Welcome!

FinTech Journal Authors: Yeshim Deniz, Liz McMillan, Zakia Bouachraoui, Pat Romanski, Elizabeth White

Related Topics: FinTech Journal, Java IoT, Microservices Expo, Linux Containers, Containers Expo Blog, Agile Computing, @DevOpsSummit

FinTech Journal: Article

Monitoring By @SolarWinds | @CloudExpo #APM #ML #Monitoring #DevOps

Linux, Java, Oracle and MySQL create mass monitoring confusion and are routinely considered ‘hard to reach’

Monitoring Those Hard to Reach Places: Linux, Java, Oracle and MySQL

Today's IT environments are increasingly heterogeneous, with Linux, Java, Oracle and MySQL considered nearly as common as traditional Windows environments. In many cases, these platforms have been integrated into an organization's Windows-based IT department by way of an acquisition of a company that leverages one of those platforms. In other cases, the applications may have been part of the IT department for years, but managed by a separate department or singular administrator.

Still, whether it's a perception of required specialization, frustration over these platforms' many version permutations or just general uncertainty and doubt, Linux, Java, Oracle and MySQL create mass monitoring confusion and are routinely considered "hard to reach" for even a seasoned IT professional. This problem goes both ways (when monitoring Windows is actually the unnatural element) but for the most part, IT shops are primarily Windows-based and consistently struggle to monitor these more niche platforms.

Of course, it's certainly possible for IT professionals who are proficient in Linux, Java, Oracle or MySQL to successfully monitor these platforms with their own command-line scripts or native tools - many even enjoy manually writing code and command scripts to monitor these instances - but this strategy will ultimately increase the organization's likelihood of performance issues. Why?

First, should the IT professional tasked with creating unique code and scripts for these specialized instances ever leave the business, the organization will be vulnerable to downtime while another team member is trained on how to operate the native tool or also learns to develop command-line scripts for these platforms.

This isolated technique also exacerbates the biggest challenge of monitoring in any environment: sprawl. It may seem easier to maintain the status quo and continue operating disparate tools for the hard to reach platforms, but it ultimately adds another layer of complexity to the overarching monitoring system. Having too many monitoring tools to manage increases the chances that some will be forgotten (especially the tools used to monitor Linux, Java, Oracle and MySQL instances), meaning performance issues or downtime will take much longer to remediate.

Not only that, but niche monitoring processes lack the type of sophisticated metrics that help create a more effective IT department. Here are several command lines for each specialized instance that will return basic metrics:

  • Linux command lines such as ‘top,' ‘glances' and ‘htop,' for example, will provide basic metrics like performance, CPU, memory and any pertinent errors to be aware of.
  • A ‘performance_schema' command line for MySQL on Linux will display tables of wait states and information about sessions (how many executions, how many rows are examined, etc.) to uncover inefficient queries. Rather than run command lines on the server, Oracle also offers a built-in desktop workbench that works in a similar fashion.
  • J-Console, a built-in dashboard available with Java installation, provides an overview of all tools running on the platform. It looks at heat/memory uses, classes, threads (important to monitor for security leaks), as well as CPU usage.

However, more comprehensive features like advanced alerts, dynamic baselines, correlation and detailed application metrics and availability, which ultimately help enable a more proactive and effective method of managing infrastructure and applications, will be missing from these reports.

At the end of the day, it's important to remember that administrators should not be spending more time configuring their command-line scripts or monitoring tools than they spend taking advantage of the data. Whether an administrator is monitoring Windows, or something more specialized like Linux or MySQL, an IT department will always be stuck on the reactive (troubleshooting) mode without better visibility into the health and performance of its systems and the ability to get early warnings.

By establishing monitoring as a core IT function deserving of a strategic approach, businesses can benefit from a more proactive, early-action IT management style, while also streamlining infrastructure performance, cost and security.

To create a more thoughtful, comprehensive monitoring strategy that incorporates those hard to reach places, here are several best practices IT departments should consider:

  • Create an inventory of what is being monitored. The majority of IT departments have a broad set of monitoring tools for a number of different things. Are there applications in the cloud that are monitored by one tool? Are workloads being hosted in a different data center that leverage a separate tool? Before standardizing monitoring process, organizations should create an inventory of everything they are currently monitoring and the tools being used to do so.
  • Implement a set of standards across all systems. This should be done for every workload independent of which tool is being using, and especially if an IT department is running several different tools. At the end of the day, it's impossible to optimize what isn't being measured, so it's in every IT department's bet interest to create a standard set of monitoring processes, similar to creating runbooks. What are the key metrics needed from each system? What are the situations for which alerts are needed, and how will they be acted on? Having answers to these types of questions will allow even an IT department with distributed workloads and applications to successfully monitor and ensure performance and availability. This approach also helps IT departments avoid having a "weakest link," where one team may have their own security protocol, their own network and their own firewalls that ultimately leave the organization open to security vulnerabilities.
  • Unify the view. IT departments should be have a comprehensive set of unified monitoring and management tools in order to ensure the performance of the entire application stack. Everything is important to monitor, even these hard-to-reach systems, and IT professionals should look to leverage tools that integrate monitoring for these non-standard Linux, Java, Oracle and MySQL instances within a Windows environment into a single dashboard in order to cultivate a holistic view of their infrastructure.
  • Remember that monitoring should be a discipline. Traditionally, monitoring in the data center - even for more standard, Windows-based applications - has been somewhat of an afterthought. For most organizations, it's been a "a necessary evil," a resource that the IT department can leverage when there's a problem that needs solving, and often a job that's done with just a free tool, either open source or software pre-loaded by the hardware vendor. However, the concept of monitoring as a discipline is designed to help IT professionals escape the short-term reactive nature of administration, often caused by ineffective, ad hoc practices, and become more proactive and strategic.

In sum, despite the perception of Linux, Java, Oracle and MySQL instances as being "hard-to-reach places," there are many ways in which administrators can receive data about the health and performance of systems running on these applications, from running manual command-line scripts to leveraging comprehensive tools that integrate these instances in a single dashboard.

However, as the data center continues to grow in complexity, and especially as hybrid IT increases, IT professionals should look to establish the practice of monitoring as a discipline. This approach and unified monitoring that aims to turn data points from various monitoring tools into more actionable insights by looking at all of them from a holistic vantage point, rather than each disparately, coupled with the other above best practices, will allow IT administrators to ultimately increase the overall effectiveness and efficiency of their data centers.

More Stories By Gerardo A Dada

Gerardo A Dada is Vice President of Product Marketing and Strategy for SolarWinds’ database and applications business globally. He is a technologist who has been at the center of the Web, mobile, social and cloud revolutions at companies like Rackspace, Microsoft, Motorola, Vignette and Bazaarvoice. He has been involved with database technologies from dBase to BTrieve to SQL Server and NoSQL and DBaaS in the cloud.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.