Unfolding The Camel: Problem-Solving In A Multi-Cloud Environment

Unfolding The Camel: Problem-Solving In A Multi-Cloud Environment

Unfolding the Camel: Problem-solving in a multi-cloud environment

There is an expression that says “a camel is a horse designed by a committee,” which means, of course, that the more people who are involved in a decision-making process, the less the end product resembles its intended objectives. But camels aren’t always designed. Sometimes they simply emerge from their surroundings, growing fatter and more belligerent daily.

IT people encounter these camels all the time. Seldom is a data center built in such a way that every element is clearly defined. In fact most organizations have complex, virtualized systems that have been built up and out, adapting to new trends and needs, moving from open-source to commercial, leaping onto the cloud, and then back in-house again, in short, building a complicated camel that few traditional systems are capable of diagnosing and maintaining.

Alan Conley knows this, which is why he sits in the CTO’s chair at Zenoss, a company founded in 2005 to address the challenges of operating and assuring large-scale IT services, and to move away from the “patchwork” model that plagues many organizations.  Conley worked previously as CTO of the Network Management Group at Cisco Systems, where he was responsible for designing strategies for cloud management and next-generation networks. At Zenoss he helps build solutions that basically get to the root of a problem. As their promotional message states, they help clients spend time fixing a problem, rather than spend time trying to find the problem.

Alan_Conley_BW

Conley points out that IT managers need to fully understand the dependency model currently at play within their system, especially when, or ideally before a failure occurs. Of course, all managers are aware of the need to do this, but too often the management models currently in place lag behind what is actually needed. Real time service is critical.

Companies struggle with problems and dilemmas on a daily basis. For example, the temptation to go with a single cloud provider offers simplicity, yet when so much of what passes through the cloud is mission-critical, the advantages of multi-cloud operation, including the relative security of redundancy, as well as greater opportunity for leverage (especially when it comes to cost) become very appealing. Time to market is everything. Concern about reliability in a heavily virtualized arena goes right to the CEO, who has to make sure IT is not becoming the bottleneck. A highly virtualized infrastructure, different messaging systems, multiple database platforms, Oracle, SQL, the camel just grows bigger and uglier.

But that is the Zenoss sweet spot: monitoring and diagnosing in real time; giving people the much sought-after unified view, a type of holistic service management. As Conley points out, “if you are an enterprise looking at cloud providers, you must understand how the integration of one or more providers is going to interact with the rest of your services. You need a single service catalog.”

Zenoss bridges the gap between “traditional IT monitoring” and operations, and their unified platform can speak to all of them, whether infrastructure, middleware or application layer. It’s like having a personal C3PO, fluent in over six million forms of communication all of which are needed to drive down through the tangle and visually identify root causes and isolate outages. They provide a free basic monitoring and management version, but can then add more value through its enterprise class version, which comes with more bells and whistles such as support and training.

IT has never been simple. But in an age where innovation and change move at an unprecedented rate, and where open source technology competes with branded applications for the end users’ attention and pocketbook, Zenoss appears to stand alone as both an organization and an entity purpose-built to handle the challenges of a modern data centre.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…