SlideShare a Scribd company logo
IT Problems & Problem Management
Session Date & Time
• Date: Wednesday, June 29, 2016
Time: 1100-1145
Location: Tuscany Ballroom
• Bill Alderson responds to Information Technology high
visibility, high stakes technical problems. Network outage,
slowness, slow applications or disasters affecting
government and commercial Information Technology
Enterprise environments. ABC News told the story of how
Bill and his team helped restore communications at the
Pentagon immediately following 911. Bill assisted with six
deployments to Iraq and Afghanistan requested by Army
G2, Joint Chiefs and US Central Command diagnosing
Biometrics and others critical systems. One of his missions
is to help executives and technologists see both technical
and leadership root causes that can be obviated through
common sense best practices.
Bill Alderson Infographic Bio
• Deep packet analysis remains essential for definitive irrefutable diagnosis
and optimization of complex systems. Bill demonstrates the tools,
techniques and methods used to annotate complex technology findings so
that technologists, managers, executives and vendors can agree on root
cause. Once the problem is identified and agreed upon the true pinpoint
mitigation can begin. The days of shotgun style "forklift wholesale
upgrades" on everything have passed. We must optimize existing assets
allowing them to perform well.
Bill has proven ability to optimize large scale networks and applications
from experience in analyzing the Pentagon immediately following 911,
analysis of Biometrics applications across Iraq and Afghanistan, numerous
optimizations of Joint Chiefs of Staff and OSD network analysis. Experience
from analysis of the largest 100 commercial enterprise networks such as
Stock Exchanges, Financial, Insurance and Healthcare institutions will be
demonstrated with annotated examples for CIO, Executives and top level
technologists.
IT Critical Problem Resolution
Technology and Psychology
bill@apalytics.com
“Swiss Army Knife” Portfolio of Tools
Select Well.
Avoid Spending
Only on “Suites”
All-in-one-tools
Although easier to “buy”
don’t solve many problems.
They leave you “broke and broken”
with a gold plated toolset.
Optimization Troubleshooting Phases
Preparation & Setup
Analysis & Iteration
Reporting & Presentation
Problem Management
Down - Intermittent - Slow
Technical vs. Leadership Root Cause
The Needle
The Environment
Packet Traces
Store Every Packet?
Who’s can and is going to analyze them and when?
Finding The Stack With The Problem
Finding The Needle
Measured at the Server
Fast TCP connect
time. Fast Ack from
F5 does not show
true client response
time which is why
Apalytics provided
Internet Monitoring.
1.4 second Get
response is very slow
which is why detailed
platform and
application analysis
was performed.
The 2nd & 3rd Gets
were fast at 1
millisecond proving
some commands are
CF Longest Requests
1,958,266ms = ~32 minutes from one request
391,692ms = ~7 minutes
Page Analysis from the Internet
DNS does not play a role in slowness. Connection time varies and at time approaches 200 milliseconds which can be at the platform, internet, network, load
balancer or firewalls. Connection delay analysis will require multiple capture points to definitively pinpoint and should be considered when multi-point
capture test points can be configured at the Security Tap devices. But that is not material for improvement of this application at this timeFirst byte time is
the most concerning issue in the infrastructure. Last byte time is also a concern as it appears that platform TCP/IP stack services are slow to move data out
onto the wire after the first byte has started. It may also be that platform improvements may improve both response times and output speed. Page load
time is a composite of all elements of the page that must come together to provide the user with the visual page and the main context of the query. This
too is concerning, but it is caused by the slowness of the individual components of the page as they add serially to the response time which are represented
in the main concerns. An example of the total page would be small visual images and data making up the user interface view (i.e., logos) that are not part of
a computational or lookup, but rather a static image that should be served rapidly by the server.
Network Intrinsic Application Analysis
Multi-tier Analysis
Multi-Tier Identification
Application Monitoring Design Phase
Multi-tier Macro vs. Micro
Event
Process
Net-Ser-Tr-Sw-Q
Security Auth
User Click
Client
Network
WebSvr
Network
AppSrv
Network
SQLSvr
Network
AppSvr
Network
Mainframe
Network
AppSvr
Network
WebSvr
Network
Client
User Display UpdateMacro Response
Time
Micro
Response
Time
HTTP Post
from client
Web1
Middlewa
re
155ms
HTTP / SQL Multi-tier 1
Back to client
With HTTP
SQL Calls complete
Query and returns
Rows to Web1
SQL Calls finish .497
SQL Call start -.231
SQL Resp Time =.266
Web1
Middleware
12ms
HTTP / SQL Multi-tier 2
Logon A is 72
milliseconds…
Logon B is 420
milliseconds!
Oracle Logon Slow
Micro-Analysis Phase
Web App I/F #1&2 SQL TransLogger MF#1 MF#2 Time
Breakdown
TCP Satellite Retrans 3.5 Seconds
Processing Analysis
Packet Loss Analysis
Citrix Session Abort Signature “Chernobyl Packet”
The packet that
evidenced a problem
on a Citrix server.
This pattern was used
as a signature on the
Infinistream Sniffers
to find these
problems until they
were remediated.
Prior to this users
were stuck in this
cycle for hours.
Citrix User Filer Access Error Details
Blind vs. Pinpoint Upgrades
Blind Upgrade = Shotgun Approach = Forklift Upgrade
Root Cause Optimization
Definitive Root Cause Analysis Pinpoint Cause Measure ROI Potential
Pinpoint Purchases Validate & Prove ROI Award Innovation
Optimization
Root
Cause
Analysis
IT Critical Problem Resolution
Technology and Psychology
bill@apalytics.com

More Related Content

What's hot (20)

PPTX
Splunk for Security Breakout Session
Splunk
 
PPT
Information Security
Mohit8780
 
PDF
How VPNs and Firewalls Put Your Organization at Risk
Cyxtera Technologies
 
PDF
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk
 
PDF
GDPR Compliance Countdown - Is your Application environment ready?
QualiQuali
 
PPTX
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Qualys
 
PDF
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
 
PPTX
SplunkLive! Austin Customer Presentation - Dell
Splunk
 
PPTX
Building an AppSec Team Extended Cut
Mike Spaulding
 
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
PDF
Gavin Hill - Lessons From the Human Immune System
centralohioissa
 
PDF
Top Application Security Threats
ColumnInformationSecurity
 
PDF
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
Symantec
 
PDF
Disaster recovery glossary
singlehopsn
 
PPTX
Splunk at Weill Cornell Medical College
Splunk
 
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
 
PDF
Cloud Security Myths Vs Facts
OPAQ
 
PDF
Solution Brief
webhostingguy
 
PPT
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds
 
PDF
u10a1 Network and Security Architecture _FINAL - Kent Haubein
Kent Haubein
 
Splunk for Security Breakout Session
Splunk
 
Information Security
Mohit8780
 
How VPNs and Firewalls Put Your Organization at Risk
Cyxtera Technologies
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk
 
GDPR Compliance Countdown - Is your Application environment ready?
QualiQuali
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Qualys
 
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
 
SplunkLive! Austin Customer Presentation - Dell
Splunk
 
Building an AppSec Team Extended Cut
Mike Spaulding
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Gavin Hill - Lessons From the Human Immune System
centralohioissa
 
Top Application Security Threats
ColumnInformationSecurity
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
Symantec
 
Disaster recovery glossary
singlehopsn
 
Splunk at Weill Cornell Medical College
Splunk
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
 
Cloud Security Myths Vs Facts
OPAQ
 
Solution Brief
webhostingguy
 
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds
 
u10a1 Network and Security Architecture _FINAL - Kent Haubein
Kent Haubein
 

Similar to IT Problems & Problem Management (20)

PPTX
Servicing Financial Services Applications
Shashi Kiran
 
PDF
PacketsNeverLie
Rick Kingsley
 
DOCX
Top-Down Network DesignAnalyzing Technical Goals.docx
juliennehar
 
DOCX
Project Business Case and Capital Justification for Implementation of Applica...
Duane Bodle
 
PDF
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
DellNMS
 
PDF
A Real-World Demonstration of Nectar Cloud Experience Manager (CEM) for Micro...
nectarservices
 
PPTX
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk
 
PDF
Cyber Resiliency 20120420
Steve Goeringer
 
PDF
Fluke Connect Condition Based Maintenance
Frederic Baudart, CMRP
 
PDF
Internet of Things Microservices
Capgemini
 
PDF
Clues for Solving Cloud-Based App Performance
NETSCOUT
 
PPTX
Reduce Risk with End to End Monitoring of Middleware-based Applications
SL Corporation
 
PPTX
Empowering Uptime with a 24/7 Network Operations Center (NOC)
dikshanfc
 
PDF
Visualizing Your Network Health - Know your Network
DellNMS
 
PDF
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
PPTX
What’s New: Splunk App for Stream and Splunk MINT
Splunk
 
PDF
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Prolifics
 
PDF
Network upgrade
Debanjan Paul
 
PDF
Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...
NetworkCollaborators
 
PDF
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
Principled Technologies
 
Servicing Financial Services Applications
Shashi Kiran
 
PacketsNeverLie
Rick Kingsley
 
Top-Down Network DesignAnalyzing Technical Goals.docx
juliennehar
 
Project Business Case and Capital Justification for Implementation of Applica...
Duane Bodle
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
DellNMS
 
A Real-World Demonstration of Nectar Cloud Experience Manager (CEM) for Micro...
nectarservices
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk
 
Cyber Resiliency 20120420
Steve Goeringer
 
Fluke Connect Condition Based Maintenance
Frederic Baudart, CMRP
 
Internet of Things Microservices
Capgemini
 
Clues for Solving Cloud-Based App Performance
NETSCOUT
 
Reduce Risk with End to End Monitoring of Middleware-based Applications
SL Corporation
 
Empowering Uptime with a 24/7 Network Operations Center (NOC)
dikshanfc
 
Visualizing Your Network Health - Know your Network
DellNMS
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
What’s New: Splunk App for Stream and Splunk MINT
Splunk
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Prolifics
 
Network upgrade
Debanjan Paul
 
Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...
NetworkCollaborators
 
CA Infrastructure Management 2.0 vs. Solarwinds Orion: Speed and ease of mana...
Principled Technologies
 
Ad

Recently uploaded (20)

PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
PDF
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
PPTX
Digital Circuits, important subject in CS
contactparinay1
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
Digital Circuits, important subject in CS
contactparinay1
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
Ad

IT Problems & Problem Management

  • 2. Session Date & Time • Date: Wednesday, June 29, 2016 Time: 1100-1145 Location: Tuscany Ballroom
  • 3. • Bill Alderson responds to Information Technology high visibility, high stakes technical problems. Network outage, slowness, slow applications or disasters affecting government and commercial Information Technology Enterprise environments. ABC News told the story of how Bill and his team helped restore communications at the Pentagon immediately following 911. Bill assisted with six deployments to Iraq and Afghanistan requested by Army G2, Joint Chiefs and US Central Command diagnosing Biometrics and others critical systems. One of his missions is to help executives and technologists see both technical and leadership root causes that can be obviated through common sense best practices.
  • 5. • Deep packet analysis remains essential for definitive irrefutable diagnosis and optimization of complex systems. Bill demonstrates the tools, techniques and methods used to annotate complex technology findings so that technologists, managers, executives and vendors can agree on root cause. Once the problem is identified and agreed upon the true pinpoint mitigation can begin. The days of shotgun style "forklift wholesale upgrades" on everything have passed. We must optimize existing assets allowing them to perform well. Bill has proven ability to optimize large scale networks and applications from experience in analyzing the Pentagon immediately following 911, analysis of Biometrics applications across Iraq and Afghanistan, numerous optimizations of Joint Chiefs of Staff and OSD network analysis. Experience from analysis of the largest 100 commercial enterprise networks such as Stock Exchanges, Financial, Insurance and Healthcare institutions will be demonstrated with annotated examples for CIO, Executives and top level technologists.
  • 6. IT Critical Problem Resolution Technology and Psychology [email protected]
  • 7. “Swiss Army Knife” Portfolio of Tools Select Well. Avoid Spending Only on “Suites” All-in-one-tools Although easier to “buy” don’t solve many problems. They leave you “broke and broken” with a gold plated toolset.
  • 18. Store Every Packet? Who’s can and is going to analyze them and when?
  • 19. Finding The Stack With The Problem
  • 21. Measured at the Server Fast TCP connect time. Fast Ack from F5 does not show true client response time which is why Apalytics provided Internet Monitoring. 1.4 second Get response is very slow which is why detailed platform and application analysis was performed. The 2nd & 3rd Gets were fast at 1 millisecond proving some commands are
  • 22. CF Longest Requests 1,958,266ms = ~32 minutes from one request 391,692ms = ~7 minutes
  • 23. Page Analysis from the Internet DNS does not play a role in slowness. Connection time varies and at time approaches 200 milliseconds which can be at the platform, internet, network, load balancer or firewalls. Connection delay analysis will require multiple capture points to definitively pinpoint and should be considered when multi-point capture test points can be configured at the Security Tap devices. But that is not material for improvement of this application at this timeFirst byte time is the most concerning issue in the infrastructure. Last byte time is also a concern as it appears that platform TCP/IP stack services are slow to move data out onto the wire after the first byte has started. It may also be that platform improvements may improve both response times and output speed. Page load time is a composite of all elements of the page that must come together to provide the user with the visual page and the main context of the query. This too is concerning, but it is caused by the slowness of the individual components of the page as they add serially to the response time which are represented in the main concerns. An example of the total page would be small visual images and data making up the user interface view (i.e., logos) that are not part of a computational or lookup, but rather a static image that should be served rapidly by the server.
  • 28. Multi-tier Macro vs. Micro Event Process Net-Ser-Tr-Sw-Q Security Auth User Click Client Network WebSvr Network AppSrv Network SQLSvr Network AppSvr Network Mainframe Network AppSvr Network WebSvr Network Client User Display UpdateMacro Response Time Micro Response Time
  • 30. Back to client With HTTP SQL Calls complete Query and returns Rows to Web1 SQL Calls finish .497 SQL Call start -.231 SQL Resp Time =.266 Web1 Middleware 12ms HTTP / SQL Multi-tier 2
  • 31. Logon A is 72 milliseconds… Logon B is 420 milliseconds! Oracle Logon Slow
  • 32. Micro-Analysis Phase Web App I/F #1&2 SQL TransLogger MF#1 MF#2 Time Breakdown
  • 33. TCP Satellite Retrans 3.5 Seconds
  • 36. Citrix Session Abort Signature “Chernobyl Packet” The packet that evidenced a problem on a Citrix server. This pattern was used as a signature on the Infinistream Sniffers to find these problems until they were remediated. Prior to this users were stuck in this cycle for hours.
  • 37. Citrix User Filer Access Error Details
  • 38. Blind vs. Pinpoint Upgrades Blind Upgrade = Shotgun Approach = Forklift Upgrade
  • 39. Root Cause Optimization Definitive Root Cause Analysis Pinpoint Cause Measure ROI Potential Pinpoint Purchases Validate & Prove ROI Award Innovation Optimization Root Cause Analysis
  • 40. IT Critical Problem Resolution Technology and Psychology [email protected]