본문 바로가기
카테고리 없음

Microsoft Service Trace Viewer Download

by melimibapsucam 2020. 12. 13.


https://sisumeno.tistory.com/4. Site devoted to the Parker pens history and timeline. The ultimate guide in the Parker Pen jungle and an invaluable asset for fountain pen collectors. One of the frequent requests I receive is on the year their grand fathers old Parker was manufactured. To help you with this I have listed the serial number & year. First - go (click) here --> Find manufacturing dates by serial number, to find what year your Parker was manufactured. Second, remove the barrels from the frame. Here's a Fly Bass serial number example: Serial Number 092075. 092 = internal code. 075 = number in the production sequence (75) top.

Home WCF debugging using Service Trace Viewer Tool (SvcTraceViewer.exe) WCF debugging using Service Trace Viewer Tool (SvcTraceViewer.exe) September 29. Microsoft SDKs Windows v8.1A bin NETFX 4.5.1 Tools> If the WCF service is hosted by IIS add the following to web.config. Jul 10, 2017 - NET Trace Viewer – WebForms, MVC, Web API, WCF. Microsoft describes ASP. The code interacts with Redis, 2 SQL queries, and an external HTTP web service call. Prefix is an amazing tool that is free to download!

Home > Sample chapters

  • By Orin Thomas
  • 6/2/2014
Contents×
  1. Lesson 1: Monitoring servers

Lesson 1: Monitoring servers

Unwatched servers, like unwatched children, invariably end up in a chaotic state. Monitoring a server using data collector sets, alerts, and events enables you to keep an eye on the server’s performance and configuration. Although effective monitoring is unlikely to stop a server from ever experiencing problems, it often provides warning signs about developing problems, giving you a chance to resolve them before they cause a service disruption. In this lesson, you learn how to configure data collector sets, manage alerts, monitor events, and perform network monitoring.

Configuring data collector sets

Data collector sets enable you to collect performance data, system configuration information, and statistics into a single file. You can use Performance Monitor or other third-party tools to analyze this information to make a determination about how well a server is functioning against an assigned workload.

You can configure data collector sets to include the following:

  • Performance counter data The data collector set not only includes specific performance counters but also the data generated by those counters.
  • Event trace data Enables you to track events and system activities. Event trace data can be useful when troubleshooting misbehaving applications or services.
  • System configuration information Enables you to track the state of registry keys and record any modifications made to those keys.

Windows Server 2012 and Windows Server 2012 R2 include the following built-in data collector sets, as shown in Figure 10-1.

FIGURE 10-1 Built-in data collector sets

  • Active Directory diagnostics Available if you have installed the computer as a domain controller; it provides data on Active Directory health and reliability.
  • System diagnostics Enables you to troubleshoot problems with hardware, drivers, and STOP errors.
  • System performance Enables you to diagnose problems with sluggish system performance. You can determine which processes, services, or hardware may be causing performance bottlenecks.

To create a data collector set, perform the following steps:

  1. Open Performance Monitor from the Tools menu of the Server Manager console.
  2. Expand Data Collector Sets.
  3. Click User Defined. On the Action menu, click New, and click Data Collector Set.
  4. You are given the option of creating the data collector set from a template, which enables you to select from an existing data collector set, or to create a data collector set manually. If you choose to create a data collector set manually, you have the option of creating a data log, which can include a performance counter, event trace data, and system configuration information; or a performance counter alert. This choice is shown in Figure 10-2.

  5. If you select Performance Counter, you then choose which performance counters to add to the data collector set. You also specify how often Windows should collect data from the performance counters. Figure 10-3 shows data being collected once every 15 seconds.

    FIGURE 10-3 Setting an interval for the data collector set

  6. If you choose to include event trace data, you need to enable event trace providers. As Figure 10-4 shows, a large number of event trace providers are available with Windows Server 2012 R2. You use event trace providers when troubleshooting a specific problem. For example, the Microsoft Windows-AppLocker event trace provider helps you diagnose and troubleshoot issues related to AppLocker.

  7. If you choose to monitor system configuration information, you can select registry keys to monitor, as shown in Figure 10-5. Selecting a parent key enables you to monitor all registry changes that occur under that key while the data collector set is running.

    FIGURE 10-5 Setting registry keys to record

  8. You then specify where you want data collected by the data collector set to be stored. The default location is the %systemdrive%PerfLogsAdmin folder. If you intend to run the data collector set for an extended period of time, you should store the data on a volume separate from the one that hosts the operating system.
  9. The final step in setting up a data collector set is to specify the account under which the data collector set runs. The default is Local System, but you can configure the data collector set to use any account for which you have the credentials.

You can schedule when a data collector set runs by configuring the Schedule tab of a data collector set’s properties as shown in Figure 10-6.

Managing alerts

Performance counter alerts enable you to configure a task to run when a performance counter, such as available disk space or memory, falls under or exceeds a specific value. To configure a performance counter alert, you create a new data collector set, choose the Create Manually option, and select the Performance Counter Alert option, as shown in Figure 10-7.

FIGURE 10-7 Configuring the performance counter alert

You add the performance counter, threshold value, and whether the alert should be triggered if the value exceeds or falls below this value. Figure 10-8 shows an alert that is triggered when the amount of available memory falls below 512 megabytes.

When you create an alert, all it does when triggered is to add an event to the event log. You can also configure an alert to run a scheduled task when triggered. You do this by editing the properties of the alert and specifying the name of the scheduled task on the Task tab, as shown in Figure 10-9.

FIGURE 10-9 Running a scheduled task

Monitoring events with viewer

Event Viewer, shown in Figure 10-10, enables you to access recorded event information. The Windows Server 2012 and Windows Server 2012 R2 Event Viewer differs from the Event Viewer in earlier versions of the Windows Server operating system, such as Windows Server 2003, in that it not only offers the application, security, setup, and system logs, but it also contains separate application and service Logs. These logs are designed to provide information on a per-role or per-application basis, rather than having all application and role service-related events funneled into the application log. When searching for events related to a specific role service, feature, or application, check to see whether that role service, feature, or application has its own application log.

Event log filters

Filters and event logs enable you to view only those events that have specific characteristics. Filters apply only to the current Event Viewer session. If you constantly use a specific filter or set of filters to manage event logs, you should instead create a custom view. Filters apply only to a single event log. You can create filters on a log based on the following properties:

  • Logged Enables you to specify the time range for the filter.
  • Event Level Enables you to specify event levels. You can choose the following options: Critical, Warning, Verbose, Error, and Information.
  • Event Sources Enables you to choose the source of the event.
  • Event IDs Enables you to filter based on event ID. You can also exclude specific event IDs.
  • Keywords Enables you to specify keywords based on the contents of events.
  • User Enables you to limit events based on user.
  • Computer Enables you to limit events based on the computer.

To create a filter, perform the following steps:

  1. Open Event Viewer and select the log that you want to filter.
  2. Determine the properties of the event that you want to filter.
  3. On the Actions pane, click Filter Current Log.
  4. In the Filter Current Log dialog box, shown in Figure 10-11, specify the filter properties.

    FIGURE 10-11 Specifying filter properties

Event log views

Event log views enable you to create customized views of events across any event log stored on a server, including events in the forwarded event log. Rather than looking through each event log for specific items of interest, you can create event log views that target only those specific items. Event Viewer includes a custom view named Administrative Events. This view displays critical, warning, and error events from a variety of important event logs such as the application, security, and system logs.

Views differ from filters in the following ways:

  • Persistent You can use a view across multiple Event Viewer sessions. If you configure a filter on a log, it is not available the next time you open the Event Viewer.
  • Include multiple logs A custom view can display events from separate logs. Filters are limited to displaying events from one log.
  • Exportable You can import and export event log views between computers.

Creating an event log view is a similar process to creating a filter. The primary difference is that you can select events from multiple logs, and you give the event log view a name and choose a place to save it. To create an event log view, perform the following steps:

  1. Open Event Viewer.
  2. Click the Custom Views node, and then click Create Custom View from the Actions menu.
  3. In the Create Custom View dialog box, shown in Figure 10-12, select the properties of the view, including:

    • When the events are logged
    • The event level
    • Which event log to draw events from
    • Event source
    • Task category
    • Keywords
    • User
    • Computer
  4. In the Save Filter To Custom View dialog box, enter a name for the custom view and a location in which to save the view (see Figure 10-13). Click OK.

    FIGURE 10-13 Entering the custom view name

  5. Verify that the new view is listed as its own separate node in the Event Viewer.

You can export a custom event log view by selecting the event log view and clicking Export Custom View. Exported views can be imported on other computers running Windows Server 2012 and Windows Server 2012 R2.

Configuring event subscriptions

Event log forwarding enables you to centralize the collection and management of events from multiple computers. Rather than having to examine the event log of each computer by making a remote connection to that computer, event log forwarding enables you to do one of the following:

  • Configure a central computer to collect specific events from source computers. Use this option in environments in which you need to consolidate events from only a small number of computers.
  • Configure source computers to forward specific events to a collector computer. Use this option when you have a large number of computers from which you want to consolidate events. You configure this method using Group Policy.

Event log forwarding enables you to configure the specific events that are forwarded to the central computer. This enables the computer to forward important events. It isn’t necessary to forward all events from the source computer. If you discover something that warrants further investigation from the forwarded traffic, you can log on to the original source computer and view all the events from that computer in a normal manner.

Event log forwarding uses Windows Remote Management (WinRM) and the Windows Event Collector (wecsvc). You need to enable these services on computers that function as event forwarders and event collectors. You configure WinRM using the winrm quickconfig command. You configure wecsvc using the wecutil qc command. If you want to configure subscriptions from the security event log, you need to add the computer account of the collector computer to the local Administrators group on the source computer.

To configure a collector-initiated event subscription, configure WinRM and Windows Event Collector on the source and collector computers. In the Event Viewer, configure the Subscription Properties dialog box, shown in Figure 10-14, with the following information:

  • Subscription Name The name of the subscription.
  • Destination Log The log where collected events will be stored.
  • Subscription Type And Source Computers: Collector Initiated Use the Select Computers dialog box to add the computers that the collector will retrieve events from. The collector must be a member of the local Administrators group or the Event Log Readers group on each source computer, depending on whether access to the security log is required.
  • Events To Collect Create a custom view to specify which events are retrieved from each of the source computers.

FIGURE 10-14 Configuring a collector-initiated event subscription

If you want to instead configure a source computer-initiated subscription, you need to configure the following group policies on the computers that will act as the event forwarders:

  • Configure Forwarder Resource Usage This policy determines the maximum event forwarding rate in events per second. If this policy is not configured, events will be transmitted as soon as they are recorded.
  • Configure Target Subscription Manager This policy enables you to set the location of the collector computer.

Both of these policies are located in the Computer ConfigurationPoliciesAdministrative TemplatesWindows ComponentsEvent Forwarding node. When configuring the subscription, you must also specify the computer groups that hold the computer accounts of the computers that will be forwarding events to the collector. You do this in the Computer Groups dialog box, as shown in Figure 10-15.

FIGURE 10-15 Configuring subscription computer groups for the subscription

Attaching event-driven tasks

Event Viewer enables you to attach tasks to specific events. A drawback to the process of creating event-driven tasks is that you need to have an example of the event that triggers the task already present in the event log. Events are triggered based on an event having the same log, source, and event ID.

To attach a task to a specific event, perform the following steps:

  1. Open Event Viewer. Locate and select the event upon which you want to base the new task.
  2. On the Event Viewer Actions pane, click Attach Task To This Event. The Create Basic Task Wizard displays.
  3. On the Create A Basic Task page, review the name of the task that you want to create. By default, the task is named after the event. Click Next.
  4. On the When An Event is Logged page, review the information about the event. This will list the log from which the event originates, the source of the event, and the event ID. Click Next.
  5. On the Action page, shown in Figure 10-16, you can choose the task to perform. The Send An E-Mail and Display A Message tasks are deprecated, and you get an error if you try to create a task using these actions. Click Next.

  6. On the Start A Program page, shown in Figure 10-17, specify the program or script that should be automatically triggered as well as additional arguments.

    FIGURE 10-17 Specifying a triggered script

  7. After you complete task creation, you can modify the task to specify the security context under which the task executes. By default, event tasks run only when the user is signed on. You can configure the task to run whether the user is signed on or not, as shown in Figure 10-18.

    FIGURE 10-18 Run your task if the user is logged on or off

Performing network monitoring

Network monitoring enables you to track how a computer interacts with the network. Through network monitoring, you can determine which services and applications are using specific network interfaces, which services are listening on specific ports, and the volume of traffic that exists. There are two primary tools through which you can perform network monitoring on computers running Windows Server 2012 and Windows Server 2012 R2:

  • Resource Monitor
  • Message Analyzer

Resource Monitor

Resource Monitor enables you to monitor how a computer running the Windows Server 2012 and Windows Server 2012 R2 operating system uses CPU, memory, disk, and network resources. Resource Monitor provides real time information. You can’t use Resource Monitor to perform a traffic capture and review activity that occurred in the past. You can use Resource Monitor to view activity that is currently occurring. The Network tab of Resource Monitor is shown in Figure 10-19.

Resource Monitor provides the following information that is relevant to network monitoring:

  • Processes With Network Activity This view lists processes by name and ID; and provides information on bits sent per second, bits received per second, and total bits per second.
  • Network Activity Lists network activity on a per-process basis, but also lists the destination address, sent bits per second, received bits per second, and total bits per second.
  • TCP Connections Provides information on connections on the basis of local address, port, and remote address and port.
  • Listening Ports Lists the ports and addresses that services and applications are listening on. Also provides information about the firewall status for these roles and services.

Message Analyzer

Microsoft Message Analyzer is the successor to Network Monitor. You can use Message Analyzer to perform network traffic capture and analysis. Message Analyzer also functions as a replacement for LogParser, which enables you to manage system messages, events, and log files. When performing a capture, you select the scenario that best represents the type of event about which you are interested in capturing traffic. For example, the LAN scenario, shown in Figure 10-20, enables you to capture traffic on local area network (LAN) interfaces.

FIGURE 10-20 LAN scenario

When performing certain types of network traffic capture, you need to run Message Analyzer using an account that is a member of the local Administrators group. After the capture has been performed, you can analyze the content of each message, as shown in Figure 10-21. By applying appropriate filters, you can locate network traffic that has specific characteristics, such as using a particular TCP port, source, or destination address.

Lesson summary

  • Data collector sets enable you to collect performance counter data, event trace data, and system configuration information.
  • Performance counter alerts enable an event to be written to the event log and a command to be run when a specified performance counter exceeds or falls below a configured value.
  • Event log filters apply to a single event log and are not persistent.
  • Event log views are persistent, can include items from multiple event logs, and can be imported and exported.
  • Event subscriptions enable you to configure one computer to consolidate the event logs of multiple computers.
  • Event-driven tasks enable you to configure a program or script to be run when a specific event is written to the event log.
  • Message Analyzer, which is the successor to Network Monitor, enables you to capture and analyze network traffic.

Lesson review

Answer the following questions to test your knowledge of the information in this lesson. You can find the answers to these questions and explanations of why each answer choice is correct or incorrect in the “Answers” section at the end of this chapter.

  1. You want to collect processor, memory, and network interface utilization data over the course of several hours. You need to be able to review the data at a later period in time. Which of the following tools should you use to accomplish this goal?

    1. Resource Monitor
    2. Task Manager
    3. Data collector set
    4. Message Analyzer
  2. A particular network service on a computer running Windows Server 2012 R2 that you are responsible for managing is not functioning correctly. You suspect that the service is listening on a TCP port that Windows Firewall is configured to block, but you don’t know which TCP port the service uses. Which of the following tools should you use to determine this information?

    1. Task Manager
    2. Resource Monitor
    3. Message Analyzer
    4. Data collector set
  3. Which of the following tools can you use to capture and analyze network traffic?

    1. Data collector set
    2. Message Analyzer
    3. Resource Monitor
    4. Task Manager
  4. You are configuring event log subscriptions. Computer MEL-DC will function as the event log collector, and computers MEL-A, MEL-B, and MEL-C will function as the event log sources. You want MEL-DC to collect events from the security logs on computers MEL-A, MEL-B, and MEL-C. To which of the following security groups on MEL-A, MEL-B, and MEL-C should you add the computer account of MEL-DC?

    1. Backup operators
    2. Power users
    3. Event log readers
    4. Administrators
BackPage 2 of 6Next

This chapter is from the book

Related resources

  • By Haishi Bai, Dan Stolts, Santiago Fernandez Munoz
  • Book $44.99
  • By Orin Thomas
  • Book $39.99
  • By Michael Washam, Rick Rainey
  • Book $44.99
-->

Windows Communication Foundation (WCF) Service Trace Viewer Tool helps you analyze diagnostic traces that are generated by WCF. Service Trace Viewer provides a way to easily merge, view, and filter trace messages in the log so that you can diagnose, repair, and verify WCF service issues.

Configuring Tracing

Diagnostic traces provide you with information that shows what is happening throughout your application's operation. As the name implies, you can follow operations from their source to destination and through intermediate points as well.

You can configure tracing using the application’s configuration file—either Web.config for Web-hosted applications, or Appname.config for self-hosted applications. The following is an example:

In this example, the name and type of the trace listener is specified. The Listener is named sdt and the standard .NET Framework trace listener (System.Diagnostics.XmlWriterTraceListener) is added as the type. The initializeData attribute is used to set the name of the log file for that Listener to be SdrConfigExample.e2e. For the log file, you can substitute a fully-qualified path for a simple file name.

The example creates a file in the root directory called SdrConfigExample.e2e. When you use the Trace Viewer to open the file as described in the 'Opening and Viewing WCF Trace Files' section, you can see all the messages that have been sent.

The tracing level is controlled by the switchValue setting. The available tracing levels are described in the following table.

Trace LevelDescription
Critical- Logs Fail-Fast and Event Log entries, and trace correlation information. The following are some examples of when you might use the Critical level:
- Your AppDomain went down because of an unhandled exception.
- Your application fails to start.
- The message that caused the failure originated from the process MyApp.exe.
Error- Logs all exceptions. You can use the Error level in the following situations:
- Your code crashed because of an Invalid Cast Exception.
- A 'failed to create endpoint' exception is causing your application to fail on startup.
Warning- A condition exists that may subsequently result in an error or critical failure. You can use this level in the following situations:
- The application is receiving more requests than its throttling settings allows.
- The receiving queue is at 98 percent of its configured capacity.
Information- Messages helpful for monitoring and diagnosing system status, measuring performance, or profiling are generated. You can utilize such information for capacity planning and performance management. You can use this level in the following situations:
- A failure occurred after the message reached the AppDomain and was deserialized.
- A failure occurred while the HTTP binding was being created.
Verbose- Debug-level tracing for both user code and servicing. Set this level when:
- You are not sure which method in your code was called when the failure occurred.
- You have an incorrect endpoint configured and the service failed to start because the entry in the reservation store is locked.
ActivityTracingFlow events between processing activities and components.
This level allows administrators and developers to correlate applications in the same application domain.
- Traces for activity boundaries: start/stop.
- Traces for transfers.

You can use add to specify the name and type of the trace listener you want to use. In the example configuration, the Listener is named sdt and the standard .NET Framework trace listener (System.Diagnostics.XmlWriterTraceListener) is added as the type. Use initializeData to set the name of the log file for that Listener. In addition, you can substitute a fully-qualified path for a simple file name.

Starting in .NET Framework 4.8, ComboBox controls in some high contrast themes are displayed in the correct color. You can disable this change by removing the following setting from the svcTraceViewer.exe.config file:

Using the Service Trace Viewer Tool

Opening and Viewing WCF Trace Files

The Service Trace Viewer supports three file types:

  • WCF Tracing File (.svcLog)

  • Event Tracing File (.etl)

  • Crimson Tracing File

Service Trace Viewer enables you to open any supported trace file, add and integrate additional trace files, or open and merge a group of trace files simultaneously.

To open a trace file
  1. Start Service Trace Viewer by using a command window to navigate to your WCF installation location (C:Program FilesMicrosoft SDKsWindowsv6.0Bin), and then type SvcTraceViewer.exe.

Note

The Service Trace Viewer tool can associate with two file types: .svclog and .stvproj. You can use two parameters in command line to register and unregister the file extensions.

/register: register the association of file extensions '.svclog' and '.stvproj' with SvcTraceViewer.exe

/unregister: unregister the association of file extensions '.svclog' and '.stvproj' with SvcTraceViewer.exe

  1. When Service Trace Viewer starts, click File and then point to Open. Navigate to the location where your trace files are stored.

  2. Double-click the trace file that you want to open.

    Note

    Press SHIFT while clicking multiple trace files to select and open them simultaneously. Service Trace Viewer merges the content of all files and presents one view. For example, you can open trace files of both client and service. This is useful when you have enabled message logging and activity propagation in configuration. In this way, you can examine message exchange between client and service. You can also drag multiple files into the viewer, or use the Project tab. See the Managing Project section for more details.

  3. To add additional trace files to the collection that is open, click File and then point to Add. In the window that opens, navigate to the location of the trace files and double-click the file you want to add.

Caution

It is not recommended that you load a trace log file bigger than 200MB. If you attempt to load a file larger than this limit, the loading process may take a long time, depending on your computer resource. The Service Trace Viewer tool may not be responsive for a long time, or it may exhaust your machine's memory. It is recommended that you configure partial loading to avoid this. For more information on how to do this, see 'Loading Large Trace Files' section.

Event Tracing and Crimson Tracing

The viewer’s native format is the activity tracing format that WCF emits. Traces emitted in a different format must be converted before the viewer displays them. Currently, in addition to the activity tracing format, the viewer supports event tracing and crimson tracing.

When you open a file that does not contain activity traces, the viewer attempts to convert the file. You must specify the name and location of the file that will contain the converted trace data. Once the data has been converted, the viewer displays the content of the new file.

Note

Conversion requires disk space to store the converted trace data. Make sure you have enough disk space available to store the data before you start a conversion. Otherwise, the conversion fails.

Managing Projects

The viewer supports projects to facilitate viewing multiple trace files. For example, if you have a client trace file and a service trace file, you can add them to a project. Then, every time you open the project, all the trace files in the project are loaded simultaneously.

There are two ways to manage projects:

  • In the File menu, you can open, save and close projects.

  • In the Project tab, you can add files to a project.

Viewing WCF Traces

WCF emits traces using the activity tracing format. In the activity tracing model, individual traces are grouped in activities according to their purpose. Logical control flow is transferred between activities. For example, during the lifetime of an application, many 'message send activities' appear and disappear. For more information on viewing traces and activities, and the user interface of the Service Trace Viewer too, see Using Service Trace Viewer for Viewing Correlated Traces and Troubleshooting.

Switching to Different Views

The Service Trace Viewer provides the following different views. They are displayed as tabs on the left pane of the Viewer, and can also be accessed from the View menu.

  • Activity View

  • Project View

  • Message View

  • Graph View

Activity view

Once the trace files are opened, you can see the traces grouped into activities and displayed in the Activity view in the left-hand pane.

The Activity view displays activity names, number of traces in the activity, duration time, start time and end time.

By clicking any of the listed activities, the traces in this activity are displayed in the trace pane on the right. You can then select a trace to view its details.

You can select multiple activities by pressing the Ctrl or Shift key and clicking the desired activities. The trace pane displays all the traces of the selected activities.

You can double-click an activity to display it in Graph View. The alternative way is to select an activity and switch to Graph View.

Note

The activity '000000000000' is a special activity that cannot be displayed in the Graph View. Because all other activities are linked to it, displaying this activity has a severe performance impact.

You can click the column title to sort the activity list. Activities that contain warning traces have a yellow background and those that contain error traces have a red one.

There are different types of activities and each type corresponds to an icon on the left side of each activity. You can refer to the Understanding Trace Icons section for their meaning.

Project View

This view enables you to manage trace files in the current project. See the Managing Project section for more details.

Message View

This view enables you to view all message log traces, including Action, Date/Time, Process, Acivity and From/To, and navigate to the details of the associated message log trace. You can group the message log traces by Activity Boundary, Process/Thread, or Send & Receive for easier navigation of the message flow.

Graph View

This view displays the trace data for a given activity in chart form. The chart form enables you to see the stepwise execution of events and the interrelationships between multiple activities as data moves between them.

To switch to Graph view, select an activity in the Activity view and click the Activity tab, or a message log trace in the Message View. If multiple trace files are loaded and the activity involves traces from more than one file, all of the relevant traces appear in the graph view. Double-clicking on the activities and message log traces also leads you to the Graph view.

In Graph view, each vertical column represents an activity, and each block in the column represents a trace. The activities are grouped by process (or thread). The small arrows between activities represent transfers. The big arrows between processes represent message exchange. The activity in selection is always in yellow.

Selecting Traces in the Graph
  1. Click a block in the graph.

  2. Use the up and down keys to select its neighboring traces.

  3. Observe the trace information in the Trace Pane and Detail Pane.

Expanding or Collapsing Activity Transfers

You can expand activity transfers when the activity in selection transfers out to another activity. It enables you to follow the transfers.

To expand or collapse activity transfers,

  1. Locate the transfer trace with a '+' sign on the left of the transfer icon.

  2. Click the '+', or press Ctrl and '+' using the keyboard.

  3. The next activity appears in the graph.

  4. A '-' appears on the left of the transfer icon. Click the '-' sign or press Ctrl and '-', the activity transfer collapses.

Note

When an activity has multiple transfers into it and you expand one of the transfers, activities that lead up to the new activity from the root activity are displayed. These new activities appear in collapsed form. If you want to see the details of these activities, expand them vertically by clicking the expand icon in the header of the graph.

Expanding or Collapsing Activities Vertically

The viewer hides unnecessary detail in the activity graph by collapsing activities. In a collapsed activity, individual traces are not displayed. Only transfers trace appear. If you want to view all traces in an activity, expand the activity vertically by clicking the expand symbol of the activity in the header of the graph.

To expand or collapse activities vertically,

  1. Click the '+' icon in the activity header to expand the activity vertically.

  2. Notice that all traces are displayed in the graph.

  3. Click the '-' icon in the activity header to collapse the activity vertically.

  4. Notice that only important transfers, message logs, warning and exception traces are shown in the activity.

Microsoft Service Trace Viewer Download
Options

You can select two options from the Option menu in Graph view.

  • Show Activity Boundary Traces, which when unchecked ignore the activity boundary traces in the graph.

  • Show Non-message Verbose Traces, which when unchecked ignore verbose level traces, except for message traces. In most cases, verbose level traces are less important for analysis. This option is helpful when you do not want to analyze verbose level traces and only want to focus on more important traces.

Layout Mode

The viewer has two Layout Modes: Process and Thread. This setting defines the largest unit of organization. The default Layout Mode is Process, which means that activities are grouped by processes in the graph.

Execution List

You can select which process or thread to be displayed in the graph from this drop-down list. For example, if you have the trace files of two clients (A and B) and one service opened, and you only want to display the service and client A in the graph, you can deselect client B from the list.

Viewing Trace Details

To view a trace detail, select a trace in the Trace pane. The details are displayed in the Detail pane.

Trace Pane

The upper right pane in the Service Trace Viewer is the Trace Pane. It lists all the traces in the selected activity with extra information, for example, trace level, thread ID, and process name.

You can copy the raw XML of the trace to the clipboard by right-clicking a trace and selecting Copy Trace to Clipboard.

Detail Pane

The bottom left pane in the Service Trace Viewer is the Detail Pane. It provides three tabs to view trace details.

The Formatted view displays the information in a more organized way. It lists all known XML elements in tables and trees, making it easier to read and understand the information.

The XML view displays XML corresponding to the selected trace. It supports highlighting and syntax color. When you use Find to search strings, it highlights the search results.

The Message view displays the message part of the XML in message log traces. It is invisible when you select a non-message trace.

Filtering WCF Traces

To make the analysis of trace easier, you can filter them in the following ways:

  • The filter toolbar provides access to pre-defined and custom filters. It can be enabled through the View menu.

  • The pre-defined filter of the viewer can be used to selectively filter parts of the WCF traces. By default, it is set to allow all infrastructure traces to pass through. The settings of this filter are defined in the Filter Options sub-menu under View menu.

  • Custom XPath filters give users full control over filtering. They can be defined in the Custom Filter under View menu.

Only traces that passes through all filters is displayed.

Using the Filter Toolbar

The filter toolbar appears across the top of the tool. If it is not present, you can activate it in the View menu. The bar has three components:

  • Look for: Look for defines the subject to look for in the filter operation. For example, if you want to find all traces that were emitted in the context of process X, set this field to X and the Search In field to ‘Process Name’. This field changes to a DateTime selector control when a time-based filter is selected.

  • Search in: This field defines the type of filter to apply.

  • Level: The level setting defines the minimum trace level allowed by the filter. For example, if the level is set to Error and Up, only traces at the Error and critical level are displayed. This filter combines with the criteria specified by Look For and Search In.

The Filter Now button starts the filter operation. Some filters, especially when they are applied to a large data set, take a long time to complete. You can cancel the filter operation by pressing the Stop button that appears in the status bar under the Operations menu.

Do P90x: Ab Ripper X. 16 mins 35 secs, Intense. The perfect ab workout when you don't have a lot of time. Part of the P90x series, the Ab Ripper X workout takes. These ab ripper x exercises make up one of the best abdominal workouts around. It focuses on core strength by using the movements of your hips and chest. https://sisumeno.tistory.com/2.

The Clear button resets pre-defined and custom filters to allow all traces to pass through.

Filter Options

The viewer can automatically remove WCF traces from the view. It can selectively remove traces emitted by specific areas of WCF, for example, removing transaction related traces from the view.

The settings of this filter are defined in the Filter Options sub-menu under View menu.

Custom Filters

If you are familiar with the XML Path Language (XPath), you can use it to construct custom filters to search the trace data for any XML element of interest. The filters are accessible through the filter toolbar.

Custom filters can include parameters. You can also import pre-existing custom filters.

Creating a custom filter

Filters can be created in two ways:

Creating a Custom Filter using the Template Wizard

You can click an existing trace and create a filter based on the structure of the trace. This example creates a custom filter based on thread ID.

  1. In the trace pane in the top right area of the viewer, select a trace that includes the element you want to filter for.

  2. Click the Create Custom Filter button located at the top of the trace pane.

  3. In the dialog box that appears, enter a name for your filter. In this example, enter Thread ID. You can also provide a description of your filter.

  4. The tree view on the left displays the structure of the trace record you selected in step 1. Browse to the element you want to create a condition for. In this example, browse to the ThreadID to be located in the XPath: /E2ETraceEvent/System/Execution/@ThreadID node. Double-click the ThreadID attribute in the tree view. This creates an expression for the attribute on the right of the dialog.

  5. Change the parameter field for the ThreadID condition from None to ‘{0}’. This step enables the ThreadID value to be configured when the filter is applied. (See the How to Apply a Filter section) You can define up to four parameters. Conditions are combined using the OR operator.

  6. Click Ok to create the filter.

Note

Once a filter has been created using the template wizard, it can only be edited manually. It is not possible to activate the wizard for a filter that has been created previously. In addition, the conditions of an XPath filter created in the template wizard are combined using the OR operator. If you require an AND operation, you can edit the filter expression after it has been created.

Creating a Custom Filter Manually

The Custom Filters menu allows you to enter XPath filters manually.

  1. In the View menu, click the Custom Filters menu item.

  2. In the dialog that appears, click New.

  3. At the minimum, specify a Filter Name and XPath expression.

    How to download music from tumblr. Step 2:- Click on Customize button (3 vertical dots below the Close button) in the browser.

  4. Click OK.

Applying a Custom Filter

Once a custom filter has been created, it is accessible though the filter toolbar. Select the filter you want to apply in the Search In field of the filter toolbar. For the previous example, select ‘Thread ID’.

  1. Specify the value you are looking for in the Find What field. In our example, enter the ID of the thread you want to search for.

  2. Click Filter Now, and observe the result of the operation.

If your filter uses multiple parameters, enter them using ‘;’ as a separator in the Find What field. For example, the following string defines 3 parameters: ‘1;findValue;text’. The viewer applies ‘1’ to the {0} parameter of the filter. ‘findValue’ and ‘text’ are applied to {1} and {2} respectively.

Sharing custom Filters

Custom filters can be shared between different sessions and different users. You can export the filters to a definition file and import this file at another location.

To import a custom filter:

  1. In the View menu, click Custom Filters.

  2. In the dialog box that opens, click the Import button.

  3. Navigate to the custom filter file (.stvcf), click the file, and click the Open button.

To export a custom filter:

  1. In the View menu, click Custom Filters.

  2. In the dialog box that opens, select the filter you want to export.

  3. Click the Export button.

  4. Specify the name and location of the custom filter definition file (.stvcf), and click the Save button.

Note

These custom filters can only be imported and exported from Service Trace Viewer. They cannot be read by other tools.

Finding Data

The viewer provides the following ways to find data:

  • The Find toolbar provides a quick access to the most common find options.

  • The Find dialog provides more find options. It is accessible through the Edit menu, or by the short key Ctrl + F.

The find toolbar appears at the top of the viewer. If it is not present, you can activate it in the View menu. The bar has two components:

  • Find What: Allows you to enter search keyword.

  • Look In: Allows you to enter the search scope. You can select whether to search in all activities or in the current activity only.

The find dialog provides two additional options:

  • Find target:

    • The 'Raw log data' option searches the keyword in all raw data.

    • The 'XML Text' and 'XML Attribute' options only search in XML elements.

    • The 'Logged Message' option searches the keyword only in messages.

  • Ignore root activity: The search ignores the traces in the '000000000000' activity. This improves performance in large trace files when the root activity has thousands of traces, most of which are transfers.

Navigating Traces

Because traces are recorded step by step during application runtime, navigating traces can help you to debug your application. The Service Trace Viewer provides various ways to navigate in traces.

Step Forward or Backward

If you consider each trace as a line of code in the program, stepping forward is very similar to 'Step over' in the Visual Studio Integrated Development Environment (IDE). The difference is that you can also step backward in the traces. Stepping forward means moving to the next trace in the activity.

  • Step Forward: Use the Activity menu, or press 'F10'. You can also use arrow key 'down' in the trace pane.

  • Step Backward: Use the Activity menu, or press 'F9'. You can also use arrow key 'up' in the trace pane.

Note

Device Driver Guarantee: Clean Software DriverFinder is our recommended software and we provide a link for you to download the free scan. DriverFinder is the recommended driver update tool for every Windows user who wants to make their computer faster, more secure, and more reliable. With its perfect scan technology, huge database, and great support, it's easy to see why. Hp pavilion p7 missing sm bus controller driver win 7 ultimate 64 bit windows 7. DriverFinder is the recommended Driver Update Utility Its no surprise, DriverFinder is recommended by software and computer experts.

This can take you to an activity occurring in a different process or even on a different computer, because WCF messages can carry activity IDs that span machines.

Follow Transfer

Microsoft Service Trace Viewer Download Windows 7

Transfer traces are special traces in the trace file. An activity may transfer to another activity by a transfer trace. For example, 'Activity A' may transfer to 'Activity B'. In such case, there is a transfer trace in the 'Activity A' with the name 'To: Activity' and the transfer icon. This transfer trace is a link between the two traces. In 'Activity B', there might also be a transfer trace at the end of the activity to transfer back to 'Activity A'. This is similar to function calls in programs: A calls B, then B returns.

'Follow transfer' is similar to 'Step into' in a debugger. It follows the transfer from A to B. It does not have any effect on other traces.

There are two ways to follow a transfer: by mouse or by keyboard:

  • By Mouse: Double-click the transfer trace in the trace pane.

  • By Keyboard: Select a transfer trace, and use 'Follow Transfer' in the Activity menu, or press 'F11'

Note

In many cases, when Activity A transfers to Activity B, Activity A waits until Activity B transfers back to Activity A. This means that Activity A has no trace logged during the period when Activity B is actively tracing. However, it is also possible that Activity A does not wait, and continues to log traces. It is also possible that Activity B does not transfer back to Activity A. Therefore, activity transfers are still different from function calls in this sense. You can understand activity transfers better in Graph view.

Jump to Next or Previous Transfer

When you are analyzing the current activity, or selected activities when multiple activities are selected, you may want to quickly find the activities it transfers to. 'Jump to next transfer' allows you to locate the next transfer trace in the activity. Once you find the transfer trace, you can use 'Follow transfer' to step into the next activity.

  • Jump to Next Transfer: Use the Activity menu, or press 'Ctrl + F10'.

  • Jump to Previous Transfer: Use the Activity menu, or press 'Ctrl + F9'.

Navigate in Graph View

Although navigating in the activity pane and trace pane is similar to debugging, using Graph view provides a much better experience in navigation. See 'Graph View' section for more information.

Loading Large Trace Files

Trace files can be very large. For example, if you turn on tracing on the 'Verbose' level, the resulting trace file for running a few minutes can easily be hundreds of megabytes or even larger, depending on network speed and communication pattern.

When you open a very large trace file in the Service Trace Viewer, system performance can be negatively impacted. The loading speed and the response time after loading can be slow. Actual speed differs from time to time, depending on your hardware configuration. In most PCs, loading a trace file larger than 200M has a severe performance impact. For traces files larger than 1G, the tool may use up all available memory, or stop responding for a very long time.

In order to avoid the slow loading and response time in analyzing large trace files, the Service Trace Viewer provides a feature called 'Partial Loading', which only loads a small part of the trace at a time. For example, you may have a trace file over 1GB, running for several days on the server. When some errors have occurred and you want to analyze the trace, it is not necessary to open the entire trace file. Instead, you can load the traces within a certain period of time when the error might have occurred. Because the scope is smaller, the Service Trace Viewer tool can load the file faster and you can identify the errors using a smaller set of data.

Enabling Partial Loading

You do not need to manually enable partial loading. If the total size of the trace file(s) you attempt to load exceeds 40MB, Service Trace Viewer automatically displays a Partial Loading dialog for you to select the part that you want to load.

Note

Because traces may not be distributed evenly in the time span, the length of the time period you specify in the Partial Loading toolbar may not be proportional to the loading size shown. The actual loading size can be smaller than the Estimated Size in the partial loading dialog.

Adjusting Partial Loading

After you have partially loaded the trace file, you may want to change the data set being loaded. You can do so by adjusting the Partial Loading toolbar at the top of the viewer.

  1. Move the toolbar by mouse, or input the Begin and End time.

  2. Click the Adjust button.

Understanding Trace Icons

The following is a list of icons that the Service Trace Viewer tool uses in the Activity view, Graph view and Trace pane to represent different items.

Microsoft Service Trace Viewer Download

Note

Some traces that are not categorized (for example, 'a message is closed') have no icon.

Activity Tracing Traces

IconDescription
Warning trace: A trace that is emitted at the warning level
Error trace: A trace that is emitted at the error level.
Activity Start trace: A trace that marks the beginning of an activity. It contains the name of the activity. As the application designer or developer, you should define one activity Start trace per activity id per process or thread.
If the activity id is propagated across trace sources for trace correlation, you can then see multiple Starts for the same activity id (one per trace source). The Start trace is emitted if ActivityTracing is enabled for the trace source.
Activity Stop trace: A trace that marks the end of an activity. . It contains the name of the activity. As the application designer or developer, you should define one activity Stop trace per activity id per trace source. No traces from a given trace source appear after the activity Stop emitted by that trace source, except if the trace time granularity is not sufficiently small. When that happens, two traces with the same time, including a Stop, may be interleaved when displayed. If the activity id is propagated across trace sources for trace correlation, you can see multiple Stops for the same activity id (one per trace source). The Stop trace is emitted if ActivityTracing is enabled for the trace source.
Activity Suspend trace: A trace that marks the time an activity is paused. No traces are emitted in a suspended activity until the activity resumes. A suspended activity denotes that no processing is happening in that activity in the scope of the trace source. Suspend/Resume traces are useful for profiling. The Suspend trace is emitted if ActivityTracing is enabled for the trace source.
Activity resume trace: A trace that marks the time an activity is resumed after it had been suspended. Traces may be emitted again in that activity. Suspend/Resume traces are useful for profiling. The Resume trace is emitted if ActivityTracing is enabled for the trace source.
Transfer: A trace that is emitted when logical control flow is transferred from one activity to another. The activity the transfer originates from may continue to perform work in parallel to the activity the transfer goes to. The Transfer trace is emitted if ActivityTracing is enabled for the trace source.
Transfer From: A trace that defines a transfer from another activity to the current activity.
Transfer To: A trace that defines a transfer of logical control flow from the current activity to another activity.

WCF Traces

IconDescription
Message Log trace: A trace that is emitted when a WCF message is logged by the message logging feature, when the System.ServiceModel.MessageLogging trace source is enabled. Clicking on this trace displays the message. There are four configurable logging points for a message: ServiceLevelSendRequest, TransportSend, TransportReceive, and ServiceLevelReceiveRequest, which can also be specified by the messageSource attribute in the message log trace.
Message Received trace: A trace that is emitted when a WCF message is received, if the System.ServiceModel trace source is enabled at the Information or Verbose level. This trace is essential for viewing the message correlation arrow in the Activity Graph view.
Message Sent trace: A trace that is emitted when a WCF message is sent if the System.ServiceModel trace source is enabled at the Information or Verbose level. This trace is essential for viewing the message correlation arrow in the Activity Graph view.

Svctraceviewer Download

Activities

IconDescription
Activity: Indicates that the current activity is a generic activity.
Root activity: Indicates the root activity of a process.

WCF Activities

IconDescription
Environment activity: An activity that creates, opens, or closes a WCF host or client. Errors that have happened during these phases will appear in this activity.
Listen activity: An activity that logs traces related to a listener. Inside this activity, we can view listener information and connection requests.
Receive Bytes activity: An activity that groups all traces related to receiving incoming bytes on a connection between two endpoints. This activity is essential in correlating with transport activities that propagate their activity id such as http.sys. Connection errors such as aborts will appear in this activity.
Process Message activity: An activity that groups traces related to creating a WCF message. Errors due to a bad envelope or a malformed message will appear in that activity. Inside this activity, we can inspect message headers to see if an activity id was propagated from the caller. If this is true, when we transfer to Process Action activity (the next icon), we can also assign to that activity the propagated activity id for correlation between the caller and callee’s traces.
Process Action activity: An activity that groups all traces related to a WCF request across two endpoints. If propagateActivity is set to true on both endpoints in configuration, all traces from both endpoints are merged into one activity for direct correlation. Such activity will contain errors due to transport or security processing, extending to the user code boundary and back (if a response exists).
Execute User Code activity: An activity that groups user code traces for processing a request.

Microsoft Service Trace Viewer Download

Troubleshooting

If you do not have permission to write to the registry, you get the following error message 'The Microsoft Service Trace Viewer was not registered to the system' when you use the 'svctraceviewer /register' command to register the tool. If this occurs, you should log in using an account that has write access to the registry.

In addition, the Service Trace Viewer tool writes some settings (for example, custom filters and filter options) to the SvcTraceViewer.exe.settings file in its assembly folder. If you do not have read permission for the file, you can still launch the tool, but you cannot load the settings.

If you get the error message 'An unknown error occurred while processing one or more traces' when opening the .etl file, it means that the format of the .etl file is invalid.

If you open a trace log created using an Arabic operating system, you may notice that the time filter does not work. For example, year 2005 corresponds to year 1427 in Arabic calendar. However, the time range supported by the Service Trace Viewer tool filter does not support a date earlier than 1752. This can imply that you are not able to select a correct date in the filter. To resolve this problem, you can create a custom filter (View/Custom Filters) using an XPath expression to include a specific time range.

See also