Creating Unified IT Monitoring and Management in Your Environment

Size: px
Start display at page:

Download "Creating Unified IT Monitoring and Management in Your Environment"

Transcription

1 Creating Unified IT Monitoring and Management in Your Environment sponsored by

2

3 Introduction to Realtime Publishers by, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books that just happen to be delivered in electronic format at no cost to you, the reader. We ve made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book s production expenses for the benefit of our readers. Although we ve always offered our publications to you for free, don t think for a moment that quality is anything less than our top priority. My job is to make sure that our books are as good as and in most cases better than any printed book that would cost you $40 or more. Our electronic publishing model offers several advantages over printed books: You receive chapters literally as fast as our authors produce them (hence the realtime aspect of our model), and we can update chapters to reflect the latest changes in technology. I want to point out that our books are by no means paid advertisements or white papers. We re an independent publishing company, and an important aspect of my job is to make sure that our authors are free to voice their expertise and opinions without reservation or restriction. We maintain complete editorial control of our publications, and I m proud that we ve produced so many quality books over the past years. I want to extend an invitation to visit us at especially if you ve received this publication from a friend or colleague. We have a wide variety of additional books on a range of topics, and you re sure to find something that s of interest to you and it won t cost you a thing. We hope you ll continue to come to Realtime for your educational needs far into the future. Until then, enjoy. i

4 Introduction to Realtime Publishers... i Ch apter 1: Managing Your IT Environment: Four Things You re Doing Wrong... 1 IT Management: How We Got to Where We Are Today... 1 Problem 1: You re Managing IT in Silos... 3 Problem 2: You Aren t Connecting Your Users, Service Desk, and IT Management... 6 Problem 3: You re Measuring the Wrong Things... 8 Problem 4: You re Losing Knowledge How Truly Unified Management Can Fix the Problems Summary Ch apter 2: Eliminating the Silos in IT Management Too Many Tools Means Too Few Solutions Domain Specific Tools Don t Facilitate Cooperation The Cloud Question: Unifying On Premise and Off Premise Monitoring Missing Pieces Not All of IT Is a Problem: Ordering, Routing, and Providing Services Coming Up Next Ch apter 3: Connecting Everyone to the IT Management Loop Starting the Loop: Connecting Monitoring to the Service Desk Making Changes: How to Find a Change Management Window Communicating: How to Bring Users into the Loop SLAs: Setting and Meeting Realistic Expectations Tell Me What You Really Thin k When Everyone Doesn t Need to See Everything: A Multi Tenant Approach Call It a Private Management Cloud: Allocating Costs Conclusion Coming Up Next Ch apter 4: Monitoring: Look Outside the Data Center Monitoring Technical Counters vs. the End User Experience ii

5 How the EUE Drives Better SLAs How It s Done: Synthetic Transactions, Transaction Tracking, and More Top Down Monitoring: From the EUE to the Root Problem Agent vs. Agentless Monitoring Monitoring What Isn t Yours Critical Capability: You Need to Monitor Everything Conclusion Coming Up Next Ch apter 5: Turning Problems into Solutions Closing the Loop: Connecting the Service Desk to Monitoring Re taining Knowledge Means Faster Future Resolution Knowledge Bases Tickets as Knowledge Base Articles Unifying the Knowledge Base Making Tickets an Asset Pa st Performance Is an Indication of Future Results It s the Performance Database Summary Coming Up Next Ch apter 6: Unified Management, Illustrated Th e Case Studies Detecting and Solving Problems Fulfilling User Orders A Shopping List for Unified IT Management Ways to Buy Your Unified IT Conclusion iii

6 Copyright Statement 2012 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. iv

7 Chapter 1: Managing Your IT Environment: Four Things You re Doing Wrong At the very start of the IT industry, monitoring meant having a guy wander around inside the mainframe looking for burnt out vacuum tubes. There wasn t really a way to locate the tubes that were working a bit harder than they were designed for, so monitoring such as it was was an entirely reactive affair. In those days, the Help desk was probably that same guy answering the phone when one of the other dozen or so computer people needed a hand feeding punch cards into a hopper, tracking down a burnt out tube, and so on. The concepts of tickets, knowledge bases, service level agreements (SLAs), and so forth hadn t yet been invented. IT management has certainly evolved since those days, but it unfortunately hasn t evolved as much as it could or should have. Our tools have definitely become more complex and more mature, but the way in which we use those tools our IT management processes are in some ways still stuck in the days of reactive tube changing. Some of the philosophies that underpin many organizations IT management practices are really becoming a detriment to the organizations that IT is meant to support. The discussion in this chapter will revolve around several core themes, which will continue to drive the subsequent chapters in this book. The goal will be to help change your thinking about how IT management particularly monitoring should work, what value it should provide to your organization, and how you should go about building a better managed IT environment. IT Management: How We Got to Where We Are Today In the earliest days of IT, we dealt with fairly straightforward systems. Even simplistic, by today s standards. The IT team often consisted of people who could fix any of the problems that arose, simply because there weren t all that many moving parts. It s as if IT was a car: A machine capable of complexity and of doing many different things, but perfectly comprehendible, in its entirety, by a single human being. 1

8 As we started to evolve that IT car into a space shuttle, we gradually needed to allow for specialization. Individual systems became so complex in and of themselves that we needed domain specific experts to be able to monitor, maintain, and manage each system. Messaging systems. Databases. Infrastructure components. Directory services. The vendors who produced these systems, along with third parties, developed tools to help our experts monitor and manage each system. That s really where things went wrong. It seemed perfectly sensible at the time, and indeed there was probably no other way to have done things, but that establishment of domain specific silos each with their own tools, their own procedures, and their own expertise was the seed for what would become a towering problem inside many IT shops. Fast forward to today, when our systems are vastly more complex, vastly interconnected, and increasingly not even hosted within our own data centers. When a user encounters a problem, they obviously can t tell us which of our many complex systems is at fault. They simply tell us what they observe and experience about the problem, which may be the aggregate result of several systems interactions and interdependencies. Our users see a holistic environment: IT. That doesn t correspond well to what we see on the back end: databases, servers, directories, files, networks, and more. As a result, we often spend a lot of time trying to track down the root cause of problems. Worse, we often don t even see the problems coming, because the problems only exist when you look at the end result of the entire environment rather than at individual subsystems. Users feel completely disconnected from the process, shielded from IT by a sometimes helpful sometimes not Help desk. IT management has a difficult time wrapping their heads around things like performance, availability, and so on, simply because they re forced to use metrics that are specific to each system on the network rather than look at the environment as a whole. The way we ve built out our IT organizations has led to very specific business level issues, which have become common concerns and complaints throughout the world: IT has difficulty defining and meeting business level SLAs. The messaging server will be up 99% of the time isn t a business level SLA; it s a technical one. will flow between internal and external users 99% of the time is a business level SLA, but it can be difficult to measure because that statement involves significantly more systems than just the server. IT has difficulty proactively predicting problems based on system health, and remains largely reactive to problems. When problems occur, IT often spends far too much time pinpointing the root cause of the problem. IT s concept of performance and system health is driven by systems database servers, directory services, network devices, and so forth rather than by how users and the organization as a whole are experiencing the services delivered by those systems. 2

9 IT has a tough time rapidly adopting new technologies that can benefit the business. Oxymoronically, IT is often the part of the organization most opposed to change, because change is usually the trigger for problems. Broken systems don t help anyone, but an inability to quickly incorporate changes can also be a detriment to the organization s competitiveness and flexibility. IT has a really tough time adopting new technologies that are significantly outside the team s experience or physical reach most specifically the bevy of outsourced offerings commonly grouped under the term cloud computing. These technologies and approaches to technology are so different from what s come before that IT doesn t feel confident that they can monitor and manage these new systems. Thus, they resist implementing these types of systems for fear that doing so will simply damage the organization. Even with modern self service Help desk systems, users feel incredibly powerless and out of touch when it comes to IT. All of these business level problems are the direct result of how we ve always managed IT. Our processes for monitoring and managing IT basically have four core problems. Not every organization has every single one of these, of course, and most organizations are at least aware of some of these and work hard to correct them. Ultimately, however, organizations need to ensure that all four of these core problems are addressed. Doing so will immediately begin to resolve the business level issues I ve outlined. Problem 1: You re Managing IT in Silos Figures 1.1, 1.2, and 1.3 illustrate one of the fundamental problems in IT monitoring and management today. Figure 1.1: Windows Performance Monitor. 3

10 Figure 1.2: SQL Server Performance. Figure 1.3: Router Performance. These figures each illustrate a different performance chart for various components of an IT system. Each of these images was produced using a tool that is more or less specialized for the exact thing that was being monitored. The tool that produced the router performance chart, for example, can t produce the same chart for a database server or even for a router that s located on someone else s network. 4

11 This is such a core, fundamental problem that many IT experts can t even recognize that it is a problem. Using these domain specific tools is such an integrated and seemingly natural part of how IT works that many of us simply can t imagine a different way. But we need to move past using these domain specific tools as our first line of defense when it comes to monitoring and troubleshooting. Why? One major reason is that these tools keep us all from being on the same page. IT experts can t even have meaningful cross discipline discussions when these tools become involved. I m looking at the database server, and the performance is at more than 200 TPMs, one expert says. Well, that must be a problem because the router is running well over 10,000 PPMs. Those two experts don t even have a common language for performance because they re locked into the domain specific, deeply technical aspects of the technologies they manage. Domain specific tools also encourage what is probably the worst single practice in all of IT: looking at systems in isolation. The database guy doesn t have the slightest idea what makes a router tick, what constitutes good or bad performance in a messaging server, or what to look for to see if the directory services infrastructure is running smoothly. So the database guy puts on a set of blinders and just looks at his database servers. But those servers don t exist in a vacuum; they re impacted by, and they in turn impact, many other systems. Everything works together, but we can t see that using domain specific tools. We have to permanently remove the walls between our technical disciplines, breaking down the silos and getting everyone to work as a single team. In large part, that means we re going to have to adopt new tools that enable IT silos to work as a team, putting the information everyone needs into a common context. Sure, domain specific tools will always have their place, but they can t be our first line of information. Case Study Jerry works for a typical IT department in a midsize company. His specialty is Windows server administration, and his team includes specialists for Web applications, Microsoft SQL Server and Oracle, VMware vsphere, and for the network infrastructure. The company outsources certain enterprise functionality, including their Customer Relationship Management (CRM) and . Recently, a problem occurred that caused the company s main Web site to stop sending customer order confirmation s. Jerry was initially called to solve the problem, on the assumption that it was with the company s outsourced messaging solution. Jerry discovered, however, that user was flowing normally. He passed the problem to the Web specialist, who confirmed that the Web site was working properly but that s sent by it were being rejected. Jerry filed a ticket with the messaging hosting company, who responded that their systems were in working order and that he should check the passwords that the Web servers were using. 5

12 After more than a day of back and forth with the hosting company and various experts, the problem was traced to the company s firewall. It had recently been upgraded to a new version, and that version was now blocking outgoing message traffic from the company s perimeter network, which is where the Web servers were located. The network infrastructure specialist was called in to reconfigure the firewall, and the problem was solved. This narrative precisely demonstrates the problem: By managing our IT teams as domainspecific silos, we significantly hinder their ability to work together to solve problems. The fact that IT experts require domain specific tools shouldn t be a barrier to breaking down those silos and getting our team to work more efficiently together. This becomes especially important when pieces of the infrastructure are outsourced; those hosting companies are an unbreakable silo, as they re not responsible for any systems other than the ones they provide to us. However, the dependencies that our systems and processes have on their systems means our own team still has to be able to monitor and troubleshoot those outsourced systems as if they were located right in the data center. Problem 2: You Aren t Connecting Your Users, Service Desk, and IT Management Communication is a key component of making any team work; and the team that is your organization is no exception. In the case of IT, we typically use Help desk systems as our means of enabling communications but that isn t always sufficient. Help desk systems are almost always built around the concept of reacting to problems, then managing that reaction; they re almost by definition not proactive. For example, how do you tell your users that a given system will have degraded performance or will be offline for some period of time? Probably through , which creates a couple of problems: Important messages tend to get lost in the glut of that users deal with daily Users who don t get the message tend to go the Help desk route, which doesn t include a means of intercepting their mental process and letting them know that the problem was planned for. 6

13 Most IT teams do know the things that need to be communicated throughout the organization, for example: SLAs The current status of SLAs whether they re being met Planned outages and degraded service Average response times for specific services Known issues that are being worked on What most IT teams have a problem with is communicating these items consistently across the entire organization. Some organizations rely on , which as I ve already pointed out can be inefficient and not consistently effective. Some organizations will use an intranet Web site, such as a SharePoint portal, to post notices but these sites aren t directly integrated with the Help desk, making it an extra step to keep them updated and requiring users to remember to check them. Case Study Tom works as an inside salesperson for a midsize manufacturing company. Recently, the application that Tom uses to track prospects and create new orders started responding very slowly, and over the course of the day, stopped working completely. Tom s initial action was to call his company s IT Help desk. The Help desk technician sounded harried and frustrated, and told Tom, We know, we re working on it, and hung up. Tom had no expectation when the system might return to normal, and was afraid to bother the Help desk by calling back for more details. Over the course of that day, the Help desk logged calls from nearly every salesperson, each of whom called on their own to find out what was going on. Eventually, the Help desk simply stopped logging the calls, telling everyone that, A ticket is already open, and disconnecting the call. Someone on the IT management team eventually sent out an explaining that a server had failed and that the application wasn t expected to be online until the next morning. Tom wished he had known earlier; although he d originally planned to make sales calls all day, if he d known that the application would be down for that long, he could have switched to other activities for the day or even just taken the day off. 7

14 Management communications are equally important, and equally challenging. Providing frank numbers on service levels, response times, outages, and so forth is crucial in order for management to make better decisions about IT but that information can often be difficult to come by. Problem 3: You re Measuring the Wrong Things This problem is very likely at the heart of everything IT is not doing to help better align technology with business needs. The following case study outlines the scenario. Case Study Shelly works in the Accounting department for her company. Recently, while trying to close the books for her company, the accounting application began to react very slowly. She called her company s IT Help desk to report the problem. The Help desk technician listened to her then said that, Everything on that server looks fine right now. I ll open a ticket and ask someone to look at it, but since we are currently within our service level agreement for response times, it will be a low priority ticket. Shelly continued to struggle with the slowly responding application. Eventually, someone was dispatched to her desktop. She demonstrated that every other application was responding normally. She pointed out that other people in her department were having similar problems with the application. The technician made her close all of her applications and then restarted her computer, to no effect. He shrugged, entered some notes into his smartphone, and left. By the next morning, the application s response times were better, but they were far from normal. Shelly continued to call the Help desk for updates on her ticket s status, but it seemed as if the IT team had given up on trying to fix the problem and refused to even admit that there was a problem. This kind of scenario unfortunately happens all too often in many organizations. It exactly illustrates what happens when several problems are happening at once: IT is operating as a set of individual silos rather than as a team, and each silo has its own definition for words like slow. A root issue here is that everyone is measuring the wrong thing. Figure 1.4 shows how the average IT team sees a multi component, distributed application. 8

15 Figure 1.4: IT perspective of a distributed application. 9

16 They see the components. Domain experts measure the performance of each component using technical metrics, such as processor utilization, response time, and so forth. When a component s performance exceeds certain predefined thresholds, someone in IT pays attention. Figure 1.5, however, shows how a user sees this same application. Figure 1.5: User s perspective of a distributed application. The user doesn t often can t see any of the components. They simply see an application, and either it s responding the way they expect, or it isn t. It doesn t matter a bit to the user if every single constituent component is running at an acceptable level of processor utilization whatever that means. They simply care whether the application is working. This creates a major disconnect between the user population and IT, as Figure 1.6 illustrates. 10

17 Figure 1.6: IT vs. user measurements of performance. 11

18 Users and IT measure very different things. An IT centric SLA might specify a given response time for queries sent to a database server; that often has little to do with whether an application is seen as slow by users. Worse, as we start to migrate services and components to the cloud, we lose much of our ability to measure those components performance the way we do for things that are in our own data center. The result? Nobody can agree on what an SLA should say. This all has to change. We have to start measuring things more from a user perspective. The performance of individual components is important, but only as they contribute to the total experience that a user perceives. We need to define SLAs that put everyone users and IT on the same page, then manage to those SLAs using tools that enable us to do so. Some organizations will tell you that they re moving, or have moved, to a service based IT offering. What that generally means in broad terms is that the organization is seeking to provide IT as a set of services to the organization s various departments and users. In many instances, however, those service oriented organizations are still focused on components and devices, which isn t a service oriented approach at all. When your phone line goes down, you don t call the phone company (on your cell phone, probably) and start asking questions about switches and trunk lines you ask when your dial tone will be back. The back end infrastructure is meaningless to the user. You don t ask for a service credit based on how long a particular phone company office will be offline, you ask for that credit based on how long you went without a dial tone. That's the model IT needs to move toward. Problem 4: You re Losing Knowledge The last problematic practice we ll look at is the issue of lost institutional knowledge. This problem is a purely human one, and frankly it s going to be difficult to address. Here s a quick scenario to set the scene. Case Study Aaron works for his company s IT department. He s been with the company for 3 years and is responsible for several of the company s systems and infrastructure components. One Tuesday, Aaron is contacted by his company s IT Help desk. We re assigning you a ticket about the Oracle system, he s told. Once every couple of months it starts acting really weird, and someone has to fix it. I m not the Oracle guy, Aaron says. That s Jill. Yeah, but Jill s out on vacation for 2 weeks. So you ll have to fix it. I ve no idea what to do! Well, figure something out. The CEO gets upset when this takes too long to fix. 12

19 Unfortunately, too much knowledge gets wrapped up in the heads of specific individuals. In fact, it s a sad truth that many organizations deal with this problem by simply discouraging IT team members to take lengthy vacations, and often resist other activities that would put them out of touch such as sending them to conferences and classes to continue their education and to learn new skills. More than a few organizations have made halfhearted attempts at building knowledge bases, in a hope that some of this institutional knowledge can be committed to electronic paper, preserved, and made more accessible. The problem is that IT professionals aren t necessarily good writers, so the act of producing the knowledge base is difficult for them. It also takes time time the organization is often unwilling to commit, especially in the face of other daily pressures and demands. As I said, this is a problem that s difficult to fix. The IT team realizes it s a problem, and is generally willing to fix it but they re not tech writers, and often have a limited ability to fix the problem. You can usually create management requirements that require problems and solutions be logged in a Help desk ticketing system, but searching through that system for problems and solutions can often be difficult and time consuming much like searching for solutions on an Internet search engine, with all of the false hits such a search generally produces. But we must find a way to address this problem. Knowledge about the company s infrastructure and how to solve problems has to be captured and preserved. This requirement is crucial not only to solving problems faster in the future but also to eventually preventing those problems by making better IT management decisions. How Truly Unified Management Can Fix the Problems This book is going to be all about fixing these four problems, and the means by which I ll propose to do so falls under the umbrella term unified management. Essentially, unified management is all about bringing everything together in one place. We ll break down the silos between IT disciplines, putting everyone onto the same console, getting everyone working from the same data set, and getting everyone working together on problems. We ll do that in a way that brings users, IT, and management into a single viewport of IT service and performance. We ll create more transparency about things like service levels, letting users see what s happening in the environment so that they re more informed. We ll inform users in a way that s meaningful to them rather than using invisible, back end technical metrics. We ll rebuild the entire concept of SLAs into something that s meaningful first to users and management, and that can withstand the transition to hybrid IT that s being brought about by outsourcing certain IT services to the cloud. 13

20 Finally, we ll find a way to capture information about our environment, including solutions to problems, to enable faster time to resolution when problems occur. In addition, this information will enable management to make smarter decisions about future technology directions and investments. We ll try to do all of this in a way that won t cost the organization an arm and a leg nor take half a lifetime to actually implement. That will involve a certain amount of creativity, including looking at outsourced solutions. The idea of an outsourced solution providing monitoring for in sourced components is fairly innovative, and we ll see what applicability it has. I should point out that much of what we ll be looking at can work to support the IT management frameworks that many organizations are adopting these days, including the ITIL framework that s become popular in the past few years. You certainly don t have to be an ITIL expert to take advantage of the new processes and techniques I ll suggest nor do you even have to think about implementing ITIL (or any other framework) if your organization isn t already doing so. If you are using a framework, however, you ll be pleased to know that everything I have to propose should fit right into it. Summary This chapter has established the four main themes that will drive the remaining chapters in this book. These core things represent what many experts believe are the biggest and most fundamental problems with how IT is managed today, and represent the things that we ll focus on fixing throughout the remainder of this book. Our focus will be on changing management philosophies and practices, not on simply picking out new tools although new tools may be something you ll acquire to help support these new practices. Chapter 2 will focus on the first problematic practice, which is the fact that IT tends to be managed in domain specific silos. We ll look at the technical reasons organizations have been more or less forced to manage this way, and explore ways in which you can start to change that practice. Chapter 3 will look at connecting people: IT management, your users, your service desk, and more. Only by bringing everyone into the process can IT better align itself to the needs of the organization. Our third problem practice will be the subject of Chapter 4, where we dive into looking outside the data center for monitoring. The goal will be to solve the problems we ve discussed in this chapter, further focusing IT on its value to the organization. 14

21 Chapter 5 will discuss ways to turn problems into future solutions. Although modern organizations are fully aware of the need for Help desk tracking and knowledge building, how those activities are managed as part of the larger IT management process can make a huge difference in their value add to the organization. We ll conclude in Chapter 6, with an attempt to visualize an IT environment where these new, unified management practices are in place. I ll provide narratives from several case studies, helping you see how these modernized practices work in a real environment. 15

22 Chapter 2: Eliminating the Silos in IT Management In the previous chapter, I proposed that one of the biggest problems in modern IT is the fact that we manage our environment in technology specific silos: database administrators are in charge of databases, Windows admins are in charge of their machines, VMware admins run the virtualization infrastructure, and so forth. I m not actually proposing that we change that exact practice having domain specific experts on the team is definitely a benefit. However, having these domain specific experts each using their own unique, domain specific tool definitely creates problems. In this chapter, we ll explore some of those problems, and see what we can do to solve them and create a more efficient, unified IT environment. Too Many Tools Means Too Few Solutions Comparing apples to oranges is an apt phrase when it comes to how we manage performance, troubleshooting, and other core processes in IT. Tell an Exchange Server administrator that there s a performance problem with the messaging system, and he ll likely jump right into Windows Performance Monitor, perhaps with a pre created counter set that focuses on disk throughput, processor utilization, RPC request count, and so forth as shown in Figure 2.1. Figure 2.1: Monitoring Exchange. 16

23 If the Exchange administrator can t find anything wrong with the server, he might pass the problem over to someone else. Perhaps it will be the Active Directory administrator because Active Directory plays such a crucial role in Exchange s operation and performance. Out comes the Active Directory administrator s favorite performance tool, perhaps similar to the one shown in Figure 2.2. This is truly a domain specific tool, with special displays and measurements that relate specifically to Active Directory. Figure 2.2: Monitoring Active Directory. If Active Directory looks fine, then the problem might be passed over to the network infrastructure specialist. Out comes another tool, this one designed to look at the performance of the organization s routers (see Figure 2.3). 17

24 Figure 2.3: Monitoring router performance. Combined, all of these tools have led these three specialists to the same decision: Everything s working fine. In spite of the fact that Exchange is clearly, from the users point of view, not working fine, there s no evidence that points to a problem. Simply put, this is a too many tools, too few answers problem. In today s complex IT environments, performance along with other characteristics like availability and scalability are the result of many components interacting with each other and working together. You can t manage IT by simply looking at one component; you have to look at entire systems of interacting, interdependent components. Our reliance on domain specific tools holds us back from finding the answers to our IT problems. That reliance also holds us back when it comes time to grow the environment, manage service level agreements (SLAs), and other core tasks. I ve actually seen instances where domain specific tools acted almost as blinders, preventing an expert who should have been able to solve a problem, or at least identify it, from doing so as quickly as he or she might have done. 18

25 Case Study Heather is a database administrator for her organization. She s responsible for the entire database server, including the database software, the operating system (OS), and the physical hardware. One day she receives a ticket indicating that users are experiencing sharply reduced performance from the application that uses her database. She whips out her monitoring tools, and doesn t see a problem. The server s CPU is idling along, disk throughput is well within norms, and memory consumption is looking good. In fact, she notices that the amount of workload being sent to the server is lower than she s used to seeing. That makes her suspect the network is having traffic jams, so she re assigns the ticket to the company s infrastructure team. That team quickly re assigns the ticket right back to her, assuring her that the network is looking a bit congested, but it s all traffic coming from her server. Heather looks again, and sees that the server s network interface is humming along with a bit more traffic than usual. Digging deeper, she finally realizes that the server is experiencing a high level of CRC errors, and is thus having to retransmit a huge number of packets. Clients experience this problem as a general slowdown because it takes longer for undamaged packets to reach their computers. Heather s focus on her specific domain expertise led her to toss the problem over the wall to the infrastructure team, wasting time. Because she wasn t accustomed to looking at her server s network interface, she didn t check it as part of her routine performance troubleshooting process. Domain Specific Tools Don t Facilitate Cooperation If the components of our complex IT systems are cooperative and interdependent, our IT professionals are often anything but. In other words, IT management tends to encourage the silos that are built around specific technology domains. There s the database administration group, the Active Directory group, the infrastructure group, and so forth. Even companies that practice matrix management, in which multiple domain experts are grouped into a functional team, still tend to accept the silos around each technical domain. 19

26 There are two major reasons that these silos persist, and almost any IT professional can describe them to you: I don t know anything about that. Each domain expert is an expert in his technical area. The database administrator isn t proficient at monitoring or managing routers, and doesn t especially want to work with them anyway. There s little real value in extensive technical cross training for most organizations, simply because their staff doesn t have the time. Devoting time to secondary and tertiary disciplines reduces the amount of time available for their primary job responsibilities. I don t want anyone messing with my stuff. IT professionals want to do a good job, and they re keenly aware that most problems come about as the result of change. Allow someone to change something, and you re asking for trouble. If someone changes something in your part of the environment, and you don t know about their activity, you ll have a harder time fixing any resulting problems. Both of these reasons are completely valid, and I m in no way suggesting that everyone on the IT team become an expert in every technology that the organization must support. However, the attitudes reflected in these two perspectives require some minor adjustment. One reason I keep coming back to domain specific tools is because they encourage this kind of walled garden separation, and do nothing to encourage even the most cursory cooperation between IT specialists. Cooperation, when it exists, comes about through good human working relationships and those relationships often struggle with the fact that each specialist is looking at a different set of data and working from a different sheet of music, so to speak. I ve been in environments and seen administrators spend hours arguing about whose fault something was, each pointing to their own domain specific tools as evidence. Case Study Dan is an Active Directory administrator for his company, and is responsible for around two dozen domain controllers, each of which runs in a virtual machine. Peg is responsible for the organization s virtual server infrastructure, and manages the physical hosts that run all of the virtual machines. One afternoon, Peg gets a call from Dan. Dan s troubleshooting a performance problem on some of the domain controllers, and suspects that something is consuming resources on the virtualization host that his domain controllers need. 20

27 Peg opens her virtual server console and assures Dan that the servers aren t maxed out on either physical CPU or memory, and that disk throughput is well within expected levels. Dan counters by pointing to his Active Directory monitoring tools, which show maxed out processor and memory statistics, and lengthening disk queues that indicate data isn t being written to and read from disk as quickly as it should be. Peg insists that the physical servers are fine. Dan asks if the virtual machines settings have been reconfigured to provide fewer resources to them, and Peg tells him no. The two go back and forth like this for hours. They re each looking at different tools, which are telling them completely different things. Because they re not able to speak a common technology language, they re not able to work together to solve the problem. We don t need to have every IT staffer be an expert in every IT technology; we do need to make it easier for specialists to cooperate with one another on things like performance, scalability, availability, and so forth. That s difficult to do with domain specific tools. The router administrator doesn t want a set of database performance monitoring tools, and the database administrator doesn t especially want the router admin to have those tools. Having domain specific tools for someone else s technical specialization is exactly how the two attitudes I described earlier come into play. Ultimately, the problem can be solved by having a unified tool set. Get everyone s performance information onto the same screen. That way, everyone is playing from the same rule book, looking at the same data and that data reflects the entire, interdependent environment. Everyone will be able to see where the problem lies, then they can pull out the domain specific tools to start fixing the actual problem area, if needed. The Cloud Question: Unifying On Premise and Off Premise Monitoring This concept of a unified monitoring console becomes even more important as organizations begin shifting more of their IT infrastructure into the cloud. The Cloud Is Nothing New I have to admit that I m not a big fan of the cloud as a term. It s very salesand marketing flavored, and the fact is that it isn t a terribly new concept. Organizations have outsourced IT elements for years. Probably the mostoutsourced component is Web hosting, either outsourcing single Web sites into a shared hosting environment, or outsourcing collocated servers into someone else s data center. 21

28 For the purposes of this discussion, the cloud simply refers to some IT element being outsourced in a way that abstracts the underlying infrastructure. For example, if you have collocated servers in a hosting company s data center, you don t usually have details about their internal network architecture, their Internet connectivity, their routers, and so forth the data center is the piece you re paying to have abstracted for you. In a modern cloud computing model like Windows Azure or Amazon Elastic Cloud, you don t have any idea what physical hosts are running your virtual machines that physical server level is what you re paying to have abstracted, along with supporting elements like storage, networking, and so on. For a Software as a Service (SaaS) offering, you don t even know what virtual machines might be involved in running the software because you re paying to have the entire underlying infrastructure abstracted. Regardless which bits of your infrastructure wind up in some outsourced service provider s hands, those bits are still a part of your business. Critical business applications and processes rely on those bits functioning. You simply have less control over them, and typically have less insight into how well they re running at any given time. This is where domain specific tools fall apart completely. Sure, part of the whole point of outsourcing is to let someone else worry about performance but outsourced IT still supports your business, so you at least need the ability to see how the performance of outsourced elements is affecting the rest of your environment. If nothing else, you need the ability to authoritatively point the finger at the specific cause of a problem even if that cause is an outsourced IT element, and you can t directly effect a solution. This is where unified monitoring truly earns a place within the IT environment. For example, Figure 2.4 shows a very simple unified dashboard that shows the overall status of several components of the infrastructure including several outsourced components, such as Amazon Web Services. 22

29 Figure 2.4: Unified monitoring dashboard. The idea is to be able to tell, at a glance, where performance is failing, to drill through for more details, and then to either start fixing the problem if it exists on your end of the cloud or escalate the problem to someone who can. Let s be very clear on one thing: Any organization that s outsourcing any portion of its business IT environment and cannot monitor the basic performance of those outsourced elements is going to be in big trouble when something eventually goes wrong. Sure, you have SLAs with your outsourcing partners but read those SLAs. Typically, they only commit to a refund of whatever fees you pay if the SLA isn t met. That does nothing to compensate you for lost business that results from the unmet SLA. It s in your best interests, then, to keep a close watch on performance. That way, when it starts to go bad, you can immediately contact your outsourcing partner and get someone working on a fix so that the impact on your business can at least be minimized. Missing Pieces There s another problem when it comes to performance monitoring and management, scalability planning, and so forth: missing pieces. Our technology centric approach to IT tends to give us a myopic view of our environment. For example, consider the diagram in Figure 2.5. This is a typical (if simplified) diagram that any IT administrator might create to help visualize the components of a particular application. 23

30 Figure 2.5: Application diagram. The problem is that there are obviously missing pieces. For example, where s the infrastructure? Whoever created this diagram clearly doesn t have to deal with the infrastructure routers and switches and so forth so they didn t include it. It s assumed, almost abstracted like an outsourced component of the infrastructure. Maybe Figure 2.6 is a more accurate depiction of the environment. 24

31 Figure 2.6: Expanded application diagram. And even with this diagram, there are still probably missing pieces. This reality is probably one of the biggest dangers in IT management today: We forget about pieces that are outside our purview. 25

32 Again, this is where a unified monitoring system can create an advantage. Rather than focusing on a single area of technology like servers it can be technology agnostic, focusing on everything. There s no need to leave something out simply because it doesn t fit within the tool s domain of expertise; everything can be included. In fact, an even better approach is to focus on unified monitoring tools that can actually go out and find the components in the environment. Software doesn t have to make the same assumptions, or have the same technology prejudices, as humans. A unified monitoring console doesn t care if you happen to be a Hyper V expert, or if you prefer Cisco routers over some other brand. It can simply take the environment as it is, discovering the various components and constructing a real, accurate, and complete diagram of the environment. It can then start monitoring those components (perhaps prompting you for credentials for each component, if needed), enabling you to get that complete, all in one, unified dashboard. I ve been in environments where not using this kind of auto discovery became a real problem. Case Study Terry is responsible for the infrastructure components that support his company s primary business application. Those components include routers, switches, database servers, virtualization hosts, messaging servers, and even an outsourced SaaS sales management application. Terry s heard about the unified monitoring idea, and his organization has invested in a service that provides unified monitoring for the environment. Terry s carefully configured each and every component so that everything shows up in the monitoring solution s dashboard. One afternoon, the entire application goes down. Terry leaps to the unified monitoring console, and sees several alarm indications. He drills down and discovers that the connection to the SaaS application is unavailable. Drilling further, he sees that the router for that connection is working fine, and that the firewall is up and responsive. He s at a complete loss. Several hours of manual troubleshooting and wire tracing reveal something about the environment that Terry didn t know: There s a router on the other side of the firewall as well, and it s failed. Normal Internet communications are still working because those travel through a different connection, but the connection that carries the SaaS application s traffic is offline. The extra router is actually a legacy component that pretty much everyone had forgotten about. A monitoring solution capable of automated discovery wouldn t have forgotten, though. It could have detected the extra router and included it in Terry s dashboard, making it much easier for him to spot the problem. In fact, it might have prompted him to replace or remove that router much earlier, once he realized it existed. 26

Creating Unified IT Monitoring and Management in Your Environment

Creating Unified IT Monitoring and Management in Your Environment Creating Unified IT Monitoring and Management in Your Environment sponsored by Ch apter 2: Eliminating the Silos in IT Management... 16 Too Many Tools Means Too Few Solutions... 16 Domain Specific Tools

More information

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»

More information

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»

More information

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Becoming Proactive in Application Management and Monitoring

Becoming Proactive in Application Management and Monitoring The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

How Configuration Management Tools Address the Challenges of Configuration Management

How Configuration Management Tools Address the Challenges of Configuration Management Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

Application Performance Monitoring

Application Performance Monitoring The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 5: Bringing It All Together: Managing Application Performance Data... 72 Ca se Study: The Application Is Slow!...

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Application Performance Monitoring

Application Performance Monitoring The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 3: Discovering and Modeling Application Components... 36 Defining the Application Stack: You ll Always Miss Something...

More information

Isolating Network vs. Application Problems

Isolating Network vs. Application Problems The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common

More information

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»

More information

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to

More information

Application Performance Monitoring

Application Performance Monitoring The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 4: Diving Deep into Your Application Components... 54 Mo ving Further In: Going from Health Problems to Component

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Replication and Recovery Management Solutions

Replication and Recovery Management Solutions The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models

More information

Why Endpoint Encryption Can Fail to Deliver

Why Endpoint Encryption Can Fail to Deliver Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Why Diagnosing Application Problems is Too Hard

Why Diagnosing Application Problems is Too Hard The Essentials Series: Improving Application Performance Troubleshooting Why Diagnosing Application Problems is Too Hard sponsored by by Why Diagnosing Application Pro blems Is Too Hard... 1 It Starts

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Making Endpoint Encryption Work in the Real World

Making Endpoint Encryption Work in the Real World Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

The Next-Generation Virtual Data Center

The Next-Generation Virtual Data Center The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization

More information

How Are Certificates Used?

How Are Certificates Used? The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...

More information

Realizing the IT Management Value of Infrastructure Management

Realizing the IT Management Value of Infrastructure Management The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1

More information

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 2: Monitoring Active Directory... 14 Monitoring Goals... 14 Event Logs... 15 System

More information

What Are Cloud Connected Data Protection Services About?

What Are Cloud Connected Data Protection Services About? Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series What Are Cloud-Connected Data Protection Services About? Architectural Advice for Resellers sponsored by Introduction to

More information

The Art of High Availability

The Art of High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical

More information

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books

More information

How To Understand The Difference Between Network Analysis And Network Monitoring

How To Understand The Difference Between Network Analysis And Network Monitoring The Essentials Series: Network Troubleshooting and Problem Identification Bandwidth Monitoring and Traffic Analysis sponsored by by Greg Shields Bandwidth Monitoring and Traffic Analysis...1 Different

More information

Business Communications Tools and Solutions

Business Communications Tools and Solutions Building Business Productivity with Unified Communications The Essentials Series Networking for Increased Productivity and Reduced Costs sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Understanding the Business Benefits of Managed Services

Understanding the Business Benefits of Managed Services The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

Matching High Availability Technology with Business Needs

Matching High Availability Technology with Business Needs The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1

More information

The Essentials Series. Improving Application Performance Troubleshooting. sponsored by. by Don Jones

The Essentials Series. Improving Application Performance Troubleshooting. sponsored by. by Don Jones The Essentials Series Improving Application Performance Troubleshooting sponsored by by Article 1: Why Diagnosing Slow Applications Is Too Hard... 1 It Starts with a Help Desk Call... 1 And Quickly Involves

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Understanding & Improving Hypervisor Security

Understanding & Improving Hypervisor Security The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1

More information

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

can you improve service quality and availability while optimizing operations on VCE Vblock Systems? SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible

More information

Understanding the Business Value of Infrastructure Management

Understanding the Business Value of Infrastructure Management The Essentials Series: Infrastructure Management Understanding the Business Value of Infrastructure Management sponsored by by Chad Marshall Understanding the Business Value of Infrastructure Management...1

More information

Private Clouds: Selecting the Right Hardware for a Scalable Virtual Infrastructure

Private Clouds: Selecting the Right Hardware for a Scalable Virtual Infrastructure Private Clouds: Selecting the Right Hardware for a Scalable Virtual Infrastructure sponsored by Ch apter 4: Building the Business Case for Scalable Virtualization Using Private Clouds... 44 Modularization

More information

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Contact Center Technology Monitoring

Contact Center Technology Monitoring tech line / oct 2012 Contact Center Technology Monitoring Monitoring allows companies to detect outages and issues for quick resolution, and enables effective planning for prevention and optimization going

More information

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft

More information

are you helping your customers achieve their expectations for IT based service quality and availability?

are you helping your customers achieve their expectations for IT based service quality and availability? PARTNER BRIEF Service Operations Management from CA Technologies are you helping your customers achieve their expectations for IT based service quality and availability? FOR PARTNER USE ONLY DO NOT DISTRIBUTE

More information

Enabling Useful Active Directory Auditing

Enabling Useful Active Directory Auditing The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native

More information

Active Directory Auditing: What It Is, and What It Isn t

Active Directory Auditing: What It Is, and What It Isn t Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,

More information

Redefining Infrastructure Management for Today s Application Economy

Redefining Infrastructure Management for Today s Application Economy WHITE PAPER APRIL 2015 Redefining Infrastructure Management for Today s Application Economy Boost Operational Agility by Gaining a Holistic View of the Data Center, Cloud, Systems, Networks and Capacity

More information

Capacity planning with Microsoft System Center

Capacity planning with Microsoft System Center Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization

More information

The Shortcut Guide To

The Shortcut Guide To tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns

More information

APPLICATION PERFORMANCE MONITORING

APPLICATION PERFORMANCE MONITORING APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

5 Group Policy Management Capabilities You re Missing

5 Group Policy Management Capabilities You re Missing 5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

Application Performance Monitoring

Application Performance Monitoring The Five Essential Elements of Application Performance Monitoring sponsored by Introduction to Realtime Publishers by, Series Editor For several years now, Realtime has produced dozens and dozens of high

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis Building the Future of the Desktop on the Software-Defined Data Center... 1 What Is

More information

Data Protection in a Virtualized Environment

Data Protection in a Virtualized Environment The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview

More information

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

WHITE PAPER. Creating your Intranet Checklist

WHITE PAPER. Creating your Intranet Checklist WHITE PAPER Creating your Intranet Checklist About this guide It can be overwhelming to run and manage an Intranet project. As a provider of Intranet software and services to small, medium and large organizations,

More information

How to Plan a Successful Load Testing Programme for today s websites

How to Plan a Successful Load Testing Programme for today s websites How to Plan a Successful Load Testing Programme for today s websites This guide introduces best practise for load testing to overcome the complexities of today s rich, dynamic websites. It includes 10

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Quickly Recovering Deleted Active Directory Objects

Quickly Recovering Deleted Active Directory Objects The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory

More information

SELLING SHAREPOINT ENGAGEMENTS IN THE CLOUD ERA A GUIDE FOR MICROSOFT SI PARTNERS

SELLING SHAREPOINT ENGAGEMENTS IN THE CLOUD ERA A GUIDE FOR MICROSOFT SI PARTNERS SELLING SHAREPOINT ENGAGEMENTS IN THE CLOUD ERA A GUIDE FOR MICROSOFT SI PARTNERS Sponsored by Microsoft Corporation 1/ Selling SharePoint Online 2/ Selling SharePoint Farms on Windows Azure 3/ Selling

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting

More information

Response Time Analysis

Response Time Analysis Response Time Analysis A Pragmatic Approach for Tuning and Optimizing SQL Server Performance By Dean Richards Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 866.CONFIO.1 www.confio.com

More information

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool network management solutions for enterprise IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals

More information

The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields

The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Chapter 4: What Are the Best Practices in Implementing Small Environment Virtualization?... 31 The Life Cycle

More information

Overcoming the Three Pitfalls of Ineffective IT Monitoring Solutions

Overcoming the Three Pitfalls of Ineffective IT Monitoring Solutions Overcoming the Three Pitfalls of Ineffective IT Monitoring Solutions Key Challenges IT teams in many mid-market organizations and larger enterprises are struggling with limited budgets and resources. Consequently,

More information

Auditing File and Folder Access

Auditing File and Folder Access The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2 Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...

More information

22 Questions You Should Ask Your Computer Consultant

22 Questions You Should Ask Your Computer Consultant 22 Questions You Should Ask Your Computer Consultant BEFORE HIRING THEM TO SUPPORT YOUR NETWORK Stuart J. Bryan I-M TECHNOLOGY, LLC 131 PROVIDENCE STREET, TAFTVILLE, CT 06380 22 Questions You Should Ask

More information

Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery

Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For

More information

how can I deliver better services to my customers and grow revenue?

how can I deliver better services to my customers and grow revenue? SOLUTION BRIEF CA Wily Application Performance Management May 2010 how can I deliver better services to my customers and grow revenue? we can With the right solution, you can be certain that you are providing

More information

Do slow applications affect call centre performance?

Do slow applications affect call centre performance? Do slow applications affect call centre performance? A white paper examining the impact of slow applications on call centre quality and productivity Summary To be successful in today s competitive markets

More information

Why Native Windows Defragmentation Isn t Enough

Why Native Windows Defragmentation Isn t Enough Why Native Windows Defragmentation Isn t Enough The Essentials Series Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high-quality

More information

A Modern Approach to Monitoring Performance in Production

A Modern Approach to Monitoring Performance in Production An AppDynamics Business White Paper WHEN LOGGING ISN T ENOUGH A Modern Approach to Monitoring Performance in Production Ten years ago, the standard way to troubleshoot an application issue was to look

More information

Unbreak ITSM: Work the Way People Do

Unbreak ITSM: Work the Way People Do Unbreak ITSM: Work the Way People Do New Pressures from the Application Economy What happened? Just yesterday your IT organization was the master of its domain. When users had a problem or request, they

More information