Page | 1 Tutorial
Transcription
Page | 1 Tutorial
IT Operations Analytics Reimagined Tutorial ......................................................................................................................................................................................... 3 Meet Stacy ............................................................................................................................................................................... 3 Getting Started............................................................................................................................................................................. 6 Dashboard FAQs........................................................................................................................................................................... 9 Third-Party License Acknowledgements .................................................................................................................................... 11 Copyright © 2015 CA. All rights reserved Page | 1 IT Operations Analytics Reimagined This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. The use of any software product referenced in the Documentation is governed by the applicable license agreement and such license agreement is not modified in any way by the terms of this notice. The manufacturer of this Documentation is CA. Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Copyright © 2015 CA. All rights reserved Page | 2 IT Operations Analytics Reimagined Stacy is an IT Operations analyst working with atoz Inc, an eCommerce company based out of United States. She has been tasked with monitoring the atoz portal and identifying any security threats, traffic bottlenecks, and any other anomalous events. She also wants to know high-traffic time periods and geographies so that she can see if they have enough infrastructure to support the traffic in the different geographies. This tutorial explains how Stacy uses forty2.io in her day job to accomplish her goals. Stacy fetches the latest Apache log from the Apache server that hosts the atoz portal. She wants to run the log file through the forty2.io system to see what is going on: Upload Log File and Create Dashboard 1. Log in to the Forty2.io instance. Note: If you do not have a login yet, sign up for our beta program. 2. Click New Dashboard on the Home page. 3. Follow the instructions in the wizard to upload the log file and create the dashboard in two easy steps. Goals: Upload log file View the dashboard Review anomalies Your dashboard is ready. The following screenshot shows a sample dashboard: Copyright © 2015 CA. All rights reserved Page | 3 IT Operations Analytics Reimagined Review Anomalies As a first thing, Stacy looks at the alerts to see if there are any anomalies that she should attend to immediately. The following screenshot shows a sample alert pane: She observes that IP 211.12.205.134 has issued 2881 requests in just an hours’ time. She decides to investigate the issue further as it looks suspicious. Investigate the Request Spike 1. Expand the alert to view more details and options. 2. Click Show me to apply the IP and time filters to the charts and log lines. The dashboard and the log viewer are filtered contextually for the selected alert. This helps in identifying the root cause of the problem. 3. Review the filtered charts to gather additional insights into the issue. For example, the IP is from Australia and the hits are from various pages from example.com. Goals: Investigate issues Take action on alerts Dismiss alerts Review charts and draw action plan After Stacy gathers enough information about the issue, she decides to notify the system administrator. Take Action on Alerts 1. Expand the alert and click Actions. 2. Click Mail your admin. 3. Specify the email ID of the admin and explain the issue and the findings. She knows that some alerts are not really anomalies. She decides to dismiss those alerts so that she does not see them again. For example, she wants to dismiss the “Request spike to “-“” alert. Dismiss Alerts 1. Hover over the alert and click “x”. 2. Click Yes to dismiss the alert. Review Charts and Draw Action Plan After she has handled the high severity alerts, she looks at the dashboard to do predictive analysis. She looks at the Geo map and realizes that there is a spike in requests from India, though they don’t offer services in India. She notes down to monitor the trend and see if there is a potential market in India. Copyright © 2015 CA. All rights reserved Page | 4 IT Operations Analytics Reimagined She also sees the 403 Forbidden responses were from a particular region in North America. This is due to a sudden spurt in the requests from that region. The servers in that region were not able to handle the increased load and hence resulted in 403 errors. She notes down to monitor the trend and see if there is a need to deploy additional servers in that region. Stacy thus accomplishes her goals and is ready with her action plan to report to management. Copyright © 2015 CA. All rights reserved Page | 5 IT Operations Analytics Reimagined Forty2.io is an analytics platform that analyzes the log files that are generated from your websites and applications. Most often, such machine-generated data is high in volume, velocity, and variety. At the same time, the data is highly valuable for the wealth of information and data points that it contains. The analysis of such data helps in making timely and informed business decisions. Forty2.io provides the following key features: Helps gain insights into anomalous transactions and events, and helps identify the root cause. Detects situations relating to inefficiencies, opportunities, and threats. Takes advantage of pattern recognition and anomaly detection. Provides actionable insights into IT operational data. Get started with the analysis of your first log file. Supported Browsers Use Google Chrome to access the UI. Supported Log File Forty2.io supports Apache log files, both custom and combined formats. Step 1: Upload the Log File and Create Dashboard As a first step, upload your log file and let Forty2.io create a visual dashboard for you. Click New Dashboard on the home page and follow the instructions in the wizard to create a dashboard. Consider the following factors: Use a smaller file (less than 100 MB) to begin with. As a trial user, you have an upload limit of 1 GB for an account. So, ensure that you have enough space before you upload a file. If you do not have enough space, delete existing dashboards to make more space. You can select any layout while creating a dashboard. You can change the layout later. Copyright © 2015 CA. All rights reserved Page | 6 IT Operations Analytics Reimagined The following screenshot shows a sample Apache dashboard: Step 2: Review Alerts and Take Action An alert indicates an anomalous event in the log file. For example, there could be an unusual spike in requests from a particular IP address, which looks suspicious. This could be a potential threat and may need further investigation. The alerts are sorted in the reverse chronological order of their occurrence, and then by their severity. So, the most recent alert appears first in the list. Review the alerts to see whether there are any anomalous events that need immediate action. Follow these steps: 1. Open the dashboard for the log file. 2. Click the alerts icon to view the list of alerts. The following screenshot shows a sample alerts pane: 3. Hover over an alert and expand to view more details and other options. 4. Click Show Me to view the charts and log lines specific to the alert. 5. Click a chart segment to drill into the details. For example, if you are investigating "404" responses alert, click the "404" segment in "Request Count for HTTP Responses" chart. 6. Click Actions to take an appropriate an action for the alert. Note: The Actions button is enabled only for those alerts that have a recommendation. Currently, the recommendations are available only for alerts related to IP address. For example, depending on the severity of the alert, you are recommended to either block or monitor the IP. Copyright © 2015 CA. All rights reserved Page | 7 IT Operations Analytics Reimagined Dismiss an Alert An alert can be an anomaly that you have to deal with or simply a false positive or known issue. Dismissing an alert lets the product know that you do not want to see that alert in the dashboard again. To dismiss an alert, click the X button in the alert. Note: The dismissal applies only for the current log file that you are visualizing. If you add another file that has a similar alert, the alert would resurface in the dashboard. You can dismiss the alert again. Step 3: Review Charts and Investigate Issues The dashboard includes charts that are derived by analyzing the logs from operational perspective. As a business analyst, you can gain insights into the events and make informed decisions based on data. Click on a particular segment in the chart or a time range to view the log lines and alerts specific to the selected segment. Step 4: (Optional) Change the Layout The initial dashboard layout is based on the layout that you chose at the time of creating the dashboard. You can change the layout if you need more space for a chart, for example. Choose a layout that has wider tiles in this case. To change the dashboard layout, click the pencil icon at the upper-right corner of the dashboard. Copyright © 2015 CA. All rights reserved Page | 8 IT Operations Analytics Reimagined Q1: Can multiple users log in to the product with the same login credentials? Yes, the product supports multiple sessions for a user account. So, multiple users can log in to an account simultaneously, upload files, create, and view dashboards. Q2: How can I remove the chart filter? When you click on a chart segment or the links on the alert, the remaining charts, alerts, and log lines are filtered for the selected segment. The filter is added at the bottom of the alerts pane. Hover over the filter to delete it and return to the previous state. Q2. How are alerts generated? An alert indicates an anomalous event in the log file. An anomaly can be a spike or drop in a value that is of interest to you. The values are compared on an hourly interval to identify the anomaly. For example, a web page receives 200-300 requests per hour, over a period of ten hours. However, in one particular hour, there were 500 requests to the page. The latter is treated as an anomaly. Q3: How are alerts sorted? The alerts are first sorted by time, and then by their severity. So, the most recent alert appears first. Alerts that occurred at the same interval are then sorted by their severity. Q4: How can I mark an alert as a false positive so that it never appears in the dashboard again? Hover over the alert and click "X" to dismiss the alert. The dismissal applies only for the dashboard that you are currently visualizing. If you reupload the same file or you upload a similar data file to a different dashboard, the alert resurfaces. You can dismiss the alert again. Q5: Why do I not see the Actions button for some alerts? The Actions button is available only for alerts that have a recommended action; not all alerts have recommended actions. Q7: How can I view the log lines specific to a particular segment in the chart? Click the chart segment; notice that the log lines are automatically filtered for the selected segment. Q8: How can I view the alerts specific to a particular segment in the chart? Click the chart segment; notice that the alerts are automatically filtered for the selected segment. Q9: How are the log files Analyzed? 1. The product analyzes the uploaded file, and identifies the fields and their data types. Copyright © 2015 CA. All rights reserved Page | 9 IT Operations Analytics Reimagined 2. The file type, field labels, and data types are then stored and processed using data science algorithms. 3. The data science component identifies the anomalies and the important features in the data file.The important features are calculated based on the number of anomalous events for a particular field and their severities. 4. The important features are then plotted on charts and the anomalies are raised as alerts in the dashboard. Copyright © 2015 CA. All rights reserved Page | 10 IT Operations Analytics Reimagined To view the software license information for any of the listed components that Forty2.io uses, download the Third_Party_License_Acknowledgements.zip file from the forty2.io site. Component TPSR ID boost 1.55.0 00000743_12 Bootstrap Tour 0.10.2 00001396_1 Python client for Elasticsearch 1.6.0 00001396_10 pandas 0.16.2 00001396_11 requests 2.7.0 00001396_12 colors.js 1.1.2 00001396_15 connect-ensure-login 0.1.1 00001396_16 connect-flash 0.1.1 00001396_17 expressjs/cookie-parser 1.4.0 00001396_18 mde/ejs 2.3.4 00001396_19 elasticsearch 1.7.2 00001396_2 express-session 1.11.3 00001396_20 passport 0.3.0 00001396_21 passport-local 1.0.0 00001396_22 body-parser 1.14.1 00001396_23 express 4.13.3 00001396_24 http-proxy 1.11.2 00001396_25 morgan 1.6.1 00001396_26 NPM 2.14.6 00001396_27 yargs 3.26.0 00001396_28 Here map JavaScipt API 2.5.3 00001396_29 Copyright © 2015 CA. All rights reserved Page | 11 IT Operations Analytics Reimagined winston logger 1.1.1 00001396_30 Logstash 1.5.4 00001396_3 scikit learn 0.17 00001396_31 Kafka 0.8.2.1 00001396_4 Kibana 4.1.0 00001396_5 OpenSSL 1.0.0g 00001396_6 JSON spirit 4.08 00001396_7 gridster 0.5.6 00001396_8 scipy 0.12.1-3.el7 00001396_9 Copyright © 2015 CA. All rights reserved Page | 12