In APMdigest's exclusive interview, Scott Register, Senior Director of Product Management at Ixia, talks about network visibility and its relation to APM.
APM: How do you define network visibility?
SR: Complete network visibility is a state of operation in which all application and network monitoring tools can access exactly the data they need from multiple network segments and have a complete view of the network traffic.
Although it sounds simple, it's becoming more challenging to gain this visibility just as it's becoming more crucial to do so. Networks are expanding in size, speed and complexity to deliver applications and services that are becoming increasingly business-critical. Just getting the right data to the right tool can be a monumental task, and tools can easily be overwhelmed by traffic. Often, there aren't even enough data access points for all the monitoring tools and IT teams that need them.
Network visibility is enabled by a class of technology called network monitoring switches, also known as network packet brokers. These products sit in between the network and the monitoring tool suite to deliver all required traffic from anywhere in the network to the tool, allowing 100 percent of the data to be monitored and analyzed. They also perform other functions, such as aggregating, filtering, mirroring and otherwise optimizing traffic before it is sent to analysis tools.
APM: What role does network visibility play in APM?
SR: APM in particular requires a complete end-to-end perspective. Identifying and understanding where and how problems are occurring – and catching them before users do – are key to APM. Problems can occur anywhere along the application delivery path, often in isolation. As networks grow in complexity and applications are increasingly remotely or virtually hosted, a fragmented view of the environment makes it exponentially more difficult to guarantee application delivery to meet service level agreements.
APM: What are the biggest network visibility challenges?
SR: Visibility traditionally was considered an issue for large data center networks, such as those operated by a service provider. However, today enterprises of all sizes are operating mission-critical networks that are faster, more complex and more dynamic, with more traffic. In the world of data center network and application management, the only sure things are more data, more network traffic, and more challenges in protecting the business.
Cisco's latest Global Cloud Index shows that 76 percent of network traffic today never even leaves the data center. According to Cisco, this high degree of intra-data center traffic can be attributed to functional separation of application servers, storage and databases, which generates replication, backup and read/write traffic traversing the data center. Contrast this with an older, simpler model where monitoring was focused on “the Internet connection” or at least a few identifiable choke points that all traffic went through, and you can see how the issue of visibility is growing in every network.
On a macro level, this loss of visibility is being driven by a convergence of factors: exploding mobile growth, virtualization, the adoption of 10/40/100GE networks, cloud, Big Data, and an increase in sophisticated security threats.
Consider this one statistic: IDC reports that the amount of data in the world will grow 50-fold from the beginning of 2010 to the end of 2020 - to more than 40,000 exabytes. It's highly unlikely that our network infrastructures will grow at the same rate, creating the need to develop new strategies for managing, analyzing and optimizing all this data traffic.
APM: Is visibility in virtualized environments also a big challenge?
SR: Yes. Last year, the number of applications running in virtual environments passed the 50 percent mark, according to a report from market research firm Aberdeen Group Inc. Virtualization allows significant increases in efficiency, so it's no surprise that adoption is growing at a rapid clip.
However, these advances are not without a powerful downside. The premise on which virtualization is based – multiple virtual machines (VMs) handling traffic on a single server – means a loss of traffic visibility. This becomes problematic when trying to trace a packet or to analyze packet flow at any given time. We call this inability to see what's happening in the virtual data center the “Virtual Blind Spot.”
APM: What is the solution?
SR: Certain virtualized analysis tools have hit the market, but these have problems. Virtualized environments are self-contained, and by nature, any tools developed for virtualized environments focus exclusively on the virtual. This creates a conundrum when attempting to troubleshoot or monitor the “whole story” which includes the virtual plus the physical network. How can you troubleshoot a problem when you only see part of the situation? When an application's network operations are spread across both physical and virtual links, it is impossible to diagnose or understand that application's performance without seamless integration of physical and virtual network monitoring.
To solve this challenge, solutions utilizing more capable network monitoring switches can obtain traffic from both the physical and virtual infrastructure, and optimize and broadcast it to the full suite of monitoring tools for a complete picture.
APM: How does Ixia help customers gain network visibility?
SR: At Ixia, we say our mission is to create amazing products so our customers can connect the world. Many people know our name in the context of network testing and validation, and this is still a major focus for our company. Leveraging that expertise, we also offer a leading class of solutions to enable customers to gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. These range from 100 Gb Ethernet-capable, carrier-class network monitoring switches to our newest family of products, the Ixia Net Tool Optimizer 2112/2113. These network monitoring switches are designed for smaller network deployments, enabling enterprise class network monitoring in a cost-effective and easily deployed appliance.
ABOUT Scott Register
Scott Register has more than 15 years of experience leading product management operations for global technology companies. Register is currently the Sr. Director of Product Management for Network Visibility Solutions at Ixia, after leading product management at BreakingPoint Systems prior to its acquisition by Ixia. Scott has previously led product lines for Blue Coat, Permeo, and Check Point Software. Register has also served as a member of the research faculty at a major university. He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology.
When you say "DevOps" one of the first words that comes to mind is "collaboration." But exactly how do we make this collaboration happen? This epic DEVOPSdigest list – posted in 7 parts – intends to find the answer. DEVOPSdigest asked experts from across the industry for their opinions on the best way to foster collaboration between Dev and Ops ...
Just in time for the holiday shopping season, APMdigest asked experts from across the industry for their opinions on the best way to measure eCommerce performance, in terms of applications, networks and infrastructure. Part 3, the final installment, covers the customer journey ...
Just in time for the holiday shopping season, APMdigest asked experts from across the industry for their opinions on the best way to measure eCommerce performance, in terms of applications, networks and infrastructure. Part 2 covers APM and monitoring ...
As the holiday shopping season looms ahead, and online sales are positioned to challenge or even beat in-store purchases, eCommerce is on the minds of many decision makers. To help organizations decide how to gauge their eCommerce success, APMdigest compiled a list of expert opinions on the best way to measure eCommerce performance ...
More than 90 percent of respondents are concerned about data and application security in public clouds while nearly 60 percent of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic, according to a new Cloud Security survey ...
Today's technology advances have enabled end-users to operate more efficiently, and for businesses to more easily interact with customers and gather and store huge amounts of data that previously would be impossible to collect. In kind, IT departments can also collect valuable telemetry from their distributed enterprise devices to allow for many of the same benefits. But now that all this data is within reach, how can organizations make sense of it all? ...
CIOs trying to lead digital transformation at the speed needed to succeed need a mix of three scale accelerators, according to Gartner, Inc. The three scale accelerators include: digital dexterity, network effect technologies, and an industrialized digital platform ...
While the majority of IT practitioners in the UK believe their organization is equipped to support digital services, over half of them also say they face consumer-impacting incidents at least one or more times a week, sometimes costing their organizations millions in lost revenue for every hour that an application is down, according to PagerDuty's State of Digital Operations Report: United Kingdom ...
Today's IT is under considerable pressure to remain agile, responsive and scalable to meet the changing needs of business. IT infrastructure can't become a bottleneck, it must be the enabler. But as new paradigms, such as DevOps, are adopted, data center complexity increases and infrastructure constraints can block the ability to achieve these goals ...
It's 3:47am. You and the rest of the Ops team have been summoned from your peaceful slumber to mitigate an application delivery outage. Your mind races as you switch to problem solving mode. It's time to start thinking about how to make this mitigation FUN! ...