SlideShare a Scribd company logo
Monitoring Docker
&
Dockerized Applications
Anantha Padmanabhan CB (@cbananth)
Rahul Krishna Upadhyaya (@rakrup_)
Satya Sanjivani Routray (@er_sanj007)
Meenakshi Sundaram Lakshmanan (@lxmeenakshi1)
Cloud and Network Solutions
Cisco Systems Inc.
Containers – Introduction
• Containers virtualize the OS just like hypervisors virtualizes the hardware
• Containers enable any payload to be encapsulated as a lightweight, Portable self-
sufficient container, that can be manipulated using standard operations and run
consistently on any hardware platform.
• Wraps up a piece of software in a complete filesystem that contains everything it
needs to run such as : code, runtime, system tools, libraries etc., they share the OS
kernel and bins/libs where needed, otherwise each of them operate in a self
contained environment.
Containers – Introduction
• Docker, LXCs are some of the most popular implementations
of containers today.
• Can be run on any Linux Server - VMs, physical Hosts,
openstack..
• Ability to move around between machines without any
modification
• Ability of containers to work together.
Monitoring Containers - Challenges
• Traditionally Monitoring brings to mind, Monitoring of the infrastructure – Server,
Networks and Monitoring the Apps which run on them.
• In the world of containers – monitoring infrastructure alone or Application alone may
not be able to provide the full picture.
• Complete Monitoring = (App + software defined components/devices + Infra)
• Challenges with the monitoring tools are
– Vast set of monitoring tools to collect various statistics
– Each tool gives different set of attributes in different format
– Data collection tools may tend to overload the container itself, making the
statistics inaccurate.
– Differentiating metrics for containers that are related and share resources
– More than everything, lot of computation is required to come up with meaningful
inferences from all the data that is collected
Monitoring Containers - Challenges
• Categorizing container utilization and statistics for multitenant applications is
complex
• Different applications provide different format of logs
• Identifying failure points of applications
• Analyzing the interconnectivity between applications in different containers, hosts
or regions.
• Assessing the response time of application is complicated in a web based cloud
application, since there are lot of other parameters (region, internet speed) which
could influence response time
• Clustered applications might require monitoring all the instances to identify the
faulty node
Monitoring Containers - Approach
• Apps are embedded within the containers which are in turn within a VM or
physical host
• Containerization requires monitoring at these different levels in order to collect
complete statistics
• Containers can be linked – ability to monitor and make sense of statistics from
linked containers becomes critical.
• Ability to intelligently correlate collected data in the context of App  Container
 Host relation
• Abstraction of monitoring methods and data in order to enable integration with
any monitoring tool of choice.
• Ability to do proactive, reactive and adaptive monitoring.
Monitoring at different levels
• Host
• Container
• Application
• Cluster
What to Monitor?
• Following are the major set of parameters which can be monitored
– CPU
• total_usage
• per_cpu_usage
• system_usage
• host_usage
• load_average etc.,
– Memory
• mem_pgfault
• mem_usage
• mem_cache
• mem_kernel etc.,
What to Monitor
– Disk
• total_bytes
• bytes_read
• bytes_written
• bytes_async
• bytes_sync etc.,
– Network
• rxbytes
• rxpackets
• rxdropped
• rxerrors
• txbytes
• txerrors etc.,
• Intelligently correlate the collected data that is monitored at different
levels mentioned earlier.
• Enable queries and filters to make meaningful inferences from the raw
data
How to Monitor?
Monitoring Strategy
• Proactive :
– Prevent failure situations
• Reactive :
– Raise events and alerts when failures occur.
• Adaptive :
– Automatically monitor new components and model statistics
What to use when? How?
Different levels need different type of monitoring strategy
Design Objectives
• Not overloading the Docker Daemon.
• Different approaches of monitoring at different
levels.
• Modular & Driver based approach for all possible
components
• Running multiple agent drivers simultaneously.
• Added considerations for Linked/Clustered
Containers
High Level Component Design
Data
StorageIQ
Agent
Engine
API (REST)
CLIUIRest Client
Queue
Agent
Agent
Hos
t
Hos
t
Hos
t
C
C
C
C
C
C
C
C
C
Monitoring Controller
Functions
Host
Container
Apps
Model
&
Process
Data
Store
Collect Data /Logs
Analyze
Agent
Container
Apps
Host
Agent Driver
Driver
Driver
Queue
Dump to
Queue
Logs & Stats
Logs & Stats
Logs&Stats
ToEngine
Agent
• One Agent per host
• Agent monitors the host, containers on that host, applications on these
containers
• Agent send & receive to the engine in a async model using queues.
• Driver based log/stats collection can be done for
host/application/containers.
• Drivers based on tool of choice of user for stats/log collection can be used
for each/multiple for hosts/applications/containers.
• More than one driver can run in parallel to collect even more diverse
params.
• Takes care of sanity of data collected to conform to the data-model in the
engine.
Monitoring controller
• REST API to be connected via CLI, UI or any other REST-client
• Driver based storage module that uses any columnar database
• IQ module that provide intelligent predictions
• Engine
– Aggregate stats & logs from different Docker Hosts.
– Integration with Identity providers (like keystone) for supporting multitenant
deployments
– Communication from agents via asynchronous queues.
– Grouping & Processing of data based on use-cases.
IQ Module
• Log & stats collected and stored make up a lot of unstructured data.
• Meaningful Inferences out of this data would be of better value to the user.
• Analytic tools like pandas, scipy planned be used to derive inteferences.
• Error predictions, usage/load pattern, capacity planning can be direct output.
• Suggestions regarding infra would be output for this module.
Thank You.

More Related Content

What's hot

Our Favorite Things: Mimsy XG tips and tricks
Our Favorite Things: Mimsy XG tips and tricksOur Favorite Things: Mimsy XG tips and tricks
Our Favorite Things: Mimsy XG tips and tricks
Axiell ALM
 
Sand Governance for QlikView
Sand Governance for QlikViewSand Governance for QlikView
Sand Governance for QlikView
Sand
 
REST APIs for the Internet of Things
REST APIs for the Internet of ThingsREST APIs for the Internet of Things
REST APIs for the Internet of ThingsMichael Koster
 
Telco analytics at scale
Telco analytics at scaleTelco analytics at scale
Telco analytics at scale
datamantra
 
Apache Apex Introduction with PubMatic
Apache Apex Introduction with PubMaticApache Apex Introduction with PubMatic
Apache Apex Introduction with PubMatic
Apache Apex
 
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
WSO2
 
Caching Data in OutSystems: A Tale of Gains Without Pain
Caching Data in OutSystems: A Tale of Gains Without PainCaching Data in OutSystems: A Tale of Gains Without Pain
Caching Data in OutSystems: A Tale of Gains Without Pain
CatarinaPereira64715
 
Apache Apex Meetup at Cask
Apache Apex Meetup at CaskApache Apex Meetup at Cask
Apache Apex Meetup at Cask
Apache Apex
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Thisara Pramuditha
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor framework
Vignesh Sukumar
 
Training Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed cachingTraining Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed caching
OutSystems
 
Stream Reasoning/CEP
Stream Reasoning/CEPStream Reasoning/CEP
Stream Reasoning/CEP
cfolie
 
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland HochmuthOSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
NETWAYS
 
Amazon web services (aws) main developer services
Amazon web services (aws)   main developer servicesAmazon web services (aws)   main developer services
Amazon web services (aws) main developer services
Anderson Carvalho
 
Architecture patterns overview
Architecture patterns overviewArchitecture patterns overview
Architecture patterns overview
Nickleus Jimenez
 
Real-time Centralized Data Platform
Real-time Centralized Data PlatformReal-time Centralized Data Platform
Real-time Centralized Data Platform
Anant Corporation
 
Task programming
Task programmingTask programming
Task programming
Yogendra Tamang
 
Multi tenancy - a practical approach
Multi tenancy - a practical approachMulti tenancy - a practical approach
Multi tenancy - a practical approach
CatarinaPereira64715
 
Building Your First Apache Apex (Next Gen Big Data/Hadoop) Application
Building Your First Apache Apex (Next Gen Big Data/Hadoop) ApplicationBuilding Your First Apache Apex (Next Gen Big Data/Hadoop) Application
Building Your First Apache Apex (Next Gen Big Data/Hadoop) Application
Apache Apex
 

What's hot (19)

Our Favorite Things: Mimsy XG tips and tricks
Our Favorite Things: Mimsy XG tips and tricksOur Favorite Things: Mimsy XG tips and tricks
Our Favorite Things: Mimsy XG tips and tricks
 
Sand Governance for QlikView
Sand Governance for QlikViewSand Governance for QlikView
Sand Governance for QlikView
 
REST APIs for the Internet of Things
REST APIs for the Internet of ThingsREST APIs for the Internet of Things
REST APIs for the Internet of Things
 
Telco analytics at scale
Telco analytics at scaleTelco analytics at scale
Telco analytics at scale
 
Apache Apex Introduction with PubMatic
Apache Apex Introduction with PubMaticApache Apex Introduction with PubMatic
Apache Apex Introduction with PubMatic
 
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
WSO2Con ASIA 2016: WSO2 Analytics Platform: The One Stop Shop for All Your Da...
 
Caching Data in OutSystems: A Tale of Gains Without Pain
Caching Data in OutSystems: A Tale of Gains Without PainCaching Data in OutSystems: A Tale of Gains Without Pain
Caching Data in OutSystems: A Tale of Gains Without Pain
 
Apache Apex Meetup at Cask
Apache Apex Meetup at CaskApache Apex Meetup at Cask
Apache Apex Meetup at Cask
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor framework
 
Training Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed cachingTraining Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed caching
 
Stream Reasoning/CEP
Stream Reasoning/CEPStream Reasoning/CEP
Stream Reasoning/CEP
 
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland HochmuthOSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
OSMC 2016 - Monasca - Monitoring-as-a-Service (at-Scale) by Roland Hochmuth
 
Amazon web services (aws) main developer services
Amazon web services (aws)   main developer servicesAmazon web services (aws)   main developer services
Amazon web services (aws) main developer services
 
Architecture patterns overview
Architecture patterns overviewArchitecture patterns overview
Architecture patterns overview
 
Real-time Centralized Data Platform
Real-time Centralized Data PlatformReal-time Centralized Data Platform
Real-time Centralized Data Platform
 
Task programming
Task programmingTask programming
Task programming
 
Multi tenancy - a practical approach
Multi tenancy - a practical approachMulti tenancy - a practical approach
Multi tenancy - a practical approach
 
Building Your First Apache Apex (Next Gen Big Data/Hadoop) Application
Building Your First Apache Apex (Next Gen Big Data/Hadoop) ApplicationBuilding Your First Apache Apex (Next Gen Big Data/Hadoop) Application
Building Your First Apache Apex (Next Gen Big Data/Hadoop) Application
 

Viewers also liked

Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
Rahul Krishna Upadhyaya
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.
Rahul Krishna Upadhyaya
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
Ananth Padmanabhan
 
Multi tenancy for docker
Multi tenancy for dockerMulti tenancy for docker
Multi tenancy for docker
Ananth Padmanabhan
 
Multi tenancy for docker
Multi tenancy for dockerMulti tenancy for docker
Multi tenancy for docker
Rahul Krishna Upadhyaya
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
Rahul Krishna Upadhyaya
 

Viewers also liked (6)

Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
Openstack Rally - Benchmark as a Service. Openstack Meetup India. Ananth/Rahul.
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Multi tenancy for docker
Multi tenancy for dockerMulti tenancy for docker
Multi tenancy for docker
 
Multi tenancy for docker
Multi tenancy for dockerMulti tenancy for docker
Multi tenancy for docker
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 

Similar to Monitoring Docker Containers and Dockererized Application

Monitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-ApplicationsMonitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-ApplicationsSatya Sanjibani Routray
 
Monitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applicationsMonitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applications
Satya Sanjibani Routray
 
Monitoreo sencillo de la infraestructura, de la ingesta a la visualización
Monitoreo sencillo de la infraestructura, de la ingesta a la visualizaciónMonitoreo sencillo de la infraestructura, de la ingesta a la visualización
Monitoreo sencillo de la infraestructura, de la ingesta a la visualización
Elasticsearch
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updated
Shikha Srivastava
 
O monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insightO monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insight
Elasticsearch
 
Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insightInfrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insight
Elasticsearch
 
unit3 part1.pptx
unit3 part1.pptxunit3 part1.pptx
unit3 part1.pptx
Janpreet Singh
 
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
Elasticsearch
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
SatyajeetGaur3
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
UbaidURRahman78
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
Maurvi04
 
Evaluation of library automation software
Evaluation of library automation softwareEvaluation of library automation software
Evaluation of library automation software
Anil T
 
From Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With KubernetesFrom Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With Kubernetes
Shikha Srivastava
 
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaS
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaSWSO2Con Asia 2014 - Essential Elements of an Enterprise PaaS
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaSWSO2
 
Essential Elements of an Enterprise PaaS
Essential Elements of an Enterprise PaaSEssential Elements of an Enterprise PaaS
Essential Elements of an Enterprise PaaSLakmal Warusawithana
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
NiviV4
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
ahmedsamir339466
 
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
In-Memory Computing Summit
 

Similar to Monitoring Docker Containers and Dockererized Application (20)

Monitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-ApplicationsMonitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-Applications
 
Monitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applicationsMonitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applications
 
Monitoreo sencillo de la infraestructura, de la ingesta a la visualización
Monitoreo sencillo de la infraestructura, de la ingesta a la visualizaciónMonitoreo sencillo de la infraestructura, de la ingesta a la visualización
Monitoreo sencillo de la infraestructura, de la ingesta a la visualización
 
How kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updatedHow kubernetes operators can rescue dev secops in midst of a pandemic updated
How kubernetes operators can rescue dev secops in midst of a pandemic updated
 
O monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insightO monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insight
 
Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insightInfrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insight
 
unit3 part1.pptx
unit3 part1.pptxunit3 part1.pptx
unit3 part1.pptx
 
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
Le monitoring d'infrastructure de l'ingestion aux données : un jeu d'enfants !
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
Evaluation of library automation software
Evaluation of library automation softwareEvaluation of library automation software
Evaluation of library automation software
 
From Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With KubernetesFrom Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With Kubernetes
 
Design patternsforiot
Design patternsforiotDesign patternsforiot
Design patternsforiot
 
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaS
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaSWSO2Con Asia 2014 - Essential Elements of an Enterprise PaaS
WSO2Con Asia 2014 - Essential Elements of an Enterprise PaaS
 
Essential Elements of an Enterprise PaaS
Essential Elements of an Enterprise PaaSEssential Elements of an Enterprise PaaS
Essential Elements of an Enterprise PaaS
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
IMCSummit 2015 - Day 1 Developer Track - In-memory Computing for Iterative CP...
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Monitoring Docker Containers and Dockererized Application

  • 1. Monitoring Docker & Dockerized Applications Anantha Padmanabhan CB (@cbananth) Rahul Krishna Upadhyaya (@rakrup_) Satya Sanjivani Routray (@er_sanj007) Meenakshi Sundaram Lakshmanan (@lxmeenakshi1) Cloud and Network Solutions Cisco Systems Inc.
  • 2. Containers – Introduction • Containers virtualize the OS just like hypervisors virtualizes the hardware • Containers enable any payload to be encapsulated as a lightweight, Portable self- sufficient container, that can be manipulated using standard operations and run consistently on any hardware platform. • Wraps up a piece of software in a complete filesystem that contains everything it needs to run such as : code, runtime, system tools, libraries etc., they share the OS kernel and bins/libs where needed, otherwise each of them operate in a self contained environment.
  • 3. Containers – Introduction • Docker, LXCs are some of the most popular implementations of containers today. • Can be run on any Linux Server - VMs, physical Hosts, openstack.. • Ability to move around between machines without any modification • Ability of containers to work together.
  • 4. Monitoring Containers - Challenges • Traditionally Monitoring brings to mind, Monitoring of the infrastructure – Server, Networks and Monitoring the Apps which run on them. • In the world of containers – monitoring infrastructure alone or Application alone may not be able to provide the full picture. • Complete Monitoring = (App + software defined components/devices + Infra) • Challenges with the monitoring tools are – Vast set of monitoring tools to collect various statistics – Each tool gives different set of attributes in different format – Data collection tools may tend to overload the container itself, making the statistics inaccurate. – Differentiating metrics for containers that are related and share resources – More than everything, lot of computation is required to come up with meaningful inferences from all the data that is collected
  • 5. Monitoring Containers - Challenges • Categorizing container utilization and statistics for multitenant applications is complex • Different applications provide different format of logs • Identifying failure points of applications • Analyzing the interconnectivity between applications in different containers, hosts or regions. • Assessing the response time of application is complicated in a web based cloud application, since there are lot of other parameters (region, internet speed) which could influence response time • Clustered applications might require monitoring all the instances to identify the faulty node
  • 6. Monitoring Containers - Approach • Apps are embedded within the containers which are in turn within a VM or physical host • Containerization requires monitoring at these different levels in order to collect complete statistics • Containers can be linked – ability to monitor and make sense of statistics from linked containers becomes critical. • Ability to intelligently correlate collected data in the context of App  Container  Host relation • Abstraction of monitoring methods and data in order to enable integration with any monitoring tool of choice. • Ability to do proactive, reactive and adaptive monitoring.
  • 7. Monitoring at different levels • Host • Container • Application • Cluster
  • 8. What to Monitor? • Following are the major set of parameters which can be monitored – CPU • total_usage • per_cpu_usage • system_usage • host_usage • load_average etc., – Memory • mem_pgfault • mem_usage • mem_cache • mem_kernel etc.,
  • 9. What to Monitor – Disk • total_bytes • bytes_read • bytes_written • bytes_async • bytes_sync etc., – Network • rxbytes • rxpackets • rxdropped • rxerrors • txbytes • txerrors etc., • Intelligently correlate the collected data that is monitored at different levels mentioned earlier. • Enable queries and filters to make meaningful inferences from the raw data
  • 10. How to Monitor? Monitoring Strategy • Proactive : – Prevent failure situations • Reactive : – Raise events and alerts when failures occur. • Adaptive : – Automatically monitor new components and model statistics What to use when? How? Different levels need different type of monitoring strategy
  • 11. Design Objectives • Not overloading the Docker Daemon. • Different approaches of monitoring at different levels. • Modular & Driver based approach for all possible components • Running multiple agent drivers simultaneously. • Added considerations for Linked/Clustered Containers
  • 12. High Level Component Design Data StorageIQ Agent Engine API (REST) CLIUIRest Client Queue Agent Agent Hos t Hos t Hos t C C C C C C C C C Monitoring Controller
  • 15. Agent • One Agent per host • Agent monitors the host, containers on that host, applications on these containers • Agent send & receive to the engine in a async model using queues. • Driver based log/stats collection can be done for host/application/containers. • Drivers based on tool of choice of user for stats/log collection can be used for each/multiple for hosts/applications/containers. • More than one driver can run in parallel to collect even more diverse params. • Takes care of sanity of data collected to conform to the data-model in the engine.
  • 16. Monitoring controller • REST API to be connected via CLI, UI or any other REST-client • Driver based storage module that uses any columnar database • IQ module that provide intelligent predictions • Engine – Aggregate stats & logs from different Docker Hosts. – Integration with Identity providers (like keystone) for supporting multitenant deployments – Communication from agents via asynchronous queues. – Grouping & Processing of data based on use-cases.
  • 17. IQ Module • Log & stats collected and stored make up a lot of unstructured data. • Meaningful Inferences out of this data would be of better value to the user. • Analytic tools like pandas, scipy planned be used to derive inteferences. • Error predictions, usage/load pattern, capacity planning can be direct output. • Suggestions regarding infra would be output for this module.