Log Data Now Outranks Traditional Data Sources for Network Operations Management
February 06, 2015

Jim Frey
Kentik

Share this

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics. They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. But proper and effective use of network log data is not without its challenges.

Enterprise Management Associates (EMA) released its latest research report entitled Log Analytics for Network Operations Management which takes a detailed look at the ways in which network log data is being harvested, analyzed, and used for network operations management. Based on the experiences and findings of over 190 enterprise practitioners, log analytics best practices are provided.

Some of the key findings in this study include:

■ 96% of participants indicated that network log data was of average importance or higher within their overall hierarchy of network management data sources, and 64% felt is “More important than most” or “Most important”.

■ 75% of shops are either currently using a central log analysis system or are planning to consolidate the multiple tools they have into a single system.

■ The biggest challenge most face when using network log data is “Knowing what to look for” and consequently the most highly valued feature for log analytics is “Fast search”.

■ Over 90% of organizations are applying one or more forms of advanced analytics in the processing of network log data, such as root cause analysis, proactive alerting, threat identification, and performance trending.

■ Over 80% of organizations are using network log data to support higher level BSM/ITSM initiatives, most particularly for IT service quality monitoring (61%).

EMA has been tracking the role that network log data plays in network management disciplines for years. What is most striking is that log data now outranks traditional network management data sources such as SNMP, NetFlow, and packet analysis as most heavily used and valued for multiple use cases. EMA recommends that networking professionals add log data to their portfolio of viewpoints while also seeking a means to closely integrate and align that viewpoint with others in order to get the most impactful results.

Jim Frey is VP of Strategic Alliances at Kentik
Share this

The Latest

December 15, 2017

CIOs around the globe are more determined than ever to achieve digital transformation within their organizations despite setbacks, according to a survey by Logicalis ...

December 14, 2017

The Spiceworks 2018 IT Career Outlook found that 32 percent of IT professionals plan to search for or take an IT job with a new employer in the next 12 months ...

December 12, 2017

Downtime and security risks were present in each cloud environment tested, according to 2016 Private Cloud Resiliency Benchmarks, a report from Continuity Software ...

December 11, 2017

Companies that empower employees with the applications they want and need, and make them readily accessible — anytime, anywhere, on any device — can benefit from measurable gains at the individual and organizational level, according to a survey, The Impact of the Digital Workforce: A New Equilibrium of the Digitally Transformed Enterprise, conducted by VMware ...

December 08, 2017

Metrics-oriented thinking is key to continuous improvement – and a core tenant of any agile or DevOps philosophy. Metrics are factual and once agreed upon, these facts are used to drive discussions and methods. They also allow for a collaborative effort to execute decisions that contribute towards business outcomes ...

December 06, 2017

The recent outage of the University of Cambridge website hosting Stephen Hawking's doctoral thesis is a prime example of what happens when niche websites become exposed to mainstream levels of traffic ...

December 05, 2017

Even as many organizations continue to adopt multi-cloud technologies as part of their dramatic transformation, the mainframe remains a relevant and growing data center hub for many, according to BMC's 12th annual Mainframe Research Report ...

December 04, 2017

Banks are laying the foundation for the digitization of their businesses and anticipate emerging technologies -- from IoT to biometric authentications and blockchain -- to make a substantial imprint on the industry within five years, according to a recent survey of banking professionals commissioned by VMware ...

December 01, 2017

A recent blog on APMdigest — Protecting Network Performance is as Essential as Securing the Network — mentions that performance issues and outages are possible when security tools (like an IPS, WAF, etc.) are inserted inline. However, one easy way to mitigate this concern is to deploy a bypass switch before the inline tool ...

November 30, 2017

While self-service and self-help IT are in common practice, about half of organizations surveyed are still struggling with full deployment and realizing its value, according to a new report by Ivanti and the Service Desk Institute ...