envisioning your monitoring strategy

Download Envisioning your Monitoring Strategy

If you can't read please download the document

Upload: intuitindia

Post on 19-Feb-2017

253 views

Category:

Software


0 download

TRANSCRIPT

Light Background

Envisioning Your Monitoring StrategyAveek Misra, Architect, Intuit20-Jan-2016

Intuit Confidential and Proprietary#

What are some of the notable changes in the application landscape today and how they impact monitoring of applicationsWhy Mobile Monitoring is so importantDifferent aspects of monitoring in an enterpriseHow have the monitoring solutions evolved and some of the advanced techniques that are used today

Agenda

Intuit Confidential and Proprietary#

Monitoring Microservices

The term Microservice Architecture has sprung up over the last few years to describe a particular way of designing software applications as suites of independent deployable servicesMartin Fowler

Intuit Confidential and Proprietary#

How Complex Can a Microservice Architecture Get?

Loosely coupled service oriented architecture with bounded contexts- Adrian Cockcroft

@Image Courtesy Presentation by Adrian Cockcroft at Monitorama 2014

Intuit Confidential and Proprietary#

Cloud vs Data Center

Intuit Confidential and Proprietary#

Monitoring Asynchronous interactionsAsynchronous programming refers to a style of structuring a program whereby a call to some unit of functionality triggers an action that is allowed to continue outside of the ongoing flow of the programRod Vagg in Nodesource Blog

@Image Courtesy - Presentation from Randy Bias in the DevOps Chicago Meetup

Intuit Confidential and Proprietary#

Monitoring failures in fault tolerant systemsIn his excellent book Release It, Michael Nygard talks about the Circuit Breaker pattern as a means to prevent cascading failure.Hystrix, an open source framework from Netflix deals with latency and fault tolerance for distributed systems. It includes an implementation of Circuit Breaker pattern

@Image Courtesy www.github.com/Netflix/Hystrix/wiki/How-it-Works

Intuit Confidential and Proprietary#

Continuous Deployment at Scale@Image Courtesy How We Learned to Stop Worrying and Start Deploying the Netflix API Service at Qcon 2015

Companies like Netflix, Amazon, Google, LinkedIn, Etsy etc. deploy code hundreds to thousands of times per day!!

Intuit Confidential and Proprietary#

Monitoring Induced Failures@Image Courtesy AWS re:Invent presentation by Josh Evans, Netflix

Intuit Confidential and Proprietary#

Monitoring Should be More Available Than Your Systems!

@Image Courtesy Presentation by Adrian Cockcroft at Monitorama 2014

Intuit Confidential and Proprietary#

Why Mobile Monitoring is so Important

The Pew Research Center reports that 92 percent of U.S. adults have a cellphone of some kindDeloitte expects digital interactions to influence 64 cents of every dollar spent in retail stores by the end of 2015Users have low tolerance for buggy apps Only 16% will try a failing app more than twice

Intuit Confidential and Proprietary#

Monitoring Business Transactions

@Image Courtesy www.appdynamics.comMonitoring the actual user transactions is far more impactful than just monitoring the low level application and infrastructure metricsBusiness transaction metrics provide the much needed context for the other metrics

Intuit Confidential and Proprietary#

End User Experience Monitoring

@Image Courtesy www.newrelic.com

Intuit Confidential and Proprietary#

Why Synthetic Monitoring is Also Important

@Image Courtesy www.rigor.com/blog/2014/12/benefits-using-rum-w-synthetic

Intuit Confidential and Proprietary#

Mobile Crash Reporting

@Image Courtesy www.crittercism.com

Intuit Confidential and Proprietary#

Techniques - Byte Code Instrumentation at Runtime

Intuit Confidential and Proprietary#

Techniques - Runtime instrumentation using Trampolining

Intuit Confidential and Proprietary#

Techniques - Using Lambda Architecture for Query Optimization

@Image Courtesy www.voltdb.com

Intuit Confidential and Proprietary#

Techniques - Anomaly Detection using Baselines

@Image Courtesy www.datadog.com

Intuit Confidential and Proprietary#

Custom Analytics

@Image Courtesy www.newrelic.com

Intuit Confidential and Proprietary#

Advanced Incident Correlation@Image Courtesy www.moogsoft.com

Intuit Confidential and Proprietary#

Thank You

Intuit Confidential and Proprietary#