Welcome!

Java IoT Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz

Related Topics: FinTech Journal, Java IoT, Microservices Expo, Linux Containers, Containers Expo Blog, Agile Computing, @DevOpsSummit

FinTech Journal: Article

Monitoring By @SolarWinds | @CloudExpo #APM #ML #Monitoring #DevOps

Linux, Java, Oracle and MySQL create mass monitoring confusion and are routinely considered ‘hard to reach’

Monitoring Those Hard to Reach Places: Linux, Java, Oracle and MySQL

Today's IT environments are increasingly heterogeneous, with Linux, Java, Oracle and MySQL considered nearly as common as traditional Windows environments. In many cases, these platforms have been integrated into an organization's Windows-based IT department by way of an acquisition of a company that leverages one of those platforms. In other cases, the applications may have been part of the IT department for years, but managed by a separate department or singular administrator.

Still, whether it's a perception of required specialization, frustration over these platforms' many version permutations or just general uncertainty and doubt, Linux, Java, Oracle and MySQL create mass monitoring confusion and are routinely considered "hard to reach" for even a seasoned IT professional. This problem goes both ways (when monitoring Windows is actually the unnatural element) but for the most part, IT shops are primarily Windows-based and consistently struggle to monitor these more niche platforms.

Of course, it's certainly possible for IT professionals who are proficient in Linux, Java, Oracle or MySQL to successfully monitor these platforms with their own command-line scripts or native tools - many even enjoy manually writing code and command scripts to monitor these instances - but this strategy will ultimately increase the organization's likelihood of performance issues. Why?

First, should the IT professional tasked with creating unique code and scripts for these specialized instances ever leave the business, the organization will be vulnerable to downtime while another team member is trained on how to operate the native tool or also learns to develop command-line scripts for these platforms.

This isolated technique also exacerbates the biggest challenge of monitoring in any environment: sprawl. It may seem easier to maintain the status quo and continue operating disparate tools for the hard to reach platforms, but it ultimately adds another layer of complexity to the overarching monitoring system. Having too many monitoring tools to manage increases the chances that some will be forgotten (especially the tools used to monitor Linux, Java, Oracle and MySQL instances), meaning performance issues or downtime will take much longer to remediate.

Not only that, but niche monitoring processes lack the type of sophisticated metrics that help create a more effective IT department. Here are several command lines for each specialized instance that will return basic metrics:

  • Linux command lines such as ‘top,' ‘glances' and ‘htop,' for example, will provide basic metrics like performance, CPU, memory and any pertinent errors to be aware of.
  • A ‘performance_schema' command line for MySQL on Linux will display tables of wait states and information about sessions (how many executions, how many rows are examined, etc.) to uncover inefficient queries. Rather than run command lines on the server, Oracle also offers a built-in desktop workbench that works in a similar fashion.
  • J-Console, a built-in dashboard available with Java installation, provides an overview of all tools running on the platform. It looks at heat/memory uses, classes, threads (important to monitor for security leaks), as well as CPU usage.

However, more comprehensive features like advanced alerts, dynamic baselines, correlation and detailed application metrics and availability, which ultimately help enable a more proactive and effective method of managing infrastructure and applications, will be missing from these reports.

At the end of the day, it's important to remember that administrators should not be spending more time configuring their command-line scripts or monitoring tools than they spend taking advantage of the data. Whether an administrator is monitoring Windows, or something more specialized like Linux or MySQL, an IT department will always be stuck on the reactive (troubleshooting) mode without better visibility into the health and performance of its systems and the ability to get early warnings.

By establishing monitoring as a core IT function deserving of a strategic approach, businesses can benefit from a more proactive, early-action IT management style, while also streamlining infrastructure performance, cost and security.

To create a more thoughtful, comprehensive monitoring strategy that incorporates those hard to reach places, here are several best practices IT departments should consider:

  • Create an inventory of what is being monitored. The majority of IT departments have a broad set of monitoring tools for a number of different things. Are there applications in the cloud that are monitored by one tool? Are workloads being hosted in a different data center that leverage a separate tool? Before standardizing monitoring process, organizations should create an inventory of everything they are currently monitoring and the tools being used to do so.
  • Implement a set of standards across all systems. This should be done for every workload independent of which tool is being using, and especially if an IT department is running several different tools. At the end of the day, it's impossible to optimize what isn't being measured, so it's in every IT department's bet interest to create a standard set of monitoring processes, similar to creating runbooks. What are the key metrics needed from each system? What are the situations for which alerts are needed, and how will they be acted on? Having answers to these types of questions will allow even an IT department with distributed workloads and applications to successfully monitor and ensure performance and availability. This approach also helps IT departments avoid having a "weakest link," where one team may have their own security protocol, their own network and their own firewalls that ultimately leave the organization open to security vulnerabilities.
  • Unify the view. IT departments should be have a comprehensive set of unified monitoring and management tools in order to ensure the performance of the entire application stack. Everything is important to monitor, even these hard-to-reach systems, and IT professionals should look to leverage tools that integrate monitoring for these non-standard Linux, Java, Oracle and MySQL instances within a Windows environment into a single dashboard in order to cultivate a holistic view of their infrastructure.
  • Remember that monitoring should be a discipline. Traditionally, monitoring in the data center - even for more standard, Windows-based applications - has been somewhat of an afterthought. For most organizations, it's been a "a necessary evil," a resource that the IT department can leverage when there's a problem that needs solving, and often a job that's done with just a free tool, either open source or software pre-loaded by the hardware vendor. However, the concept of monitoring as a discipline is designed to help IT professionals escape the short-term reactive nature of administration, often caused by ineffective, ad hoc practices, and become more proactive and strategic.

In sum, despite the perception of Linux, Java, Oracle and MySQL instances as being "hard-to-reach places," there are many ways in which administrators can receive data about the health and performance of systems running on these applications, from running manual command-line scripts to leveraging comprehensive tools that integrate these instances in a single dashboard.

However, as the data center continues to grow in complexity, and especially as hybrid IT increases, IT professionals should look to establish the practice of monitoring as a discipline. This approach and unified monitoring that aims to turn data points from various monitoring tools into more actionable insights by looking at all of them from a holistic vantage point, rather than each disparately, coupled with the other above best practices, will allow IT administrators to ultimately increase the overall effectiveness and efficiency of their data centers.

More Stories By Gerardo A Dada

Gerardo A Dada is Vice President of Product Marketing and Strategy for SolarWinds’ database and applications business globally. He is a technologist who has been at the center of the Web, mobile, social and cloud revolutions at companies like Rackspace, Microsoft, Motorola, Vignette and Bazaarvoice. He has been involved with database technologies from dBase to BTrieve to SQL Server and NoSQL and DBaaS in the cloud.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...