One Trick To Creating Better and Faster Rollouts
February 01, 2018

Keith Bromley
Ixia

Share this

If you have not been engaging in proactive monitoring efforts, it’s something you might want to consider. Most IT monitoring efforts are reactive — you either periodically try some basic attempts to find problems on the live network or you decide to wait and respond to customer complaints. This is supported by the EMA Network Management Megatrends 2016 report which states that approximately 40% of network problems are detected and reported by end users.

Everyone in IT understands this. It’s unfortunate but true — you can’t be everywhere doing everything for everyone. In addition, the report states that 26% of the respondents reported that one of their top networking challenges is the lack of end-to-end, multisite network visibility and troubleshooting capabilities. This is where visibility technology can help by giving you access to critical monitoring, when you need it and in the format you need it.

But improved visibility isn’t usually enough. You are probably going to need a more proactive troubleshooting approach as well. Proactive monitoring uses visibility technology to actively test your solution either before rollout, during rollout, or after rollout. For instance, it can be used to provide better and faster network and application rollouts by pre-testing the network with synthetic traffic to understand how the solution will perform against either specific application traffic or a combination of traffic types. The synthetic traffic provides you the network and/or application loading of a “busy hour” and the flexibility to perform evaluations during the network maintenance window.

Proactive monitoring has several fundamental benefits including the ability to:

■ Know the performance level of your network immediately

■ Understand how well your applications are running

■ Validate SLAs — both on-premises and in the cloud

■ Test upgrades during maintenance windows before company employees do

Network performance and application performance testing may sound simple, but these can actually be difficult to ascertain. To get a true indication of network performance, the network needs to have a large amount of traffic on it, which makes you dependent upon peak busy hours. This type of solution allows you to place probes anywhere in your network and test whenever you want to. It also allows you to accurately simulate the right type of traffic so that Application Performance Management (APM) tools can observe how well applications are truly performing. For instance, this allows you to simulate small packets or Skype-like data if you want to test your instant message (IM)/voice/video solution.

Once you’ve conducted your proactive monitoring test cases, you’ll have the information you need to either continue with your solution update (i.e. continue with the network or application rollout) or perform a rollback (before it affects any users outside of the maintenance window).

Proactive monitoring also allows you to perform SLA validation during business hours, since it is not service disrupting. This allows you validate the SLA performance at will. The information gathered can then be used to inform management about which goals are being met. If goals are not being met, you can use the impartial data you have collected and contact your vendor to have them either fix any observed network problems, or give you a discount if they are failing to meet agreed upon SLAs.

The final benefit is that there are proactive monitoring solutions on the market that let you test your on-premises solution as well as your cloud solution. This can be especially important if you have a hybrid solution right now, and are in the (often multi-year) process of transitioning from the physical to the virtual (cloud) world. A proactive monitoring testing and monitoring approach gives you the confidence that your application rollouts will be successful in either network.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

August 19, 2019

One common infrastructure challenge arises with virtual private networks (VPNs). VPNs have long been relied upon to deliver the network connectivity and security enterprises required at a price they could afford. Organizations still routinely turn to them to provide internal and trusted third-parties with "secure" remote access to isolated networks. However, with the rise in mobile, IoT, multi- and hybrid-cloud, as well as edge computing, traditional enterprise perimeters are extending and becoming blurred ...

August 15, 2019

The configuration management database (CMDB), along with its more federated companion, the configuration management system (CMS), has been bathed in a deluge of negative opinions from all fronts — industry experts, vendors, and IT professionals. But from what recent EMA research on analytics, ITSM performance and other areas is indicating, those negative views seem to be missing out on a real undercurrent of truth — that CMDB/CMS alignments, whatever their defects, strongly skew to success in terms of overall IT progressiveness and effectiveness ...

August 14, 2019

The on-demand economy has transformed the way we move around, eat, learn, travel and connect at a massive scale. However, with disruption and big aspirations comes big, complex challenges. To take these challenges head-on, on-demand economy companies are finding new ways to deliver their services and products to an audience with ever-increasing expectations, and that's what we'll look at in this blog ...

August 13, 2019

To thrive in today's highly competitive digital business landscape, organizations must harness their "digital DNA." In other words, they need to connect all of their systems and databases — including various business applications, devices, big data and any instances of IoT and hybrid cloud environments — so they're accessible and actionable. By integrating all existing components and new technologies, organizations can gain a comprehensive, trusted view of their business functions, thereby enabling more agile deployment processes and ensuring scalable growth and relevance over the long-term ...

August 12, 2019

Advancements in technology innovation are happening so quickly, the decision of where and when to transform can be a moving target for businesses. When done well, digital transformation improves the customer experience while optimizing operational efficiency. To get there, enterprises must encourage experimentation to overcome organizational obstacles. In other words ...

August 08, 2019

IoT adoption is growing rapidly, and respondents believe 30% of their company’s revenue two years from now will be due to IoT, according to the new IoT Signals report from Microsoft Corp ...

August 07, 2019

It's been all over the news the last few months. After two fatal crashes, Boeing was forced to ground its 737. The doomed model is now undergoing extensive testing to get it back into service and production. Large organizations often tell stakeholders that even though all software goes through extensive testing, this type of thing “just happens.” But that is exactly the problem. While the human component of application development and testing won't go away, it can be eased and supplemented by far more efficient and automated methods to proactively determine software health and identify flaws ...

August 06, 2019

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to State of Development and Operations of AI Applications 2019 from Dotscience ...

August 05, 2019

IT has two principal functions: create a network that satisfies the business needs of the company and then optimize that network. Unfortunately, the modern enterprise is buried under a myriad of network improvement projects that often do not get deployed ...

August 01, 2019

Even large companies are not yet realizing the potential of digital transformation, according to a new study from Cherwell Software, The Power of Process Integration in the Information Age ...