If you’ve ever tried to troubleshoot web application performance issues, you’ve probably seen it all – browser waterfall diagrams, visual traceroute tools, network topologies produced by network management systems … but I haven’t seen them packaged in a comprehensive, easy-to-use and visually compelling package before. Welcome to ThousandEyes.
What is it?
Short summary: cloud-based application performance monitoring system. Nothing new.
Here’s an elevator summary of how it all works:
- Create an account on their web site;
- Deploy their agent software on Linux servers (or download mini VM in OVA format) at your sites;
- Configure URLs you want to monitor;
- Agents report their results to ThousandEyes cloud-based servers, which alert you when the agents experience performance problems;
- The agent reports are combined with public BGP feeds (example: RIPE feeds) to create a visual representation of the state of the global Internet at the time the agent(s) encountered performance problems, allowing you to identify the true root cause of the problem.
Sounds boring, right? We’ve been doing all this one way or another. You have to test the product or watch NDF6 videos to grasp the true magic of ThousandEyes. Here are the videos (watch all of them, these guys weren’t boring):
- Product overview
- Technology deep dive (must-see)
- Use cases: SaaS provides and financial institutions (cool use cases!)
- Enterprise use cases
And now for the crazy ideas
We’ve been mentioning several obvious ideas (monitor internal web servers) and a few crazy ones when talking with ThousandEyes during NFD6 (so go watch the videos). Most of them would require additional functionality, so if you find them interesting (and you’re big enough), go talk with ThousandEyes and push them in this direction.
- Package ThousandEyes server as an appliance that could be deployed within a security-conscious enterprise environment. One of the major hurdles we have when deploying NIL Monitor solutions is the interaction between internal probes and our management system – every decent CISO gets upset initially.
- Interact with internal BGP routing to get BGP-based visibility into internal network as well as global Internet.
- It would be really cool if they could (somehow) import data from your xVPN-over-Internet configurations to get the transport endpoints and then map those into their BGP-based visualization to give you true hop-by-hop path analysis.
- Implement an automatic baselining system. You can configure absolute HTTP connection and page load timeouts, but it would be great to be able to get reasonable thresholds (per agent location) automatically.
Would I use them?
Absolutely. If you’re a business heavily relying on SaaS products (Salesforce, Dropbox, Google Docs, Gmail …) something like ThousandEyes is a must-have. Even if you can’t do a thing when an ISP two hops down the road scrambles their BGP configs, you’ll have at least an insurance policy when unhappy users start shouting at you … and a plausible reason why it might be a good idea to switch ISPs and pay someone else a bit more for a more reliable service.
ThousandEyes was a sponsor of Networking Tech Field Day 6.