3 Ways to Solve App Performance Problems with Transaction Tracking

3 Ways to Solve App Performance Problems with Transaction TrackingTransaction Tracking can provide tremendous insight into the performance and behavior of applications. However, this can be challenging when transactions traverse platforms and technologies.  Often it can be similar to tracking someone in the old Westerns where you follow the trail to the river and then lose track of where they went next.  Tracking MQ transactions can have this same hurdle to overcome with MQ running on diverse platforms spanning multiple locations.  MQ transactions typically interact with other platforms such as IBM Integration Bus (Broker) and IBM DataPower.  Visualizing a dynamic flow of transactions across all of these environments is well worth the effort as it greatly simplifies the problem detection process at the same time reducing the mean time to resolve problems (MTTR).

Concepts of Transaction Tracing

Package tracking is an analogy that can be used to explain the concepts behind transaction tracking.  A package is sent from location A to location B with tracking notices generated to let the sender know where the package is in-transit, when the expected time of arrival is and when it actually arrived.    Package Tracking is a combination of disjoint technologies, similar to the middleware environment.  The process of transaction tracking can be complex with cost and timeliness of delivery of major concern.  No matter how fast you deliver a package, someone always wants it quicker. The same problems affect MQ transactions, but instead of a package, it is a message that never seems to get to its destination fast enough.

There are a set of common questions users have about package tracking.  For the customer it might include:   where is my package or is my package progressing as planned? If you work for the shipping company, you are more concerned about: where the bottlenecks are in the system, how to solve a problem, stopping a problem from recurring and what issues can I expect tomorrow. As a technician, you would want to know where your failures are occurring and where you can make improvements.

Package tracking involves: delivering   packages, scanning them and exporting the events from the scanners into a database for later analysis.  The key to tracing anything is to create tracking events that capture the key events such a pick, pack or ship and what time these occurred

Transaction Tracking for MQ

There are a common set of  behavior patterns for MQ.  Each set of patterns can be unique.  Typically, you have senders and receivers as well as queues being processed with one or more queue managers communicating with each other. With multiple applications running on different servers, as in the package tracking example, every time a message gets sent or received, the details about that message and its processing should be captured and sent  to a central location.  This will provide the ability to understand what is occurring. If the transaction is stuck or slow, we know that we can react to it or produce warnings if the transaction takes too long.  We can also gather statistics along the way to see the duration of each step.  Capturing raw metrics about message flows and then correlating them together into a big picture can help the user solve performance problems faster.

Whether you are a corporate manager, Line of Business owner, application support group or IT infrastructure team, you need end-to-end visibility into the transactions that are relevant to you.

Stay tuned for the next installment in this series, “3 Ways to Solve App Performance Problems with Transaction Tracking”.

 

To learn more, watch the TechTalk here

Five Security Features That Your Next-Gen Cloud Must Have

Nastel Comments: Cloud computing demands a high degree of automation from an application performance management (APM) / business transaction management (BTM) solution in order to deliver the visibility that users require.

An APM / BTM solution must adjust what and where it is monitoring in order to keep pace with the elastic configuration of this ever-changing environment and deliver the promised return on investment that cloud users expect. Manual efforts to specify where the applications are, the dependencies between transactions and the status of services will not be effective.
Five Security Features That Your Next-Gen Cloud Must Have

With cloud computing, virtualization, and a new type of end-user – the security landscape around the modern infrastructure needed to evolve. IT consumerization and a lot more data within the organization has forced security professionals to adopt better ways to protect their environment. The reality is that standard firewalls and UTMs are just no longer enough. New technologies have emerged which can greatly enhance the security of a cloud and virtualization environment – without impacting performance. This is where the concept of next-generation security came from.

It was the need to abstract physical security services and create logical components for a powerful infrastructure offering.

With that in mind – let’s look at five great next-gen security features that you should consider.

  1. Virtual security services. What if you need application-level security? What about controlling and protecting inbound, outbound, and intra-VM traffic? New virtual services can give you entire virtual firewalls, optimized anti-virus/anti-malware tools, and even proactive intrusion detection services. Effectively, these services allow for the multi-tenant protection and support of network virtualization and cloud environments.
  2. Going agentless. Clientless security now directly integrates with the underlying hypervisor. This gives your virtual platform the capability to do fast, incremental scans as well as the power to orchestrate scans and set thresholds across VM’s. Here’s the reality – you can do all of this without performance degradation. Now, we’re looking at direct virtual infrastructure optimization while still maintaining optimal cloud resource efficiency. For example, if you’re running on a VMware ecosystem, there are some powerful “agentless” technologies you can leverage. Trend Micro’s Deep Security agentless anti-malware scanning, intrusion prevention and file integrity monitoring capabilities help VMware environments benefit from better resources utilization when it comes to securing VMs. Further, Deep Security has been optimized to support the protection of multitenant environments and cloud-based workloads, such as Amazon Web Services and Microsoft Azure.
  3. Integrating network traffic with security components. Not only can you isolate VMs, create multi-tenant protection across your virtual and cloud infrastructure, and allow for application-specific protection – you can now control intra-VM traffic at the networking layer. This type of integration allows the security layer to be “always-on.” That means security continues to be active even during activities likes a live VM migration.
  4. Centralized cloud and virtual infrastructure management/visibility. Whether you have a distributed cloud or virtualization environment – management and direct visibility are critical to the health of your security platform. One of the bestthings about next-generation security is the unified visibility the management is capable of creating. Look for the ability to aggregate, analyze and audit your logs and your entire security infrastructure. Powerful spanning policies allow your virtual infrastructure to be much more proactive when it comes to security. By integrating virtual services (mentioned above) into the management layer – administrators are able to be proactive, stay compliant, and continuously monitor the security of their infrastructure.
  5. Consider next-gen end-point security for your cloud users. There are some truly disruptive technologies out there today. Here’s an example: Cylance. This security firm replaces more traditional, signature-based, technologies with a truly disruptive architecture. Basically, Cylance uses a machine-learning algorithm to inspect millions of file attributes to determine the probability that a particular file is malicious. The algorithmic approach significantly reduces the endpoint and network resource requirement. Because of its signature-less approach, it is capable of detecting both new threats and new variants of known threats that typically are missed by signature-based techniques. Here’s the other really cool part – even when your users disconnect from the cloud, they’re still very well protected. Because the Cylance endpoint agent does not require a database of signatures or daily updates, and is extremely lightweight on network, compute, and data center resources – it can remain effective even when disconnected for long periods.

Read the source article at Web Host Industry Review
Original Author: thewhir

How to create speedier infrastructure for an app-centric business

How to create speedier infrastructure for an app-centric business

Time is money’ – within business this phrase could not be more relevant, particularly in today’s well-connected society. As everything progresses in technology – becoming much more efficient, smarter and faster – people’s expectations are constantly growing, and so they end up frustrated when something hinders the process. When it comes to a network failure or terrible Internet connection in business – slow is the new broke.

Read the source article at Information Age

The Importance of Maintaining Formal Governance

The Importance of Maintaining Formal Governance - Cio Insight

When a vendor is performing well, the client may have a tendency to relax governance requirements and routines.  However, program maintenance is critical because practicing the routines and developing relationships during periods of high performance enhances the ability to fix problems and remediate issues if and when vendor performance is not delivered as expected.  Consistent governance enables the following key benefits that help drive successful, long-term IT vendor relationships.

Read the source article at cioinsight.com

6 Key Requirements to Help You More Proactively Monitor Your IT Infrastructure

wpid-curata__OMvZp84OqQ8LUmO.jpeg

It’s not an overstatement to say that application performance can have a very real and significant impact on business performance. Employees expect and count on immediate access to applications to get work done — no matter what time it is, where they’re located or what device they’re using. And it’s no secret that customers are perfectly willing to go to elsewhere if their expectations to engage through the platform of their choice and receive an optimized experience are not met.

To ensure that applications meet or exceed these high expectations, an underlying IT infrastructure needs to deliver continuously optimized performance.

Read the source article at DEVOPSdigest

Make Closing the Application Performance Gap a Priority in 2016

Make Closing the Application-Performance Gap a Priority in 2016

Nastel agrees and provides these priorities in Application Performance: “… always reduce the amount of time to address the situation. Easy-to-use dashboards that clearly identify the source of the problem are a must-have to ensure your fluency in the complicated language of application-aware network-performance management.”
.

Read the source article at datacenterjournal.com

Original Author: Steve Brar

Application Monitoring in the Age of Big Data

Application Monitoring in the Age of Big Data

Operations and application monitoring have been necessary since the first shared systems came online in the ’60s. While the job title didn’t necessarily exist, the same questions needed answers then as they do now: Is it up and accessible? Is it responding in a reasonable time frame? Is it performing better […]

Read the source article at devops.com

Original Author: Miles Blatstein

Nastel and jKool Sponsor DEVOPSdigest

Nastel and jKool Sponsor DEVOPSdigest

DEVOPSdigest welcomes Nastel and jKool application analytics as a new Silver Sponsor.

Nastel Technologies provides middleware-centric, application performance management with real-time analytics and self-service. Nastel AutoPilot monitors application performance across applications, platforms and tiers presenting its analysis on a single-pane-of-glass. Nastel customers include: Citi, DTCC, BCBS, Dell and Best Buy. With AutoPilot, you can detect anomalies, end false alarms and stay compliant.

Read the source article at DEVOPSdigest

Cyberattack Recovery Times Are Too Slow: Can MSPs Help?

Cyberattack Recovery Times Are Too Slow: Can MSPs Help?

Cyberattack recovery times are causing concerns among organizations, with more than half of companies unsatisfied with how long it takes them to recover from a digital attack, according to a new survey. As a result of these security trends, managed service providers (MSPs) will likely need to assist clients with implementing security tools to help them reach their security goals and ideal recovery times.

Study: Organizations Lagging in Recovery

Read the source article at PivotPoint

Original Author: Marissa Tejada

How to select the best network monitoring tool

How to select the best network monitoring tool

An important part of any network administrator’s job is to monitor the network for performance, traffic usage, faults and availability, and to respond quickly to issues. A network monitoring
tool is a software-based or a software-hardware combination

Read the source article at Networking information, news and tips