SlideShare una empresa de Scribd logo
#TechTuesday
What is
Observability ?
#TechTuesday
Observability is the ability to
monitor, measure, and understand
the state of a system based on its
external outputs like logs, metrics,
and traces.
#TechTuesday
The Three Pillars of Observability
METRICS
TRACES LOGS
#TechTuesday
How Observability Works
Logs
Metrics
Traces
Logs can be used to create a high-fidelity, millisecond-by-millisecond
record of every event, complete with surrounding context, that
developers can 'play back' for troubleshooting and debugging purposes.
Metrics are fundamental measures of application and system health
over a given period of time, such as how much memory or CPU capacity
an application uses over a five-minute span, or how much latency an
application experiences during a spike in usage.
Traces record the end-to-end 'journey' of every user request, from the UI
or mobile app through the entire distributed architecture and back to
the user.
#TechTuesday
Difference Between
Observability and Monitoring
OBSERVABILITY MONITORING
Tells you why a system is at fault
Observability is a traversable map
It gives you complete information
Focuses on giving context to
the data
Observability creates the potential
to monitor different events
Acts as a knowledge base in
defining what to monitor
Gives a more complete assessment
of the overall environment
Focuses on monitoring the system &
discovering faults
Focuses on monitoring KPIs
Notifies you that a system is at fault
Monitoring is a single plane
It gives you limited information
Focuses on collecting data
Monitoring is the process of using
observability
#TechTuesday
Benefits of Observability
Continuous
Data Monitoring
Better System
Health
Topology
Information
Enhanced
Customer
Experiences
Advanced Root
Cause Analysis
Automatic
Discovery and
Instrumentation
#TechTuesday
Challenges to Observability
Implementation
Not knowing what
drives positive
business impact
Volume, Velocity,
and Variety of data
Siloed Infra, Dev,
Ops, Apps, and
Business teams
Complexity of
dynamic multi-
cloud
environments
Monitoring
microservices
and containers
#TechTuesday
Criteria for Good Observability
Tool
User friendliness Real-time data
integration with
current tools
Visualization of
aggregated data
Event-handling
capabilities
Provide context
Deliver
business value
Uses AI/ML
Thank you for
your time.
#TechTuesday www.Gleecus.com
hello@gleecus.com
Contact us:

Más contenido relacionado

Similar a What is Observability and how is it different from Monitoring?

nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management
sunsmart-chennai
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
AgileNetwork
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Reviewguesta265a9
 
What-is-a-cloud-layer and their classification
What-is-a-cloud-layer and their classificationWhat-is-a-cloud-layer and their classification
What-is-a-cloud-layer and their classification
KENNEDYDONATO1
 
Plant Maintenance & Condition Monitoring
Plant Maintenance & Condition MonitoringPlant Maintenance & Condition Monitoring
Plant Maintenance & Condition Monitoring
Elena Maria Vaccher
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
MUHAMMAD HUZAIFA CHAUDHARY
 
PreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive ApplicationPreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive Application
Knoldus Inc.
 
Observability for Application Developers (1)-1.pptx
Observability for Application Developers (1)-1.pptxObservability for Application Developers (1)-1.pptx
Observability for Application Developers (1)-1.pptx
OpsTree solutions
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
DevLabs Global
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
10-Strike Software
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
Greg Hanchin
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
1. Components of Information Systems.pdf
1. Components of Information Systems.pdf1. Components of Information Systems.pdf
1. Components of Information Systems.pdf
calf_ville86
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
Embitel Technologies (I) PVT LTD
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
csk selva
 
Flexible foundations partners
Flexible foundations partnersFlexible foundations partners
Flexible foundations partnersEXITone S.p.A.
 
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire  "Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
CodeOps Technologies LLP
 
Management Information System (mis)- unit-3
Management Information System (mis)- unit-3Management Information System (mis)- unit-3
Management Information System (mis)- unit-3
Manoj Kumar
 
Real Time Operating System ,Structures of Operating System (Monolithic, Micro...
Real Time Operating System ,Structures of Operating System(Monolithic, Micro...Real Time Operating System ,Structures of Operating System(Monolithic, Micro...
Real Time Operating System ,Structures of Operating System (Monolithic, Micro...
VIJETHAK2
 

Similar a What is Observability and how is it different from Monitoring? (20)

nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
 
What-is-a-cloud-layer and their classification
What-is-a-cloud-layer and their classificationWhat-is-a-cloud-layer and their classification
What-is-a-cloud-layer and their classification
 
Plant Maintenance & Condition Monitoring
Plant Maintenance & Condition MonitoringPlant Maintenance & Condition Monitoring
Plant Maintenance & Condition Monitoring
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
 
PreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive ApplicationPreMonR - A Reactive Platform To Monitor Reactive Application
PreMonR - A Reactive Platform To Monitor Reactive Application
 
Observability for Application Developers (1)-1.pptx
Observability for Application Developers (1)-1.pptxObservability for Application Developers (1)-1.pptx
Observability for Application Developers (1)-1.pptx
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
1. Components of Information Systems.pdf
1. Components of Information Systems.pdf1. Components of Information Systems.pdf
1. Components of Information Systems.pdf
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
Flexible foundations partners
Flexible foundations partnersFlexible foundations partners
Flexible foundations partners
 
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire  "Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
"Distributed Tracing: New DevOps Foundation" by Jayesh Ahire
 
Management Information System (mis)- unit-3
Management Information System (mis)- unit-3Management Information System (mis)- unit-3
Management Information System (mis)- unit-3
 
Real Time Operating System ,Structures of Operating System (Monolithic, Micro...
Real Time Operating System ,Structures of Operating System(Monolithic, Micro...Real Time Operating System ,Structures of Operating System(Monolithic, Micro...
Real Time Operating System ,Structures of Operating System (Monolithic, Micro...
 

Más de GleecusTechlabs1

Event Driven Microservices Architecture_ Supporting Growing Performance Need
Event Driven Microservices Architecture_ Supporting Growing Performance NeedEvent Driven Microservices Architecture_ Supporting Growing Performance Need
Event Driven Microservices Architecture_ Supporting Growing Performance Need
GleecusTechlabs1
 
Enterprise Integration Patterns - Overview
Enterprise Integration Patterns - OverviewEnterprise Integration Patterns - Overview
Enterprise Integration Patterns - Overview
GleecusTechlabs1
 
Domain Driven Design for Microservice Architecture
Domain Driven Design for Microservice ArchitectureDomain Driven Design for Microservice Architecture
Domain Driven Design for Microservice Architecture
GleecusTechlabs1
 
Distributed Cloud Computing in a Nutshell
Distributed Cloud Computing in a NutshellDistributed Cloud Computing in a Nutshell
Distributed Cloud Computing in a Nutshell
GleecusTechlabs1
 
An Overview on Data Enrichment and techniques
An Overview on Data Enrichment and techniquesAn Overview on Data Enrichment and techniques
An Overview on Data Enrichment and techniques
GleecusTechlabs1
 
An Overview on Container Orchestration Services
An Overview on Container Orchestration ServicesAn Overview on Container Orchestration Services
An Overview on Container Orchestration Services
GleecusTechlabs1
 
The Role of Cloud Computing in Healthcare
The Role of Cloud Computing in HealthcareThe Role of Cloud Computing in Healthcare
The Role of Cloud Computing in Healthcare
GleecusTechlabs1
 
Cloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping ExperienceCloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping Experience
GleecusTechlabs1
 
Chaos Engineering to Establish Software Reliability
Chaos Engineering to Establish Software ReliabilityChaos Engineering to Establish Software Reliability
Chaos Engineering to Establish Software Reliability
GleecusTechlabs1
 
Bringing a Product Mindset into DevOps - Overview
Bringing a Product Mindset into DevOps - OverviewBringing a Product Mindset into DevOps - Overview
Bringing a Product Mindset into DevOps - Overview
GleecusTechlabs1
 
The Path to Application Modernization.pdf
The Path to Application Modernization.pdfThe Path to Application Modernization.pdf
The Path to Application Modernization.pdf
GleecusTechlabs1
 
The Cloud Agnostic Architecture - Overview
The Cloud Agnostic Architecture - OverviewThe Cloud Agnostic Architecture - Overview
The Cloud Agnostic Architecture - Overview
GleecusTechlabs1
 
7 Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
7  Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf7  Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
7 Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
GleecusTechlabs1
 
How to maximize your business ROI with custom software solution
How to maximize your business ROI with custom software solutionHow to maximize your business ROI with custom software solution
How to maximize your business ROI with custom software solution
GleecusTechlabs1
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
GleecusTechlabs1
 
The BDD Process (Behavior-driven development)
The BDD Process (Behavior-driven development)The BDD Process (Behavior-driven development)
The BDD Process (Behavior-driven development)
GleecusTechlabs1
 
SaaS Product Development Checklist.pdf
SaaS Product Development Checklist.pdfSaaS Product Development Checklist.pdf
SaaS Product Development Checklist.pdf
GleecusTechlabs1
 
Cloud Computing in Healthcare
Cloud Computing in HealthcareCloud Computing in Healthcare
Cloud Computing in Healthcare
GleecusTechlabs1
 
Qualities of an On-Demand App.pdf
Qualities of an On-Demand App.pdfQualities of an On-Demand App.pdf
Qualities of an On-Demand App.pdf
GleecusTechlabs1
 

Más de GleecusTechlabs1 (19)

Event Driven Microservices Architecture_ Supporting Growing Performance Need
Event Driven Microservices Architecture_ Supporting Growing Performance NeedEvent Driven Microservices Architecture_ Supporting Growing Performance Need
Event Driven Microservices Architecture_ Supporting Growing Performance Need
 
Enterprise Integration Patterns - Overview
Enterprise Integration Patterns - OverviewEnterprise Integration Patterns - Overview
Enterprise Integration Patterns - Overview
 
Domain Driven Design for Microservice Architecture
Domain Driven Design for Microservice ArchitectureDomain Driven Design for Microservice Architecture
Domain Driven Design for Microservice Architecture
 
Distributed Cloud Computing in a Nutshell
Distributed Cloud Computing in a NutshellDistributed Cloud Computing in a Nutshell
Distributed Cloud Computing in a Nutshell
 
An Overview on Data Enrichment and techniques
An Overview on Data Enrichment and techniquesAn Overview on Data Enrichment and techniques
An Overview on Data Enrichment and techniques
 
An Overview on Container Orchestration Services
An Overview on Container Orchestration ServicesAn Overview on Container Orchestration Services
An Overview on Container Orchestration Services
 
The Role of Cloud Computing in Healthcare
The Role of Cloud Computing in HealthcareThe Role of Cloud Computing in Healthcare
The Role of Cloud Computing in Healthcare
 
Cloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping ExperienceCloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping Experience
 
Chaos Engineering to Establish Software Reliability
Chaos Engineering to Establish Software ReliabilityChaos Engineering to Establish Software Reliability
Chaos Engineering to Establish Software Reliability
 
Bringing a Product Mindset into DevOps - Overview
Bringing a Product Mindset into DevOps - OverviewBringing a Product Mindset into DevOps - Overview
Bringing a Product Mindset into DevOps - Overview
 
The Path to Application Modernization.pdf
The Path to Application Modernization.pdfThe Path to Application Modernization.pdf
The Path to Application Modernization.pdf
 
The Cloud Agnostic Architecture - Overview
The Cloud Agnostic Architecture - OverviewThe Cloud Agnostic Architecture - Overview
The Cloud Agnostic Architecture - Overview
 
7 Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
7  Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf7  Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
7 Evolving Trends in Digital Transformation for Mid-Sized Enterprises.pdf
 
How to maximize your business ROI with custom software solution
How to maximize your business ROI with custom software solutionHow to maximize your business ROI with custom software solution
How to maximize your business ROI with custom software solution
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
 
The BDD Process (Behavior-driven development)
The BDD Process (Behavior-driven development)The BDD Process (Behavior-driven development)
The BDD Process (Behavior-driven development)
 
SaaS Product Development Checklist.pdf
SaaS Product Development Checklist.pdfSaaS Product Development Checklist.pdf
SaaS Product Development Checklist.pdf
 
Cloud Computing in Healthcare
Cloud Computing in HealthcareCloud Computing in Healthcare
Cloud Computing in Healthcare
 
Qualities of an On-Demand App.pdf
Qualities of an On-Demand App.pdfQualities of an On-Demand App.pdf
Qualities of an On-Demand App.pdf
 

Último

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Último (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

What is Observability and how is it different from Monitoring?

  • 2. #TechTuesday Observability is the ability to monitor, measure, and understand the state of a system based on its external outputs like logs, metrics, and traces.
  • 3. #TechTuesday The Three Pillars of Observability METRICS TRACES LOGS
  • 4. #TechTuesday How Observability Works Logs Metrics Traces Logs can be used to create a high-fidelity, millisecond-by-millisecond record of every event, complete with surrounding context, that developers can 'play back' for troubleshooting and debugging purposes. Metrics are fundamental measures of application and system health over a given period of time, such as how much memory or CPU capacity an application uses over a five-minute span, or how much latency an application experiences during a spike in usage. Traces record the end-to-end 'journey' of every user request, from the UI or mobile app through the entire distributed architecture and back to the user.
  • 5. #TechTuesday Difference Between Observability and Monitoring OBSERVABILITY MONITORING Tells you why a system is at fault Observability is a traversable map It gives you complete information Focuses on giving context to the data Observability creates the potential to monitor different events Acts as a knowledge base in defining what to monitor Gives a more complete assessment of the overall environment Focuses on monitoring the system & discovering faults Focuses on monitoring KPIs Notifies you that a system is at fault Monitoring is a single plane It gives you limited information Focuses on collecting data Monitoring is the process of using observability
  • 6. #TechTuesday Benefits of Observability Continuous Data Monitoring Better System Health Topology Information Enhanced Customer Experiences Advanced Root Cause Analysis Automatic Discovery and Instrumentation
  • 7. #TechTuesday Challenges to Observability Implementation Not knowing what drives positive business impact Volume, Velocity, and Variety of data Siloed Infra, Dev, Ops, Apps, and Business teams Complexity of dynamic multi- cloud environments Monitoring microservices and containers
  • 8. #TechTuesday Criteria for Good Observability Tool User friendliness Real-time data integration with current tools Visualization of aggregated data Event-handling capabilities Provide context Deliver business value Uses AI/ML
  • 9. Thank you for your time. #TechTuesday www.Gleecus.com hello@gleecus.com Contact us: