2. Agenda
• Purpose of the workgroup
• Activities
• Planning 2018
• Organization of the workgroup
• Monitoring overview
3. Purpose of the WG
• G.I.V.E. and T.A.K.E. on het area of Monitoring
• IT Monitoring on a:
• Pro-active;
• Alarming;
• Correlating;
• Trending
• Way of Working
• Software: Grafana, Splunk, OMEGAMON, ZABBIX, APM, …
4. G.I.V.E
Guidance:
• The ability to share knowledge between our members and between vendors and members to
assist in the implementation and operation of IT solutions.
Influence:
• The ability to influence the suppliers of products, solutions and services being offered to our
members and to ensure that vendors and other IT related bodies act in the best interests of our
members.
Vision:
• The ability to help our members understand and contribute to the way the IT industry develops.
Education:
• The ability for our members to access high quality technical and management information
from a variety of sources, including IT vendors, other members and educational bodies.
5. T.A.K.E
Technology:
• The ability to contact members and vendors and discuss about the possibilities of the
proposed technologies and the way to implement them.
Advantage:
• The advantage to take back home extra information to optimize your technology, to learn
about new experiences and by implementing the advantages having impact on your TCO cost.
Knowledge:
• Exploit the combined knowledge of member companies and IBM research to ensure
maximum business value.
Experience:
• Exchange experiences, ideas and business values to be able to implement this new knowledge
and technology in your environment based on the networking of its members.
6. In other words:
• As monitoring workgroup, we want to approach monitoring in all aspects.
• We look platform wide (Mainframe, Unix, Windows, Linux etc.) to the tooling (Graphana,
Splunk, OMEGAMON, ZABBIX, APM, etc.) which could help us in the area of monitoring.
• Also the process-based approach will be a subject of the working group. Questions as:
How do you implement monitoring, what do you need for implementing monitoring and how
do you implement chain monitoring will be subjects to be discussed.
7. Activities
• Once a year: Session on National GSE Conference (1h)
• 2 to 4 times a year: Group Meeting on location of Members
• Group meetings:
• On location of the group members
• 4 weeks invitation in advance
• Mostly with guest speaker
• Subjects suggested by Group Members
8. Planning 2018
• 15 November 2018 : Announcement at national GSE day
• Q4 2018 : First UG meeting
9. 09:00-09:30 Registration and Tea/Coffee
09:30-10:00 Opening en Introduction Monitoring Workgroup
Boudewijn Dekkema (Dutch Tax Office, chair workgroup)
Sander Joosten (IBM Technical Sales, IBM Liaison Workgroup)
10:00-11:00 IBM Operations Analytics – Log Analysis Domenico D'Alterio (IBM offering manager IBM z Analytics products)
11:00-11:15 Coffee Break
11:15-12:15 Monitoring of Payments at ING Jos Letchert (ING, PO Monitoring Payments)
12:15-13:00 Lunch Break
13:00-14:00 IBM Z: Monitoring the Modern Mainframe & the API Economy Ashok Mahay (IBM Z OMEGAMON Offering Manager)
14:00-14:15 Coffee Break
14:15-15:00 Monitoring at Dutch Tax Office
Boudewijn Dekkema (Dutch Tax Office, Service Engineer Mainframe)
Jos Verschuuren (Dutch Tax Office, Service Engineer Tooling)
15:00-15:30 Closing Session Boudewijn Dekkema (Dutch Tax Office, chair workgroup)
15:30- Wrap up, drinks and beverages
GSE NL - Monitoring Workgroup Meeting
November 29, 2018 | IBM Client Center Amsterdam | Register via http://ibm.biz/GSENL-CMONN-2018-1
10. Organisation
• Workgroup Chair: Boudewijn Dekkema
• Workgroup Liaison: Sander Joosten
• Members (max? min?)
o We are looking for people who want to share a story with their experiences with this user
organization
o There are no fees for it, just the fame.
o You build a large network, both with users and IBM
o You always pick something up
o Resuming:
User Community That’s US
Who is willing to help us?
Email: bb.dekkema@belastingdienst.nl
11. Monitoring Overview
A) Infrastructure component monitoringA) Infrastructure component monitoring
B) Application component monitoringB) Application component monitoring
C) Business component monitoringC) Business component monitoring
D) IT Value chain (Non-Confidential data)D) IT Value chain (Non-Confidential data)
E) Business Value chain (Confidential data)E) Business Value chain (Confidential data)
15. Software PlatformsSoftware Platforms
Business
Applications
Business
Applications
Enterprise
Applications
Enterprise
Applications
IT ServicesIT Services
Hardware Components, Network InfrastructureHardware Components, Network Infrastructure
Monitoring Overview
A) Infrastructure component monitoringA) Infrastructure component monitoring
B) Application component monitoringB) Application component monitoring
C) Business component monitoringC) Business component monitoring
D) IT Value chain (Non-Confidential data)D) IT Value chain (Non-Confidential data)
E) Business Value chain (Confidential data)E) Business Value chain (Confidential data)