In APMdigest's exclusive interview, Scott Register, Senior Director of Product Management at Ixia, talks about network visibility and its relation to APM.
APM: How do you define network visibility?
SR: Complete network visibility is a state of operation in which all application and network monitoring tools can access exactly the data they need from multiple network segments and have a complete view of the network traffic.
Although it sounds simple, it's becoming more challenging to gain this visibility just as it's becoming more crucial to do so. Networks are expanding in size, speed and complexity to deliver applications and services that are becoming increasingly business-critical. Just getting the right data to the right tool can be a monumental task, and tools can easily be overwhelmed by traffic. Often, there aren't even enough data access points for all the monitoring tools and IT teams that need them.
Network visibility is enabled by a class of technology called network monitoring switches, also known as network packet brokers. These products sit in between the network and the monitoring tool suite to deliver all required traffic from anywhere in the network to the tool, allowing 100 percent of the data to be monitored and analyzed. They also perform other functions, such as aggregating, filtering, mirroring and otherwise optimizing traffic before it is sent to analysis tools.
APM: What role does network visibility play in APM?
SR: APM in particular requires a complete end-to-end perspective. Identifying and understanding where and how problems are occurring – and catching them before users do – are key to APM. Problems can occur anywhere along the application delivery path, often in isolation. As networks grow in complexity and applications are increasingly remotely or virtually hosted, a fragmented view of the environment makes it exponentially more difficult to guarantee application delivery to meet service level agreements.
APM: What are the biggest network visibility challenges?
SR: Visibility traditionally was considered an issue for large data center networks, such as those operated by a service provider. However, today enterprises of all sizes are operating mission-critical networks that are faster, more complex and more dynamic, with more traffic. In the world of data center network and application management, the only sure things are more data, more network traffic, and more challenges in protecting the business.
Cisco's latest Global Cloud Index shows that 76 percent of network traffic today never even leaves the data center. According to Cisco, this high degree of intra-data center traffic can be attributed to functional separation of application servers, storage and databases, which generates replication, backup and read/write traffic traversing the data center. Contrast this with an older, simpler model where monitoring was focused on “the Internet connection” or at least a few identifiable choke points that all traffic went through, and you can see how the issue of visibility is growing in every network.
On a macro level, this loss of visibility is being driven by a convergence of factors: exploding mobile growth, virtualization, the adoption of 10/40/100GE networks, cloud, Big Data, and an increase in sophisticated security threats.
Consider this one statistic: IDC reports that the amount of data in the world will grow 50-fold from the beginning of 2010 to the end of 2020 - to more than 40,000 exabytes. It's highly unlikely that our network infrastructures will grow at the same rate, creating the need to develop new strategies for managing, analyzing and optimizing all this data traffic.
APM: Is visibility in virtualized environments also a big challenge?
SR: Yes. Last year, the number of applications running in virtual environments passed the 50 percent mark, according to a report from market research firm Aberdeen Group Inc. Virtualization allows significant increases in efficiency, so it's no surprise that adoption is growing at a rapid clip.
However, these advances are not without a powerful downside. The premise on which virtualization is based – multiple virtual machines (VMs) handling traffic on a single server – means a loss of traffic visibility. This becomes problematic when trying to trace a packet or to analyze packet flow at any given time. We call this inability to see what's happening in the virtual data center the “Virtual Blind Spot.”
APM: What is the solution?
SR: Certain virtualized analysis tools have hit the market, but these have problems. Virtualized environments are self-contained, and by nature, any tools developed for virtualized environments focus exclusively on the virtual. This creates a conundrum when attempting to troubleshoot or monitor the “whole story” which includes the virtual plus the physical network. How can you troubleshoot a problem when you only see part of the situation? When an application's network operations are spread across both physical and virtual links, it is impossible to diagnose or understand that application's performance without seamless integration of physical and virtual network monitoring.
To solve this challenge, solutions utilizing more capable network monitoring switches can obtain traffic from both the physical and virtual infrastructure, and optimize and broadcast it to the full suite of monitoring tools for a complete picture.
APM: How does Ixia help customers gain network visibility?
SR: At Ixia, we say our mission is to create amazing products so our customers can connect the world. Many people know our name in the context of network testing and validation, and this is still a major focus for our company. Leveraging that expertise, we also offer a leading class of solutions to enable customers to gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. These range from 100 Gb Ethernet-capable, carrier-class network monitoring switches to our newest family of products, the Ixia Net Tool Optimizer 2112/2113. These network monitoring switches are designed for smaller network deployments, enabling enterprise class network monitoring in a cost-effective and easily deployed appliance.
ABOUT Scott Register
Scott Register has more than 15 years of experience leading product management operations for global technology companies. Register is currently the Sr. Director of Product Management for Network Visibility Solutions at Ixia, after leading product management at BreakingPoint Systems prior to its acquisition by Ixia. Scott has previously led product lines for Blue Coat, Permeo, and Check Point Software. Register has also served as a member of the research faculty at a major university. He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology.
Distributed tracing has been growing in popularity as a primary tool for investigating performance issues in microservices systems. Our recent DevOps Pulse survey shows a 38% increase year-over-year in organizations' tracing use. Furthermore, 64% of those respondents who are not yet using tracing indicated plans to adopt it in the next two years ...
Businesses are embracing artificial intelligence (AI) technologies to improve network performance and security, according to a new State of AIOps Study, conducted by ZK Research and Masergy ...
What may have appeared to be a stopgap solution in the spring of 2020 is now clearly our new workplace reality: It's impossible to walk back so many of the developments in workflow we've seen since then. The question is no longer when we'll all get back to the office, but how the companies that are lagging in their technological ability to facilitate remote work can catch up ...
The pandemic accelerated organizations' journey to the cloud to enable agile, on-demand, flexible access to resources, helping them align with a digital business's dynamic needs. We heard from many of our customers at the start of lockdown last year, saying they had to shift to a remote work environment, seemingly overnight, and this effort was heavily cloud-reliant. However, blindly forging ahead can backfire ...
SmartBear recently released the results of its 2021 State of Software Quality | Testing survey. I doubt you'll be surprised to hear that a "lack of time" was reported as the number one challenge to doing more testing, especially as release frequencies continue to increase. However, it was disheartening to see that a lack of time was also the number one response when we asked people to identify the biggest blocker to professional development ...
The role of the CIO is evolving with an increased focus on unlocking customer connections through service innovation, according to the 2021 Global CIO Survey. The study reveals the shift in the role of the CIO with the majority of CIO respondents stating innovation, operational efficiency, and customer experience as their top priorities ...
The perception of IT support has dramatically improved thanks to the successful response of service desks to the pandemic, lockdowns and working from home, according to new research from the Service Desk Institute (SDI), sponsored by Sunrise Software ...
Is your company trying to use artificial intelligence (AI) for business purposes like sales and marketing, finance or customer experience? If not, why not? If so, has it struggled to start AI projects and get them to work effectively? ...
As remote work persists, and organizations take advantage of hire-from-anywhere models — in addition to facing other challenges like extreme weather events — companies across industries are continuing to re-evaluate the effectiveness of their tech stack. Today's increasingly distributed workforce has put a much greater emphasis on network availability across more endpoints as well as increased the bandwidth required for voice and video. For many, this has posed the question of whether to switch to a new network monitoring system ...
When a website or app fails or falters, the standard operating procedure is to assemble a sizable team to quickly "divide and conquer" to find a solution. The details of the problem can usually be found somewhere among millions of log events and metrics, leading to slow and painstaking searches that can take hours and often involve handoffs between experts in different areas of the software. The immediate goal in these situations is not to be comprehensive, but rather to troubleshoot until you find a solution that remedies the symptom, even if the underlying root cause is not addressed ...