摘要:
A Common Information Model (CIM) agent notifies a CIM consumer that the CIM agent is able to receive notifications from the CIM consumer relating to errors within data relating to a CIM managed component and sent by the CIM agent to the CIM consumer. The CIM consumer receives the data relating to the CIM managed component from the CIM agent. The CIM managed component is a hardware component or a component. In response to the CIM consumer detecting that the data relating to the CIM managed component contains errors, the CIM consumer notifies the CIM agent. In response, the CIM agent initiates an automated recovery process in relation to the CIM managed component, without manual user interaction. The CIM agent may then continue to send data relating to the CIM managed component to the CIM consumer.
摘要:
An information technology (IT) environment includes IT managed resources in which the resources are abstracted using a model. In response to determining that a request for information received from a client is non-optimal in terms of processing the request, a first hint can be constructed that indicates how future requests are to be formulated by the client so that they are more optimal in terms of processing the future requests. In response to determining that the information is internally structured non-optimally in terms of processing the request, a second hint can be constructed that indicates how the information is to be internally structured more optimally in terms of processing future requests. In response to determining that processing the request will be non-optimal, a third hint can be constructed relating to a characteristic that results in non-optimal processing of the request, and logged within a hint log for offline analysis.
摘要:
A system includes a recording interface configured for receiving tagged information for recording system interactions. A recording module is configured for communicating with the recording interface and for recording the system interactions from a first computing environment between at least one application and a common component based on the tagged information. A repository is configured for storing the recorded system interactions. A playback interface is configured for retrieving a portion of the stored system interactions from the repository and playing back the retrieved portion of system interactions for simulating system interactions for a second computing environment.
摘要:
The configuration of servers using profile templates is disclosed. A profile template for configuring one or more servers is loaded. The profile template includes abstracted server configuration parameters and server configuration rules, and can be abstracted from parent profile templates. The parameters are for abstractly configuring a server type of which the servers are, whereas the rules specify how values of the parameters translate to direct server values for directly configuring the servers, based on attributes of the servers. A user is requested to modify preset of the parameters, and/or enter missing values of the parameters. Finally, a configuration for each server is generated as the values of the parameters, and the server configuration rules.
摘要:
A method and apparatus are provided for managing logging data communications in a computer system. The computer system is configured with a proxy agent in communication with a client machine and storage, and an embedded agent in communication with the proxy agent and the client machine. All inbound communications from the client machine to the storage are maintained in a log local to the proxy agent. However, all outbound communications are split between two different communications paths, with one outbound path from the storage directly to the client machine and a second outbound path from the storage to the client machine via the proxy agent. One of the two outbound paths is selected based upon one or more of the characteristics of the associated communication.
摘要:
A method, apparatus and program storage device for providing service access control for a user interface is disclosed. A service secret is combined with a user access code, such as a user ID/password. A system can extract the service secret and determine whether access to service functions should be allowed to provide authentication and authorization for service interface access in secure manner.
摘要:
A Common Information Model (CIM) agent notifies a CIM consumer that the CIM agent is able to receive notifications from the CIM consumer relating to errors within data relating to a CIM managed component and sent by the CIM agent to the CIM consumer. The CIM consumer receives the data relating to the CIM managed component from the CIM agent. The CIM managed component is a hardware component or a component. In response to the CIM consumer detecting that the data relating to the CIM managed component contains errors, the CIM consumer notifies the CIM agent. In response, the CIM agent initiates an automated recovery process in relation to the CIM managed component, without manual user interaction. The CIM agent may then continue to send data relating to the CIM managed component to the CIM consumer.
摘要:
A system includes a recording interface configured for receiving tagged information for recording system interactions. A recording module is configured for communicating with the recording interface and for recording the system interactions from a first computing environment between at least one application and a common component based on the tagged information. A repository is configured for storing the recorded system interactions. A playback interface is configured for retrieving a portion of the stored system interactions from the repository and playing back the retrieved portion of system interactions for simulating system interactions for a second computing environment.
摘要:
An information technology (IT) environment includes IT managed resources in which the resources are abstracted using a model. In response to determining that a request for information received from a client is non-optimal in terms of processing the request, a first hint can be constructed that indicates how future requests are to be formulated by the client so that they are more optimal in terms of processing the future requests. In response to determining that the information is internally structured non-optimally in terms of processing the request, a second hint can be constructed that indicates how the information is to be internally structured more optimally in terms of processing future requests. In response to determining that processing the request will be non-optimal, a third hint can be constructed relating to a characteristic that results in non-optimal processing of the request, and logged within a hint log for offline analysis.
摘要:
A method and apparatus are provided for managing logging data communications in a computer system. The computer system is configured with a proxy agent in communication with a client machine and storage, and an embedded agent in communication with the proxy agent and the client machine. All inbound communications from the client machine to the storage are maintained in a log local to the proxy agent. However, all outbound communications are split between two different communications paths, with one outbound path from the storage directly to the client machine and a second outbound path from the storage to the client machine via the proxy agent. One of the two outbound paths is selected based upon one or more of the characteristics of the associated communication.