Feeds

Compuware teases package for data center performance anxiety

PureStack spots drooping apps

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

Compuware has developed an app monitoring tech to help admins with performance anxiety spot problems in their infrastructure.

The "PureStack" technology was announced by Compuware on Tuesday and sees the application performance management (APM) company try to tackle app monitoring with an agent-based technology that works across varied tech environments.

PureStack catalogues the apps running on an organization's IT stack, as well as the infrastructure supporting them. It does this by collecting host and process information using operating system-specific API calls to get CPU, memory, disk, and network utilization data to help admins spot app performance going wonky.

PureStack supports Windows, Linux, AIX, Solaris, and HPUX OS's, along with the ESX and Xen hypervisors, and the Amazon and Windows Azure clouds. Support for Hyper-V and KVM is lacking, but both should come in the next release.

It works via a 2MB agent which admins need to copy over to the server they want to monitor. Compuware has specific agents for Java, .net, PHP, and the Apache and Oracle Application Server (iAS), which can capture health within native processes. For everything else there's a generic agent that will capture host metrics regarding hardware utilization, but not be able to peer inside the running software.

The agent-generated data is pulled into PureStack via a slew of customizable dashboards, charts, and reports, which admins can then massage and fiddle with at their pleasure.

All this intelligence comes at a price, though, with some Compuware customers reporting a response time and CPU overhead of one to three percent for widely deployed monitoring. This pales in comparison to Google's proprietary application performance monitoring CPI2 tech, which has an overhead of 0.1 per cent. However, you can buy Compuware's stuff, and Google isn't selling CPI2 - yet.

The company claims that by being able to gather both app and infrastructure data, PureStack represents one of the first truly comprehensive APM technologies.

Though it may be comprehensive, it lags behind some of the more specific monitoring competition. Boundary, for example, can give admins faster information on application instability through its network-centric approach, but the tradeoff is companies will need to user partner technologies to look inside the apps as well. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.