I Don’t Know What I Don’t Know

I Don’t Know What I Don’t Know

I Don’t Know What I Don’t Know

What happens when the IT person doesn’t know where the source of a system failure is? What happens when that same IT person has to go and explain to an executive that the source of the problem cannot be found quickly, due to an organically-evolved legacy system or diagnostic tools that cannot reveal what is truly happening under the hood? What kind of answer can be given when the boss asks why we didn’t see this coming?

Such scenarios are enough to make most IT managers wake up at 3 a.m. in a cold sweat.

IT-Stress

Minutes count, but seconds count even more. A sudden surge in social media activity for example, might place greater demand on a system which, if properly balanced and prepared, would likely be able to handle the increased load. But if a monitoring system is slow, outdated, or vague, or if it does not provide alerts in advance – based on current needs and past performance – then the crash comes first and frenzied diagnosis must follow afterwards.

(Image source: Shutterstock.com)

This is not a healthy situation for either humans or machines, which is why many admins prefer to maintain an active state of overall awareness, using a combination of monitoring and pattern-catching technologies to identify and resolve problems before they turn into SNAFUs.

This approach sounds like common sense, of course, but many admins discover too late that the monitoring systems they have in place are not up to the task of delivering real-time, proactive information. Furthermore, they discover that upgrades would prove too costly per machine.

So instead, the IT department resorts to overprovisioning, building in extra space or load veering capacity just-in-case, with resultant increases in cost either being passed on to the customer or merely eating into the profits. (The concept of overprovisioning is covered in an earlier CloudTweaks post.)

According to Eric Anderson, CTO and co-founder of Austin, TX-based CopperEgg www.copperegg.com, the tools that most organizations currently have are not built for the dynamic nature of cloud and the new way developers are building applications. He states “admins need to be ready for a new wave of application architectures that do not fit well with traditional monitoring and performance tools.”

Specifically, Anderson refers to granularity. “Admins are feeling more pressure to see more fine-grained visibility into the applications they are keeping alive,” he says, “and their systems are becoming more complex, driving them to need higher frequency and more detailed tools to bring clarity when there are application level issues.”

Anderson pointed out how one of the best things he had ever done on this frontier was to show a client a screenshot contrasting the differences between 5 minute, 1 minute and 5 second granularity in monitoring: “the key is that with finer grained resolution you don’t miss the details.” He points to an example in which at 1 minute, a 20-second spike in CPU will get washed out to a little bump on everyone else’s monitoring system, but with CopperEgg, at 5 seconds, you see it. “Let me ask,” he says, “if you sit at a website for 5 seconds and nothing happens, do you wait? I don’t. I bounce. So why is monitoring that same service at 1 minute acceptable? It isn’t. You need monitoring at the granularity your customers care about. And that’s seconds, not minutes. That, he says, is one of the ways to find what you need to know about your systems.”

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By Copperegg

CopperEgg Logo

 

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…