E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
|
|
|
- Avice Lester
- 10 years ago
- Views:
Transcription
1 E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
2 W orking with individual in hybrid cloud can be complex, but Quality of Experience can be ensured. This expert E-Guide walks through a three-step process on how to make sure that worker productivity isn t impacted by performance issues. PAGE 2 OF 10
3 WORKING WITH INDIVIDUAL APPLICATIONS FOR HYBRID CLOUD MANAGEMENT Tom Nolle As enterprises get their arms around working with hybrid cloud architectures, the issue of managing individual cloud in a hybrid resource pool quickly comes to the forefront. Cloud decouple application components from specific server and storage resources to create a "pool' that can be employed to maximize utilization and reduce costs. A company can contribute its own servers to the pool to create a private cloud, and it can also use one or more public cloud providers to host non-mission-critical or act as an overflow or failover resource in case of problems with its own data centers. Managing and monitoring hybrid cloud resource pools to make sure that worker productivity isn t impacted by performance issues is a three-step process: PAGE 3 OF 10
4 1. Set a measurable Quality of Experience (QoE) goal. 2. Organize your monitoring/ resources to fully isolate problems. 3. Target remedial action at the real problem source, even in a virtual/cloud world. The most important step hybrid cloud and monitoring is measuring QoE response time at the user's point of connection. This can be obtained from the local application component, client device or local network connection. What is important is the ability to measure total application response time and packet-loss rate. These pieces of information will be used in conjunction with data from other monitoring sources to fix problems. Where the user accesses on smart devices, tools on the client device will probably be able to provide response-time data. The IT shop has access to the data in the device, either because at best, the device has mobile device (MDM) features they can draw on, or at worst, the application on the device could include the response-time data in the message flow it generates to the application. If that doesn't work, it s always possible to measure response time with PAGE 4 OF 10
5 monitors or probes. No matter how you get the data, the key point is that if you know the acceptable response times and the point at which operations become unacceptable, you have a baseline for resource and monitoring. TAKING INVENTORY OF AVAILABLE MANAGEMENT DATA The second step in QoE /monitoring is to take inventory of the data available from network and cloud providers. As before, the objective is to see what delay and packet loss information is available and what resources or network connections the data represents. Expect considerable variation here among providers, even in terms of how the data is reported and interpreted, so be prepared to do some work reducing all the information to common metrics. There is no general solution because every network and cloud provider will have somewhat different information and formats, so there s no option but to do a bit of customization to create the needed data elements. On the network side, it's good to assess whether standard network tools like ping and traceroute will work. Both of these protocols provide basic reachability, response time and hop data (using traceroute) on the path between two points. Looking into the network from the user connection point to the application, they can help find network delays or unusual packet routings that can PAGE 5 OF 10
6 indicate an internal network problem. In order for these to work, however, they have to be supported both at the application side of the connection and in the network connection itself. Things like Network Address Translation (NAT) and load balancing can impact ping/traceroute value so testing this during a project pilot is important. AVAILABLE MANAGEMENT DATA FROM CLOUD PROVIDERS On the cloud side, cloud providers data varies depending on the type of X as a service offered. Many Platform as a Service (PaaS) and Software as a Service (SaaS) providers will be able to offer some data on the cloud-to-network interface and on internal application resources because the are using cloud operating system and middleware components that often have interfaces. With Infrastructure as a Service (IaaS), the application s software platform is provided as part of the user s machine image, which means tools must be built into the machine image to be available. Application monitoring and, and even some network tools, can often be incorporated into application middleware and deployed on IaaS services to gain better visibility and control. But it s important to check with the cloud provider to ensure that the tools will work on virtual PAGE 6 OF 10
7 resources. In many cases, simple to echo packets to measure response time can also be added, if ping/traceroute isn t satisfactory or supported. Unfortunately, there are no real standards for cloud, even to the extent of defining what information is available. IT has to pick tools based on their familiarity and needs, which generally means any tool that can be integrated with the application image and uses available APIs (on PaaS) will work. When all of the data is assembled and converted into a common format, fault isolation and remediation normally begins when user response times rise more than a predetermined amount. The first step is to determine if there is unusual packet loss since lost packets will not only have to be retransmitted, they often reset the flow control protocols and thus may reduce connection performance. Packet loss is most easily detected by looking for retransmissions or flow-control changes, either in the application s network middleware or in the client device. If losses can be eliminated as a cause, the next step is to look for network delay, followed by processing delay. Packet loss is a result of congestion en route, so fixing packet loss will often involve either rerouting packets or increasing network performance. In either case, it will be necessary to work with the network provider(s) to resolve the problem. Packet delays in the network are usually associated with an excess PAGE 7 OF 10
8 of hops between routers along the path, a measure of an inefficient route. If packet routing changes because of a network problem, it will likely be restored to normal in time, but persistent problems with excessive route hops may indicate the provider isn t able to provide an efficient connection to cloud resources. With VPN services, it s often possible to reroute VPN connections to reduce hops, but with Internet services, the only option may be to change ISPs. When neither packet loss nor packet routing delay is at fault, the only remaining variable is processing time, which can be impacted by the loading on the server used to run the application, the storage used, and the application design. Issues with cloud application performance can be traced to colliding resource requirements from other cloud users, inadequate resources allocated to the application in the cloud contract, failure of the provider to meet the service level agreement (SLA), or simply an excess of demand on the application. It may be possible to tune cloud resource allocation through the cloud interface or to launch multiple instances of the application to improve response time. This will mean adding a form of load balancing to the application, something best handled by the cloud provider or cloud-hosted software. Professionals in the IT and network operations areas understand problem isolation and resolution processes where resources are dedicated to PAGE 8 OF 10
9 . With some care, those same principles can support hybrid resource pools and ensure application QoE in the cloud. TOM NOLLE is a strategic egghead -- someone who first wants to know the truth, no matter what it is, and then wants to explain it in a way that reaches everyone who cares to know it. He's an analyst in telecommunications, media and technology, and a former software architect who now works to blend technology detail and business reality. PAGE 9 OF 10
10 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 10 OF 10
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
Hybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
Securing the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
Is Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
Skills shortage, training present pitfalls for big data analytics
present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,
Advantages on Green Cloud Computing
Advantages on Green Advantages of Green A growing number of organizations are becoming more green-conscious as there are several advantages of green IT. In this e-guide, brought to you by SearchDataCenter.com,
Evaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
Expert guide to achieving data center efficiency How to build an optimal data center cooling system
achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier
5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings
Managing Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
Moving to the Cloud: A guide for Southeast Asian IT and Business Managers
Moving to the Cloud: A guide for Southeast Asian IT and Business Managers Prepare for with these key strategies on cutting costs and managing risk Realizing true value from the cloud requires strong planning
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS
E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components
Order Management System Best Practices
Order Management System Best Practices For most organizations, order management taking, fulfilling and shipping orders is far from simple. In fact, there are some common holes in order management software
5 free Exchange add-ons you should consider Eliminating administration pain points on a budget
5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline
GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
MDM features vs. native mobile security
vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment
The skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
Managing the supply chain for SAP
Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Cloud Security Certification Guide What certification is right for you?
What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
Supply Chain Management Tips and Best Practices
Supply Chain Management Tips and Best Practices According to Aberdeen Group, as companies seek to contain or cut supply chain management (SCM) costs, they are prioritizing increasing supply chain visibility,
Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends
A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market
LTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
Social media driving CRM strategies
Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting
The state of cloud adoption in India The use cases, industry trends, business demands, and user expectations driving cloud adoption in Indian
The state of cloud adoption in India The use cases, industry trends, business demands, and user expectations driving cloud adoption in Indian organizations IT Professionals at organizations based in India
How To Protect Your Online Backup From Being Hacked
Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES A ccording to Forrester Research, e-commerce efforts will bring in $280 million in 2015. Companies who want a part of this growing market will
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
