Sourcing Operations Management Architecture Monitoring that works!
1.Monitoring Overview 2.The Sourcing Business 3.Demonstration 4.The OMA Advantage 5.Next Steps 6.Questions Agenda
Monitoring Overview
Why Monitor? Visibility (The Truth) MeasurementCorrelation Notification Actively know environment is working Actively know when its not! Continuous visibility Fault awareness before the end user No finger pointing! Half the time to resolve problems Diagnosis is MUCH simpler See only the problem, not the noise! Always in touch! Information to manage Sweat the assets! If you can see it, you can do something about it. Its what you cant see that will kill you!
Why Monitoring Systems don't work –High upfront investment –Availability (and accessibility) of in- house skills to implement and support the solution –Technical complexity –Heavy resource impact on device and network –Ability to rapidly deliver value –Lack of tool flexibility –Never-ending configuration, maintenance and administration Gartner
How do we fit in OMA (Single Pane of Glass) ESM EM
How we fit in OMA – What we use to collect data and produce outputs PROCESSPROCESS APPSAPPS We will instrument and hook to applications in every way that we can Trusted performance and capacity advisor. Go to guys for performance problems What we deliver: Problem identification Mission critical (apps+infr) alerting Our Historic deliverables Planning advice Integrate into your operation Problem, Change, Capacity, Incident Review, Review Weekly Baseline Incident Monthly Baseline Problem Incident Administration Capacity
The Sourcing Schema - Leading Indicators ExchangeWhat we Monitor Exchange CountersQueues (6), Connectors (6), Mail (3), Info (9), Messages (12) Log Files (Critical Errors) (2003) ESENT, Information Store, System Attendant, Routing Engine (10) Operating SystemDisks (10), Memory (6), Services (16), CPU (5) HardwareTemp (2), Fan (3), PSU(1), Disks(15) Total Counters:104 (100 Average number of counters) Out of a possible counters (Exchange has 1 700) Counters x 100 Servers = Counters x 100 Servers = We alert on <10% of these % of the action with < 1% of the footprint! We poll every 2 minutes 100 Tests x 100 Servers / 2 = tests / min = 7.2 million tests / day. Imagine making it more complicated The law of diminishing utility 1 st 10 tests = 50% utility 2 nd 10 tests = 25% utility 3 rd 10 tests = 12.5% utility Etc The 101th test = 0.01% utility = 99.99% utility.
The Sourcing Schema - Leading Indicators ExchangeWhat we Monitor Exchange CountersQueues (6), Connectors (6), Mail (3), Info (9), Messages (12) Log Files (Critical Errors) (2003) ESENT, Information Store, System Attendant, Routing Engine (10) Operating SystemDisks (10), Memory (6), Services (16), CPU (5) HardwareTemp (2), Fan (3), PSU(1), Disks(15) Total Counters:104 (100 Average number of counters) Out of a possible counters (Exchange has 1 700) Counters x 100 Servers = Counters x 100 Servers = We alert on <10% of these % of the action with < 1% of the footprint! We poll every 2 minutes 100 Tests x 100 Servers / 2 = tests / min = 7.2 million tests / day. Imagine making it more complicated The law of diminishing utility 1 st 10 tests = 50% utility 2 nd 10 tests = 25% utility 3 rd 10 tests = 12.5% utility Etc The 101th test = 0.01% utility = 99.99% utility. Top 10 (50%)Next 10 (75%)Next 10 System uptimeCritical error logsOther services System tempVirus services% Processor time Disk SpaceOther key Exchange servicesDisk array status MTA servicesPSU & statusMemory hard page faults Queues/storeMemory available SMTP queue Next 10Next 10Next 10 Fan statusOther memory testsNon critical logs Processor cache statusTop processorsNic errors Mail flow indicatorsOther CPU tests Other exchange counters
OMA Horizontal vs. Vertical Mom/SCom BotzView tests 96 tests We are not going to configure your Netbotz, - use the Netbotz tool. We will tell you that your data centre is overheating, every time, only when it is. We will tell the correct person, even if you changed the configuration. If you want tests, get SCom If you Want 96 tests that cover the 99.99%, get OMA!
Q How does our solution work (technical)? PE Secure Comms Monitored Device Are you there? How much? A DB Web 132 No correlation required No name translation required No test differentiation required No Contextual knowledge required Completely Rules based
Sourcing Solution Fully integrated end-to-end solution Significantly lower resource impact on IT environment than traditional ESM solutions Quick deployment ensures quick business benefit Go-to-show in less than six weeks Instantaneous value Low noise 24x7 multichannel notification engine Business Model Automation as a philosophy Source code owned and developed internally South African solution designed for South African environments Rand based pricing model Software-as-a-Service (SaaS) delivery model –It must work No Deployment, Licensing, Upgrade or Maintenance fees –Software is Free and Evergreen The Sourcing Solution and Business Model
Our current Client portfolio
System Inputs Technology Areas Operating Systems Active Directory QOS NBAR NAS & SAN Radio LANs Wan Jet BizTalk Desktops Application Response Message Queues Assets Log & Text Files Databases Database Tables
System Outputs Availability, Capacity, Performance, Diagnostics Single Pane of Glass IncidentsTechnology Agnostic diagnosis Technology Agnostic Reporting
Multi-Functional Dashboard (IT Management View)
Multi-Functional Dashboard (Executive View)
Function Based Dashboard
Graphing and Trending of Performance Counters
Router Dashboard
Protocol Analysis
Application Response Monitoring DNSNetworkTrafficUser Exp
User Experience
Application and End User Response Monitoring
Branch Ready
OMA Attendant
SLA & Availability Reporting
Application Monitoring
Log File Parsing
Backup Monitoring
Database Table Monitoring PE Secure Comms
Instrumentation Counters Custom Application Code
Application Monitoring
User Experience
Reporting Engine
Incidents
Availability