siliconindia

How to Effectively & Efficiently Monitor Your Cloud Computing Infrastructure

Author: Vikas Aggarwal
Founder and CEO, Zyrion Inc
How to Effectively & Efficiently Monitor Your Cloud Computing
Infrastructure  -By-Vikas Aggarwal
Software applications and the underlying computing infrastructure are essential enablers of business processes in today’s technology-dependent enterprise environment. Almost every single business activity - from taking an order from a customer to delivering purchased products - depends directly on the effective performance of the Information Technology (IT).

Organizations have used a variety of tools and approaches to monitor their networks and ensure optimum performance of their enterprise IT infrastructure. It is clear though that traditional network management tools have been stretched to the limit, given the widespread adoption of multi-tier applications, distributed computing, and Internet technologies in recent years. The arrival of cloud computing, the latest evolution in IT, creates a new set of challenges that require innovative monitoring tools to help businesses leverage its cost and efficiency benefits, while mitigating the risks of underperforming infrastructure. This article will discuss the limitations of traditional tools, and review the capabilities of the next generation tools that are able to address the increased management demands of modern IT infrastructure.

In simple terms, cloud computing uses virtualization, grid architectures, and software as a service application delivery, both inside and outside the boundaries of the enterprise network. This computing approach or ‘technology’ promises significant cost savings and business agility compared with traditional methods of computing. In a cloud environment, a business application, for example, may leverage a combination of in-house vanilla virtual machines, pre-built storefront virtual machines from an external cloud vendor (e.g. Yahoo), and an external application service (e.g. NetSuite). Furthermore, a variety of network elements and links make up the required infrastructure mix to ensure the effective functioning of the overall application. This type of complicated environment requires a new approach to network management and monitoring.

Traditional network management and monitoring systems have focused on measuring and monitoring technical metrics and trends of individual elements and components in the infrastructure. Although these systems enable the IT operations team to identify problem areas from a technical point of view for a given piece of infrastructure, significant gaps exist in determining the business impact of a specific problem. If a router and an external application service fail at the same time, legacy monitoring systems offer no way for the Network Operations Center (NOC) operator to determine which of these is more critical or which business services have been impacted by these failures. When an isolated issue occurs in the complex Web of new technologies - one that may impact one or more user-facing tasks in a business process - the current monitoring approaches are incapable of determining its impact on the business.

In order to ensure smooth running of business operations in a cloud environment, network management must move away from point monitoring of IT infrastructure to monitoring business service availability and performance. It must go beyond just looking at the performance of individual nodes or components to include a holistic service-oriented view.

To ensure greater reliability of essential processes and systems in a virtual environment, Business Service Management (BSM) systems can help enterprises connect business processes with IT operations to achieve a more holistic perspective. By connecting the worlds of IT and business, BSM solutions are able to identify the affected business processes or services when problems occur in the complex, distributed, and virtual IT infrastructure. BSM solutions enable preemptive and rapid identification of business issues, accurate identification of root causes and quick resolution of problems.

Although the case for BSM is clear, the path forward has not been an easy one, given the solution options that have been available in the marketplace. Older generation network monitoring products are not able to unify fault or event, performance management, and BSM within one system, and thus force businesses to deploy and integrate multiple systems to get an end-to-end view. This cumbersome approach involves linking multiple disparate applications across different layers and domains of infrastructure and business services. These solutions contain a confusing array of complicated features, require specialized application-specific expertise to install, integrate and manage, and involve execution of complex projects to complete an implementation. All of these add up to a significant investment in the initial deployment and ongoing administrative support, resulting in extremely high total cost of ownership.

Fortunately, innovative solutions have emerged to deliver advanced BSM capabilities required by the enterprise, pre-integrated with the necessary underlying fault or event and performance management capabilities. These next generation BSM systems leverage two key technical advantages that enable them to effectively support cloud computing environments.

The first, open and extensible APIs or data-capture plug-ins for integrating with external systems allow for the easy addition of custom monitors to capture availability and performance data from any element within the cloud computing infrastructure, whether it’s a new external Web service or a virtual machine.

The second, sometimes referred to as creating ‘service containers’, involve grouping an organization’s IT infrastructure to create logical, business-oriented views of the overall physical and virtualized computing network. The ability to link applications and the cloud computing infrastructure with business services creates service containers that allow enterprise network administrators monitor for multiple elements of the infrastructure, generate reports on service containers, get uptime information and realtime status for services, and receive alerts if services fail or exceed defined thresholds.

Next generation BSM systems provide the ability to define container severities to support varying business needs and objectives. Users can specify rules to indicate when a container is identified as being in an undesirable state. For example, if there are two redundant network paths between two end points, this can be specified in a business container. If there is a virtual server farm behind a load balancer and an outage of some of the virtual servers does not affect the supported business service, this can also be specified in a business container. Similarly, if there is a single SaaS application that supports the same business service, the business container can be defined to indicate the status of the business service as being ‘critical’ if the synthetic test transaction with SaaS application fails.

As mentioned earlier, business processes are increasingly dependent on a complex mix of IT infrastructure and applications that extend beyond the boundaries of the enterprise network. A new set of IT management challenges have emerged in the light of the rapid adoption of cloud computing technologies, such as virtualization, grid architectures and SaaS. To ensure smooth business operations, organizations need to deploy advanced BSM solutions that overcome the limitations of legacy network management tools by providing realtime visibility into the availability and performance of business services.

The author is Founder and CEO, Zyrion Inc
Previous  article
Next article
 
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
  Cancel
Reader's comments(2)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail (dmary4love1@yahoo.fr) for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: Hi my dear,
My name is Mounace, i would like to establish a true relationship with you in one love. please send email to me at (mounace43@yahoo.com) i will reply to you with my picture and tell you more about myself. thanks and remain blessed for me,
Your new friend Mounace
Posted by: mounace love love - Thursday 09th, June 2011
More articles
The retail industry is witnessing an increased migration of customers ... -By-Kaushal Mehta
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
Its 1 AM. Do You Know What Your Offshore Team Is Doing? -By-Samir Shah
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
Disconnect: The Root Of All Execution Evils -By-Raj Karamchedu
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
IT Services Rise Of Tier II Companies -By-Madhavi Vuppalapati
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
DLP, Prevention Is Better Than A Cure -By-Bhaskar Bakthavatsalu
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>