPS_RECEIVE_START 2 1302 1 1
    3 GPS_INVOKE_START 2 1304 2 1
    4 GPS_RECEIVE_START 3 1305 2 1
    5 GPS_RECEIVE_END 3 1308 2 1
    6 GPS_INVOKE_END 2 1309 2 1
    7 GPS_INVOKE_START 2 1310 2 2
    8 GPS_RECEIVE_START 3 1311 2 2
    9 GPS_RECEIVE_END 3 1312 2 2
    10 GPS_INVOKE_END 2 1313 2 2
    11 GPS_INVOKE_START 2 1314 2 3
    12 GPS_RECEIVE_START 3 1315 2 3
    13 GPS_PRECEIVE_END 3 1316 2 3
    14 GPS_INVOKE_END 2 1317 2 3
    15 GPS_RECEIVE_END 2 1318 1 1
    16 GPS_INVOKE_END 1 1303 1 1
  • In FIG. 15, UOE1 222 is operating asynchronously with respect to UOE2 224 and UOE3 226. The communication event record having an event type of GPS_INVOKE_END (labeled as event record number sixteen) 228 corresponding to the communication event record having an event type of GPS_INVOKE_START (labeled as event record number one) of UOE1 222 has a timestamp prior to the timestamp of the communication event records having event record numbers of 3 to 15 which indicates that UOE1 222 is not suspended while UOE2 224 and UOE3 226 are executing. Therefore UOE1 222 operates asynchronously, and the communication between UOE1222 and UOE2 224 is asynchronous. UOE2 224 and UOE3 226 operate synchronously as described above with reference to FIG. 14.
  • FIG. 16 depicts a sequence diagram 230 illustrating an embodiment of tracking the processing of a transaction across application environments using message driven asynchronous communication. In FIG. 16, UOE1 and UOE2, 232 and 234, respectively, are executing asynchronously in different application environments and communicate with each other through messaging. The start and stop times of UOE1 232 and UOE2 234 are also illustrated in FIG. 16. The dashed lines 238 of FIG. 16 indicate a time delay between sending and receiving a communication between UOE1 232 and UOE2 234. Table 3 depicts communication event records of FIG. 16 which were received and stored by the managing server. In FIG. 15, event record numbers (EVRs) are enclosed in a circle. The event record numbers of Table 3 are used to indicate corresponding communication event records in FIG. 16. The event record numbers do not correspond to the order in which the communication event records are sent to the managing server. In this example, the token is a guest token comprising a message identifier and a correlation identifier.
    TABLE 3
    Communication Event Records For Message
    Driven Asynchronous Communication
    Communication Event Record
    UOE tag Token
    Hosting Correla-
    thread Message tion
    identi- Time- identi- identi-
    EVR Event Type fier stamp fier fier
    1 GPS_PUT_START 4 1300 M1 C1
    2 GPS_GET_START 6 1307 M1 C1
    3 GPS_GET _END 6 1308 M1 C1
    4 GPS_PUT _END 4 1301 M1 C1
    5 GPS_PUT _START 4 1310 M2 C2
    6 GPS_GET_START 6 1316 M2 C2
    7 GPS_GET _END 6 1317 M2 C2
    8 GPS_PUT _END 4 1311 M2 C2
    9 GPS_PUT _START 6 1322 M3 C3
    10 GPS_GET_START 4 1329 M3 C3
    11 GPS_GET _END 4 1330 M3 C3
    12 GPS_PUT_END 6 1323 M3 C3
  • UOE1 232 attempts to send a message 237 to UOE2 using asynchronous messaging. In response, the collector associated with UOE1 sends an originator communication event record, as shown by event record number 1 236, to the managing server. In response to receiving the message, the collector associated with UOE2 234 sends a communication event record, indicated by event record number 2 to the managing server. In accordance with flowcharts 11 and 12, communication event records, as indicated by event record numbers 4 and 5, respectively, are sent to the managing server. UOE1 232 and UOE2 234 continue processing. UOE1 234 then attempts to send another message 239 to UOE2 234, and communication event records corresponding to event record numbers 5, 6, 7 and 8 are sent to the managing server in connection with message 239. UOE2 234 attempts to send a message 240 to UOE1 222, and the communication event records associated with event record number numbers 9, 10, 11 and 12 are sent to the managing server in connection with message 240.
  • In some embodiments, messages are sent to IMS using an MQ-IMS bridge. For example, a J2EE process sends a request message with a token (MsgID, CorrellID) to IMS through the MQ-IMS bridge using a PUT API, and the collector associated with the J2EE process sends an originator communication event record comprising an event type of GPS_PUT_START, the hosting thread identifier of the J2EE process, the token (MsgID, CorrellID) and timestamp to the managing server. The request message is routed to IMS with the token (MsgID, CorrellID), and IMS invokes a GET API to retrieve the message. The collector associated with the IMS application sends a receiver communication event record comprising an event type of GPS_GET_START, the UOE identifier of the IMS application, the received token (MsgID, CorrellID) and timestamp to the managing server. Since the request message does not come from IMS, the IMS application considers the token for that request message to be (MsgID, CorrellID). Because the messaging is asynchronous, the collector associated with the J2EE process sends an originator communication event record comprising an event type of GPS_PUT_END, the hosting thread identifier of the J2EE process, the token (MsgID, CorrellID), and timestamp to the managing server in response to the PUT API returning control to the J2EE process. In addition, the collector associated with the IMS application sends a receiver communication event record comprising a GPS_GET_END event type, the IMS application identifier, the received token (MsgID, CorrellID) and a timestamp to the managing server upon returning control from the GET API to the IMS application. The IMS application processes a transaction associated with the request message.
  • In this example, the request message specified that a response message is to be returned to the J2EE process. Upon completion of the transaction associated with the request message, the IMS application sends a response message using a PUT API to the J2EE process using the MQ-IMS bridge. The PUT API is trapped and the collector associated with the IMS application is invoked. As illustrated in the pseudo-code above, the collector generates a token (CorrellID, Msgtype) to avoid ambiguity between the token of the request message. The collector associated with the IMS application sends an originator communication event record comprising an event type of GPS_PUT_START, the IMS region identifier, the token (CorrellID, Msgtype) and timestamp to the managing server. The IMS application sends the response message to the J2EE application through the IMS bridge. In this example, the J2EE process is waiting for a response from the IMS application. In response to the J2EE process retrieving the response message using a GET API, the collector associated with the J2EE process sends an receiver communication event record comprising an event type of GPS_RECEIVE_START, the hosting thread identifier of the J2EE process, the received token (CorrellID, Msgtype) and timestamp to the managing server. Because the J2EE process and IMS application are asynchronous, the collectors associated with the receiving and originating UOEs send communication event records comprising event types of GPS_GET_END and GPS PUT_END to the managing server, respectively. In this way, the communication event records for the request and reply messages can be distinguished.
  • FIG. 17 comprises FIGS. 17A, 17B and 17C which collectively depict a graphical user interface, generated by the GPS, which illustrates an exemplary trace of the processing of an exemplary transaction across three units of execution in different application environments. In some embodiments, the graphical user interface of FIG. 17 is displayed in step 196 of FIG. 13. In FIG. 17A, the graphical user interface 250 depicts an exemplary trace 252 of a first unit of execution 254 in a first application environment 256. In this example, the first unit of execution 252 is a Java thread, in this example a servlet, and the first application environment is a Java process. The name of the first application environment 256 is “ADCDPL.M2L2.M212 servqa.76.” The event data 258 indicates that the name of the first unit of execution 254 is “/CTGTesterEC1Web/CTGTesterECIServlet”, at a depth 260 of zero with an event type 262 of “servlet entry”. The depth 260 indicates the level of a call. For example, a depth of one with an event type of “Method Entry” indicates that the first UOE named “/CTGTesterECIWeb/CTGTesterECIServlet” called method “itso/cics/etci/testereci/CTGTesterECIServlet.doPost”. An originating arrow 270 indicates that the servlet 254 has invoked a second unit of execution in a CICS application server which is a second application environment. The originating arrow 270 indicates that the first UOE is correlated with the second UOE. The originating arrow points to the right and indicates that the communication event record associated with the communication has an event type of start and indicates that the communication is an invocation. In particular, the method named “itso/cics/eci/testereci/CTGTTesterECIServlet.processRequest” of the first unit of execution invoked the second unit of execution. The GPS generated the arrow 270 based on matching tokens in the originator communication event record having an event type of GPS_INVOKE_START for the first unit of execution and a receiver communication event record having an event type of GPS_RECEIVE_START. The GPS correlated the first unit of execution 254 named “/CTGTesterECIWeb/CTGTesterECIServlet” in a first application environment named “ADCDPL.M2L2.M212 servqa.76” 256 with the second UOE named “CIC23QA1.DPLCIC1A” in a second application environment named “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” 272 based on the token as described above. The uniform resource indicator (URI) 275 within the arrow 254 provides information naming the second application environment, the application server, and the type of event, in this example, an invoke. Clicking on the URI 256 causes a trace of the invoked UOE outside the current application environment, that is, the second UOE, to be displayed.
  • In FIG. 17A, the elapsed times are equal to zero because the events occurred within one millisecond of each other and the timestamp granularity of the managing server is one millisecond. For example, the elapsed time between the servlet entry of the “/CTGTesterECIWeb/CTGTesterECIServlet” servlet and the method entry of the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is less than a millisecond; therefore, the elapsed time associated with the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is shown as zero. The CPU time represents the amount of time used by the CPU in processing at a depth before proceeding to another depth. For example, the amount of CPU time used by “/CTGTesterECIWeb/CTGTesterECIServlet” servlet at depth 0 prior to calling the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” method is less than a millisecond; therefore, the CPU time associated with the “itso/cics/eci/testereci/CTGTesterECIServlet.doPost” servlet at depth 0 is shown as zero.
  • The term “queue names match” 273 is part of the page caption and indicates whether the names of the put and get queues match if box 274 is checked. If the names of the put and get queues do not match, then the box 276 associated with the “queues do not match” caption 277 is checked.
  • FIG. 17B depicts a graphical user interface 280 illustrating a trace 282 of the processing performed in the CICS region in response to the invocation from the first UOE of FIG. 17A. A receiving arrow 284 contains a URI which, when clicked on, causes the trace of FIG. 17A to be displayed. The receiving arrow points to the left and indicates that the communication event record associated with the receiving UOE has an event type of start. By clicking on the URI in an originating or receiving arrow, a user can graphically follow the trace of various units of execution across different application environments. In FIG. 17B, the trace 282 is of the second UOE, named “CIC23QA1.DPLCIC1A” 286, in the second application environment, named “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” 288. An originating arrow 290 indicates that the second UOE named “CIC23QA1.DPLCIC1A” in the “ADCDPL.M2L2.M2L2.CIC23QA1.bcc” application environment invokes a third UOE named “CIC23QA2.DPLCIC2A” in a third application environment, which is a CICS region named “ADCDPL.M2L2.M2L2.CIC23QA2.bc3”.
  • FIG. 17C is a graphical user interface 300 which depicts a trace 302 of the processing performed in the third application environment, that is, another CICS region, in response to the invocation from the second UOE of FIG. 17B. The receiving arrow 304 contains a URI which, when clicked on, causes the trace of the second UOE of FIG. 17B to be displayed. The third UOE 306 is named “CIC23QA2.DPLCIC2A” and is in a third application environment, that is, a CICS region, named “ADCDPL.M2L2.M2L2.CIC23QA2.bc3” 308. In this example, the processing “hangs,” that is, fails, at event “Program Exit” 310; therefore, no additional arrow is displayed. In this way, a user can follow the processing of a transaction throughout units of execution in different application environments and, in this example, determine where the processing failed.
  • FIG. 17 illustrates synchronous communication. However, if, in FIG. 17A, an asynchronous call was made from the servlet, that is, the first unit of execution in FIG. 17A, the first originating arrow 270 (FIG. 17A) is displayed, and a receiving arrow back to the first unit of execution under the first originating arrow 270, with the same contents as the originating arrow, is also displayed to indicate the return from the PUT API. The receiving arrow is displayed even though the third unit of execution is in a “hang” state, because the first unit of execution is not waiting for the second unit of execution or the third unit of execution to complete.
  • In some embodiments, in response to a token of a receiver communication event record of a receiving UOE which has an event type of GPS_RECEIVE_END matching a token of an originator communication event record of an originating UOE which has an event type of GPS_INVOKE_END, a receiving arrow is displayed in a graphical user interface which displays a trace of processing of the receiving UOE, and an originating arrow is displayed in the graphical user interface which displays a trace of the processing of the originating UOE.
  • FIG. 18 depicts an embodiment of an illustrative computer system 360 which uses various embodiments of the present invention. The computer system 360 comprises a processor 362, display 364, input interfaces (I/F) 366, communications interface 368, memory 370 and output interface(s) 372, all conventionally coupled by one or more buses 374. The input interfaces 366 comprise a keyboard 376 and a mouse 378. The output interface 372 comprises a printer 380. The communications interface 368 is a network interface (NI) that allows the computer 360 to communicate via the network 382. The communications interface 368 may be coupled to the network 382 via a transmission medium 384 such as a network transmission line, for example twisted pair, coaxial cable or fiber optic cable. In another embodiment, the communications interface 368 provides a wireless interface, that is, the communications interface 368 uses a wireless transmission medium.
  • The memory 370 generally comprises different modalities, illustratively semiconductor memory, such as random access memory (RAM), and disk drives. In various embodiments, the memory 370 stores an operating system 388 and the managing server 20 which comprises the GPS 80, an application environment 400 and associated collector 402.
  • Computer systems 390 and 392 are coupled to the network 382 via transmission mediums 394 and 396, respectively. Each computer system 390 and 392 comprises an application environment 32 and 36 and an associated collector 62 and 66, respectively. The application environments 32 and 36 and their associated collectors 62 and 66 are stored in a memory on computer systems 390 and 392, respectively.
  • In various embodiments, the specific software instructions, data structures and data that implement various embodiments of the present invention are typically incorporated in the managing server 20 and collectors 62, 66 and 402. Generally, an embodiment of the present invention is tangibly embodied in a computer-readable medium, for example, the memory 370, and is comprised of instructions which, when executed by the processor 362, cause the computer system 360 to utilize the present invention. The memory 370 may store the software instructions, data structures and data for any of the operating system 388, managing server 20, application environment 400 and collector 402 in semiconductor memory, in disk memory, or a combination thereof. Other computer memory devices presently known or that become known in the future, or combination thereof, may be used for memory 370.
  • The operating system 388 may be implemented by any conventional operating system such as the AIX® (Registered Trademark of International Business Machines Corporation), UNIX, Windows® (Registered Trademark of Microsoft Corporation), Linux® (Registered trademark of Linus Torvalds), Solaris® (Registered trademark of Sun Microsystems Inc.), HP-UX® (Registered trademark of Hewlett-Packard Development Company, L.P.), z/OS and MVS operating systems.
  • In various embodiments, the present invention may be implemented as a method, computer system, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier or media. In addition, the software in which various embodiments are implemented may be accessible through the transmission medium, for example, from a server over the network. The article of manufacture in which the code is implemented also encompasses transmission media, such as the network transmission line and wireless transmission media. Thus the article of manufacture also comprises the medium in which the code is embedded. Those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the present invention.
  • The exemplary computer system illustrated in FIG. 18 is not intended to limit the present invention. Other alternative hardware environments may be used without departing from the scope of the present invention.
  • The foregoing detailed description of various embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teachings. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended thereto.

Claims (30)

1. A computer-implemented method of tracking the processing of a transaction, comprising:
receiving, by a managing server, a first communication event record from a first collector associated with a first application environment having a first unit of execution, said first communication event record comprising a first unit of execution identifier and a first token;
receiving, by said managing server, a second communication event record from a second collector associated with a second application environment having a second unit of execution, said second communication event record comprising a second unit of execution identifier and a second token; and
determining, by said managing server, whether said first unit of execution and said second unit of execution are associated with processing said transaction based on said first token and said second token.
2. The method of claim 1 wherein said determining determines that said first unit of execution and said second unit of execution are associated with said processing said transaction in response to said first token matching said second token.
3. The method of claim 2 further comprising:
displaying, by said managing server, an indicator that indicates that said first unit of execution and said second unit of execution are associated with said processing said transaction.
4. The method of claim 1 further comprising:
in response to an attempt to send a communication by said first unit of execution to said second unit of execution, generating, by a first collector, said first token;
sending, by said first collector, said first communication event record comprising said first token and said first unit of execution identifier to said managing server;
sending said communication from said first unit of execution to said second unit of execution;
in response to receiving said communication by said second unit of execution, storing, by a second collector, a value of said first token in said second token; and
sending, by said second collector, said second communication event record comprising said second token and said second unit of execution identifier to said managing server.
5. The method of claim 1 wherein at least one of said first token and said second token is a native token.
6. The method of claim 5 wherein said native token comprises an application environment identifier and a trip counter, said method further comprising:
incrementing said trip counter in response to an attempt to send a communication by said first unit of execution to said second unit of execution.
7. The method of claim 1 wherein at least one of said first token and said second token is a guest token.
8. The method of claim 7 wherein said guest token comprises a message identifier and a correlation identifier.
9. The method of claim 7 wherein said guest token comprises a message type and a correlation identifier.
10. The method of claim 1 further comprising:
in response to an attempt to send a communication by said first unit of execution to said second unit of execution,
generating, by a first collector, said first token;
sending, by said first collector, said first communication event record comprising said first token and said first unit of execution identifier, and also comprising a start event type, to said managing server;
sending, asynchronously, said communication from said first unit of execution to said second unit of execution; and
in response to said sending said communication, sending by said first collector, a third communication event record comprising said first unit of execution identifier and said first token, and also comprising an end event type, to said managing server.
11. The method of claim 1 wherein said first communication event record comprises a first timestamp, and said second communication event record comprises a second timestamp;
determining an elapsed time based on said first and second timestamps.
12. The method of claim 1 wherein said first and second communication event records further comprise an event type indicating that a communication associated with said first and second communication event records, respectively, is message-based.
13. The method of claim 1 wherein said first and second communication event records further comprise an event type indicating that a communication associated with said first and second communication event records, respectively, is non-message-based.
14. The method of claim 1 wherein said first application environment is associated with a Java process, and said second application environment is associated with a legacy software system.
15. An article of manufacture comprising a computer usable medium embodying one or more instructions executable by a computer for performing a method of tracking the processing of a transaction, said method comprising:
receiving, by a managing server, a first communication event record from a first collector associated with a first application environment having a first unit of execution, said first communication event record comprising a first unit of execution identifier and a first token;
receiving, by said managing server, a second communication event record from a second collector associated with a second application environment having a second unit of execution, said second communication event record comprising a second unit of execution identifier and a second token; and
determining, by said managing server, whether said first unit of execution and said second unit of execution are associated with processing said transaction based on said first token and said second token.
16. The article of manufacture of claim 15 wherein said determining determines that said first unit of execution and said second unit of execution are associated with said processing said transaction in response to said first token matching said second token.
17. The article of manufacture of claim 16 wherein said method further comprises:
displaying, by said managing server, an indicator that indicates that said first unit of execution and said second unit of execution are associated with said processing said transaction.
18. The article of manufacture of claim 15 wherein said method further comprises:
in response to an attempt to send a communication by said first unit of execution to said second unit of execution, generating, by a first collector, said first token;
sending, by said first collector, said first communication event record comprising said first token and said first unit of execution identifier to said managing server;
in response to receiving said communication by said second unit of execution, storing, by a second collector, a value of said first token in said second token; and
sending, by said second collector, said second communication event record comprising said second token and said second unit of execution identifier to said managing server.
19. The article of manufacture of claim 15 wherein at least one of said first token and said second token is a native token.
20. The article of manufacture of claim 19 wherein said native token comprises an application environment identifier and a trip counter, wherein said method further comprises:
incrementing said trip counter in response to an attempt to send a communication by said first unit of execution to another unit of execution in another application environment.
21. The article of manufacture of claim 15 wherein at least one of said first token and said second token is a guest token.
22. The article of manufacture of claim 21 wherein said guest token comprises a message identifier and a correlation identifier.
23. The article of manufacture of claim 21 wherein said guest token comprises a message type and a correlation identifier.
24. The article of manufacture of claim 15 wherein said method further comprises:
in response to an attempt to send an asynchronous communication by said first unit of execution to said second unit of execution,
generating, by a first collector, said first token;
sending, by said first collector, said first communication event record comprising said first token and said first unit of execution identifier, and also comprising a start event type, to said managing server; and
in response to sending said asynchronous communication, sending by said first collector, a third communication event record comprising said first unit of execution identifier and said first token, and also comprising an end event type, to said managing server.
25. The article of manufacture of claim 15 wherein said first communication event record comprises a first timestamp, and said second communication event record comprises a second timestamp;
wherein said method further comprises:
determining an elapsed time based on said first and second timestamps.
26. The article of manufacture of claim 15 wherein said first and second communication event records further comprise an event type indicating that a communication associated with said first and second communication event records, respectively, is message-based.
27. The article of manufacture of claim 15 wherein said first and second communication event records further comprises an event type indicating that a communication associated with said first and second communication event records, respectively, is non-message-based.
28. A system to track the processing of a transaction, comprising:
a plurality of communication event records comprising originator communication event records and receiver communication event records, each communication event record being associated with a unit of execution of one of a plurality of application environments, each communication event record having a token, one or more of said originator communication event records being start event records; and
a managing server to determine whether one unit of execution in one of said application environments and another unit of execution in another one of said application environments are associated with processing said transaction based on said token of said originator communication event records and said receiver communication event records.
29. The computer system of claim 28 wherein said managing server determines that said one unit of execution and said another unit of execution are associated with said processing said transaction in response to a token of said originator communication event records matching a token of said receiver communication event records.
30. The computer system of claim 29 wherein said managing server also displays an indicator that indicates that said one unit of execution and said another unit of execution are associated with said processing said transaction.
US11/227,854 2005-09-14 2005-09-14 End-to-end transaction tracking in the enterprise Abandoned US20070060367A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/227,854 US20070060367A1 (en) 2005-09-14 2005-09-14 End-to-end transaction tracking in the enterprise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/227,854 US20070060367A1 (en) 2005-09-14 2005-09-14 End-to-end transaction tracking in the enterprise

Publications (1)

Publication Number Publication Date
US20070060367A1 true US20070060367A1 (en) 2007-03-15

Family

ID=37855994

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/227,854 Abandoned US20070060367A1 (en) 2005-09-14 2005-09-14 End-to-end transaction tracking in the enterprise

Country Status (1)

Country Link
US (1) US20070060367A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070276844A1 (en) * 2006-05-01 2007-11-29 Anat Segal System and method for performing configurable matching of similar data in a data repository
US20080310431A1 (en) * 2007-06-12 2008-12-18 Shahrokh Nezamzadeh Method for automatic discovery of a transaction gateway daemon of specified type
US20110087458A1 (en) * 2009-10-08 2011-04-14 Ashley Neil Clementi Processing transaction timestamps
US20110088045A1 (en) * 2009-10-08 2011-04-14 Ashley Neil Clementi Linking transactions
US20110113117A1 (en) * 2009-11-12 2011-05-12 Bmc Software, Inc. Asynchronous Collection and Correlation of Trace and Communications Event Data
US8316126B2 (en) 2009-10-08 2012-11-20 International Business Machines Corporation Stitching transactions
EP2588960A1 (en) * 2010-06-30 2013-05-08 Hewlett-Packard Development Company, L.P. Tracking a server request
US20130179446A1 (en) * 2012-01-05 2013-07-11 International Business Machines Corporation Linking Single System Synchronous Inter-Domain Transaction Activity
US20140025757A1 (en) * 2012-07-23 2014-01-23 Google Inc. System and Method for Providing Multi-Modal Asynchronous Communication
US8751643B2 (en) 2011-12-13 2014-06-10 International Business Machines Corporation Correlating event streams from independent processes in a complex business system using metadata associated with the transport interconnections
US20140177450A1 (en) * 2012-12-26 2014-06-26 S. Kris CHOU Correlation of synchronous and asynchronous hierarchical data in loosely-coupled data processing systems
US8942996B2 (en) * 2012-09-24 2015-01-27 Wal-Mart Stores, Inc. Determination of customer proximity to a register through use of sound and methods thereof
US9117013B2 (en) 2009-10-08 2015-08-25 International Business Machines Corporation Combining monitoring techniques
US20160034593A1 (en) * 2013-03-15 2016-02-04 Wal-Mart Stores, Inc. Apparatus and method enablement of customer information control systems on a mainframe computer
US20170142037A1 (en) * 2015-11-18 2017-05-18 Bull Sas Method for generating a dataset defining a message for a constrained application
US10740211B2 (en) * 2017-11-28 2020-08-11 Vmware, Inc. Methods and systems to tag tokens in log messages
US10795906B1 (en) 2017-12-14 2020-10-06 Hostbridge Technology, Llc Transaction tracking
US11392911B2 (en) * 2018-04-06 2022-07-19 Orange Method for processing a transaction between a source terminal and a destination terminal, corresponding banking services system, terminal and computer program
US11954655B1 (en) * 2021-12-15 2024-04-09 Consumerinfo.Com, Inc. Authentication alerts

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5914951A (en) * 1996-04-16 1999-06-22 At&T Corp System and method for controlling and monitoring communication between customers and customer service representatives
US6108700A (en) * 1997-08-01 2000-08-22 International Business Machines Corporation Application end-to-end response time measurement and decomposition
US6195533B1 (en) * 1998-05-27 2001-02-27 Glenayre Electronics, Inc. Method for storing an application's transaction data in a wireless messaging system
US20020007330A1 (en) * 1998-12-08 2002-01-17 Srihari Kumar Interactive transaction center interface
US20020026535A1 (en) * 2000-08-30 2002-02-28 Karur Srinivasan Method for phase oriented internet business agents
US6401111B1 (en) * 1998-09-11 2002-06-04 International Business Machines Corporation Interaction monitor and interaction history for service applications
US20020147570A1 (en) * 2001-04-10 2002-10-10 Timothy Kraft System and method for monitoring the interaction of randomly selected users with a web domain
US20020198984A1 (en) * 2001-05-09 2002-12-26 Guy Goldstein Transaction breakdown feature to facilitate analysis of end user performance of a server system
US20030009545A1 (en) * 2001-06-19 2003-01-09 Akhil Sahai E-service management through distributed correlation
US20030014464A1 (en) * 2001-06-29 2003-01-16 Deverill Ian J. Computer system performance monitoring using transaction latency data
US20030182318A1 (en) * 2002-03-22 2003-09-25 Goldberg Robert N. Method and apparatus for improving transaction specification by marking application states
US20030217311A1 (en) * 2002-05-14 2003-11-20 Smith Michael D. Debug information provided through tag space
US20040064552A1 (en) * 2002-06-25 2004-04-01 Chong James C. Method and system for monitoring performance of applications in a distributed environment
US20040075690A1 (en) * 2002-10-18 2004-04-22 Cirne Lewis K. User interface for viewing performance information about transactions
US6748583B2 (en) * 2000-12-27 2004-06-08 International Business Machines Corporation Monitoring execution of an hierarchical visual program such as for debugging a message flow
US20040123293A1 (en) * 2002-12-18 2004-06-24 International Business Machines Corporation Method and system for correlating transactions and messages
US6817010B2 (en) * 2000-12-27 2004-11-09 International Business Machines Corporation Monitoring messages during execution of a message flow
US20050149601A1 (en) * 2003-12-17 2005-07-07 International Business Machines Corporation Method, system and computer program product for real-time data integrity verification
US20050251574A1 (en) * 2004-03-25 2005-11-10 Intenational Business Machines Corporation Process and implementation for dynamically determining probe enablement using out of process correlating token
US7203458B1 (en) * 1999-08-26 2007-04-10 Cheng Alexander L Method and apparatus for position tracking and communication within a defined locale
US7290056B1 (en) * 1999-09-09 2007-10-30 Oracle International Corporation Monitoring latency of a network to manage termination of distributed transactions
US20070294224A1 (en) * 2006-06-16 2007-12-20 Jean-Jacques Heler Tracking discrete elements of distributed transactions
US7349867B2 (en) * 2000-12-22 2008-03-25 Invenda Corporation Tracking transactions by using addresses in a communications network

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5914951A (en) * 1996-04-16 1999-06-22 At&T Corp System and method for controlling and monitoring communication between customers and customer service representatives
US6108700A (en) * 1997-08-01 2000-08-22 International Business Machines Corporation Application end-to-end response time measurement and decomposition
US6195533B1 (en) * 1998-05-27 2001-02-27 Glenayre Electronics, Inc. Method for storing an application's transaction data in a wireless messaging system
US6401111B1 (en) * 1998-09-11 2002-06-04 International Business Machines Corporation Interaction monitor and interaction history for service applications
US20020007330A1 (en) * 1998-12-08 2002-01-17 Srihari Kumar Interactive transaction center interface
US7203458B1 (en) * 1999-08-26 2007-04-10 Cheng Alexander L Method and apparatus for position tracking and communication within a defined locale
US7290056B1 (en) * 1999-09-09 2007-10-30 Oracle International Corporation Monitoring latency of a network to manage termination of distributed transactions
US20020026535A1 (en) * 2000-08-30 2002-02-28 Karur Srinivasan Method for phase oriented internet business agents
US7349867B2 (en) * 2000-12-22 2008-03-25 Invenda Corporation Tracking transactions by using addresses in a communications network
US6748583B2 (en) * 2000-12-27 2004-06-08 International Business Machines Corporation Monitoring execution of an hierarchical visual program such as for debugging a message flow
US6817010B2 (en) * 2000-12-27 2004-11-09 International Business Machines Corporation Monitoring messages during execution of a message flow
US20020147570A1 (en) * 2001-04-10 2002-10-10 Timothy Kraft System and method for monitoring the interaction of randomly selected users with a web domain
US20020198984A1 (en) * 2001-05-09 2002-12-26 Guy Goldstein Transaction breakdown feature to facilitate analysis of end user performance of a server system
US20030009545A1 (en) * 2001-06-19 2003-01-09 Akhil Sahai E-service management through distributed correlation
US7272626B2 (en) * 2001-06-19 2007-09-18 Hewlett-Packard Development Company, L.P. E-service management through distributed correlation
US20030014464A1 (en) * 2001-06-29 2003-01-16 Deverill Ian J. Computer system performance monitoring using transaction latency data
US20030182318A1 (en) * 2002-03-22 2003-09-25 Goldberg Robert N. Method and apparatus for improving transaction specification by marking application states
US20030217311A1 (en) * 2002-05-14 2003-11-20 Smith Michael D. Debug information provided through tag space
US20040064552A1 (en) * 2002-06-25 2004-04-01 Chong James C. Method and system for monitoring performance of applications in a distributed environment
US20040075690A1 (en) * 2002-10-18 2004-04-22 Cirne Lewis K. User interface for viewing performance information about transactions
US20040123293A1 (en) * 2002-12-18 2004-06-24 International Business Machines Corporation Method and system for correlating transactions and messages
US20050149601A1 (en) * 2003-12-17 2005-07-07 International Business Machines Corporation Method, system and computer program product for real-time data integrity verification
US20050251574A1 (en) * 2004-03-25 2005-11-10 Intenational Business Machines Corporation Process and implementation for dynamically determining probe enablement using out of process correlating token
US20070294224A1 (en) * 2006-06-16 2007-12-20 Jean-Jacques Heler Tracking discrete elements of distributed transactions

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070276844A1 (en) * 2006-05-01 2007-11-29 Anat Segal System and method for performing configurable matching of similar data in a data repository
US7542973B2 (en) * 2006-05-01 2009-06-02 Sap, Aktiengesellschaft System and method for performing configurable matching of similar data in a data repository
US20080310431A1 (en) * 2007-06-12 2008-12-18 Shahrokh Nezamzadeh Method for automatic discovery of a transaction gateway daemon of specified type
US7769853B2 (en) * 2007-06-12 2010-08-03 International Business Machines Corporation Method for automatic discovery of a transaction gateway daemon of specified type
US8584123B2 (en) 2009-10-08 2013-11-12 International Business Machines Corporation Linking transactions
US20110088045A1 (en) * 2009-10-08 2011-04-14 Ashley Neil Clementi Linking transactions
US8316126B2 (en) 2009-10-08 2012-11-20 International Business Machines Corporation Stitching transactions
US10157117B2 (en) * 2009-10-08 2018-12-18 International Business Machines Corporation Processing transaction timestamps
US9117013B2 (en) 2009-10-08 2015-08-25 International Business Machines Corporation Combining monitoring techniques
US20110087458A1 (en) * 2009-10-08 2011-04-14 Ashley Neil Clementi Processing transaction timestamps
US20110113117A1 (en) * 2009-11-12 2011-05-12 Bmc Software, Inc. Asynchronous Collection and Correlation of Trace and Communications Event Data
US9037555B2 (en) * 2009-11-12 2015-05-19 Bmc Software, Inc. Asynchronous collection and correlation of trace and communications event data
EP2588960A1 (en) * 2010-06-30 2013-05-08 Hewlett-Packard Development Company, L.P. Tracking a server request
EP2588960A4 (en) * 2010-06-30 2017-03-29 Hewlett-Packard Enterprise Development LP Tracking a server request
US8751643B2 (en) 2011-12-13 2014-06-10 International Business Machines Corporation Correlating event streams from independent processes in a complex business system using metadata associated with the transport interconnections
US9009303B2 (en) 2011-12-13 2015-04-14 International Business Machines Corporation Correlating event streams from independent processes in a complex business system using metadata associated with the transport interconnections
US20130179448A1 (en) * 2012-01-05 2013-07-11 International Business Machines Corporation Linking Single System Synchronous Inter-Domain Transaction Activity
US10824646B2 (en) 2012-01-05 2020-11-03 International Business Machines Corporation Linking single system synchronous inter-domain transaction activity
CN103279380A (en) * 2012-01-05 2013-09-04 国际商业机器公司 Information processing system and method
US10216600B2 (en) * 2012-01-05 2019-02-26 International Business Machines Corporation Linking single system synchronous inter-domain transaction activity
US20130179446A1 (en) * 2012-01-05 2013-07-11 International Business Machines Corporation Linking Single System Synchronous Inter-Domain Transaction Activity
US20140025757A1 (en) * 2012-07-23 2014-01-23 Google Inc. System and Method for Providing Multi-Modal Asynchronous Communication
US9385981B2 (en) * 2012-07-23 2016-07-05 Google Inc. System and method for providing multi-modal asynchronous communication
US8942996B2 (en) * 2012-09-24 2015-01-27 Wal-Mart Stores, Inc. Determination of customer proximity to a register through use of sound and methods thereof
US9509551B2 (en) * 2012-12-26 2016-11-29 Ciena Corporation Correlation of synchronous and asynchronous hierarchical data in loosely-coupled data processing systems
US20140177450A1 (en) * 2012-12-26 2014-06-26 S. Kris CHOU Correlation of synchronous and asynchronous hierarchical data in loosely-coupled data processing systems
US20160034593A1 (en) * 2013-03-15 2016-02-04 Wal-Mart Stores, Inc. Apparatus and method enablement of customer information control systems on a mainframe computer
US10803136B2 (en) * 2013-03-15 2020-10-13 Walmart Apollo, Llc Apparatus and method enablement of customer information control systems on a mainframe computer
US20170142037A1 (en) * 2015-11-18 2017-05-18 Bull Sas Method for generating a dataset defining a message for a constrained application
US10567317B2 (en) * 2015-11-18 2020-02-18 Bull Sas Method for generating a dataset defining a message for a constrained application
US10740211B2 (en) * 2017-11-28 2020-08-11 Vmware, Inc. Methods and systems to tag tokens in log messages
US10795906B1 (en) 2017-12-14 2020-10-06 Hostbridge Technology, Llc Transaction tracking
US11392911B2 (en) * 2018-04-06 2022-07-19 Orange Method for processing a transaction between a source terminal and a destination terminal, corresponding banking services system, terminal and computer program
US11954655B1 (en) * 2021-12-15 2024-04-09 Consumerinfo.Com, Inc. Authentication alerts

Similar Documents

Publication Publication Date Title
US20070060367A1 (en) End-to-end transaction tracking in the enterprise
US10348809B2 (en) Naming of distributed business transactions
US7953860B2 (en) Fast reorganization of connections in response to an event in a clustered computing system
US7516176B2 (en) Distributed request and response queues for service processor
US7747717B2 (en) Fast application notification in a clustered computing system
US8200765B2 (en) Preserving message order using a message ordering manager
US7840611B2 (en) High availability for event forwarding
US7698602B2 (en) Systems, methods and computer products for trace capability per work unit
US20040220947A1 (en) Method and apparatus for real-time intelligent workload reporting in a heterogeneous environment
US20040237093A1 (en) Technique to generically manage extensible correlation data
US9515901B2 (en) Automatic asynchronous handoff identification
US7454761B1 (en) Method and apparatus for correlating output of distributed processes
US20170126580A1 (en) Tracking Contention in a Distributed Business Transaction
US20180329761A1 (en) Integrating transaction processing system interfaces with event-driven polyglot runtime modules
CN111488373B (en) Method and system for processing request
Chen et al. QoS evaluation of JMS: An empirical approach
US11811894B2 (en) Reduction of data transmissions based on end-user context
US20240069970A1 (en) System and method for sharing vitals among service replicas to enable processing of long running automation workflows in a container orchestration system
US10862991B2 (en) System and method for conditional call path monitoring in a distributed transactional middleware environment
US9235457B2 (en) Proactively communicating information between processes through a message repository
Zin et al. Deadlock Detection and Resolution in Neighbour Replication on Grid
Nielsen et al. Scalability Architecture For Processing using Microsoft. Net Remoting

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HELER, JEAN-JACQUES;REEL/FRAME:017735/0742

Effective date: 20050908

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION