E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
|
|
|
- Roxanne Hawkins
- 10 years ago
- Views:
Transcription
1 E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
2 W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal working conditions of an enterprise network infrastructure. This expert E-Guide highlights the necessity for a network performance baseline, potential challenges and how to overcome them. PAGE 2 OF 10
3 HOW TO SET A NETWORK PERFORMANCE BASELINE FOR NETWORK MONITORING WHY THE NEED FOR A NETWORK PERFORMANCE BASELINE? In the simplest terms, a baseline is a set of metrics used in monitoring to define the normal working conditions of an enterprise network infrastructure. Engineers use baselines for comparison to catch changes in traffic that could indicate a problem. Setting a network baseline also provides early indicators that application and network demands are pushing near the available capacity, giving the networking team the opportunity to plan for upgrades. Aligning baselines with existing network service-level agreements (SLAs) can help the IT organization stay within capacity parameters and identify problem areas that are falling out of compliance. The challenge for engineers, however, is to define what is normal for their organization's infrastructure. PAGE 3 OF 10
4 NO INDUSTRY STANDARD FOR NETWORK MONITORING OR METRICS For IT organizations that have adopted the Information Technology Infrastructure Library (ITIL) framework for best practices, there are ITIL-specific monitoring tools available. These tools are designed to take advantage of the device configuration databases and applications built to support the IT service management process. Beyond ITIL, however, there is not an industry standard approach to setting performance baselines. Support for monitoring tools and the breadth and depth of information made available can vary greatly among manufacturers, devices and operating systems, ultimately preventing a common set of metrics from being used in monitoring. A good first place to start might be the networking vendors themselves. Every vendor has, at minimum, a list of the monitors a given device supports. Given the ubiquity of monitoring protocols such as SNMP, many vendors also have their own recommendation or best practices for monitoring and defining thresholds for their products. Armed with this information, administrators can initially focus on a narrow subset of available monitors and grow as needed. Cisco, for example, recommends not exceeding 60% of CPU utilization on its routers and has published an SNMP message to monitor that statistic. PAGE 4 OF 10
5 NETWORK PERFORMANCE MONITORING: TAKING STOCK AND CONSIDERING VIRTUALIZATION While building up your inventory of network devices to monitor, be sure to include both physical and virtual devices on your list. With the current trends in appliance and server virtualization, virtual switches (vswitches) and virtualized application accelerators are important considerations when looking at. Serving as network ports within the environment, vswitches enable virtual machines to communicate with each other without having to traverse physical network adapters. While vswitches speed interserver communication, they don't enable a tool to report these paths or receive application performance data. Fortunately, the networking industry has recognized the problem and is working to improve the situation, either with more intelligent vswitches or through virtual server standards such as Virtual Ethernet Port Aggregator (VEPA), which would enable exposure of virtualized network traffic to traditional tools. COLLECTING DATA TO SET A NETWORK PERFORMANCE BASELINE After taking inventory of network devices, the next phase is analyzing the traffic running across the infrastructure. While an overall network utilization is PAGE 5 OF 10
6 a reasonable indicator of the overall health of the network, that single metric provides no context for what the users are actually doing on the network. In order to gain insight into how the network is being used, monitoring tools must collect and open actual packets of data. There are two approaches to collecting network data for traffic analysis, each with its own pluses and minuses. Data capture or sniffing tools capture the entire stream of network data, giving administrators a full view of what is moving around the network at a given moment in time. Sniffing the network offers a complete view of what is going on. While this is vital for network forensic analysis and troubleshooting, it might be overkill for ongoing and baseline analysis. For monitoring, the metrics of application and network utilization are key, not necessarily the information within the individual packets. In these situations, network sniffing tools could provide the required information, but would do so with significant overhead. GET SAMPLES WITH SFLOW/NETFLOW MONITORING Alternatively, protocols such as NetFlow or sflow are designed to be less storage intensive by capturing traffic at assigned intervals. Built into many enterprise routers, NetFlow and variants can pass along sampled data to a monitor PAGE 6 OF 10
7 without the overhead of sniffers, providing a reasonable overview of which applications are running across the network. By performing packet analysis, administrators can see trends in application usage and assign a percentage of utilization for each application against total network usage. Digging in deeper, most tools can also help parse out Internet traffic, separating, for example, use of cloud-based applications from general Web browsing. Knowing how much of the network each application consumes not only identifies the source of response time problems, but also enables administrators to see the impact of new applications and services as they are deployed on their networks. HOW LONG MUST YOU MONITOR TO SET A NETWORK PERFORMANCE BASELINE? With all of the desired monitors in place, the next step is to let the monitors run and build up data points. Many experts cite seven days as an effective monitoring window to allow performance trends to appear. It is important to consider the context of when the traffic was captured. Cyclical usage patterns exist in most organizations and any traffic analysis should be sensitive to those patterns. A large retailer, for example, would no doubt see PAGE 7 OF 10
8 network and application use spike during the holiday season. A manufacturer might actually see the opposite effect with plant shutdowns significantly lowering network utilization during the same holiday period. If the analyst does not account for these business cycles, baseline results could vary widely in either direction. Any significantly high or low spikes in the numbers must be identified and a determination must be made as to why they occurred and if they are indeed part of the network norm. If you see occasional spikes because of an identified problem, build the baseline on the remaining data points. If the spikes are identified as a common occurrence, include them in the average for the metric. It's also possible that the network experienced a significant problem during your monitoring cycle. In that case, it would be safer to toss those data points and rerun the metrics after the situation has been addressed. When a reasonable amount of monitoring data has been collected and radical shifts have been accounted for, a each of the metrics can be assigned. The ultimate result is determining the typical range of values for each of your defined monitors. The combined set of ranges is the current network performance baseline. The final point to consider is that the baselines you PAGE 8 OF 10
9 set today are only good until something changes. Network equipment upgrades, new servers and new applications will have an impact on today's baselines and will require some care and feeding of the monitoring solution on an ongoing basis. The good news, however, is that in most cases, not everything changes at once, so a few tweaks can be made as applications, services or devices are added or removed. PAGE 9 OF 10
10 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 10 OF 10
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
Hybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
Securing the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
Managing Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media
Is Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
Expert guide to achieving data center efficiency How to build an optimal data center cooling system
achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance
Social media driving CRM strategies
Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting
Evaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
Advantages on Green Cloud Computing
Advantages on Green Advantages of Green A growing number of organizations are becoming more green-conscious as there are several advantages of green IT. In this e-guide, brought to you by SearchDataCenter.com,
Supply Chain Management Tips and Best Practices
Supply Chain Management Tips and Best Practices According to Aberdeen Group, as companies seek to contain or cut supply chain management (SCM) costs, they are prioritizing increasing supply chain visibility,
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines
5 free Exchange add-ons you should consider Eliminating administration pain points on a budget
5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline
5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier
5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings
WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS
E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components
The skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
How To Protect Your Online Backup From Being Hacked
Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup
GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment
Order Management System Best Practices
Order Management System Best Practices For most organizations, order management taking, fulfilling and shipping orders is far from simple. In fact, there are some common holes in order management software
Skills shortage, training present pitfalls for big data analytics
present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
MDM features vs. native mobile security
vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
Managing the supply chain for SAP
Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for
Network Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS
E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Best Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
LTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]
[ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
