To begin with monitoring, you could think of different commonly implemented strategies, as a solution to your problem. Some of the commonly implemented strategies are as follows:
- Application/system monitoring
- Real-user monitoring
- Semantic monitoring and synthetic transactions
- Profiling
- Endpoint monitoring
Just bear in mind that each one of these strategies is focused on solving a specific purpose. While one could help to analyze transaction propagation, another could be suitable for testing purposes. So, you need to pick a combination of these, when designing the whole system, since just using a single strategy won't meet your needs.
Monitoring strategies ensure and focus on serving a specific purpose, as discussed in this section. For different purposes, we would require more strategies. So, let's move ahead to that next and discuss...