One Trick To Creating Better and Faster Rollouts
February 01, 2018

Keith Bromley
Ixia

Share this

If you have not been engaging in proactive monitoring efforts, it’s something you might want to consider. Most IT monitoring efforts are reactive — you either periodically try some basic attempts to find problems on the live network or you decide to wait and respond to customer complaints. This is supported by the EMA Network Management Megatrends 2016 report which states that approximately 40% of network problems are detected and reported by end users.

Everyone in IT understands this. It’s unfortunate but true — you can’t be everywhere doing everything for everyone. In addition, the report states that 26% of the respondents reported that one of their top networking challenges is the lack of end-to-end, multisite network visibility and troubleshooting capabilities. This is where visibility technology can help by giving you access to critical monitoring, when you need it and in the format you need it.

But improved visibility isn’t usually enough. You are probably going to need a more proactive troubleshooting approach as well. Proactive monitoring uses visibility technology to actively test your solution either before rollout, during rollout, or after rollout. For instance, it can be used to provide better and faster network and application rollouts by pre-testing the network with synthetic traffic to understand how the solution will perform against either specific application traffic or a combination of traffic types. The synthetic traffic provides you the network and/or application loading of a “busy hour” and the flexibility to perform evaluations during the network maintenance window.

Proactive monitoring has several fundamental benefits including the ability to:

■ Know the performance level of your network immediately

■ Understand how well your applications are running

■ Validate SLAs — both on-premises and in the cloud

■ Test upgrades during maintenance windows before company employees do

Network performance and application performance testing may sound simple, but these can actually be difficult to ascertain. To get a true indication of network performance, the network needs to have a large amount of traffic on it, which makes you dependent upon peak busy hours. This type of solution allows you to place probes anywhere in your network and test whenever you want to. It also allows you to accurately simulate the right type of traffic so that Application Performance Management (APM) tools can observe how well applications are truly performing. For instance, this allows you to simulate small packets or Skype-like data if you want to test your instant message (IM)/voice/video solution.

Once you’ve conducted your proactive monitoring test cases, you’ll have the information you need to either continue with your solution update (i.e. continue with the network or application rollout) or perform a rollback (before it affects any users outside of the maintenance window).

Proactive monitoring also allows you to perform SLA validation during business hours, since it is not service disrupting. This allows you validate the SLA performance at will. The information gathered can then be used to inform management about which goals are being met. If goals are not being met, you can use the impartial data you have collected and contact your vendor to have them either fix any observed network problems, or give you a discount if they are failing to meet agreed upon SLAs.

The final benefit is that there are proactive monitoring solutions on the market that let you test your on-premises solution as well as your cloud solution. This can be especially important if you have a hybrid solution right now, and are in the (often multi-year) process of transitioning from the physical to the virtual (cloud) world. A proactive monitoring testing and monitoring approach gives you the confidence that your application rollouts will be successful in either network.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...