Unfolding The Camel: Problem-Solving In A Multi-Cloud Environment

Unfolding The Camel: Problem-Solving In A Multi-Cloud Environment

Unfolding the Camel: Problem-solving in a multi-cloud environment

There is an expression that says “a camel is a horse designed by a committee,” which means, of course, that the more people who are involved in a decision-making process, the less the end product resembles its intended objectives. But camels aren’t always designed. Sometimes they simply emerge from their surroundings, growing fatter and more belligerent daily.

IT people encounter these camels all the time. Seldom is a data center built in such a way that every element is clearly defined. In fact most organizations have complex, virtualized systems that have been built up and out, adapting to new trends and needs, moving from open-source to commercial, leaping onto the cloud, and then back in-house again, in short, building a complicated camel that few traditional systems are capable of diagnosing and maintaining.

Alan Conley knows this, which is why he sits in the CTO’s chair at Zenoss, a company founded in 2005 to address the challenges of operating and assuring large-scale IT services, and to move away from the “patchwork” model that plagues many organizations.  Conley worked previously as CTO of the Network Management Group at Cisco Systems, where he was responsible for designing strategies for cloud management and next-generation networks. At Zenoss he helps build solutions that basically get to the root of a problem. As their promotional message states, they help clients spend time fixing a problem, rather than spend time trying to find the problem.

Alan_Conley_BW

Conley points out that IT managers need to fully understand the dependency model currently at play within their system, especially when, or ideally before a failure occurs. Of course, all managers are aware of the need to do this, but too often the management models currently in place lag behind what is actually needed. Real time service is critical.

Companies struggle with problems and dilemmas on a daily basis. For example, the temptation to go with a single cloud provider offers simplicity, yet when so much of what passes through the cloud is mission-critical, the advantages of multi-cloud operation, including the relative security of redundancy, as well as greater opportunity for leverage (especially when it comes to cost) become very appealing. Time to market is everything. Concern about reliability in a heavily virtualized arena goes right to the CEO, who has to make sure IT is not becoming the bottleneck. A highly virtualized infrastructure, different messaging systems, multiple database platforms, Oracle, SQL, the camel just grows bigger and uglier.

But that is the Zenoss sweet spot: monitoring and diagnosing in real time; giving people the much sought-after unified view, a type of holistic service management. As Conley points out, “if you are an enterprise looking at cloud providers, you must understand how the integration of one or more providers is going to interact with the rest of your services. You need a single service catalog.”

Zenoss bridges the gap between “traditional IT monitoring” and operations, and their unified platform can speak to all of them, whether infrastructure, middleware or application layer. It’s like having a personal C3PO, fluent in over six million forms of communication all of which are needed to drive down through the tangle and visually identify root causes and isolate outages. They provide a free basic monitoring and management version, but can then add more value through its enterprise class version, which comes with more bells and whistles such as support and training.

IT has never been simple. But in an age where innovation and change move at an unprecedented rate, and where open source technology competes with branded applications for the end users’ attention and pocketbook, Zenoss appears to stand alone as both an organization and an entity purpose-built to handle the challenges of a modern data centre.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…