Confidence in the use of the Internet for business purposes, both business-to-business (B2B) and business-to-consumer (B2C) transactions relies on effective authentication and intruder detection processes. Regrettably, the triumph of the Internet design for global information access and sharing is at risk of being tarnished as a ubiquitous open trading environment by unscrupulous and vindictive attacks. Information security is thus the overarching concern of Internet businesses and users! A status notification method and facility is provided for use with a service chain processing a request for a service. The service chain can include multiple computer nodes, and the method includes dynamically creating the service chain for processing the request, and guaranteeing agreement, on at least two of the nodes of the service chain, about the status of the processing of the request. The method can also include saving detailed operational data logs in response to determining that a failure in processing the request has occurred. When a given node in the service chain determines that failure has occurred, agreement about the failure can be propagated throughout the service chain. Also, conditional logging of detailed operational data can minimize the amount of operational data transmitted over a network and saved to a data repository. Begining solutions realized that online services needs real time 24x7x365 monitoring to keep the web portals for information at broader scale and online shopping malls and shops for guarantee 99.9% up time with reasonable fast access from home and offices. We offer the following features in online portal monitoring services. Net Traffic Monitoring Peak and normal hours web Access bench marking Load balance Monitoring Server and Application Cluster monitoring Database Access and SAN storage monitoring Security, AV and Patch Monitoring