Date post: | 04-Jul-2015 |
Category: |
Business |
Upload: | sebastianguerrero |
View: | 2,214 times |
Download: | 1 times |
Symantec i3
AVAILABILITY & PERFORMANCE
2 Symantec Corporation, All Rights Reserved 2005
The Web Applications Environment
Multi-tier applications that can include:– Client (Web browser)
– Web Server
– J2EE Application Server
– Interfaces to external systems
– Database
Worldwide, around-the-clock user access
Usage patterns are not controlled
Management requires the expertise of multiple IT teams
3 Symantec Corporation, All Rights Reserved 2005
Architecture
WebClients
WebClients
Web Servers
J2EE Server
Oracle Databases Legacy System
ExternalSystem
4 Symantec Corporation, All Rights Reserved 2005
Symantec i3
Symantec iSymantec i33 is an is an integratedintegrated solution that is solution that is end-user focusedend-user focused. .
Symantec iSymantec i33 provides a built-in provides a built-in methodologymethodology that enables that enables you to effectively manage the you to effectively manage the AvailabilityAvailability and and PerformancePerformance
of business applications.of business applications.
5 Symantec Corporation, All Rights Reserved 2005
Why an Integrated Solution?
With a multi-tier architecture, IT must:
Align IT to business priorities– Monitor the availability and performance of “business processes”– Monitor “business processes” 24x7 from multiple geographies
– Constantly update the “business processes” by adjusting to real usage patterns initiated by real users
Easily & rapidly detect problems, & analyze in context
Correlate application flow activities among technologies
Pinpoint & analyze their causes
Implement proactive tuning of your performance and availability
6 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
7 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
8 Symantec Corporation, All Rights Reserved 2005
Case Study
Enterprise web application running on a 4-tier architecture
International flower ordering service– The system is critical to sales & support activities– The worldwide data center is located in NY
– The central orders database is updated at 10:00pm NY time
– Sales peak around local holidays, e.g. Mother’s Day on May 9 in Italy & USA
9 Symantec Corporation, All Rights Reserved 2005
10 Symantec Corporation, All Rights Reserved 2005
11 Symantec Corporation, All Rights Reserved 2005
12 Symantec Corporation, All Rights Reserved 2005
Status
Conclusions – symptoms detected Conclusions – symptoms detected
A problem was identified in the check_my_order business transaction from USA & Italy
A synthetic transaction identified the problem
The problem occurred after database update, at 10:05pm NY time (4:05am the next day in Italy)
Next Steps – find the sourceNext Steps – find the source
Identify the problematic page component
13 Symantec Corporation, All Rights Reserved 2005
14 Symantec Corporation, All Rights Reserved 2005
15 Symantec Corporation, All Rights Reserved 2005
Status
Conclusions – source foundConclusions – source found
Java class /verify/orders/country/orders_list.jsp is the problematic component
Next Steps – focus on the reasonNext Steps – focus on the reason
Identify whether this problem also occurs with real transactions
16 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
17 Symantec Corporation, All Rights Reserved 2005
18 Symantec Corporation, All Rights Reserved 2005
19 Symantec Corporation, All Rights Reserved 2005
20 Symantec Corporation, All Rights Reserved 2005
Status
Interim Conclusions – focus on the reasonInterim Conclusions – focus on the reason
We have contrasted synthetic transactions vs. reality
The problem only occurs with synthetic transactions, due to timing (10:05pm NY / 4:05am Italy)
Real users will be affected once the next day starts - Mother’s Day in Italy, USA & some other countries
Next StepsNext Steps
Investigate server side to pinpoint the problematic tier
21 Symantec Corporation, All Rights Reserved 2005
22 Symantec Corporation, All Rights Reserved 2005
23 Symantec Corporation, All Rights Reserved 2005
Status
Interim Conclusions – focus on the reasonInterim Conclusions – focus on the reason
The J2EE tier is dominating resource consumption
The problematic method is verify_orders_country_orders_list._jspService
Next StepsNext Steps
Further investigation is needed in the J2EE tier
24 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
25 Symantec Corporation, All Rights Reserved 2005
26 Symantec Corporation, All Rights Reserved 2005
27 Symantec Corporation, All Rights Reserved 2005
Status
Interim Conclusions – focus on the reasonInterim Conclusions – focus on the reason
Smartune ranked JDBC Access Major Time as the main problem
Next StepsNext Steps
Seek more details and advice
28 Symantec Corporation, All Rights Reserved 2005
29 Symantec Corporation, All Rights Reserved 2005
30 Symantec Corporation, All Rights Reserved 2005
Status
Conclusions Conclusions
The problem is not the database tier, but how frequently the database is accessed
Due to the unusually high number of db queries, time spent in the JSP is too long
Italy and USA behavior differs from other countries’ due to the Mother’s Day high increase in orders
Next Steps – address the problem & verify the solutionNext Steps – address the problem & verify the solution
Instead of querying each order item individually, a new single query that returns all items should be implemented
31 Symantec Corporation, All Rights Reserved 2005
32 Symantec Corporation, All Rights Reserved 2005
Case Study SummaryWe have successfully completed the methodology cycle:
DetectDetect
An SLA breach problem was detected by a synthetic transaction in Italy and USA, before the problem was experienced by real users
FindFindA specific JSP is responsible for the slow response time, but only in specific countries
FocusFocus The unusually long order list in Italy & USA caused an exceptional number of connections, resulting in lengthy JDBC access time
ImproveImproveRestructure queries and results pages
VerifyVerifyThe SLA problem has disappeared without affecting real users
33 Symantec Corporation, All Rights Reserved 2005
Synthetic Transactions Versus Reality
Synthetic transactions indicate availability
They should systematically reflect a dynamic real-world situation
– Identify application usage changes relating to both existing and new applications
– Reflect new delivered functionality
– Reflect trends regarding usage from new locations
34 Symantec Corporation, All Rights Reserved 2005
35 Symantec Corporation, All Rights Reserved 2005
36 Symantec Corporation, All Rights Reserved 2005
37 Symantec Corporation, All Rights Reserved 2005
Synthetic Transactions Versus Reality
Summary Summary
Systematically analyzed changes in usage pattern
Identified new used functionality, change in usage patterns, and heavily used locations
Based on the findings, the user can now adjust the synthetic transactions to reflect the actual real-world situation
38 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
39 Symantec Corporation, All Rights Reserved 2005
VCS Case Study
Enterprise web application running on a 4-tier architecture
Symantec Cluster Server (VCS) is activated on two machines running Oracle
Each machine switches to the other upon failure
40 Symantec Corporation, All Rights Reserved 2005
41 Symantec Corporation, All Rights Reserved 2005
42 Symantec Corporation, All Rights Reserved 2005
43 Symantec Corporation, All Rights Reserved 2005
Status
Interim ConclusionsInterim Conclusions
Upon Oracle tier failure, VCS activated failover
Next StepsNext Steps
Follow the Alerts advice and use the VRTS Cluster Manager to investigate further
44 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
45 Symantec Corporation, All Rights Reserved 2005
46 Symantec Corporation, All Rights Reserved 2005
47 Symantec Corporation, All Rights Reserved 2005
48 Symantec Corporation, All Rights Reserved 2005
Status
ConclusionsConclusions
Oracle ran on sys1
DiskGroup-oradg failed on sys1, hence VCS switched Oracle to sys2
Despite a major problem, the application remained available
But, to ensure availability over the long-term, the problematic resource must be repaired
49 Symantec Corporation, All Rights Reserved 2005
50 Symantec Corporation, All Rights Reserved 2005
Proactive & Preventive VCS Actions
Implement a systematic review of resource consumption overtime to forecast utilization
Identify up coming over-consumption
Establish VCS failover policies and assign system resources, accordingly
51 Symantec Corporation, All Rights Reserved 2005
52 Symantec Corporation, All Rights Reserved 2005
53 Symantec Corporation, All Rights Reserved 2005
54 Symantec Corporation, All Rights Reserved 2005
Proactive & Preventive VCS Actions
Summary Summary
Discovered peak of CPU consumption on server SrvProdD at the end of each month
In the future, this increase will exceed the overall CPU capacities
Based on the findings, the user can now establish an appropriate VCS failover system
55 Symantec Corporation, All Rights Reserved 2005
AVAILABILITY & PERFORMANCE
56 Symantec Corporation, All Rights Reserved 2005
&ANSWERS
QUESTIONS