Log Data Now Outranks Traditional Data Sources for Network Operations Management
February 06, 2015

Jim Frey
Kentik

Share this

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics. They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. But proper and effective use of network log data is not without its challenges.

Enterprise Management Associates (EMA) released its latest research report entitled Log Analytics for Network Operations Management which takes a detailed look at the ways in which network log data is being harvested, analyzed, and used for network operations management. Based on the experiences and findings of over 190 enterprise practitioners, log analytics best practices are provided.

Some of the key findings in this study include:

■ 96% of participants indicated that network log data was of average importance or higher within their overall hierarchy of network management data sources, and 64% felt is “More important than most” or “Most important”.

■ 75% of shops are either currently using a central log analysis system or are planning to consolidate the multiple tools they have into a single system.

■ The biggest challenge most face when using network log data is “Knowing what to look for” and consequently the most highly valued feature for log analytics is “Fast search”.

■ Over 90% of organizations are applying one or more forms of advanced analytics in the processing of network log data, such as root cause analysis, proactive alerting, threat identification, and performance trending.

■ Over 80% of organizations are using network log data to support higher level BSM/ITSM initiatives, most particularly for IT service quality monitoring (61%).

EMA has been tracking the role that network log data plays in network management disciplines for years. What is most striking is that log data now outranks traditional network management data sources such as SNMP, NetFlow, and packet analysis as most heavily used and valued for multiple use cases. EMA recommends that networking professionals add log data to their portfolio of viewpoints while also seeking a means to closely integrate and align that viewpoint with others in order to get the most impactful results.

Jim Frey is VP of Strategic Alliances at Kentik
Share this

The Latest

July 19, 2018

According to a recent survey, critical IT incidents cost the average organization upwards of $6 million per year. This infographic outlines 4 easy steps to automate incident management, reducing downtime and costs to organizations ...

July 17, 2018

The essential value resulting from data-driven processes has become progressively linked with analytics. Once considered a desired complement to intuitive decision-making, analytics has developed into a main focus of mission-critical applications across industries for any number of use cases ...

July 16, 2018

The question of SaaS-based technology over the past decade has quickly changed from "should we?" to "how soon can we?" even for the most customized and regulated of industries. This macro move toward SaaS has also encouraged a series of IT "best practices" that have potential impacts on the employee digital experience, organizational risk and ultimately, productivity ...

July 11, 2018

Optimization means improving the performance of your human and technology resources while keeping a watchful eye. To accomplish this, we must have clear, crisp visibility into the metrics relevant to the delivery of workspace applications to your end users and to the devices – the endpoints – they use to be productive ...

July 09, 2018

As tech headlines flash across my email, the CMDB, and its federated equivalent, the CMS, are almost never mentioned. And yet when I do research, dialog with IT, or support our consulting team, the CMDB/CMS many times still remains paramount ...

June 28, 2018

Given the size and complexity of today's IT networks it can be almost impossible to detect just when and where a security breach or network failure might occur. It's critical, therefore, that businesses have complete visibility over their IT networks, and any applications and services that run on those networks, in order to protect their customers' information, assure uninterrupted service delivery and, of course, comply with the GDPR ...

June 27, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are more reasons to use these new NPM/APM analytics solutions ...

June 26, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are 6 reasons to use these new NPM/APM analytics solutions ...

June 21, 2018

There’s no doubt that digital innovations are transforming industries, and business leaders are left with little or no choice – either embrace digital processes or suffer the consequences and get left behind ...

June 20, 2018

Looking ahead to the rest of 2018 and beyond, it seems like many of the trends that shaped 2017 are set to continue, with the key difference being in how they evolve and shift as they become mainstream. Five key factors defining the progression of the digital transformation movement are ...