Debugging & Managing system performance

Question 1 of 34

1

Which feature in Pega Platform allows you to measure the overall quality of an application's design?

Select one of the following:

  • Compliance score

  • The Tracer tool

  • Live UI

  • Channel interface manager

Explanation

Question 2 of 34

1

If you are a Cloud Customer, what is the best way for you to set a performance threshold?

Select one of the following:

  • Adjust the application compliance score.

  • Monitor the alert logs.

  • Create a DSS record to adjust the threshold.

  • Adjust the threshold through the prconfig.xml system file.

Explanation

Question 3 of 34

1

In which two ways can you identify rule caching performance issues? (Choose Two)

Select one or more of the following:

  • Use PAL to evaluate rule caching at the application level.

  • Use PAL to determine which rules should be deleted.

  • Count the number of rules that cache by running a report.

  • Use the My Performance Detail along with the user ID to evaluate rule caching at the user level.

Explanation

Question 4 of 34

1

Which three actions can you take to minimize the number of ruleset lists in use in an application? (Choose Three)

Select one or more of the following:

  • Minimize the number of access groups.

  • Eliminate multiple ruleset versions by skimming rules to the next minor or major version.

  • Merge branch rulesets before migrating an application.

  • Eliminate unnecessary personal rulesets.

  • Limit the number of operators who access an application.

Explanation

Question 5 of 34

1

Which two of the following statements about large tables in Pega Platform are true? (Choose Two)

Select one or more of the following:

  • You can archive old data to reduce database table size.

  • You can create database table records for one or more classes in a class group.

  • Large tables cause issues only if you have not archived the data that is stored in the large tables.

  • Only a database administrator (DBA) can tune Pega Platform to reduce issues that arise from large tables.

  • Using a BLOB prevents data compression.

Explanation

Question 6 of 34

1

Which performance tool do you run to determine which specific step executed by your requestor session that is causing a problem?

Select one of the following:

  • The Database Trace tool

  • The Performance Profiler tool

  • The PegaRULES Log Analyzer (PLA)

  • The Performance Analyzer (PAL)

Explanation

Question 7 of 34

1

Which two types of issues are identified by using Pega Platform alerts? (Choose Two)

Select one or more of the following:

  • Performance

  • Functional

  • Security

  • Configuration

Explanation

Question 8 of 34

1

Which two approaches reduce the possibility of rule caching causing performance issues in your application? (Choose Two)

Select one or more of the following:

  • Only allow rule checkout for operators who need to work in checked out rules.

  • Create multiple access groups.

  • Remove branch rulesets in your production system.

  • Classify the nodes in your system.

Explanation

Question 9 of 34

1

Which performance tool do you run to examine a query made to the database?

Select one of the following:

  • The PegaRULES Log Analyzer (PLA)

  • The Performance Profiler tool

  • The Database Trace tool

  • The Performance Analyzer (PAL)

Explanation

Question 10 of 34

1

Which of the following options can you use along with system alerts to determine if your application performance needs optimization?

Select one of the following:

  • Performance Profiler

  • Database Trace

  • Live UI tool

  • Performance Analyzer (PAL)

Explanation

Question 11 of 34

1

Fill the blank spaces to complete the text.

Use "pega", "alert", or "alertsecurity":
A node was shut down for an update:
A database query exceeded the performance threshold:
A login attempt failed due to an incorrect password:
An attempt to access a third-party service failed due to an incorrect user name:

Explanation

Question 12 of 34

1

A SECU0006 alert is generated with the message PRPC detected excessive failed login attempts for the user:XXXX from IP:192.168.100.100. Brute force attack prevention measures were invoked. What three pieces of information do the alert ID and message provide? (Choose Three)

Select one or more of the following:

  • It is a security-related alert

  • The alert type

  • It is a performance-related alert

  • The requestor type

  • A description of the alert

Explanation

Question 13 of 34

1

Fill the blank spaces to complete the text.

The logging level identifies the severity of the issue.
: Severe errors that can cause the application to terminate.
: Serious errors that might allow the application to continue running.
: Performance-related issues, such as an exceeded performance threshold, or an event that affects performance, have occurred.
: Potential issues that might cause an adverse performance result.
: Notifications of runtime events, such as system startup or shutdown.
: Informational events that are useful for debugging.

Explanation

Question 14 of 34

1

Fill the blank space to complete the text.

The is a standalone web application that developers and system administrators can use to view consolidated summaries of system log data. The [....] consolidates and summarizes the ALERT, PEGA, and Garbage Collection (GC) logs. The log data provides key information about operational and system health that developers and system administrators can use to quickly identify, diagnose, and address performance issues.

Explanation

Question 15 of 34

1

The is a that developers and system administrators can use to view data. The [....] consolidates and summarizes the logs. The log data provides key information about operational and system health that developers and system administrators can use to quickly performance issues.

Drag and drop to complete the text.

    PegaRULES Log Analyzer (PLA)
    standalone web application
    consolidated summaries of system log
    ALERT, PEGA, and Garbage Collection (GC)
    identify, diagnose, and address

Explanation

Question 16 of 34

1

Log files capture ranging from to that can cause . Each log is managed by an , which determines the type of events written to the log file. The available log files vary, depending on the that are configured in the .

The following log files are commonly used on Pega Platform systems:

The log contains warnings, errors, and information messages about internal operations. This log is also called the console log or system log and is used for debugging the application.
The log contains performance-related alerts triggered when an operation exceeds the specified performance threshold.
The log contains alerts (identified by the prefix SECU) that suggest improper configuration of Internet Application Composer facilities, or overt attempts to bypass system security features on the Pega Platform node through URL tampering.
The log contains entries generated by the Business Intelligence Exchange (BIX) during extract operations.
The log contains performance data saved from services.
The log contains information about the setup and run-time behavior of the cluster.

Note: Pega Platform manages logs based on . For example, to log performance data for services, you add configuration file for the node.

You access log files from the in Dev Studio. The Log utilities section includes a list of log file . Clicking Log files displays a list of the log file appenders that are . Downloading a log file requires for the application server that hosts Pega Platform. You can also view log files using an external log viewer, such as .

A system administrator can in to control which logging events are displayed in the PEGA log by creating a . Events are recorded only for the .

When debugging an activity, you can use the with the logging level set to to add an event to the PEGA log regardless of settings in the . To reduce log entries and improve performance in production systems, remove InfoForced steps or convert them to comments when you finish debugging the activity.

Drag and drop to complete the text.

    event notifications
    routine system status information
    severe errors
    an application to quit unexpectedly
    appender
    log file appenders
    system settings
    PEGA
    ALERT
    ALERTSECURITY
    BIX
    SERVICES-PAL
    CLUSTER
    NODES
    SERVICES
    BIX_LOGGING
    SECURITYALERT
    PERFORMANCE
    SYSTEMS
    which appenders are configured
    SERVICES-PAL in the prlog4j2.xml
    Log utilities section of the Logs tab
    appenders and an external log viewer
    active on the system
    administrator credentials
    Kibana
    override log level settings
    Admin Studio
    log category
    selected logging level and higher
    Log-Message method
    InfoForced
    prlog4j2.xml file or the Log Category

Explanation

Question 17 of 34

1

As a Pega Cloud client, you can download log files from the for internal analysis or to share with . From the My Pega Cloud tab, you can download a created from your environment during the . Each download you complete using the My Pega Cloud portal supports ; to download more additional logs, you for the additional day's logs. The log bundle is a you can download to your local computer.

At run time, the Pega for application issues. Alerts are that serve as important notifications about the .

are generated when rule execution exceeds a . are generated when the security of a . Analyze alerts to identify the root cause of a performance or security issue. You can access alerts from your session from the . The alert format provides information about the alert. You can determine whether the alert is related, the , the (for example, a browser), and that triggered the alert from the alert format.

The most frequently-generated alert is the alert, which occurs when the elapsed time for an HTTP interaction time exceeds the threshold setting.

The alert is generated when Pega Platform encounters a thread name in the that and whose name contains . This alert allows you to identify potentially malicious scripts that have been inserted into the thread name portion of the URL so that you can research and or other issues as appropriate.

Drag and drop to complete the text.

    My Pega Cloud portal
    Pegasystems Global Client Support (GCS)
    bundle of specified log files
    last 365 days
    up to seven days of logs
    must initiate a separate request
    compressed TAR file
    generates alerts
    performance and security-related
    text-based messages
    functioning of your system
    performance threshold
    Performance alerts
    Security alerts
    Pega Platform server is at risk
    My Alerts display
    performance or security
    type of alert
    type of requestor
    the activity or stream
    PEGA0001
    SECU0005
    URL of an HTTP request
    does not already exist in the requestor
    invalid characters
    correct the thread name

Explanation

Question 18 of 34

1

Used to understand the system resources consumed by processing a single requestor session:
Used to tune the application in case of any database performance issues:
Used to get a detailed trace of performance information about the execution of activities, when rules, and data transforms executed by your requestor session:
Used to actively gather, monitor, and analyze real-time performance and health indicators from all active Pega applications:

Drag and drop to complete the text.

    Performance Analyzer (PAL)
    Database Trace
    Performance Profiler
    Pega Predictive Diagnostic Cloud

Explanation

Question 19 of 34

1

A developer collects baseline readings for a flow action in the system via Performance Analyzer. A change for the same flow actions comes later in the sprint. The developer collects the Performance Analyzer readings again for that flow action.

What might the comparison of the new and previous readings suggest?

Select one of the following:

  • Negative performance change.

  • Positive or negative performance change

  • Positive performance change.

  • No performance change.

Explanation

Question 20 of 34

1

DB Trace is best suited to diagnose a performance issue in which two of the following environments? (Choose Two)

Select one or more of the following:

  • Development

  • Production

  • Production Mirror

  • Staging

Explanation

Question 21 of 34

1

Which two statements about the Database Trace are true? (Choose Two)

Select one or more of the following:

  • Operating the Database Trace tool might adversely affect performance by producing a large volume output.

  • The Database Trace provides a view of all the performance statistics that Pega Platform captures.

  • The Database Trace readings are grouped into three different types: Elapsed, CPU, and Count.

  • The data that you download from the Database Trace contains a sequential progression of trace events.

Explanation

Question 22 of 34

1

The Performance Profiler is used to identify a step of a data transform that might have a performance issue.

Select one of the following:

  • True
  • False

Explanation

Question 23 of 34

1

Which two metrics does the Performance Profiler tool measure? (Choose Two)

Select one or more of the following:

  • Number of alerts were shown during a test.

  • Number of rules that are used during the test.

  • Time spent to complete a step.

  • Results of when conditions.

Explanation

Question 24 of 34

1

Which two of the following elements does PDC monitor? (Choose Two)

Select one or more of the following:

  • Health statistics

  • Informational messages

  • Alerts

  • Application errors

Explanation

Question 25 of 34

1

Which statement about PDC is true?

Select one of the following:

  • PDC is designed for technical administrators and access should be limited to system administrators.

  • PDC environment must be secured because monitored applications can inadvertently send confidential customer data in alert details.

  • PDC provides a wide variety of application health and error alerts as well as tools to manage exceptions and recommended improvements.

  • Alert thresholds should not be set too low because the increase in alert volume degrades application performance.

Explanation

Question 26 of 34

1

As you run a case instance, you notice it takes a significant amount of time to advance from one view to the next view. You run the case multiple times and notice the same slow performance. How do you proceed?

Select one of the following:

  • You use the Performance Profiler tool.

  • You use Pega Predictive Diagnostic Cloud™ (PDC).

  • You use the Performance Analyzer (PAL).

  • You use the Database Trace tool.

Explanation

Question 27 of 34

1

The reason you want to run a process immediately before you take performance readings is ____________.

Select one of the following:

  • to ensure that you know which buttons to click so you can test quickly

  • to ensure that there are no bugs in the system

  • to train the system which process you are going to measure

  • to allow the rules to assemble

Explanation

Question 28 of 34

1

In which scenario is it most appropriate to leverage Predictive Diagnostic Cloud?

Select one of the following:

  • A company has a Pega application and is interested in finding the cause of an error that occurs during case processing.

  • A company has a Pega application and is interested in browsing a list of performance-related alerts.

  • A company has multiple Pega and non-Pega Platform applications and is interested in receiving guidance to avoid system performance issues.

  • A company has multiple Pega applications and is interested in monitoring the health of all active applications.

Explanation

Question 29 of 34

1

Which performance tool do you use to collect performance data for individual steps in a data transform?

Select one of the following:

  • Database Trace

  • Clipboard tool

  • Performance Profiler

  • Performance Analyzer (PAL)

Explanation

Question 30 of 34

1

The provides access to the three performance tools: Performance Analyzer (PAL), Database Trace, and Performance Profiler. These tools are also available from the . Performance statistics can help you distinguish between that arise in the , . In all cases, the statistics can help you determine how to improve performance.

: Pega always gathers cumulative resource statistics. Use this tool to understand the system resources consumed by processing a single requestor session. It works on existing data; it does not degrade processing.
: This tool is useful to tune the application in case of any database performance issues.
: Use this to obtain a detailed trace of performance information about the execution of activities, when condition rules, and data transforms executed by your requestor session.

Drag and drop to complete the text.

    Performance Analyzer (PAL)
    Database Trace
    Performance Profiler
    Performance landing page
    Performance tool in the toolbar
    performance issues
    Pega Platform server, the database
    or external systems called

Explanation

Question 31 of 34

1

Performance Analyzer (PAL)
The first step to measuring your application performance is to . Start by clicking to clear any data in the tool. Because the system continuously monitors performance, you are entries from your results by resetting data.

There are two options for adding a reading: and . The only difference between the two readings is the clipboard size, which .

When adding a reading, the best practice is to that identify . For example, use one reading or , depending on what process you are measuring. You can download the results to an Excel file by clicking .

The row displays the totals from the Performance tool made a reading. This bottom row shows the totals since the of the Performance tool. Most readings in this row at the outset are . If the readings are , click Reset Data to reset the readings. Each subsequent reading is labeled as a , which indicates the . Delta rows are displayed as you . Each row shows values that from the . The reading reflects the since .

Clicking INIT, DELTA, or FULL displays more details about the reading. Many different results are available to you for analyzing the performance. Be mindful of , as it can skew initial readings. To obtain results unaffected by FUA, run through the process once to ensure that before taking any measurements.
: Sequence number of the most recent completed interaction.
: Total number of interactions.
: Total elapsed time for this interaction.
: Rules assembly elapsed time.
: Elapsed time spent finding rules.
: Elapsed time executing SQL operations against the PegaRULES database; for the PegaRULES database or external databases.
: Time spent waiting for an Connect rule execution .
: Elapsed time accessing instances from the PegaRULES database plus the elapsed time .
: Total CPU time used.
: CPU time spent assembling Java classes.

Drag and drop to complete the text.

    take measurements
    Reset Data
    eliminating any previously recorded
    Add Reading
    Add Reading with Clipboard Size
    takes extra time to calculate
    define points
    what occurred during that reading
    per flow action
    screen render
    Save Data
    INIT
    DELTA
    the first time
    first intitialzation
    near zero
    not near zero
    change from a previous reading
    interact with Pega Platform
    accumulated
    previous Delta or Init row
    FULL
    totals
    that start of your session
    or the most recent Reset Data operation
    first use assembly (FUA)
    all rules are assembled
    Int #
    Int Count
    Total Elapsed
    RA Elapsed
    Rule I/O Elapsed
    RDB I/O Elapsed
    Connect Elapsed
    excludes Connect SQL executions
    to an external system
    Other I/O Elapsed
    non-rule-resolved
    retrieving non-rule database lists
    Total CPU
    RA CPU

Explanation

Question 32 of 34

1

Database Trace
Run Database Trace if indicate performance issues in the . Database Trace can trace like that are performed.

The Database Trace produces a containing of your requestor session with the or . A basic familiarity of SQL Operations, (for example read, write, and insert), and BLOB is useful to interpret the output. Downloaded data contains a of trace events.

Operating the Database Trace tool can by producing a large volume output. Use the tool for , in appropriate for debugging.

Click to open the settings window. The settings window lists to trace. If an event is , remove it from the list to streamline the results. You also have the option to . Generating the stack trace is an process and should only be used when required.

Drag and drop to complete the text.

    PAL readings
    database operations
    all the SQL operations
    queries or commits
    text file
    the SQL statements,
    rule cache hit statistics, timings, and
    other data that reflect the interactions
    Pega database
    other relational databases
    sequential progression
    adversely affect performance
    short periods
    non-production environments
    Trace Options
    all possible events
    inapplicable to a situation
    generate a stack trace
    expensive

Explanation

Question 33 of 34

1

Performance Profiler
Use the Profiler to obtain a of performance information about the execution of , and by . The Profiler traces of rules of in . The Performance Profiler should be run in conjunction with to narrow down the specific step of the cause. When you use the Performance Profiler, you of the application's performance, and then you to identify problems.

The Performance Profiler requires . Stop the Performance Profiler as soon as your data collection is complete.

In the Performance Profiler results table, click the Download icon to save the results in a . The results can then be opened by using any spreadsheet program, such as Excel, to review the Performance Profiler readings.

: Marks the beginning of each activity step or other row.
: Sequence number of the interaction, as recorded in the Performance tool. Starts with 1 on the initial display of the login form.
: Handle of the activity, when condition, or data transform.
: Handle of the activity that called the current rule.
: Step number. For when condition rules, this value is always . For data transforms, this value is always .
: For activities, . For when condition rules, . For data transforms, .
: Total CPU time in seconds for this step. If this step contains a , the CPU time of .
: Total CPU time in seconds for this step, excluding time for called processing. If this step contains a Call or Java instruction, the CPU time of .
: Elapsed time in seconds to complete this step. Values reflect the impact of other users on this server, waits for database operations and external events, and so on.
: Elapsed time (wall time) in seconds, for this step, . (This value is useful for isolating the performance of that may perform extensive processing in addition to calling activities.)

Drag and drop to complete the text.

    detailed trace
    activities, when condition rules
    data transforms executed
    your requestor session
    every execution (in all Threads)
    these three types
    all rulesets
    Performance Analyzer
    first record readings
    analyze the readings
    substantial processing overhead
    comma-separated value file format
    Sequence
    Interaction
    Activity
    Caller
    Step
    W
    M
    Method Name or When Result
    Total CPU time
    identifies the method in the step
    displays true or false
    this value is blank
    Call or Java instruction
    called activities is included
    CPU Time Without Children
    called activities is not included
    Total Wall Time
    Wall Time Without Children
    exclusive of any called processing
    Java steps

Explanation

Question 34 of 34

1

Pega Predictive Diagnostic Cloud
The PDC is a Software as a Service (SaaS) tool that runs on Pega Cloud and actively , and from such as alerts and guardrail violations. PDC allows you to monitor Pega applications.

Pega sends to PDC by using only the clipboard parameter data that is . The data is sent to minimize any performance impact on the monitored Pega implementation. Data with is not sent due to privacy concerns, and PDC from the monitored application.

Pega gathers the following data for PDC:
: Identifies the type of alert and the metadata captured in an interaction.
: Describes the parameters from the current parameter page, including important contextual information about the functions that run in the monitored application. All remaining parameters are filtered out and excluded.
: Details the database query, excluding business data values.
: Contains some contextual data that is a subset of the fields sent for alerts.
: Includes statistics for average response time and unique user count. PDC uses these statistics to identify overall performance and performance trends for monitored applications.
: Includes database index information. PDC uses database index information to generate recommendations to improve query performance.

PDC the data generated from Pega applications to produce . The trending dashboards provide a of daily , . The presentation of data in helps to by presenting behavior over time. PDC empowers and IT administrators to take preventative action by predicting potential system performance and business logic issues and providing remediation suggestions.

Use to view a summary of issues that affect the performance of your monitored system. Use to conduct an in-depth investigation.

Pega Predictive Diagnostic Cloud generates that you can receive as messages to help you address any issues that might occur. By default, PDC sends notifications by email. However you can configure PDC to send individual notifications by .

Drag and drop to complete the text.

    gathers, aggregates, monitors
    and analyzes real-time performance
    health indicators
    all active Pega applications
    several on-premise and cloud-based
    known and safe content
    required for analysis
    asynchronously
    identifying information
    does not request information
    Alerts
    Parameter page
    Database alerts
    Exceptions
    Performance statistics
    Database indexes
    analyzes and aggregates
    trending dashboards (graphs)
    graphical representation
    average response usage
    interaction volume, and
    user sessions counts
    trend graphs
    monitor, isolate and identify
    and anticipate issues
    business stakeholders
    Improvement Plan
    Event Viewer
    notifications
    SMS, notification API, or to ServiceNow

Explanation