Over a million developers have joined DZone.

Log Analysis for Software-Defined Data Centers

· Cloud Zone

Download the Essential Cloud Buyer’s Guide to learn important factors to consider before selecting a provider as well as buying criteria to help you make the best decision for your infrastructure needs, brought to you in partnership with Internap.

[This article was written by Chris Riley.]

Modern infrastructure constantly generates log data at a rate faster than humans can easily analyze. And now that data centers can be built and torn down with scripts, the amount of activity and data is exponential.

The traditional log analysis practices of manually reviewing log files on a weekly or daily basis, remain inadequate when looking at Software-defined Data Centers (SDDC). The modern architecture of SDDC, with its highly automated and dynamic deployment capabilities for multi-tier applications, necessitates real-time log analytics. Analytics that are key to complex troubleshooting, dynamic provisioning, high performance and superior security.log-analysis-for-software-defined-data-centers-2

In the software defined data center you are looking at many more variables beyond servers. You want to see provisioning volume and time. You want to know performance and iOPS of bare metal machines. You want to know about how the data centers network, and all individual virtual networks are performing, their security, and possible weak spots. And in the case of companies like IaaS and hosting providers you might be managing many of these virtual data centers all at one time.

Identifying root-cause performance bottlenecks, security vulnerabilities and optimizing provisioning of SDDC resources is only possible with a comprehensive log management solution. One that takes log data from individual components and presents a consolidated view of the infrastructure’s system log data. The resulting operational intelligence enables deep, enterprise-wide visibility to ensure optimized utilization of SDDC resources, and advanced alerting to call details to pertinent and urgent issues.

Without these capabilities, IT administrators have to rely exclusively on system metrics, limiting their ability to make comprehensive decisions on performance alone, and possibly only performance at the data center level. Things such as memory consumption, CPU utilization and storage overlook valuable diagnostic information stored in log files.

Here are some of the categories of information that log analysis in SDDC can provide.

Machine Provisioning, De-Provisioning, and Moves: In the modern datacenter VMs move from physical machine to physical machine sometimes even while running, with technologies like v-motion. In order to optimize the processes for moving VMs to accommodate load historical reporting on VM moves, provisioning, and de-provisioning can help teams understand where to optimize the processes or and and remove bare metal machines.

Data enter to Bare Metal Utilization: Enable the advantage of cloud technologies such as elasticity, on-demand availability and flexibility with the performance, consistency and predictability of bare metal servers. Log analysis allows IT decision makers to incorporate accurate information of machine efficiencies in planning for the overall provisioning, scaling and utilization of SDDC environments.

Intrusion Monitoring and Management: Log data can be used to identify anomalous activities and creating automated alerts to point out areas of concern in real-time. With traditional, manual log analysis practices, IT administrators fail to extract insights from log data pointing to possible performance and security issues. A log analysis based management solution automates these processes, frees IT administrators from tedious manual log analysis tasks and provides enhanced visibility into infrastructure operations to prevent data breaches.

Audit Trails for Forensics Analysis and Compliance: Correlate log data to trace suspected intrusions or data loss, and maintain compliance to strict security regulations.

Incident Containment: Identify and isolate compromised or underperforming components to prevent infrastructure-wide damages with real-time alert configurations. Users can also analyze log data to identify causal links between independent outages and performance issues, spotting them before they grow.

Infrastructure Optimization: Active network log management allows IT decision makers to shape the infrastructure to meet diverse and evolving business demands. DevOps can also use log data in integrated test environments to correlate tests results with log data generated by SDDC infrastructure and applications.

Reduced Cost: Fewer tools and IT expertise are required to maintain and manage complex SDDC infrastructure.

And the implementation is easy. Just like server monitoring log pulls from server data are as easy as installing an agent. In the case of the SDDC the agent must already be a part of the script or gold master VM used for all provisioning. But in addition to the VMs, the agent also needs to be installed on all instances of your bare metal hypervisor. For example on each VMware ESX server. The only additional step above and beyond straight server logging is making sure the division between the hypervisor machines, and their provisioned VMs is clear.

Extending log analysis beyond monitoring of individual components to management of the entire SDDC requires users to set up cloud-based log analysis solutions completely independent from the SDDC infrastructure in question. While IT professionals are accustomed to traditional practices of monitoring errors in log data, DevOps running SDDC must identify the underlying network components where the shift in system behavior occurs. And with advanced machine learning-based log management solutions, DevOps can resolve issues and optimize performance with greater effectiveness.

The Cloud Zone is brought to you in partnership with Internap. Read Bare-Metal Cloud 101 to learn about bare-metal cloud and how it has emerged as a way to complement virtualized services.

Topics:

Published at DZone with permission of Trevor Parsons, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

The best of DZone straight to your inbox.

SEE AN EXAMPLE
Please provide a valid email address.

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.
Subscribe

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}