2 Why do you need to worry about monitoring? The simplest example you can relate to when it comes to monitoring is your car dashboard. A car dashboard reveals various interesting/essential details to the driver. Some of the common things include What speed you are driving? What s the fuel level? How hot is your engine? When is your next service due etc. Are the doors closed? Is everyone wearing seat belt? Your car dashboard is not just an accessory like having leather seats. It s one of the core components of the car similar to your engine and tyres. The consequences of not having a dashboard is fatal, it provides you with some important notifications. Example: If your fuel level is running low, you are conscious you need to stop in your next fuel station. It s impossible for a driver to perform all these checks every time before he starts the car or keep an eye while driving, without the monitoring and notification system. In a middleware system like BizTalk server, monitoring is identical to having a car dashboard. BizTalk server may be running with tons of core components like messaging engine, orchestration engine, throttling, etc but without having monitoring in place your system is prone to accidents. It s all about how you can capture the event well in advance and react to it. What is monitoring? Monitoring is all about 3 key items Events, Threshold and Notification. In the car example, running out of fuel is an event, your car manufacturer might configure less than 50 kms as threshold to alert user, and your dashboard becomes a notification platform. In a technical example, it would be: running out of disk space is an event, 20% free space available could be the threshold, once the free space goes below 20% then send notification in the form of /sms can be triggered. The important challenge is configuring the correct threshold values so that you are not creating too much noise (alerts) or too little so event gets unnoticed. It s also important you notify the right person. In the car case you should notify the driver, not the passenger sleeping in the rear seat.
3 Monitoring in place BizTalk example Now let s take a BizTalk example and see how having proper monitoring in place can save the accident about to happen. Spool size, i.e. number of messages in the spool table in BizTalk Message box database is one of the key metric in BizTalk environment. Any in-flight messages will have an entry in the spool table. Number of records in this table will fluctuate based on the load in your environment. In an ideal situation, if you environment is not processing anything there shouldn t be any data in this table. The depth of the spool table should not grow linearly. If in case the table grows non-stop, then there is a problem in your environment. Note: You can monitor the depth of the spool table by using the performance counter Message Box:General Counters /Spool size. It s important you monitor the growth of the spool table. In the below picture, it s important to monitor and notify corresponding users when the spool size depth is at warning level, rather than leaving it to grow till it reaches the threshold error point. The best monitoring solution is to spot and react to the situation before it gets worst. In the above scenario, by having a proper monitoring solution in place users will start getting notifications when the system enters warning state, where immediate action can mitigate the issue and bring the system to a stable state. Importance of Monitoring Organisations should take monitoring seriously if they are serious about their business. Having proper monitoring solution in place is like having cops to protect your house and neighbourhood. It s much easier and safe to avoid someone breaking into your house, than trying to find the thief after the incident. Here are the key advantages proper monitoring brings for organisations
4 Don t lose your Credibility When your systems are down, your company credibility is at risk. Once lost it may be difficult to restore customer confidence. Increase your Efficiency When you have a monitoring system, your IT department can focus on other more important business tasks, than tending to whether your infrastructure or application is down. Reduce your Costs Consistently monitoring your systems can reduce your costs and positively impact your bottom line because you will have better insight into how your infrastructure and applications are performing. Top 15 BizTalk Monitoring Best Practices The main objective of this article is to highlight the key best practices when it comes to BizTalk monitoring. 1. Create a monitoring policy and agree with business Monitoring is huge area; there are endless possibilities in what can be monitored. So, it s important to understand the business requirements and agree your monitoring policy. Here are the some of the things you need to take into consideration Application rating/sla, Accepted Downtime, Accepted Data Loss Business hours support rota Non-business hours and weekend support rota Severity Levels and Escalation procedures When to activate your DR procedure, if your production environment cannot be stabilized 2. Resolve issues proactively Let s take an example scenario where your BizTalk solution is taking advantage of tracking and business activity monitoring (BAM). For some reason the SSIS task responsible for moving the data from BAM primary import table to BAM Archive table was shut down for some reason (may be user under which its running changed the password). This is going to result in out of disk space at some point in your SQL storage area. The consequence of this scenario could be dreadful. The easy fix in this scenario would be to monitor both the health of the SSIS package execution and the availability of disk space and react to alerts proactively. 3. Understand application availability rating and SLA s? It s important to understand your application service level agreement (SLA) and availability rating. BizTalk server being a middleware product, it s also important to understand the
5 dependant systems SLA s. Example: If you are integrating a user facing web application with your SAP back end system both with the SLA of 99.99, then your BizTalk environment availability rating should be or higher. 4. Separate your infrastructure and application monitoring BizTalk monitoring can be generally divided into two top categories. Infrastructure Monitoring, and Application Monitoring In most of the organisations infrastructure and application monitoring will be handled by completely isolated teams. There will be a dedicated IT team (ex: WinTel) looking after the infrastructure, and there will be separate application support teams. Typical infrastructure monitoring items will include things like Disks, NT Services, Cluster Availability, Server Availability, SQL Jobs, BizTalk Host Instances availability, performance counters etc. Application monitoring will involve running your functional business aspects of your BizTalk application, example: Handling suspended instances, checking for failed messages, checking for transaction threshold violation (ex: PO over $1m), etc. 5. Engage early in Development Event Log Policies When talking about monitoring windows event log becomes one of the important stores. Most of the critical events that happens in the environment will get logged to the event viewer. Event Log is shared by all the applications and OS itself, so it s essential to make sure the developers don t pollute it with unnecessary information. During development clearly define the event ids for each application. Example: Event Id range to for customer application, to for dealing application etc. Once you got clear policies around event ids, then you can send monitoring alerts based on event id range to appropriate teams. Insist developers not to log informational messages like Message Processed, Refreshed Cache etc., in the event viewer. Instead they can use log files to do that. Define clear policies on what needs to be treated as warning and what needs to be treated as errors. Rule of thumb will be, if something can t be processed further like proper exceptions then it should be treated as errors. If something that works, but may not be appropriate configuration, then it should be treated as warning. 6. Take advantage of BAM and BAM alerts When it comes to application monitoring none of the external monitoring solution will be able to provide insight into your business data. With BizTalk applications you should take advantage of the BAM infrastructure provided by BizTalk server.
6 Once the BAM infrastructure is in place for your application, you can then take advantage of BAM alerting capabilities to alert if the system violates certain thresholds. Example: Purchase order value greater than $5million 7. Take advantage of Message Box Viewer Message Box Viewer or MBV for short is the tool from Microsoft PSS. The tool basically contains over 400 rules, Microsoft support people encountered during customer engagements. Example: If your environment is not running on appropriate service packs, or required hot fixes not installed, or too many instances in the message box etc. Monitoring tools like SCOM, HP Openview etc are very generic and won t have the same level of knowledge as MBV when it comes to BizTalk. You can configure custom monitoring solution like BizTalk360 to monitor for threshold violation, example: if MBV reports more than 5 critical errors or 10 non critical errors. 8. Don t create too much noise Most of the modern day monitoring solutions is capable of monitoring 100 s of things. It s important you to find the right balance. If you monitor too much, you may end up getting 10 s of alerts each day, eventually resulting in not looking in any of those alerts. That s pretty much equivalent of not having any monitoring. 9. Divert alerts to correct teams It s important to have policy and clear understanding of who is receiving what. There is no point in diverting an infrastructure related alert to an application support person and vice versa. If the alert is not relevant, that person is going to skip it and not take any action upon. This pretty much defeats the whole point of monitoring and notification. 10. Review your thresholds periodically You environment is not static, the threshold you set few months ago may not be appropriate today. Example: You might have set a spool depth threshold of 5000 when your system went live, but now you got more applications running in your environment and that value no longer valid. Instead of simply neglecting the alert, take some effort to correct it and assign appropriate value. 11. Customize rules as necessary for your environment. The threshold in one environment may not be the same in other. Example, you may have 2 BizTalk production environments, one used for low latency transactions and other for normal transactions. The threshold values may not be identical in both these environment. Maintain appropriate threshold values per environment so that the alerts make sense, rather than simply ignoring them. 12. Take advantage of automated tasks Monitoring solutions like SCOM, HP Openview etc are capable of executing some tasks in the event of threshold violation in addition to notifications. Lot of the infrastructure issues could be intermittent ones like temporary loss of connectivity, access denied etc. Sometimes it s possible to resolve issues by simply restarting a service. Note: Care should be
7 taken when taking this route, so that you don t lose any sessions. Example: Resetting IIS will result in losing active sessions. 13. Monitor your Line of Business applications as well BizTalk server being a middleware product is going to rely on the healthy functioning of all the systems it s integrating with. Health of an underlying system can directly impact the health of your BizTalk environment. Wherever possible, maintain a minimum level of monitoring for your external LOB systems/applications. 14. Take advantage of cheap LCD monitors These days the cost of LCD monitors is negligible, most of the monitoring solutions comes with lot of interesting dashboards fully configurable. You should take advantage of it, place few monitors each displaying health of various parts of the system and assign monitoring responsibilities to corresponding team/team member. 15. Don t forget to appreciate/reward your monitoring team In some organisations the work done by monitoring teams goes unnoticed, because there is no business failure and everything works smoothly. The top management tend to spot team/people only in the event of disaster and someone helps to recover the system. Monitoring teams work hard, not to get to that state, so it important to appreciate and reward your monitoring team/people. About the Author and BizTalk360 Saravana Kumar is the Founder/CTO of BizTalk360 (http://www.biztalk360.com), He works with BizTalk since its early releases. Since 2005 he shares his experience with the community at his blog (http://blogs.digitaldeposit.net/). In 2007 he started running BizTalk 24 * 7 (http://www.biztalk247.com) a website dedicated for all the Microsoft BizTalk Server resources. Saravana has been awarded Microsoft MVP 5 times in a row since 2007 for his various contributions to the world wide Microsoft BizTalk community. BizTalk360 is web based production support/monitoring tool for Microsoft BizTalk Server. It addresses various challenges (Governance, message security, monitoring, authorization, etc.) organisations face today in running their BizTalk environment efficiently. It provides various tools and dashboard to help support people run their day-to-day administrative and operation tasks. It s been trusted by customer across various countries and industry sectors. For more information visit
On Designing and Deploying Internet-Scale Services James Hamilton Windows Live Services Platform ABSTRACT The system-to-administrator ratio is commonly used as a rough metric to understand administrative
John Inverso Technology Overview 10 November 2000 Help Desk Systems and Software: Overview Summary The help desk can be both a boon and a burden to a company, either increasing customer satisfaction and
SYMANTEC ServiceDesk Customization Guide 7.0 Symantec ServiceDesk 7 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Rob Davis Everyone wants a good process. Our businesses would be more profitable if we had them. But do we know what a good process is? Would we recognized one if we saw it? And how do we ensure we can
Securing Enterprise Applications Version 1.1 Updated: November 20, 2014 Securosis, L.L.C. 515 E. Carefree Highway Suite #766 Phoenix, AZ 85085 T 602-412-3051 email@example.com www.securosis.com Author
Getting Started with SharePoint Online for Small Business By Robert Crane Computer Information Agency http://www.ciaops.com Terms This Guide from the Computer Information Agency is provided as is. Every
Making Everything Easier! Quest Software Limited Edition Application Performance Monitoring Learn to: Leverage APM to make your business more efficient Discover application issues quickly Proactively monitor
Choosing IT Service Management Software What to look for in an IT Service Management solution Monitor 24-7 Inc. www.monitor24-7.com firstname.lastname@example.org 1 416 410 2716 1 866 364 2757 Introduction Service
Getting Started with New Relic: A Newbie s Table of Contents INTRODUCTION: Hello There, Newbie CHAPTER 1: Application Monitoring Overview CHAPTER 2: Real User Monitoring (RUM) CHAPTER 3: Transaction Traces
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The
A new Breed of Managed Hosting for the Cloud Computing Age A Neovise Vendor White Paper, Prepared for SoftLayer Executive Summary Traditional managed hosting providers often suffer from issues that cause
DATA CENTER DESIGN White Paper JAN KREMER CONSULTING SERVICES Data Center Design White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 4 1.1. DOCUMENT OUTLINE... 4 2. GENERAL DESIGN PRINCIPLES... 5 2.1.
The Top 5 AWS EC2 Performance Problems How to detect them, why they occur and how to resolve them Alexis Lê-Quôc, CTO, Datadog Mike Fiedler, Director of Technical Operations, Datadog Carlo Cabanilla, Senior
SETLabs Briefings VOL 7 NO 1 2009 The Sixth Sense Factor By Amit Jnagal and Chinku Simon Proactive information mining can be a novel approach in business Like most industry verticals, retail and supply
Application Performance Management for Enterprise Applications White Paper from ManageEngine Web: Email: email@example.com Table of Contents 1. Introduction 2. Types of applications used
ClickSoftware Copyright Notice Copyright 2008 ClickSoftware Technologies Ltd. All rights reserved. Publication Notice The information contained herein does not constitute a warranty of any kind. ClickSoftware
Managed Workplace 2012 Setup Guide On Premise See All. Manage All. Service All. www.levelplatforms.com TABLE OF CONTENTS Welcome... vii About this Document... viii Where To Get More Help... viii Contact
The HP OpenView approach to Help Desk and Problem Management. "Preparing Today for the Help Desk of Tomorrow. HP OpenView Author: Ken Wendle Version: 2 This white paper refers to the HP OpenView ITSM 5.6
Credit value:? Unit 3 Information systems 3 Information systems Organisations can exploit information to do better at planning, monitoring and controlling their business activity. However, it is easy to
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
A BasisOnDemand.com White Paper ROADMAP TO DEFINE A BACKUP STRATEGY FOR SAP APPLICATIONS Helps you to analyze and define a robust backup strategy by Prakash Palani (Prakash.Palani@basisondemand.com) Table
Vision & High Level Design Overview OpenDI Release 1 October 2008 v1.6 J. Carolan, J. Kirby, L. Springer, J. Stanford http://opendi.kenai.com Abstract This document provides a high level overview of the
White paper The future of Service Desks - vision Service Desks require strategic consideration and innovation to raise user productivity and to support business goals. Fujitsu has the experience and feedback
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer