Gordan Greenlee - Endicott NY, US Dennis Hartel - Berthoud CO, US Joseph Riina - Wayne NJ, US Richard Weingarten - Erie CO, US
International Classification:
G06F015/16
US Classification:
709200000
Abstract:
A method and system is provided intelligent network dispatchers that are capable of routing requests to one or more servers (e.g., LDAP servers) based on the requested application or the identity of the requester. The servers may be grouped into virtual clusters so that a particular cluster may service requests associated with a particular application or based on a type of customer (e.g., preferred or general customer) in order to grade levels of service. Also, a system resource monitor may provide continual monitoring of servers in virtual clusters to determine when one or more servers are overburdened or under burdened based on statistical performance data. As a servers performance changes, the system resource monitor may advise the intelligent network dispatcher causing a change in the rate of requests to the overburdened/under burdened server. The server may be temporarily removed from the virtual cluster until performance levels normalize. Further, servers may be re-assigned to other virtual clusters on demand to provide increased capacity to a virtual cluster.
Method, System And Program Product For Simulating Activity In A Server Environment
Gordan Greenlee - Endicott NY, US Kan Hsiao - Towaco NJ, US Howard Poole - Poughkeepsie NY, US Joseph Riina - Wayne NJ, US Joe Simons - Superior CO, US Richard Weingarten - Erie CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709230000
Abstract:
Under the present invention an audit log for the server environment is obtained and parsed to remove any extraneous information. The parsing operation will typically leave only the previous operations processed by the server environment in the audit log. Thereafter, the parsed audit log is fed back to the server environment. Specifically, each operation in the audit log is fed back to the server environment as a request. Each request will typically have its own thread to simulate concurrent thread activity in the server environment. After the requests have been fed, statistics corresponding to the resulting performance of the server environment will be generated.