Intuit Confidential and Proprietary1
Envisioning Your Monitoring Strategy
Aveek Misra, Architect, Intuit
20-Jan-2016
Intuit Confidential and Proprietary2
• What are some of the notable changes in the application
landscape today and how they impact monitoring of applications
• Why Mobile Monitoring is so important
• Different aspects of monitoring in an enterprise
• How have the monitoring solutions evolved and some of the
advanced techniques that are used today
Agenda
Intuit Confidential and Proprietary3
Monitoring Microservices
The term “Microservice Architecture” has sprung up over the last few
years to describe a particular way of designing software applications as
suites of independent deployable services
-Martin Fowler
Intuit Confidential and Proprietary4
How Complex Can a Microservice Architecture Get?
Loosely coupled service oriented architecture with bounded contexts
- Adrian Cockcroft
@Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
Intuit Confidential and Proprietary5
Cloud vs Data Center
Intuit Confidential and Proprietary6
Monitoring Asynchronous interactions
Asynchronous programming refers to a style of structuring a program
whereby a call to some unit of functionality triggers an action that is
allowed to continue outside of the ongoing flow of the program
-Rod Vagg in Nodesource Blog
@Image Courtesy - Presentation from Randy Bias in the DevOps Chicago Meetup
Intuit Confidential and Proprietary7
Monitoring failures in fault tolerant systems
• In his excellent book “Release It”, Michael Nygard talks about the Circuit
Breaker pattern as a means to prevent cascading failure.
• Hystrix, an open source framework from Netflix deals with latency and
fault tolerance for distributed systems. It includes an implementation of
Circuit Breaker pattern
@Image Courtesy – www.github.com/Netflix/Hystrix/wiki/How-it-Works
Intuit Confidential and Proprietary8
Continuous Deployment at Scale
@Image Courtesy – “How We Learned to Stop Worrying and Start Deploying the Netflix API Service” at Qcon
2015
• Companies like Netflix, Amazon, Google, LinkedIn, Etsy etc. deploy code
hundreds to thousands of times per day!!
Intuit Confidential and Proprietary9
Monitoring Induced Failures
@Image Courtesy – AWS re:Invent presentation by Josh Evans, Netflix
Intuit Confidential and Proprietary10
Monitoring Should be More Available Than Your
Systems!
@Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
Intuit Confidential and Proprietary11
Why Mobile Monitoring is so Important
• The Pew Research Center reports that 92 percent of U.S. adults have a
cellphone of some kind
• Deloitte expects digital interactions to influence 64 cents of every dollar
spent in retail stores by the end of 2015
• Users have low tolerance for buggy apps – Only 16% will try a failing app
more than twice
Intuit Confidential and Proprietary12
Monitoring Business Transactions
@Image Courtesy – www.appdynamics.com
• Monitoring the actual user transactions is far more impactful than just
monitoring the low level application and infrastructure metrics
• Business transaction metrics provide the much needed context for the
other metrics
Intuit Confidential and Proprietary13
End User Experience Monitoring
@Image Courtesy – www.newrelic.com
Intuit Confidential and Proprietary14
Why Synthetic Monitoring is Also Important
@Image Courtesy – www.rigor.com/blog/2014/12/benefits-using-rum-w-
synthetic
Intuit Confidential and Proprietary15
Mobile Crash Reporting
@Image Courtesy – www.crittercism.com
Intuit Confidential and Proprietary16
Techniques - Byte Code Instrumentation at Runtime
Intuit Confidential and Proprietary17
Techniques - Runtime instrumentation using Trampolining
Intuit Confidential and Proprietary18
Techniques - Using Lambda Architecture for Query
Optimization
@Image Courtesy – www.voltdb.com
Intuit Confidential and Proprietary19
Techniques - Anomaly Detection using Baselines
@Image Courtesy – www.datadog.com
Intuit Confidential and Proprietary20
Custom Analytics
@Image Courtesy – www.newrelic.com
Intuit Confidential and Proprietary21
Advanced Incident Correlation
@Image Courtesy – www.moogsoft.com
Intuit Confidential and Proprietary22
Thank You

Envisioning your Monitoring Strategy

  • 1.
    Intuit Confidential andProprietary1 Envisioning Your Monitoring Strategy Aveek Misra, Architect, Intuit 20-Jan-2016
  • 2.
    Intuit Confidential andProprietary2 • What are some of the notable changes in the application landscape today and how they impact monitoring of applications • Why Mobile Monitoring is so important • Different aspects of monitoring in an enterprise • How have the monitoring solutions evolved and some of the advanced techniques that are used today Agenda
  • 3.
    Intuit Confidential andProprietary3 Monitoring Microservices The term “Microservice Architecture” has sprung up over the last few years to describe a particular way of designing software applications as suites of independent deployable services -Martin Fowler
  • 4.
    Intuit Confidential andProprietary4 How Complex Can a Microservice Architecture Get? Loosely coupled service oriented architecture with bounded contexts - Adrian Cockcroft @Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
  • 5.
    Intuit Confidential andProprietary5 Cloud vs Data Center
  • 6.
    Intuit Confidential andProprietary6 Monitoring Asynchronous interactions Asynchronous programming refers to a style of structuring a program whereby a call to some unit of functionality triggers an action that is allowed to continue outside of the ongoing flow of the program -Rod Vagg in Nodesource Blog @Image Courtesy - Presentation from Randy Bias in the DevOps Chicago Meetup
  • 7.
    Intuit Confidential andProprietary7 Monitoring failures in fault tolerant systems • In his excellent book “Release It”, Michael Nygard talks about the Circuit Breaker pattern as a means to prevent cascading failure. • Hystrix, an open source framework from Netflix deals with latency and fault tolerance for distributed systems. It includes an implementation of Circuit Breaker pattern @Image Courtesy – www.github.com/Netflix/Hystrix/wiki/How-it-Works
  • 8.
    Intuit Confidential andProprietary8 Continuous Deployment at Scale @Image Courtesy – “How We Learned to Stop Worrying and Start Deploying the Netflix API Service” at Qcon 2015 • Companies like Netflix, Amazon, Google, LinkedIn, Etsy etc. deploy code hundreds to thousands of times per day!!
  • 9.
    Intuit Confidential andProprietary9 Monitoring Induced Failures @Image Courtesy – AWS re:Invent presentation by Josh Evans, Netflix
  • 10.
    Intuit Confidential andProprietary10 Monitoring Should be More Available Than Your Systems! @Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
  • 11.
    Intuit Confidential andProprietary11 Why Mobile Monitoring is so Important • The Pew Research Center reports that 92 percent of U.S. adults have a cellphone of some kind • Deloitte expects digital interactions to influence 64 cents of every dollar spent in retail stores by the end of 2015 • Users have low tolerance for buggy apps – Only 16% will try a failing app more than twice
  • 12.
    Intuit Confidential andProprietary12 Monitoring Business Transactions @Image Courtesy – www.appdynamics.com • Monitoring the actual user transactions is far more impactful than just monitoring the low level application and infrastructure metrics • Business transaction metrics provide the much needed context for the other metrics
  • 13.
    Intuit Confidential andProprietary13 End User Experience Monitoring @Image Courtesy – www.newrelic.com
  • 14.
    Intuit Confidential andProprietary14 Why Synthetic Monitoring is Also Important @Image Courtesy – www.rigor.com/blog/2014/12/benefits-using-rum-w- synthetic
  • 15.
    Intuit Confidential andProprietary15 Mobile Crash Reporting @Image Courtesy – www.crittercism.com
  • 16.
    Intuit Confidential andProprietary16 Techniques - Byte Code Instrumentation at Runtime
  • 17.
    Intuit Confidential andProprietary17 Techniques - Runtime instrumentation using Trampolining
  • 18.
    Intuit Confidential andProprietary18 Techniques - Using Lambda Architecture for Query Optimization @Image Courtesy – www.voltdb.com
  • 19.
    Intuit Confidential andProprietary19 Techniques - Anomaly Detection using Baselines @Image Courtesy – www.datadog.com
  • 20.
    Intuit Confidential andProprietary20 Custom Analytics @Image Courtesy – www.newrelic.com
  • 21.
    Intuit Confidential andProprietary21 Advanced Incident Correlation @Image Courtesy – www.moogsoft.com
  • 22.
    Intuit Confidential andProprietary22 Thank You