SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
2 © 2014 CA. ALL RIGHTS RESERVED.
Agenda
 Why so many metrics with APM?
– “Big Data”?
 What we are learning with CA-ABA (analytics)
 How to find KPIs
 What’s new for CA-APM 9.6 Release
3 © 2014 CA. ALL RIGHTS RESERVED.
Typical APM Cluster
 Dozens to hundreds of applications
– 2800 JVMs/CLRs
 Up to 5M metrics, every 15 seconds
 Large applications span multiple data centers
– 2-8 APM clusters, typical
– 30-70 EM Collectors for a nationwide portal application
 12M to 28M metrics, every 15 seconds
… certainly sounds like big data!!!
4 © 2014 CA. ALL RIGHTS RESERVED.
What is Big Data???
APM information is “big”… but it is not “big data” without enrichment
5M Metrics
that you don’t fully
understand
OR
5M Metrics
that you don’t
fully understand
Trouble
Management
Version
Control
Time of ____
Constraints
Air Traffic
Advisories
Weather
Forecast
AP News
Updates
Marketing
Campaigns
E N R I C H M E N T
Correlation
Trends
Insights
Anomalies
5 © 2014 CA. ALL RIGHTS RESERVED.
Challenges for Big Data
 Data Variety – different sources gives different perspectives.
Does your data have a significant perspective?
 Validation – is the data source meaningful/predictive?
 Consistency – are the values trustworthy?
 Data Structure and Nomenclature – Mapping, Transformation
 Temporal Impedance Mismatch
– APM: real-time with 15 second reporting interval
– Trouble Management: +15-30 minutes later
– Stock Ticker: +15-30 minutes later
– Air Traffic Advisories: +30-60 minutes later
– Version Control: days to weeks in advance
– Marketing Campaign Assessment: 2-4 weeks later
6 © 2014 CA. ALL RIGHTS RESERVED.
KPI Management Maturity
SGCM:
Stalls,
GC Settings,
Concurrency,
Memory Management Trends
APC :
Availability,
Performance,
Capacity
EKB:
Errors,
Key Resource Performance,
Business Transaction Survey
VALUE
KPI MATURITY
(Platform) (Application) (Transaction)
What We are Learning with CA-ABA
ABA Logical Architecture
APM Cluster
5M Metrics
100k
Metrics
(via RegEx)
Anomaly Engine
Anomalies Alerts
Why only 100k Metrics???
Why not 5M???
RegEx == Regular Expression
 analytics.metricfeed.process.3 =
 Custom Metric Host (Virtual) |Custom Metric Process
(Virtual)|Custom Business Application Agent (Virtual)
 analytics.metricfeed.metric.3 =
 By Business Service|[^|]+|[^|]+|[^|]+:.+
RegEx is hard… but easy to validate
Metricfeed.3
0
20
40
60
80
100
120
140
160
180
200
Series1
metricfeed.3
Broader collection of metrics but only 87/500 == 17.4% are
generally known as useful
Suspects Identified via Baseline Technique
SiteMinder Backends JSP Frontends JMX Custom
0
2
4
6
8
10
12
14
16
18
Series1
Suspects via Baseline Techniques
Average RT only
100% Useful metrics, ready for validation: 47/43625 == 0.1%
Metric Count TypeView
What is an Application?
 Front-ends
– Browser? Webservice? Messaging?
 Back-ends
– Databases Webservices Messaging Mainframes Trading_Partners
 Muck-in-the-Middle
– Software quality, stability and scalability
 - We want to identify KPIs for each of these elements
– - helps us build a useful dashboard for Operations
– - helps expose with the resources are really doing
– - helps us define acceptance criteria, to act proactively
– - helps us to triage really effectively
How to Find KPIs
Capacity KPIs – “Tree Rings”
Performance KPIs
High Volume
+
Significant Response Time
Create a Simple Alert and Threshold
(ConnectionStatus)
Create a Simple Alert, Find Restart and threshold
(MetricCount)
“UP” – but not actually doing anything!!!
Understanding Your Environment
 Identify the KPIs
– Availability
 Agent ConnectionStatus
 Number Live Metrics (Metric Count)
– Performance
 High Volume components with significant response time
– NOT “Top 10 Response Time”
– Capacity
 Highest Volume Components
 Don’t Wait for Production!!!
– Make it part of your pre-production review
– Manage the application lifecycle by trending KPIs
Good Better (additional) Best (additional)
Stalls Availability – Connected
Status
Errors
GC Settings Availability - Metric
Count
Key Resource
Performance
Concurrency Suspect Performance Business Transaction
Survey
Memory Management
(graph)
Suspect Capacity
Platform
Coarse information
..but not really APM
Application, Transactions, Resources
The APM Advantage
KPI Evolution
What’s New in CA APM 9.6
Simplified, automated, and built on CA APM strengths.
Seamless Mainframe Awareness
Faster, Easier APM
• Intelligent Deep Transaction Trace is now dynamic, automated, and requires less developer
involvement for deep dives into apps supporting the transactions
• Simplified Triage with easier drill down with Application Triage Map including Socket Grouping
• Improved response times with software based Transaction Impact Monitor (end-user experience)
• Expanding APMs scope with Java 7 EM & Agents
• Increased insight by adding DB2 details to transaction traces
• Greater awareness with CA SYSVIEW MQ alerts & complete status in APM
• Driving further cross enterprise depth with CTG traces to fully expand backend calls
• Other mainframe based enhancements
Preparing to Upgrade
 HealthCheck the existing cluster prior to any upgrade
 Good:
– - Do a clean install of the APM Cluster, alongside of the existing cluster version.
 - Manually duplicate management modules, domains.xml, etc.
 - Bring down the old version, then bring up the new
 Better:
– - Install the new version in a separate environment, reduced size
– - migrate a few applications to the new environment for validation
– - upgrade the primary environment after validation achieved
 Best:
– - Install a new GOLD environment in production, separate from original cluster
– - migrate agents, as schedules permit, until original cluster may be
decommissioned
– - this provides an opportunity to introduce pre-production review and generally
correct any bad deployment habits
Resources
 APM Community Site (
https://communities.ca.com/web/ca-wily-global-user-community
– - Cookbook: APM HealthCheck
– - Understanding Which Metrics Matter (KPI discussion)
– - Cookbook: Application Audit
 - more details on the baseline techniques and process
 APM best practices – Realizing Application Performance Management
– available on Amazon.com and Apress.com
 - Baselines, Test Plans, App Audits, Triage, Firefighting
 - Organizational Models, Service Catalogs
 APM Web Page : Ca.com/apm

Mais conteúdo relacionado

Mais de CA Technologies

Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 

Mais de CA Technologies (20)

Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Redefine Triage by Learning the Golden Nuggets of APM

  • 1.
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Agenda  Why so many metrics with APM? – “Big Data”?  What we are learning with CA-ABA (analytics)  How to find KPIs  What’s new for CA-APM 9.6 Release
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Typical APM Cluster  Dozens to hundreds of applications – 2800 JVMs/CLRs  Up to 5M metrics, every 15 seconds  Large applications span multiple data centers – 2-8 APM clusters, typical – 30-70 EM Collectors for a nationwide portal application  12M to 28M metrics, every 15 seconds … certainly sounds like big data!!!
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. What is Big Data??? APM information is “big”… but it is not “big data” without enrichment 5M Metrics that you don’t fully understand OR 5M Metrics that you don’t fully understand Trouble Management Version Control Time of ____ Constraints Air Traffic Advisories Weather Forecast AP News Updates Marketing Campaigns E N R I C H M E N T Correlation Trends Insights Anomalies
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Challenges for Big Data  Data Variety – different sources gives different perspectives. Does your data have a significant perspective?  Validation – is the data source meaningful/predictive?  Consistency – are the values trustworthy?  Data Structure and Nomenclature – Mapping, Transformation  Temporal Impedance Mismatch – APM: real-time with 15 second reporting interval – Trouble Management: +15-30 minutes later – Stock Ticker: +15-30 minutes later – Air Traffic Advisories: +30-60 minutes later – Version Control: days to weeks in advance – Marketing Campaign Assessment: 2-4 weeks later
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. KPI Management Maturity SGCM: Stalls, GC Settings, Concurrency, Memory Management Trends APC : Availability, Performance, Capacity EKB: Errors, Key Resource Performance, Business Transaction Survey VALUE KPI MATURITY (Platform) (Application) (Transaction)
  • 7. What We are Learning with CA-ABA
  • 8. ABA Logical Architecture APM Cluster 5M Metrics 100k Metrics (via RegEx) Anomaly Engine Anomalies Alerts Why only 100k Metrics??? Why not 5M???
  • 9. RegEx == Regular Expression  analytics.metricfeed.process.3 =  Custom Metric Host (Virtual) |Custom Metric Process (Virtual)|Custom Business Application Agent (Virtual)  analytics.metricfeed.metric.3 =  By Business Service|[^|]+|[^|]+|[^|]+:.+
  • 10. RegEx is hard… but easy to validate
  • 11. Metricfeed.3 0 20 40 60 80 100 120 140 160 180 200 Series1 metricfeed.3 Broader collection of metrics but only 87/500 == 17.4% are generally known as useful
  • 12. Suspects Identified via Baseline Technique SiteMinder Backends JSP Frontends JMX Custom 0 2 4 6 8 10 12 14 16 18 Series1 Suspects via Baseline Techniques Average RT only 100% Useful metrics, ready for validation: 47/43625 == 0.1%
  • 14. What is an Application?  Front-ends – Browser? Webservice? Messaging?  Back-ends – Databases Webservices Messaging Mainframes Trading_Partners  Muck-in-the-Middle – Software quality, stability and scalability  - We want to identify KPIs for each of these elements – - helps us build a useful dashboard for Operations – - helps expose with the resources are really doing – - helps us define acceptance criteria, to act proactively – - helps us to triage really effectively
  • 15. How to Find KPIs
  • 16. Capacity KPIs – “Tree Rings”
  • 18. Create a Simple Alert and Threshold (ConnectionStatus)
  • 19. Create a Simple Alert, Find Restart and threshold (MetricCount) “UP” – but not actually doing anything!!!
  • 20. Understanding Your Environment  Identify the KPIs – Availability  Agent ConnectionStatus  Number Live Metrics (Metric Count) – Performance  High Volume components with significant response time – NOT “Top 10 Response Time” – Capacity  Highest Volume Components  Don’t Wait for Production!!! – Make it part of your pre-production review – Manage the application lifecycle by trending KPIs
  • 21. Good Better (additional) Best (additional) Stalls Availability – Connected Status Errors GC Settings Availability - Metric Count Key Resource Performance Concurrency Suspect Performance Business Transaction Survey Memory Management (graph) Suspect Capacity Platform Coarse information ..but not really APM Application, Transactions, Resources The APM Advantage KPI Evolution
  • 22. What’s New in CA APM 9.6 Simplified, automated, and built on CA APM strengths. Seamless Mainframe Awareness Faster, Easier APM • Intelligent Deep Transaction Trace is now dynamic, automated, and requires less developer involvement for deep dives into apps supporting the transactions • Simplified Triage with easier drill down with Application Triage Map including Socket Grouping • Improved response times with software based Transaction Impact Monitor (end-user experience) • Expanding APMs scope with Java 7 EM & Agents • Increased insight by adding DB2 details to transaction traces • Greater awareness with CA SYSVIEW MQ alerts & complete status in APM • Driving further cross enterprise depth with CTG traces to fully expand backend calls • Other mainframe based enhancements
  • 23. Preparing to Upgrade  HealthCheck the existing cluster prior to any upgrade  Good: – - Do a clean install of the APM Cluster, alongside of the existing cluster version.  - Manually duplicate management modules, domains.xml, etc.  - Bring down the old version, then bring up the new  Better: – - Install the new version in a separate environment, reduced size – - migrate a few applications to the new environment for validation – - upgrade the primary environment after validation achieved  Best: – - Install a new GOLD environment in production, separate from original cluster – - migrate agents, as schedules permit, until original cluster may be decommissioned – - this provides an opportunity to introduce pre-production review and generally correct any bad deployment habits
  • 24. Resources  APM Community Site ( https://communities.ca.com/web/ca-wily-global-user-community – - Cookbook: APM HealthCheck – - Understanding Which Metrics Matter (KPI discussion) – - Cookbook: Application Audit  - more details on the baseline techniques and process  APM best practices – Realizing Application Performance Management – available on Amazon.com and Apress.com  - Baselines, Test Plans, App Audits, Triage, Firefighting  - Organizational Models, Service Catalogs  APM Web Page : Ca.com/apm