SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
Monitoring Cloud
  Applications
             Amit Pathak




                           1
Agenda
                              
 ontext

                              
 hallenges

                              
 onitoring-as-a-Service

                              
 ey Highlights

                          2
                              
 enefits
Context
 Are agreed service levels met?

 Overall how many applications are healthy vs non-healthy?

 Is the health getting worse over time?

 Are the business functions being performed as expected?

 Do you have capacity within applications?




                                                             3
Context
 Cloud Complexity

  Scale and diversity of the infrastructure

    - Servers, network devices, storages, etc.

    - Hundreds, even thousands of machines

  Massive number of user applications

    - Catastrophic consequence of failure / security breach /
      performance degradation



                                                                4
Context
 Resource utilization is tightly coupled with cost incurred by
 customers

 Monitoring is indispensable

  Availability, failure detection

  Performance, provisioning

  Security, anomaly detection

  Application-level monitoring


                                                                 5
Challenges - Overview
 Inherits performance monitoring challenges of virtualized world

 End user response time – a primary metric

 Mechanism to collect data from various sources

 Managing agents

 Monitor, identify & heal bottlenecks




                                                               6
Challenges - Overview
  Detect performance degradation:

 Single malfunctioning application on a guest has a potential to
  degrade performance of host and other resources

 Resource contention among applications executing on VMs may
  hamper performance

 Virtual machines not configured with sufficient resource to
  handle workload




                                                                    7
Challenges – A Closer Look




Source: Monitis
                             8
Challenges – A Closer Look


                           System
                          Challenges

User          Cloud
Challenges   Monitoring

                           Network
                          Challenges




                                       9
Challenges – System Level
Efficient Scalability:

  Monitor tasks – tens of thousands

  Cost effective - minimize resource usage

 Facilitating service




                                             10
Challenges – System Level
Efficient Scalability:

  Massive Scale

 Monitor inherent large scale tasks

 Large number of users
           - Infrastructure monitoring
           - Application monitoring

 Monitor tasks with high cost e.g. Resources with high consumption




                                                              11
Challenges – System Level
Monitoring QoS Assurance:

  SLA management

  Application security

 Federated identity of cloud applications

 Secured integration of cloud apps with on-premise apps

  Multi-tenant environment

 Authorization & access control

  Monitor contention between monitoring tasks
                                                           12
Challenges – User Level
  Continuous violation detection

 Need of different detection model - Dynamically add/remove
  servers based on performance

 Achieve efficiency at the same time




      Short-term burst             Persistent violation




                                                               13
Challenges – Network Level
  Resource-aware monitoring fabric

 Monitoring the functioning of both systems and applications running
  on large-scale distributed systems

 Continuous collecting detailed attribute values
      - A large number of nodes
      - A large number of attributes

 Overhead increases quickly as the system, application and
  monitoring tasks scales up


                                                               14
Performance Monitoring
 Understand performance of virtual infrastructure – outside in
 approach

 Troubleshoot bottlenecks

 Plan future needs




                                                                 15
Key Parameters To Monitor
 CPU

 Memory

 Network

 Disk




                            16
CPU
  CPU saturated?

   High Ready time

 Problematic if it is sustained for high periods

  Possible contention for CPU resources among VMs

 Workload Variability?

 Resource limits on VMs?

 Actual over commitment?

  High SwapWait time
                                                    17
Memory
Swap in rate

Swap out rate

Swap used




                18
Disk
  What should I look for to figure out if disk is an issue?

 IOPs?

 Bandwidth (read/write)?

 Latencies?




                                                              19
Network
  What should I look for to figure out if network is an issue?

 Packate rate?

 Bandwidth (read/write)?

 NIC status?




                                                                 20
Monitoring-as-a-Service




                          21
Monitoring-as-a-Service
  Similar to other cloud services

 Database service (e.g. SimpleDB, Datastore)

 Storage service (e.g. S3)

 Application service (e.g. AppEngine)




                                                22
High Level Solution
        Applications,      Events & Alerts
        Server – CPU,      Customization
        memory, disk IO




         Packate rate,     Gather data from
         bandwidth, NICs   various resources
                           Trend analysis




                                               23
Monitoring-as-a-Service
External monitoring   Web server, file server, mail server, VOIP

Server monitoring     CPU, memory, processes, storage

Network monitoring    Http, SSH, SNMP, discovery

Transaction           Multi-step apps, workflows
monitoring

Cloud monitoring      Track running instances, auto-deploy,
                      usage
Web Traffic monitor   Visitor, page views




                                                                   24
Key Highlights
 Scale dynamically

 Have minimum (or no) impact on the monitored infrastructure

 Should be portable and has to be light weight

 Easy feature customization. Not all metrics will need to be
 monitored in the cloud for everyone

 Heavy network based monitoring tools may not be a good fit




                                                               25
Key Highlights
  Comprehensive monitoring of resource performance and
  availability

 Applications, databases, middleware and web servers

  Provide innovative ideas to fetch data as business need grows

 Dashboard, views, reports

  Co-relate information from different sources

  Trends analysis

  Predict bottlenecks
                                                              26
Benefits
 End-to-end support

 Easy to use & maintain

 Reliable service

 Feature customization

 Cost effective




                          27
Summary
 Cloud is complex; monitoring needs are indispensable

 End user response time is primary focus

 Cloud services must be treated differently to on-premise
  software when it comes to systems monitoring

 Do not rely on vendors completely. If SLAs are serious,
  maintain your own logs

 Existing tools are good but use programmatic APIs for specific
  needs

                                                                   28
Thank You



            29
References
•   http://developer.vmware.com

•   http://www.cc.gatech.edu/

•   http://portal.monitis.com/index.php/resources

•   http://www.hyperic.com/

•   http://mypublicstrangeworld.posterous.com/cloud-monitoring-services-a-resource-guide

•   http://www.itpro.co.uk/630655/dont-leave-cloud-monitoring-to-vendors-expert-warns

•   http://www.virtualizationpractice.com

•   http://virtualization.sys-con.com/

•   http://blog.newrelic.com/


                                                                                    30

Contenu connexe

Tendances

Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...SolarWinds
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom BrochureDarren Molloy
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...Khazret Sapenov
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionIxia
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
 
L7Viewer datasheet
L7Viewer datasheetL7Viewer datasheet
L7Viewer datasheetL7Viewer
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant Saravanan Purushothaman
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 

Tendances (19)

Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom Brochure
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
L7Viewer datasheet
L7Viewer datasheetL7Viewer datasheet
L7Viewer datasheet
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Xandria datasheet
Xandria datasheet Xandria datasheet
Xandria datasheet
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
Installation
InstallationInstallation
Installation
 

En vedette

Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...Tomasz Sikora
 
Ws08 R2 Itpro Session 4 Virtualization Technologies
Ws08 R2 Itpro Session 4 Virtualization TechnologiesWs08 R2 Itpro Session 4 Virtualization Technologies
Ws08 R2 Itpro Session 4 Virtualization Technologieschenley
 
Monitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the CloudMonitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the CloudHovhannes Avoyan
 
Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011Paul Guth
 
Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer AccountsRaja Waseem Akhtar
 
Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data StorageRaja Waseem Akhtar
 
Webinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computingWebinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computingCREATE-NET
 
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...Twilio Inc
 
Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011Twilio Inc
 
Training Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringTraining Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringOutSystems
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware DevicesRaja Waseem Akhtar
 
Chapter11 Monitoring Server Performance
Chapter11      Monitoring  Server  PerformanceChapter11      Monitoring  Server  Performance
Chapter11 Monitoring Server PerformanceRaja Waseem Akhtar
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster RecoveryRaja Waseem Akhtar
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
extreme Programming
extreme Programmingextreme Programming
extreme ProgrammingBilal Shah
 
Lessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet AgentsLessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet AgentsPuppet
 

En vedette (20)

Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...
 
Fluentd
FluentdFluentd
Fluentd
 
Ws08 R2 Itpro Session 4 Virtualization Technologies
Ws08 R2 Itpro Session 4 Virtualization TechnologiesWs08 R2 Itpro Session 4 Virtualization Technologies
Ws08 R2 Itpro Session 4 Virtualization Technologies
 
Monitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the CloudMonitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the Cloud
 
Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011
 
Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer Accounts
 
Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data Storage
 
Webinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computingWebinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computing
 
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
 
Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011
 
Training Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringTraining Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server Monitoring
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware Devices
 
Chapter11 Monitoring Server Performance
Chapter11      Monitoring  Server  PerformanceChapter11      Monitoring  Server  Performance
Chapter11 Monitoring Server Performance
 
How to monitor NGINX
How to monitor NGINXHow to monitor NGINX
How to monitor NGINX
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Dll injection
Dll injectionDll injection
Dll injection
 
extreme Programming
extreme Programmingextreme Programming
extreme Programming
 
Lessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet AgentsLessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet Agents
 

Similaire à Monitoring applications on cloud - Indicthreads cloud computing conference 2011

Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureNewvewm
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewManageEngine
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
Pandora FMS - Technical presentation
Pandora FMS - Technical presentationPandora FMS - Technical presentation
Pandora FMS - Technical presentationSancho Lerena
 
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...IBM Danmark
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Prolifics
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMsScaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMsMatei Zaharia
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksMatei Zaharia
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsSolarWinds
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)Tsz Wing Chu
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicSagi Brody
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminarAravindan Arun
 

Similaire à Monitoring applications on cloud - Indicthreads cloud computing conference 2011 (20)

Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
Cloud Design Patterns
Cloud Design PatternsCloud Design Patterns
Cloud Design Patterns
 
Pandora FMS - Technical presentation
Pandora FMS - Technical presentationPandora FMS - Technical presentation
Pandora FMS - Technical presentation
 
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model types
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMsScaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
 
Session19 Globus
Session19 GlobusSession19 Globus
Session19 Globus
 
Adopting the Cloud
Adopting the CloudAdopting the Cloud
Adopting the Cloud
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at Databricks
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
 
12-Factor Apps
12-Factor Apps12-Factor Apps
12-Factor Apps
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
 

Plus de IndicThreads

Http2 is here! And why the web needs it
Http2 is here! And why the web needs itHttp2 is here! And why the web needs it
Http2 is here! And why the web needs itIndicThreads
 
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive ApplicationsUnderstanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive ApplicationsIndicThreads
 
Go Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang wayGo Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang wayIndicThreads
 
Building Resilient Microservices
Building Resilient Microservices Building Resilient Microservices
Building Resilient Microservices IndicThreads
 
App using golang indicthreads
App using golang  indicthreadsApp using golang  indicthreads
App using golang indicthreadsIndicThreads
 
Building on quicksand microservices indicthreads
Building on quicksand microservices  indicthreadsBuilding on quicksand microservices  indicthreads
Building on quicksand microservices indicthreadsIndicThreads
 
How to Think in RxJava Before Reacting
How to Think in RxJava Before ReactingHow to Think in RxJava Before Reacting
How to Think in RxJava Before ReactingIndicThreads
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreadsIndicThreads
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprisesIndicThreads
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIndicThreads
 
Functional Programming Past Present Future
Functional Programming Past Present FutureFunctional Programming Past Present Future
Functional Programming Past Present FutureIndicThreads
 
Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams IndicThreads
 
Building & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fameBuilding & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fameIndicThreads
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
 
Cars and Computers: Building a Java Carputer
 Cars and Computers: Building a Java Carputer Cars and Computers: Building a Java Carputer
Cars and Computers: Building a Java CarputerIndicThreads
 
Scrap Your MapReduce - Apache Spark
 Scrap Your MapReduce - Apache Spark Scrap Your MapReduce - Apache Spark
Scrap Your MapReduce - Apache SparkIndicThreads
 
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
 Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & DockerIndicThreads
 
Speed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedbackSpeed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedbackIndicThreads
 
Unraveling OpenStack Clouds
 Unraveling OpenStack Clouds Unraveling OpenStack Clouds
Unraveling OpenStack CloudsIndicThreads
 
Digital Transformation of the Enterprise. What IT leaders need to know!
Digital Transformation of the Enterprise. What IT  leaders need to know!Digital Transformation of the Enterprise. What IT  leaders need to know!
Digital Transformation of the Enterprise. What IT leaders need to know!IndicThreads
 

Plus de IndicThreads (20)

Http2 is here! And why the web needs it
Http2 is here! And why the web needs itHttp2 is here! And why the web needs it
Http2 is here! And why the web needs it
 
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive ApplicationsUnderstanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
 
Go Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang wayGo Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang way
 
Building Resilient Microservices
Building Resilient Microservices Building Resilient Microservices
Building Resilient Microservices
 
App using golang indicthreads
App using golang  indicthreadsApp using golang  indicthreads
App using golang indicthreads
 
Building on quicksand microservices indicthreads
Building on quicksand microservices  indicthreadsBuilding on quicksand microservices  indicthreads
Building on quicksand microservices indicthreads
 
How to Think in RxJava Before Reacting
How to Think in RxJava Before ReactingHow to Think in RxJava Before Reacting
How to Think in RxJava Before Reacting
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreads
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprises
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
Functional Programming Past Present Future
Functional Programming Past Present FutureFunctional Programming Past Present Future
Functional Programming Past Present Future
 
Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams
 
Building & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fameBuilding & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fame
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
 
Cars and Computers: Building a Java Carputer
 Cars and Computers: Building a Java Carputer Cars and Computers: Building a Java Carputer
Cars and Computers: Building a Java Carputer
 
Scrap Your MapReduce - Apache Spark
 Scrap Your MapReduce - Apache Spark Scrap Your MapReduce - Apache Spark
Scrap Your MapReduce - Apache Spark
 
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
 Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
 
Speed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedbackSpeed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedback
 
Unraveling OpenStack Clouds
 Unraveling OpenStack Clouds Unraveling OpenStack Clouds
Unraveling OpenStack Clouds
 
Digital Transformation of the Enterprise. What IT leaders need to know!
Digital Transformation of the Enterprise. What IT  leaders need to know!Digital Transformation of the Enterprise. What IT  leaders need to know!
Digital Transformation of the Enterprise. What IT leaders need to know!
 

Dernier

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Monitoring applications on cloud - Indicthreads cloud computing conference 2011

  • 1. Monitoring Cloud Applications Amit Pathak 1
  • 2. Agenda  ontext  hallenges  onitoring-as-a-Service  ey Highlights 2  enefits
  • 3. Context Are agreed service levels met? Overall how many applications are healthy vs non-healthy? Is the health getting worse over time? Are the business functions being performed as expected? Do you have capacity within applications? 3
  • 4. Context Cloud Complexity  Scale and diversity of the infrastructure - Servers, network devices, storages, etc. - Hundreds, even thousands of machines  Massive number of user applications - Catastrophic consequence of failure / security breach / performance degradation 4
  • 5. Context Resource utilization is tightly coupled with cost incurred by customers Monitoring is indispensable  Availability, failure detection  Performance, provisioning  Security, anomaly detection  Application-level monitoring 5
  • 6. Challenges - Overview Inherits performance monitoring challenges of virtualized world End user response time – a primary metric Mechanism to collect data from various sources Managing agents Monitor, identify & heal bottlenecks 6
  • 7. Challenges - Overview Detect performance degradation:  Single malfunctioning application on a guest has a potential to degrade performance of host and other resources  Resource contention among applications executing on VMs may hamper performance  Virtual machines not configured with sufficient resource to handle workload 7
  • 8. Challenges – A Closer Look Source: Monitis 8
  • 9. Challenges – A Closer Look System Challenges User Cloud Challenges Monitoring Network Challenges 9
  • 10. Challenges – System Level Efficient Scalability: Monitor tasks – tens of thousands Cost effective - minimize resource usage  Facilitating service 10
  • 11. Challenges – System Level Efficient Scalability: Massive Scale  Monitor inherent large scale tasks  Large number of users - Infrastructure monitoring - Application monitoring  Monitor tasks with high cost e.g. Resources with high consumption 11
  • 12. Challenges – System Level Monitoring QoS Assurance: SLA management Application security  Federated identity of cloud applications  Secured integration of cloud apps with on-premise apps Multi-tenant environment  Authorization & access control Monitor contention between monitoring tasks 12
  • 13. Challenges – User Level Continuous violation detection  Need of different detection model - Dynamically add/remove servers based on performance  Achieve efficiency at the same time Short-term burst Persistent violation 13
  • 14. Challenges – Network Level Resource-aware monitoring fabric  Monitoring the functioning of both systems and applications running on large-scale distributed systems  Continuous collecting detailed attribute values - A large number of nodes - A large number of attributes  Overhead increases quickly as the system, application and monitoring tasks scales up 14
  • 15. Performance Monitoring Understand performance of virtual infrastructure – outside in approach Troubleshoot bottlenecks Plan future needs 15
  • 16. Key Parameters To Monitor CPU Memory Network Disk 16
  • 17. CPU CPU saturated? High Ready time  Problematic if it is sustained for high periods Possible contention for CPU resources among VMs  Workload Variability?  Resource limits on VMs?  Actual over commitment? High SwapWait time 17
  • 18. Memory Swap in rate Swap out rate Swap used 18
  • 19. Disk What should I look for to figure out if disk is an issue?  IOPs?  Bandwidth (read/write)?  Latencies? 19
  • 20. Network What should I look for to figure out if network is an issue?  Packate rate?  Bandwidth (read/write)?  NIC status? 20
  • 22. Monitoring-as-a-Service Similar to other cloud services  Database service (e.g. SimpleDB, Datastore)  Storage service (e.g. S3)  Application service (e.g. AppEngine) 22
  • 23. High Level Solution Applications, Events & Alerts Server – CPU, Customization memory, disk IO Packate rate, Gather data from bandwidth, NICs various resources Trend analysis 23
  • 24. Monitoring-as-a-Service External monitoring Web server, file server, mail server, VOIP Server monitoring CPU, memory, processes, storage Network monitoring Http, SSH, SNMP, discovery Transaction Multi-step apps, workflows monitoring Cloud monitoring Track running instances, auto-deploy, usage Web Traffic monitor Visitor, page views 24
  • 25. Key Highlights Scale dynamically Have minimum (or no) impact on the monitored infrastructure Should be portable and has to be light weight Easy feature customization. Not all metrics will need to be monitored in the cloud for everyone Heavy network based monitoring tools may not be a good fit 25
  • 26. Key Highlights Comprehensive monitoring of resource performance and availability  Applications, databases, middleware and web servers Provide innovative ideas to fetch data as business need grows  Dashboard, views, reports Co-relate information from different sources Trends analysis Predict bottlenecks 26
  • 27. Benefits End-to-end support Easy to use & maintain Reliable service Feature customization Cost effective 27
  • 28. Summary  Cloud is complex; monitoring needs are indispensable  End user response time is primary focus  Cloud services must be treated differently to on-premise software when it comes to systems monitoring  Do not rely on vendors completely. If SLAs are serious, maintain your own logs  Existing tools are good but use programmatic APIs for specific needs 28
  • 29. Thank You 29
  • 30. References • http://developer.vmware.com • http://www.cc.gatech.edu/ • http://portal.monitis.com/index.php/resources • http://www.hyperic.com/ • http://mypublicstrangeworld.posterous.com/cloud-monitoring-services-a-resource-guide • http://www.itpro.co.uk/630655/dont-leave-cloud-monitoring-to-vendors-expert-warns • http://www.virtualizationpractice.com • http://virtualization.sys-con.com/ • http://blog.newrelic.com/ 30