Why a New Generation? What’s Wrong with the Old One?
Traditional systems management tools focused on monitoring the health of individual components. Tools like IBM Tivoli, BMC patrol, CA Unicenter, and HP Openview, initially focused on management of servers, services, and resources. In those days, the equation was relatively simple – 100% CPU utilization = bad, 10% CPU utilization = good.
However, the increasing complexity of applications introduced numerous new enterprise application components including databases, connection pools, Web servers, application servers, load balancing routers, and middleware. The business service management (BSM) industry followed shortly after, and began offering tools for database management, network traffic monitoring, application metrics mining, and analyzing Web server access logs.
Each of these business service management tools “speaks” a different language – database management tools speak in “SQL statements,” network traffic tools use “packets,” while systems monitoring report in “CPU and disk usage.”
In comes the war room. To cope with the proliferation of information sources, enterprises developed the notion of the war room. Whenever slow response times or poor performance of critical applications is detected, relevant personnel are grouped together into a room for brainstorming and joint monitoring. This involves a large amount of professionals, since a single transaction may flow through several infrastructure components. For example, a financial transaction will trigger an HTTP request to an Apache Web server installed on top of Red Hat Enterprise Linux, which in turns calls a WebSphere application server on a Windows machine, flowing through an MQSeries queue, eventually querying an Oracle database.
Members of the war room typically include Java and J2EE performance experts, Microsoft Windows system managers, Unix (Linux, Solaris, HP-UX, etc.) system managers, database administrators, network sysadmins, and proxy specialists, just to name a few. This is a lengthy process that can take thousands of man hours to complete.
The new generation of systems monitoring and management tools, widely referred to as Business Transaction Management (or BTM), offer a new approach. Instead of monitoring SQL statements, TCP/IP packets, and CPU utilization, Transaction Management tools view everything from an application perspective. In the world of transaction management, an application is considered as a collection of transactions and events, each triggering actions on the infrastructure. The goal is to track every transaction end-to-end and correlate to the information collected from the infrastructure. Such an end-to-end view enables to quickly isolate and troubleshoot the root cause of performance problems and start tuning proactively. This application-centric information base enables a group of professionals working together to speak the same language and focus on facts, rather than guesswork.
According to IDC (Business Transaction Management – Another Step in the Evolution of IT Management), BTM will likely become a core offering of established IT system management vendors, since it can contribute to almost every aspect of IT management – ranging from performance management, SLA management, and capacity planning, to change and configuration management (CMDB).