SlideShare a Scribd company logo
PAGE1
DEVOPS INDONESIA
DEVOPS INDONESIA
Jakarta, 28 Feb 2019
Building Monitoring Framework
DevOpsCommunity in Indonesia
PAGE3
DEVOPS INDONESIA
DEVOPS INDONESIA HOUSE RULES
100% ATTENTION
TAKE NOTES, NOT CALLS
RECEIVE KNOWLEDGE, NOT MESSAGES
MUTE NOTIFICATIONS FOR SLACK QQ WHATSAPP IMESSAGE EMAIL
TELEGRAM SNAPCHAT FACEBOOK WEIBO HANGOUTS VOXER SIGNAL G+
TWITTER VIBER SKYPE WECHAT LINE SMS ...
PAGE4
DEVOPS INDONESIA
Let’s get know each otherLet's get know each other
PAGE5
DEVOPS INDONESIA
Linux Geek | OpenSourceEnthusiast | Security Hobbies
Senior Manager - Technology Operation
Yusuf Hadiwinata Sutandar
PAGE6
DEVOPS INDONESIA
Building Monitoring Framework
PAGE8
DEVOPS INDONESIA
Raise You Hand!
Who..
...has implement
monitoring?
PAGE9
DEVOPS INDONESIA
Background...
One of the biggest challenges facing IT ops teams is the lack of
visibility across the entire infrastructure - physical, virtual and in the
cloud. Making things even more complex, any infrastructure
monitoring solution needs to not only meet the IT team’s needs, but
also the needs of other stakeholders including line of business (LOB)
owners and application developers
PAGE10
DEVOPS INDONESIA
Monitoring is essential
• Protecting revenue, brand, and security
• Identification of issues before customers are impacted
• Creating feedback loops and stability
• Gathering information on usage and usability
• Collecting information for future analysis
PAGE11
DEVOPS INDONESIA
Comprehensive monitoring strategy
• Monitor the components and the whole system level, component level, and
overall applicationmetrics need to be includedto get the full picture.
• Analyze first and third party performance. Problems with a third party affect the
overall digital experiencejust as much as problems with first party content.
• Measure individual pages and multi-step transactions. Users are visiting more
than a single page, you should be monitoring more than the home page.
• Configure alerts to be notified when performance varies from a baseline. Early
identification of issues can help resolve problems before customers are impacted.
• Compare your performance to competitors or industry leaders. Performance is
relative, you are being compared to other sites on a daily basis, do you know how
you stack up?
PAGE12
DEVOPS INDONESIA
Comprehensive monitoring strategy
• Monitor from the viewpoint of your users. Capture metrics from real users to
get the broadest coverage and use those locations to influence where to capture
synthetic measurementsfrom.
• Measure performance across multiple connection types. Performance and
availability can vary widely across connection types include a representative
sample of your users.
• Align metrics with business objectives. Why should others in the organization
care about a metric? Describe how the monitoring data is relevant to objectives
such as increasing customer loyalty, increasing revenue, or reducing costs.
• Re-evaluate your strategy on a regular basis. As your company grows, and your
application changes, your monitoring strategy should be re-evaluated. Are you still
measuring from the geographies that matter? Have new components been
introducedthat need to be monitored?
• Look for the anomalies and outliers. We can learn more from the unexpected
than from the everyday occurrences.
PAGE13
DEVOPS INDONESIA
Breaking your strategy
• This first component is collection. Any performance monitoring strategy starts with data
collection. If you can’t monitor it, you can’t manage it. To prevent visibility gaps, your
performance-monitoring platform should be data agnostic, with high frequency polling
down to the second.
• Building the baseline. Once you’ve collected the broadest set of performance data at the
required granularity, it’s time to establish a baseline for every metric you monitor. It’s
imperative to understand what “normal” conditions look like at any given moment, especially
in dynamic virtualized environments. Baselines then become your basis for aneffective
alerting method.
• Setting alerts. In addition to setting static thresholds, it’s important to establish alerts based
on deviation from baseline performance. Beyond a daily alert about high bandwidth usage,
you need to know when an unexpected spike occurs during working hours due to a unique
user-initiated action
PAGE14
DEVOPS INDONESIA
Breaking your strategy cont..
• Creating reports. Canned reports reveal most utilized interfaces, highest packet loss and
other key metrics. Yet, they don’t allow for the level of manipulation often required to
troubleshoot performance issues
• Analyzing data. The goal is to find actionable insight needed to proactively detect and avoid
performance events, understand correlations that can help fine-tune infrastructure and
make more informed forecasting decisions about the impact infrastructure has on the
business.
• Sharing results. Once armed with the strategic ability to collect, baseline, alert, report and
analyze your performance data, its time to share insights with team members who can truly
benefit from monitoring results.
PAGE15
DEVOPS INDONESIA
ITOM Standarization
Performance
Monitoring
Capacity
Forecasting
Business
Insight
Services
Availability
Security Event
Domain
Controller
SMTP
Centralize Log
Server
NTP Server
Lifecycle
Management
Antivirus
Agent
Password
Manager
Standard
Hardening
Config
Management
New Deployment
PAGE16
DEVOPS INDONESIA
Performance
Monitoring
Capacity
Forecasting
Business
Insight
Services
Availability
Data Center
Devices
Server
Storage
Network
Platform
Application
Operating System
Virtualization
Container
Application
Database
Public Service
URL
www.biznetgio.com
Portal.neo.id
cloud.biznetgiocloud.com
Security &
Compliance
HIDS
SIEM
Compliance
Vunl Management
NIDS
Automatic
Alert, Call,
Paging and
Notification
Security Event
Automatic
Escalation
Management
L1
L2
L3
ITOM Strategy
PAGE17
DEVOPS INDONESIA
Monitoring, Alerting, and Capacity Planning
No Category Allerting SIEM
Services Availability Perfomance Monitoring Capacity Forecasting
Sysops Network
Data
Center
Sysops Network
Data
Center
Sysops Network
Data
Center
Bussiness
/Sales
1
Visual Dashboard &
Monitoring
1
a
2
Public Service URL
Monitoring
1
a
3 Notification Tools
1 1st Layer Notification
2 2nd Layer Notification
3 Management Escalation
Prepare Your Checklist
PAGE18
DEVOPS INDONESIA
Data Center Monitoring - element
• Asset configuration and change management
• Know trends in data center for a better capacity planning
• Sensing and monitoring temperature
• Establish precision cooling control
• Fluid and humidity detection
• Integrate the environment with other sensors
• Managing alarms and notifications
• Establish Data center Environmental Monitoring Systems (EMS)
PAGE19
DEVOPS INDONESIA
Data Center monitoring best practice
• Testing and Maintenance
• Be ready for emergencies
• Have a backup plan ready
• Have an automated recovery plan
PAGE20
DEVOPS INDONESIA
Data Center monitoring – Temperature & Environment
PAGE21
DEVOPS INDONESIA
Data Center monitoring – Perfomance
PAGE22
DEVOPS INDONESIA
Data Center monitoring – Perfomance
PAGE23
DEVOPS INDONESIA
Data Center monitoring – Business Insight
PAGE24
DEVOPS INDONESIA
Data Center monitoring – Business Insight
PAGE25
DEVOPS INDONESIA
Application and Platform
Application monitoring is a process that
ensures that a software application processes
and performs in an expected manner and
scope. This technique routinely identifies,
measures and evaluates the performance of
an application and provides the means to
isolate and rectify any abnormalities or
shortcomings.
PAGE26
DEVOPS INDONESIA
Application and Platform Monitoring Element
• Application response time
• API perfomance
• Service Bus perfomance
• Processing perfomance
PAGE27
DEVOPS INDONESIA
Database monitoring
Measuring database attributes to monitor application productivity.
• Get comprehensive insight into the health and performance of
your databases
• Track slow queries, expensive statements, response times, failures,
page faults, Dead lock details and a whole lot of KPIs.
• Monitor, easily identify and solve database issues that impact
application performance.
PAGE28
DEVOPS INDONESIA
Microservices monitoring
Modern microservices are displacing
monolithic application stacks, accelerating
development and deployment speed,
simplify scaling and more. With all of its
advantages, a microservices-approach
increases the complexity of monitoring and
troubleshooting applications
PAGE29
DEVOPS INDONESIA
Visualize Microservice
Interaction
Monitor’s transparent instrumentation
observes all activity at a system call level.
This helps you instantly see how your
microservices interact and provides key
metrics like response time, network traffic
and resource utilization. Dynamic topology
maps help you identify bottlenecks,
visualize your application flow and drill
down to the process level to understand
what is running and where.
PAGE30
DEVOPS INDONESIA
PAGE31
DEVOPS INDONESIA
PAGE32
DEVOPS INDONESIA
Monitor and
troubleshoot
transactions in
complex
distributed
systems
PAGE33
DEVOPS INDONESIA
PAGE34
DEVOPS INDONESIA
PAGE35
DEVOPS INDONESIA
PAGE36
DEVOPS INDONESIA
Public Service Monitoring
• Monitoring your public service
from multiple geo location
• Monitoring SSL expiration
and domain expiration
• Website Uptime &
Performance Monitoring
PAGE37
DEVOPS INDONESIA
Public Service Monitoring
PAGE38
DEVOPS INDONESIA
Public Service Monitoring
ProductName Rank 1-5
Price/Month
(USD)
Number
Monitoring
Check Internal
Synthetic
application
SSL Check Status Page
Panopta 3 6 1 1 Minutes Yes Yes Yes
Updown.io 2.5 67.18 100 1 Minutes n/a Yes Yes
Nodeping 2 15 200 1 Minutes n/a n/a Yes
Pingdom 4 89.95 80 1 Minutes Yes Yes Yes
Statuscake 3.5 20.41 100 1 Minutes Yes Yes Yes
pingometer 3 29 15 1 Minutes n/a Yes Yes
Monitis 5 136.95 100 1 Minutes Yes Yes n/a
uptimerobot 3 8.5 100 1 Minutes n/a Yes Yes
uptimerobot 3 Free 50 5 Minutes n/a No Yes
serverguard24 4 129.9 200 1 Minutes Yes Yes Yes
PAGE39
DEVOPS INDONESIA
Security Monitoring
• Intrusion Detection - Detect threats and suspicious activities early
with host, network, and cloud IDS.
• Vulnerability Assessment - Identify vulnerabilities and AWS
configuration issues that put your organization at risk.
• Event Correlation - Automate event correlation and security analysis
with AlienVault Threat Intelligence.
• Log Management - Automate log collection and analysis and securely
store raw logs in the AlienVault Cloud.
• Compliance Reporting - Be audit-ready sooner with pre-built
compliance reporting templates.
PAGE40
DEVOPS INDONESIA
PAGE41
DEVOPS INDONESIA
PAGE42
DEVOPS INDONESIA
Paging, Alert and Notification
When you are auditing or writing alerting rules, consider these things to keep your
oncall rotation happier:
• Pages should be urgent, important,actionable,and real.
• They should represent either ongoing or imminent problems with your service.
• Err on the side of removing noisy alerts – over monitoring is a harder problem to
solve than under monitoring.
• You should almost always be able to classify the problem into one of: availability &
basic functionality; latency; correctness (completeness, freshness and durability of
data); and feature specific problems.
• Symptoms are a better way to capture more problems more comprehensively and
robustly with less effort
PAGE43
DEVOPS INDONESIA
Paging, Alert and Notification
PAGE44
DEVOPS INDONESIA
Paging, Alert and Notification
PAGE45
DEVOPS INDONESIA
Paging, Alert and Notification
PAGE46
DEVOPS INDONESIA
Question???
PAGE47
DEVOPS INDONESIA
linkedin.com/in/yusufhadiwinata/
https://www.meetup.com/Docker-Indonesia/
Stay Connected
@devopsindonesia
facebook.com/yusuf.hadiwinata
www.devopsindonesia.com
linkedin.com/in/mademulia/
https://www.meetup.com/DevOps-Indonesia
PAGE48
DEVOPS INDONESIA
Are You Awesome?
We are Hiring !
https://www.linkedin.com/company/biznet-gio-cloud/jobs/
PAGE49
DEVOPS INDONESIA
Alone We are smart, together We are brilliant
THANK YOU !
Quote by Steve

More Related Content

What's hot

5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoring
Flightcase1
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDM
Quick Heal Technologies Ltd.
 
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to KnowContainer Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
DevOps.com
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
Ivanti
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
JasonTrinhNguyenTruo
 
CloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUpCloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUp
Ravi Lachhman
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon
 
Design Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise SolutionsDesign Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise Solutions
Inductive Automation
 
5 Ways to Tighten Security with Endpoint Management
5 Ways to Tighten Security with Endpoint Management5 Ways to Tighten Security with Endpoint Management
5 Ways to Tighten Security with Endpoint Management
Ivanti
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
James Neo
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
PeopleReign, Inc.
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
 
KGI compliance as-code approach
KGI compliance as-code approachKGI compliance as-code approach
KGI compliance as-code approach
Puppet
 
Keynote: Puppet camp compliance
Keynote: Puppet camp complianceKeynote: Puppet camp compliance
Keynote: Puppet camp compliance
Puppet
 
How to avoid cascading failures in microservices
How to avoid cascading failures in microservicesHow to avoid cascading failures in microservices
How to avoid cascading failures in microservices
DevOps Indonesia
 
5 Effective M365 IT Pro Habits
5 Effective M365 IT Pro Habits5 Effective M365 IT Pro Habits
5 Effective M365 IT Pro Habits
Allison Schoner
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” Assets
Net at Work
 

What's hot (20)

5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoring
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDM
 
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to KnowContainer Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
CloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUpCloudBees and Sonatype - MeetUp
CloudBees and Sonatype - MeetUp
 
Stu r35 a
Stu r35 aStu r35 a
Stu r35 a
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
Design Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise SolutionsDesign Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise Solutions
 
5 Ways to Tighten Security with Endpoint Management
5 Ways to Tighten Security with Endpoint Management5 Ways to Tighten Security with Endpoint Management
5 Ways to Tighten Security with Endpoint Management
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
KGI compliance as-code approach
KGI compliance as-code approachKGI compliance as-code approach
KGI compliance as-code approach
 
Keynote: Puppet camp compliance
Keynote: Puppet camp complianceKeynote: Puppet camp compliance
Keynote: Puppet camp compliance
 
How to avoid cascading failures in microservices
How to avoid cascading failures in microservicesHow to avoid cascading failures in microservices
How to avoid cascading failures in microservices
 
5 Effective M365 IT Pro Habits
5 Effective M365 IT Pro Habits5 Effective M365 IT Pro Habits
5 Effective M365 IT Pro Habits
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” Assets
 

Similar to DevOps Indonesia #14 - Building monitoring framework on container infrastructure

Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management Nirvana
Seema Jethani
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
DellNMS
 
Observability in Modern Applications.pptx
Observability in Modern Applications.pptxObservability in Modern Applications.pptx
Observability in Modern Applications.pptx
Aneesh Kumar
 
Why Monitoring and Logging are Important in DevOps.pdf
Why Monitoring and Logging are Important in DevOps.pdfWhy Monitoring and Logging are Important in DevOps.pdf
Why Monitoring and Logging are Important in DevOps.pdf
Datacademy.ai
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
منیزہ ہاشمی
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
Matt Mandich
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
Ulf Mattsson
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
SolarWinds
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
Enterprise Management Associates
 
10 Ways to Better Application-Centric Service Management
10 Ways to Better Application-Centric Service Management10 Ways to Better Application-Centric Service Management
10 Ways to Better Application-Centric Service Management
Linh Nguyen
 
Are your cloud applications performing? How Application Performance Managemen...
Are your cloud applications performing? How Application Performance Managemen...Are your cloud applications performing? How Application Performance Managemen...
Are your cloud applications performing? How Application Performance Managemen...
DevOps.com
 
Why Modern Systems Require a New Approach to Observability
Why Modern Systems Require a New Approach to ObservabilityWhy Modern Systems Require a New Approach to Observability
Why Modern Systems Require a New Approach to Observability
Enterprise Management Associates
 
Cloud & Telecom Expense Management
Cloud & Telecom Expense Management Cloud & Telecom Expense Management
Cloud & Telecom Expense Management
Sergej Polovnikov
 
Data Analytics in Digital Transformation
Data Analytics in Digital TransformationData Analytics in Digital Transformation
Data Analytics in Digital Transformation
Mukund Babbar
 
Implementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field OperationsImplementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field Operations
Smartbridge
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
CA Technologies
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsights
Wilfried Hoge
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
Kumar Kolaganti
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
Convetit
 

Similar to DevOps Indonesia #14 - Building monitoring framework on container infrastructure (20)

Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management Nirvana
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
Observability in Modern Applications.pptx
Observability in Modern Applications.pptxObservability in Modern Applications.pptx
Observability in Modern Applications.pptx
 
Why Monitoring and Logging are Important in DevOps.pdf
Why Monitoring and Logging are Important in DevOps.pdfWhy Monitoring and Logging are Important in DevOps.pdf
Why Monitoring and Logging are Important in DevOps.pdf
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
 
10 Ways to Better Application-Centric Service Management
10 Ways to Better Application-Centric Service Management10 Ways to Better Application-Centric Service Management
10 Ways to Better Application-Centric Service Management
 
Are your cloud applications performing? How Application Performance Managemen...
Are your cloud applications performing? How Application Performance Managemen...Are your cloud applications performing? How Application Performance Managemen...
Are your cloud applications performing? How Application Performance Managemen...
 
Why Modern Systems Require a New Approach to Observability
Why Modern Systems Require a New Approach to ObservabilityWhy Modern Systems Require a New Approach to Observability
Why Modern Systems Require a New Approach to Observability
 
Cloud & Telecom Expense Management
Cloud & Telecom Expense Management Cloud & Telecom Expense Management
Cloud & Telecom Expense Management
 
Data Analytics in Digital Transformation
Data Analytics in Digital TransformationData Analytics in Digital Transformation
Data Analytics in Digital Transformation
 
Implementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field OperationsImplementing a Disconnected Mobile Application with DSI for Field Operations
Implementing a Disconnected Mobile Application with DSI for Field Operations
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsights
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 

More from DevOps Indonesia

DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
DevOps Indonesia
 
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
DevOps Indonesia
 
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia Meetup #52 - announcementDevOps Indonesia Meetup #52 - announcement
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia
 
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - AnnouncementDev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
DevOps Indonesia
 
Securing DevOps Lifecycle
Securing DevOps LifecycleSecuring DevOps Lifecycle
Securing DevOps Lifecycle
DevOps Indonesia
 
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Meetup 50 : Securing your Application - AnnouncementDevOps Meetup 50 : Securing your Application - Announcement
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Indonesia
 
Secure your Application with Google cloud armor
Secure your Application with Google cloud armorSecure your Application with Google cloud armor
Secure your Application with Google cloud armor
DevOps Indonesia
 
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Meetup 49  Aws Copilot and Gitops - announcement by DevOps IndonesiaDevOps Meetup 49  Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Indonesia
 
Operate Containers with AWS Copilot
Operate Containers with AWS CopilotOperate Containers with AWS Copilot
Operate Containers with AWS Copilot
DevOps Indonesia
 
Continuously Deploy Your CDK Application by Petra novandi barus
Continuously  Deploy Your CDK Application by Petra novandi barusContinuously  Deploy Your CDK Application by Petra novandi barus
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps Indonesia
 
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps indonesia (online) meetup 46  aws with payfazz in devops indonesia - a...DevOps indonesia (online) meetup 46  aws with payfazz in devops indonesia - a...
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps Indonesia
 
Securing Your Database Dynamic DB Credentials
Securing Your Database  Dynamic DB CredentialsSecuring Your Database  Dynamic DB Credentials
Securing Your Database Dynamic DB Credentials
DevOps Indonesia
 
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia (online) meetup 45 - AnnouncementDevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia
 
The Death and Rise of Enterprise DevOps
The Death and Rise of Enterprise DevOpsThe Death and Rise of Enterprise DevOps
The Death and Rise of Enterprise DevOps
DevOps Indonesia
 
API Security Webinar - Credential Stuffing
API Security Webinar - Credential StuffingAPI Security Webinar - Credential Stuffing
API Security Webinar - Credential Stuffing
DevOps Indonesia
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIsAPI Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
API Security Webinar - Hendra Tanto
API Security Webinar - Hendra TantoAPI Security Webinar - Hendra Tanto
API Security Webinar - Hendra Tanto
DevOps Indonesia
 
API Security Webinar : Credential Stuffing
API Security Webinar : Credential StuffingAPI Security Webinar : Credential Stuffing
API Security Webinar : Credential Stuffing
DevOps Indonesia
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIsAPI Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 

More from DevOps Indonesia (20)

DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
 
DevOps Indonesia Meetup #52 - announcement
DevOps Indonesia Meetup #52 - announcementDevOps Indonesia Meetup #52 - announcement
DevOps Indonesia Meetup #52 - announcement
 
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - AnnouncementDev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
 
Securing DevOps Lifecycle
Securing DevOps LifecycleSecuring DevOps Lifecycle
Securing DevOps Lifecycle
 
DevOps Meetup 50 : Securing your Application - Announcement
DevOps Meetup 50 : Securing your Application - AnnouncementDevOps Meetup 50 : Securing your Application - Announcement
DevOps Meetup 50 : Securing your Application - Announcement
 
Secure your Application with Google cloud armor
Secure your Application with Google cloud armorSecure your Application with Google cloud armor
Secure your Application with Google cloud armor
 
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Meetup 49  Aws Copilot and Gitops - announcement by DevOps IndonesiaDevOps Meetup 49  Aws Copilot and Gitops - announcement by DevOps Indonesia
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
 
Operate Containers with AWS Copilot
Operate Containers with AWS CopilotOperate Containers with AWS Copilot
Operate Containers with AWS Copilot
 
Continuously Deploy Your CDK Application by Petra novandi barus
Continuously  Deploy Your CDK Application by Petra novandi barusContinuously  Deploy Your CDK Application by Petra novandi barus
Continuously Deploy Your CDK Application by Petra novandi barus
 
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
DevOps indonesia (online) meetup 46  aws with payfazz in devops indonesia - a...DevOps indonesia (online) meetup 46  aws with payfazz in devops indonesia - a...
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
 
Securing Your Database Dynamic DB Credentials
Securing Your Database  Dynamic DB CredentialsSecuring Your Database  Dynamic DB Credentials
Securing Your Database Dynamic DB Credentials
 
DevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia (online) meetup 45 - AnnouncementDevOps Indonesia (online) meetup 45 - Announcement
DevOps Indonesia (online) meetup 45 - Announcement
 
The Death and Rise of Enterprise DevOps
The Death and Rise of Enterprise DevOpsThe Death and Rise of Enterprise DevOps
The Death and Rise of Enterprise DevOps
 
API Security Webinar - Credential Stuffing
API Security Webinar - Credential StuffingAPI Security Webinar - Credential Stuffing
API Security Webinar - Credential Stuffing
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIsAPI Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
 
API Security Webinar - Hendra Tanto
API Security Webinar - Hendra TantoAPI Security Webinar - Hendra Tanto
API Security Webinar - Hendra Tanto
 
API Security Webinar : Credential Stuffing
API Security Webinar : Credential StuffingAPI Security Webinar : Credential Stuffing
API Security Webinar : Credential Stuffing
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIsAPI Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIs
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

DevOps Indonesia #14 - Building monitoring framework on container infrastructure

  • 1. PAGE1 DEVOPS INDONESIA DEVOPS INDONESIA Jakarta, 28 Feb 2019 Building Monitoring Framework DevOpsCommunity in Indonesia
  • 2. PAGE3 DEVOPS INDONESIA DEVOPS INDONESIA HOUSE RULES 100% ATTENTION TAKE NOTES, NOT CALLS RECEIVE KNOWLEDGE, NOT MESSAGES MUTE NOTIFICATIONS FOR SLACK QQ WHATSAPP IMESSAGE EMAIL TELEGRAM SNAPCHAT FACEBOOK WEIBO HANGOUTS VOXER SIGNAL G+ TWITTER VIBER SKYPE WECHAT LINE SMS ...
  • 3. PAGE4 DEVOPS INDONESIA Let’s get know each otherLet's get know each other
  • 4. PAGE5 DEVOPS INDONESIA Linux Geek | OpenSourceEnthusiast | Security Hobbies Senior Manager - Technology Operation Yusuf Hadiwinata Sutandar
  • 6. PAGE8 DEVOPS INDONESIA Raise You Hand! Who.. ...has implement monitoring?
  • 7. PAGE9 DEVOPS INDONESIA Background... One of the biggest challenges facing IT ops teams is the lack of visibility across the entire infrastructure - physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers
  • 8. PAGE10 DEVOPS INDONESIA Monitoring is essential • Protecting revenue, brand, and security • Identification of issues before customers are impacted • Creating feedback loops and stability • Gathering information on usage and usability • Collecting information for future analysis
  • 9. PAGE11 DEVOPS INDONESIA Comprehensive monitoring strategy • Monitor the components and the whole system level, component level, and overall applicationmetrics need to be includedto get the full picture. • Analyze first and third party performance. Problems with a third party affect the overall digital experiencejust as much as problems with first party content. • Measure individual pages and multi-step transactions. Users are visiting more than a single page, you should be monitoring more than the home page. • Configure alerts to be notified when performance varies from a baseline. Early identification of issues can help resolve problems before customers are impacted. • Compare your performance to competitors or industry leaders. Performance is relative, you are being compared to other sites on a daily basis, do you know how you stack up?
  • 10. PAGE12 DEVOPS INDONESIA Comprehensive monitoring strategy • Monitor from the viewpoint of your users. Capture metrics from real users to get the broadest coverage and use those locations to influence where to capture synthetic measurementsfrom. • Measure performance across multiple connection types. Performance and availability can vary widely across connection types include a representative sample of your users. • Align metrics with business objectives. Why should others in the organization care about a metric? Describe how the monitoring data is relevant to objectives such as increasing customer loyalty, increasing revenue, or reducing costs. • Re-evaluate your strategy on a regular basis. As your company grows, and your application changes, your monitoring strategy should be re-evaluated. Are you still measuring from the geographies that matter? Have new components been introducedthat need to be monitored? • Look for the anomalies and outliers. We can learn more from the unexpected than from the everyday occurrences.
  • 11. PAGE13 DEVOPS INDONESIA Breaking your strategy • This first component is collection. Any performance monitoring strategy starts with data collection. If you can’t monitor it, you can’t manage it. To prevent visibility gaps, your performance-monitoring platform should be data agnostic, with high frequency polling down to the second. • Building the baseline. Once you’ve collected the broadest set of performance data at the required granularity, it’s time to establish a baseline for every metric you monitor. It’s imperative to understand what “normal” conditions look like at any given moment, especially in dynamic virtualized environments. Baselines then become your basis for aneffective alerting method. • Setting alerts. In addition to setting static thresholds, it’s important to establish alerts based on deviation from baseline performance. Beyond a daily alert about high bandwidth usage, you need to know when an unexpected spike occurs during working hours due to a unique user-initiated action
  • 12. PAGE14 DEVOPS INDONESIA Breaking your strategy cont.. • Creating reports. Canned reports reveal most utilized interfaces, highest packet loss and other key metrics. Yet, they don’t allow for the level of manipulation often required to troubleshoot performance issues • Analyzing data. The goal is to find actionable insight needed to proactively detect and avoid performance events, understand correlations that can help fine-tune infrastructure and make more informed forecasting decisions about the impact infrastructure has on the business. • Sharing results. Once armed with the strategic ability to collect, baseline, alert, report and analyze your performance data, its time to share insights with team members who can truly benefit from monitoring results.
  • 13. PAGE15 DEVOPS INDONESIA ITOM Standarization Performance Monitoring Capacity Forecasting Business Insight Services Availability Security Event Domain Controller SMTP Centralize Log Server NTP Server Lifecycle Management Antivirus Agent Password Manager Standard Hardening Config Management New Deployment
  • 14. PAGE16 DEVOPS INDONESIA Performance Monitoring Capacity Forecasting Business Insight Services Availability Data Center Devices Server Storage Network Platform Application Operating System Virtualization Container Application Database Public Service URL www.biznetgio.com Portal.neo.id cloud.biznetgiocloud.com Security & Compliance HIDS SIEM Compliance Vunl Management NIDS Automatic Alert, Call, Paging and Notification Security Event Automatic Escalation Management L1 L2 L3 ITOM Strategy
  • 15. PAGE17 DEVOPS INDONESIA Monitoring, Alerting, and Capacity Planning No Category Allerting SIEM Services Availability Perfomance Monitoring Capacity Forecasting Sysops Network Data Center Sysops Network Data Center Sysops Network Data Center Bussiness /Sales 1 Visual Dashboard & Monitoring 1 a 2 Public Service URL Monitoring 1 a 3 Notification Tools 1 1st Layer Notification 2 2nd Layer Notification 3 Management Escalation Prepare Your Checklist
  • 16. PAGE18 DEVOPS INDONESIA Data Center Monitoring - element • Asset configuration and change management • Know trends in data center for a better capacity planning • Sensing and monitoring temperature • Establish precision cooling control • Fluid and humidity detection • Integrate the environment with other sensors • Managing alarms and notifications • Establish Data center Environmental Monitoring Systems (EMS)
  • 17. PAGE19 DEVOPS INDONESIA Data Center monitoring best practice • Testing and Maintenance • Be ready for emergencies • Have a backup plan ready • Have an automated recovery plan
  • 18. PAGE20 DEVOPS INDONESIA Data Center monitoring – Temperature & Environment
  • 19. PAGE21 DEVOPS INDONESIA Data Center monitoring – Perfomance
  • 20. PAGE22 DEVOPS INDONESIA Data Center monitoring – Perfomance
  • 21. PAGE23 DEVOPS INDONESIA Data Center monitoring – Business Insight
  • 22. PAGE24 DEVOPS INDONESIA Data Center monitoring – Business Insight
  • 23. PAGE25 DEVOPS INDONESIA Application and Platform Application monitoring is a process that ensures that a software application processes and performs in an expected manner and scope. This technique routinely identifies, measures and evaluates the performance of an application and provides the means to isolate and rectify any abnormalities or shortcomings.
  • 24. PAGE26 DEVOPS INDONESIA Application and Platform Monitoring Element • Application response time • API perfomance • Service Bus perfomance • Processing perfomance
  • 25. PAGE27 DEVOPS INDONESIA Database monitoring Measuring database attributes to monitor application productivity. • Get comprehensive insight into the health and performance of your databases • Track slow queries, expensive statements, response times, failures, page faults, Dead lock details and a whole lot of KPIs. • Monitor, easily identify and solve database issues that impact application performance.
  • 26. PAGE28 DEVOPS INDONESIA Microservices monitoring Modern microservices are displacing monolithic application stacks, accelerating development and deployment speed, simplify scaling and more. With all of its advantages, a microservices-approach increases the complexity of monitoring and troubleshooting applications
  • 27. PAGE29 DEVOPS INDONESIA Visualize Microservice Interaction Monitor’s transparent instrumentation observes all activity at a system call level. This helps you instantly see how your microservices interact and provides key metrics like response time, network traffic and resource utilization. Dynamic topology maps help you identify bottlenecks, visualize your application flow and drill down to the process level to understand what is running and where.
  • 34. PAGE36 DEVOPS INDONESIA Public Service Monitoring • Monitoring your public service from multiple geo location • Monitoring SSL expiration and domain expiration • Website Uptime & Performance Monitoring
  • 36. PAGE38 DEVOPS INDONESIA Public Service Monitoring ProductName Rank 1-5 Price/Month (USD) Number Monitoring Check Internal Synthetic application SSL Check Status Page Panopta 3 6 1 1 Minutes Yes Yes Yes Updown.io 2.5 67.18 100 1 Minutes n/a Yes Yes Nodeping 2 15 200 1 Minutes n/a n/a Yes Pingdom 4 89.95 80 1 Minutes Yes Yes Yes Statuscake 3.5 20.41 100 1 Minutes Yes Yes Yes pingometer 3 29 15 1 Minutes n/a Yes Yes Monitis 5 136.95 100 1 Minutes Yes Yes n/a uptimerobot 3 8.5 100 1 Minutes n/a Yes Yes uptimerobot 3 Free 50 5 Minutes n/a No Yes serverguard24 4 129.9 200 1 Minutes Yes Yes Yes
  • 37. PAGE39 DEVOPS INDONESIA Security Monitoring • Intrusion Detection - Detect threats and suspicious activities early with host, network, and cloud IDS. • Vulnerability Assessment - Identify vulnerabilities and AWS configuration issues that put your organization at risk. • Event Correlation - Automate event correlation and security analysis with AlienVault Threat Intelligence. • Log Management - Automate log collection and analysis and securely store raw logs in the AlienVault Cloud. • Compliance Reporting - Be audit-ready sooner with pre-built compliance reporting templates.
  • 40. PAGE42 DEVOPS INDONESIA Paging, Alert and Notification When you are auditing or writing alerting rules, consider these things to keep your oncall rotation happier: • Pages should be urgent, important,actionable,and real. • They should represent either ongoing or imminent problems with your service. • Err on the side of removing noisy alerts – over monitoring is a harder problem to solve than under monitoring. • You should almost always be able to classify the problem into one of: availability & basic functionality; latency; correctness (completeness, freshness and durability of data); and feature specific problems. • Symptoms are a better way to capture more problems more comprehensively and robustly with less effort
  • 46. PAGE48 DEVOPS INDONESIA Are You Awesome? We are Hiring ! https://www.linkedin.com/company/biznet-gio-cloud/jobs/
  • 47. PAGE49 DEVOPS INDONESIA Alone We are smart, together We are brilliant THANK YOU ! Quote by Steve