SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Monitoring .NET Framework
with Verax NMS
Table of contents
Abstract ......................................................................................................................................... 3
1.     Adding .NET Framework to device inventory .................................................................... 4
2.     Adding sensors for .NET Framework................................................................................... 7
3.     Adding performance counters for .NET Framework .......................................................... 9
4.     Creating custom event processing rules for .NET Framework ........................................ 11
5.     Verax NMS .NET Framework plugin features overview ................................................... 12
Summary ..................................................................................................................................... 17
Monitoring .NET Framework with Verax NMS

Abstract
This publication provides an overview on how to monitor and manage .NET Framework using Verax NMS
(including the free Express edition available at http://www.veraxsystems.com/en/downloads - please read
terms & conditions for limitations of the Express version).


Tools used:
   • .NET Framework: http://msdn.microsoft.com/en-us/library/w8f5kw2e.aspx
   • Monitoring tool: www.veraxsystems.com/en/products/nms


Agenda:
   1. Adding .NET Framework to the list of monitored applications within Verax NMS.
   2. Configuring availability sensors and performance counters for .NET Framework.
   3. Verax NMS .NET Framework plugin features overview.
   4. Setting up alarms and notification policies.




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 3 of 17
                                                     www.veraxsystems.com
                                                                                                                DL726
Monitoring .NET Framework with Verax NMS

1. Adding .NET Framework to device inventory
In order to include .NET Framework to be monitored by Verax NMS, add an application instance to the
device actually running this instance.

Note: Verax NMS allows for creating multiple instances for applications of the same type on a single device.

In order to add an .NET Framework to the device running its instance, perform the following steps:
   1. Log into the Verax NMS and select Home from the main menu.
   2. Select a device running the .NET Framework instance from the left-side aspects view.




                                           Figure 1: Aspect hierarchy tree

   3. In Summary tab select Manage applications from the actions section.




                                  Figure 2: Adding a new managed application

   4. A pop-up dialog is displayed.




                                          Copyright © Verax Systems. All rights reserved.
                                All trademarks in this document are legal property of their owners.   Page 4 of 17
                                                      www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS




                                          Figure 3: Applications list dialog

   5. Select Add application option from the context menu and click Go. A dialog window is displayed.
      Choose .NET Framework from Application types.




                              Figure 4: Adding .NET Framework - parameters dialog

Verax NMS will ask to enter the following application-specific parameters:
   •   Instance name - Name of the application instance. You can enter any name describing the
       monitored application instance.
   •   Host - Address of the host running the application instance. In most cases, the host address is an IP
       address of the device the application instance is assigned to.
   •   User - Username used to connect to the service.
   •   Password – Password used to connect to the service.

Note: application-specific parameters depend on the selected application type.


                                          Copyright © Verax Systems. All rights reserved.
                                All trademarks in this document are legal property of their owners.   Page 5 of 17
                                                      www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS
   6. Provide the necessary information and click Save changes.

   7. The system will ask if you want to add a default set of sensors and counters for .NET Framework.
      Since, (in this example) sensors and performance will be added manually – click No.
   8. The newly added .NET Framework is now visible in the aspect tree within the host’s node in
      Managed Applications category.




                                 Figure 5: Aspects tree - Managed Applications




                                Figure 6: .NET Framework - properties window




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 6 of 17
                                                     www.veraxsystems.com
                                                                                                                DL726
Monitoring .NET Framework with Verax NMS

2. Adding sensors for .NET Framework
Sensors are active monitors periodically querying the device services for which they are configured and
waiting for their responses. If a query is returned with an expected response, the queried service is
considered "available." If a response is not received (timed out), or if the response is not as expected, the
queried service is considered "unavailable".

The system includes a number of pre-configured sensors. The following types of sensors for .NET Framework
application type are available by default:
    •   SNMP - Checks if SNMPClient can resolve default SNMP Oid (SysObjectID) for supplied device IP
        address.
    •   .NET Framework Sensor – Checks if given WMI query returns expected result.

In order to add a sensor, perform the following steps:
    1. Select device from the aspect tree in Home view (.NET Framework in this case).
    2. Select Monitors tab and switch to sensor list by clicking Sensor list link in the upper-right corner of
       the tab field. The sensor list is displayed.


    3. Select Add from the global action menu and click Go. The wizard dialog is displayed.




                                               Figure 7: Adding a sensor


                                          Copyright © Verax Systems. All rights reserved.
                                All trademarks in this document are legal property of their owners.   Page 7 of 17
                                                      www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS


   4. Select the sensor you want to add and click Next.




                                      Figure 8: Specify sensor parameters

   5. A dialog shows up with all sensor parameters to be provided. Specify the sensor parameters and
      click Finish.
   6. Once the sensors have been added, they are visible on the sensor list (Monitors tab).




                                        Copyright © Verax Systems. All rights reserved.
                              All trademarks in this document are legal property of their owners.   Page 8 of 17
                                                    www.veraxsystems.com
                                                                                                               DL726
Monitoring .NET Framework with Verax NMS

3. Adding performance counters for .NET Framework
Performance counters measure system activity and performance (metrics). The application retrieves their
current values in predefined intervals. The aim of probing and collecting data is to analyze and convert the
data into a performance graph/chart. The user can define a counter manually or load it from a template.
Performance counter templates are templates with defined probing parameters for specified devices in
order to improve and speed up counter creation.
Each Verax NMS counter template is characterized by the following information:
   •    Name and description - unique identifier and optional description,
   •    Device type - type of a device,
   •    Protocol type - protocol used,
   •    Probing interval - pauses between probing.
Counter templates are needed when the counter creation method is set to "from template". Counter
templates provide defined probing parameters for specified devices in order to improve and quicken
counter creation.


In order to add .NET Framework performance counters, perform the following steps:
   1. Select device from aspect tree in Home view.
   2.   Select Monitors tab and switch to the counter list by clicking Counter list link in the upper-right
        corner of the tab field. A counter list is displayed.



   3. Select Add from the global action menu and click Go. Select the counter you want to create and
      click Next.




                                  Figure 9: Adding counter for .NET Framework


                                          Copyright © Verax Systems. All rights reserved.
                                All trademarks in this document are legal property of their owners.   Page 9 of 17
                                                      www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS
   4. Once the data has been loaded, the edit window shows up with all counter attributes to be
      provided.




                                      Figure 10: Selecting measure metrics


   5. Specify the rest of the counter parameters and click Finish.
   The new counter has been created and is now visible on the counter list.




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 10 of 17
                                                     www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS

4. Creating custom event processing rules for .NET Framework
Events are processed by Event Processing Rules running under control of the Event Processing Engine. The
Event Processing Engine within the system is able to process events fast without materializing them in
database. Verax NMS comes with a set of embedded, flexibly customized processing rules such as: De-
duplication, Pairwise matching, Event forwarding, Intermittent failure, Scheduled Maintenance, etc. It also
provides users with the ability to implement their own processing rules using JRuby scripting language.

Verax NMS provides complex fault management, such as alarm collection, filtering, blocking, thresholds and
correlation (scripted, user-defined rules defining business logic for alarm correlation, cleaning, root-cause,
etc.) as well as alarm management actions, e.g. assignment, change of status, clearing, annotation and
others. It also enables users to create alarms based on network data etc.

In this example we will show how to assign basic event processing rules:
   •   Alarm generating
   •   Event dropping
   •   Event forwarding
   •   Severity assigning

To assign an event processing rule, perform the following steps:
   1. After selecting the desired host go to Events tab.
   2. Select the event to assign processing rules to by selecting its corresponding check box in grid view
      (first column).
   3. Select Assign processing rules from the global action menu and click Go.
   4. A dialog window is displayed (see figure below).
   5. Select rule category and click Add new rule. A dialog window is displayed (see figure below).




                                    Figure 11: Creating custom processing rule
   6. The newly created event processing rule is now visible and active (there’s no need to logout).


                                          Copyright © Verax Systems. All rights reserved.
                                All trademarks in this document are legal property of their owners.   Page 11 of 17
                                                      www.veraxsystems.com
                                                                                                                  DL726
Monitoring .NET Framework with Verax NMS

5. Verax NMS .NET Framework plugin features overview
Verax NMS .NET Framework management plugin supports versions 2.0 and higher of the Microsoft .NET
Framework. The communication between the NMS server and managed framework instance takes place
using WMI (Windows Management Instrumentation) protocol.

General information view

The view presents general .NET Framework information such as:
   • Installed software version
   • Number of exceptions thrown by all applications since the .NET Framework instance has been
       started
   • Number of JIT (just-in-time) compiler failures
   • Number of running applications
   • Number of physical and logical threads
   • Number of classes loaded and failed classes
   • Number of security checks performed
   • Memory usage: total (all applications) heap data usage, amount of committed and reserved data
   • Network usage: amount of data sent, amount of data received and number of network connections
       used by all applications




                                            Figure 12: General view


                                      Copyright © Verax Systems. All rights reserved.
                            All trademarks in this document are legal property of their owners.   Page 12 of 17
                                                  www.veraxsystems.com
                                                                                                              DL726
Monitoring .NET Framework with Verax NMS
Memory view

The view displays a detailed memory usage for each running .NET application, including:
   • Allocated bytes per second
   • Finalization survivors
   • Generation 0, 1 and 2 heap sizes and object promotion statistics
   • Large Objects heap size
   • Number of garbage collector (GC) handles
   • Number of GC collections per each heap, pinned objects and induced collections
   • % of application time spent on garbage collection
   • System virtual memory used by the garbage collector (total, committed, reserved)
The view allows graphical comparison of values of these parameters for any applications selected by a user.




                                              Figure 13: Memory view

Cache view

The view displays a cache usage for each running .NET application, including:
   • Number of cache entries
   • Number of cache hits, misses and hit ratio (%)
   • Cache trims and turnover rate
The view allows graphical comparison of values of these parameters for any applications selected by a user.


                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 13 of 17
                                                     www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS
Loading view

The view displays class loader statistics for each running .NET application, including:
   • Heap memory committed by the class loader
   • Number of application domains (AppDomains)
   • Cache trims and turnover rate
   • The view allows graphical comparison of values of these parameters for any applications selected by
       a user.




                                              Figure 14: Loading view

Security view

The view displays security statistics for each running .NET application, including:
   • Number of security access checks at link time and runtime
   • % of run time spent on security checks
   • Stack depth in the latest security check
The view allows graphical comparison of values of these parameters for any applications selected by a user.




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 14 of 17
                                                     www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS
Remoting view

The view displays remote object calls statistics for each running .NET application, including:
   • Number of remote channels (connections) established
   • Number of proxy objects used for remoting and number of remote contexts
   • Total number of remote procedure calls made and number of calls per second
The view allows graphical comparison of values of these parameters for any applications selected by a user.

Exceptions view

The view displays statistics on exceptions raised by each running .NET application, including:
   • Total number of exceptions thrown by an application and exceptions thrown per second
   • Exception filters and finally clauses executed per second
The view allows graphical comparison of values of these parameters for any applications selected by a user.

Interaction with COM view

The view displays on number of calls to the COM (Component Object Model) objects, including:
   • Number of COM-callable-wrappers (CCW)
   • Number of times that arguments and return values have been marshaled from .NET (managed) to
       COM (unmanaged) code
   • Number of stubs created between .NET and COM code
The view allows graphical comparison of values of these parameters for any applications selected by a user.

Data provider view

The view displays information on .NET data provider activity, including:
   • Number of active, inactive, reclaimed and free connections and connection pools
   • Number of non-pooled connections
The view allows graphical comparison of values of these parameters for any applications selected by a user.

Networking view

The view displays information on network traffic statistics for each .NET application, including:
   • Number of network connections established
   • Numbers of sent and received bytes and packets (datagrams)
   • Detailed information on HTTP requests: total number of requests made, requests per second,
       aborted per second, queue times and others
The view allows graphical comparison of values of these parameters for any applications selected by a user.




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 15 of 17
                                                     www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS
Just-in-time (JIT) view

The view displays information on JIT compiler statistics for each running .NET application, including number
of methods compiled, compilation speed and others.
The view allows graphical comparison of values of these parameters for any applications selected by a user.




                                         Figure 15: Just-in-time (JIT) view

Locks and threads view

The view displays information about application threads and locks (numbers, waiting time and others).




                                         Copyright © Verax Systems. All rights reserved.
                               All trademarks in this document are legal property of their owners.   Page 16 of 17
                                                     www.veraxsystems.com
                                                                                                                 DL726
Monitoring .NET Framework with Verax NMS

Summary
If you performed all actions described in chapters 1-5 you are now able to monitor .NET Framework
application.




                                      Copyright © Verax Systems. All rights reserved.
                            All trademarks in this document are legal property of their owners.   Page 17 of 17
                                                  www.veraxsystems.com
                                                                                                              DL726

Más contenido relacionado

La actualidad más candente

Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide Protect724manoj
 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide Protect724manoj
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1	VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1 Protect724manoj
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9Ian Sommerville
 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide Protect724manoj
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA AuditDavid Sweigert
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Customgkelley
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...Area41
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 

La actualidad más candente (20)

Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 
Ch8.testing
Ch8.testingCh8.testing
Ch8.testing
 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide
 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1	VPN Monitoring Security Use Case Guide version 1.1
VPN Monitoring Security Use Case Guide version 1.1
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9
 
Ch20 systems of systems
Ch20 systems of systemsCh20 systems of systems
Ch20 systems of systems
 
Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide	Suspicious Outbound Traffic Monitoring Security Use Case Guide
Suspicious Outbound Traffic Monitoring Security Use Case Guide
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Custom
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
C90 Security Service
C90 Security ServiceC90 Security Service
C90 Security Service
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 

Similar a How to monitor .Net Framework

How to monitor and manage Apache Tomcat
How to monitor and manage Apache TomcatHow to monitor and manage Apache Tomcat
How to monitor and manage Apache TomcatEgnyte
 
How to monitor ESX/ESXi servers
How to monitor ESX/ESXi serversHow to monitor ESX/ESXi servers
How to monitor ESX/ESXi serversEgnyte
 
How to monitor MODBUS devices
How to monitor MODBUS devicesHow to monitor MODBUS devices
How to monitor MODBUS devicesEgnyte
 
Xenapp deployment-blueprint
Xenapp deployment-blueprintXenapp deployment-blueprint
Xenapp deployment-blueprintKunKun Ng
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9Ian Sommerville
 
FabricServer Technology Overview
FabricServer Technology OverviewFabricServer Technology Overview
FabricServer Technology OverviewIvan_datasynapse
 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide Protect724manoj
 
Extra micrometer practices with Quarkus | DevNation Tech Talk
Extra micrometer practices with Quarkus | DevNation Tech TalkExtra micrometer practices with Quarkus | DevNation Tech Talk
Extra micrometer practices with Quarkus | DevNation Tech TalkRed Hat Developers
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)vhaynes
 
How to-simulate-network-devices
How to-simulate-network-devicesHow to-simulate-network-devices
How to-simulate-network-devicesSusant Sahani
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaperZayar Shwe
 
PreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive ApplicationPreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive ApplicationKnoldus Inc.
 
Dynatrace Integration Adapter - Datasheet
Dynatrace Integration Adapter - DatasheetDynatrace Integration Adapter - Datasheet
Dynatrace Integration Adapter - DatasheetKovair
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active DirectoryJessica Myers
 

Similar a How to monitor .Net Framework (20)

How to monitor and manage Apache Tomcat
How to monitor and manage Apache TomcatHow to monitor and manage Apache Tomcat
How to monitor and manage Apache Tomcat
 
How to monitor ESX/ESXi servers
How to monitor ESX/ESXi serversHow to monitor ESX/ESXi servers
How to monitor ESX/ESXi servers
 
How to monitor MODBUS devices
How to monitor MODBUS devicesHow to monitor MODBUS devices
How to monitor MODBUS devices
 
Xenapp deployment-blueprint
Xenapp deployment-blueprintXenapp deployment-blueprint
Xenapp deployment-blueprint
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9
 
FabricServer Technology Overview
FabricServer Technology OverviewFabricServer Technology Overview
FabricServer Technology Overview
 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
 
Extra micrometer practices with Quarkus | DevNation Tech Talk
Extra micrometer practices with Quarkus | DevNation Tech TalkExtra micrometer practices with Quarkus | DevNation Tech Talk
Extra micrometer practices with Quarkus | DevNation Tech Talk
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)Vincent Haynes(Cis516 Assignment Week 9)
Vincent Haynes(Cis516 Assignment Week 9)
 
How to-simulate-network-devices
How to-simulate-network-devicesHow to-simulate-network-devices
How to-simulate-network-devices
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaper
 
Ch21.pptx
Ch21.pptxCh21.pptx
Ch21.pptx
 
PreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive ApplicationPreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive Application
 
Dynatrace Integration Adapter - Datasheet
Dynatrace Integration Adapter - DatasheetDynatrace Integration Adapter - Datasheet
Dynatrace Integration Adapter - Datasheet
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
SCCM 2019 Demo.pptx
SCCM 2019 Demo.pptxSCCM 2019 Demo.pptx
SCCM 2019 Demo.pptx
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 

Último

Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsColaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationbrynpueblos04
 
March 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterMarch 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterssuserdfec6a
 
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsGoregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
February 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterFebruary 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterssuserdfec6a
 
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxSIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxStephenMino
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theorydrae5
 
Social Learning Theory presentation.pptx
Social Learning Theory presentation.pptxSocial Learning Theory presentation.pptx
Social Learning Theory presentation.pptxumef01177
 
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfExploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfMindful Wellness Journey
 
Emotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfEmotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfaprilross605
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...mitaliverma221
 
2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing YogaRaphaël Semeteys
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...Cara Menggugurkan Kandungan 087776558899
 

Último (15)

Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsColaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentation
 
March 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterMarch 2023 Recommendations for newsletter
March 2023 Recommendations for newsletter
 
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsGoregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Girls in Mahipalpur (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Mahipalpur  (delhi) call me [🔝9953056974🔝] escort service 24X7Girls in Mahipalpur  (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Mahipalpur (delhi) call me [🔝9953056974🔝] escort service 24X7
 
February 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterFebruary 2024 Recommendations for newsletter
February 2024 Recommendations for newsletter
 
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxSIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
Social Learning Theory presentation.pptx
Social Learning Theory presentation.pptxSocial Learning Theory presentation.pptx
Social Learning Theory presentation.pptx
 
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfExploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
 
Emotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfEmotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdf
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
 
2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
 

How to monitor .Net Framework

  • 2. Table of contents Abstract ......................................................................................................................................... 3 1. Adding .NET Framework to device inventory .................................................................... 4 2. Adding sensors for .NET Framework................................................................................... 7 3. Adding performance counters for .NET Framework .......................................................... 9 4. Creating custom event processing rules for .NET Framework ........................................ 11 5. Verax NMS .NET Framework plugin features overview ................................................... 12 Summary ..................................................................................................................................... 17
  • 3. Monitoring .NET Framework with Verax NMS Abstract This publication provides an overview on how to monitor and manage .NET Framework using Verax NMS (including the free Express edition available at http://www.veraxsystems.com/en/downloads - please read terms & conditions for limitations of the Express version). Tools used: • .NET Framework: http://msdn.microsoft.com/en-us/library/w8f5kw2e.aspx • Monitoring tool: www.veraxsystems.com/en/products/nms Agenda: 1. Adding .NET Framework to the list of monitored applications within Verax NMS. 2. Configuring availability sensors and performance counters for .NET Framework. 3. Verax NMS .NET Framework plugin features overview. 4. Setting up alarms and notification policies. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 3 of 17 www.veraxsystems.com DL726
  • 4. Monitoring .NET Framework with Verax NMS 1. Adding .NET Framework to device inventory In order to include .NET Framework to be monitored by Verax NMS, add an application instance to the device actually running this instance. Note: Verax NMS allows for creating multiple instances for applications of the same type on a single device. In order to add an .NET Framework to the device running its instance, perform the following steps: 1. Log into the Verax NMS and select Home from the main menu. 2. Select a device running the .NET Framework instance from the left-side aspects view. Figure 1: Aspect hierarchy tree 3. In Summary tab select Manage applications from the actions section. Figure 2: Adding a new managed application 4. A pop-up dialog is displayed. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 4 of 17 www.veraxsystems.com DL726
  • 5. Monitoring .NET Framework with Verax NMS Figure 3: Applications list dialog 5. Select Add application option from the context menu and click Go. A dialog window is displayed. Choose .NET Framework from Application types. Figure 4: Adding .NET Framework - parameters dialog Verax NMS will ask to enter the following application-specific parameters: • Instance name - Name of the application instance. You can enter any name describing the monitored application instance. • Host - Address of the host running the application instance. In most cases, the host address is an IP address of the device the application instance is assigned to. • User - Username used to connect to the service. • Password – Password used to connect to the service. Note: application-specific parameters depend on the selected application type. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 5 of 17 www.veraxsystems.com DL726
  • 6. Monitoring .NET Framework with Verax NMS 6. Provide the necessary information and click Save changes. 7. The system will ask if you want to add a default set of sensors and counters for .NET Framework. Since, (in this example) sensors and performance will be added manually – click No. 8. The newly added .NET Framework is now visible in the aspect tree within the host’s node in Managed Applications category. Figure 5: Aspects tree - Managed Applications Figure 6: .NET Framework - properties window Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 6 of 17 www.veraxsystems.com DL726
  • 7. Monitoring .NET Framework with Verax NMS 2. Adding sensors for .NET Framework Sensors are active monitors periodically querying the device services for which they are configured and waiting for their responses. If a query is returned with an expected response, the queried service is considered "available." If a response is not received (timed out), or if the response is not as expected, the queried service is considered "unavailable". The system includes a number of pre-configured sensors. The following types of sensors for .NET Framework application type are available by default: • SNMP - Checks if SNMPClient can resolve default SNMP Oid (SysObjectID) for supplied device IP address. • .NET Framework Sensor – Checks if given WMI query returns expected result. In order to add a sensor, perform the following steps: 1. Select device from the aspect tree in Home view (.NET Framework in this case). 2. Select Monitors tab and switch to sensor list by clicking Sensor list link in the upper-right corner of the tab field. The sensor list is displayed. 3. Select Add from the global action menu and click Go. The wizard dialog is displayed. Figure 7: Adding a sensor Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 7 of 17 www.veraxsystems.com DL726
  • 8. Monitoring .NET Framework with Verax NMS 4. Select the sensor you want to add and click Next. Figure 8: Specify sensor parameters 5. A dialog shows up with all sensor parameters to be provided. Specify the sensor parameters and click Finish. 6. Once the sensors have been added, they are visible on the sensor list (Monitors tab). Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 8 of 17 www.veraxsystems.com DL726
  • 9. Monitoring .NET Framework with Verax NMS 3. Adding performance counters for .NET Framework Performance counters measure system activity and performance (metrics). The application retrieves their current values in predefined intervals. The aim of probing and collecting data is to analyze and convert the data into a performance graph/chart. The user can define a counter manually or load it from a template. Performance counter templates are templates with defined probing parameters for specified devices in order to improve and speed up counter creation. Each Verax NMS counter template is characterized by the following information: • Name and description - unique identifier and optional description, • Device type - type of a device, • Protocol type - protocol used, • Probing interval - pauses between probing. Counter templates are needed when the counter creation method is set to "from template". Counter templates provide defined probing parameters for specified devices in order to improve and quicken counter creation. In order to add .NET Framework performance counters, perform the following steps: 1. Select device from aspect tree in Home view. 2. Select Monitors tab and switch to the counter list by clicking Counter list link in the upper-right corner of the tab field. A counter list is displayed. 3. Select Add from the global action menu and click Go. Select the counter you want to create and click Next. Figure 9: Adding counter for .NET Framework Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 9 of 17 www.veraxsystems.com DL726
  • 10. Monitoring .NET Framework with Verax NMS 4. Once the data has been loaded, the edit window shows up with all counter attributes to be provided. Figure 10: Selecting measure metrics 5. Specify the rest of the counter parameters and click Finish. The new counter has been created and is now visible on the counter list. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 10 of 17 www.veraxsystems.com DL726
  • 11. Monitoring .NET Framework with Verax NMS 4. Creating custom event processing rules for .NET Framework Events are processed by Event Processing Rules running under control of the Event Processing Engine. The Event Processing Engine within the system is able to process events fast without materializing them in database. Verax NMS comes with a set of embedded, flexibly customized processing rules such as: De- duplication, Pairwise matching, Event forwarding, Intermittent failure, Scheduled Maintenance, etc. It also provides users with the ability to implement their own processing rules using JRuby scripting language. Verax NMS provides complex fault management, such as alarm collection, filtering, blocking, thresholds and correlation (scripted, user-defined rules defining business logic for alarm correlation, cleaning, root-cause, etc.) as well as alarm management actions, e.g. assignment, change of status, clearing, annotation and others. It also enables users to create alarms based on network data etc. In this example we will show how to assign basic event processing rules: • Alarm generating • Event dropping • Event forwarding • Severity assigning To assign an event processing rule, perform the following steps: 1. After selecting the desired host go to Events tab. 2. Select the event to assign processing rules to by selecting its corresponding check box in grid view (first column). 3. Select Assign processing rules from the global action menu and click Go. 4. A dialog window is displayed (see figure below). 5. Select rule category and click Add new rule. A dialog window is displayed (see figure below). Figure 11: Creating custom processing rule 6. The newly created event processing rule is now visible and active (there’s no need to logout). Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 11 of 17 www.veraxsystems.com DL726
  • 12. Monitoring .NET Framework with Verax NMS 5. Verax NMS .NET Framework plugin features overview Verax NMS .NET Framework management plugin supports versions 2.0 and higher of the Microsoft .NET Framework. The communication between the NMS server and managed framework instance takes place using WMI (Windows Management Instrumentation) protocol. General information view The view presents general .NET Framework information such as: • Installed software version • Number of exceptions thrown by all applications since the .NET Framework instance has been started • Number of JIT (just-in-time) compiler failures • Number of running applications • Number of physical and logical threads • Number of classes loaded and failed classes • Number of security checks performed • Memory usage: total (all applications) heap data usage, amount of committed and reserved data • Network usage: amount of data sent, amount of data received and number of network connections used by all applications Figure 12: General view Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 12 of 17 www.veraxsystems.com DL726
  • 13. Monitoring .NET Framework with Verax NMS Memory view The view displays a detailed memory usage for each running .NET application, including: • Allocated bytes per second • Finalization survivors • Generation 0, 1 and 2 heap sizes and object promotion statistics • Large Objects heap size • Number of garbage collector (GC) handles • Number of GC collections per each heap, pinned objects and induced collections • % of application time spent on garbage collection • System virtual memory used by the garbage collector (total, committed, reserved) The view allows graphical comparison of values of these parameters for any applications selected by a user. Figure 13: Memory view Cache view The view displays a cache usage for each running .NET application, including: • Number of cache entries • Number of cache hits, misses and hit ratio (%) • Cache trims and turnover rate The view allows graphical comparison of values of these parameters for any applications selected by a user. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 13 of 17 www.veraxsystems.com DL726
  • 14. Monitoring .NET Framework with Verax NMS Loading view The view displays class loader statistics for each running .NET application, including: • Heap memory committed by the class loader • Number of application domains (AppDomains) • Cache trims and turnover rate • The view allows graphical comparison of values of these parameters for any applications selected by a user. Figure 14: Loading view Security view The view displays security statistics for each running .NET application, including: • Number of security access checks at link time and runtime • % of run time spent on security checks • Stack depth in the latest security check The view allows graphical comparison of values of these parameters for any applications selected by a user. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 14 of 17 www.veraxsystems.com DL726
  • 15. Monitoring .NET Framework with Verax NMS Remoting view The view displays remote object calls statistics for each running .NET application, including: • Number of remote channels (connections) established • Number of proxy objects used for remoting and number of remote contexts • Total number of remote procedure calls made and number of calls per second The view allows graphical comparison of values of these parameters for any applications selected by a user. Exceptions view The view displays statistics on exceptions raised by each running .NET application, including: • Total number of exceptions thrown by an application and exceptions thrown per second • Exception filters and finally clauses executed per second The view allows graphical comparison of values of these parameters for any applications selected by a user. Interaction with COM view The view displays on number of calls to the COM (Component Object Model) objects, including: • Number of COM-callable-wrappers (CCW) • Number of times that arguments and return values have been marshaled from .NET (managed) to COM (unmanaged) code • Number of stubs created between .NET and COM code The view allows graphical comparison of values of these parameters for any applications selected by a user. Data provider view The view displays information on .NET data provider activity, including: • Number of active, inactive, reclaimed and free connections and connection pools • Number of non-pooled connections The view allows graphical comparison of values of these parameters for any applications selected by a user. Networking view The view displays information on network traffic statistics for each .NET application, including: • Number of network connections established • Numbers of sent and received bytes and packets (datagrams) • Detailed information on HTTP requests: total number of requests made, requests per second, aborted per second, queue times and others The view allows graphical comparison of values of these parameters for any applications selected by a user. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 15 of 17 www.veraxsystems.com DL726
  • 16. Monitoring .NET Framework with Verax NMS Just-in-time (JIT) view The view displays information on JIT compiler statistics for each running .NET application, including number of methods compiled, compilation speed and others. The view allows graphical comparison of values of these parameters for any applications selected by a user. Figure 15: Just-in-time (JIT) view Locks and threads view The view displays information about application threads and locks (numbers, waiting time and others). Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 16 of 17 www.veraxsystems.com DL726
  • 17. Monitoring .NET Framework with Verax NMS Summary If you performed all actions described in chapters 1-5 you are now able to monitor .NET Framework application. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. Page 17 of 17 www.veraxsystems.com DL726