Log Data Now Outranks Traditional Data Sources for Network Operations Management
February 06, 2015

Jim Frey
Kentik

Share this

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics. They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. But proper and effective use of network log data is not without its challenges.

Enterprise Management Associates (EMA) released its latest research report entitled Log Analytics for Network Operations Management which takes a detailed look at the ways in which network log data is being harvested, analyzed, and used for network operations management. Based on the experiences and findings of over 190 enterprise practitioners, log analytics best practices are provided.

Some of the key findings in this study include:

■ 96% of participants indicated that network log data was of average importance or higher within their overall hierarchy of network management data sources, and 64% felt is “More important than most” or “Most important”.

■ 75% of shops are either currently using a central log analysis system or are planning to consolidate the multiple tools they have into a single system.

■ The biggest challenge most face when using network log data is “Knowing what to look for” and consequently the most highly valued feature for log analytics is “Fast search”.

■ Over 90% of organizations are applying one or more forms of advanced analytics in the processing of network log data, such as root cause analysis, proactive alerting, threat identification, and performance trending.

■ Over 80% of organizations are using network log data to support higher level BSM/ITSM initiatives, most particularly for IT service quality monitoring (61%).

EMA has been tracking the role that network log data plays in network management disciplines for years. What is most striking is that log data now outranks traditional network management data sources such as SNMP, NetFlow, and packet analysis as most heavily used and valued for multiple use cases. EMA recommends that networking professionals add log data to their portfolio of viewpoints while also seeking a means to closely integrate and align that viewpoint with others in order to get the most impactful results.

Jim Frey is VP of Strategic Alliances at Kentik
Share this

The Latest

September 21, 2018

The performance gap between customer experience leaders and runners-up is widening, with those on top being disproportionately rewarded. Gartner said organizations must ignore three myths in order to achieve a superior customer experience ...

September 19, 2018

This summer marked three years since Microsoft announced Windows 10, its first "Windows as a service" Operating System (OS). Windows 10 brought with it a new Software-as-a-Service-like approach to updates, moving Microsoft and the millions of environments that depend on it, more frequent, bundled updates. Whether you believe the shift was for better or worse, one thing is certain, this "as a service" model is a natural progression for today's operating systems. That is why Windows 10 is changing not only how frequently updates are pushed out, but inherently how technology is purchased, how people consume it, and perhaps most importantly, how IT is run. Let's take a look at how Windows 10 has impacted these three key areas over the past three years ...

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

Are digital war rooms obsolete because they're just a place for managers of siloed business units to find someone else to blame for a critical IT event such as a security breach? Far from it. Enterprises find these emergency response teams just as important, if not more important, than ever ...

September 14, 2018

The goal of EMA's latest research was to look at how advanced IT analytics (AIA) — EMA's term for primarily what today is best known as "AIOps" — is being deployed. Here are the remaining four of my seven personal takeaways ...

September 13, 2018

OK, the data is in! The goal of EMA's latest research was to look at how advanced IT analytics (AIA) — or EMA's term for primarily what today is best known as "AIOps" — is being deployed. Here are seven of my own personal takeaways ...

September 12, 2018

By maximizing the knowledge of end-to-end quality of service (QoS) using virtualized network functions (VNFs), the SD-WAN (edge) gateway establishes a suitable connection with minimal latency and maximum performance so that entire organizations can make the most of the Office 365 application suite ...

September 11, 2018

Market exuberance for Office 365 has inspired business mandates to adopt the cloud-hosted collaboration and productivity suite without regards to the underlying chaos. While multi-location organizations are virtualizing, operating models haven’t necessarily changed. This partial transformation that excludes automation and simplification of the network puts Office 365 deployments (and other software-as-a-service offerings) in danger of failing ...

September 10, 2018

Most organizations are undergoing a digital transformation that directly impacts how they do business, yet 70 percent of employees have not mastered the skills they need for their jobs today, and 80 percent of employees do not have the skills needed for their current and future roles, according to Gartner ...

September 06, 2018

In a survey within the VMware User Group community, Blue Medora took a closer look at how various metric collection strategies and access to Dimensional Data impacts IT success. We started with one question: How important is your monitoring integration strategy? ...