SlideShare a Scribd company logo
2 4 / 7 C L O U D M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
Euphoric Thought
Technologies
Eliminating potential breaches by providing visibility
into files, applications and users.
Continually monitoring the cloud to ensure real-time file scans.
Regular auditing and reporting to ensure security standards.
Merging monitoring tools with different cloud providers.
Monitoring cloud data across distributed locations.
Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid
environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes,
devices, logs, events and more.
Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users.
C L O U D M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
C L I E N T O N B O A R D I N G P R O C E S S
R E A D Y . S E T . C O M M U T E !
1) Gather basic
information about
the client
2) Agrees on
SLAs
3) Process Signoff
4) Conduct
Training
5) Setup
communication
channel and
ticketing system
6) Obtain access
for various
systems in place
as agreed upon
7) Setup report
formats for weekly
and monthly and
improve on the
same
Client
Onboarding
Process
T E A M S E T U P
R E A D Y . S E T . C O M M U T E !
Team Setup
a) Proper Video based
training of the current
system, Architecture,
Applications etc.
b) New resource will work
with a Sr team member
closely for 15 days to
understand the process,
tools and culture.
d) Post the completion of
training the resource is
then deployed into the
project.
c) Access to various
tools and documents
to understand the
project.
2 4 / 7 S H I F T M A N A G E M E N T
24/7 structured cloud infra monitoring to manage the cloud
Infrastructure.
Proper shift handover process with a system in place for
documentation, tracking issues, alert management etc.
Various communication channels for the team members to
interact and react quickly for any incidents.
Daily team meetings to present risks, incidents, and
emerging threats.
We help reduce the MTTR by correlating the Data to the
Service.
Policy-driven and automation first approach, with in-depth
observability, exception-based interventions, and
automated / assisted incident handling.
R E A D Y . S E T . C O M M U T E !
C L O U D I N F R A S U P P O R T
Incident Management
Availability Management
Problem Management
Change Management
Service Improvement Plan
- Make sure all the incidents are closed well within defined SLAs
- Identification and availability of all KPIs
- Closure of all problem tickets and RCA
- Process for urgent changes
- Attain stability first and focus on further improvement of
process for cost effective utilization of Resources
R E A D Y . S E T . C O M M U T E !
S E R V I C E L E V E L A G R E E M E N T S
Service Desk
Cloud infrastructure support operations availability.
99.5% service level uptime at any given month.
Service request for change management.
Troubleshooting of Cloud infra related issues.
System Infrastructure health monitoring monitoring of
system parameters (e.g. CPU, memory and hard disk
utilization) according to the system monitoring requirement
by customer.
System performance alerts based on agreed performance
threshold with customer. A typical performance threshold is
70% utilization for warning state and 90% utilization for
critical state.
Highlight performance deviation (as specified by customer).
1.
2. Infrastructure Health Monitoring
R E A D Y . S E T . C O M M U T E !
S E R V I C E L E V E L A G R E E M E N T S ( C T D )
Auto Scaling Configuration rules
Addition of ACL
Whitelisting of IP
Security Group Rules
User Access Management
Changing Instance type
Addition of disk space to Instance
Start/Stop of Instance
Backup of Instance image
Availability group configuration
3. Service Request & Change Management
R E A D Y . S E T . C O M M U T E !
S E V E R I T Y L E V E L S
Services Outage resulting from failure of application, database,
webservers, network devices.
Any failure of one of the multiple application, database, webservers or
network devices that are configured under high availability using
physical redundancy at the same location that does not result in service
outage.
Any other standalone server or network element in scope.
Any Incident of backup activity or Job failure on servers running
business applications, web servers, email, DNS and databases.
Disruption due to Virus Attack.
User ID and access related issues.
Disk Quota related issues
Any incident of backup activity or Job failure on servers running DHCP
etc
Antivirus Update failure
Patch Upgrade*
IMAC changes
UserID Creation and Deletion
Disc Quota Changes
Data backup or restore requests
This activity may have a dependency on successful test of patches in
UAT/test Environment and /or availability of downtime for the activity.
R E A D Y . S E T . C O M M U T E !
Severity Level
S 1 - 1 5 m i n u t e s
S 2 - 3 0 m i n u t e s
S 3 - 4 5 m i n u t e s
S 4 - 6 0 m i n u t e s
Response Time
S2
S1
S3
S4
R E P O R T I N G
Weekly report highlighting top incidents and recurring
incidents with RCA.
Consolidated monthly reports.
Cloud Services based reports. (ELB, RDS, Queue service etc.)
Cloud cost optimization reports etc.
Following are the reports which are prepared and sent to
customers as part of 24/7 cloud monitoring:
R E A D Y . S E T . C O M M U T E !
Value added 24/7 Monitoring
Offering Value added 24/7 Cloud
Monitoring with cloud analytics
Enhanced Implementation
Comprehensive understanding of
the current existing technical
landscape for implementing best
cloud solutions
Disaster Recovery
In event of any disaster we
ensure safety of your data
Quality control and security
We ensure secure storage of Data
with high level of quality control
Cost effective
Monitoring the complete
utilization and help
customers save on their
Infra spend
O U R V A L U E P R O P O S I T I O N
Shift 1
Cloud Infra
Resources
Basic/advanced
analysis of
incident
1 2 4 5
Cloudwatch
Admin
SNS Notification
3
Pager Duty
Incident
Created
Shift 2
Shift 3
Validation of
Incidents
Genuine
Alarm
False
Alarm
Wait/close
ticket
Action/Recommend-
ation with RCA is sent
to the client/
respective teams
A L E R T M A N A G E M E N T
W O R K F L O W
R E S O U R C E M O N I T O R I N G
R E A D Y . S E T . C O M M U T E !
Q U E R Y A N A L Y S I S
R E A D Y . S E T . C O M M U T E !
E R R O R A N A L Y S I S
R E A D Y . S E T . C O M M U T E !
MONITORING PPT.pdf

More Related Content

PPT
MIS Presentation
PPTX
Executive Support System (ESS)
PPT
Role of IT in Business
PPT
DOCX
Kenneth Howard Long_Res_Was
DOCX
Soma_5+_Monitoring_Tools
PPTX
Instana Customer Presentation for apm monitoring
PDF
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
MIS Presentation
Executive Support System (ESS)
Role of IT in Business
Kenneth Howard Long_Res_Was
Soma_5+_Monitoring_Tools
Instana Customer Presentation for apm monitoring
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack

Similar to MONITORING PPT.pdf (20)

PPTX
Cloud Security for U.S. Military Agencies
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PPTX
ISS CAPSTONE TEAM
PDF
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
PPTX
Empowering Uptime with a 24/7 Network Operations Center (NOC)
DOCX
Kristen_Montano_Network_IT_resume
PDF
2019 10-app gate sdp 101 09a
PDF
Standards based security for energy utilities
DOCX
WEEK 6 RESPONSES.docx
DOCX
Michael L Sawall INFOSEC
PDF
Case Study: Datalink—Manage IT monitoring the MSP way
PDF
What is Continuous Monitoring in DevOps.pdf
DOCX
Liberatore_Resume
PDF
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
PPTX
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
PDF
RF_NEC
PDF
What is Continuous Monitoring in DevOps.pdf
PPTX
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
DOCX
seonkimresume-v3.7
PDF
Focus on business, not backups
Cloud Security for U.S. Military Agencies
The Cost of Doing Nothing: A Ransomware Backup Story
ISS CAPSTONE TEAM
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Empowering Uptime with a 24/7 Network Operations Center (NOC)
Kristen_Montano_Network_IT_resume
2019 10-app gate sdp 101 09a
Standards based security for energy utilities
WEEK 6 RESPONSES.docx
Michael L Sawall INFOSEC
Case Study: Datalink—Manage IT monitoring the MSP way
What is Continuous Monitoring in DevOps.pdf
Liberatore_Resume
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
RF_NEC
What is Continuous Monitoring in DevOps.pdf
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
seonkimresume-v3.7
Focus on business, not backups
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Tartificialntelligence_presentation.pptx
PDF
August Patch Tuesday
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Machine Learning_overview_presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Per capita expenditure prediction using model stacking based on satellite ima...
Tartificialntelligence_presentation.pptx
August Patch Tuesday
Mushroom cultivation and it's methods.pdf
Programs and apps: productivity, graphics, security and other tools
Heart disease approach using modified random forest and particle swarm optimi...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine Learning_overview_presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Ad

MONITORING PPT.pdf

  • 1. 2 4 / 7 C L O U D M O N I T O R I N G R E A D Y . S E T . C O M M U T E ! Euphoric Thought Technologies
  • 2. Eliminating potential breaches by providing visibility into files, applications and users. Continually monitoring the cloud to ensure real-time file scans. Regular auditing and reporting to ensure security standards. Merging monitoring tools with different cloud providers. Monitoring cloud data across distributed locations. Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes, devices, logs, events and more. Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users. C L O U D M O N I T O R I N G R E A D Y . S E T . C O M M U T E !
  • 3. C L I E N T O N B O A R D I N G P R O C E S S R E A D Y . S E T . C O M M U T E ! 1) Gather basic information about the client 2) Agrees on SLAs 3) Process Signoff 4) Conduct Training 5) Setup communication channel and ticketing system 6) Obtain access for various systems in place as agreed upon 7) Setup report formats for weekly and monthly and improve on the same Client Onboarding Process
  • 4. T E A M S E T U P R E A D Y . S E T . C O M M U T E ! Team Setup a) Proper Video based training of the current system, Architecture, Applications etc. b) New resource will work with a Sr team member closely for 15 days to understand the process, tools and culture. d) Post the completion of training the resource is then deployed into the project. c) Access to various tools and documents to understand the project.
  • 5. 2 4 / 7 S H I F T M A N A G E M E N T 24/7 structured cloud infra monitoring to manage the cloud Infrastructure. Proper shift handover process with a system in place for documentation, tracking issues, alert management etc. Various communication channels for the team members to interact and react quickly for any incidents. Daily team meetings to present risks, incidents, and emerging threats. We help reduce the MTTR by correlating the Data to the Service. Policy-driven and automation first approach, with in-depth observability, exception-based interventions, and automated / assisted incident handling. R E A D Y . S E T . C O M M U T E !
  • 6. C L O U D I N F R A S U P P O R T Incident Management Availability Management Problem Management Change Management Service Improvement Plan - Make sure all the incidents are closed well within defined SLAs - Identification and availability of all KPIs - Closure of all problem tickets and RCA - Process for urgent changes - Attain stability first and focus on further improvement of process for cost effective utilization of Resources R E A D Y . S E T . C O M M U T E !
  • 7. S E R V I C E L E V E L A G R E E M E N T S Service Desk Cloud infrastructure support operations availability. 99.5% service level uptime at any given month. Service request for change management. Troubleshooting of Cloud infra related issues. System Infrastructure health monitoring monitoring of system parameters (e.g. CPU, memory and hard disk utilization) according to the system monitoring requirement by customer. System performance alerts based on agreed performance threshold with customer. A typical performance threshold is 70% utilization for warning state and 90% utilization for critical state. Highlight performance deviation (as specified by customer). 1. 2. Infrastructure Health Monitoring R E A D Y . S E T . C O M M U T E !
  • 8. S E R V I C E L E V E L A G R E E M E N T S ( C T D ) Auto Scaling Configuration rules Addition of ACL Whitelisting of IP Security Group Rules User Access Management Changing Instance type Addition of disk space to Instance Start/Stop of Instance Backup of Instance image Availability group configuration 3. Service Request & Change Management R E A D Y . S E T . C O M M U T E !
  • 9. S E V E R I T Y L E V E L S Services Outage resulting from failure of application, database, webservers, network devices. Any failure of one of the multiple application, database, webservers or network devices that are configured under high availability using physical redundancy at the same location that does not result in service outage. Any other standalone server or network element in scope. Any Incident of backup activity or Job failure on servers running business applications, web servers, email, DNS and databases. Disruption due to Virus Attack. User ID and access related issues. Disk Quota related issues Any incident of backup activity or Job failure on servers running DHCP etc Antivirus Update failure Patch Upgrade* IMAC changes UserID Creation and Deletion Disc Quota Changes Data backup or restore requests This activity may have a dependency on successful test of patches in UAT/test Environment and /or availability of downtime for the activity. R E A D Y . S E T . C O M M U T E ! Severity Level S 1 - 1 5 m i n u t e s S 2 - 3 0 m i n u t e s S 3 - 4 5 m i n u t e s S 4 - 6 0 m i n u t e s Response Time S2 S1 S3 S4
  • 10. R E P O R T I N G Weekly report highlighting top incidents and recurring incidents with RCA. Consolidated monthly reports. Cloud Services based reports. (ELB, RDS, Queue service etc.) Cloud cost optimization reports etc. Following are the reports which are prepared and sent to customers as part of 24/7 cloud monitoring: R E A D Y . S E T . C O M M U T E !
  • 11. Value added 24/7 Monitoring Offering Value added 24/7 Cloud Monitoring with cloud analytics Enhanced Implementation Comprehensive understanding of the current existing technical landscape for implementing best cloud solutions Disaster Recovery In event of any disaster we ensure safety of your data Quality control and security We ensure secure storage of Data with high level of quality control Cost effective Monitoring the complete utilization and help customers save on their Infra spend O U R V A L U E P R O P O S I T I O N
  • 12. Shift 1 Cloud Infra Resources Basic/advanced analysis of incident 1 2 4 5 Cloudwatch Admin SNS Notification 3 Pager Duty Incident Created Shift 2 Shift 3 Validation of Incidents Genuine Alarm False Alarm Wait/close ticket Action/Recommend- ation with RCA is sent to the client/ respective teams A L E R T M A N A G E M E N T W O R K F L O W
  • 13. R E S O U R C E M O N I T O R I N G R E A D Y . S E T . C O M M U T E !
  • 14. Q U E R Y A N A L Y S I S R E A D Y . S E T . C O M M U T E !
  • 15. E R R O R A N A L Y S I S R E A D Y . S E T . C O M M U T E !