Share via


End-to-End Transaction Tracking

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

Business visibility relates to the ability of operators and users to monitor the flow of traffic through the run-time environment. Enterprises must be able to track the processes and transactions flowing through their systems at each step to ensure that they play their part in contributing to revenue generation. AmberPoint SMS simplifies the measurement and tracking of these messages in BizTalk Server. The system allows users to define new units of management that align with end-to-end business process flows, instead of being required to conform to the way developers chose to package and deploy individual service components. Figure 1 shows the screen for defining management units.

Ff650115.5e522b69-2fdd-451e-86b1-9b14ce1ff131(en-us,PandP.10).png

Figure 1
Defining a transaction as a new unit of management

After defining transactions, users can instrument and track messages associated with each transaction using the same tools that provide visibility into a single service. These tools can expose performance metrics, monitor performance against service level agreements, and generate message logs, as shown in Figure 2.

Ff650115.2a43fb3f-1947-401e-849a-5b00b2461fff(en-us,PandP.10).png

Figure 2
Monitoring the end-to-end performance of a pipeline

A major requirement for successful run-time governance and system monitoring is the detection of important business events, such as exceptions and application errors that may disrupt the logical processing of business transaction flows. AmberPoint SMS allows operators and users not only to gain insight into operational and business events, but it also allows them to monitor the impact these events have on all components that depend on the service that generated the problem. In addition, operators and users can quickly troubleshoot the entire system to identify the root-cause of a problem.