The Performance Analysis of Logs (PAL) tool reads a performance monitor counter log and analyzes it using known thresholds. The tool generates an HTML based report that graphically charts important performance counters and throws alerts when thresholds are exceeded. The thresholds are originally based on thresholds defined by the Microsoft product teams, including Exchange Server, and members of Microsoft support.

This tool is not a replacement of traditional performance analysis, but it automates the analysis of performance counter logs enough to help administrators save time. The PAL tool:

    • Analyzes performance counter logs for thresholds;
    • Is helpful for large Perfmon logs;
    • Identifies Exchange Server (2007 and 2010 – no 2013 as of yet) and operating system performance counter bottlenecks by analyzing for thresholds;
    • Is extensible to do analysis on any performance counters;
    • Can be used to help write your own counter.

PAL is available as a free download at CodePlex. It requires PowerShell v2.0 or greater, Microsoft .NET Framework 3.5 SP1 and Microsoft Chart Controls for Microsoft .NET Framework 3.5.

Nuno Mota

Nuno Mota is an Exchange MVP working as a Microsoft Messaging Specialist for a financial institution. He is passionate about Exchange, Lync, Active Directory, PowerShell, and Security. Besides writing his personal Exchange blog, LetsExchange.blogspot.com, he regularly participates in the Exchange TechNet forums and is the author of the book “Microsoft Exchange Server 2013 High Availability.”

Share
Published by
Nuno Mota

Recent Posts

What are the potential disadvantages of SSL/TLS?

There’s wide consensus on the benefits of SSL/TLS. However, not as much attention has been given to SSL/TLS disadvantages.

1 day ago

Exploring native software inventory logging in Windows Server

Windows Server has built-software inventory logging that can be very useful. Here’s how to use this little-known feature.

2 days ago

Passwordless authentication: Safer, better, and about time

Passwordless authentication has quickly become one of the primary means by which users access their laptops, phones, and tablets because…

2 days ago

Automated Incident Response in Office 365 ATP simplifies cybersecurity

Microsoft has pumped up Office 365 Advanced Threat Protection with a new feature, Automated Incident Response. Here’s what you need…

2 days ago

IFA 2019: Smart TVs and even smarter wearables unveiled

What will be in your living room or on your wrist this year? It may very likely be one of…

3 days ago

Consider these SD-WAN technologies for faster, more reliable networking

As virtualization becomes a major part of organizations’ infrastructure, these SD-WAN technologies provide faster and more reliable networking solutions.

3 days ago