SlideShare a Scribd company logo
Four Ways to Combat
Non-Actionable Alerts
Eyal Efroni
Application Team Leader @ BigPanda http://bigpanda.io
Many alerts place an
unnecessary burden on Ops
teams instead of helping them
solve issues
The main problem is that most
alerts are not actionable enough
They point to issues that don’t require
a response
They lack critical information, forcing
you to spend time searching for more
insights in order to gauge their urgency
An excess of non-actionable
alerts creates “alert fatigue”,
wasting time and resources and
interfering with the real issues
at hand
This might already be happening
to you:
Do you receive redundant alerts and:
Immediately ignore them?
Realize they aren’t relevant to you?
Perform the same routine actions for
obtaining the actual information you need?
If you’ve answered yes,
Than this presentation is for you
Four Common types of
Non-Actionable Alerts
1. Unhelpful titles
The problem:
One of the most important parts of the alert is its title, as it is the first thing
you see.
Cryptic titles force the responders to dig unnecessarily through the body of
the alert for more info.
Extra frustration occurs when different alerts share similar titles, causing
great confusion and wasting time.
1. Unhelpful titles
Example:
You receive an alert titled “CPU LOAD 1.80″ followed by another alert titled
“CPU LOAD 1.90”.
Are these alerts even referring to the same server? Is a 1.80 load critical?
What is affected by this problem?
Wouldn’t it been great if the alert provided answers rather than adding
more questions?
1. Unhelpful titles
Making it actionable:
All alerts should have short yet descriptive titles.
They should enable the responder, at a glance, to know what the problem
is, where it is, and how to address it.
For example: “Server billing-1 load is critical for 5 min” is much more
actionable than “CPU LOAD 1.80”.
2. Lack of vital information
The Problem:
Alert content is often limited or cryptic, forcing us to spend a lot of cycles
understanding the meaning of the alert and searching for more
information in order to gain insight.
Somewhere within my Nagios, Graphite, Pingdom, or New Relic, there is
relevant information to be found, but instead of solving the issue a
significant portion of my valuable time is spent on such searches.
2. Lack of vital information
Example:
When addressing an alert about a server overload, almost always the same
set of tasks are performed.
These include connecting to the server to check for current load or
analyzing trends in the CPU graph.
Moreover, the next time a similar alert happens, you’ll be performing
these same steps over and over.
2. Lack of vital information
Making it actionable:
Identify alerts that require repetitive and predictable searches for more
information
Automatically bundle that information as part of the alert.
list actions that need to be performed or a link to relevant resources
such as scripts, protocols or the developer’s insight into why this might
happen
3. Alerts that don’t require resolution
The Problem:
Production environments are complex and dynamic.
To maintain reliability, vital system information must be accessible to Ops
and Developers.
Our instinct tells us that this can only be accomplished by being notified of
every alert and exception.
In reality, however, the large majority of these alerts don’t require an
action and end up drowning out the ones who do.
3. Alerts that don’t require resolution
Example:
An alert could’ve been sent to indicate that a user entered an invalid credit
card number.
While this information may be very interesting, we do not have any control
over the user’s actions and can therefore do nothing about it.
Getting this alert will only add additional noise.
3. Alerts that don’t require resolution
Making it actionable:
If the alert doesn’t lead to an immediate action on your part,
don’t send it.
Instead, find the issues which will require your attention.
For example, replace the invalid credit card alert with an actionable alert
which specifies that the rate of checkouts has dropped dramatically —
maybe a change was made and a rollback action is required.
Another solution can be a daily / weekly report which aggregates and
visualizes the information that isn’t required in real-time.
This way, the desired information will be available at the right time.
4. Alert routing
The Problem:
In many organizations, everyone receives all the alerts.
This type of practice is usually initiated when teams are small and everyone
is involved in everything.
However, as teams scale and people begin to specialize, the “loudspeaker”
approach to alerting quickly becomes a drag.
4. Alert routing
Example:
Sending alerts regarding connection issues with your 3rd party billing
provider to your DBA team won’t help resolve the alert and will probably
be ignored.
4. Alert routing
Making it actionable:
Send alerts only to people who are relevant to that alert.
Obviously, this is easier said than done, as many alerts can be caused by
several different sources.
In such cases, creating more specific alerts for each source will provide the
necessary granularity to make better routing decisions.
Conclusion
Making alerts more actionable can significantly ease your pain
and improve the day to day work.
Simple changes, can have a dramatic impact.
Conclusion
Actionable alerts can become irrelevant very quickly.
Have a culture of ongoing improvement to your alerts
Make a habit of periodically reviewing them and removing
the non-actionable ones.
Thanks !
http://bigpanda.io http://twitter.com/bigpanda

More Related Content

What's hot

The delta architecture
The delta architectureThe delta architecture
The delta architecture
Prakash Chockalingam
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
Elasticsearch
 
CNIT 129S Ch 4: Mapping the Application
CNIT 129S Ch 4: Mapping the ApplicationCNIT 129S Ch 4: Mapping the Application
CNIT 129S Ch 4: Mapping the Application
Sam Bowne
 
Graph Databases at Netflix
Graph Databases at NetflixGraph Databases at Netflix
Graph Databases at Netflix
Ioannis Papapanagiotou
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
Sam Bowne
 
Splunk 101
Splunk 101Splunk 101
Splunk 101
Splunk
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
Data lineage and observability with Marquez - subsurface 2020
Data lineage and observability with Marquez - subsurface 2020Data lineage and observability with Marquez - subsurface 2020
Data lineage and observability with Marquez - subsurface 2020
Julien Le Dem
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne
 
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Anastasija Nikiforova
 
presentation.pdf
presentation.pdfpresentation.pdf
presentation.pdf
caa28steve
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne
 
Introducing Databricks Delta
Introducing Databricks DeltaIntroducing Databricks Delta
Introducing Databricks Delta
Databricks
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
chrissanders88
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
stackconf 2022: Open Source for Better Observability
stackconf 2022: Open Source for Better Observabilitystackconf 2022: Open Source for Better Observability
stackconf 2022: Open Source for Better Observability
NETWAYS
 
Clickhouse at Cloudflare. By Marek Vavrusa
Clickhouse at Cloudflare. By Marek VavrusaClickhouse at Cloudflare. By Marek Vavrusa
Clickhouse at Cloudflare. By Marek Vavrusa
Valery Tkachenko
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE - ATT&CKcon
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
Gwen (Chen) Shapira
 

What's hot (20)

The delta architecture
The delta architectureThe delta architecture
The delta architecture
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
 
CNIT 129S Ch 4: Mapping the Application
CNIT 129S Ch 4: Mapping the ApplicationCNIT 129S Ch 4: Mapping the Application
CNIT 129S Ch 4: Mapping the Application
 
Graph Databases at Netflix
Graph Databases at NetflixGraph Databases at Netflix
Graph Databases at Netflix
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
Splunk 101
Splunk 101Splunk 101
Splunk 101
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Data lineage and observability with Marquez - subsurface 2020
Data lineage and observability with Marquez - subsurface 2020Data lineage and observability with Marquez - subsurface 2020
Data lineage and observability with Marquez - subsurface 2020
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
 
presentation.pdf
presentation.pdfpresentation.pdf
presentation.pdf
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 
Introducing Databricks Delta
Introducing Databricks DeltaIntroducing Databricks Delta
Introducing Databricks Delta
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
stackconf 2022: Open Source for Better Observability
stackconf 2022: Open Source for Better Observabilitystackconf 2022: Open Source for Better Observability
stackconf 2022: Open Source for Better Observability
 
Clickhouse at Cloudflare. By Marek Vavrusa
Clickhouse at Cloudflare. By Marek VavrusaClickhouse at Cloudflare. By Marek Vavrusa
Clickhouse at Cloudflare. By Marek Vavrusa
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 

Similar to Four ways to combat non actionable alerts

Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Peter Reynolds
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
SilvioPappalardo
 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategy
Himanshu Bari
 
Overcoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databasesOvercoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databases
MSM Software
 
Recruitment Management Using HeadTracker
Recruitment Management Using HeadTrackerRecruitment Management Using HeadTracker
Recruitment Management Using HeadTracker
Ashish Belagali
 
Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 Mis
Tonyversity
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risks
Harley Capewell
 
Introducing Puppet Remediate™
Introducing Puppet Remediate™Introducing Puppet Remediate™
Introducing Puppet Remediate™
Puppet
 
5 Single Shift CI Projects (1)
5 Single Shift CI Projects (1)5 Single Shift CI Projects (1)
5 Single Shift CI Projects (1)
Jaime Alboim
 
Predictive Modeling Procedure
Predictive Modeling ProcedurePredictive Modeling Procedure
Predictive Modeling Procedure
Predactica Social
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
Justin Chinkolenji
 
KETL Quick guide to data analytics
KETL Quick guide to data analytics KETL Quick guide to data analytics
KETL Quick guide to data analytics
KETL Limited
 
5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation
ObservePoint
 
Impact of data overloading on productivity
Impact of data overloading on productivityImpact of data overloading on productivity
Impact of data overloading on productivity
athandz - Infoserve (Pvt) Ltd
 
Convercent Case Management Guide
Convercent Case Management GuideConvercent Case Management Guide
Convercent Case Management Guide
Brooke Webster
 
Stuck In Neutral: Five Reasons Law Firms Fail To Scale
Stuck In Neutral:  Five Reasons Law Firms Fail To ScaleStuck In Neutral:  Five Reasons Law Firms Fail To Scale
Stuck In Neutral: Five Reasons Law Firms Fail To Scale
DonnamarieStriano
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-Recommendation
Kent Keeler
 
Farming logs to save the weekend
Farming logs to save the weekendFarming logs to save the weekend
Farming logs to save the weekend
Antonio Spinelli
 
7 Questions to Ask When Auditing Your Customer Success Processes
7 Questions to Ask When Auditing Your Customer Success Processes 7 Questions to Ask When Auditing Your Customer Success Processes
7 Questions to Ask When Auditing Your Customer Success Processes
LizzyManz
 
A strategy for security data analytics - SIRACon 2016
A strategy for security data analytics - SIRACon 2016A strategy for security data analytics - SIRACon 2016
A strategy for security data analytics - SIRACon 2016
Jon Hawes
 

Similar to Four ways to combat non actionable alerts (20)

Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategy
 
Overcoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databasesOvercoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databases
 
Recruitment Management Using HeadTracker
Recruitment Management Using HeadTrackerRecruitment Management Using HeadTracker
Recruitment Management Using HeadTracker
 
Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 Mis
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risks
 
Introducing Puppet Remediate™
Introducing Puppet Remediate™Introducing Puppet Remediate™
Introducing Puppet Remediate™
 
5 Single Shift CI Projects (1)
5 Single Shift CI Projects (1)5 Single Shift CI Projects (1)
5 Single Shift CI Projects (1)
 
Predictive Modeling Procedure
Predictive Modeling ProcedurePredictive Modeling Procedure
Predictive Modeling Procedure
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
KETL Quick guide to data analytics
KETL Quick guide to data analytics KETL Quick guide to data analytics
KETL Quick guide to data analytics
 
5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation
 
Impact of data overloading on productivity
Impact of data overloading on productivityImpact of data overloading on productivity
Impact of data overloading on productivity
 
Convercent Case Management Guide
Convercent Case Management GuideConvercent Case Management Guide
Convercent Case Management Guide
 
Stuck In Neutral: Five Reasons Law Firms Fail To Scale
Stuck In Neutral:  Five Reasons Law Firms Fail To ScaleStuck In Neutral:  Five Reasons Law Firms Fail To Scale
Stuck In Neutral: Five Reasons Law Firms Fail To Scale
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-Recommendation
 
Farming logs to save the weekend
Farming logs to save the weekendFarming logs to save the weekend
Farming logs to save the weekend
 
7 Questions to Ask When Auditing Your Customer Success Processes
7 Questions to Ask When Auditing Your Customer Success Processes 7 Questions to Ask When Auditing Your Customer Success Processes
7 Questions to Ask When Auditing Your Customer Success Processes
 
A strategy for security data analytics - SIRACon 2016
A strategy for security data analytics - SIRACon 2016A strategy for security data analytics - SIRACon 2016
A strategy for security data analytics - SIRACon 2016
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Four ways to combat non actionable alerts

  • 1. Four Ways to Combat Non-Actionable Alerts Eyal Efroni Application Team Leader @ BigPanda http://bigpanda.io
  • 2. Many alerts place an unnecessary burden on Ops teams instead of helping them solve issues
  • 3. The main problem is that most alerts are not actionable enough
  • 4. They point to issues that don’t require a response They lack critical information, forcing you to spend time searching for more insights in order to gauge their urgency
  • 5. An excess of non-actionable alerts creates “alert fatigue”, wasting time and resources and interfering with the real issues at hand
  • 6. This might already be happening to you:
  • 7. Do you receive redundant alerts and: Immediately ignore them? Realize they aren’t relevant to you? Perform the same routine actions for obtaining the actual information you need?
  • 8. If you’ve answered yes, Than this presentation is for you
  • 9. Four Common types of Non-Actionable Alerts
  • 10. 1. Unhelpful titles The problem: One of the most important parts of the alert is its title, as it is the first thing you see. Cryptic titles force the responders to dig unnecessarily through the body of the alert for more info. Extra frustration occurs when different alerts share similar titles, causing great confusion and wasting time.
  • 11. 1. Unhelpful titles Example: You receive an alert titled “CPU LOAD 1.80″ followed by another alert titled “CPU LOAD 1.90”. Are these alerts even referring to the same server? Is a 1.80 load critical? What is affected by this problem? Wouldn’t it been great if the alert provided answers rather than adding more questions?
  • 12. 1. Unhelpful titles Making it actionable: All alerts should have short yet descriptive titles. They should enable the responder, at a glance, to know what the problem is, where it is, and how to address it. For example: “Server billing-1 load is critical for 5 min” is much more actionable than “CPU LOAD 1.80”.
  • 13. 2. Lack of vital information The Problem: Alert content is often limited or cryptic, forcing us to spend a lot of cycles understanding the meaning of the alert and searching for more information in order to gain insight. Somewhere within my Nagios, Graphite, Pingdom, or New Relic, there is relevant information to be found, but instead of solving the issue a significant portion of my valuable time is spent on such searches.
  • 14. 2. Lack of vital information Example: When addressing an alert about a server overload, almost always the same set of tasks are performed. These include connecting to the server to check for current load or analyzing trends in the CPU graph. Moreover, the next time a similar alert happens, you’ll be performing these same steps over and over.
  • 15. 2. Lack of vital information Making it actionable: Identify alerts that require repetitive and predictable searches for more information Automatically bundle that information as part of the alert. list actions that need to be performed or a link to relevant resources such as scripts, protocols or the developer’s insight into why this might happen
  • 16. 3. Alerts that don’t require resolution The Problem: Production environments are complex and dynamic. To maintain reliability, vital system information must be accessible to Ops and Developers. Our instinct tells us that this can only be accomplished by being notified of every alert and exception. In reality, however, the large majority of these alerts don’t require an action and end up drowning out the ones who do.
  • 17. 3. Alerts that don’t require resolution Example: An alert could’ve been sent to indicate that a user entered an invalid credit card number. While this information may be very interesting, we do not have any control over the user’s actions and can therefore do nothing about it. Getting this alert will only add additional noise.
  • 18. 3. Alerts that don’t require resolution Making it actionable: If the alert doesn’t lead to an immediate action on your part, don’t send it. Instead, find the issues which will require your attention. For example, replace the invalid credit card alert with an actionable alert which specifies that the rate of checkouts has dropped dramatically — maybe a change was made and a rollback action is required. Another solution can be a daily / weekly report which aggregates and visualizes the information that isn’t required in real-time. This way, the desired information will be available at the right time.
  • 19. 4. Alert routing The Problem: In many organizations, everyone receives all the alerts. This type of practice is usually initiated when teams are small and everyone is involved in everything. However, as teams scale and people begin to specialize, the “loudspeaker” approach to alerting quickly becomes a drag.
  • 20. 4. Alert routing Example: Sending alerts regarding connection issues with your 3rd party billing provider to your DBA team won’t help resolve the alert and will probably be ignored.
  • 21. 4. Alert routing Making it actionable: Send alerts only to people who are relevant to that alert. Obviously, this is easier said than done, as many alerts can be caused by several different sources. In such cases, creating more specific alerts for each source will provide the necessary granularity to make better routing decisions.
  • 22. Conclusion Making alerts more actionable can significantly ease your pain and improve the day to day work. Simple changes, can have a dramatic impact.
  • 23. Conclusion Actionable alerts can become irrelevant very quickly. Have a culture of ongoing improvement to your alerts Make a habit of periodically reviewing them and removing the non-actionable ones.