Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hybrid Cloud for Architects

You're reading from   Hybrid Cloud for Architects Build robust hybrid cloud solutions using AWS and OpenStack

Arrow left icon
Product type Paperback
Published in Feb 2018
Publisher Packt
ISBN-13 9781788623513
Length 290 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Alok Shrivastwa Alok Shrivastwa
Author Profile Icon Alok Shrivastwa
Alok Shrivastwa
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Introducing Hybrid Cloud 2. Hybrid Cloud – Why Does It Matter? FREE CHAPTER 3. Hybrid Cloud Building Blocks 4. Architecting the Underpinning Services 5. Hybrid Cloud Deployment – Architecture and Preparation 6. Building a Traditional CMP-Based Hybrid Cloud 7. Building a Containerized Hybrid Cloud 8. Using PreBuilt Hybrid Cloud Solutions 9. DevOps in the Hybrid Cloud 10. Monitoring the Hybrid Cloud 11. Security in a Hybrid Cloud 12. Other Books You May Enjoy

The traditional concepts in monitoring


Monitoring is a problem that has been solved in many different ways for many different levels of stack. Let's take a look at different demographics of monitoring:

  • Availability monitoring (up/down monitoring) 
  • Performance monitoring (time series—CPU, memory, utilization, and so on) 

In the infrastructure side of things, availability monitoring and performance monitoring are both used, but the application side is a little heavy on the performance monitoring as the availability of the application is monitored on the infrastructure level itself by the load balancers and the likes.

The following diagram shows the different protocols that are generally used in monitoring systems of different types:

Availability monitoring 

This is the simplest kind of monitoring, which marks the object that is being monitored as either up or down. This is generally done using several protocols such as ICMP (ICMP_ECHO) and sometimes even TCP and UDP (or enhanced verification on...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime