SlideShare a Scribd company logo
2 4 / 7 C L O U D M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
Euphoric Thought
Technologies
Eliminating potential breaches by providing visibility
into files, applications and users.
Continually monitoring the cloud to ensure real-time file scans.
Regular auditing and reporting to ensure security standards.
Merging monitoring tools with different cloud providers.
Monitoring cloud data across distributed locations.
Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid
environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes,
devices, logs, events and more.
Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users.
C L O U D M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
C L I E N T O N B O A R D I N G P R O C E S S
R E A D Y . S E T . C O M M U T E !
1) Gather basic
information about
the client
2) Agrees on
SLAs
3) Process Signoff
4) Conduct
Training
5) Setup
communication
channel and
ticketing system
6) Obtain access
for various
systems in place
as agreed upon
7) Setup report
formats for weekly
and monthly and
improve on the
same
Client
Onboarding
Process
T E A M S E T U P
R E A D Y . S E T . C O M M U T E !
Team Setup
a) Proper Video based
training of the current
system, Architecture,
Applications etc.
b) New resource will work
with a Sr team member
closely for 15 days to
understand the process,
tools and culture.
d) Post the completion of
training the resource is
then deployed into the
project.
c) Access to various
tools and documents
to understand the
project.
2 4 / 7 S H I F T M A N A G E M E N T
24/7 structured cloud infra monitoring to manage the cloud
Infrastructure.
Proper shift handover process with a system in place for
documentation, tracking issues, alert management etc.
Various communication channels for the team members to
interact and react quickly for any incidents.
Daily team meetings to present risks, incidents, and
emerging threats.
We help reduce the MTTR by correlating the Data to the
Service.
Policy-driven and automation first approach, with in-depth
observability, exception-based interventions, and
automated / assisted incident handling.
R E A D Y . S E T . C O M M U T E !
C L O U D I N F R A S U P P O R T
Incident Management
Availability Management
Problem Management
Change Management
Service Improvement Plan
- Make sure all the incidents are closed well within defined SLAs
- Identification and availability of all KPIs
- Closure of all problem tickets and RCA
- Process for urgent changes
- Attain stability first and focus on further improvement of
process for cost effective utilization of Resources
R E A D Y . S E T . C O M M U T E !
S E R V I C E L E V E L A G R E E M E N T S
Service Desk
Cloud infrastructure support operations availability.
99.5% service level uptime at any given month.
Service request for change management.
Troubleshooting of Cloud infra related issues.
System Infrastructure health monitoring monitoring of
system parameters (e.g. CPU, memory and hard disk
utilization) according to the system monitoring requirement
by customer.
System performance alerts based on agreed performance
threshold with customer. A typical performance threshold is
70% utilization for warning state and 90% utilization for
critical state.
Highlight performance deviation (as specified by customer).
1.
2. Infrastructure Health Monitoring
R E A D Y . S E T . C O M M U T E !
S E R V I C E L E V E L A G R E E M E N T S ( C T D )
Auto Scaling Configuration rules
Addition of ACL
Whitelisting of IP
Security Group Rules
User Access Management
Changing Instance type
Addition of disk space to Instance
Start/Stop of Instance
Backup of Instance image
Availability group configuration
3. Service Request & Change Management
R E A D Y . S E T . C O M M U T E !
S E V E R I T Y L E V E L S
Services Outage resulting from failure of application, database,
webservers, network devices.
Any failure of one of the multiple application, database, webservers or
network devices that are configured under high availability using
physical redundancy at the same location that does not result in service
outage.
Any other standalone server or network element in scope.
Any Incident of backup activity or Job failure on servers running
business applications, web servers, email, DNS and databases.
Disruption due to Virus Attack.
User ID and access related issues.
Disk Quota related issues
Any incident of backup activity or Job failure on servers running DHCP
etc
Antivirus Update failure
Patch Upgrade*
IMAC changes
UserID Creation and Deletion
Disc Quota Changes
Data backup or restore requests
This activity may have a dependency on successful test of patches in
UAT/test Environment and /or availability of downtime for the activity.
R E A D Y . S E T . C O M M U T E !
Severity Level
S 1 - 1 5 m i n u t e s
S 2 - 3 0 m i n u t e s
S 3 - 4 5 m i n u t e s
S 4 - 6 0 m i n u t e s
Response Time
S2
S1
S3
S4
R E P O R T I N G
Weekly report highlighting top incidents and recurring
incidents with RCA.
Consolidated monthly reports.
Cloud Services based reports. (ELB, RDS, Queue service etc.)
Cloud cost optimization reports etc.
Following are the reports which are prepared and sent to
customers as part of 24/7 cloud monitoring:
R E A D Y . S E T . C O M M U T E !
Value added 24/7 Monitoring
Offering Value added 24/7 Cloud
Monitoring with cloud analytics
Enhanced Implementation
Comprehensive understanding of
the current existing technical
landscape for implementing best
cloud solutions
Disaster Recovery
In event of any disaster we
ensure safety of your data
Quality control and security
We ensure secure storage of Data
with high level of quality control
Cost effective
Monitoring the complete
utilization and help
customers save on their
Infra spend
O U R V A L U E P R O P O S I T I O N
Shift 1
Cloud Infra
Resources
Basic/advanced
analysis of
incident
1 2 4 5
Cloudwatch
Admin
SNS Notification
3
Pager Duty
Incident
Created
Shift 2
Shift 3
Validation of
Incidents
Genuine
Alarm
False
Alarm
Wait/close
ticket
Action/Recommend-
ation with RCA is sent
to the client/
respective teams
A L E R T M A N A G E M E N T
W O R K F L O W
R E S O U R C E M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
Q U E R Y A N A L Y S I S
R E A D Y . S E T . C O M M U T E !
E R R O R A N A L Y S I S
R E A D Y . S E T . C O M M U T E !
MONITORING PPT.pdf

More Related Content

Similar to MONITORING PPT.pdf

Kristen_Montano_Network_IT_resume
Kristen_Montano_Network_IT_resumeKristen_Montano_Network_IT_resume
Kristen_Montano_Network_IT_resumeKristen Montano
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
Cristian Garcia G.
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
WEEK 6 RESPONSES.docx
WEEK 6 RESPONSES.docxWEEK 6 RESPONSES.docx
WEEK 6 RESPONSES.docx
write5
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSECMike Sawall
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
CA Technologies
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
Ali Kafel
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
RapidScale
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
SolarWinds
 
seonkimresume-v3.7
seonkimresume-v3.7seonkimresume-v3.7
seonkimresume-v3.7seon kim
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
shahzad ahmed
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
Fasiul Alam
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
TI Safe
 
Dave Ford Resume
Dave Ford ResumeDave Ford Resume
Dave Ford ResumeDave Ford
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
DellNMS
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
Perydot
 
ToySlaughterRESUMEAugust2015 (1)
ToySlaughterRESUMEAugust2015 (1)ToySlaughterRESUMEAugust2015 (1)
ToySlaughterRESUMEAugust2015 (1)Toy Slaughter
 

Similar to MONITORING PPT.pdf (20)

Kristen_Montano_Network_IT_resume
Kristen_Montano_Network_IT_resumeKristen_Montano_Network_IT_resume
Kristen_Montano_Network_IT_resume
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
WEEK 6 RESPONSES.docx
WEEK 6 RESPONSES.docxWEEK 6 RESPONSES.docx
WEEK 6 RESPONSES.docx
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
seonkimresume-v3.7
seonkimresume-v3.7seonkimresume-v3.7
seonkimresume-v3.7
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Dave Ford Resume
Dave Ford ResumeDave Ford Resume
Dave Ford Resume
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 
ToySlaughterRESUMEAugust2015 (1)
ToySlaughterRESUMEAugust2015 (1)ToySlaughterRESUMEAugust2015 (1)
ToySlaughterRESUMEAugust2015 (1)
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

MONITORING PPT.pdf

  • 1. 2 4 / 7 C L O U D M O N I T O R I N G R E A D Y . S E T . C O M M U T E ! Euphoric Thought Technologies
  • 2. Eliminating potential breaches by providing visibility into files, applications and users. Continually monitoring the cloud to ensure real-time file scans. Regular auditing and reporting to ensure security standards. Merging monitoring tools with different cloud providers. Monitoring cloud data across distributed locations. Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes, devices, logs, events and more. Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users. C L O U D M O N I T O R I N G R E A D Y . S E T . C O M M U T E !
  • 3. C L I E N T O N B O A R D I N G P R O C E S S R E A D Y . S E T . C O M M U T E ! 1) Gather basic information about the client 2) Agrees on SLAs 3) Process Signoff 4) Conduct Training 5) Setup communication channel and ticketing system 6) Obtain access for various systems in place as agreed upon 7) Setup report formats for weekly and monthly and improve on the same Client Onboarding Process
  • 4. T E A M S E T U P R E A D Y . S E T . C O M M U T E ! Team Setup a) Proper Video based training of the current system, Architecture, Applications etc. b) New resource will work with a Sr team member closely for 15 days to understand the process, tools and culture. d) Post the completion of training the resource is then deployed into the project. c) Access to various tools and documents to understand the project.
  • 5. 2 4 / 7 S H I F T M A N A G E M E N T 24/7 structured cloud infra monitoring to manage the cloud Infrastructure. Proper shift handover process with a system in place for documentation, tracking issues, alert management etc. Various communication channels for the team members to interact and react quickly for any incidents. Daily team meetings to present risks, incidents, and emerging threats. We help reduce the MTTR by correlating the Data to the Service. Policy-driven and automation first approach, with in-depth observability, exception-based interventions, and automated / assisted incident handling. R E A D Y . S E T . C O M M U T E !
  • 6. C L O U D I N F R A S U P P O R T Incident Management Availability Management Problem Management Change Management Service Improvement Plan - Make sure all the incidents are closed well within defined SLAs - Identification and availability of all KPIs - Closure of all problem tickets and RCA - Process for urgent changes - Attain stability first and focus on further improvement of process for cost effective utilization of Resources R E A D Y . S E T . C O M M U T E !
  • 7. S E R V I C E L E V E L A G R E E M E N T S Service Desk Cloud infrastructure support operations availability. 99.5% service level uptime at any given month. Service request for change management. Troubleshooting of Cloud infra related issues. System Infrastructure health monitoring monitoring of system parameters (e.g. CPU, memory and hard disk utilization) according to the system monitoring requirement by customer. System performance alerts based on agreed performance threshold with customer. A typical performance threshold is 70% utilization for warning state and 90% utilization for critical state. Highlight performance deviation (as specified by customer). 1. 2. Infrastructure Health Monitoring R E A D Y . S E T . C O M M U T E !
  • 8. S E R V I C E L E V E L A G R E E M E N T S ( C T D ) Auto Scaling Configuration rules Addition of ACL Whitelisting of IP Security Group Rules User Access Management Changing Instance type Addition of disk space to Instance Start/Stop of Instance Backup of Instance image Availability group configuration 3. Service Request & Change Management R E A D Y . S E T . C O M M U T E !
  • 9. S E V E R I T Y L E V E L S Services Outage resulting from failure of application, database, webservers, network devices. Any failure of one of the multiple application, database, webservers or network devices that are configured under high availability using physical redundancy at the same location that does not result in service outage. Any other standalone server or network element in scope. Any Incident of backup activity or Job failure on servers running business applications, web servers, email, DNS and databases. Disruption due to Virus Attack. User ID and access related issues. Disk Quota related issues Any incident of backup activity or Job failure on servers running DHCP etc Antivirus Update failure Patch Upgrade* IMAC changes UserID Creation and Deletion Disc Quota Changes Data backup or restore requests This activity may have a dependency on successful test of patches in UAT/test Environment and /or availability of downtime for the activity. R E A D Y . S E T . C O M M U T E ! Severity Level S 1 - 1 5 m i n u t e s S 2 - 3 0 m i n u t e s S 3 - 4 5 m i n u t e s S 4 - 6 0 m i n u t e s Response Time S2 S1 S3 S4
  • 10. R E P O R T I N G Weekly report highlighting top incidents and recurring incidents with RCA. Consolidated monthly reports. Cloud Services based reports. (ELB, RDS, Queue service etc.) Cloud cost optimization reports etc. Following are the reports which are prepared and sent to customers as part of 24/7 cloud monitoring: R E A D Y . S E T . C O M M U T E !
  • 11. Value added 24/7 Monitoring Offering Value added 24/7 Cloud Monitoring with cloud analytics Enhanced Implementation Comprehensive understanding of the current existing technical landscape for implementing best cloud solutions Disaster Recovery In event of any disaster we ensure safety of your data Quality control and security We ensure secure storage of Data with high level of quality control Cost effective Monitoring the complete utilization and help customers save on their Infra spend O U R V A L U E P R O P O S I T I O N
  • 12. Shift 1 Cloud Infra Resources Basic/advanced analysis of incident 1 2 4 5 Cloudwatch Admin SNS Notification 3 Pager Duty Incident Created Shift 2 Shift 3 Validation of Incidents Genuine Alarm False Alarm Wait/close ticket Action/Recommend- ation with RCA is sent to the client/ respective teams A L E R T M A N A G E M E N T W O R K F L O W
  • 13. R E S O U R C E M O N I T O R I N G R E A D Y . S E T . C O M M U T E !
  • 14. Q U E R Y A N A L Y S I S R E A D Y . S E T . C O M M U T E !
  • 15. E R R O R A N A L Y S I S R E A D Y . S E T . C O M M U T E !