Visibility maturity
Simple checklists for evaluating visibility maturity
Logs
Maturity is measured on a scale from 0 to 5. Each item below counts for 1 point towards the total score.
- Application emits logs at runtime with appropriate log levels (DEBUG, INFO, WARNING, ERROR)
- Application uses a centralised logging system
- Application uses structured logs
- Application logs contain externally defined and documented diagnostic codes
- Application logs contain correlation identifiers for matching with other visibility data (external logs, tracing)
Metrics
Maturity is measured on a scale from 0 to 5. Each item below counts for 1 point towards the total score.
- Application runtime metrics are available
- Application emits custom application-level metrics (business metrics)
- Application metrics are emitted with externally defined and documented dimensions
- Application RED (Response, Error, Duration) metrics are available on a per-function basis
- Application USE (Utilisation, Saturation, Error) metrics are available on a per-function basis
Tracing
Maturity is measured on a scale from 0 to 5. Each item below counts for 1 point towards the total score.
- Application has a tracing system
- Application can generate or propagate correlation identifiers
- Application tracing system can cross technology boundaries
- Application has tracing that interoperates with the larger organisation
- Application has tracing based on open industry standards for future changes
Correlation
Maturity is measured on a scale from 0 to 5. Each item below counts for 1 point towards the total score.
- Correlation data exists across individual system boundaries
- Correlation data is consistent across transactions
- Correlated data is accessible via the same interface
- Correlation data is present for two visibility data types
- Correlation data is present for all three visibility data types
Alerting
Maturity is measured on a scale from 0 to 5. Each item below counts for 1 point towards the total score.
- Synthetic monitoring is in place for availability and uptime measurement
- Alerts can be configured based on visibility data
- Alerts can be configured on a self-service basis by the operations team
- Alerts can be triggered as close to the origin of visibility data as possible
- Alerts are actionable and contain references or links to the source of the trigger data
Next time, we'll talk about "What Tiger King can teach us about x86 Assembly"