1 / 6

Polaris Financial Technologies Welcomes the members of Hyderabad chapter

Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice). Virtualization.

bevis
Download Presentation

Polaris Financial Technologies Welcomes the members of Hyderabad chapter

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4th July 14 held by PACE (The Testing Practice)

  2. Virtualization Server virtualization means partitioning a single server to appear as multiple servers. Hypervisor is responsible for creating, releasing, and managing the resources of "guest" operating systems, or virtual machines. Capacity planning is the art of looking at trends in performance data to predict future capacity needs and then building provisioning strategies around that data.APM complements capacity planning. Virtualization of the database enables compute and storage resources to be pooled and allocated on demand which provides increased flexibility, more granular and efficient allocation of pooled resources, and more scalable computing In APE, network virtualization enables emulation of connections between applications, services, and end users for testing Application virtualization layers replace part of the runtime environment normally provided by the operating system. These solutions are widely adopted by enterprises so that its users can securely connect to corporate applications from any device. But, While access management is simplified and device independence is enabled, IT managers lose all ability to assess the quality of service end users are experiencing. VirtualizingStorage randomizes sequential I/O which cause a lag in performance. APE should develop scenarios to optimize this performance

  3. Performance Management – Evolution Systems Resource Monitoring APM (Application + System) Agent based SNMP Agent less Heterogeneous Sniffing with Analytics Wire Data (Performance Metrics) Machine Data (Performance Metrics)

  4. Monitoring Techniques – brief • Simple Network Management Protocol (SNMP) • Is part of TCP/IP suite • Operates in the Application Layer – acts as an agent • Management Information Bases (MIBs) are data collectors • MIBs consists of object IDs • Each OID identifies a variable that can be read or set via SNMP • Key SNMP Protocol Data Units • GetRequest – (manager-to-agent) to retrieve the value of a variable or list of variables • SetRequest – (manager –to – agent) to change/modify the value of a variable • Trap – (agent –to – manager) to send notifications from • Agent based – • System Monitoring agents run on a system to be monitored • Implementation is limited to computer systems • Agent either runs as an start-up application (or) service • RPC over TCP/IP is one of the communication medium • Agents invokes local OS commands to collect metrics • Collected metrics are saved into proprietary file formats • Agent less • An intrusive monitoring system • OS commands are packaged into predefined templates • Telnet/SSH/Java RMI/WCF (xml) are used as medium to invoke commands and collect metrics

  5. Monitoring Techniques – brief • Heterogeneous – • Combination of top-down (i.e. application ) & bottom up (i.e. system ) approach • Two sets of performance metrics are monitored • End User experience – (Active and passive) in terms of Availability and Response Times, compared to different locations and user loads • Active monitoring (aka Synthetic Monitoring) is done by executing automated (scripted) business process flow on an agent • Passive monitoring is usually an agent less appliance implemented using network port mirroring • Performance of Application components and system resources • Runtime Application Architecture – CMDB compliant • Application Discovery and Dependency Mapping (ADDM) solutions exist to automate the process of mapping transactions and applications to underlying infrastructure components • Application component monitoring (Diagnostics tools) • Agent based and is generally targeted in the middleware space focusing on the application, and messaging servers. • Provides a real time view of the J2EE and .NET stacks, tying them back to the user defined business transactions. • Shows a clear path from a code execution standpoint (e.g., springs, struts, etc.), to the URL rendered, to the user request. • Wire Data • What is Wire Data – is it polling or trolling? • A scripted SNMP or Agent or Agent-less process for metrics collection is “polling” • A passive network monitoring to observe performance issues as they occur on network is “Trolling” • Polling is like “do you see performance issues” • Where as Trolling is “I see performance issues”

  6. Thank you !!! The theme and the information is sourced from the below link – http://www.virtualizationpractice.com/going-replace-legacy-management-frameworks-23286/

More Related