To begin with monitoring, you could think of different commonly implemented strategies as a solution to your problem. Some of the commonly implemented strategies are:
- Application/system monitoring
- Real-user monitoring
- Semantic monitoring and synthetic transactions
- Profiling
- Endpoint monitoring
Just bear in mind that each one of these strategies is focused on solving a specific purpose. While one could be helpful in analyzing transaction propagation, the other could be suitable for testing purposes. So it is important for you to pick a combination of these when designing the whole system, since just using a single strategy won't meet the needs.