Documente Academic
Documente Profesional
Documente Cultură
How they do it
Network appliance solutions usually connect to a port mirror in order to collect the
traffic, and then try and re-construct the entire transaction. Information needs to be
collected directly from every node that is of interest.
Main Advantage
Transaction Monitoring by connection to the network means that they add no
overhead and are simple to install.
Main Drawback
Transaction Monitoring has to be done by an algorithmic approach since they cannot
collect data directly from the servers, which leads to inaccurate transaction metrics
and topology.
How they do it
Transaction Monitoring is done by bytecode instrumentations (or Java hooks) that
retrieve data from the nodes that are running J2EE/.NET applications. This is done
by utilizing the class loading mechanism of the interpreter (JVM for J2EE or CLR for
.NET) that in order to intercept specific classes or method calls within the
application.
Main Advantage
Lots of rich information for developers, this type of Transaction Monitoring will bring
up the specific line of code that is the cause of the problem.
Main Drawback
Transaction Monitoring cannot be done for all of the transactions running on the
system (up to 10% for short periods of time), implementations are lengthy and
invasive, and the person ultimately responsible for application performance will get
a heart attack when they see all of the massive amounts of information retrieved
that they will have no idea what to do with.
How they do it
There are two general strategies to implement transaction monitoring with this
approach; the first is by installing an agent on the user’s computer (either on the
desktop or in the browser with the help of a java script) and the second is by
installing a network appliance on the web server. Some solutions (like Gomez for
instance) have servers around the world that test performance from different
regions (ping discipline).
Main Advantage
Know what your clients are experiencing – transaction monitoring with this approach
enables you to put customers first.
Main Drawback
Transaction monitoring stops at the web server, the few solutions that let you peek
beyond that can only provide very limited metrics. You will know that there is a
problem, but you will have no idea where to look for it.
How they do it
Agents installed at each tier send data collected to a central repository where it is
processed. Agents may be installed with the help of JVM/CLR instrumentations at
the application server (one technical execution approach) or they may be installed
as kernel modules (drivers), shared objects (Unix), .dll files (Windows) at the
operating system level. Agents may also be installed at databases, MQ middleware
servers and legacy mainframe computers. Every event (or transaction segment) is
recorded along with all of its real parameters and then accurately re-constructed.
Main Advantage
Transaction Monitoring is done all the time for every single transaction, this is the
only true end to end solution that includes the middle and all of the important data
that is to be collected from the servers in a way that does not weigh down the
system.
Main Disadvantage
By themselves these Transaction Monitoring solutions cannot get deep into the code
or see what is happening at the user’s browser.