Controlling Complexity In Converged Infrastructure

Controlling Complexity In Converged Infrastructure

Converged Infrastructure

Converged infrastructure is very similar to an Airbus 380 – it has a tremendous amount of capacity, but there is no way a human can control it without the help of a very sophisticated control system. And just as this type of control system is relatively new to aircraft, the control system required to manage converged infrastructure is equally new, and very different from the tools and processes used to manage legacy infrastructure. This isn’t because complexity is anything new – data centers have always been extremely complex. It is because this new complexity is different – what was physical complexity is now becoming virtual complexity, and components and connections that were once in plain view for people to see are now becoming sealed in what is, in some cases quite literally, a black box.

This shift in complexity is underscoring the need to revisit several aspects of IT management, some of which need to improve and others which until now have been completely ignored:

Policy – Every IT environment has a purpose, and to fulfill that purpose, it must behave in a certain way. This includes how well it must perform, what level of availability it should offer, how it deals with security and data protection, how it manages multi-tenancy and resource sharing, and so on.

In legacy physical environments, and even early virtual environments, these criteria were not actively managed, as the environments were too static to warrant it. But in converged infrastructure, these management criteria must be formalized into proper policies, and these policies need to be clearly defined and actively controlled. Failure to do so will result in “workload anarchy”, where there is no clear authority over the operation of the environment.

In this sense, policies can be thought of as the contract between supply and demand, setting clear operational goalposts and protecting workloads from each other through tightly controlled rules of engagement.

Bookings – Virtual and cloud environments are much more dynamic than their physical predecessors, as they allow the deployment and decommissioning of workloads with greater frequency, higher speed and lower friction than ever before. When this is combined with converged infrastructure, which often provides a tremendous amount of capacity in a single unit, this pipeline of activity is concentrated. This makes managing what is coming into and leaving the environment critical to maintaining control.

Without visibility into upcoming demand, you are forced to estimate requirements and waste capacity (or worse, risk running out). An analogy is useful to demonstrate this: if physical environments are like houses and virtual environments are like apartment buildings, then clouds are like hotels, and clouds build on converged infrastructure are like very large hotels, with extremely busy lobbies. A good reservation system is essential to establishing the necessary control over bookings and available capacity, and while one wouldn’t dream of managing a hotel without a reservation system, IT is currently lacking in this area.

Analytics – The sheer amount of data created by management and monitoring tooling for these systems can overwhelm even the best infrastructure manager. Compounding this challenge is the flow of workloads into and out of them, and the operational policies required to govern them – and it is extremely difficult to understand what is required to proactively head off capacity and performance risks and understand infrastructure requirements.

Increasingly complex decisions about how much capacity is required, how to allocate resources, where to place workloads must be made more and more frequently, making it clear that the manual ways of making decisions will not survive. In fact, some speak of an “analytics revolution” being ushered along by the move to cloud and the shift to convergence. This not only provides the control system referred to in the airplane analogy, but when done properly can transform the way IT environments are managed.

Operational data, policies and bookings can be used in predictive analysis to gain insight into the future that isn’t otherwise possible. This allows IT managers to shift from a reactive mode of fire-fighting to a proactive one, in which they spend less time “just keeping up with things” and more time “getting ahead of the curve”.

Convergence provides many benefits, but in virtually every advantage there exists management challenges that must be addressed. Rather than see this as a negative, however, organizations should see these as an opportunity to revolutionize the way they manage infrastructure.

By adopting new ways of thinking and new-school control systems, humans can effectively tame the new complexity and take control over their converged infrastructure.

By Andrew Hillier, CTO and co-founder of CiRBA

Andrew has over 20 years of experience in the creation and implementation of mission-critical software for the world’s largest financial institutions and utilities. A co-founder of CiRBA, he leads product strategy and defines the overall technology roadmap for the company.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Marketing Execs Beefing Up on Martech Strategies

Marketing Execs Beefing Up on Martech Strategies

Martech Strategies As budgets shift from traditional marketing streams to marketing technology, it’s essential that both marketers and business leaders understand marketing technology and keep up with the developments. According to eMarketer, 78% of US senior marketers surveyed believe gaining this understanding of marketing technology is increasingly relevant to their success, and the majority of…

4 Monetization Models For The Digital Business Era

4 Monetization Models For The Digital Business Era

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years. However, MGI Research predicts that digital businesses will need to increase their time to market by 40 percent. Many global executives admit they are unprepared to monetize their operations. The million dollar question is: how…

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

The cyberwar is on! At this stage of the game, the stakes are higher than ever, and safeguarding networks from cyberattacks is a devilish combination of Chicken and Cat-and-Mouse. Attacks are now so commonplace that many events of serious cybersecurity breaches go uncovered by mainstream media. Despite the rapid advancements in IT security technology, hackers…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…