& cplSiteName &

Elastic Visibility Into Your Clouds – Without the Strain

Jeff Harris
1/10/2017
50%
50%

The rapid move to the cloud is understandable since it is so alluring: It is elastic, costs less to operate and manage and is scalable -- enhancing business agility. The latest Cisco Global Cloud Index states that by 2020, 92% of workloads will be processed in public and private cloud data centers and just 8% in physical data centers. But in engineering, there is no such thing as getting something for nothing. With cloud migration, the benefits of agility are realized at the expense of visibility and control.

When we surveyed a range of businesses on their virtualization practices, just 37% monitored their virtualized environments with the same rigor as their physical networks, revealing a big visibility gap when it comes to the cloud. While it may seem like a worthwhile trade-off today, it won't be if and when things go wrong.

For instance, malicious activity can happen right under a company's nose considering a significant portion of network traffic in virtualized environments doesn’t even hit a physical link or traditional monitoring tool. Moreover, virtualized networks introduce additional software layers that could be riddled with bugs. Organizations need to monitor their virtual networks even more rigorously than their physical counterparts. Not a risk worth taking, the visibility gap needs to be bridged quickly to ensure better control, maintain security no matter where their data goes and confirm the reliability of core business applications.

Inserting virtual network taps into the virtualized environment and sending the traffic to their monitoring, analytics and security tools should help the problem. Unfortunately, doing this would quickly flood these tools with data because internal "East-West" traffic in virtual data centers typically represents 80% of the total traffic. It would be like connecting a lawn sprinkler to a fire hydrant. Identifying and extracting only relevant traffic is key, but how can that efficiently be done efficiently? More so, how can virtual taps handle scaling up and down as virtual machines emerge and dissolve? Let's take a closer look at the key requirements for visibility and monitoring in virtual environments.

There are four key points to consider when deploying virtual for meaningful, granular access to critical application traffic on virtualized networks.


Want to know more about the companies, people and organizations driving developments in the test, monitoring and assurance sector? Check out Testapedia, the most comprehensive online resource covering the telecom test and measurement industry.


Horizontal scale: Cloud environments are attractive because they can scale up and down rapidly as user demands and workloads change. When placing virtual taps in a virtual network, ensure they can scale up to accommodate rapid growth in traffic volumes as well as user numbers and data interactions. The taps should do this automatically, without IT intervention. Virtualization means agility, so if an application or service expands to handle 10x or 100x the number of users, make sure the virtual tap in use can scale elastically -- without impacting application performance.

Securing in the dark: Virtualized networks are typically segmented using virtual firewalls to protect key applications and services from attack and to prevent compromising lateral movement in the virtualized environment. So the virtual taps used need to see the application and network traffic flowing between segments. With this comprehensive insight, it’s easier to make sure the appropriate security rules and policies governing each segment are being enforced.

More containers: As virtual machine use grows, container use multiplies even faster by as much as 10x or more since each application may employ multiple containers. An organization using container-based virtualization to boost application performance must have virtual taps that can access traffic in the container environment.

DevOps elasticity: When the DevOps team puts out a new build -- which doesn’t just cover new applications and services, but also updates to existing ones -- then that update propagates across the virtual environment. Individual virtual machines, containers and their hosted applications have shorter and shorter lifespans requiring continual awareness of the actual state of the environment. It is vital that these changes not block the entire traffic path or take the virtual tap down. As an example, consider how to archive and retrieve monitored traffic from a container that no longer exists. The tap is your sentinel, which has to maintain pervasive access to traffic to enable you to see what is happening on the virtual network: it must be fault-tolerant, even if the application it is monitoring fails.

These four points apply when monitoring any virtualized environment, whether public cloud, private cloud or software defined wide-area networks (SD-WANs). The virtual taps and the overall visibility solution need to be completely environment-agnostic.

Once the virtual taps have been deployed to extract traffic from the virtual machines in an environment, organizations can start processing packets. This can be done via network packet brokers, which keep duplicate data from overwhelming monitoring and security tools while ensuring they scale up/down as needed. Ultimately, data traffic should be broken up into manageable pieces using packet filtering, grooming and brokering processes, so security systems and analytics tools see everything.

Elastically scalable access is achievable for all the data crossing virtual networks and clouds through intelligent distribution to analytics and compliance tools. You do not have to give up visibility to gain cloud speed and cost advantages. Fortunately, you can have both with the right architecture.


CALLING ALL TEST, ASSURANCE AND MONITORING COMPANIES:
Make sure your company and services are listed free of charge at Testapedia, the comprehensive set of searchable databases covering the companies, products, industry organizations and people that are directly involved in defining and shaping the telecom test and measurement industry.



(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
danielcawrey
50%
50%
danielcawrey,
User Rank: Light Sabre
1/10/2017 | 4:09:03 PM
Visibility
I have long thought that these new systems, powered by servers far away and shuttled around with software - remain vulnerable. 

An improvement in visibility tools is certainly something that is needed. It will come, it's juts going to take time for there to be a footing in what we're looking for in these systems. 
More Blogs from Column
NFV is still behind in becoming cloud-native. A look at what cloud providers are doing with FPGAs should provide inspiration.
Sensible regulations are needed as smaller radios get installed to facilitate 5G.
Now that communications service providers have reached a crossroads, they must choose quickly to survive.
A merger between Sprint and T-Mobile could help to address the gap between the US and its global peers on mobile broadband speeds.
Mobile networks will transform from now through 2020, more than since the inception of 2G. New 4G capabilities will trigger some of that, however, 5G both enables and encourages more fundamental change.
Featured Video
From The Founder
Light Reading is spending much of this year digging into the details of how automation technology will impact the comms market, but let's take a moment to also look at how automation is set to overturn the current world order by the middle of the century.
Flash Poll
Upcoming Live Events
November 30, 2017, The Westin Times Square
December 5-7, 2017, The Intercontinental Prague
March 20-22, 2018, Denver Marriott Tech Center
May 14-17, 2018, Austin Convention Center
All Upcoming Live Events
Infographics
SmartNICs aren't just about achieving scale. They also have a major impact in reducing CAPEX and OPEX requirements.
Hot Topics
When Will 6G Arrive? Hopefully Never, Says BT's McRae
Iain Morris, News Editor, 11/21/2017
Let's Talk About 5G Efficiency, Not Wacky Services
Iain Morris, News Editor, 11/21/2017
Top 5 Tech Turkeys 2017
Dan Jones, Mobile Editor, 11/22/2017
Wireless Could Arrive Soon in NYC Subway Tunnels
Dan Jones, Mobile Editor, 11/20/2017
AT&T's Lurie Leaps to Synchronoss as New CEO
Dan Jones, Mobile Editor, 11/17/2017
Animals with Phones
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed
Partner Perspectives - content from our sponsors
The Mobile Broadband Road Ahead
By Kevin Taylor, for Huawei
All Partner Perspectives