WILY, Managing Critical Applications With Wily Introscope, Robert Dring

Embed Size (px)

Citation preview

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    1/92

    Wily | CA

    Application Performance Monitoring (APM)

    Managing Critical Applications (JEE & .NET) with WilyIntroscope

    The Key to Application Performance Management and Customer Success

    Robert Dring

    Senior Consultant Northern EMEA

    Webmedia User Conference, Tallin, Estonia.

    7th December 2006

    eMail : [email protected]

    Tel : +44-7917-046945

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    2/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 2

    Agenda

    Why Application Performance Monitoring/Management ?

    Introscope & Application Performance Management Architecture / How / What

    Introscopes Blame Technology

    An Introduction To .NET Monitoring Customer Experience Manager (CEM)

    Summary / Q & A

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    3/92

    tere tulemast Tallinna!

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    4/92

    Why Application PerformanceMonitoring/Management ?

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    5/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 5

    Todays IT Challenges

    Pressure to reduce operating costs and improve quality of serviceDo more with less

    Constant mis-diagnosis, false positives, finger-pointing, reworkWasting resources

    IT reports all is well, yet users are complainingCustomer satisfaction,how do you know

    Overwhelmed by various alarms and health informationSeas of data

    N-tier environments, access from anywhere anytimeIncreased complexity

    Quick time to market, increased importance and relianceShift to web based apps

    The time & resources to identify, isolate, and solve customer incidentsPROBLEM

    Lack of understanding of the business impact of an incidentPROBLEM

    Inconsistent performance of business applicationsPROBLEM

    Web-Tier Application-Tier Database-Tier Mainframe-Tier

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    6/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 6

    Applications

    When Theres a Problem, IT Needs to Know

    Where the Transaction is Failing

    FirewallNetwork

    Switch

    LoadBalancer Portal

    IdentityManager

    End User

    Router

    SAP

    PSFT

    Siebel

    Web Services

    3rd PartyApplications

    Databases

    Mainframe

    Database

    Are customersaffected?

    Are 3rd partiesmeeting SLAs?

    How isdatabaseresponse?

    Are businessapps slow?

    What about theweb servers?

    Are transactionsfailing?

    Whatsmainframeresponse

    time?

    Web services down?

    Is authentication

    server slow? Can I find theproblem? Did

    we recordeverything?

    WebServers

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    7/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 7

    Most web applications are made up on three tiers: Front end

    Middleware

    Back ends (databases, transaction systems, andlegacy systems)

    SOA architectures which include Enterprise Services

    Bus (ESB) and Web Service layers, complicate thepicture.

    Where are Transactions Processed?

    Drill Down:End User

    Experience

    Drill Down:Application and App

    Server Availability and

    Performance

    Drill Down:Back-End

    Availability and

    Performance

    Applications

    FirewallNetwork

    Switch

    LoadBalancer Portal

    IdentityManager

    WebServers

    Router

    SAP

    PSFT

    Siebel

    3rd PartyApplications

    Databases

    Mainframe

    Database

    Web Services

    End-to-End, Always-On Transaction Visibility

    Most web-based client applications do NOT process

    much of the transaction, only presentation. When

    monitoring the client and the clients network it is

    critical to focus on problems to you CAN control

    -- your own systems and network.

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    8/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 8

    Applications

    FirewallNetwork

    Switch

    LoadBalancer Portal

    IdentityManager

    End User

    WebServers

    Router

    SAP

    PSFT

    Siebel

    Web Services

    3rd PartyApplications

    Databases

    Mainframe

    Database

    Traditional Management Approach:

    Monitor the Infrastructure Necessary but not sufficient

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    9/92

    Introscope & Application PerformanceManagement

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    10/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 10

    Types of Performance Problems

    Transaction

    Server

    WebApplication

    Server

    SecurityAuthorization

    Server

    Database

    Which Oneis the Cause?

    HTTP Server

    To solve this

    requires a multi-dimensional approach

    Is it JDBC?

    TransactionsToo Slow?

    Security ServerBottleneck?

    ApplicationNot Scaling?

    Too ManyEJB Calls?

    CPUOverloaded?

    More TrafficThan Expected?

    App Server

    Configuration?

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    11/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 11

    WebServers

    App Server Database

    Servers

    SecurityServers

    BackendSystems

    CICS

    Customer complaining!

    Why Application PerformanceMonitoring?

    MQSeries

    Wheres the Problem?

    Application code?

    Hardware?

    Web App Server?

    Database Servers?

    Mainframes?

    Security Systems?

    Internet traffic?

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    12/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 12

    Wilys Business is Web Application Management

    (not just Java App Management)

    Our goal is to manage all business-critical transaction-oriented

    web applications for our customers

    Focused on Java initially because of its adoption

    Now extending to Microsoft .NET because of its rising popularity

    amongst our existing customers & future prospects

    Managing heterogeneous application

    environment will be our specialty

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    13/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 13

    Introscope product line

    Enterprise Application Management solution for mission critical

    production applications used by Global 3500 companies

    Monitors Java apps from insidethe JVM

    Monitors Microsoft .NET apps from insidethe Managed CLR

    environment

    Also monitors non-Java/.NET systems from the outside

    V1.0 shipped in 1999

    Currently shipping version V7.0 (GA in May 2006)

    600+ worldwide customers

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    14/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 14

    Transactions

    Network, Systemsand Servers

    ApplicationPlatforms andMiddleware

    Applications

    BusinessProcesses

    Application

    Performance

    Management

    CustomerExperience

    Management

    Customers

    Databases Authentication

    Wilys Customer Success Management Solution is

    supported by Introscope & CEM

    Real time monitoring from end-to-end for ALL transactions

    Correlate actual user experience with application performance Predict problems before customers are impacted

    Quickly triage problems to improve availability & performance

    Monitor and document SLA performance

    Collaborate across IT and the Business to insure customer success

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    15/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 15

    Customer Benefits

    End-to-end transaction visibility into all transactions,

    across the web infrastructure (Java or .NET) Proactive notification before SLAs are compromised

    Automatic discovery, monitoring, and triage for the

    application environment Deep visibility into each transaction across processes

    Capture 100% of performance data for SLA

    management, trend analysis, capacity planning Manage heterogeneous .NET and J2EE environments

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    16/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 16

    Pitfalls without 360 Stakeholder Management

    Lack of 24x7 in-depth visibility into the Application

    Reactive Management - using a crank whenproblems occur

    Overhead issues affect end-user performance

    Single console is not appropriate for collaborativemanagement

    Require usage of different tools throughout the life

    cycle Generally require a framework with many

    components

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    17/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 17

    Introscope provides a common Language for Various IT

    Stakeholders to Manage and Solve Problems Together

    Application Support

    Consistent, end-to-end view Evidence collection based

    on hard data

    Route problem to rightperson for fix

    App Developer

    Deep views into webapplication

    Component-level blame

    Pinpoint root cause

    Business-FacingApplication Owner Negotiate SLAs with Business

    Measure customer satisfactionand business processes

    Provide reports to Bus andOperations Management

    Operations

    24x7 live views ofapplication P&A

    SLA monitoring

    Proactive incident detection

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    18/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 18

    Applications

    What kind of customer problems do we solve?

    FirewallNetwork

    Switch

    LoadBalancer Portal

    IdentityManager

    End User

    Router

    SAP

    PSFT

    Siebel

    Web Services

    3rd PartyApplications

    Databases

    Mainframe

    Database

    Are customersaffected?

    Are 3rd partiesmeeting SLAs?

    How isdatabaseresponse?

    Are businessapps slow?

    What about theweb servers?

    Are transactionsfailing?

    Whatsmainframeresponse

    time?

    Web services down?

    Is authenticationserver slow?

    Can I find theproblem? Didwe record

    everything?

    WebServers

    This picture applies to both Java-only & .NET-only environments except theJava environments are probably slightly more complex

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    19/92

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    20/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 20

    and imagine what happens when you have aheterogeneous environment with BOTH Java and.NET Web Apps

    so are SOA-based .NET Web Applications

    Web Services

    SQL Server

    DirectoryServer

    MessagingServer

    Browser

    Transaction APPLICATION DOMAIN

    WINDOWS

    CLR

    Login ASP.NET ASP.NET

    Check QuoteASP .NET

    EnterprisesServices

    Directory Service

    .NET Messaging

    ASMX WebService Producer

    Web ServiceConsumer

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    21/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 21

    Heterogeneous App Environment is Exponentially

    More Complex

    .NET APP

    3rd Party Applications

    Mainframe

    J2EE APP J2EE

    WebServices

    .NET APP

    Databases

    Web Services

    SQL Server

    DB2

    MQ

    Web Services

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    22/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 22

    Unavailable or Slow

    Available, Performant

    .NET App

    Java App

    Messaging

    Database

    Mainframe

    Trans Server

    End-User App

    05:00 06:00 07:00 08:00 09:00 10:00 11:00 12:00 13:00 14:00 15:00 16:00

    99%

    99%

    99.9%

    99.9%

    99.999%

    99.9%

    80%

    % available

    Silo-Based Management Does Not Work

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    23/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 23

    Introscope PowerPacksDatabases, Web Services, Back-End Systems

    Availability, Performance, Errors, SLAs

    CANetwork, Database, Systems, Workload,

    3rd Party Applications

    IntroscopeAvailability, Performance,Failed TXs, Errors, SLAs

    Always-On RecordingTransaction Tracing

    IdentityManager

    FirewallNetwork

    Applications

    Switch

    LoadBalancer

    Portal

    SAP

    PSFT

    Siebel

    Web Services

    3rd Partyapplications

    End User

    Web Servers

    Databases

    Router

    CEMCustomer Experience,

    Transaction Success Rates,Failures, Errors, Defects,

    Scorecards, SLAs, Six SigmaBusiness Cost $$ and Impact

    Mainframe

    Database

    Wily Solution Overview

    Only Wily Gives You Deep Visibility into Java/.NET Apps from the

    INSIDEto Predict, Diagnose and Record Performance in Real-Time

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    24/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 24

    Introscope Highlights

    24 x 7 monitoring

    Incident detection & notification

    Rapid triage

    Root cause analysis

    Trend Analysis / Planning

    Wily is committed to enabling enterprises to put Java-based webapplications into production quickly, and to keep them there

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    25/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 25

    Introscope Highlights

    24 x 7 Monitoring: How is my systemperforming?

    Real-time view ofApplication performance

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    26/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 26

    Introscope Highlights

    Incident Detection & Notification: Tell me when theresan issue

    Online Purchasing

    Early indications of aproblem

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    27/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 27

    Online Purchasing

    Determine the exact

    problem component (e.g.slow DB call)

    Introscope Highlights

    Rapid Triage: Where exactly is the problem?

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    28/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 28

    Introscope Highlights

    Root-Cause Analysis: Whats causing theproblem?

    A completebreakdown of slowtransactions:

    For example: Many small DB calls =>Death by thousand paper cuts

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    29/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 29

    Introscope HighlightsTrend Analysis / Planning: Are we performing as well as 6 months ago?

    Historical views using livedashboards

    Every transaction is storedfor review

    Online Purchasing

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    30/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 30

    24 x 7 Monitoring Like an aircraft flight recorder its always on.

    Operates in Production as well as QA testing and Devenvironments with low single digit overhead.(1-3% in CPU Utilisation)

    Requires no changes to source code.

    Provides real-time and all historical performance data in the same

    interface.

    Works in any JVM and any J2EE Application Server.

    How does Introscope Work

    An Introduction

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    31/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 31

    How does Introscope Work

    What does it work with?Core Application Servers

    WebSphere Application Server (Versions 4.x to 6.x)

    Other Major Application Server Vendors And any others that use a JVM of JDK 1.2 or higher

    Additional Components

    Web Services

    MQ Series / Tuxedo

    Portals (WPS) 5.02 and above.

    Integration (WBI, WLI, SAP Enterprise Portal)

    Web Servers (Apache, IIS, etc.)

    And others including: (z/OS, Oracle Databases, etc.)

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    32/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 32

    AIX HP-UX Linux Solaris Windows OS/390 OS/400 z/OS

    JAVA APPLICATION

    APPLICATION SERVER

    Authentication

    PORTAL

    INTEGRATION

    Mainframe

    MQ Series

    SAP, Siebel, PSFT

    Web Services

    Databases

    ThirdParties

    Content

    JVM

    CICS / IMS / Tuxedo

    Response

    TransactionRequest

    Inside to Outside

    Internal JVM View with No Source Code Changes

    Inside-to-Outside

    Fine-Grained Production Monitoring

    ConnectorsWorkflow

    End-to-End

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    33/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 33

    Industry Standard Byte-Code Instrumentation

    Means Fast Time to Monitoring

    Wily BCI Approach validated byJava Community Wily code adopted into J2SE 1.5

    Instrumentation on the flymeans no coding required

    Wily Agent compatible with ANY

    JVM later than JDK 1.2 Sun, IBM, JRocket, etc.

    Application

    Object Code

    (.jar files, etc.)

    Instrumented

    Code

    loaded intomemory

    IntroscopeAutoProbeIntegration

    withJVM ClassLoader

    Wily DoesNOT modifysource code!

    ProbesInserted

    CLASS

    1010010111101010100100101010010100010110

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    34/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 34

    Non-Java /.NET

    Systems

    Managing Heterogeneous Apps with

    1 Single Tool and 1 Single User Interface

    Swingor

    BrowserWorkstations

    IntroscopeEnterpriseManager

    Alerts, Events andPerformance Data

    JVM

    Application Server

    J2EE Applications

    Java

    Agent

    Agent

    IntroscopeEPA

    Real-time,Historical, andPerformance

    Alerting

    HistoricalData

    App Health, SLAand Capacity

    Planning reports

    CLR

    .NET

    Applications.NETAgent

    IntroscopeAgents

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    35/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 35

    Monitors Java applications as soon as it is

    installedNo coding is needed Introscope automatically

    detects and monitors any

    J2EE Components EJBs

    Servlets

    JSPs

    JNDI

    JMS

    Advanced Metrics Concurrency

    Stalled Methods Instance Counts

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    36/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 36

    From the Browser

    - Browser Response Time Adaptor

    Browser response time from auser point of view

    100% real transactions, not apinger

    Associated customizabledashboards

    Answers these questions Is it our application or the

    network?

    Is the problem between the

    browser and the app server? What are average response times

    for this URL? This IP?

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    37/92

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    38/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 38

    to the messaging tier

    - For example: MQ Series

    MQ Series Server

    MQ Series Connectors

    WBI Adapters

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    39/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 39

    Analyze Failed Transactions with

    - ErrorDetector

    View detailedinformation abouterrors as soon asthey happen and

    improve end userexperience

    You need the ability to detect and diagnose the causes of serious errors,which can prevent individual users from completing web transactions

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    40/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 40

    ChangeDetector:

    What change affected my App?

    Graphic visualization of change events Files (text & binary)

    Archives & JAR files Classes loaded into the JVM System properties Oracle Database tables Configuration of connected subsystems (via EPA)

    Detailed change event analysis Change events visually displayed with

    performance metrics

    Type of change (addition, deletion, modification) Time of change Difference between versions (for text files) Hierarchical and historical views of changes Customized reporting

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    41/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 41

    Analyse Problematic Transactions

    - Transaction Tracer

    If Apps Average Responsefor Most Users is Fine

    How Do You Help theIsolated Incidents?

    HELP

    HELP

    Isolate problematic individual transactions

    Analyze and pinpoint bottleneck for each

    Improve overall app performance

    From Browser to Back-end

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    42/92

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    43/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 43

    LeakHunter

    - Eliminating Production Memory Problems

    App is DownAgain!!!

    Server Ran Outof Memory

    ManagementBy ForcedRestarts

    Restart App24 HoursLater

    Wily can help you1. Identify potential leaks

    inside production apps

    2. Pinpoint sources of leaksin app componentsand methods

    3. Monitor life of all Javaobjects in memory

    4. Isolate and remove leaksduring stress testing

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    44/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 44

    Memory Leak Detection and Diagnosis

    Introscope LeakHunter Monitors the most common

    production memory leaks java.util.Collections

    Instance Counts Monitor the life of all Java

    Objects in Memory Number of instances in memory at

    any given time

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    45/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 45

    Live AND Historical Views into Java Performance

    Data

    Introscope SmartStore HistoricalRepository captures all Metrics all the

    time. A Flight Recorder for your JVM

    Analysis of Historical Data available inWorkstation Client and via Reports

    Historical Data available for ANYIntroscope Metrics JVM Heap Usage

    CPU and other Resources

    AppServer Resources Java code performance

    Records 100% of performance data for problem solving, trend analysis and capacity planning

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    46/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 46

    AIX HP-UX Linux Solaris Windows OS/390 OS/400 z/OS

    JAVA APPLICATION

    APPLICATION SERVER

    Authentication

    PORTAL

    Content

    JVM

    Response

    TransactionRequest

    IT to Business

    Technical Data & Business Views

    IT to Business

    INTEGRATION

    Mainframe

    MQ Series

    SAP, Siebel, PSFT

    Web Services

    Databases

    Third

    Parties

    CICS / IMS / Tuxedo

    Connectors

    Workflow

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    47/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 47

    Alerts and Framework Integration Aid in

    Collaborative Application Management

    Flexible/Powerful Event Manager Console Alert Message

    Alert Emails

    Events to Systems FrameworkConsole

    Shell Script Actions

    Any combination of Events for eitherThreshold

    Easily Configurable Thresholds Caution and Danger Levels

    Configured in GUI Workstation

    Maximums or Minimums

    Available for Any Metric in System Response Times, Rates, Counts,

    Servlets, EJBs, Methods,

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    48/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 48

    Certify for:

    Expected service levels

    Memory usage

    Characterise runtimeload

    Establish problem

    process

    Where To Start ? At The Beginning ! :

    Development, QA And Production.

    Understand load

    behavior

    Early detection of

    scaling issues

    + =

    Production Hosting

    Ready-to-Use Dashboards

    Alerts that reflect real users

    No surprise scaling bugs

    No out-of-memory restarts

    Fewer roll-backs

    QA

    Development

    Staging

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    49/92

    Introscopes Blame Technology

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    50/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 50

    Flips Into BlameDrill Down

    RelativeTimeMovement

    +

    -

    -

    +

    Introscope Performance Blame

    Visualizing a Transaction

    Look for components down the hierarchy thatare color coded according to weight.

    Drills down is used in many views, such as theIntroscope Investigator and Transaction

    Tracer.

    Blame Technologyautomatically discovers

    the interactions betweencomponents.

    f l

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    51/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 51

    Flips Into BlameStackRelative Time Movement

    Introscope Performance Blame

    Visualizing a Transaction

    Look for the widest and deepest components when troubleshootingperformance bottlenecks. This topographical view is the default Transaction

    Tracer view.

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    52/92

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    53/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 53

    Remoting calls in separate servers

    Introscope Performance BlameVisualizing a Transaction Multiple Servers

    Introscope Performance Blame

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    54/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 54

    Transaction Tracershows the whole

    transaction from frontends to back end SQL

    interaction.

    Introscope Performance Blame

    Visualizing a Transaction Back End DB

    Introscope Performance Blame

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    55/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 55

    Transaction Tracerprovides multiple

    views of same data.

    Tree view providesquick drill down.

    Introscope Performance Blame

    Visualizing a Transaction Drill Down

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    56/92

    An Introduction To .NET Monitoring

    Overview

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    57/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 57

    Overview

    The (Microsoft) .NET version

    .NET Framework Class Library

    Windows

    Common Language Runtime (CLR)

    BrowserApps

    Rich ClientApps

    OtherApps

    Service-Oriented Apps

    WindowsForms

    EnterpriseServices

    ASP.NET

    ADO.NET

    MoreASMX,WSE, etc

    Product Architecture

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    58/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 58

    Non-Java

    Systems

    Product Architecture

    SwingOr

    Browser

    Workstations

    IntroscopeEnterpriseManager

    Alerts, Events &Performance

    Data

    JVM

    Application Server

    J2EE Applications

    Agent

    IntroscopeAgents

    Agent

    IntroscopeEPA

    Real-time,Historical, &Performance

    Alerting

    HistoricalData

    App Health, SLAand Capacity

    Planning reports

    CLR

    .NET apps

    .NetAgent

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    59/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 59

    How The .NET Agent Works

    IntroscopeEnterpriseManager

    Window OS

    Probes

    CLR

    ASP.NETWorker Process

    WebApplication

    .NETAgent

    .NETAgent

    A t d A li ti D i

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    60/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 60

    Agents and Application Domains

    Window OS

    CLR

    App Domain A

    App Domain B

    App Domain C

    .NETAgent

    .NETAgent

    .NET

    Agent

    In .NET framework,applications run in domains

    A separate Agent reports data foreach domain

    Thus the total count of

    reporting Agents equals: the count of defined application

    domains

    Agent in Default Domain doesnot link to EM

    Default Domain.NET

    Agent

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    61/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 61

    Request

    IIS Architecture

    Window OS

    InternetInformation

    ServerClientTier

    ASP.NETWorker Process

    ApplicationAApplication

    A

    IIS Worker Process Configuration Options

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    62/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 62

    IIS Worker Process Configuration Options

    Application Pool

    Worker Process

    ApplicationAApplication

    A Application

    B

    Worker Process

    App. A

    WP_1 WP_2

    1 2 3

    The .NET Agent Instrumentation Process

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    63/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 63

    The .NET Agent Instrumentation Process

    CLR Environment

    .NET Applications

    Windows OS

    COM Registry

    EnvironmentVariables

    Global AssemblyCache (GAC)

    1

    1. CLR Runtime checks for presence ofenvironment variables,Cor_Enable_Profiling and

    COR_PROFILER

    2. This info used as lookup key inCOM Registry to locateAutoProbeConnector

    3. The AutoProbeConnector loads theAutoProbe, also via lookup in COMRegistry

    4.AutoProbe locates the Agent in theGAC and loads it

    5. The Agent finds its profile fromenvironmental variables

    6. Each application is instrumentedaccording to PBDs

    23

    4

    .NETAgent

    5

    6

    AutoProbecomponents

    .NET

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    64/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 64

    .NET

    Features Of The .NET Agent

    The NET Metric Set

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    65/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 65

    The .NET Metric Set

    .NET Agent and Probe code ported over from Javaversion:

    Thus similar types of metrics measured for .NET applications Average Response Time, Concurrent Invocations, Errors PerInterval, Responses per Interval and Stall Count

    Compatibility with Introscope 7 Frontend/Backend scheme:

    Data reported about frontends, application health tracked inApplication Overview grid

    ADO.NET data layer tracked in Backends category

    .NET Agent supports tracking of Web Services layer

    The .NET Metrics In Investigator Tree

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    66/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 66

    The .NET Metrics In Investigator Tree

    Two types of Metrics: System-level Metric for ASP.NET process and CLR

    Application Metrics for each deployed web app

    { Application-specific Metrics

    For a Particular ASP.NET

    Application. System-level Metrics (CPU,CLR, ASP.NET process,etc) reported in PerfMon,GC Heap and Socketscategories

    Variations In The NET Metric Categories

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    67/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 67

    Variations In The .NET Metric Categories

    A number of differences between .NET and J2EEresource categories:

    SQLAgent-reporteddata appears underBackends category

    Backends >

    JDBC

    ASPX user-facingcomponents listed

    ASP.NETJSP, Servlets

    All Windows-reportedinfrastructure metricsappear here

    PerfMon | ProcessorCPU

    Notes.NET ApplicationJ2EE Application

    Frontend Metrics In .NET

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    68/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 68

    Frontend Metrics In .NET

    Listed under primary Frontends category Application URLs set in IntroscopeAgent.profile, or auto-

    discovered and placed under Default category

    ASPX Metrics

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    69/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 69

    ASPX Metrics

    Listed under ASP.NET category: Metrics reported here represent user-facing aspects of page as well

    as code-behind logic

    SQLAgent Metrics Reported in NET

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    70/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 70

    SQLAgent Metrics Reported in .NET

    Listed under primary Backends category Also support Boundary Blame, listed under Frontends | Apps

    | | Called Backends

    Web Services Monitoring

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    71/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 71

    Web Services Monitoring

    Web Services activitymonitored by Agent:

    Appears under Web Servicesresource category

    Data gathered for bothProducers and Consumers

    Aggregated data by category Individual performance of each

    Web Services component

    Transaction Traces Of NET Applications

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    72/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 72

    Transaction Traces Of .NET Applications

    Sampled Transaction Traces/Manually-launchedSessions fully supported

    Application Monitoring Resources

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    73/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 73

    Sample Management Module for.NET monitoring ships withSolution Pack Named .Net Sample

    Defines: Triage-oriented Metric Groupings and

    Alerts Detection and Triage Dashboards, and

    Application and Database DetailDashboards

    Web Services Resources

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    74/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 74

    .NET SampleManagement Module

    provides dashboards forWeb Services monitoring

    Overview Dashboard

    Triage Dashboards Consumer Health Producer Health

    The Introscope Solution Pack for .NET

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    75/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 75

    An management solution for enterprise applicationsrunning on the .NET platform

    Supports .NET 1.1 and 2.0

    Includes the following Introscope components: Introscope .NET Agent

    Introscope .NET Probebuilder Introscope .NET Autoprobe

    Introscope .NET SQL Agent Extension

    Introscope 7.0 System (Enterprise Manager, Workstation &

    WebView) PowerPack for .NET CLR

    Web Services Manager for Microsoft .NET

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    76/92

    Customer Experience Manager (CEM)

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    77/92

    What Problems Does CEM address

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    78/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 78

    Shift to web based apps Quick time to market, increased importance and reliance

    Increased complexity N-tier environments, access from anywhere anytime

    Seas of data Overwhelmed by various alarms and health information

    Inaccurate, inconsistent data IT reports all is well, yet users are complaining

    Wasting resources Constant mis-diagnosis, false positives, finger-pointing, rewor

    Do more with less Pressure to reduce operating costs and improve quality of serv

    PROBLEM Inconsistent performance of business applications

    PROBLEM Lack of understanding of the business impact of an incident

    PROBLEM The time & resources to identify, isolate, and solve customer

    Web-Tier Application-Tier Database-Tier Mainframe-Tier

    What does CEM do

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    79/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 79

    Measures the success of customer transactions in real-tim

    Customers = customers, employees, agents, etc.

    Transactions = login, acct summary, place order, etc.

    Success = 0 defects, meeting expectations

    Performance and quality analysis

    Identifies defects and variance

    Correlation of defects into incidents

    Calculates the business impact $$ of incidents

    Triggers immediate action to isolate incident cause

    Creates unique customer information (current and historical)

    Customer Experience Manager (CEM)

    CEM Real-time, Distributed Architecture

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    80/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 80

    Web Tier

    Database Tier

    App Tier

    SwitchesRouters Firewalls

    LDAP

    Transaction Impact Monitor(s)

    (Transaction Impact AnalysisTM)

    TESS

    Transaction Event and Statistics Server

    Intranet / Internet

    CEM Architecture

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    81/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 81

    Low Risk, Zero Overhead

    Management InterfaceRequires IP Address

    ManagementVLAN

    Production

    Out-of-path

    Mirrored Port for XX Application WebVLAN (i.e. Cisco SPAN Port)

    ApplicationTier

    Database

    Tier

    Web

    Tier

    FirewallRouter

    Network

    Customers

    Monitor InterfaceNo IP Address

    Switch LoadBalancer

    MainframeTier

    Management InterfaceRequires IP Address

    TIMTransaction Impact

    Monitor (TIM)

    TESS

    Transaction Eventand StatisticsServer (TESS)

    Real-time copy of production customer traffic

    Mirrored port of the application VLAN

    Core Ethernet Switch, Load Balancer, Network TAP

    CEM - Deployed

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    82/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 82

    CEM

    Production

    Out-of-path

    Identifies and Measures Customer Transactions

    Behavior and Content Defect Detection

    Correlation of Defects into Incidents

    Business Prioritization and $$ Impact Analysis

    Evidence Collection of Infrastructure State(performance, utilization, configuration, logs)

    Incident Forwarding into Existing Systems and Procedures

    Unique Customer Transaction Repository

    (Current and Historical Reporting, Scorecards, Analytics)

    Bob WrightProcess OrderSlow Transaction Time = 22.8s06.01.05 8:59:48am

    CEM Incident:

    Process Order

    Slow Time > 5.0s

    256 Customers, 22 Premier

    Time: 06.01.05 8:59am

    Duration: 35minutes Incident cost: $278,00

    Evidence Collection:

    Network, Web, App, DB,MF

    Monitor InterfaceNo IP Address

    Mirrored Port for XX ApplicationWeb VLAN (i.e. Cisco SPAN Port)

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    83/92

    CEM - Focus on What is Important

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    84/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 84

    Transaction Discovery

    Get above the noise

    Define once, monitor everywhere

    Transaction discovery options

    Standard transaction recorder (browser based)

    Advanced transaction recorder (TIM based)

    Script translation recorder(Convert Mercury scripts, packet captures, etc.)

    Not impacted by application UI changes

    Transaction order structure

    CEM

    Business Processes Group of Business Transactions Siebel Order Provisioning

    Business Transactions Series of pages Login

    Transactions Page Execute Login (SWE) & 14 others Components URLs JavaScript, style sheets, etc.

    NOTE: In most J2EE applications a Business Transition and a Transaction are the same

    CEM Transaction Discovery

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    85/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 85

    Recorders

    Used in the One Time Define process Record users executing transactions one time

    Create generalized signatures Deploy to TIM(s) to monitor all users

    Simple Recorder - IE browser helper object

    Advanced Recorder runs on TIM(s)

    Transaction Import Utility reads: HTTP packet capture files (no SSL)

    Mercury VuGen log files

    Networking & Security

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    86/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 86

    CEM secure platform CEM has no IP address on the monitored network

    CEM only needs an IP address on the Management VLAN

    CEM stores copies of the web server SSL keys more securely than web

    servers

    No IP address on the monitored network

    Encrypted using AES

    Does NOT terminate sessions

    CEM stores NO private information about customers

    Gets packets, analyzes them for behavior and response, throws them away

    Stores meta data about transactions (time, size, throughput, etc.), NOT the

    transactions

    Stores NO personal information (passwords, SSN, account balances, etc.)

    CEM monitors transaction performance and quality, NOT user behavior

    CEM Real-time, Distributed Architecture

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    87/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 87

    Web Tier

    Database Tier

    App Tier

    SwitchesRouters Firewalls

    LDAP

    Transaction Impact Monitor(s)

    (Transaction Impact AnalysisTM)

    TESS

    Transaction Event and Statistics Server

    Intranet / Internet

    CEM - Focus on What is Important

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    88/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 88

    Transaction Recorder

    Get above the noise

    Simple, easy, one-time definition

    Transaction discovery options

    Standard transaction recorder

    Advanced transaction recorder

    Script import utility (Mercury, etc)

    Not impacted by changes Transaction order structure

    Business Processes Siebel Order Provisioning Business Transactions Login

    Transactions Execute Login (SWE) & 14others

    9 Components Scripts

    CEM Platform

    (Transaction Impact AnalysisTM)

    CEM

    CEM Solution Components

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    89/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 89

    Transaction Impact Monitor (TIM)

    Runs Transaction Impact AnalysisTM

    Transaction Events and Statistics Server (TESS)

    Runs CEM software suite

    CEM Software Suite Customer Impact Module

    Incident Resolution Module

    Gateway Services Module

    Customer Analytics API

    Transaction Discovery

    OpenAP

    I

    Transaction Impact Monitor(Transaction Impact AnalysisTM)

    Transaction Events and Statistics Server

    TESS

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    90/92

    Wily Product Demo

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    91/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 91

    For The Introscope & CEM Demo,

    please visit our stand.

  • 8/12/2019 WILY, Managing Critical Applications With Wily Introscope, Robert Dring

    92/92

    Copyright 2006 CA and Wily Technology, Inc. All Rights Reserved. 92

    Q&A

    Any Questions ?