SlideShare a Scribd company logo
1 of 8
Download to read offline
nd
In-depth analysis of Virtual
Infrastructures vs. Monitoring
By Dennis Zimmer
CEO opvizor GmbH,
VMware vExpert, VMware VCAP
WHITEPAPER
The difference between in-depth analysis of virtual
infrastructures & monitoring
Scenarios and use cases
A deep analysis of virtual infrastructures & monitoring 2
Table of Contents
1. Introduction.........................................................................................................................................3
1.1 Virtual infrastructures are becoming increasingly complex ................................3
1.2 A Wide range of virtualization solutions and infrastructure components....3
1.3 Keeping systems reliable through monitoring............................................................3
2. Operating Monitoring solutions.................................................................................................4
2.1 Setting the right threshold....................................................................................................4
3. Depth......................................................................................................................................................4
3.1 Removing ambiguity................................................................................................................4
3.2 The difference between in-depth analysis and monitoring..................................4
3.3 How to respond when problems arise ............................................................................6
4. A Question Of Correct Analysis..............................................................................................6
DISCLAIMER ..........................................................................................................................................8
A deep analysis of virtual infrastructures & monitoring 3
1. Introduction
1.1 Virtual infrastructures are becoming increasingly complex
Virtualization is an indispensable part of a modern data center. Frequently, the
degree of virtualization is 90 percent or more. What formerly operated on a number
of servers today runs on a few hosts. With the high rate of virtualization and the
resulting increase in complexity, problems are more difficult to locate. It is therefore
necessary to consider how the infrastructure can be monitored accurately and how
potential error situations can be found to avoid costly errors. Unfortunately, under
certain circumstances, even minor problems can significantly negatively impact the
entire infrastructure.
1.2 A Wide range of virtualization solutions and infrastructure
components
Virtualization solutions are many: the selection ranges from suppliers such as KVM
and Citrix to Microsoft Hyper-V and the market-leading provider VMware, with its
vSphere solution. The variety of combinations with other components of the
infrastructure is limitless. Reduced to its basic functionality, each of these solutions
operates almost the same way. They mainly enable resource partitioning for optimal
and cost-effective use of physical hardware. In addition, completely new methods of
high-availability designs are possible.
1.3 Keeping systems reliable through monitoring
What about the reliability of the virtualized machines (VMs)? Are the smooth
operation of VMs and the applications running on your systems guaranteed?
Keeping track of this complex infrastructure can be guaranteed only by employing
various tools, with at least one monitoring solution serving as the base. The aim is to
be promptly notified if system loads are exceeded or failures occur. In many
organizations, failure prevention tools offer 99.9% even 99.99% reliability. Such
statistics are not possible without appropriate software and automation.
A deep analysis of virtual infrastructures & monitoring 4
2. Operating Monitoring solutions
Monitoring tools are widespread, such as Nagios or Icinga, Microsoft SCOM or
proprietary and application-specific monitoring tools (e.g. integrated in VMware
vCenter). They offer real-time insight on whether certain thresholds are exceeded
or if a failure has occurred. If this is the case, then the software alerts the
administrator through email or SMS sounds an alarm.
2.1 Setting the right threshold
The biggest challenge is the correct setting of the threshold value, since this
threshold determines whether an action should be performed or not. For example,
sensitive thresholds lead to many alerts and alarms, and administrators are flooded
with harmless or false messages. This causes really important messages to
sometimes be overlooked in the crowd. But what is the correct threshold for an
administrator? This must be decided based on the unique infrastructure. But of
course, recommendations and best practices exist that can be implemented and
provide guidance.
3. Depth ANALYSIS?
3.1 Removing ambiguity
An analysis is by definition a systematic study which consists of two processes, data
collection and evaluation. In particular, we consider this relationship and its effects
and interactions between the elements. In the analysis it is always about the
evaluation of the data obtained.
3.2 The difference between in-depth analysis and monitoring
Fig. 1
A deep analysis of virtual infrastructures & monitoring 5
On Fig. 1. you can recognize how an issue could escalate if it is not detected by in-
depth analysis. The time to act could be increased tremendously if a tool for in-depth
Detection has been set up in the infrastructure.
An in-depth analysis of the infrastructure is usually tested in accordance with rules,
security and best practices. It's less about the actual state of the load, but rather the
HOW, i.e. how something is configured. For example, a message such as "100% CPU
utilization" appearing without more information would not be very helpful. Here
you can already see a clear distinction between pure monitoring and analysis. You
want to know why the reported problem occurred and how it can be fixed.
Therefore, an automatic recognition after troubleshooting and recording would be
ideal.
A typical example which comes into play at each virtualization manufacturer involves
the topics vCPU (virtual CPU) and vMemory (memory which is assigned to a virtual
machine). Surely every administrator has received a request to create a virtual
machine with x number of vCPUs and y GB of RAM. But how will the administrator
take notice if the resources fulfill the requirements of the virtual machine or if sizing
is totally overprovisioned? This is where a deep analysis comes into play. It can be
analyzed using various values, where the corresponding information for resource
optimization is then displayed. For a too high number of unnecessary vCPUs can be
a performance problem on the respective host system, too. Additionally, we must
always bear in mind that a virtual machine is rarely alone – it has as many systems
that can be deployed on the physical host without interfering with each other. Thus
although it may not be directly relevant, an optimally configured resource impacts
the overall infrastructure.
The added value of an analysis in automation is to screen information on system
configuration and measure the results against predefined rules. The administrator
can, of course, check such items manually against best practice recommendations.
However, this can be daunting due to the size and complexity of some
infrastructures and is also quite error-prone. According to best practices, more
components are evaluated and recommendations are made depending on the
current version. In the virtual environment, attention should be paid to how storage
and network components work together. Another popular theme is whether
clusters are uniformly configured. Through a deep analysis, the administrator wants
to be preventively informed. This also enables the ability to respond before an error
to avoid breakdowns and lags in productivity. Once you imagine that up to 512
virtual machines are supported per physical host (of course a very symbolic number),
the need to operate optimally becomes clear.
In the meantime, applications that are always running, such as SAP, Microsoft
Exchange, SQL, SharePoint, Tomcat, etc., are critical to the business. But often the
request is only for a virtual machine, without the knowledge of what might be
running. In this situation, how can a virtual machine be configured optimally for the
request? Usually not with the default values, which are at times just clicks through a
A deep analysis of virtual infrastructures & monitoring 6
wizard. Often it's the little things that matter, like the right selection of a virtual
network card or the correct SCSI controllers in the virtual machine.
3.3 How to respond when problems arise
The administrator receives information that an event has occurred through the
monitoring system, which must then be routed to troubleshooting. Given the large
number of complex components that are used in a virtual infrastructure,
troubleshooting is often quite difficult. Is it just storage latency problems or even
misconfigured MTU sizes on the switches? There are several tools to support the
administrator In the VMware environment. Esxtop is one popular tool. However,
using it effectively requires some know-how, especially when interpreting thresholds.
The site administrator therefore usually relies on their own initiative. What’s more,
an immediate or timely solution is needed.
The in-depth analysis is different in relation to monitoring in the way that problems
that are encountered are treated. A CPU utilization problem of a virtual machine at
100% is displayed and reported, but the administrator doesn’t have the information
on why this CPU problem has occurred. In many cases, CPU limits are set in the VM
configuration temporarily, and then removing the limit is forgotten. Thus, in-depth
analysis combines a monitoring system with an appropriate expert system.
A new approach for in-depth analysis includes tools such as opvizor.
As Andreas Peetz, vExpert and blog author (http://www.v-front.de) said:
"Opvizor lets you run health checks and predictive analyses in a fully automated way.
These are derived from up-to-date rules that are centrally provided by notable
virtualization experts. Based on these "cloud rules" you can e.g. create weekly
reports that are available anytime, anywhere. This way the virtualization admin is
enabled to act preventively, but without burdening himself with maintaining
complex software, because that is implemented as a real cloud service. Only one
small local agent is needed in your environment. In a nutshell opvizor helps to avoid
many issues and outages and makes the administrator's job easier and much more
efficient. This software is definitely worth an investment!"
ALL A QUESTION OF THE CORRECT ANALYSIS
4. A Question Of Correct Analysis
It is not always easy to find THE solution for excellence for a given infrastructure.
However, you have to consider how individual software products work together best
in the area of in-depth analysis and monitoring and also what gives the administrator
a secure feeling (see also fig. 2).
Thanks to Big Data, sufficient meta-data is usually available from the virtual
infrastructure. However, these need to be properly evaluated and that‘s where in-
depth analysis enters.
A deep analysis of virtual infrastructures & monitoring 7
A deep analysis is the guarantee of a high-performance, secure, and error-free
infrastructure. It reduces errors and warnings in the monitoring tools and relieves
the administrator of the troubleshooting burden, allowing time for higher-value
projects.
Type Use Case Effort to Configure
Monitoring uptime surveillance high
In-depth analysis In-depth Compliance check low - medium
Fig. 2
A deep analysis of virtual infrastructures & monitoring 8
DISCLAIMER
Copyright 2014 opvizor GmbH, all rights reserved
The content and the information in this document are protected by copyright. This
emphasis, processing, distribution or duplication (copying by any means) of this work
or portions thereof, are not permitted without the consent of the publisher.
The information in this document is provided together with the VMware opvizor
analysis software.
This document is for informational purposes only. opvizor GmbH assumes no
liability for the accuracy or completeness of the information.
To the extent permitted by applicable law, opvizor GmbH provides this document as
is without warranty of any kind, including in particular the implied warranties of
merchantability, fitness for a particular purpose and non-infringement. In no event
shall opvizor GmbH shall be liable for any loss or direct or indirect damages arising
from the use of this document, including, without limitation, lost profits, business
interruption, loss of goodwill or lost data, even if opvizor GmbH has been advised of
the possibility of such damages.
The opvizor GmbH reserves the right to make changes and improvements to the
product in the course of product development.
opvizor GmbH
Schönbrunnerstrasse 218-220 , staircase A 4.04 A-1120 Vienna, Austria
UID: ATU67195304
www.opvizor.com
CEO : Dennis Zimmer
Date: May 3, 2014

More Related Content

What's hot

Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
Gabby Nizri
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Clear Technologies
 
Patch Management - 2013
Patch Management - 2013Patch Management - 2013
Patch Management - 2013
Vicky Ames
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 

What's hot (20)

10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Experiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data AccessExperiences in Mainframe-to-Splunk Big Data Access
Experiences in Mainframe-to-Splunk Big Data Access
 
Ch13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and ProceduresCh13 Business Continuity Planning and Procedures
Ch13 Business Continuity Planning and Procedures
 
Patch management
Patch managementPatch management
Patch management
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 
Patch Management - 2013
Patch Management - 2013Patch Management - 2013
Patch Management - 2013
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
MASci
MASciMASci
MASci
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Malware Incident Response
Malware Incident ResponseMalware Incident Response
Malware Incident Response
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 

Viewers also liked

Viewers also liked (11)

Alimentos
AlimentosAlimentos
Alimentos
 
Endorphin
EndorphinEndorphin
Endorphin
 
Dyffryn Gardens
Dyffryn GardensDyffryn Gardens
Dyffryn Gardens
 
File types pro forma-Libby Wright
File types pro forma-Libby WrightFile types pro forma-Libby Wright
File types pro forma-Libby Wright
 
Booklet
BookletBooklet
Booklet
 
Punt de llibre
Punt de llibrePunt de llibre
Punt de llibre
 
Electric Hoists Melbourne
Electric Hoists MelbourneElectric Hoists Melbourne
Electric Hoists Melbourne
 
กิจกรรมที่ 6
กิจกรรมที่ 6กิจกรรมที่ 6
กิจกรรมที่ 6
 
Provide inc presentation
Provide inc presentationProvide inc presentation
Provide inc presentation
 
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
שדה נחום קיבוץ בצמיחה - מצגת למועצת התנועה - 25.2.14
 
Biodata format final
Biodata format finalBiodata format final
Biodata format final
 

Similar to The difference between in-depth analysis of virtual infrastructures & monitoring

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
benscheerer
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
Atul Dhingra
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
Symantec
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
unyil96
 

Similar to The difference between in-depth analysis of virtual infrastructures & monitoring (20)

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.com
 
Agents vs Agentless
Agents vs AgentlessAgents vs Agentless
Agents vs Agentless
 
An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
Fault Detection and Prediction in Cloud Computing
Fault Detection and Prediction in Cloud ComputingFault Detection and Prediction in Cloud Computing
Fault Detection and Prediction in Cloud Computing
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (16)

The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 

The difference between in-depth analysis of virtual infrastructures & monitoring

  • 1. nd In-depth analysis of Virtual Infrastructures vs. Monitoring By Dennis Zimmer CEO opvizor GmbH, VMware vExpert, VMware VCAP WHITEPAPER The difference between in-depth analysis of virtual infrastructures & monitoring Scenarios and use cases
  • 2. A deep analysis of virtual infrastructures & monitoring 2 Table of Contents 1. Introduction.........................................................................................................................................3 1.1 Virtual infrastructures are becoming increasingly complex ................................3 1.2 A Wide range of virtualization solutions and infrastructure components....3 1.3 Keeping systems reliable through monitoring............................................................3 2. Operating Monitoring solutions.................................................................................................4 2.1 Setting the right threshold....................................................................................................4 3. Depth......................................................................................................................................................4 3.1 Removing ambiguity................................................................................................................4 3.2 The difference between in-depth analysis and monitoring..................................4 3.3 How to respond when problems arise ............................................................................6 4. A Question Of Correct Analysis..............................................................................................6 DISCLAIMER ..........................................................................................................................................8
  • 3. A deep analysis of virtual infrastructures & monitoring 3 1. Introduction 1.1 Virtual infrastructures are becoming increasingly complex Virtualization is an indispensable part of a modern data center. Frequently, the degree of virtualization is 90 percent or more. What formerly operated on a number of servers today runs on a few hosts. With the high rate of virtualization and the resulting increase in complexity, problems are more difficult to locate. It is therefore necessary to consider how the infrastructure can be monitored accurately and how potential error situations can be found to avoid costly errors. Unfortunately, under certain circumstances, even minor problems can significantly negatively impact the entire infrastructure. 1.2 A Wide range of virtualization solutions and infrastructure components Virtualization solutions are many: the selection ranges from suppliers such as KVM and Citrix to Microsoft Hyper-V and the market-leading provider VMware, with its vSphere solution. The variety of combinations with other components of the infrastructure is limitless. Reduced to its basic functionality, each of these solutions operates almost the same way. They mainly enable resource partitioning for optimal and cost-effective use of physical hardware. In addition, completely new methods of high-availability designs are possible. 1.3 Keeping systems reliable through monitoring What about the reliability of the virtualized machines (VMs)? Are the smooth operation of VMs and the applications running on your systems guaranteed? Keeping track of this complex infrastructure can be guaranteed only by employing various tools, with at least one monitoring solution serving as the base. The aim is to be promptly notified if system loads are exceeded or failures occur. In many organizations, failure prevention tools offer 99.9% even 99.99% reliability. Such statistics are not possible without appropriate software and automation.
  • 4. A deep analysis of virtual infrastructures & monitoring 4 2. Operating Monitoring solutions Monitoring tools are widespread, such as Nagios or Icinga, Microsoft SCOM or proprietary and application-specific monitoring tools (e.g. integrated in VMware vCenter). They offer real-time insight on whether certain thresholds are exceeded or if a failure has occurred. If this is the case, then the software alerts the administrator through email or SMS sounds an alarm. 2.1 Setting the right threshold The biggest challenge is the correct setting of the threshold value, since this threshold determines whether an action should be performed or not. For example, sensitive thresholds lead to many alerts and alarms, and administrators are flooded with harmless or false messages. This causes really important messages to sometimes be overlooked in the crowd. But what is the correct threshold for an administrator? This must be decided based on the unique infrastructure. But of course, recommendations and best practices exist that can be implemented and provide guidance. 3. Depth ANALYSIS? 3.1 Removing ambiguity An analysis is by definition a systematic study which consists of two processes, data collection and evaluation. In particular, we consider this relationship and its effects and interactions between the elements. In the analysis it is always about the evaluation of the data obtained. 3.2 The difference between in-depth analysis and monitoring Fig. 1
  • 5. A deep analysis of virtual infrastructures & monitoring 5 On Fig. 1. you can recognize how an issue could escalate if it is not detected by in- depth analysis. The time to act could be increased tremendously if a tool for in-depth Detection has been set up in the infrastructure. An in-depth analysis of the infrastructure is usually tested in accordance with rules, security and best practices. It's less about the actual state of the load, but rather the HOW, i.e. how something is configured. For example, a message such as "100% CPU utilization" appearing without more information would not be very helpful. Here you can already see a clear distinction between pure monitoring and analysis. You want to know why the reported problem occurred and how it can be fixed. Therefore, an automatic recognition after troubleshooting and recording would be ideal. A typical example which comes into play at each virtualization manufacturer involves the topics vCPU (virtual CPU) and vMemory (memory which is assigned to a virtual machine). Surely every administrator has received a request to create a virtual machine with x number of vCPUs and y GB of RAM. But how will the administrator take notice if the resources fulfill the requirements of the virtual machine or if sizing is totally overprovisioned? This is where a deep analysis comes into play. It can be analyzed using various values, where the corresponding information for resource optimization is then displayed. For a too high number of unnecessary vCPUs can be a performance problem on the respective host system, too. Additionally, we must always bear in mind that a virtual machine is rarely alone – it has as many systems that can be deployed on the physical host without interfering with each other. Thus although it may not be directly relevant, an optimally configured resource impacts the overall infrastructure. The added value of an analysis in automation is to screen information on system configuration and measure the results against predefined rules. The administrator can, of course, check such items manually against best practice recommendations. However, this can be daunting due to the size and complexity of some infrastructures and is also quite error-prone. According to best practices, more components are evaluated and recommendations are made depending on the current version. In the virtual environment, attention should be paid to how storage and network components work together. Another popular theme is whether clusters are uniformly configured. Through a deep analysis, the administrator wants to be preventively informed. This also enables the ability to respond before an error to avoid breakdowns and lags in productivity. Once you imagine that up to 512 virtual machines are supported per physical host (of course a very symbolic number), the need to operate optimally becomes clear. In the meantime, applications that are always running, such as SAP, Microsoft Exchange, SQL, SharePoint, Tomcat, etc., are critical to the business. But often the request is only for a virtual machine, without the knowledge of what might be running. In this situation, how can a virtual machine be configured optimally for the request? Usually not with the default values, which are at times just clicks through a
  • 6. A deep analysis of virtual infrastructures & monitoring 6 wizard. Often it's the little things that matter, like the right selection of a virtual network card or the correct SCSI controllers in the virtual machine. 3.3 How to respond when problems arise The administrator receives information that an event has occurred through the monitoring system, which must then be routed to troubleshooting. Given the large number of complex components that are used in a virtual infrastructure, troubleshooting is often quite difficult. Is it just storage latency problems or even misconfigured MTU sizes on the switches? There are several tools to support the administrator In the VMware environment. Esxtop is one popular tool. However, using it effectively requires some know-how, especially when interpreting thresholds. The site administrator therefore usually relies on their own initiative. What’s more, an immediate or timely solution is needed. The in-depth analysis is different in relation to monitoring in the way that problems that are encountered are treated. A CPU utilization problem of a virtual machine at 100% is displayed and reported, but the administrator doesn’t have the information on why this CPU problem has occurred. In many cases, CPU limits are set in the VM configuration temporarily, and then removing the limit is forgotten. Thus, in-depth analysis combines a monitoring system with an appropriate expert system. A new approach for in-depth analysis includes tools such as opvizor. As Andreas Peetz, vExpert and blog author (http://www.v-front.de) said: "Opvizor lets you run health checks and predictive analyses in a fully automated way. These are derived from up-to-date rules that are centrally provided by notable virtualization experts. Based on these "cloud rules" you can e.g. create weekly reports that are available anytime, anywhere. This way the virtualization admin is enabled to act preventively, but without burdening himself with maintaining complex software, because that is implemented as a real cloud service. Only one small local agent is needed in your environment. In a nutshell opvizor helps to avoid many issues and outages and makes the administrator's job easier and much more efficient. This software is definitely worth an investment!" ALL A QUESTION OF THE CORRECT ANALYSIS 4. A Question Of Correct Analysis It is not always easy to find THE solution for excellence for a given infrastructure. However, you have to consider how individual software products work together best in the area of in-depth analysis and monitoring and also what gives the administrator a secure feeling (see also fig. 2). Thanks to Big Data, sufficient meta-data is usually available from the virtual infrastructure. However, these need to be properly evaluated and that‘s where in- depth analysis enters.
  • 7. A deep analysis of virtual infrastructures & monitoring 7 A deep analysis is the guarantee of a high-performance, secure, and error-free infrastructure. It reduces errors and warnings in the monitoring tools and relieves the administrator of the troubleshooting burden, allowing time for higher-value projects. Type Use Case Effort to Configure Monitoring uptime surveillance high In-depth analysis In-depth Compliance check low - medium Fig. 2
  • 8. A deep analysis of virtual infrastructures & monitoring 8 DISCLAIMER Copyright 2014 opvizor GmbH, all rights reserved The content and the information in this document are protected by copyright. This emphasis, processing, distribution or duplication (copying by any means) of this work or portions thereof, are not permitted without the consent of the publisher. The information in this document is provided together with the VMware opvizor analysis software. This document is for informational purposes only. opvizor GmbH assumes no liability for the accuracy or completeness of the information. To the extent permitted by applicable law, opvizor GmbH provides this document as is without warranty of any kind, including in particular the implied warranties of merchantability, fitness for a particular purpose and non-infringement. In no event shall opvizor GmbH shall be liable for any loss or direct or indirect damages arising from the use of this document, including, without limitation, lost profits, business interruption, loss of goodwill or lost data, even if opvizor GmbH has been advised of the possibility of such damages. The opvizor GmbH reserves the right to make changes and improvements to the product in the course of product development. opvizor GmbH Schönbrunnerstrasse 218-220 , staircase A 4.04 A-1120 Vienna, Austria UID: ATU67195304 www.opvizor.com CEO : Dennis Zimmer Date: May 3, 2014