In Understanding the Value of Unique Management Data, we pointed out that tools that collect unique data about the performance of infrastructure and applications are more likely to be able to provide you the value you want than tools that just rely on commodity data. In this post, we expose the most frequent marketing lie in the management software industry.
Articles Tagged with Splunk
Splunk, the provider of the leading software platform for real-time operational intelligence, today announced it has acquired Cloudmeter, Inc., a provider of network data capture technologies. The addition of Cloudmeter will enhance the ability of Splunk customers to analyze machine data directly from their networks and correlate it with other machine-generated data to gain insights across Splunk’s core use cases in application and infrastructure management, IT operations, security, and business analytics.
Recently I have had the pleasure of discussing security with a number of cloud providers. Specifically, we talked about what security they implement and how they inform their tenants of security-related issues. In other words, do they provide transparency? I have come to an early conclusion that there are two types of clouds out there: those that provide additional security measures and work with their tenants to improve security, and those who do not. On the Virtualization Security podcast we have discussed this many times, with the conclusion being drawn that many clouds do a better job at security than the average organization does, but that there is no way to know what is implemented, as there is no transparency.
In Beware of the Franken-Monitor, we explained how many enterprises ended up with Franken-Monitors and the dangers associated with assuming that the present state of management tools can make the transition into the software-defined data center (SDDC) and the cloud. In Getting Rid of Your Franken-Monitor, we explained how to use green-field islands to put in place new ecosystem-based management stacks with the intent of eventually retiring your legacy management stacks. In this post, we detail how one could deploy one example of such an ecosystem of tools based upon Splunk and the vendors that comprise its ecosystem.
In “Beware of the Franken-Monitor,” we outlined why systems management frameworks have become Franken-Monitors and the dangers of building your own Franken-Monitor. Unfortunately, the reality for most enterprises is that they have probably done some combination of the two. They have bought a framework that became a Franken-Monitor because the vendor of the framework never integrated its acquired components. And then they layered more “Frankeness” on top of their framework by buying, in some cases, hundreds of point monitoring solutions, none of which are integrated with each other or the frameworks.
Ten years ago, legacy management software vendors were busy building Franken-Monitors. Those Franken-Monitors now consist of legacy management offerings that are neither well integrated, nor in any way able to keep up with pace of innovation in the industry. In order to survive your transition to the software-defined data center and the cloud, you will need a management software strategy and a management software architecture that will allow you to keep up with the pace of change without buying or building a Franken-Monitor.