SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
nd
In-depth analysis of Virtual
Infrastructures vs. Monitoring
By Dennis Zimmer
CEO opvizor GmbH,
VMware vExpert, VMware VCAP
WHITEPAPER
The difference between in-depth analysis of virtual
infrastructures & monitoring
Scenarios and use cases
A deep analysis of virtual infrastructures & monitoring 2
Table of Contents
1. Introduction.........................................................................................................................................3
1.1 Virtual infrastructures are becoming increasingly complex ................................3
1.2 A Wide range of virtualization solutions and infrastructure components....3
1.3 Keeping systems reliable through monitoring............................................................3
2. Operating Monitoring solutions.................................................................................................4
2.1 Setting the right threshold....................................................................................................4
3. Depth......................................................................................................................................................4
3.1 Removing ambiguity................................................................................................................4
3.2 The difference between in-depth analysis and monitoring..................................4
3.3 How to respond when problems arise ............................................................................6
4. A Question Of Correct Analysis..............................................................................................6
DISCLAIMER ..........................................................................................................................................8
A deep analysis of virtual infrastructures & monitoring 3
1. Introduction
1.1 Virtual infrastructures are becoming increasingly complex
Virtualization is an indispensable part of a modern data center. Frequently, the
degree of virtualization is 90 percent or more. What formerly operated on a number
of servers today runs on a few hosts. With the high rate of virtualization and the
resulting increase in complexity, problems are more difficult to locate. It is therefore
necessary to consider how the infrastructure can be monitored accurately and how
potential error situations can be found to avoid costly errors. Unfortunately, under
certain circumstances, even minor problems can significantly negatively impact the
entire infrastructure.
1.2 A Wide range of virtualization solutions and infrastructure
components
Virtualization solutions are many: the selection ranges from suppliers such as KVM
and Citrix to Microsoft Hyper-V and the market-leading provider VMware, with its
vSphere solution. The variety of combinations with other components of the
infrastructure is limitless. Reduced to its basic functionality, each of these solutions
operates almost the same way. They mainly enable resource partitioning for optimal
and cost-effective use of physical hardware. In addition, completely new methods of
high-availability designs are possible.
1.3 Keeping systems reliable through monitoring
What about the reliability of the virtualized machines (VMs)? Are the smooth
operation of VMs and the applications running on your systems guaranteed?
Keeping track of this complex infrastructure can be guaranteed only by employing
various tools, with at least one monitoring solution serving as the base. The aim is to
be promptly notified if system loads are exceeded or failures occur. In many
organizations, failure prevention tools offer 99.9% even 99.99% reliability. Such
statistics are not possible without appropriate software and automation.
A deep analysis of virtual infrastructures & monitoring 4
2. Operating Monitoring solutions
Monitoring tools are widespread, such as Nagios or Icinga, Microsoft SCOM or
proprietary and application-specific monitoring tools (e.g. integrated in VMware
vCenter). They offer real-time insight on whether certain thresholds are exceeded
or if a failure has occurred. If this is the case, then the software alerts the
administrator through email or SMS sounds an alarm.
2.1 Setting the right threshold
The biggest challenge is the correct setting of the threshold value, since this
threshold determines whether an action should be performed or not. For example,
sensitive thresholds lead to many alerts and alarms, and administrators are flooded
with harmless or false messages. This causes really important messages to
sometimes be overlooked in the crowd. But what is the correct threshold for an
administrator? This must be decided based on the unique infrastructure. But of
course, recommendations and best practices exist that can be implemented and
provide guidance.
3. Depth ANALYSIS?
3.1 Removing ambiguity
An analysis is by definition a systematic study which consists of two processes, data
collection and evaluation. In particular, we consider this relationship and its effects
and interactions between the elements. In the analysis it is always about the
evaluation of the data obtained.
3.2 The difference between in-depth analysis and monitoring
Fig. 1
A deep analysis of virtual infrastructures & monitoring 5
On Fig. 1. you can recognize how an issue could escalate if it is not detected by in-
depth analysis. The time to act could be increased tremendously if a tool for in-depth
Detection has been set up in the infrastructure.
An in-depth analysis of the infrastructure is usually tested in accordance with rules,
security and best practices. It's less about the actual state of the load, but rather the
HOW, i.e. how something is configured. For example, a message such as "100% CPU
utilization" appearing without more information would not be very helpful. Here
you can already see a clear distinction between pure monitoring and analysis. You
want to know why the reported problem occurred and how it can be fixed.
Therefore, an automatic recognition after troubleshooting and recording would be
ideal.
A typical example which comes into play at each virtualization manufacturer involves
the topics vCPU (virtual CPU) and vMemory (memory which is assigned to a virtual
machine). Surely every administrator has received a request to create a virtual
machine with x number of vCPUs and y GB of RAM. But how will the administrator
take notice if the resources fulfill the requirements of the virtual machine or if sizing
is totally overprovisioned? This is where a deep analysis comes into play. It can be
analyzed using various values, where the corresponding information for resource
optimization is then displayed. For a too high number of unnecessary vCPUs can be
a performance problem on the respective host system, too. Additionally, we must
always bear in mind that a virtual machine is rarely alone – it has as many systems
that can be deployed on the physical host without interfering with each other. Thus
although it may not be directly relevant, an optimally configured resource impacts
the overall infrastructure.
The added value of an analysis in automation is to screen information on system
configuration and measure the results against predefined rules. The administrator
can, of course, check such items manually against best practice recommendations.
However, this can be daunting due to the size and complexity of some
infrastructures and is also quite error-prone. According to best practices, more
components are evaluated and recommendations are made depending on the
current version. In the virtual environment, attention should be paid to how storage
and network components work together. Another popular theme is whether
clusters are uniformly configured. Through a deep analysis, the administrator wants
to be preventively informed. This also enables the ability to respond before an error
to avoid breakdowns and lags in productivity. Once you imagine that up to 512
virtual machines are supported per physical host (of course a very symbolic number),
the need to operate optimally becomes clear.
In the meantime, applications that are always running, such as SAP, Microsoft
Exchange, SQL, SharePoint, Tomcat, etc., are critical to the business. But often the
request is only for a virtual machine, without the knowledge of what might be
running. In this situation, how can a virtual machine be configured optimally for the
request? Usually not with the default values, which are at times just clicks through a
A deep analysis of virtual infrastructures & monitoring 6
wizard. Often it's the little things that matter, like the right selection of a virtual
network card or the correct SCSI controllers in the virtual machine.
3.3 How to respond when problems arise
The administrator receives information that an event has occurred through the
monitoring system, which must then be routed to troubleshooting. Given the large
number of complex components that are used in a virtual infrastructure,
troubleshooting is often quite difficult. Is it just storage latency problems or even
misconfigured MTU sizes on the switches? There are several tools to support the
administrator In the VMware environment. Esxtop is one popular tool. However,
using it effectively requires some know-how, especially when interpreting thresholds.
The site administrator therefore usually relies on their own initiative. What’s more,
an immediate or timely solution is needed.
The in-depth analysis is different in relation to monitoring in the way that problems
that are encountered are treated. A CPU utilization problem of a virtual machine at
100% is displayed and reported, but the administrator doesn’t have the information
on why this CPU problem has occurred. In many cases, CPU limits are set in the VM
configuration temporarily, and then removing the limit is forgotten. Thus, in-depth
analysis combines a monitoring system with an appropriate expert system.
A new approach for in-depth analysis includes tools such as opvizor.
As Andreas Peetz, vExpert and blog author (http://www.v-front.de) said:
"Opvizor lets you run health checks and predictive analyses in a fully automated way.
These are derived from up-to-date rules that are centrally provided by notable
virtualization experts. Based on these "cloud rules" you can e.g. create weekly
reports that are available anytime, anywhere. This way the virtualization admin is
enabled to act preventively, but without burdening himself with maintaining
complex software, because that is implemented as a real cloud service. Only one
small local agent is needed in your environment. In a nutshell opvizor helps to avoid
many issues and outages and makes the administrator's job easier and much more
efficient. This software is definitely worth an investment!"
ALL A QUESTION OF THE CORRECT ANALYSIS
4. A Question Of Correct Analysis
It is not always easy to find THE solution for excellence for a given infrastructure.
However, you have to consider how individual software products work together best
in the area of in-depth analysis and monitoring and also what gives the administrator
a secure feeling (see also fig. 2).
Thanks to Big Data, sufficient meta-data is usually available from the virtual
infrastructure. However, these need to be properly evaluated and that‘s where in-
depth analysis enters.
A deep analysis of virtual infrastructures & monitoring 7
A deep analysis is the guarantee of a high-performance, secure, and error-free
infrastructure. It reduces errors and warnings in the monitoring tools and relieves
the administrator of the troubleshooting burden, allowing time for higher-value
projects.
Type Use Case Effort to Configure
Monitoring uptime surveillance high
In-depth analysis In-depth Compliance check low - medium
Fig. 2
A deep analysis of virtual infrastructures & monitoring 8
DISCLAIMER
Copyright 2014 opvizor GmbH, all rights reserved
The content and the information in this document are protected by copyright. This
emphasis, processing, distribution or duplication (copying by any means) of this work
or portions thereof, are not permitted without the consent of the publisher.
The information in this document is provided together with the VMware opvizor
analysis software.
This document is for informational purposes only. opvizor GmbH assumes no
liability for the accuracy or completeness of the information.
To the extent permitted by applicable law, opvizor GmbH provides this document as
is without warranty of any kind, including in particular the implied warranties of
merchantability, fitness for a particular purpose and non-infringement. In no event
shall opvizor GmbH shall be liable for any loss or direct or indirect damages arising
from the use of this document, including, without limitation, lost profits, business
interruption, loss of goodwill or lost data, even if opvizor GmbH has been advised of
the possibility of such damages.
The opvizor GmbH reserves the right to make changes and improvements to the
product in the course of product development.
opvizor GmbH
Schönbrunnerstrasse 218-220 , staircase A 4.04 A-1120 Vienna, Austria
UID: ATU67195304
www.opvizor.com
CEO : Dennis Zimmer
Date: May 3, 2014

Contenu connexe

Tendances

Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
Gabby Nizri
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Clear Technologies
 
Patch Management - 2013
Patch Management - 2013Patch Management - 2013
Patch Management - 2013
Vicky Ames
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 

Tendances (20)

10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data Access
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
 
Patch management
Patch managementPatch management
Patch management
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 
Patch Management - 2013
Patch Management - 2013Patch Management - 2013
Patch Management - 2013
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
MASci
MASciMASci
MASci
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Malware Incident Response
Malware Incident ResponseMalware Incident Response
Malware Incident Response
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 

En vedette

En vedette (11)

Alimentos
AlimentosAlimentos
Alimentos
 
Endorphin
EndorphinEndorphin
Endorphin
 
Dyffryn Gardens
Dyffryn GardensDyffryn Gardens
Dyffryn Gardens
 
File types pro forma-Libby Wright
File types pro forma-Libby WrightFile types pro forma-Libby Wright
File types pro forma-Libby Wright
 
Booklet
BookletBooklet
Booklet
 
Punt de llibre
Punt de llibrePunt de llibre
Punt de llibre
 
Electric Hoists Melbourne
Electric Hoists MelbourneElectric Hoists Melbourne
Electric Hoists Melbourne
 
กิจกรรมที่ 6
กิจกรรมที่ 6กิจกรรมที่ 6
กิจกรรมที่ 6
 
Provide inc presentation
Provide inc presentationProvide inc presentation
Provide inc presentation
 
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
 
Biodata format final
Biodata format finalBiodata format final
Biodata format final
 

Similaire à The difference between in-depth analysis of virtual infrastructures & monitoring

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
benscheerer
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
Atul Dhingra
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
Symantec
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
unyil96
 

Similaire à The difference between in-depth analysis of virtual infrastructures & monitoring (20)

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.com
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Agents vs Agentless
Agents vs AgentlessAgents vs Agentless
Agents vs Agentless
 
An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
Fault Detection and Prediction in Cloud Computing
Fault Detection and Prediction in Cloud ComputingFault Detection and Prediction in Cloud Computing
Fault Detection and Prediction in Cloud Computing
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 

Dernier

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 

Dernier (20)

20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 

The difference between in-depth analysis of virtual infrastructures & monitoring

  • 1. nd In-depth analysis of Virtual Infrastructures vs. Monitoring By Dennis Zimmer CEO opvizor GmbH, VMware vExpert, VMware VCAP WHITEPAPER The difference between in-depth analysis of virtual infrastructures & monitoring Scenarios and use cases
  • 2. A deep analysis of virtual infrastructures & monitoring 2 Table of Contents 1. Introduction.........................................................................................................................................3 1.1 Virtual infrastructures are becoming increasingly complex ................................3 1.2 A Wide range of virtualization solutions and infrastructure components....3 1.3 Keeping systems reliable through monitoring............................................................3 2. Operating Monitoring solutions.................................................................................................4 2.1 Setting the right threshold....................................................................................................4 3. Depth......................................................................................................................................................4 3.1 Removing ambiguity................................................................................................................4 3.2 The difference between in-depth analysis and monitoring..................................4 3.3 How to respond when problems arise ............................................................................6 4. A Question Of Correct Analysis..............................................................................................6 DISCLAIMER ..........................................................................................................................................8
  • 3. A deep analysis of virtual infrastructures & monitoring 3 1. Introduction 1.1 Virtual infrastructures are becoming increasingly complex Virtualization is an indispensable part of a modern data center. Frequently, the degree of virtualization is 90 percent or more. What formerly operated on a number of servers today runs on a few hosts. With the high rate of virtualization and the resulting increase in complexity, problems are more difficult to locate. It is therefore necessary to consider how the infrastructure can be monitored accurately and how potential error situations can be found to avoid costly errors. Unfortunately, under certain circumstances, even minor problems can significantly negatively impact the entire infrastructure. 1.2 A Wide range of virtualization solutions and infrastructure components Virtualization solutions are many: the selection ranges from suppliers such as KVM and Citrix to Microsoft Hyper-V and the market-leading provider VMware, with its vSphere solution. The variety of combinations with other components of the infrastructure is limitless. Reduced to its basic functionality, each of these solutions operates almost the same way. They mainly enable resource partitioning for optimal and cost-effective use of physical hardware. In addition, completely new methods of high-availability designs are possible. 1.3 Keeping systems reliable through monitoring What about the reliability of the virtualized machines (VMs)? Are the smooth operation of VMs and the applications running on your systems guaranteed? Keeping track of this complex infrastructure can be guaranteed only by employing various tools, with at least one monitoring solution serving as the base. The aim is to be promptly notified if system loads are exceeded or failures occur. In many organizations, failure prevention tools offer 99.9% even 99.99% reliability. Such statistics are not possible without appropriate software and automation.
  • 4. A deep analysis of virtual infrastructures & monitoring 4 2. Operating Monitoring solutions Monitoring tools are widespread, such as Nagios or Icinga, Microsoft SCOM or proprietary and application-specific monitoring tools (e.g. integrated in VMware vCenter). They offer real-time insight on whether certain thresholds are exceeded or if a failure has occurred. If this is the case, then the software alerts the administrator through email or SMS sounds an alarm. 2.1 Setting the right threshold The biggest challenge is the correct setting of the threshold value, since this threshold determines whether an action should be performed or not. For example, sensitive thresholds lead to many alerts and alarms, and administrators are flooded with harmless or false messages. This causes really important messages to sometimes be overlooked in the crowd. But what is the correct threshold for an administrator? This must be decided based on the unique infrastructure. But of course, recommendations and best practices exist that can be implemented and provide guidance. 3. Depth ANALYSIS? 3.1 Removing ambiguity An analysis is by definition a systematic study which consists of two processes, data collection and evaluation. In particular, we consider this relationship and its effects and interactions between the elements. In the analysis it is always about the evaluation of the data obtained. 3.2 The difference between in-depth analysis and monitoring Fig. 1
  • 5. A deep analysis of virtual infrastructures & monitoring 5 On Fig. 1. you can recognize how an issue could escalate if it is not detected by in- depth analysis. The time to act could be increased tremendously if a tool for in-depth Detection has been set up in the infrastructure. An in-depth analysis of the infrastructure is usually tested in accordance with rules, security and best practices. It's less about the actual state of the load, but rather the HOW, i.e. how something is configured. For example, a message such as "100% CPU utilization" appearing without more information would not be very helpful. Here you can already see a clear distinction between pure monitoring and analysis. You want to know why the reported problem occurred and how it can be fixed. Therefore, an automatic recognition after troubleshooting and recording would be ideal. A typical example which comes into play at each virtualization manufacturer involves the topics vCPU (virtual CPU) and vMemory (memory which is assigned to a virtual machine). Surely every administrator has received a request to create a virtual machine with x number of vCPUs and y GB of RAM. But how will the administrator take notice if the resources fulfill the requirements of the virtual machine or if sizing is totally overprovisioned? This is where a deep analysis comes into play. It can be analyzed using various values, where the corresponding information for resource optimization is then displayed. For a too high number of unnecessary vCPUs can be a performance problem on the respective host system, too. Additionally, we must always bear in mind that a virtual machine is rarely alone – it has as many systems that can be deployed on the physical host without interfering with each other. Thus although it may not be directly relevant, an optimally configured resource impacts the overall infrastructure. The added value of an analysis in automation is to screen information on system configuration and measure the results against predefined rules. The administrator can, of course, check such items manually against best practice recommendations. However, this can be daunting due to the size and complexity of some infrastructures and is also quite error-prone. According to best practices, more components are evaluated and recommendations are made depending on the current version. In the virtual environment, attention should be paid to how storage and network components work together. Another popular theme is whether clusters are uniformly configured. Through a deep analysis, the administrator wants to be preventively informed. This also enables the ability to respond before an error to avoid breakdowns and lags in productivity. Once you imagine that up to 512 virtual machines are supported per physical host (of course a very symbolic number), the need to operate optimally becomes clear. In the meantime, applications that are always running, such as SAP, Microsoft Exchange, SQL, SharePoint, Tomcat, etc., are critical to the business. But often the request is only for a virtual machine, without the knowledge of what might be running. In this situation, how can a virtual machine be configured optimally for the request? Usually not with the default values, which are at times just clicks through a
  • 6. A deep analysis of virtual infrastructures & monitoring 6 wizard. Often it's the little things that matter, like the right selection of a virtual network card or the correct SCSI controllers in the virtual machine. 3.3 How to respond when problems arise The administrator receives information that an event has occurred through the monitoring system, which must then be routed to troubleshooting. Given the large number of complex components that are used in a virtual infrastructure, troubleshooting is often quite difficult. Is it just storage latency problems or even misconfigured MTU sizes on the switches? There are several tools to support the administrator In the VMware environment. Esxtop is one popular tool. However, using it effectively requires some know-how, especially when interpreting thresholds. The site administrator therefore usually relies on their own initiative. What’s more, an immediate or timely solution is needed. The in-depth analysis is different in relation to monitoring in the way that problems that are encountered are treated. A CPU utilization problem of a virtual machine at 100% is displayed and reported, but the administrator doesn’t have the information on why this CPU problem has occurred. In many cases, CPU limits are set in the VM configuration temporarily, and then removing the limit is forgotten. Thus, in-depth analysis combines a monitoring system with an appropriate expert system. A new approach for in-depth analysis includes tools such as opvizor. As Andreas Peetz, vExpert and blog author (http://www.v-front.de) said: "Opvizor lets you run health checks and predictive analyses in a fully automated way. These are derived from up-to-date rules that are centrally provided by notable virtualization experts. Based on these "cloud rules" you can e.g. create weekly reports that are available anytime, anywhere. This way the virtualization admin is enabled to act preventively, but without burdening himself with maintaining complex software, because that is implemented as a real cloud service. Only one small local agent is needed in your environment. In a nutshell opvizor helps to avoid many issues and outages and makes the administrator's job easier and much more efficient. This software is definitely worth an investment!" ALL A QUESTION OF THE CORRECT ANALYSIS 4. A Question Of Correct Analysis It is not always easy to find THE solution for excellence for a given infrastructure. However, you have to consider how individual software products work together best in the area of in-depth analysis and monitoring and also what gives the administrator a secure feeling (see also fig. 2). Thanks to Big Data, sufficient meta-data is usually available from the virtual infrastructure. However, these need to be properly evaluated and that‘s where in- depth analysis enters.
  • 7. A deep analysis of virtual infrastructures & monitoring 7 A deep analysis is the guarantee of a high-performance, secure, and error-free infrastructure. It reduces errors and warnings in the monitoring tools and relieves the administrator of the troubleshooting burden, allowing time for higher-value projects. Type Use Case Effort to Configure Monitoring uptime surveillance high In-depth analysis In-depth Compliance check low - medium Fig. 2
  • 8. A deep analysis of virtual infrastructures & monitoring 8 DISCLAIMER Copyright 2014 opvizor GmbH, all rights reserved The content and the information in this document are protected by copyright. This emphasis, processing, distribution or duplication (copying by any means) of this work or portions thereof, are not permitted without the consent of the publisher. The information in this document is provided together with the VMware opvizor analysis software. This document is for informational purposes only. opvizor GmbH assumes no liability for the accuracy or completeness of the information. To the extent permitted by applicable law, opvizor GmbH provides this document as is without warranty of any kind, including in particular the implied warranties of merchantability, fitness for a particular purpose and non-infringement. In no event shall opvizor GmbH shall be liable for any loss or direct or indirect damages arising from the use of this document, including, without limitation, lost profits, business interruption, loss of goodwill or lost data, even if opvizor GmbH has been advised of the possibility of such damages. The opvizor GmbH reserves the right to make changes and improvements to the product in the course of product development. opvizor GmbH Schönbrunnerstrasse 218-220 , staircase A 4.04 A-1120 Vienna, Austria UID: ATU67195304 www.opvizor.com CEO : Dennis Zimmer Date: May 3, 2014