“The Phoenix Project” – An Outline to DevOps Success
By: Andy Hart >>
The Phoenix Project Book
I recently read a great novel, “The Phoenix Project” by Gene Kim et al. The book details the journey of ‘Bill’, a new Vice President of IT Operations, and his struggles to gain control over a critical corporate project while wrestling with continuous critical operational issues. Through his experiences, Bill discovers that there are 4 types of work:
Internal IT Projects
The first ...
Use Process Sets to Monitor More Efficiently and Reduce Monitoring Costs
If you are like most IT Operations folks, you always have too much to do with too little time. Change management moves at the speed of light. New applications get deployed by someone on the business apps team, but this information never makes it over to the IT Operations team. This means that the application is partially or totally off the grid and unmonitored. The first time you even realize it exists is when there is a performance or availability problem and your end users start calling in and complaining. It seems like there just aren’t enough hours in the day to track all of the new applications coming up, let alone effectively monitor them.
You know that in order to fully understand the load on your system resources, you need to know about the performance of each critical process associated with an application or service running on the server. However, knowing what processes are important for different applications and configuring the monitoring processes individually is very labor-intensive. Process monitoring consumes even more of your already limited cycles ─ unless you have a dynamic, easy-to-maintain, rules-based approach to process monitoring.
Hey! Who Stole My CPU?!
In some recent conversations with customers around the different types of key performance indicators, or KPIs, they are interested in monitoring, the topic of “stolen CPU” came up several times. Based on these recent discussions, we thought we would share a bit more information with you about this whole idea of stolen CPU, as well as how you can monitor for stolen CPU .
What is “Stolen CPU”?
CPU gets “stolen” when a virtual machine (VM) is forced to sit around and wait for ...
Cloud Link Roundup #75 – Facebook’s Cold Data Storage, Ubuntu DevOps, OpenStack
Every Friday, Zenoss highlights some of the best posts from the week. Here are some great articles they selected from the week of 10/15/2012 that are worth taking a look at.
What “unbelievable” new services does Amazon have on tap? by Barb Darrow | Cloud Computing News
What sort of amazing cloud services could Amazon have up its sleeve? Werner Vogels ain’t saying anything in detail but here are five things to watch out for where the public cloud services giant is concerned.
Cloud Link Roundup #73 – Citrix Project Windsor, Converged Infrastructure, Cloudbees
Every Friday, Zenoss highlights some of the best posts from the week. Here are some great articles they selected from the week of 10/1/2012 that are worth taking a look at.
Citrix cashes in and unites Xen, CloudStack investments in Project Windsor by Paula Rooney | ZDNet
Citrix this week unveiled XenServer 6.1 upgrade that is tightly integrated with (its formerly owned) CloudStack open source cloud platform as it sets it sights on a new architecture known as "Windsor" that will merge ...