Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Transaction Management Imperatives
Figure 1-1: Transaction breakdown
Figure 1-2: Growing infrastructure complexity
Figure 1-3: Layers of service
Figure 1-4: The ITIL Service Management disciplines
Figure 1-5: Key relationships between Service Management disciplines
Figure 1-6: A typical e-business application infrastructure
Figure 1-7: e-business solution-specific service layers
Figure 1-8: Logical view of an e-business solution
Figure 1-9: Typical Tivoli-managed e-business application infrastructure
Figure 1-10: The On Demand Operating Environment
Figure 1-11: IBM Automation Blueprint
Figure 1-12: Tivoli's availability product structure
Figure 1-13: e-business transactions
Chapter 2: IBM Tivoli Monitoring for Transaction Performance in Brief
Figure 2-1: Typical e-business transactions are complex
Figure 2-2: Application topology discovered by TMTP
Figure 2-3: Big Board View
Figure 2-4: Topology view indicating problem
Figure 2-5: Inspector view
Figure 2-6: Instance drop down
Figure 2-7: Instance topology
Figure 2-8: Inspector viewing metrics
Figure 2-9: Overall Transactions Over Time
Figure 2-10: Transactions with Subtransactions
Figure 2-11: Page Analyzer Viewer
Figure 2-12: Launching the Web Health Console from the Topology view
Chapter 3: IBM TMTP Architecture
Figure 3-1: TMTP Version 5.2 architecture
Figure 3-2: Enterprise Transaction Performance architecture
Figure 3-3: Management Server architecture
Figure 3-4: Requests from Management Agent to Management Server via SOAP
Figure 3-5: Management Agent JMX architecture
Figure 3-6: ARM Engine communication with Monitoring Engine
Figure 3-7: Transaction performance visualization
Figure 3-8: Tivoli Just-in-Time Instrumentation overview
Figure 3-9: SnF Agent communication flows
Figure 3-10: Putting it all together
Chapter 4: TMTP WTP Version 5.2 Installation and Deployment
Figure 4-1: Customer production environment
Figure 4-2: WebSphere information screen
Figure 4-3: ikeyman utility
Figure 4-4: Creation of custom JKS file
Figure 4-5: Set password for the JKS file
Figure 4-6: Creating a new self signed certificate
Figure 4-7: New self signed certificate options
Figure 4-8: Password change of the new self signed certificate
Figure 4-9: Modifying self signed certificate passwords
Figure 4-10: GSKit new KDB file creation
Figure 4-11: CMS key database file creation
Figure 4-12: Password setup for the prodsnf.kdb
Figure 4-13: New Self Signed Certificate menu
Figure 4-14: Create new self signed certificate
Figure 4-15: Trust files and certificates
Figure 4-16: The imported certificates
Figure 4-17: Extract Certificate
Figure 4-18: Extracting certificate from the msprod.jks file
Figure 4-19: Add a new self signed certificate
Figure 4-20: Adding a new self signed certificate
Figure 4-21: Label for the certificate
Figure 4-22: The imported self signed certificate
Figure 4-23: Welcome screen on the Management Server installation wizard
Figure 4-24: License agreement panel
Figure 4-25: Installation target folder selection
Figure 4-26: SSL enablement window
Figure 4-27: WebSphere configuration panel
Figure 4-28: Database options panel
Figure 4-29: Database Configuration panel
Figure 4-30: Setting summarization window
Figure 4-31: Installation progress window
Figure 4-32: The finished Management Server installation
Figure 4-33: TMTP logon window
Figure 4-34: Welcome window of the Store and Forward agent installation
Figure 4-35: License agreement window
Figure 4-36: Installation location specification
Figure 4-37: Configuration of Proxy host and mask window
Figure 4-38: KDB file definition
Figure 4-39: Communication specification
Figure 4-40: User Account specification window
Figure 4-41: Summary before installation
Figure 4-42: Installation progress
Figure 4-43: The WebSphere caching proxy reboot window
Figure 4-44: The final window of the installation
Figure 4-45: Management Agent installation welcome window
Figure 4-46: License agreement window
Figure 4-47: Installation location definition
Figure 4-48: Management Agent connection window
Figure 4-49: Local user account specification
Figure 4-50: Installation summary window
Figure 4-51: The finished installation
Figure 4-52: Management Server Welcome screen
Figure 4-53: Management Server License Agreement panel
Figure 4-54: Installation location window
Figure 4-55: SSL enablement window
Figure 4-56: WebSphere Configuration window
Figure 4-57: Database options window
Figure 4-58: DB2 administrative user account specification
Figure 4-59: User specification for fenced operations in DB2
Figure 4-60: User specification for the DB2 instance
Figure 4-61: Management Server installation progress window
Figure 4-62: DB2 silent installation window
Figure 4-63: WebSphere Application Server silent installation
Figure 4-64: Configuration of the Management Server
Figure 4-65: The finished Management Server installation
Chapter 5: Interfaces to Other Management Tools
Figure 5-1: Create WSAdministrationServer
Figure 5-2: Create WSApplicationServer
Figure 5-3: Discover WebSphere Resources
Figure 5-4: WebSphere managed application object icons
Figure 5-5: Example for an IBM Tivoli Monitoring Profile
Figure 5-6: Web Health Console using WebSphere Application Server
Figure 5-7: Configure User Setting for ITM Web Health Console
Chapter 6: Keeping the Transaction Monitoring Environment Fit
Figure 6-1: WebSphere started without sourcing the DB2 environment
Figure 6-2: Management Server ping output
Figure 6-3: MBean Server HTTP Adapter
Figure 6-4: Duplicate row at the TWH_CDW
Figure 6-5: Rational Project exists error message
Figure 6-6: WebSphere 4 Admin Console
Figure 6-7: Removing the JVM Generic Arguments
Figure 6-8: WebLogic class path and argument settings
Figure 6-9: Configuring the J2EE Trace Level
Figure 6-10: Configuring the Sample Rate and Failure Instances collected
Chapter 7: Real-Time Reporting
Figure 7-1: The Big Board
Figure 7-2: Topology Report
Figure 7-3: Node context reports
Figure 7-4: Topology Line Chart
Figure 7-5: STI Reports
Figure 7-6: General reports
Figure 7-7: Transactions with Subtransactions report
Figure 7-8: Availability graph
Figure 7-9: Page Analyzer Viewer
Chapter 8: Measuring E-Business Transaction Response Times
Figure 8-1: Trade3 architecture
Figure 8-2: WAS 5.0 Admin console— Install of Trade3 application
Figure 8-3: Deployment of STI components
Figure 8-4: STI Recorder setup welcome dialog
Figure 8-5: STI Software License Agreement dialog
Figure 8-6: Installation of STI Recorder with SSL disable
Figure 8-7: installation of STI Recorder with SSL enabled
Figure 8-8: STI Recorder is recording the Trade application
Figure 8-9: Creating STI transaction for trade
Figure 8-10: Application steps run by trade_2_stock-check playback policy
Figure 8-11: Creating a new playback schedule
Figure 8-12: Specify new playback schedule properties
Figure 8-13: Create new Playback Policy
Figure 8-14: Configure STI Playback
Figure 8-15: Assign name to STI Playback Policy
Figure 8-16: Specifying realm settings
Figure 8-17: Proxies in an Internet environment
Figure 8-18: Work with agents QoS
Figure 8-19: Deploy QoS components
Figure 8-20: Work with Agents— QoS installed
Figure 8-21: Multiple QoS systems measuring multiple sites
Figure 8-22: Work with discovery policies
Figure 8-23: Configure QoS discovery policy
Figure 8-24: Choose schedule for QoS
Figure 8-25: Selecting Agent Group for QoS discovery policy deployment
Figure 8-26: Assign name to new QoS discovery policy
Figure 8-27: View discovered transactions to define QoS listening policy
Figure 8-28: View discovered transaction of trade application
Figure 8-29: Configure QoS set data filter— write data
Figure 8-30: Configure QoS automatic threshold
Figure 8-31: Configure QoS automatic threshold for Back-End Service Time
Figure 8-32: Configure QoS and assign name
Figure 8-33: Deploy J2EE and Work of agents
Figure 8-34: J2EE deployment and configuration for WAS 5.0.1
Figure 8-35: J2EE deployment and work with agents
Figure 8-36: J2EE— Work with Discovery Policies
Figure 8-37: Configure J2EE discovery policy
Figure 8-38: Work with Schedules for discovery policies
Figure 8-39: Assign Agent Groups to J2EE discovery policy
Figure 8-40: Assign name J2EE
Figure 8-41: Create a listening policy for J2EE
Figure 8-42: Creating listening policies and selecting application transactions
Figure 8-43: Configure J2EE listener
Figure 8-44: Configure J2EE parameter and threshold for performance
Figure 8-45: Assign a name for the J2EE listener
Figure 8-46: Event Graph— Topology view for Trade application
Figure 8-47: Trade transaction and subtransaction response time by STI
Figure 8-48: Back-End service Time for Trade subtransaction 3
Figure 8-49: Time used by servlet to perform Trade back-end process
Figure 8-50: STI topology relationship with QoS and J2EE
Figure 8-51: QoS Inspector View from topology correlation with STI and J2EE
Figure 8-52: Response time view of QoS Back end service(1) time
Figure 8-53: Response time view of Trade application relative to threshold
Figure 8-54: Trade EJB response time view get market summary()
Figure 8-55: Topology view of J2EE and trade JDBC components
Figure 8-56: Topology view of J2EE details Trade EJB— get market summary()
Figure 8-57: Pet Store application welcome page
Figure 8-58: Weblogic 7.0.1 Admin Console
Figure 8-59: Weblogic Management Agent configuration
Figure 8-60: Creating listening policy for Pet Store J2EE Application
Figure 8-61: Choose Pet Store transaction for Listening policy
Figure 8-62: Automatic threshold setting for Pet Store
Figure 8-63: QoS listening policies for Pet Store automatic threshold setting
Figure 8-64: QoS correlation with J2EE application
Figure 8-65: Pet Store transaction and subtransaction response time by STI
Figure 8-66: Page Analyzer Viewer report of Pet Store business transaction
Figure 8-67: Correlation of STI and J2EE view for Pet Store application
Figure 8-68: J2EE dofilter() methods creates events
Figure 8-69: Problem indication in topology view of Pet Store J2EE application
Figure 8-70: Topology view— event violation by getShoppingClientFacade
Figure 8-71: Response time for getShoppingClienFacade method
Figure 8-72: Real-time Round Trip Time and Back-End Service Time by QoS
Chapter 9: Rational Robot and GenWin
Figure 9-1: Rational Robot Install Directory
Figure 9-2: Rational Robot installation progress
Figure 9-3: Rational Robot Setup wizard
Figure 9-4: Select Rational Robot component
Figure 9-5: Rational Robot deployment method
Figure 9-6: Rational Robot Setup Wizard
Figure 9-7: Rational Robot product warnings
Figure 9-8: Rational Robot License Agreement
Figure 9-9: Destination folder for Rational Robot
Figure 9-10: Ready to install Rational Robot
Figure 9-11: Rational Robot setup complete
Figure 9-12: Rational Robot license key administrator wizard
Figure 9-13: Import Rational Robot license
Figure 9-14: Import Rational Robot license (cont...)
Figure 9-15: Rational Robot license imported successfully
Figure 9-16: Rational Robot license key now usable
Figure 9-17: Configuring the Rational Robot Java Enabler
Figure 9-18: Select appropriate JVM
Figure 9-19: Select extensions
Figure 9-20: Rational Robot Project
Figure 9-21: Configuring project password
Figure 9-22: Finalize project
Figure 9-23: Configuring Rational Project
Figure 9-24: Specifying project datastore
Figure 9-25: Record GUI Dialog Box
Figure 9-26: GUI Insert
Figure 9-27: Verification Point Name Dialog
Figure 9-28: Object Finder Dialog
Figure 9-29: Object Properties Verification Point panel
Figure 9-30: Debug menu
Figure 9-31: GUI Playback Options
Figure 9-32: Entering the password for use in Rational Scripts
Figure 9-33: Terminal Server Add-On Component
Figure 9-34: Setup for Terminal Server client
Figure 9-35: Terminal Client connection dialog
Figure 9-36: Start Browser Dialog
Figure 9-37: Deploy Generic Windows Component
Figure 9-38: Deploy Components and/or Monitoring Component
Figure 9-39: Work with Transaction Recordings
Figure 9-40: Create Generic Windows Transaction
Figure 9-41: Work with Playback Policies
Figure 9-42: Configure Generic Windows Playback
Figure 9-43: Configure Generic Windows Thresholds
Figure 9-44: Choosing a schedule
Figure 9-45: Specify Agent Group
Figure 9-46: Assign your playback policy a name
Chapter 10: Historical Reporting
Figure 10-1: A typical TEDW environment
Figure 10-2: TMTP Version 5.2 warehouse data model
Figure 10-3: ITMTP— Enterprise Transaction Performance data flow
Figure 10-4: Tivoli Enterprise Data Warehouse installation scenario
Figure 10-5: TEDW installation
Figure 10-6: TEDW installation type
Figure 10-7: TEDW installation— DB2 configuration
Figure 10-8: Path to the installation media for the ITM Generic ETL1 program
Figure 10-9: TEDW installation— Additional modules
Figure 10-10: TMTP ETL1 and ETL2 program installation
Figure 10-11: TEDW installation— Installation running
Figure 10-12: Installation summary window
Figure 10-13: TMTP ETL Source and Target
Figure 10-14: BWB_TMTP_DATA_SOURCE user ID information
Figure 10-15: Warehouse source table properties
Figure 10-16: TableSchema and TableName for TMTP Warehouse sources
Figure 10-17: Warehouse source table names changed
Figure 10-18: Warehouse source table names immediately after installation
Figure 10-19: Scheduling source ETL process
Figure 10-20: Scheduling soure ETL process periodically
Figure 10-21: Source ETL scheduled processes to Production status
Figure 10-22: Pet Store STI transaction response time report for eight days
Figure 10-23: Response time by Application
Figure 10-24: Response time by host name
Figure 10-25: Execution Load by Application daily
Figure 10-26: Performance Execution load by User
Figure 10-27: Performance Transaction availability% Daily
Figure 10-28: Add metrics window
Figure 10-29: Add Filter windows
Figure 10-30: Weekly performance load execution by user for trade application
Figure 10-31: Create links for report generation in Crystal Reports
Figure 10-32: Choose fields for report generation
Figure 10-33: Crystal Reports filtering definition
Figure 10-34: trade_2_stock-check_tivlab01 playback policy end-user experience
Figure 10-35: trade_j2ee_lis listening policy response time report
Figure 10-36: Response time JDBC process— Trade applications executeQuery()
Figure 10-37: Response time for trade by trade_qos_lis listening policy
Appendix A: Patterns for E-Business
Figure A-1: Patterns layered asset model
Figure A-2: Pattern representation of a Custom design
Figure A-3: Custom design
Appendix B: Using Rational Robot in the Tivoli Management Agent Environment
Figure B-1: ETP Average Response Time
Figure B-2: ARM API Calls
Figure B-3: Rational Robot Project Directory
Figure B-4: Rational Robot Project
Figure B-5: Rational Robot Project
Figure B-6: Configuring project password
Figure B-7: Finalize project
Figure B-8: Configuring Rational Project
Figure B-9: Specifying project datastore
Figure B-10: Scheduler
Figure B-11: Scheduling wizard
Figure B-12: Scheduler frequency
Figure B-13: Schedule start time
Figure B-14: Schedule user
Figure B-15: Select schedule advanced properties
Figure B-16: Enable scheduled task
Figure B-17: Viewing schedule frequency
Figure B-18: Advanced scheduling options
Figure B-19: Entering the password for use in Rational Scripts
Figure B-20: Terminal Server Add-On Component
Figure B-21: Setup for Terminal Server client
Figure B-22: Terminal Client Connection Dialog
< Day Day Up >
Previous page
Table of content
Next page
End-To-End E-Business Transaction Management Made Easy
ISBN: 0738499323
EAN: 2147483647
Year: 2003
Pages: 105
Authors:
IBM Redbooks
BUY ON AMAZON
Information Dashboard Design: The Effective Visual Communication of Data
Using Poorly Designed Display Media
Gestalt Principles of Visual Perception
Effective Dashboard Display Media
Designing Dashboards for Usability
Sample Marketing Analysis Dashboard
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 324 Flat Conductor Cable Type FCC
Article 390 Underfloor Raceways
Article 410: Luminaires (Lighting Fixtures), Lampholders, and Lamps
Annex D. Examples
Example No. D10 Feeder Ampacity Determination for Adjustable-Speed Drive Control [See 215.2, 430.24, 620.13, 620.14, 620.61, Tables 430.22(E), and 620.14]
Special Edition Using Crystal Reports 10
Introduction to the Data Explorer
Visualizing Your Data with Charts and Maps
Using Characters in Formulas
Creating Crystal Analysis Reports
The Server Tier: Introduction to the Crystal Enterprise Framework
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
FileMaker 8 Functions and Scripts Desk Reference
Calculation Signatures
Get(SortState)
Get(WindowDesktopHeight)
TextFormatRemove()
Trim()
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Files and Directories
Network Programming
Windows Controls
Printing and Drawing with GDI+
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies