Log Data Now Outranks Traditional Data Sources for Network Operations Management
February 06, 2015

Jim Frey

Share this

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics. They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. But proper and effective use of network log data is not without its challenges.

Enterprise Management Associates (EMA) released its latest research report entitled Log Analytics for Network Operations Management which takes a detailed look at the ways in which network log data is being harvested, analyzed, and used for network operations management. Based on the experiences and findings of over 190 enterprise practitioners, log analytics best practices are provided.

Some of the key findings in this study include:

■ 96% of participants indicated that network log data was of average importance or higher within their overall hierarchy of network management data sources, and 64% felt is “More important than most” or “Most important”.

■ 75% of shops are either currently using a central log analysis system or are planning to consolidate the multiple tools they have into a single system.

■ The biggest challenge most face when using network log data is “Knowing what to look for” and consequently the most highly valued feature for log analytics is “Fast search”.

■ Over 90% of organizations are applying one or more forms of advanced analytics in the processing of network log data, such as root cause analysis, proactive alerting, threat identification, and performance trending.

■ Over 80% of organizations are using network log data to support higher level BSM/ITSM initiatives, most particularly for IT service quality monitoring (61%).

EMA has been tracking the role that network log data plays in network management disciplines for years. What is most striking is that log data now outranks traditional network management data sources such as SNMP, NetFlow, and packet analysis as most heavily used and valued for multiple use cases. EMA recommends that networking professionals add log data to their portfolio of viewpoints while also seeking a means to closely integrate and align that viewpoint with others in order to get the most impactful results.

Jim Frey is VP of Strategic Alliances at Kentik
Share this

The Latest

March 22, 2018

In a previous blog, I talked about how to get visibility into cloud networks and resolve the first part of the problem. This included why visibility was important and how to accomplish it. Once you have that information, the next thing you need to understand is the performance of your cloud network so that you can answer important questions. This includes ...

March 21, 2018

A study conducted by Ponemon Institute and sponsored by IBM Resilient found that 77 percent of respondents admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across their organization ...

March 20, 2018

Most organizations understand that centralized network monitoring is vital to maintaining the health of critical infrastructure and applications. And while solutions using NetFlow undoubtedly help gain perspective into capacity planning, trend analysis, and utilization, they lack the important precision of packet-based analytics tools ...

March 16, 2018

The State of the Mainframe report from Syncsort revealed an increased focus on traditional data infrastructure optimization to control costs and help fund strategic organizational projects like AI, machine learning and predictive analytics in addition to widespread concern about meeting security and compliance requirements ...

March 15, 2018

The 2018 Software Fail Watch report from Tricentis investigated 606 failures that affected over 3.6 billion people and caused $1.7 trillion in lost revenue ...

March 14, 2018

Gartner predicts there will be nearly 21 billion connected “things” in use worldwide by 2020 – impressive numbers that should catch the attention of every CIO. IT leaders in nearly every vertical market will soon be inundated with the management of both the data from these devices as well as the management of the devices themselves, each of which require the same lifecycle management as any other IT equipment. This can be an overwhelming realization for CIOs who don’t have an adequate configuration management strategy for their current IT environments, the foundation upon which all future digital strategies – Internet-connected or otherwise – will be built ...

March 13, 2018

Many network operations teams question if they need to TAP their networks; perhaps they aren't familiar with test access points (TAPs), or they think there isn't an application that makes sense for them. Over the past decade, industry best-practice revealed that all network infrastructure should utilize a network TAP as the foundation for complete visibility. The following are the seven most popular applications for TAPs ...

March 12, 2018

Organizations are eager to adopt cloud based architectures in an effort to support their digital transformation efforts, drive efficiencies and strengthen customer satisfaction, according to a new online cloud usage survey conducted by Denodo ...

March 09, 2018

Globally, cloud data center traffic will represent 95 percent of total data center traffic by 2021, compared to 88 percent in 2016, according to the Cisco Global Cloud Index (2016-2021) ...

March 08, 2018

Enterprise cloud spending will grow rapidly over the next year, and yet 35 percent of cloud spend is wasted, according to The RightScale 2018 State of the Cloud Survey ...