SlideShare uma empresa Scribd logo
1 de 25
Information presented is confidential
Container-native monitoring:
Kubernetes Edition
Apurva Davé, Sysdig Specialist
Information presented is confidentialInformation presented is confidential
Information presented is confidentialInformation presented is confidential
Information presented is confidentialInformation presented is confidential
Information presented is confidentialInformation presented is confidential
Monitoring containers is different
Microservices and containers break
legacy monitoring and analytics tools
Sysdig is the first and only solution that can
natively monitor any infrastructure and app,
including container-based ones
Information presented is confidentialInformation presented is confidential
Monitoring containers is different
Legacy monitoring approaches cannot
see inside containers
Running monitoring agents inside
containers is not a viable solution
Yesterday’s monitoring tools don’t
understand microservices
architectures & container orchestration
Information presented is confidentialInformation presented is confidential
Host OS
Container orchestration & tooling
Network & infrastructure
Container
Core
App
Sysdig ContainerVision
Unique system instrumentation
Container Container
Infr.
App
Information presented is confidentialInformation presented is confidential
Sysdig ContainerVision
Kernel
Docker
Container
1
Container
2
Container
3
App App
rkt LXC
Information presented is confidentialInformation presented is confidential
Kernel
Sysdig ContainerVision
Docker
Container
1
Container
2
Container
3
App App
rkt LXC
Kernel module
Instrumentation
Information presented is confidentialInformation presented is confidential
Sysdig ContainerVision
Kernel
Docker
Container
1
Container
2
Container
3
App App
rkt LXC
Sysdig
Docker
collection &
analysis
Information presented is confidentialInformation presented is confidential
New instrumentation = Better visibility
Infrastructure based
monitoring & alerting
Typical infrastructure
monitoring products
Information presented is confidentialInformation presented is confidential
New instrumentation = Better visibility
Application- intelligent
Monitoring & alerting
Trace-driven troubleshooting
Service-oriented
performance management
Information presented is confidentialInformation presented is confidential
Service-oriented
performance management
Monitor applications & logical services (not hosts!)
Service 1 Service 2 Service 3
Computing node
Computing node Computing node
Computing node Computing node
Computing node
Information presented is confidentialInformation presented is confidential
Service-oriented
performance management
Monitor applications & logical services (not hosts!)
Service 1 Service 2 Service 3
What’s the response time of my Cassandra service that’s currently
distributed over three data centers? What are the slowest queries?”
“
Information presented is confidentialInformation presented is confidential
Service-oriented
performance management
Deep, real-time understanding of orchestration metadata
Information presented is confidentialInformation presented is confidential
Kubernetes Integration
1. How are my servers running
kubernetes master/minions doing?
2. Graph kubernetes-specific metrics
from the API
3. (The dream) monitor your services
deployed with kubernetes
a) Use kubernetes API metadata to aggregate
data across replication controllers, pods
b) See inside containers to track application
performance… aggregate information from
inside all relevant containers
Back to integrations slide
Information presented is confidentialInformation presented is confidential
How Sysdig-Kubernetes
integration works
master
1. Sysdig monitoring each container & app
2. Sysdig agent on master auto-discovers and polls
API
3. Metadata collected every few seconds
4. Now Sysdig Cloud can dynamically aggregate
metrics across namespaces, replication controllers,
pods or any labels
workers
Information presented is confidentialInformation presented is confidential
Application Intelligent
Monitoring & Alerting
Automatic Discovery
App discovery without plug-ins
Templates
Pre-built templates by application & service
Zero-config custom metrics
StatsD & JMX – no agents inside containers
Anomaly detection
Outlier & deviation based comparisons
Developers spun up a new service based on apache and mongo last night without letting
us know. We deployed sysdig, so we still see it all, without any config.”
“
Information presented is confidentialInformation presented is confidential
v
Application Intelligent
Monitoring & Alerting
We automatically discover your apps
Thousands of relevant metrics without a single plug-in or YAML config
Information presented is confidentialInformation presented is confidential
Trace-driven troubleshooting
“
Dashboards
Correlate
events
Trace file with
every system call
System Call
PID CPU USER TH VIRT RES FILE NET
303 1.5 root 3 280K 57K 0 236.00
35 0.5 root 5 37K 0 2K 0.00
Replay the state of my system
last night, when the Auth
service alerts fired, 5 minutes
before our app went down.
Show all the system calls from
the containers we destroyed.”
Information presented is confidentialInformation presented is confidential
Demo
Information presented is confidentialInformation presented is confidential
What we’re going to show you
Small environment, with & without orchestration
1. How to deploy a sysdig agent
(yes, we will actually show you instrumentation!)
2. Service-oriented performance metrics and analytics
3. A deep troubleshooting example
4. Basic monitoring – creating a dashboard, set an alert
Information presented is confidentialInformation presented is confidential
Product Offerings
Sysdig Cloud
Sysdig On-Premise
Sysdig Open Source
– Hosted offering
– $20/mo/host – discounted for large server volume
– Monthly or annual
– Run the Sysdig backend in your private cloud or AWS domain
– Annual only
– Minimum commitment required
– CLI-based troubleshooting tool
– Used on a single host
– Community support
Information presented is confidentialInformation presented is confidential
Summary
Deep
container
visibility
Service oriented
performance
management
Application intelligent
monitoring & alerting
Trace driven
troubleshooting
Start a free trial today
and see Sysdig running in your own environment!
Information presented is confidentialInformation presented is confidential
Thanks (that’s the end)

Mais conteúdo relacionado

Mais procurados

Building Kinect applications _Application Fundamentals
Building Kinect applications _Application FundamentalsBuilding Kinect applications _Application Fundamentals
Building Kinect applications _Application FundamentalsAmal Hichri
 
Building Kinect applications course _Getting Started
Building Kinect applications course _Getting StartedBuilding Kinect applications course _Getting Started
Building Kinect applications course _Getting StartedAmal Hichri
 
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...Sai Chaitanya
 
Considerations for East-West Traffic Security and Analytics for Kubernetes En...
Considerations for East-West Traffic Security and Analytics for Kubernetes En...Considerations for East-West Traffic Security and Analytics for Kubernetes En...
Considerations for East-West Traffic Security and Analytics for Kubernetes En...Akshay Mathur
 
Enhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsEnhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsAkshay Mathur
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesPriyanka Aash
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesKeerthi Reddy Yeruva
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Priyanka Aash
 
Whitepaper automating kuberneteswithgitops 1
Whitepaper automating kuberneteswithgitops 1Whitepaper automating kuberneteswithgitops 1
Whitepaper automating kuberneteswithgitops 1Kenneth Nnadikwe
 
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)Codit
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...Oto Brglez
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponsePriyanka Aash
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance MonitoringcPacket Networks
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster CompanyPriyanka Aash
 
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...Nagios
 

Mais procurados (20)

Building Kinect applications _Application Fundamentals
Building Kinect applications _Application FundamentalsBuilding Kinect applications _Application Fundamentals
Building Kinect applications _Application Fundamentals
 
Building Kinect applications course _Getting Started
Building Kinect applications course _Getting StartedBuilding Kinect applications course _Getting Started
Building Kinect applications course _Getting Started
 
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...
One-Stop Container Networking: Cloud Foundry, Kubernetes, Docker, and More [C...
 
Considerations for East-West Traffic Security and Analytics for Kubernetes En...
Considerations for East-West Traffic Security and Analytics for Kubernetes En...Considerations for East-West Traffic Security and Analytics for Kubernetes En...
Considerations for East-West Traffic Security and Analytics for Kubernetes En...
 
Enhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsEnhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices Applications
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security Headaches
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queries
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Whitepaper automating kuberneteswithgitops 1
Whitepaper automating kuberneteswithgitops 1Whitepaper automating kuberneteswithgitops 1
Whitepaper automating kuberneteswithgitops 1
 
DBOps
DBOpsDBOps
DBOps
 
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)
Microsoft Azure IoT Hub (Sam Vanhoutte @TechdaysNL 2017)
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...
 
cPacket's cStor
cPacket's cStor cPacket's cStor
cPacket's cStor
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...
Nagios Conference 2012 - Nicolas Brousse - Optimizing your Monitoring and Tre...
 
Azure iot
Azure iotAzure iot
Azure iot
 
cPacket's cBurst
cPacket's cBurstcPacket's cBurst
cPacket's cBurst
 

Semelhante a Big Brother: Kubernetes Edition

How to Monitor Microservices
How to Monitor MicroservicesHow to Monitor Microservices
How to Monitor MicroservicesSysdig
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarCanturk Isci
 
Kubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best PracticesKubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best PracticesAjeet Singh Raina
 
You're monitoring Kubernetes Wrong
You're monitoring Kubernetes WrongYou're monitoring Kubernetes Wrong
You're monitoring Kubernetes WrongSysdig
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformAshnikbiz
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenetAboo Thahir
 
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scale
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scaleMonitoring microservices: Docker, Mesos and Kubernetes visibility at scale
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scaleAlessandro Gallotta
 
Splunk for vmware virtualization customer presentation
Splunk for vmware virtualization customer presentationSplunk for vmware virtualization customer presentation
Splunk for vmware virtualization customer presentationGreg Hanchin
 
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with KubernetesSumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with KubernetesSumo Logic
 
OSMC 2022 | Current State of icinga by Bernd Erk
OSMC 2022 | Current State of icinga by Bernd ErkOSMC 2022 | Current State of icinga by Bernd Erk
OSMC 2022 | Current State of icinga by Bernd ErkNETWAYS
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Hassan EL ALLOUSSI
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxGrace Jansen
 
Cloud-native .NET-Microservices mit Kubernetes @BASTAcon
Cloud-native .NET-Microservices mit Kubernetes @BASTAconCloud-native .NET-Microservices mit Kubernetes @BASTAcon
Cloud-native .NET-Microservices mit Kubernetes @BASTAconMario-Leander Reimer
 
Cilium: Seattle Kubernetes MeetUp Dec 2017
Cilium: Seattle Kubernetes MeetUp Dec 2017Cilium: Seattle Kubernetes MeetUp Dec 2017
Cilium: Seattle Kubernetes MeetUp Dec 2017Cynthia Thomas
 
Behind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessBehind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessMaxim Gaponov
 
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...Ajeet Singh Raina
 
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...Tony Erwin
 
The Art of Container Monitoring
The Art of Container MonitoringThe Art of Container Monitoring
The Art of Container MonitoringDerek Chen
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructureFernando Lopez Aguilar
 

Semelhante a Big Brother: Kubernetes Edition (20)

How to Monitor Microservices
How to Monitor MicroservicesHow to Monitor Microservices
How to Monitor Microservices
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU Seminar
 
Kubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best PracticesKubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best Practices
 
You're monitoring Kubernetes Wrong
You're monitoring Kubernetes WrongYou're monitoring Kubernetes Wrong
You're monitoring Kubernetes Wrong
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scale
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scaleMonitoring microservices: Docker, Mesos and Kubernetes visibility at scale
Monitoring microservices: Docker, Mesos and Kubernetes visibility at scale
 
Splunk for vmware virtualization customer presentation
Splunk for vmware virtualization customer presentationSplunk for vmware virtualization customer presentation
Splunk for vmware virtualization customer presentation
 
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with KubernetesSumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
 
OSMC 2022 | Current State of icinga by Bernd Erk
OSMC 2022 | Current State of icinga by Bernd ErkOSMC 2022 | Current State of icinga by Bernd Erk
OSMC 2022 | Current State of icinga by Bernd Erk
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 
ThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptxThroughTheLookingGlass_EffectiveObservability.pptx
ThroughTheLookingGlass_EffectiveObservability.pptx
 
Cloud-native .NET-Microservices mit Kubernetes @BASTAcon
Cloud-native .NET-Microservices mit Kubernetes @BASTAconCloud-native .NET-Microservices mit Kubernetes @BASTAcon
Cloud-native .NET-Microservices mit Kubernetes @BASTAcon
 
Cilium: Seattle Kubernetes MeetUp Dec 2017
Cilium: Seattle Kubernetes MeetUp Dec 2017Cilium: Seattle Kubernetes MeetUp Dec 2017
Cilium: Seattle Kubernetes MeetUp Dec 2017
 
Behind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessBehind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by Exness
 
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...
Collabnix Online Webinar: Integrated Log Analytics & Monitoring using Docker ...
 
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...
Monitoring Node.js Microservices on CloudFoundry with Open Source Tools and a...
 
The Art of Container Monitoring
The Art of Container MonitoringThe Art of Container Monitoring
The Art of Container Monitoring
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructure
 

Último

Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 

Último (20)

Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 

Big Brother: Kubernetes Edition

  • 1. Information presented is confidential Container-native monitoring: Kubernetes Edition Apurva Davé, Sysdig Specialist
  • 2. Information presented is confidentialInformation presented is confidential
  • 3. Information presented is confidentialInformation presented is confidential
  • 4. Information presented is confidentialInformation presented is confidential
  • 5. Information presented is confidentialInformation presented is confidential Monitoring containers is different Microservices and containers break legacy monitoring and analytics tools Sysdig is the first and only solution that can natively monitor any infrastructure and app, including container-based ones
  • 6. Information presented is confidentialInformation presented is confidential Monitoring containers is different Legacy monitoring approaches cannot see inside containers Running monitoring agents inside containers is not a viable solution Yesterday’s monitoring tools don’t understand microservices architectures & container orchestration
  • 7. Information presented is confidentialInformation presented is confidential Host OS Container orchestration & tooling Network & infrastructure Container Core App Sysdig ContainerVision Unique system instrumentation Container Container Infr. App
  • 8. Information presented is confidentialInformation presented is confidential Sysdig ContainerVision Kernel Docker Container 1 Container 2 Container 3 App App rkt LXC
  • 9. Information presented is confidentialInformation presented is confidential Kernel Sysdig ContainerVision Docker Container 1 Container 2 Container 3 App App rkt LXC Kernel module Instrumentation
  • 10. Information presented is confidentialInformation presented is confidential Sysdig ContainerVision Kernel Docker Container 1 Container 2 Container 3 App App rkt LXC Sysdig Docker collection & analysis
  • 11. Information presented is confidentialInformation presented is confidential New instrumentation = Better visibility Infrastructure based monitoring & alerting Typical infrastructure monitoring products
  • 12. Information presented is confidentialInformation presented is confidential New instrumentation = Better visibility Application- intelligent Monitoring & alerting Trace-driven troubleshooting Service-oriented performance management
  • 13. Information presented is confidentialInformation presented is confidential Service-oriented performance management Monitor applications & logical services (not hosts!) Service 1 Service 2 Service 3 Computing node Computing node Computing node Computing node Computing node Computing node
  • 14. Information presented is confidentialInformation presented is confidential Service-oriented performance management Monitor applications & logical services (not hosts!) Service 1 Service 2 Service 3 What’s the response time of my Cassandra service that’s currently distributed over three data centers? What are the slowest queries?” “
  • 15. Information presented is confidentialInformation presented is confidential Service-oriented performance management Deep, real-time understanding of orchestration metadata
  • 16. Information presented is confidentialInformation presented is confidential Kubernetes Integration 1. How are my servers running kubernetes master/minions doing? 2. Graph kubernetes-specific metrics from the API 3. (The dream) monitor your services deployed with kubernetes a) Use kubernetes API metadata to aggregate data across replication controllers, pods b) See inside containers to track application performance… aggregate information from inside all relevant containers Back to integrations slide
  • 17. Information presented is confidentialInformation presented is confidential How Sysdig-Kubernetes integration works master 1. Sysdig monitoring each container & app 2. Sysdig agent on master auto-discovers and polls API 3. Metadata collected every few seconds 4. Now Sysdig Cloud can dynamically aggregate metrics across namespaces, replication controllers, pods or any labels workers
  • 18. Information presented is confidentialInformation presented is confidential Application Intelligent Monitoring & Alerting Automatic Discovery App discovery without plug-ins Templates Pre-built templates by application & service Zero-config custom metrics StatsD & JMX – no agents inside containers Anomaly detection Outlier & deviation based comparisons Developers spun up a new service based on apache and mongo last night without letting us know. We deployed sysdig, so we still see it all, without any config.” “
  • 19. Information presented is confidentialInformation presented is confidential v Application Intelligent Monitoring & Alerting We automatically discover your apps Thousands of relevant metrics without a single plug-in or YAML config
  • 20. Information presented is confidentialInformation presented is confidential Trace-driven troubleshooting “ Dashboards Correlate events Trace file with every system call System Call PID CPU USER TH VIRT RES FILE NET 303 1.5 root 3 280K 57K 0 236.00 35 0.5 root 5 37K 0 2K 0.00 Replay the state of my system last night, when the Auth service alerts fired, 5 minutes before our app went down. Show all the system calls from the containers we destroyed.”
  • 21. Information presented is confidentialInformation presented is confidential Demo
  • 22. Information presented is confidentialInformation presented is confidential What we’re going to show you Small environment, with & without orchestration 1. How to deploy a sysdig agent (yes, we will actually show you instrumentation!) 2. Service-oriented performance metrics and analytics 3. A deep troubleshooting example 4. Basic monitoring – creating a dashboard, set an alert
  • 23. Information presented is confidentialInformation presented is confidential Product Offerings Sysdig Cloud Sysdig On-Premise Sysdig Open Source – Hosted offering – $20/mo/host – discounted for large server volume – Monthly or annual – Run the Sysdig backend in your private cloud or AWS domain – Annual only – Minimum commitment required – CLI-based troubleshooting tool – Used on a single host – Community support
  • 24. Information presented is confidentialInformation presented is confidential Summary Deep container visibility Service oriented performance management Application intelligent monitoring & alerting Trace driven troubleshooting Start a free trial today and see Sysdig running in your own environment!
  • 25. Information presented is confidentialInformation presented is confidential Thanks (that’s the end)

Notas do Editor

  1. <hi thanks for joining…> I’ll start with a really quick introduction and then I’d love to learn a little bit more about you and your environment, and why you’re interested in Sysdig Cloud. But to first set the stage… Sysdig Cloud. There are a million other monitoring tools out there – why does the world need another? Well with Sysdig Cloud, we set out to create the first and only comprehensive, container-native monitoring solution
  2. Ground up Clean sheet of paper Container native
  3. Talk about the three problems. Containers designed to be black boxes to enable code portability. Great for devleopment and deployment, but really difficult for operations. But you can’t just deploy agents inside containers like you do on hosts or VMs. Containers designed to isolate processes; adding agents breaks isolation and portability. One level up, containers are the building blocks for microservices… and legacy monitoring tools do not understand dynamic microservice architectures.
  4. So what to do? Well decided to start with a clean slate, technically speaking. We don’t come from the world of VMs, so we built something new, from the ground up, for this new world. We call it Container Vision. With this patent pending technology, we’ve developed a way to see INSIDE containers form the OUTSIDE. So now all you have to do is add our container to your environment, and we will automatically detect your apps, connect to them, and start pulling all those application level metrics you’re used to getting in the VM world. It’s the best of both worlds, with none of the drawbacks. And on top of that we’re adding support for all your container orchestration tech. This is why we call it “Container Native” monitoring – does this make sense? Oh, and just as an added bonus we can see deep down into your system and your network too – that’s powered by open source sysdig
  5. So let’s go deeper and see how this works. Imagine this simple environment, a host running some containers and some non-containerized apps They’re all communicating with the OS kernel in order to get their job done.
  6. Sysdig instruments the kernel using a kernel probe, and from this single point of instrumentation can see every system call that every container or process makes. This technology is also at the core of our opensource product, and we’ve worked closely with the linux foundation in the creation of it.
  7. Once the kernel is instrumented, we forward all information to the sysdig container. From there we send it off to our SaaS service on on-premise software, depending on how you’re using the product. The entire kernel instrumentation is a simple non-blocking process that has really low resource utilization. Ok ?’s Basically works on any form of linux Working closely with customers who are interested in windows – but no product yet
  8. So what does container vision give you? Simply put, it gives you better data With legacy infrastructure tools, you get a basic view into low level resource issues like CPU, memory, disk. That’s ok, but really we want to be able to start thinking about how your apps, micro-services, and containers are performing.
  9. So sysdig gives you these forms of data: Service-oriented performance management – see the performance of services across many containers, hosts, or clouds Application-intelligent monitoring – less work to understand and monitor your infrastructure Trace-driven troubleshooting – go much deeper to track down the issue behind the spike on a graph I’m going to explain each of these in more detail
  10. In the old world, a host typically was tied to a particular app. So it was easy to relate the two. In a dynamic world where scale-out microservices automatically spin up containers, that’s not the case. A service may be made up of containers on multiple hosts, in multiple clouds. How do you get a view of how the service at large is performing?
  11. Sysdig does exactly that – leveraging information (metadata) from the system, we can let you see the service, not the underlying infrastructure. As an example (read cassandra quote on slide) – no mention of hosts, CPU, etc… just focus on what the user experience is.
  12. We’re highly differentiated when it comes to integration with orchestration systems. As you’ll see we do really powerful things with this… We basically can become the brain that understands the entire state of your system in real time using deep integration with the metadata of orchestration systems and underlying clouds We understand what resources are coming and going And map them to your service architecture.
  13. Pre-built dashboard templates No plug-ins to configure – sysdig automatically figures out what apps are running Automatic capture of statsd & JMX Alerts built on baselines & outlier detection
  14. What does your environment use? Something that’s not here? We’re continually creating more.
  15. Troubleshooting is not just a chart Troubleshoot all the way down to individual system calls. Deep integration with open source sysdig Trigger system captures to take place when an alert is fired