P o l a r i s F i n a n c i a l Te c h n o l o g i e s Welcomes the members of Hyderabad chapter for the 2nd event on 4th July 14 h e l d b y PA C E ( T h e Te s t i n g P r a c t i c e ) Virtualization Virtualization of the database enables compute and storage resources to be pooled and allocated on demand which provides increased flexibility, more granular and efficient allocation of pooled resources, and more scalable computing Server Virtualization Server virtualization means partitioning a single server to appear as multiple servers. Hypervisor is responsible for creating, releasing, and managing the resources of "guest" operating systems, or virtual machines. Capacity planning is the art of looking at trends in performance data to predict future capacity needs and then building provisioning strategies around that data.APM complements capacity planning. Database Virtualization Network Virtualization In APE, network virtualization enables emulation of connections between applications, services, and end users for testing Virtualization Application virtualization layers replace part of the runtime environment normally provided by the operating system. These solutions are widely adopted by enterprises so that its users can securely connect to corporate applications from any device. But, While access management is simplified and device independence is enabled, IT managers lose all ability to assess the quality of service end users are experiencing. (Multi-tenancy enabler) Application Virtualization Storage Virtualization Computer Measurement Group, India Virtualizing Storage randomizes sequential I/O which cause a lag in performance. APE should develop scenarios to optimize this performance 2 Performance Management – Evolution APM (Application + System) Systems Resource Monitoring Agent based SNMP Agent less Heterogeneous Machine Data (Performance Metrics) Computer Measurement Group, India Sniffing with Analytics Wire Data (Performance Metrics) 3 Monitoring Techniques – brief 1. Simple Network Management Protocol (SNMP) Is part of TCP/IP suite Operates in the Application Layer – acts as an agent Management Information Bases (MIBs) are data collectors MIBs consists of object IDs Each OID identifies a variable that can be read or set via SNMP Key SNMP Protocol Data Units GetRequest – (manager-to-agent) to retrieve the value of a variable or list of variables SetRequest – (manager –to – agent) to change/modify the value of a variable Trap – (agent –to – manager) to send notifications from 2. Agent based – System Monitoring agents run on a system to be monitored Implementation is limited to computer systems Agent either runs as an start-up application (or) service RPC over TCP/IP is one of the communication medium Agents invokes local OS commands to collect metrics Collected metrics are saved into proprietary file formats 3. Agent less An intrusive monitoring system OS commands are packaged into predefined templates Telnet/SSH/Java RMI/WCF (xml) are used as medium to invoke commands and collect metrics Computer Measurement Group, India 4 Monitoring Techniques – brief 4. Heterogeneous – Combination of top-down (i.e. application ) & bottom up (i.e. system ) approach Two sets of performance metrics are monitored • • End User experience – (Active and passive) in terms of Availability and Response Times, compared to different locations and user loads Active monitoring (aka Synthetic Monitoring) is done by executing automated (scripted) business process flow on an agent Passive monitoring is usually an agent less appliance implemented using network port mirroring Performance of Application components and system resources Runtime Application Architecture – CMDB compliant Application Discovery and Dependency Mapping (ADDM) solutions exist to automate the process of mapping transactions and applications to underlying infrastructure components Application component monitoring (Diagnostics tools) Agent based and is generally targeted in the middleware space focusing on the application, and messaging servers. Provides a real time view of the J2EE and .NET stacks, tying them back to the user defined business transactions. Shows a clear path from a code execution standpoint (e.g., springs, struts, etc.), to the URL rendered, to the user request. 4. Wire Data What is Wire Data – is it polling or trolling? A scripted SNMP or Agent or Agent-less process for metrics collection is “polling” A passive network monitoring to observe performance issues as they occur on network is “Trolling” Polling is like “do you see performance issues” Where as Trolling is “I see performance issues” Computer Measurement Group, India 5 Thank you !!! The theme and the information is sourced from the below link – http://www.virtualizationpractice.com/going-replace-legacy-management-frameworks-23286/ Computer Measurement Group, India 6