An important aspect of performance (and other) monitoring is where the observer stands when looking at the IT scenario. Each participant has a different view of what is bad performance - network, database, web, system, user personnel, management and external people - customers, regulatory bodies etc. These are what I call viewpoints, a popular concept in IT architecture design methods.
Start with APM and Viewpoints - Part 1
Operations people, but not the business user and others, will be desperately interested in:
■ % Utilizations
■ Wait times
■ Disk space used
■ Disk I/O Throughput
■ Disk I/O response time
■ Memory % used
■ Page rate
■ etc. etc.
End User Viewpoint
The previous factors are meaningless to the user of the application, who is more interested in:
■ Response times ( which depends on overall latency, percentiles, variations but they are not interested in that detail)
■ Variability of that response; large variations equal poor productivity via irritation and loss of concentration
■ Throughput of work where applicable
■ Other "speed" factors relating to their work
Business Manager Viewpoint
This viewpoint might reflect that of the end user is some respects, but will often be even more general:
■ What is the time between receipt of an order, shipment, invoicing and reconciliation?
■ Is the customer satisfied with this?
■ Can we speed up the processes without excessive cost?
■ Other business aspects
There are other people who will have different requirements and perspectives of performance: service desk, external customers, especially website users, and possibly regulatory bodies. They are important and in performance life, one size does not fit all.
When considering performance management, which is more than simply monitoring, the differing requirements (viewpoints) of various stakeholders needs to be taken into account. It is often difficult to retrofit analysis of performance data to cater for people not considered at the design stage. You may be asked by the CEO, out of the blue: "Why do we take 2 days to issue an invoice after shipment while competitor X takes one?"
Role of the SLA
Whose level of service (quality of service, QoS) are we talking about? Basically, all the types of person outlined above. This (rather these) QoS are usually formalized in a Service Level Agreement or SLA. This will dictate what needs to be measured and analyzed:
"If you can't measure it or derive it, you can't report it."
"A service-level agreement (SLA) is a contract between a service provider and its internal or external customers that documents what services the provider will furnish and defines the performance standards the provider is obligated to meet." [WhatIs.com].
The trick here is to marry these viewpoints which means translating the operational data into service level agreement (SLA) terms and hence into stakeholder perspective, another word for viewpoint All this is complicated when one moves from the relatively simple classical IT environment to the mixed web and application environments, rendered even more difficult to fathom by virtualization and clouds.
There is no reason why external customers shouldn't be part of any SLA drawn up if the APM setup is designed to cover all important stakeholders.
In addition, it should be transparent to the stakeholders outside operations whether the system runs native, virtualized, in a cloud or in a series of school exercise books. The APM design with these differing viewpoints in mind is the key aspect of this.
Dr. Terry Critchley is the Author of "Making It in IT", "High Performance IT Services" and “High Availability IT Services”.
This blog was created from extracts from Terry Critchley's book: High Performance IT Services [ August 25 2016]
Optimization means improving the performance of your human and technology resources while keeping a watchful eye. To accomplish this, we must have clear, crisp visibility into the metrics relevant to the delivery of workspace applications to your end users and to the devices – the endpoints – they use to be productive ...
As tech headlines flash across my email, the CMDB, and its federated equivalent, the CMS, are almost never mentioned. And yet when I do research, dialog with IT, or support our consulting team, the CMDB/CMS many times still remains paramount ...
Given the size and complexity of today's IT networks it can be almost impossible to detect just when and where a security breach or network failure might occur. It's critical, therefore, that businesses have complete visibility over their IT networks, and any applications and services that run on those networks, in order to protect their customers' information, assure uninterrupted service delivery and, of course, comply with the GDPR ...
A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are more reasons to use these new NPM/APM analytics solutions ...
A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are 6 reasons to use these new NPM/APM analytics solutions ...
There’s no doubt that digital innovations are transforming industries, and business leaders are left with little or no choice – either embrace digital processes or suffer the consequences and get left behind ...
Looking ahead to the rest of 2018 and beyond, it seems like many of the trends that shaped 2017 are set to continue, with the key difference being in how they evolve and shift as they become mainstream. Five key factors defining the progression of the digital transformation movement are ...
Companies using cloud technologies to automate their legacy applications and IT operations processes are gaining a significant competitive advantage over those behind the curve, according to a new report from Capgemini and Sogeti, The automation advantage: Making legacy IT keep pace with the cloud ...
It's every system administrator's worse nightmare. An attempt to restore a database results in empty files, and there is no way to get the data back, ever. Here are five simple tips for keeping things running smoothly and minimizing risk ...
When it comes to their own companies, 50% of IT stakeholders think they are leaders and will disrupt, while 50% feel they are behind and will be disrupted by the competition in 2018, according to a new survey of IT stakeholders from Alfresco Software and Dimensional Research. The report, Digital Disruption: Disrupt or Be Disrupted, is a wake-up call for the C-suite ...