This presentation discusses how the monitoring strategy has evolved given the changes in web applications and infrastructure. With the advent of public/private clouds and containers, the old paradigms of application instrumentation and infrastructure monitoring are no longer that relevant. The application landscape is also undergoing significant changes with monolith applications being split up into micro-services. Asynchronous programming has become an integral part of high-performance web applications. Finally, many of the companies today are “Mobile First” which means that the monitoring of apps in mobile devices has now become very important. To top it all, the release cycle has reduced drastically as part of “Iterate Fast and Release Often” philosophy. Learn how some of these changes should be taken into account while coming up with the monitoring strategy of your organization in the long run.
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
Envisioning your Monitoring Strategy
1. Intuit Confidential and Proprietary1
Envisioning Your Monitoring Strategy
Aveek Misra, Architect, Intuit
20-Jan-2016
2. Intuit Confidential and Proprietary2
• What are some of the notable changes in the application
landscape today and how they impact monitoring of applications
• Why Mobile Monitoring is so important
• Different aspects of monitoring in an enterprise
• How have the monitoring solutions evolved and some of the
advanced techniques that are used today
Agenda
3. Intuit Confidential and Proprietary3
Monitoring Microservices
The term “Microservice Architecture” has sprung up over the last few
years to describe a particular way of designing software applications as
suites of independent deployable services
-Martin Fowler
4. Intuit Confidential and Proprietary4
How Complex Can a Microservice Architecture Get?
Loosely coupled service oriented architecture with bounded contexts
- Adrian Cockcroft
@Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
6. Intuit Confidential and Proprietary6
Monitoring Asynchronous interactions
Asynchronous programming refers to a style of structuring a program
whereby a call to some unit of functionality triggers an action that is
allowed to continue outside of the ongoing flow of the program
-Rod Vagg in Nodesource Blog
@Image Courtesy - Presentation from Randy Bias in the DevOps Chicago Meetup
7. Intuit Confidential and Proprietary7
Monitoring failures in fault tolerant systems
• In his excellent book “Release It”, Michael Nygard talks about the Circuit
Breaker pattern as a means to prevent cascading failure.
• Hystrix, an open source framework from Netflix deals with latency and
fault tolerance for distributed systems. It includes an implementation of
Circuit Breaker pattern
@Image Courtesy – www.github.com/Netflix/Hystrix/wiki/How-it-Works
8. Intuit Confidential and Proprietary8
Continuous Deployment at Scale
@Image Courtesy – “How We Learned to Stop Worrying and Start Deploying the Netflix API Service” at Qcon
2015
• Companies like Netflix, Amazon, Google, LinkedIn, Etsy etc. deploy code
hundreds to thousands of times per day!!
9. Intuit Confidential and Proprietary9
Monitoring Induced Failures
@Image Courtesy – AWS re:Invent presentation by Josh Evans, Netflix
10. Intuit Confidential and Proprietary10
Monitoring Should be More Available Than Your
Systems!
@Image Courtesy – Presentation by Adrian Cockcroft at Monitorama 2014
11. Intuit Confidential and Proprietary11
Why Mobile Monitoring is so Important
• The Pew Research Center reports that 92 percent of U.S. adults have a
cellphone of some kind
• Deloitte expects digital interactions to influence 64 cents of every dollar
spent in retail stores by the end of 2015
• Users have low tolerance for buggy apps – Only 16% will try a failing app
more than twice
12. Intuit Confidential and Proprietary12
Monitoring Business Transactions
@Image Courtesy – www.appdynamics.com
• Monitoring the actual user transactions is far more impactful than just
monitoring the low level application and infrastructure metrics
• Business transaction metrics provide the much needed context for the
other metrics
13. Intuit Confidential and Proprietary13
End User Experience Monitoring
@Image Courtesy – www.newrelic.com
14. Intuit Confidential and Proprietary14
Why Synthetic Monitoring is Also Important
@Image Courtesy – www.rigor.com/blog/2014/12/benefits-using-rum-w-
synthetic
15. Intuit Confidential and Proprietary15
Mobile Crash Reporting
@Image Courtesy – www.crittercism.com