SlideShare a Scribd company logo
1 of 11
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Cloud Monitoring
Soumitra Bhattacharyya
Director Engineering, Akamai Technologies
www.linkedin.com/in/soumitra001
Video Over CellularAn Essential for any Platform Service
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Myths and Mistakes migrating to cloud
- Cloud providers are impenetrable
Anti-thesis to Cloud adoption
- Not having a process and crisis plan
- Focus on technology and less on business need
- Relying on Provider’s dashboard, tools and utilities
Mistakes to Cloud adoption
- Cloud infrastructure is infallible
- All performance problems will be addressed once we move to cloud
- Capacity of cloud providers is infinite and scalability is managed by itself
- Guaranteed SLA from provider
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Monitoring Workflow
Monitor
Impact
Bucket
Mitigation
RCA
Safety
Policies/Proc
edures
Cycle of Safety
Health Monitoring
- Monitoring is process and not a
standalone activity
- Involves Tiered escalation
- Latency of detection and Timeliness of
mitigation is the key
- Learn from every event and incorporate
in policies (e.g. Moratoriums)
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
“ Monitoring should be followed through mitigation actions”
Monitoring WorkFlow – Incident Management
What constitutes a Incident :
- Outage Impacting availability and disruption
- Performance degradation impacting users
- Problem interfering with service administration
Ownership, Responsibility and LifeCycle
- Component owner (SME)
- Business owner
- Incident coordination
- Severity of incident
- Phases of incident
- Resolution time
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
• Infrastructure
• Application
• Business Process (SLA)
Depending on your Business and Control one or
more of the following is priority
Identifying what to monitor should begin early in the lifecycle
• Starts during Product/System Architecture
• Product architect /Performance Org defines what should be monitored
• Component owners know and write the mitigation steps
Monitoring Considerations
Monitoring Decisions :
• Reactive Vs Proactive
• Real Time Vs Non –Realtime
• Snapshot Vs Trend
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Infrastructure
Software Services
Business
Process/SLA
• Hardware – Physical health of servers (CPU, Memory, Disk)
• Data Centre – Group of machines , Regions
• Network – Bandwidth , Devices , Connection, Performance
• Virtualization – Hosts , No of VMs per machine
• Network Storage – Capacity, Disk wear, volume,
• Rolling of service
• DB performance, Queues
• Data transfer , file size , volume , data backlog
• Network utilization (Capacity and Cost)
• HTTP errors , Application errors
• Traffic volume, periodic security scans
• Domain specific Monitoring :
• Web , Security , Media
What to Monitor
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Monitoring Architecture
• Detection of alerting conditions
Monitoring Interfaces :
• Telemetry data publishing
• Data collection and transport
• Data analysis through visualization
Quality goals of Monitoring data :
• Synchronization
• Completeness
• Latency
• Consistency
• Identification of correct metrics to
publish
Component owners goals :
• Condition for Alerting
• Data sampling, aggregation
interval etc.
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.Challenges :
- Multiple dashboards and alerting mechanism
- Cannot monitor business SLA’s
- Each component is monitored in isolation
- Limitation of individual tools
- Not free
Adoption of Cloud Platform Monitoring Tools
1. Amazon Cloud Watch
2. Microsoft Cloud Monitoring
3. App Dynamics
4. DataDog
5. Sumo Logic
6. Promethius
7. Telegraf
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Public Cloud Monitoring Tools (Integration)
Approach
 Identify sources and create plugins to collect data.
 Single dashboard for all trends and alerts
 Collect data in own defined format and send it to own monitoring/Alerting system
System
Resources
(CPU/RAM/M
emory)
Database
NGINX
:
:
:
TELEGRAF INFLUX-DB
GRAFANA/
CHRONOGRAF
Collects time series data
From variety of sources
Visualisation and Graphs
Time/Series data
Other
sources like
Azure
Monitor
Aggregat
or
REST API Monitoring/Alerting
system
Data Sources
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Challenges and Evolution
Challenges
• Monitoring and identifying problem areas
is an evolving process
• Correlatingissue seen and cause is complex
• Identification of Automatable steps for mitigation
• False positives and triggers – Hierarchical view
• Deploying fix in complex environment (Phased)
• Start with few servers and has evolved from single
script to scalable process
• Engineers working on trends and carrying out
predictive analysis for early mitigation
Evolution
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Thank You
Email : soumitra001@hotmail.com

More Related Content

What's hot

IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
Fernando M. Imperiale
 

What's hot (20)

Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
IBM QRadar BB & Rules
IBM QRadar BB & RulesIBM QRadar BB & Rules
IBM QRadar BB & Rules
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault management
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
SIEM
SIEMSIEM
SIEM
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 

Similar to Cloud monitoring - An essential Platform Service

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 

Similar to Cloud monitoring - An essential Platform Service (20)

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overview
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 

Recently uploaded (20)

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsx
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
 

Cloud monitoring - An essential Platform Service

  • 1. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Cloud Monitoring Soumitra Bhattacharyya Director Engineering, Akamai Technologies www.linkedin.com/in/soumitra001 Video Over CellularAn Essential for any Platform Service
  • 2. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Myths and Mistakes migrating to cloud - Cloud providers are impenetrable Anti-thesis to Cloud adoption - Not having a process and crisis plan - Focus on technology and less on business need - Relying on Provider’s dashboard, tools and utilities Mistakes to Cloud adoption - Cloud infrastructure is infallible - All performance problems will be addressed once we move to cloud - Capacity of cloud providers is infinite and scalability is managed by itself - Guaranteed SLA from provider
  • 3. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Monitoring Workflow Monitor Impact Bucket Mitigation RCA Safety Policies/Proc edures Cycle of Safety Health Monitoring - Monitoring is process and not a standalone activity - Involves Tiered escalation - Latency of detection and Timeliness of mitigation is the key - Learn from every event and incorporate in policies (e.g. Moratoriums)
  • 4. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. “ Monitoring should be followed through mitigation actions” Monitoring WorkFlow – Incident Management What constitutes a Incident : - Outage Impacting availability and disruption - Performance degradation impacting users - Problem interfering with service administration Ownership, Responsibility and LifeCycle - Component owner (SME) - Business owner - Incident coordination - Severity of incident - Phases of incident - Resolution time
  • 5. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. • Infrastructure • Application • Business Process (SLA) Depending on your Business and Control one or more of the following is priority Identifying what to monitor should begin early in the lifecycle • Starts during Product/System Architecture • Product architect /Performance Org defines what should be monitored • Component owners know and write the mitigation steps Monitoring Considerations Monitoring Decisions : • Reactive Vs Proactive • Real Time Vs Non –Realtime • Snapshot Vs Trend
  • 6. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Infrastructure Software Services Business Process/SLA • Hardware – Physical health of servers (CPU, Memory, Disk) • Data Centre – Group of machines , Regions • Network – Bandwidth , Devices , Connection, Performance • Virtualization – Hosts , No of VMs per machine • Network Storage – Capacity, Disk wear, volume, • Rolling of service • DB performance, Queues • Data transfer , file size , volume , data backlog • Network utilization (Capacity and Cost) • HTTP errors , Application errors • Traffic volume, periodic security scans • Domain specific Monitoring : • Web , Security , Media What to Monitor
  • 7. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Monitoring Architecture • Detection of alerting conditions Monitoring Interfaces : • Telemetry data publishing • Data collection and transport • Data analysis through visualization Quality goals of Monitoring data : • Synchronization • Completeness • Latency • Consistency • Identification of correct metrics to publish Component owners goals : • Condition for Alerting • Data sampling, aggregation interval etc.
  • 8. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.Challenges : - Multiple dashboards and alerting mechanism - Cannot monitor business SLA’s - Each component is monitored in isolation - Limitation of individual tools - Not free Adoption of Cloud Platform Monitoring Tools 1. Amazon Cloud Watch 2. Microsoft Cloud Monitoring 3. App Dynamics 4. DataDog 5. Sumo Logic 6. Promethius 7. Telegraf
  • 9. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Public Cloud Monitoring Tools (Integration) Approach  Identify sources and create plugins to collect data.  Single dashboard for all trends and alerts  Collect data in own defined format and send it to own monitoring/Alerting system System Resources (CPU/RAM/M emory) Database NGINX : : : TELEGRAF INFLUX-DB GRAFANA/ CHRONOGRAF Collects time series data From variety of sources Visualisation and Graphs Time/Series data Other sources like Azure Monitor Aggregat or REST API Monitoring/Alerting system Data Sources
  • 10. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Challenges and Evolution Challenges • Monitoring and identifying problem areas is an evolving process • Correlatingissue seen and cause is complex • Identification of Automatable steps for mitigation • False positives and triggers – Hierarchical view • Deploying fix in complex environment (Phased) • Start with few servers and has evolved from single script to scalable process • Engineers working on trends and carrying out predictive analysis for early mitigation Evolution
  • 11. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Thank You Email : soumitra001@hotmail.com

Editor's Notes

  1. Read and get some inputs from Service incident
  2. Website monitoring: Tracking the processes, traffic, availability and resource utilization of cloud-hosted websites Virtual machine monitoring: Monitoring the virtualization infrastructure and individual virtual machines Database monitoring: Monitoring processes, queries, availability, and consumption of cloud database resources Virtual network monitoring: Monitoring virtual network resources, devices, connections, and performance Cloud storage monitoring: Monitoring storage resources and their processes provisioned to virtual machines, services, databases, and applications
  3. https://docs.google.com/spreadsheets/d/1QJy0dNeAvKqI4Z5WpN5PDHi17WDuiczuCGkfuxQ_ZqQ/edit#gid=1486764721 https://collaborate.akamai.com/confluence/display/MediaAnalytics/BOCC+Alert+Scenarios Website monitoring: Tracking the processes, traffic, availability and resource utilization of cloud-hosted websites Virtual machine monitoring: Monitoring the virtualization infrastructure and individual virtual machines Database monitoring: Monitoring processes, queries, availability, and consumption of cloud database resources Virtual network monitoring: Monitoring virtual network resources, devices, connections, and performance Cloud storage monitoring: Monitoring storage resources and their processes provisioned to virtual machines, services, databases, and applications Write each one of them well
  4. https://phoenixnap.com/blog/cloud-monitoring-tools Telegraf is the open source server agent to help you collect metrics from your stacks, sensors and systems.
  5. Corelating issue seen and problem in software/infrastructure