SlideShare a Scribd company logo
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Infrastructure Operations

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Monitoring for the big T.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
About Me

Copyright ©2013 Ping Identity Corporation. All rights reserved.
3rd Generation Computer Geek
Roy Christensen: 35 years
3C > HoneyWell > Digital Equipment Corp
Mike Christensen: 40 years
DEC > Compaq> Hewlett Packard

Beau Christensen: 17 years
AstraZeneca > Send.com > DirecTV > Ping
Identity
92 years family experience (hah)
Copyright ©2013 Ping Identity Corporation. All rights reserved.
About Ping Identity
•

We believe secure professional and
personal identities underlie human
progress in a connected world. Our
purpose is to enable and protect
identity, defend privacy and secure the
Internet.

•

Over 1,000 companies, including over half
of the Fortune 100, rely on our awardwinning products to make the digital world
a better experience for hundreds of millions
of people.

•

Denver, Colorado. Est. 2003
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Infrastructure Operations @Ping
Site Reliability Engineering (SRE)
Production Web Operations
Ops to On-Demand Dev
Configuration Engineering (CFE)
Automation, Deployment, Labs
Ops to On-Premise Dev
Infrastructure Engineering (IFE)
Iron, Network, Security
Ops to Support & Helpdesk

Copyright ©2013 Ping Identity Corporation. All rights reserved.
(Quickie) Architecture

•
•
•
•
•

Hybrid Cloud Application
VMware/AWS
SOA (lots of little services)
Red/Black Deployment
Cassandra & Galera MySQL

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Splunk Systems

• 7 Indexers
• Distro search across 3 regional
data centers
• ~ 40Gib/day
• No clustering (yet)
• Universal FWD installed in all
templates
• Moving all Splunk to clustered
architecture in VPCs.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Trust
(the big T)

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Because uptime is
dead.

http://www.kitchensoap.com/2013/01/03/availability-nuance-as-a-service/
Copyright ©2013 Ping Identity Corporation. All rights reserved.
http://uptime.pingidentity.com

Copyright ©2013 Ping Identity Corporation. All rights reserved.
http://uptime.pingidentity.com

Copyright ©2013 Ping Identity Corporation. All rights reserved.
What Builds Trust?
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Lots of Things…

Security

Honesty

Reliability
Integrity

Dependability
Maturity

Transparency
Copyright ©2013 Ping Identity Corporation. All rights reserved.
We rolled those up into two.

Reliability & Transparency

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Reliability:
Keep Shit Running
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Keeping Shit Running
•

Architecture
–
–
–

•

Tools
–
–
–

•

SOA (duh!!!!)
Highly Automated Deployments
Active/Active, quick failover, multi-region
We use a ton of tools
We constantly question the tools we use
We are always looking for new tools

Security
–
–
–

Eyes always on
Scanners running continuously
Constant Remediation

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Transparency:
Talk About Shit
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Talking About Shit
•

Talk Publicly
–
–
–
–

•

When Stuff Breaks, Talk More
–
–
–

•

Talk about decisions we make
Talk about architecture
Talk to vendors
Talk to customers

Quick & dirty status updates
Verbose post mortems
Be honest

Metrics
–
–
–

Use 3rd Parties
Expose as much monitoring as you can
Make it relevant to customers

Copyright ©2013 Ping Identity Corporation. All rights reserved.
T=r+t
Trust = reliability +
transparency

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Trust is a Zero Sum Game
Time
Trust

Copyright ©2013 Ping Identity Corporation. All rights reserved.
T = +2

Time
Trust

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Time
Trust

T = -2
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Time
Trust

T=0

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Monitoring is the
foundation of
Trust.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
is the backbone of
our monitoring
strategy.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
<3 Monitoring
The right tool for the right job = Lots of tools.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Lots of tools = Best of Breed, or
Stack Monitoring

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Let’s build the stack.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Transport & Network Layer.
Fundamental interactions between services.
Extremely important to understand, forms the
basis of troubleshooting efforts.

“Can you ping it? Tracert? Tcpdump?”

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Instance Resource
Monitoring

Historical resource consumption, collected
and correlated with incidents and system
events. Scalability intelligence.
“Traditional” systems monitoring. Nagios,
Zenoss, Zabbix, etc.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Machine Data, Logs.
Extraordinary versatility: events, alerting,
reporting, security, business metrics, and
OI. Allows the creation of dashboards and
event types relative to your own
environment.
Events, logs, traditional “syslog stuff.”
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Application Performance
Monitoring
Detailed view of how the applications are
running on top of the rest of the stack.
Identify bottlenecks, architecture issues,
and accurately model user experience with
RUM.
“Page loads are slow.” “Why are there SQL
queries that return 30,000 rows?”

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Availability Monitoring
External agents monitor services from
multiple locations around the globe. Use
application heartbeats, not ICMP or TCP.
Provides near real-time alerting and is
immediately visible to the customer.
“The site is down.”

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Splunk is the system’s mortar.
Binding systems together, filling gaps,
creating stability.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Security
Quick visual impact. Easy to
identify location, frequency,
and network address of
aggressor. Quick drill down
into detailed Splunk
searches.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Traffic
Real-time traffic maps are
immediately recognizable to
everyone in the
organization.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Operations
Operational dashboards provide
a quick overview of system
health by displaying error
correlation with traffic levels and
event type heat maps.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Global Load Balance
Shows traffic distribution between
production data centers.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Maximize Machine Data Layer Versatility
Build your own dashboards (it’s easy).
Maintain proper naming conventions:
na-den-www-13-8-17-0ec5e8da-128-193
Design for wetware.

Ask for feedback.
Maintain event types.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Having tons of tools is great. Each layer of the
stack is matched well with the system’s
requirements…

Aggregation of metrics is the new challenge.
How do you see it all?

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Stack Integration

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Stack Integration = MTTR
Speed
eventtype=critical.*

Application integration allows speedier access to event timeline and context of
the alarm using markers. Allows SRE to gather relevant information quicker,
using the same tools with less screens.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Splunk has a TON of
integrations.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
See? -->

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Always Need More.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Remember…

T=r+t
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Keep Shit Running.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Talk About Shit.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Copyright ©2013 Ping Identity Corporation. All rights reserved.
Use Splunk.

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Questions?

Copyright ©2013 Ping Identity Corporation. All rights reserved.
Thanks!
bchristensen@pingidentity.com
@beauchristensen
www.pingidentity.com/blogs
http://status.pingidentity.com

Copyright ©2013 Ping Identity Corporation. All rights reserved.

More Related Content

PDF
Incident Response Requires Superhumans
PDF
Bug Bounty Programs : Good for Government
PPTX
Big Data and Security - Where are we now? (2015)
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PDF
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
PPTX
Onboarding in the IoT
PPTX
Cyber security event
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
Incident Response Requires Superhumans
Bug Bounty Programs : Good for Government
Big Data and Security - Where are we now? (2015)
Better to Ask Permission? Best Practices for Privacy and Security
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Onboarding in the IoT
Cyber security event
Advanced Persistent Threat - Evaluating Effective Responses

What's hot (20)

PPTX
Scrubbing Your Active Directory Squeaky Clean
PDF
Information Security Risk Management
DOCX
Security and Privacy considerations in Internet of Things
PDF
security and assurance lecture jan 14
PDF
The Devices are Coming! How the “Internet of Things” will affect IT.
PPTX
Protecting your business ideas including crowdfunding
PDF
Information Security for Small Business
PPTX
Attacking the cloud with social engineering
PPTX
Data Breach from the Inside Out
PDF
Security in the Internet of Things
PDF
Security challenges for IoT
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PDF
FINE-TUNE IPS TO DIAL UP SECURITY
PPTX
Internet & iot security
PDF
Julius Clark is Making Criminal Hackers Miserable
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PDF
Security 2 Q 07[1]
PDF
4192 sslvpn sb_0412
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PDF
Spotlight on Technology 2017
Scrubbing Your Active Directory Squeaky Clean
Information Security Risk Management
Security and Privacy considerations in Internet of Things
security and assurance lecture jan 14
The Devices are Coming! How the “Internet of Things” will affect IT.
Protecting your business ideas including crowdfunding
Information Security for Small Business
Attacking the cloud with social engineering
Data Breach from the Inside Out
Security in the Internet of Things
Security challenges for IoT
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
FINE-TUNE IPS TO DIAL UP SECURITY
Internet & iot security
Julius Clark is Making Criminal Hackers Miserable
All The Things: Security, Privacy & Safety in a World of Connected Devices
Security 2 Q 07[1]
4192 sslvpn sb_0412
LIFT OFF 2017: IoT and MSS Deep Dive
Spotlight on Technology 2017
Ad

Viewers also liked (16)

PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
PDF
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PDF
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
PDF
Creating an Internet of Everything
PPSX
A6 Corporation PowerTrend Webinar: RTB Performance Disappointment -- The New ...
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
1. Design, Trust & Control of Sterile Manufacturing (Opening Note)
PDF
Identity for IoT: An Authentication Framework for the IoT
PPT
Schistosoma parasitology kasr el Einy department
PPT
Ping solutions overview_111904
PDF
Internet of Things presentation
PPTX
Algorithms and Flowcharts
PPT
THE INTERNET OF THINGS
PDF
10 Lessons for New Managers
PDF
Internet of Things
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
Creating an Internet of Everything
A6 Corporation PowerTrend Webinar: RTB Performance Disappointment -- The New ...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
1. Design, Trust & Control of Sterile Manufacturing (Opening Note)
Identity for IoT: An Authentication Framework for the IoT
Schistosoma parasitology kasr el Einy department
Ping solutions overview_111904
Internet of Things presentation
Algorithms and Flowcharts
THE INTERNET OF THINGS
10 Lessons for New Managers
Internet of Things
Ad

Similar to Conf2013 bchristensen thebig_t (20)

PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PPTX
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
PDF
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
Big security for big data
PDF
Internet of Everything (IoE): Driving Industry Disruption
PPTX
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
PPTX
Big data security
PPT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
PDF
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
PDF
Fighting cyber fraud with hadoop v2
PDF
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
PDF
CIS13: APIs, Identity, and Securing the Enterprise
PDF
Securing Your Intellectual Property: Preventing Business IP Leaks
PDF
Building the Internet of Everything
PPTX
Making the Case for Stronger Endpoint Data Visibility
PDF
[CLASS 2014] Palestra Técnica - Fabio Rosa
PPTX
Ip on the internet day
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Big security for big data
Internet of Everything (IoE): Driving Industry Disruption
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
Big data security
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Fighting cyber fraud with hadoop v2
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
CIS13: APIs, Identity, and Securing the Enterprise
Securing Your Intellectual Property: Preventing Business IP Leaks
Building the Internet of Everything
Making the Case for Stronger Endpoint Data Visibility
[CLASS 2014] Palestra Técnica - Fabio Rosa
Ip on the internet day
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Avoid embarrassing press by designing secure IoT products with Misha Seltzer

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Conf2013 bchristensen thebig_t