SlideShare a Scribd company logo
Sagi Brody, CTO
@webairsagi
Troubleshooting:
A High Value Asset for The Service Provider
Discipline
Background
• 17+ Years experience as a service provider.
• MSP - We own your infrastructure stack.
• Managed Public, Private, and Hybrid Cloud.
• High Touch - Monitoring, Managing, Securing
all layers (app/db/fw/nw/cdn)
• Mix of Open Source, Commercial, and
Proprietary Software.
• Context of an MSP but applicable to all IT.
The Art of Troubleshooting
• Troubleshooting is a standalone skill - Must be
Taught, Trained, Documented, Reviewed.
• Technical skills are important but soft skills
cannot be forgotten.
• Big buzz around hyped technologies in
DevOps.
• Other important soft skills - Resourcefulness,
Communication, Technical Documentation,
Mentoring.
Why Care?
• We're already doing it, internally or customer facing.
• We're trusted to do it well.
• We’re judged how we act during crisis.
• Technology agnostic skill. Never become obsolete and
only becomes more important as systems become more
complex.
• Applicable to infrastructure & software development.
• Allows us to scale - It's how we manage many complex
environments with small teams.
• Reduce downtime & Save lives!!
4
Brief History
• Hardware & Software
Systems traditionally
monolithic in nature.
• Flat topology without
abstraction.
• Mostly physical
infrastructure.
• Perpetual
configurations .
• No automation.
• Easier Troubleshooting.
5
Today
• Distributed, virtualized, and
abstracted infrastructure -
Network, Storage, Compute.
• Self-healing & Autoscaling
• Microservices based architecture
• Increased complexity with many
benefits (scaling, CI,time).
• Decreased visibility, control, and
ease of Troubleshooting.
• Troubleshooting == An Art.
6
Where to Start?
• Fast resolution starts with absolute
understanding of the issue.
• Is this the cause or a symptom?
• Was it brought to us pre-diagnosed?
• What is the context?
• Why is this a problem? Why is it important?
• No tunnel vision. Look at the big picture.
• Examples: 'Email Issue' , 'Wifi/Speed' , 'DDoS &
API'
7
Observe
• Can you have a clear understanding of the issue
without seeing it for yourself?
• Before attempting resolution, be sure you can
reproduce.
• Gain perspective using tools - remote logins,
screen shares, screen shots.
• Understand expected behavior vs fault.
• Software development & Debugging tools.
• Supplement lack of perspective with solid
communication.
8
Localize
• Drill Down - Peel back the layers of the onion.
• Process of elimination to localize the issue.
• Examples: static content vs dynamic content, local
storage vs shared/network storage, directly test
and bypass layers, rule out network
• Follow the flow of data and test each step.
• Major Outages - localize to commonality - What do
the effected services have in common?
• Use monitoring tools or SPOTs to localize.
• Don't assume anything - NIH (Not invented here).
9
Resolve and Test
• Scientific Method: Question -> Hypothesis –>
Experiment -> Observation ->Analysis ->
Conclusion
• Make small incremental changes.
• Use sandboxes where possible.
• Document each test and result, and change.
• Use ability to reproduce and observe to confirm
resolution.
10
Monitor for Success
• Fast resolution starts with a solid monitoring strategy.
• Empower DevOps to create layered alerts.
• Create simple interfaces, scripts, APIs to allow for easy additions of
monitoring to standardized systems.
• Make it part of development & build process.
• Monitor the Big and the Small:
• Big - The finished product. Look for expected result via end user
interface to ensure all services are properly functioning.
• Small - Every layer! OK/FAIL monitoring for multi-dimensional
services and 3rd party providers.
• If setup properly, big and small alerts should trigger simultaneously
allowing instant localization.
11
High level Context
12
3rd Party Monitoring
“In God we trust. Everyone else we monitor.”
13
Remove Roadblocks
14
Build as you go..
15
Automated Troubleshooting
• Trigger action based on logging events (syslog,
splunk, logstash).
• Scan configuration files for dangerous
conditions.
• Pipe events to software designed to diagnose
and take action.
• Actions: disable interfaces, line cards,
services, servers, notify operations.
• Platform that allows easy addition of new
tests based on experience.
16
Tools & Integration
• Use Single Point of truth (ie collins).
• Integrate 3rd party best in breed to SPOT (Nagios,
MRTG, ManageEngine, Vmware, Xen, ScienceLogic)
• Combine communication, monitoring, and culture
• We've connected: Nagios, Phone calls, LiveChats,
Ticket updates, WO updates, Ansible deployments,
Network alerts, Network capacity alerts, Physical
data center alerts, DDoS attacks, Confluence.
• Make documentation & diagram management easier.
"If its not documented, it didnt happen"
17
SPOT ON!
18
High Level Context
Make it part of your culture.
19
Historical Data a Must
• Establish baselines.
• Am I looking at a
preexisting condition?
• What changed and
when?
• Data Aggregation
• 3rd party: DataDog,
ScienceLogic,
GroundWorks,
NewRelic
20
Aggregated Statistics
21
Cluster Wide
CPU
Network
Memory
Disk
Aggregated Statistics
22
Network by Host
Host 1
Host 2
Host 3
Host 4
Aggregated Statistics
23
Network by VM (Host 1)
VM 1
VM 2
VM 3
VM 4
People Factor
• Why is it not taught alongside technical skill?
• Becomes part of the interview process.
• Adopt approach used by the medical field - Bed
Side Clinics. Use your superstars.
• Make it part of your culture and develop a reward
system around it.
• Collapse silos, broaden context for everyone.
24
Thank You!
sagi@webair.com
@webairsagi
25

More Related Content

What's hot

NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
Atif Ghauri
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
Kyos
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
Anton Chuvakin
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017
Peter Rawsthorne
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
Adrian Sanabria
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
centralohioissa
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
SoftServe
 
Website homepage presentation
Website homepage presentationWebsite homepage presentation
Website homepage presentation
peaceofmintech
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Melina Black
 
Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'
Anton Chuvakin
 
How to improve your system monitoring
How to improve your system monitoringHow to improve your system monitoring
How to improve your system monitoring
Andrew White
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat Detection
AlienVault
 
Baselining Logs
Baselining LogsBaselining Logs
Baselining Logs
Anton Chuvakin
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
Mona Arkhipova
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
Adrian Sanabria
 

What's hot (20)

NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event 21.06.2017 - KYOS Breakfast Event
21.06.2017 - KYOS Breakfast Event
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
Website homepage presentation
Website homepage presentationWebsite homepage presentation
Website homepage presentation
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...
 
Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'Anton's Log Management 'Worst Practices'
Anton's Log Management 'Worst Practices'
 
How to improve your system monitoring
How to improve your system monitoringHow to improve your system monitoring
How to improve your system monitoring
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat Detection
 
Baselining Logs
Baselining LogsBaselining Logs
Baselining Logs
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Vulnerability Management V0.1
Vulnerability Management V0.1Vulnerability Management V0.1
Vulnerability Management V0.1
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 

Viewers also liked

Citas y frases famosas
Citas y frases famosasCitas y frases famosas
Citas y frases famosas
Ery D L Parra T
 
Deber de informatica
Deber de informaticaDeber de informatica
Deber de informatica
kelvinmaster4
 
All about relative ctr
All about relative ctrAll about relative ctr
Gestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
Gestão de recursos 3º Nível- Curso Básico em Agro-PecuárioGestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
Gestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
Epfr De Estaquinha
 
14 daniel lópez álvarez ortega blearning15_v4
14 daniel lópez álvarez  ortega blearning15_v414 daniel lópez álvarez  ortega blearning15_v4
14 daniel lópez álvarez ortega blearning15_v4
Grundtvig Multilateral Project Quality in Blended Learning
 
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Sagi Brody
 
Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentationSumit Banik
 
Company Profile EITS! 2017
Company Profile EITS! 2017Company Profile EITS! 2017
Company Profile EITS! 2017egha gets
 
An intelligent hybrid control for paper machine
An intelligent hybrid control for paper machineAn intelligent hybrid control for paper machine
An intelligent hybrid control for paper machine
eSAT Publishing House
 
Numerical solution of boussinesq equation arising in
Numerical solution of boussinesq equation arising inNumerical solution of boussinesq equation arising in
Numerical solution of boussinesq equation arising in
eSAT Publishing House
 
An integrated methodology to fixturing technology
An integrated methodology to fixturing technologyAn integrated methodology to fixturing technology
An integrated methodology to fixturing technology
eSAT Publishing House
 
الماء1
الماء1الماء1
الماء1
riahikarim
 
Patnent Information services
Patnent Information servicesPatnent Information services
Patnent Information servicesLihua Gao
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaan
Tenttu
 
Experimental investigation of heat transfer through
Experimental investigation of heat transfer throughExperimental investigation of heat transfer through
Experimental investigation of heat transfer through
eSAT Publishing House
 
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
Artur Brzyski
 
8/22 國際研習會簡報_workshop presentation
8/22 國際研習會簡報_workshop presentation8/22 國際研習會簡報_workshop presentation
8/22 國際研習會簡報_workshop presentation
CDRI_snowshih
 
Letter Dr. Christian Vaillancourt
Letter Dr. Christian Vaillancourt Letter Dr. Christian Vaillancourt
Letter Dr. Christian Vaillancourt
Gary Thompson
 
Data research portal
Data research portal Data research portal
Data research portal
sudeepsakalle
 

Viewers also liked (20)

Citas y frases famosas
Citas y frases famosasCitas y frases famosas
Citas y frases famosas
 
Deber de informatica
Deber de informaticaDeber de informatica
Deber de informatica
 
All about relative ctr
All about relative ctrAll about relative ctr
All about relative ctr
 
Gestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
Gestão de recursos 3º Nível- Curso Básico em Agro-PecuárioGestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
Gestão de recursos 3º Nível- Curso Básico em Agro-Pecuário
 
14 daniel lópez álvarez ortega blearning15_v4
14 daniel lópez álvarez  ortega blearning15_v414 daniel lópez álvarez  ortega blearning15_v4
14 daniel lópez álvarez ortega blearning15_v4
 
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
 
Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentation
 
Company Profile EITS! 2017
Company Profile EITS! 2017Company Profile EITS! 2017
Company Profile EITS! 2017
 
An intelligent hybrid control for paper machine
An intelligent hybrid control for paper machineAn intelligent hybrid control for paper machine
An intelligent hybrid control for paper machine
 
Numerical solution of boussinesq equation arising in
Numerical solution of boussinesq equation arising inNumerical solution of boussinesq equation arising in
Numerical solution of boussinesq equation arising in
 
An integrated methodology to fixturing technology
An integrated methodology to fixturing technologyAn integrated methodology to fixturing technology
An integrated methodology to fixturing technology
 
الماء1
الماء1الماء1
الماء1
 
Patnent Information services
Patnent Information servicesPatnent Information services
Patnent Information services
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaan
 
EJCC Presentation
EJCC PresentationEJCC Presentation
EJCC Presentation
 
Experimental investigation of heat transfer through
Experimental investigation of heat transfer throughExperimental investigation of heat transfer through
Experimental investigation of heat transfer through
 
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
Inkubator Kultury Pireus - wyniki warsztatów strategicznych - 11.12.15
 
8/22 國際研習會簡報_workshop presentation
8/22 國際研習會簡報_workshop presentation8/22 國際研習會簡報_workshop presentation
8/22 國際研習會簡報_workshop presentation
 
Letter Dr. Christian Vaillancourt
Letter Dr. Christian Vaillancourt Letter Dr. Christian Vaillancourt
Letter Dr. Christian Vaillancourt
 
Data research portal
Data research portal Data research portal
Data research portal
 

Similar to Troubleshooting: A High-Value Asset For The Service-Provider Discipline

Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
ReliaQuest
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
Damon Small
 
Endpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint SecurityEndpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint Security
Observable Networks
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
Liming Zhu
 
Big Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil GamesBig Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil Games
Rob Winters
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
 
Mds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to herokuMds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to heroku
David Scruggs
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
How Celtra Optimizes its Advertising Platform with Databricks
How Celtra Optimizes its Advertising Platformwith DatabricksHow Celtra Optimizes its Advertising Platformwith Databricks
How Celtra Optimizes its Advertising Platform with Databricks
Grega Kespret
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspective
Walid Shaari
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Net at Work
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
Inside Analysis
 
Availability in a cloud native world v1.6 (Feb 2019)
Availability in a cloud native world v1.6 (Feb 2019)Availability in a cloud native world v1.6 (Feb 2019)
Availability in a cloud native world v1.6 (Feb 2019)
Haytham Elkhoja
 
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
Eneko Jon Bilbao
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
Aj Maurya
 
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
DevOps Indonesia #14 - Building monitoring framework on container infrastructureDevOps Indonesia #14 - Building monitoring framework on container infrastructure
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
DevOps Indonesia
 

Similar to Troubleshooting: A High-Value Asset For The Service-Provider Discipline (20)

Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Endpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint SecurityEndpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint Security
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Big Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil GamesBig Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil Games
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Mds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to herokuMds cloud saturday 2015 how to heroku
Mds cloud saturday 2015 how to heroku
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
How Celtra Optimizes its Advertising Platform with Databricks
How Celtra Optimizes its Advertising Platformwith DatabricksHow Celtra Optimizes its Advertising Platformwith Databricks
How Celtra Optimizes its Advertising Platform with Databricks
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspective
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Availability in a cloud native world v1.6 (Feb 2019)
Availability in a cloud native world v1.6 (Feb 2019)Availability in a cloud native world v1.6 (Feb 2019)
Availability in a cloud native world v1.6 (Feb 2019)
 
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons Learned
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
DevOps Indonesia #14 - Building monitoring framework on container infrastructureDevOps Indonesia #14 - Building monitoring framework on container infrastructure
DevOps Indonesia #14 - Building monitoring framework on container infrastructure
 

More from Sagi Brody

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
Sagi Brody
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
Sagi Brody
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
Sagi Brody
 
Automated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber ProtectionAutomated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber Protection
Sagi Brody
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
Sagi Brody
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
Sagi Brody
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
Sagi Brody
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
Sagi Brody
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
Sagi Brody
 

More from Sagi Brody (9)

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
 
Automated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber ProtectionAutomated Ransomware Recovery for Full Cyber Protection
Automated Ransomware Recovery for Full Cyber Protection
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

Troubleshooting: A High-Value Asset For The Service-Provider Discipline

  • 1. Sagi Brody, CTO @webairsagi Troubleshooting: A High Value Asset for The Service Provider Discipline
  • 2. Background • 17+ Years experience as a service provider. • MSP - We own your infrastructure stack. • Managed Public, Private, and Hybrid Cloud. • High Touch - Monitoring, Managing, Securing all layers (app/db/fw/nw/cdn) • Mix of Open Source, Commercial, and Proprietary Software. • Context of an MSP but applicable to all IT.
  • 3. The Art of Troubleshooting • Troubleshooting is a standalone skill - Must be Taught, Trained, Documented, Reviewed. • Technical skills are important but soft skills cannot be forgotten. • Big buzz around hyped technologies in DevOps. • Other important soft skills - Resourcefulness, Communication, Technical Documentation, Mentoring.
  • 4. Why Care? • We're already doing it, internally or customer facing. • We're trusted to do it well. • We’re judged how we act during crisis. • Technology agnostic skill. Never become obsolete and only becomes more important as systems become more complex. • Applicable to infrastructure & software development. • Allows us to scale - It's how we manage many complex environments with small teams. • Reduce downtime & Save lives!! 4
  • 5. Brief History • Hardware & Software Systems traditionally monolithic in nature. • Flat topology without abstraction. • Mostly physical infrastructure. • Perpetual configurations . • No automation. • Easier Troubleshooting. 5
  • 6. Today • Distributed, virtualized, and abstracted infrastructure - Network, Storage, Compute. • Self-healing & Autoscaling • Microservices based architecture • Increased complexity with many benefits (scaling, CI,time). • Decreased visibility, control, and ease of Troubleshooting. • Troubleshooting == An Art. 6
  • 7. Where to Start? • Fast resolution starts with absolute understanding of the issue. • Is this the cause or a symptom? • Was it brought to us pre-diagnosed? • What is the context? • Why is this a problem? Why is it important? • No tunnel vision. Look at the big picture. • Examples: 'Email Issue' , 'Wifi/Speed' , 'DDoS & API' 7
  • 8. Observe • Can you have a clear understanding of the issue without seeing it for yourself? • Before attempting resolution, be sure you can reproduce. • Gain perspective using tools - remote logins, screen shares, screen shots. • Understand expected behavior vs fault. • Software development & Debugging tools. • Supplement lack of perspective with solid communication. 8
  • 9. Localize • Drill Down - Peel back the layers of the onion. • Process of elimination to localize the issue. • Examples: static content vs dynamic content, local storage vs shared/network storage, directly test and bypass layers, rule out network • Follow the flow of data and test each step. • Major Outages - localize to commonality - What do the effected services have in common? • Use monitoring tools or SPOTs to localize. • Don't assume anything - NIH (Not invented here). 9
  • 10. Resolve and Test • Scientific Method: Question -> Hypothesis –> Experiment -> Observation ->Analysis -> Conclusion • Make small incremental changes. • Use sandboxes where possible. • Document each test and result, and change. • Use ability to reproduce and observe to confirm resolution. 10
  • 11. Monitor for Success • Fast resolution starts with a solid monitoring strategy. • Empower DevOps to create layered alerts. • Create simple interfaces, scripts, APIs to allow for easy additions of monitoring to standardized systems. • Make it part of development & build process. • Monitor the Big and the Small: • Big - The finished product. Look for expected result via end user interface to ensure all services are properly functioning. • Small - Every layer! OK/FAIL monitoring for multi-dimensional services and 3rd party providers. • If setup properly, big and small alerts should trigger simultaneously allowing instant localization. 11
  • 13. 3rd Party Monitoring “In God we trust. Everyone else we monitor.” 13
  • 15. Build as you go.. 15
  • 16. Automated Troubleshooting • Trigger action based on logging events (syslog, splunk, logstash). • Scan configuration files for dangerous conditions. • Pipe events to software designed to diagnose and take action. • Actions: disable interfaces, line cards, services, servers, notify operations. • Platform that allows easy addition of new tests based on experience. 16
  • 17. Tools & Integration • Use Single Point of truth (ie collins). • Integrate 3rd party best in breed to SPOT (Nagios, MRTG, ManageEngine, Vmware, Xen, ScienceLogic) • Combine communication, monitoring, and culture • We've connected: Nagios, Phone calls, LiveChats, Ticket updates, WO updates, Ansible deployments, Network alerts, Network capacity alerts, Physical data center alerts, DDoS attacks, Confluence. • Make documentation & diagram management easier. "If its not documented, it didnt happen" 17
  • 19. High Level Context Make it part of your culture. 19
  • 20. Historical Data a Must • Establish baselines. • Am I looking at a preexisting condition? • What changed and when? • Data Aggregation • 3rd party: DataDog, ScienceLogic, GroundWorks, NewRelic 20
  • 22. Aggregated Statistics 22 Network by Host Host 1 Host 2 Host 3 Host 4
  • 23. Aggregated Statistics 23 Network by VM (Host 1) VM 1 VM 2 VM 3 VM 4
  • 24. People Factor • Why is it not taught alongside technical skill? • Becomes part of the interview process. • Adopt approach used by the medical field - Bed Side Clinics. Use your superstars. • Make it part of your culture and develop a reward system around it. • Collapse silos, broaden context for everyone. 24