Presentation is loading. Please wait.

Presentation is loading. Please wait.

Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)

Similar presentations


Presentation on theme: "Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)"— Presentation transcript:

1 Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)

2 Computer Measurement Group, India 2 Virtualization (Multi-tenancy enabler) Server Virtualization Network Virtualization Storage Virtualization Application Virtualization Database Virtualization In APE, network virtualization enables emulation of connections between applications, services, and end users for testing Virtualizing Storage randomizes sequential I/O which cause a lag in performance. APE should develop scenarios to optimize this performance Virtualization of the database enables compute and storage resources to be pooled and allocated on demand which provides increased flexibility, more granular and efficient allocation of pooled resources, and more scalable computing Server virtualization means partitioning a single server to appear as multiple servers. Hypervisor is responsible for creating, releasing, and managing the resources of "guest" operating systems, or virtual machines. Capacity planning is the art of looking at trends in performance data to predict future capacity needs and then building provisioning strategies around that data.APM complements capacity planning. Application virtualization layers replace part of the runtime environment normally provided by the operating system. These solutions are widely adopted by enterprises so that its users can securely connect to corporate applications from any device. But, While access management is simplified and device independence is enabled, IT managers lose all ability to assess the quality of service end users are experiencing.

3 Computer Measurement Group, India 3 APM (Application + System) Systems Resource Monitoring Performance Management – Evolution SNMP Agent based Agent lessHeterogeneous Sniffing with Analytics Machine Data (Performance Metrics) Wire Data (Performance Metrics)

4 Computer Measurement Group, India 4 Monitoring Techniques – brief 1.Simple Network Management Protocol (SNMP)  Is part of TCP/IP suite  Operates in the Application Layer – acts as an agent  Management Information Bases (MIBs) are data collectors  MIBs consists of object IDs  Each OID identifies a variable that can be read or set via SNMP  Key SNMP Protocol Data Units  GetRequest – (manager-to-agent) to retrieve the value of a variable or list of variables  SetRequest – (manager –to – agent) to change/modify the value of a variable  Trap – (agent –to – manager) to send notifications from 2.Agent based –  System Monitoring agents run on a system to be monitored  Implementation is limited to computer systems  Agent either runs as an start-up application (or) service  RPC over TCP/IP is one of the communication medium  Agents invokes local OS commands to collect metrics  Collected metrics are saved into proprietary file formats 3.Agent less  An intrusive monitoring system  OS commands are packaged into predefined templates  Telnet/SSH/Java RMI/WCF (xml) are used as medium to invoke commands and collect metrics

5 Computer Measurement Group, India 5 Monitoring Techniques – brief 4.Heterogeneous – Combination of top-down (i.e. application ) & bottom up (i.e. system ) approach Two sets of performance metrics are monitored End User experience – (Active and passive) in terms of Availability and Response Times, compared to different locations and user loads  Active monitoring (aka Synthetic Monitoring) is done by executing automated (scripted) business process flow on an agent  Passive monitoring is usually an agent less appliance implemented using network port mirroring Performance of Application components and system resources Runtime Application Architecture – CMDB compliant  Application Discovery and Dependency Mapping (ADDM) solutions exist to automate the process of mapping transactions and applications to underlying infrastructure components Application component monitoring (Diagnostics tools)  Agent based and is generally targeted in the middleware space focusing on the application, and messaging servers.  Provides a real time view of the J2EE and.NET stacks, tying them back to the user defined business transactions.  Shows a clear path from a code execution standpoint (e.g., springs, struts, etc.), to the URL rendered, to the user request. 4.Wire Data What is Wire Data – is it polling or trolling? A scripted SNMP or Agent or Agent-less process for metrics collection is “polling” A passive network monitoring to observe performance issues as they occur on network is “Trolling” Polling is like “do you see performance issues” Where as Trolling is “I see performance issues”

6 Computer Measurement Group, India 6 Thank you !!! The theme and the information is sourced from the below link – http://www.virtualizationpractice.com/going-replace-legacy-management-frameworks-23286/


Download ppt "Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)"

Similar presentations


Ads by Google