Abstract:
Systems, methods, and other embodiments associated with modifying applications and monitoring exceptions are described. In one embodiment, a computer implemented method searches an executable code for code representing a database procedure call within the executable code. At a location in the executable code prior to the database procedure call, exception capturing code is inserted into the executable code that is configured to cause information to be collected about an exception when the exception occurs during execution of the database procedure call. After the database procedure call, termination code is inserted in the executable code, wherein the termination code is configured to terminate the collection of the information caused by the exception capturing code.
Abstract:
Event counter checkpointing and restoring is disclosed. In one implementation, a processor includes a first event counter to count events that occur during execution within the processor, event counter checkpoint logic, communicably coupled with the first event counter, to store, prior to a transactional execution of the processor, a value of the first event counter, a second event counter to count events prior to and during the transactional execution, wherein the second event counter is to increment without resetting after the transactional execution is aborted, event count restore logic to restore the first event counter to the stored value after the transactional execution is aborted, and tuning logic to determine, in response to aborting of the transactional execution, a number of the events that occurred during the transactional execution based on the stored value of the first event counter and a value of the second event counter.
Abstract:
According to one embodiment of the present invention, a system compares database transactions to corresponding performance information to identify conforming database transactions with an acceptable deviation from the performance information and outlier database transactions beyond the acceptable deviation from the performance information. The system aggregates information from a threshold quantity of conforming database transactions into an aggregated record, wherein the threshold quantity is dynamically adjusted, and generates a record for each outlier database transaction, wherein conditions for identifying the outlier database transactions are dynamically adjusted. Embodiments of the present invention further include a method and computer program product for managing database transactions in substantially the same manners described above.
Abstract:
A transaction monitoring and tracing system which combines transactional performance monitoring aspects with infrastructure performance and utilization measures, like e.g. used memory or CPU load of transaction executing computing infrastructure. The system uses two types of agents deployed to the monitored system, a transaction and process agent, which is deployed to a process executing monitored transactions, and a host agent, which is deployed to a computer system executing processes monitored by a transaction and process agent. The transaction and process agent provides transaction tracing and process infrastructure measurements, the host agent provides host or operating system infrastructure measurements. All three types of measurements are tagged by the corresponding agent in a way that allows a later correlation of corresponding tracing and measurement data by an external monitoring node. Combining transactional and infrastructure monitoring allows fast detection of non-transactional root causes of monitored transaction performance degradations.
Abstract:
A tied server includes a first storage unit that stores appearance patterns of messages having a transaction identifier to identify a transaction. The tied server also includes a second storage unit that stores messages executed on the transaction DB server having the transaction ID by the application server and communicated between an application server and a DB server. The tied server classifies the messages stored in the second storage unit with respect to each transaction based on the appearance patterns of the messages stored in the first storage unit.
Abstract:
A method of one aspect may include storing an event count of an event counter that counts events that occur during execution within a logic device. The method may further include restoring the event counter to the stored event count after the event counter has counted additional events. Other methods are also disclosed. Apparatus, systems, and machine-readable medium having software are also disclosed.
Abstract:
A computer collects first test metrics on a transaction hosted within a middleware container, and is executing within a first environment. The computer generates baseline values of expected execution behavior of the transaction based on the first test metrics. The computer collects second test metrics on the transaction hosted within the middleware container, and is executing within a second environment. The computer compares the second test metrics to the baseline values. The computer determines whether the second test metrics satisfy the baseline values. In response to the second test metrics not satisfying the baseline values, the computer identifies the transaction as a candidate for cancellation.
Abstract:
A method that includes monitoring, by a computing device including a processor, transaction activity level of a plurality of pre-defined IT transactions, and determining, by the computing device, that an IT outage has occurred when the activity level is below a threshold.
Abstract:
A method for generating a directed graph for a transaction in an application, comprising: receiving event information for events included in the transaction at a processor, each event having a link directed from a first endpoint to a second endpoint in the application; assigning an identification (“ID”) number to each event and including the ID number in the event information for each event; based on endpoint, correlating the event information to produce dyadic event information representative of dyadic events, each dyadic event including a first event and a second event associated with the endpoint, the dyadic event information for each dyadic event including a first ID number and a second ID number for the first event and the second event, respectively; based on ID number, combining the dyadic event information to produce correlation fragments associated with the ID number; and, combining the correlation fragments to produce the directed graph for the transaction.
Abstract:
A computer program product includes a computer readable storage medium containing computer code that, when executed by a computer, implements a method including receiving, by a memory device of the computing system, a log file, the log file comprising unsummarized metrics, the unsummarized metrics being related to a plurality of transactions performed by a program in the computing system, and a summarized metric, the summarized metric being related to the program, wherein the summarized metric comprises accumulated data from the plurality of transactions; selecting an unsummarized metric that reflects a distribution of the summarized metric among the plurality of transactions by a processing device of the computing system; and determining an amount of the summarized metric that belongs to a transaction of the plurality of transactions based on the selected unsummarized metric by the processing device of the computing system.