Abstract:
An application monitoring system determines the health of one or more resources used to process a transaction, business application, or other computer process. Performance data is generated in response to monitoring application execution and processed to determine and an actual and baseline value for resource usage data. Resource usage baseline data may be determined from previous resource usage data associated with a resource and particular transaction (a resource-transaction pair). The baseline values are compared to actual values to determine a deviation for the actual value. Deviation information for the time series data can be reported through an interface or some other manner.
Abstract:
Systems and methods are disclosed for power management in information handling systems using processor performance data to validate changes to processor performance states. Processor utilization data and processor performance data is obtained during system operation. The processor utilization data is analyzed to determine a desired performance state for the processor. Before setting the actual performance state of the processor to this desired performance state, however, processor performance data is analyzed to determine if prior changes to the performance state have been effective. The performance state of the processor is then changed are maintained based upon this additional performance verification analysis.
Abstract:
Techniques for constructing and using models in accordance with service level management are disclosed. In one aspect of the invention, a technique for constructing a model (e.g., a system model) representative of a resource for use in managing a service associated with the resource, comprises the following steps/operations. A set of resource metrics is obtained in accordance with a resource abstract model (RAM) associated with the resource. Then, a model representative of the resource is constructed based on at least a portion of the set of resource metrics obtained from the resource abstract model.
Abstract:
A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time.
Abstract:
A method for modeling performance of an information technology system having one or more servers for serving a number of types of transactions includes modeling a service time of each transaction type at each server and a processor overhead at each server as one of a polynomial, exponential, or logarithmic function of the average arrival rate of each transaction type at the corresponding server to generate service time and processor overhead functions and inferring optimal values of coefficients in the service time and processor overhead functions to generate a performance model of the information technology system.
Abstract:
A system analysis apparatus includes a message reconstruction module which reconstructs observed data and data of which the observation has failed, into messages regarding a request and a response which are communicated on a system. The apparatus includes a message candidate extraction module which compares message rules with the reconstructed messages, and extracts messages in the message rules which are identical to the reconstructed messages, from the messages defined in the message rules, as message candidates. The apparatus includes a call relationship extraction module which extracts a call relationship between the message candidates. The apparatus includes a matching module which compares transaction models in which processes in units of transactions on the system have been modeled on the basis of call relationships among the processes on the system, with the extracted call relationship, and selects and determines a transaction model identical to the call relationship.
Abstract:
A method of dynamically generating profiling data using runtime non-intrusive profiling of application transactions which are contained in containers such as web servers, application servers, portal servers and J2EE/ECM containers, includes the following steps: using common resources of memory and environment for both profiling activity and application transactions; remotely executing project specific profiling administration and configuration; using the executed project specific profiling administration and configuration and completing remote profiling, and generating profiling data by taking assistance selectively from Aspect Oriented Programming, and Application Response Measurement; and, selectively using the profiling data to analyze performance bottlenecks and do auditing as needed by a user. The profiling is done by capturing metrics based on accepted standards, partially using the same memory as for the application transactions, without code-contamination in the containers and can be done layer-wise, tier-wise or at method level. A computer readable medium encoded with the method is included.
Abstract:
A method for tracing thread bus transactions in a multiprocessor system comprises decoding, by a processor, a first thread instruction of a thread, the thread comprising an ordered series of thread instructions. In the event the first thread instruction is a set bus trace enable bit (BTEB) instruction, the processor sets a bus trace enable bit corresponding to the thread. In the event the BTEB is set, the processor determines whether the first thread instruction is a trace-eligible instruction and, in the event the first thread instruction is a trace-eligible instruction, and the BTEB is set, the processor sets a snoop tag trace enable bit (STTEB). A hardware trace monitor (HTM) monitors bus transactions, each bus transaction comprising a STTE. In the event a monitored bus transaction comprises a set STTEB, the HTM stores the bus transaction as trace data. In the event a monitored bus transaction comprises a reset STTEB, the HTM does not store the bus transaction as trace data.
Abstract:
During a technique for estimating a scalability breakpoint of a software product, performance load tests of the software product are performed with different numbers of simulated concurrent users. For a given number of simulated concurrent users, a performance load test may include an associated set of transactions that are executed by the software product. Furthermore, during the performance load tests performance metrics for the transactions in the associated sets of transactions are measured. Then estimated total performance metrics for the transactions in the associated sets of transactions for the different numbers of simulated concurrent users are determined based on the measured performance metrics and the associated sets of transactions. Next, using the determined estimated total performance metrics, the estimated scalability breakpoint is calculated.
Abstract:
An automated method is provided for constructing or updating a service model that defines the entities in an enterprise's computing environment. The method includes: defining a group of templates for updating the service model, where the group of templates identify different types of entities which comprise the service model and relationships between the types of entities including an entity that links software applications to respective computing infrastructure that supports the software applications; monitoring messages received from monitoring tools residing in the computing environment; and updating a service model in accordance with the group of templates using data encapsulated in the messages.