Step 1: Spend time implementing a monitoring solution.<p>Step 2: Realise what you actually need is security and availability monitoring, plus well tested automated resolution strategies for various classes of events.<p>Step 3: Go back to step 1, and include broader requirements. Simultaneously realise that your strategy for resolution (or indeed containerization) is not universally applicable, so you actually need to build an abstract system that enables the appropriate use of multiple architectures if you don't want the problem again in future. Scope creep!