VL 7 Flashcards

1
Q

Observable system

A

Exposes enough data about itself so that generating information and easy accessing this info becomes simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purposes of monitoring: infrastructure level

A

Resource management
Incident detection
Root cause analysis
Auditing
Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Purposes of monitoring: application level

A

Performance analysis
Resource management
Failure detection
SLA verification
Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Target system: parallel system

A

• Batch system
• Data are collected during an application run.
• Analysis happens post mortem.
• Execution is reproducable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Target system: cloud

A

• Interactive system
• Data are continuously produced - Realtime Data
• Realtime analysis
Data used for
• Immediate action or
• Study past system behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three pillars of monitoring

A

Metrics(data to use for monitoring)
Logs
Traces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Important metrics

A

Latency: time it takes to do request
Throughput or traffic
Error rate
Utilization or saturation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitoring system requirements

A

• Comprehensive (collect everything that is available)
• Low intrusion
• Extensibility
• Scalability
• Elasticity
• Accuracy
• Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blackbox monitoring

A

(Cannot look what happened when processing request)
• The monitored system is handled as a black box.
repust
• No data are gained from the inside of the system.
• E.g. only the request interface of a service is visible nothing about the internal structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

White box monitoring

A

• Data is also from the inside of the system.
• This gives more context and more detailed insights.
• E.g. Internal organization of a service is visible, e.g., asynchronous internal handling of requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Overheads

A

• lead to intrusion
reasons:
•Instrumentation
• Computation for aggregations
• Memory overhead for buffering
• Time to push to disk or transfer to collector
• Storage overhead for long-term storage
Reduction techniques:
• Number of metrics
• Measurement frequency
• Representation
• Batching
• Sampling
• Long-term coarsening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Event logs: form

A

Plaintext
Structured (typically json)
Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prometheus

A

Open source monitoring system

• Features
• Metric collection in form of time series
• Storage by a time series database
• Query language for accessing the time series
• Alerting
• Visualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Borgmon

A

• Provides measurement of metrics
• Storing as time series
• Rule for aggregation
• Hierarchical design for scalability

Usage
• Alerting
• Dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributed Tracing - Google Dapper

A

• Capture the interaction of different services
• Capture the individual events, e.g., submit a request, receive the request, start processing, ….., submit answer, receive answer
Associate events with a given request to be able to analyze the execution of this request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Google dapper: designed for

A

• Continuous and ubiquitous tracing
• Low-overhead
• Application transparency
• Scalability

17
Q

Dapper:security and privacy

A

Doesn’t collect any payload data
Can be used to enforce security policies
Such runtime verification provides greater assurance than source code audits

18
Q

Managing overheads

A

Coalescing events
Asynchronous writes
Adaptive samping at the application
Adaptive sampling at collection time