SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Case Study: bet365 Improves Its Odds for Site
Reliability With Unified Monitoring and Contextual
Log Analytics
Scott McKenzie
DO2T40S
DEVOPS-AGILE OPERATIONS
Infrastructure Services Manager
bet365
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of This Presentation
3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Abstract
bet365 is one of the world’s largest online gambling companies. The company’s IT
infrastructure powers the experience for more than 22 million customers worldwide.
Whether a router's CPU is running hot, or a third-party payments provider is having a
bad day, members of the IT operations team at bet365 are the first responders, and
they're expected to respond quickly.
Discover how bet365's unique use of CA Unified Infrastructure Management (CA UIM)
has evolved over the past five years to give it the edge in reducing incident response
and recovery time. The bet365 team will also share how it is planning to leverage log
analytics in conjunction with CA UIM to speed mean time to repair.
Scott
McKenzie
bet365
Infrastructure
Services Manager
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agenda
WHO AM I?
WHO IS BET365?
NEXT STEPS
WHY DOES BET365 USE CA UNIFIED INFRASTRUCTURE MANAGEMENT (CA UIM)?
HOW DOES BET365 USE CA UIM?
WHAT HAVE WE LEARNED?
1
2
3
4
5
6
5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Who Am I?
1997-2001
Computer Science with Industrial
Experience
2001-2006
Service Delivery Manager, IBM Global
Services
2006-2011
Service Delivery/IT Operations Manager
(Started using CA UIM)
2011-Current
Infrastructure Services Manager
- IT Ops, Business Continuity, Service Design
6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Who Is bet365?
▪ “The world’s favourite online sports betting company.”
– Online sports betting + gaming
– Over 23 million registered customers
– Employing over 3,500 staff in multiple countries
▪ 2017 results:
– £46.9bn in Sports bets (+27%)
– £2.15bn revenue (+39%)
– £503.9m pre-tax profit (+9.8%)
The Business
7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Cost of Downtime Per Second at bet365
£68.18
Revenue
£15.98
Profit
£1,487
Sports Bets
8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Who Is bet365?
▪ In-play
– 72% of all sports bets
▪ Live streaming
– 140,000 events/year
▪ Cash out
▪ Edit bet
▪ Casino, poker, games and bingo
The Products
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Who Is bet365?
The Technologies
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Why Does bet365 Use CA UIM?
Before CA UIM (2011)
SNMP/Syslog: ~ 1 min
SMTP: 1-5 mins
11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Why Does bet365 Use CA UIM?
▪ Service requirements
– Fit-for-purpose alarm workflow
– Custom dashboard engine
▪ Technical requirements
– Comprehensive, modern technology
coverage
– On-premise hosting + SQL Server
database
– Custom integration with other systems
Product Selection
12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
How Does bet365 Use CA UIM?
▪ Architecture
▪ Standard monitoring
▪ Custom monitoring
▪ Custom dashboards
▪ Integration
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Architecture Designed for Scale and Resilience
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Standard Allows for Immediate Incident Response
Alarm Severity IT Operations Action BMC Remedy SLA
Critical Immediate escalation Critical
Major Immediate escalation High
Minor Assign ticket to relevant team Medium
Warning Assign ticket to relevant team Low
Informational None None
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Flexible Monitoring for Microsoft® Windows® Systems and Services
CPU, Disk,
Memory
Event Log Perf Metrics Services Processes Cluster
Windows
SQL Server
Windows Cluster
Active Directory
DHCP
Standard
Enhanced
Standard Standard Standard
Enhanced Enhanced Standard
Standard Standard Standard Standard Standard
Standard Enhanced Enhanced Enhanced
Standard Enhanced Standard Enhanced
Enhanced
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Standard monitoring packages for key technologies provide immediate value
17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
▪ Citrix® NetScaler®
– bet365 choice for load balancing
– Hundreds of servers
– Multiple locations for resilience
– Complex config
– Simple monitoring?
Custom Monitoring (Service Groups) Meets Unique Needs
18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
▪ bet365 solution
– Custom Java probe written
in-house
– Interrogates NetScaler via
SNMP
– Returns alarms + QoS
Custom Monitoring – Netscaler Service Groups
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
▪ Specific use case based on bet365 service standards
▪ bet365 solution:
– Custom Java probe written by bet365 to check running state
Custom Monitoring – Active/Standby Services
Primary Secondary Alarm Response
Running Stopped Informational N/A - Normal running state.
Stopped Running Informational Confirm with service owner during regular checks.
Stopped Stopped Major Attempt to start on Primary server + Escalate.
Running Running Major Attempt to stop on Secondary server + Escalate.
20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
▪ CA UIM system health
▪ Alarm propagation
▪ HTML5 dashboards
Custom Dashboards Provide Unique Insights
21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Custom Dashboards – System Health
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Custom Dashboards – Alarm Propagation
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Custom Dashboards – HTML5 – Mobile Friendly
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Integration – CA App Synthetic Monitor
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
▪ BMC Remedy gateway probe running
on CA UIM hub
▪ URL action in USM makes 2 API calls:
1. Open INC ticket with CA UIM-to-
Remedy field mappings
2. Return INC number to CA UIM
Integration – BMC Remedy
26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
CA UIM at bet365
Integration – Alarm URL Actions Enable Rapid Issue Resolution
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What Have We Learned?
1. Document and agree monitoring configuration
2. Build monitoring config into deployment process
3. Increase focus on servers running custom probes
4. Control the addition of new QoS metrics
5. Appoint a dedicated team to manage CA UIM
Top Five Tips
28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What’s Next?
▪ Prerequisites:
– CA UIM 8.5.1
– CA Digital Operational Intelligence
– Data Studio (Kibana)
– Kafka/Zookeeper
– Elasticsearch
– PostgreSQL (or Oracle)
▪ Initial use case:
– Active Directory re-architecture
Log Analytics in Conjunction With CA Digital Operational Intelligence
29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What’s Next?
▪ Capacity Predictive Analytics (CA Digital Operational Intelligence)
– Deploying pre-release to test environment
▪ CA UIM certification
– v8.5 courses and exams
▪ Ongoing improvements
– Rewrite custom probes to use QoS for status instead of alarms
– Auto-provisioning of config during automated deployment process
30 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Summary Benefits With CA UIM
ENHANCED
VISIBILITY ACROSS
HYBRID IT
SUPERIOR END-
USER EXPERIENCE
FASTER IT
OPERATIONS
FASTER ISSUE
RESOLUTION
WORKFLOWS
Reduced
number of
tools from
5 to 1
IMPROVED
INCIDENT
RESPONSE
FUTURE PROOF
MONITORING
APPROACH
31 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Questions?
32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.
33 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DevSecOps
For more information on DevSecOps,
please visit: http://cainc.to/CAW17-DevSecOps

Mais conteúdo relacionado

Mais procurados

From Business model to Capability Map
From Business model to Capability Map From Business model to Capability Map
From Business model to Capability Map COMPETENSIS
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signalsaccenture
 
ARCHIMATE Physical layer "My Little PanCake Factory"
ARCHIMATE Physical layer "My Little PanCake Factory"ARCHIMATE Physical layer "My Little PanCake Factory"
ARCHIMATE Physical layer "My Little PanCake Factory"COMPETENSIS
 
DBaaS in the Real World: Risks, Rewards & Tradeoffs
DBaaS in the Real World: Risks, Rewards & TradeoffsDBaaS in the Real World: Risks, Rewards & Tradeoffs
DBaaS in the Real World: Risks, Rewards & TradeoffsScyllaDB
 
121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptxAustraliaChapterIIBA
 
Qualitykiosk And Its Deliverables
Qualitykiosk And Its DeliverablesQualitykiosk And Its Deliverables
Qualitykiosk And Its Deliverablesbibhupadhi
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platformaccenture
 
Singlife Philippines - Insurer transformation Award 2022
Singlife Philippines - Insurer transformation Award 2022Singlife Philippines - Insurer transformation Award 2022
Singlife Philippines - Insurer transformation Award 2022The Digital Insurer
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 
Technology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | AccentureTechnology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | Accentureaccenture
 
Enterprise Architecture & IT standards
Enterprise Architecture &  IT standardsEnterprise Architecture &  IT standards
Enterprise Architecture & IT standardsLouw Labuschagne
 
The ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureThe ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureIver Band
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motionconfluent
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
Creating Revenue from Customer Data
Creating Revenue from Customer DataCreating Revenue from Customer Data
Creating Revenue from Customer Dataaccenture
 
Enterprise Architecture – Vision and Reality on the Same Page
Enterprise Architecture – Vision and Reality on the Same PageEnterprise Architecture – Vision and Reality on the Same Page
Enterprise Architecture – Vision and Reality on the Same PageSimon Polovina
 
How to establish Enterprise Architecture in large organisations using TOGAF
How to establish Enterprise Architecture in large organisations using TOGAFHow to establish Enterprise Architecture in large organisations using TOGAF
How to establish Enterprise Architecture in large organisations using TOGAFNemanja Kostic
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architectureiasaglobal
 
High Tech Digital Transformation
High Tech Digital TransformationHigh Tech Digital Transformation
High Tech Digital Transformationaccenture
 

Mais procurados (20)

From Business model to Capability Map
From Business model to Capability Map From Business model to Capability Map
From Business model to Capability Map
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signals
 
ARCHIMATE Physical layer "My Little PanCake Factory"
ARCHIMATE Physical layer "My Little PanCake Factory"ARCHIMATE Physical layer "My Little PanCake Factory"
ARCHIMATE Physical layer "My Little PanCake Factory"
 
DBaaS in the Real World: Risks, Rewards & Tradeoffs
DBaaS in the Real World: Risks, Rewards & TradeoffsDBaaS in the Real World: Risks, Rewards & Tradeoffs
DBaaS in the Real World: Risks, Rewards & Tradeoffs
 
121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx121022 - The art of getting business analysis right - slide deck.pptx
121022 - The art of getting business analysis right - slide deck.pptx
 
Qualitykiosk And Its Deliverables
Qualitykiosk And Its DeliverablesQualitykiosk And Its Deliverables
Qualitykiosk And Its Deliverables
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platform
 
CSS Grid Layout
CSS Grid LayoutCSS Grid Layout
CSS Grid Layout
 
Singlife Philippines - Insurer transformation Award 2022
Singlife Philippines - Insurer transformation Award 2022Singlife Philippines - Insurer transformation Award 2022
Singlife Philippines - Insurer transformation Award 2022
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 
Technology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | AccentureTechnology Vision 2022: Communications Industry | Accenture
Technology Vision 2022: Communications Industry | Accenture
 
Enterprise Architecture & IT standards
Enterprise Architecture &  IT standardsEnterprise Architecture &  IT standards
Enterprise Architecture & IT standards
 
The ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution ArchitectureThe ArchiMate Language for Enterprise and Solution Architecture
The ArchiMate Language for Enterprise and Solution Architecture
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
Creating Revenue from Customer Data
Creating Revenue from Customer DataCreating Revenue from Customer Data
Creating Revenue from Customer Data
 
Enterprise Architecture – Vision and Reality on the Same Page
Enterprise Architecture – Vision and Reality on the Same PageEnterprise Architecture – Vision and Reality on the Same Page
Enterprise Architecture – Vision and Reality on the Same Page
 
How to establish Enterprise Architecture in large organisations using TOGAF
How to establish Enterprise Architecture in large organisations using TOGAFHow to establish Enterprise Architecture in large organisations using TOGAF
How to establish Enterprise Architecture in large organisations using TOGAF
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architecture
 
High Tech Digital Transformation
High Tech Digital TransformationHigh Tech Digital Transformation
High Tech Digital Transformation
 

Semelhante a Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monitoring and Contextual Log Analytics

Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
 
The role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial InformaticsThe role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial InformaticsAerospike, Inc.
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
New ThousandEyes Product Features and Release Highlights
New ThousandEyes Product Features and Release HighlightsNew ThousandEyes Product Features and Release Highlights
New ThousandEyes Product Features and Release HighlightsThousandEyes
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...Cisco Canada
 
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...NetworkCollaborators
 
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...Amazon Web Services
 
New ThousandEyes Product Features and Release Highlights: August 2022
New ThousandEyes Product Features and Release Highlights: August 2022New ThousandEyes Product Features and Release Highlights: August 2022
New ThousandEyes Product Features and Release Highlights: August 2022ThousandEyes
 
Building ML platforms in Financial Services with serverless technology - FSV2...
Building ML platforms in Financial Services with serverless technology - FSV2...Building ML platforms in Financial Services with serverless technology - FSV2...
Building ML platforms in Financial Services with serverless technology - FSV2...Amazon Web Services
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking NetworkCollaborators
 
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...Amazon Web Services
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...Nur Shiqim Chok
 
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...New Relic
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...Nur Shiqim Chok
 

Semelhante a Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monitoring and Contextual Log Analytics (20)

Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
The role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial InformaticsThe role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial Informatics
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
New ThousandEyes Product Features and Release Highlights
New ThousandEyes Product Features and Release HighlightsNew ThousandEyes Product Features and Release Highlights
New ThousandEyes Product Features and Release Highlights
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
 
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
 
New ThousandEyes Product Features and Release Highlights: August 2022
New ThousandEyes Product Features and Release Highlights: August 2022New ThousandEyes Product Features and Release Highlights: August 2022
New ThousandEyes Product Features and Release Highlights: August 2022
 
Building ML platforms in Financial Services with serverless technology - FSV2...
Building ML platforms in Financial Services with serverless technology - FSV2...Building ML platforms in Financial Services with serverless technology - FSV2...
Building ML platforms in Financial Services with serverless technology - FSV2...
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...
Blockchain for Media & Entertainment - Buzz or Real? (MAE315) - AWS re:Invent...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
 
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
 
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monitoring and Contextual Log Analytics

  • 1. Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monitoring and Contextual Log Analytics Scott McKenzie DO2T40S DEVOPS-AGILE OPERATIONS Infrastructure Services Manager bet365
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of This Presentation
  • 3. 3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Abstract bet365 is one of the world’s largest online gambling companies. The company’s IT infrastructure powers the experience for more than 22 million customers worldwide. Whether a router's CPU is running hot, or a third-party payments provider is having a bad day, members of the IT operations team at bet365 are the first responders, and they're expected to respond quickly. Discover how bet365's unique use of CA Unified Infrastructure Management (CA UIM) has evolved over the past five years to give it the edge in reducing incident response and recovery time. The bet365 team will also share how it is planning to leverage log analytics in conjunction with CA UIM to speed mean time to repair. Scott McKenzie bet365 Infrastructure Services Manager
  • 4. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agenda WHO AM I? WHO IS BET365? NEXT STEPS WHY DOES BET365 USE CA UNIFIED INFRASTRUCTURE MANAGEMENT (CA UIM)? HOW DOES BET365 USE CA UIM? WHAT HAVE WE LEARNED? 1 2 3 4 5 6
  • 5. 5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Who Am I? 1997-2001 Computer Science with Industrial Experience 2001-2006 Service Delivery Manager, IBM Global Services 2006-2011 Service Delivery/IT Operations Manager (Started using CA UIM) 2011-Current Infrastructure Services Manager - IT Ops, Business Continuity, Service Design
  • 6. 6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Who Is bet365? ▪ “The world’s favourite online sports betting company.” – Online sports betting + gaming – Over 23 million registered customers – Employing over 3,500 staff in multiple countries ▪ 2017 results: – £46.9bn in Sports bets (+27%) – £2.15bn revenue (+39%) – £503.9m pre-tax profit (+9.8%) The Business
  • 7. 7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Cost of Downtime Per Second at bet365 £68.18 Revenue £15.98 Profit £1,487 Sports Bets
  • 8. 8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Who Is bet365? ▪ In-play – 72% of all sports bets ▪ Live streaming – 140,000 events/year ▪ Cash out ▪ Edit bet ▪ Casino, poker, games and bingo The Products
  • 9. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Who Is bet365? The Technologies
  • 10. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Why Does bet365 Use CA UIM? Before CA UIM (2011) SNMP/Syslog: ~ 1 min SMTP: 1-5 mins
  • 11. 11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Why Does bet365 Use CA UIM? ▪ Service requirements – Fit-for-purpose alarm workflow – Custom dashboard engine ▪ Technical requirements – Comprehensive, modern technology coverage – On-premise hosting + SQL Server database – Custom integration with other systems Product Selection
  • 12. 12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS How Does bet365 Use CA UIM? ▪ Architecture ▪ Standard monitoring ▪ Custom monitoring ▪ Custom dashboards ▪ Integration
  • 13. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Architecture Designed for Scale and Resilience
  • 14. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Standard Allows for Immediate Incident Response Alarm Severity IT Operations Action BMC Remedy SLA Critical Immediate escalation Critical Major Immediate escalation High Minor Assign ticket to relevant team Medium Warning Assign ticket to relevant team Low Informational None None
  • 15. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Flexible Monitoring for Microsoft® Windows® Systems and Services CPU, Disk, Memory Event Log Perf Metrics Services Processes Cluster Windows SQL Server Windows Cluster Active Directory DHCP Standard Enhanced Standard Standard Standard Enhanced Enhanced Standard Standard Standard Standard Standard Standard Standard Enhanced Enhanced Enhanced Standard Enhanced Standard Enhanced Enhanced
  • 16. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Standard monitoring packages for key technologies provide immediate value
  • 17. 17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 ▪ Citrix® NetScaler® – bet365 choice for load balancing – Hundreds of servers – Multiple locations for resilience – Complex config – Simple monitoring? Custom Monitoring (Service Groups) Meets Unique Needs
  • 18. 18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 ▪ bet365 solution – Custom Java probe written in-house – Interrogates NetScaler via SNMP – Returns alarms + QoS Custom Monitoring – Netscaler Service Groups
  • 19. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 ▪ Specific use case based on bet365 service standards ▪ bet365 solution: – Custom Java probe written by bet365 to check running state Custom Monitoring – Active/Standby Services Primary Secondary Alarm Response Running Stopped Informational N/A - Normal running state. Stopped Running Informational Confirm with service owner during regular checks. Stopped Stopped Major Attempt to start on Primary server + Escalate. Running Running Major Attempt to stop on Secondary server + Escalate.
  • 20. 20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 ▪ CA UIM system health ▪ Alarm propagation ▪ HTML5 dashboards Custom Dashboards Provide Unique Insights
  • 21. 21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Custom Dashboards – System Health
  • 22. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Custom Dashboards – Alarm Propagation
  • 23. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Custom Dashboards – HTML5 – Mobile Friendly
  • 24. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Integration – CA App Synthetic Monitor
  • 25. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 ▪ BMC Remedy gateway probe running on CA UIM hub ▪ URL action in USM makes 2 API calls: 1. Open INC ticket with CA UIM-to- Remedy field mappings 2. Return INC number to CA UIM Integration – BMC Remedy
  • 26. 26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS CA UIM at bet365 Integration – Alarm URL Actions Enable Rapid Issue Resolution
  • 27. 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What Have We Learned? 1. Document and agree monitoring configuration 2. Build monitoring config into deployment process 3. Increase focus on servers running custom probes 4. Control the addition of new QoS metrics 5. Appoint a dedicated team to manage CA UIM Top Five Tips
  • 28. 28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What’s Next? ▪ Prerequisites: – CA UIM 8.5.1 – CA Digital Operational Intelligence – Data Studio (Kibana) – Kafka/Zookeeper – Elasticsearch – PostgreSQL (or Oracle) ▪ Initial use case: – Active Directory re-architecture Log Analytics in Conjunction With CA Digital Operational Intelligence
  • 29. 29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What’s Next? ▪ Capacity Predictive Analytics (CA Digital Operational Intelligence) – Deploying pre-release to test environment ▪ CA UIM certification – v8.5 courses and exams ▪ Ongoing improvements – Rewrite custom probes to use QoS for status instead of alarms – Auto-provisioning of config during automated deployment process
  • 30. 30 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Summary Benefits With CA UIM ENHANCED VISIBILITY ACROSS HYBRID IT SUPERIOR END- USER EXPERIENCE FASTER IT OPERATIONS FASTER ISSUE RESOLUTION WORKFLOWS Reduced number of tools from 5 to 1 IMPROVED INCIDENT RESPONSE FUTURE PROOF MONITORING APPROACH
  • 31. 31 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Questions?
  • 32. 32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.
  • 33. 33 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DevSecOps For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps