How to Manage a Virtual Network Infrastructure

Similar documents
Elevating Data Center Performance Management

Managing Application Delivery from the User s Perspective

Network Performance Management Solutions Architecture

Analyzing Full-Duplex Networks

Network Instruments white paper

Brocade One Data Center Cloud-Optimized Networks

Network Management and Monitoring Software

The Road to Cloud Computing How to Evolve Your Data Center LAN to Support Virtualization and Cloud

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration

Simplifying Data Center Network Architecture: Collapsing the Tiers

4 Steps to Surviving Big Data

The Purview Solution Integration With Splunk

End-User Experience. Critical for Your Business: Managing Quality of Experience.

The IT benefits of bare-metal clouds

Gaining Operational Efficiencies with the Enterasys S-Series

All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at

In-Guest Monitoring With Microsoft System Center

How To Manage Cloud Computing

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Monitoring Databases on VMware

SDN Applications in Today s Data Center

Observer Probe Family

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

Delivering actionable service knowledge

Virtual Cascade Shark

How To Set Up Foglight Nms For A Proof Of Concept

Accelerating Micro-segmentation

Unified network traffic monitoring for physical and VMware environments

Cisco NetFlow Generation Appliance (NGA) 3140

Software defined networking. Your path to an agile hybrid cloud network

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

Ixia Phantom vtap. Overview. Virtual Taps Phantom Monitoring Solution DATA SHEET

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Active Visibility for Multi-Tiered Security // Solutions Overview

Beyond Monitoring Root-Cause Analysis

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Overview. performance bottlenecks in the SAN,

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?

Best Practices in Gigabit Capture

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

Riverbed SteelCentral. Product Family Brochure

Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

SolarWinds Network Performance Monitor powerful network fault & availabilty management

A Look at the New Converged Data Center

HP Virtualization Performance Viewer

Enhancing Cisco Networks with Gigamon // White Paper

Observer Probe Family

An Oracle White Paper July Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

Integrated Performance Management for Physical, Virtual and Cloud Infrastructure

Visibility in the Modern Data Center // Solution Overview

Peak Hosting, founded in 2001, provides comprehensive ITas-a-service

SERVERCENTRAL DISASTER RECOVERY AS A SERVICE (DRaaS) THE TECHNOLOGY BEHIND SERVERCENTRAL DRaaS. a white paper by

Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th Generation Servers

The Advantages of a Predatory Retail Enterprise

Programmable Networking with Open vswitch

BridgeWays Management Pack for VMware ESX

SOLARWINDS NETWORK PERFORMANCE MONITOR

Application Visibility and Monitoring >

Observer Analysis Advantages

Deploying Probes and Analyzers in an Enterprise Environment

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Virtualizing Exchange

Managing Network Bandwidth to Maximize Performance

THE HYPER-CONVERGENCE EFFECT: DO VIRTUALIZATION MANAGEMENT REQUIREMENTS CHANGE? by Eric Siebert, Author and vexpert

Tech Guide. Network Monitoring and Management in a Private Cloud

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events

Virtualization, SDN and NFV

Intel DPDK Boosts Server Appliance Performance White Paper

From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro

Business case for VoIP Readiness Network Assessment

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure

SOFTWARE-DEFINED NETWORKS

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Whitepaper. Business Service monitoring approach

Whitepaper. A Guide to Ensuring Perfect VoIP Calls. blog.sevone.com info@sevone.com

Optimizing Data Center Networks for Cloud Computing

Data Center Networking Designing Today s Data Center

Deploy the ExtraHop Discover Appliance with Hyper-V

Diagnosing the cause of poor application performance

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization

Nine Use Cases for Endace Systems in a Modern Trading Environment

Optimizing your IT infrastructure IBM Corporation

WHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance

Network Monitoring Comparison

Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF

How To Make A Network Safer With Stealthwatch

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

The Next Evolution in Storage Virtualization Management

Performance Management in a Virtual Environment. Eric Siebert Author and vexpert. whitepaper

Solving the Hypervisor Network I/O Bottleneck Solarflare Virtualization Acceleration

Server & Application Monitor

White Paper: Application and network performance alignment to IT best practices

Transcription:

3 Steps to Server Virtualization Visibility Each enterprise has its own reasons for moving to virtual infrastructure, but it all boils down to the demand for better and more efficient server utilization. Ensure comprehensive visibility with three practical steps. Overview Virtualization is a money-saving technology that allows the enterprise to stretch its IT budget much further by better utilizing server assets. Consider the immediate reduction in data center footprint, maintenance, and capital and operating expense overhead. Then add the promise to dynamically adjust server workloads and service delivery to achieve optimal user experience the vision of true orchestration. It s easy to see why server virtualization is key to many organizations operational strategy. But, what if something goes wrong? With network infrastructure, you can usually north/south track the root cause back to one location via careful instrumentation of the resources. Troubleshooting is then facilitated with any number of free and commercial-ware monitoring tools. How can you get the same visibility you need to validate service health within the virtual server hypervisor and vswitch east/west traffic? Virtual Eyes Network teams are the de facto first responders when application performance degrades. For this reason, it s critical to maintain visibility into and around all virtual constructs for effective troubleshooting and optimal service delivery. Otherwise, much of the value of server virtualization and consolidation efforts may be offset by sub-par application performance. White Paper

Fundamentally, achieving comprehensive visibility of a virtualized server environment requires an understanding of the health of the underlying resources, including host, hypervisor, and virtual switch (vswitch) along with perimeter client, and application traffic. This can be summarized in 3 steps: y Step One: Get status of host and virtualization components y Step Two: Monitor vswitch traffic y Step Three: Inspect perimeter and client conversations Step One: Get Status of Host and Virtualization Components The host, hypervisor, and vswitch are the foundation of the entire virtualization effort so their health is crucial. Polling technologies such as SNMP, WSD, and WMI can provide performance insight by interrogating the host and various virtualized elements. A fullyintegrated performance management platform can not only provide these views, but also display relevant operating metrics in a single, user-friendly dashboard. Step Two: Monitor VSwitch Traffic Monitoring how east/west traffic flows within the vswitch is critical to understanding the overall virtualized server health. This is particularly true when multiple tiers of the application are deployed within the same host. The implications can be significant. Consider, without comprehensive visibility, network engineers can only guess what happens to the traffic once it passes into the virtual server. Things happen to the user request inside (good or bad), and then assuming the situation is not a complete train wreck from a functional standpoint, out comes a service response. Metrics like CPU utilization, memory usage, and virtualized variables like individual instance status are examples of accessible data. Often, these parameters can point to the root cause of service issues that may otherwise manifest themselves indirectly. Without vswitch or hypervisor east/west visibility, the engineer on the outside can only view server application access layer conversations at the edge from this vantage point. To address this deficiency, there are two options. Depending upon the monitoring team s preferences, unique resource requirements, and virtual server solution deployed, an Inside or Outside Model may be chosen. For example, poor response time of an application hosted on a virtualized server may have nothing to do with the service or the network, but may instead be tied to excessively high CPU utilization. Without this monitoring perspective, troubleshooting will be more difficult and time consuming. In either case, in order to minimize the impact to user traffic, it is recommended (if possible) that a dedicated physical NIC be employed for bringing traffic out of the host that would otherwise remain inside the virtualized server. If this is not an option, be alert to the potential impact of production traffic by monitoring bandwidth consumption exiting the server. Alternatively, some network monitoring switch vendors offer hypervisor-based visibility into east-west which allows copies of traffic to be transmitted out-of-band outside the server or within the existing vswitch. Finally, be aware that some virtual server vendors now support NetFlow, another rich source of vswitch activity and health which can be transmitted to and analyzed by many monitoring tools. 2 3 Steps to Server Virtualization Visibility

The Inside Virtual Monitoring Model The process begins by creating a dedicated monitoring instance and installing a monitoring tool on it. Next, you will need to deliver the packets to this. There are two methods to achieve this; the first is to exploit port spanning capabilities available from most server virtualization vendors within their vswitch. The second, as mentioned above is to install hypervisor-based visibility from third-party vendors within the hypervisor, capturing and transmitting relevant traffic to the monitoring. Summary or select packet data can then be transmitted to an external central analysis solution for rollup with other network infrastructure data. Since the monitoring processing is done within the server, there can be concerns as to the amount of compute resource overhead this is something that will need to be assessed for your unique environment. Regardless, there are several distinct advantages to this method. First, it s still arguably simpler conceptually to keep the monitoring of a given virtualized server self-contained. Second, depending on the monitoring strategy; it also has the potential to reduce the amount of outbound monitoring traffic exiting the server (since processing is performed inside and hence only summary data is often transmitted). The following diagram illustrates the Inside Monitoring Process: Monitoring Instance Did You Know? Virtual servers are often highly provisioned and operating at elevated utilization levels. Assessing their underlying health and adding additional resources when necessary, is essential for peak performance VSwitch/Hypervisor Hardware External Monitoring Tool Summary data or copy raw packets Figure 1. The Inside Virtual Monitoring Model - Virtualized server monitoring using a Monitor Instance. A significant disadvantage is the potential for considerable resource overhead (processing, storage, etc ) by the monitoring instance on its and the entire virtual server, and thus reduction of the amount available for the actual services running on the host. Therefore, depending on load-levels and assuming ware or Hyper-V is deployed, a more compelling instrumentation method maybe the Outside Virtual Monitoring Model described below. 3 3 Steps to Server Virtualization Visibility

The Outside Virtual Monitoring Model In this method, your performance monitoring is achieved by pushing a copy of raw (unprocessed) vswitch east/west traffic out of the virtualized server via the built-in port mirror functionality or as described above by using hypervisor-based visibility available from some network monitoring vendors. Here is a diagram of Outside Monitoring Process: VSwitch/Hypervisor Hardware Server NIC transmits raw packet traffic outside the host via port mirror functionality External Monitoring Tool Figure 2. The Outside Virtual Monitoring Model - All analysis performed externally. The method offers several major advantages. The first is that as mentioned above there is less processing, or resource overhead, since data analysis is not done within the server. This provides flexibility as to the placement of analysis tools. Some vendors also allow for tunneling the port mapped traffic for further monitoring flexibility. The one caution is that large amounts of traffic may need to be transmitted outside the virtual server, making a dedicated network card or an out-of-band path optimal to ensure that there is no impact to production I/O performance. A Final Consideration One way to simplify the monitoring process and effectively eliminate the need for monitoring the vswitch is to restrict processing of multi-tier applications to an individual tier per host. Doing so will ensure visibility for all points in an application as traffic between two particular tiers will be accessible at the perimeter. Note however, that this will demand planning and agreement with at least the server and applications teams to guarantee operational compliance. The downside is a loss of some hosting flexibility and a potential for possible reduced application performance as inter-tier communications are more distributed. Step Three: Inspect Perimeter and Client Conversations Frequently referred to as the application access layer, these north/ south links are often heavily utilized, running at least gigabit, frequently 10 Gb, and in some of the highest performance environments even 40 Gb network speeds. Here, there can be considerable congestion resulting in service bottlenecks if the network or applications are not properly architected for optimal inter-tier communications or the resources are oversubscribed. This is a particularly good vantage point for understanding the behavior of client traffic as it enters the virtual server environment, as well as a source of insight into end-user experience. This north/south traffic visibility provides a crucial view into a potential service pinch point. Therefore, beyond the core and distribution layers it is another area of the network infrastructure that should be instrumented with back-in-time analysis tools with in-depth knowledge of the application layer. Hybrid Strategies When it comes to scrutinizing east/west traffic, some organizations employ a hybrid model using monitoring strategies from both of these methods based on their specific needs. For example, it may be advantageous in certain circumstances where there are I/O limitations into and out of a specific virtualized server to perform some of the preprocessing within a in order to reduce outbound monitoring traffic from the server. You would still need to offload the remaining analysis externally to keep host overhead at acceptable levels. DISTRIBUTION CORE SERVER SWITCH CORE DISTRIBUTION SERVER SWITCH Heavily utilized server acces links with client conversastions Network TAPs to Monitoring Tool Instrumenting the application server access layer to avoid traffic congestion. 4 3 Steps to Server Virtualization Visibility

3 Steps to Virtual Visibility Cheat Sheet Step One: Get status of host and virtualization components Step Two: Monitor vswitch east/west traffic Step Three: Inspect perimeter and client north/ south conversations Use polling technologies such as SNMP, WSD, and WMI to provide performance metrics like CPU utilization, memory usage, and virtualized variables like individual instance status to find the real cause of service issues. Do your homework. Poor application response time and other service issues can be tied to unexpected sources To the network engineer, everything disappears once it hits the virtual server. To combat this black box effect, there are two methods to maintain visibility: 1. Inside Virtual Monitoring Model a. Create a dedicated monitoring instance. b. Transmit relevant data to this instance for analysis. c. Analyze traffic locally with a monitoring solution. d. Transmit summary or packet data to an external central analysis solution. 2. Outside Virtual Monitoring Model a. Push copies of raw, unprocessed vswitch east/west traffic out of the virtualized server. Instrument highly-saturated lication Access Layer links with a packet capture device like Observer GigaStor to record conversations and rewind for back in time analysis. 70-80% Be sure the packet capture appliance you select is up to the task of keeping up with traffic that can regularly operate at loads up to 70-80 percent utilization. Conclusion Virtualization and consolidation offers significant upside for today s dynamic data center model and in achieving optimal IT business service delivery. However, monitoring visibility must be maintained so potential application degradation issues can be detected and resolved before impacting the end user. To do so, care must be given in properly instrumenting virtualized server deployments and the supporting network infrastructure. Each data center environment is unique, with distinct challenges and demands. These are the variables that will ultimately drive the final monitoring architecture so the concepts provided in this white paper may need modification for each unique real-world deployment. For best results, collaborate with network, server, application, operations, and potentially even storage teams to maximize the probability that the agile, service orchestration vision, of which server virtualization and consolidation plays an integral part, will translate into true business value and outstanding application performance. For a fully-integrated performance management platform that can provide these views and display relevant operating metrics in a single, user-friendly dashboard, check out www.networkinstruments.com. Use the easy Virtual Server Visibility Cheat Sheet to share key concepts with your team. Contact Us +1 844 GO VIAVI (+1 844 468 4284) To reach the Viavi office nearest you, visit viavisolutions.com/contacts. 2015 Viavi Solutions Inc. Product specifications and descriptions in this document are subject to change without notice. threestepsservervirtualizationvisibility-wp-ec-ae 30176206 901 0115 viavisolutions.com