SlideShare ist ein Scribd-Unternehmen logo
1 von 59
Downloaden Sie, um offline zu lesen
October 15, 2015
Optimize your IT Infrastructure
with Scalar, EMC and Splunk
Scalar leads Canadian Business to
the Next Generation of IT through
Innovation, Expertise & Service
3
DAVID WIEDASECK
SR. Partner Sales Engineer
dw@splunk.com
JEFFREY WIGGINS
ETD SE Manager
jeffrey.wiggins@emc.com
MICHAEL TRAVES
Solutions Architect
michael.traves@scalar.ca
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 4
Scalar Client Solutions
Security
Context-Based
Enterprise Security
Infrastructure
Integration of Emerging
Technologies
Cloud
Hybrid Cloud
Solutions
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 5
Splunk Analytics – Use Cases
Operational Intelligence
§  IT Operations: Utilization, Capacity Growth
§  Security: Fraud Detection, Real-time Detection of Threats, Forensics
§  Internet of Things (IoT): Sensor Data, Machine-to-Machine, Machine-Human
Interactions
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 6
Consulting – Solution Design
§  Business Drivers
§  Alignment with IT
§  Stakeholders and Big Data Teams
§  (Data Scientists, Business Analysts, Marketing, IT, CxO, Dir.)
§  Sizing
§  Ingest Performance and Scalability, Search & Index
§  Infrastructure – Scale Out
§  Compute (Virtual, Physical)
§  Network (1/10/40GbE)
§  Storage (Hot/Warm and Cold/Frozen Tiers)
§  Data Security and Protection (Distributed or Consolidated)
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 7
Consulting – Deployment
§  Build
§  Pilot and Pre-production
§  Proof of Value
§  Integration with Big Data and Data Lake Initiatives
§  Validate
§  Performance and Scalability
§  Availability
§  Customize
§  Dashboards
§  Reporting and Alerting
8
We want to work with YOU
9
But why should you work with US?
10
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 11
Top Tier Technical Talent
§  Engineers average 15 years of experience
§  World-class experts from some of the leading organizations in the industry
§  Dedicated PMO, finance, sales and operations teams
Copyright	
  ©	
  2013	
  Splunk,	
  Inc.	
  
Splunk	
  Big	
  Data	
  Analy=cs	
  
Machine	
  Data	
  OR	
  Big	
  Data?	
  
AND VALUABLE
SPLUNK - MAKE MACHINE DATA
ACCESSIBLE, USABLE
TO EVERYONE
What	
  is	
  Machine	
  Data	
  
	
  hEps://youtu.be/3YEE3RfXVVA	
  
COLLECT	
  DATA	
  
FROM	
  ANYWHERE	
  
SEARCH	
  
AND	
  ANALYZE	
  
EVERYTHING	
  
GAIN	
  REAL-­‐TIME	
  
DATA	
  
INTELLIGENCE	
  
The	
  Power	
  of	
  Splunk	
  
15	
  
16	
  
Turning	
  Machine	
  Data	
  Into	
  Business	
  Value	
  
Index	
  Untapped	
  Data:	
  Any	
  Source,	
  Type,	
  Volume	
  
Online	
  
Services	
  
Web	
  
Services	
  
Servers	
  
Security	
   GPS	
  
Loca=on	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
Applica=ons	
  
Custom	
  
Applica=ons	
  Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
RFID	
  
On-­‐	
  
Premises	
  
Private	
  	
  
Cloud	
  
Public	
  	
  
Cloud	
  
	
  Ask	
  Any	
  QuesQon	
  
ApplicaQon	
  Delivery	
  
Security,	
  Compliance	
  
and	
  Fraud	
  
IT	
  OperaQons	
  
Business	
  AnalyQcs	
  
Industrial	
  Data	
  and	
  
the	
  Internet	
  of	
  Things	
  
What	
  Does	
  Machine	
  Data	
  Look	
  Like?	
  
Sources	
  
Order	
  Processing	
  
TwiTer	
  
Care	
  IVR	
  
Middleware	
  	
  
Error	
  
17	
  
Machine	
  Data	
  Contains	
  CriQcal	
  Insights	
  
Customer	
  ID	
   Order	
  ID	
  
Customer’s	
  Tweet	
  	
  
Time	
  Wai=ng	
  On	
  Hold	
  
TwiEer	
  ID	
  
Product	
  ID	
  
Company’s	
  TwiEer	
  ID	
  
Customer	
  ID	
  Order	
  ID	
  
Customer	
  ID	
  
Sources	
  
Order	
  Processing	
  
TwiTer	
  
Care	
  IVR	
  
Middleware	
  	
  
Error	
  
18	
  
Machine	
  Data	
  Contains	
  CriQcal	
  Insights	
  
Order	
  ID	
  
Customer’s	
  Tweet	
  	
  
Time	
  Wai=ng	
  On	
  Hold	
  
Product	
  ID	
  
Company’s	
  TwiEer	
  ID	
  
Order	
  ID	
  
Customer	
  ID	
  
TwiEer	
  ID	
  
Customer	
  ID	
  
Customer	
  ID	
  
Sources	
  
Order	
  Processing	
  
TwiTer	
  
Care	
  IVR	
  
Middleware	
  	
  
Error	
  
19	
  
SPLUNK TODAY
	
  
20	
  
Mainframe
Data
VMware
Platform for Machine Data
Exchange PCI Security
DB Connect MobileForwarders
Syslog,
TCP,
Other
Sensors,
Control
Systems
600+ Ecosystem of Apps
Stream
Splunk	
  Use	
  Cases	
  
IT	
  Opera=ons	
  
API	
  
SDKs	
   UI	
  
Server,	
  Storage,	
  
Network	
  
Server	
  
Virtualiza=on	
  
Opera=ng	
  
Systems	
  
Custom	
  	
  
Applica=ons	
  
Business	
  	
  
Applica=ons	
  
Cloud	
  
Services	
  
App	
  Performance	
  
Monitoring	
  Ticke=ng/Other	
  
Web	
  Intelligence	
  
Mobile	
  
Applica=ons	
  
Servers	
  
Storage	
  
Desktops	
  Email	
   Web	
  
Transac=on	
  
Records	
  
Network	
  
Flows	
  
DHCP/	
  DNS	
  
Hypervisor	
  
Custom	
  
Apps	
  
Physical	
  
Access	
  
Badges	
  
Threat	
  
Intelligence	
  
Mobile	
  
CMBD	
  
23	
  
Security	
  
Intrusion	
  	
  
Detec=on	
  
Firewall	
  
Data	
  Loss	
  
Preven=on	
  
An=-­‐
Malware	
  
Vulnerability	
  
Scans	
  
Authen=ca=on	
  
TradiQonal	
  SIEM	
  
Business	
  Intelligence	
  
Soda	
  Company	
  Use	
  Case	
  
"   Soda	
  Company	
  extracts	
  data	
  from	
  vending	
  machines,	
  social	
  media,	
  and	
  loyalty	
  
programs	
  
–  Distribu=on	
  
–  New	
  product	
  development	
  
–  Insight	
  into	
  consumer	
  buying	
  paEerns	
  
"   "without	
  data	
  you're	
  just	
  a	
  person	
  with	
  an	
  opinion".	
  	
  
"   Customers	
  face	
  challenges	
  with	
  “data	
  cartels”	
  within	
  their	
  organiza=on	
  
"   Need	
  to	
  “free	
  the	
  data	
  lake”	
  	
  from	
  ridgid	
  structured	
  data	
  warehouse	
  
applica=ons	
  
24	
  
Analy=cs	
  	
  
"   What	
  we	
  are	
  looking	
  for	
  or	
  Why	
  will	
  depend	
  on	
  Who	
  we	
  ask	
  	
  
–  What	
  are	
  the	
  normal	
  characteris=cs	
  for	
  a	
  dog?	
  
ê  Dog	
  Show:	
  height,	
  weight,	
  coat,	
  gait,	
  posture	
  
ê  Veterinarian:	
  Immuniza=ons,	
  history	
  of	
  illness,	
  injuries,	
  diet	
  
ê  Parent:	
  Suitability	
  for	
  children,	
  temperament,	
  allergies	
  	
  
ê  Data	
  Scien=st:	
  	
  Mean	
  +/-­‐	
  Standard	
  devia=on	
  
25	
  
-­‐mean	
  +	
  std.	
  dev	
  
-­‐Mean	
  
-­‐Mean	
  –	
  std.dev	
  
Internet	
  of	
  Things	
  
26	
  
CorrelaQon	
  Criteria	
  
"   MAC	
  address	
  same	
  
"   Content	
  in	
  Search	
  Results	
  
"   Purchase	
  =me	
  
Search	
  Results	
  
(ApplicaQon	
  Logs)	
  
Device	
  ID	
  
(MAC	
  Address)	
  
Time	
  of	
  Search	
  
Content	
  
Purchased	
  
(IDA	
  #)	
  
Device	
  
(MAC	
  Address)	
  
Time	
  of	
  Search	
  
Amount	
  of	
  
Purchase	
  ($)	
  
Billing	
  (Structured	
  Data)	
  
Search	
  (Machine	
  Data)	
  
Business	
  Value	
  
"   Revenues	
  driven	
  by	
  Search	
  
"   Improving	
  local	
  content	
  mix	
  	
  
"   BeEer	
  search	
  results	
  
"   Tailor	
  content	
  promo=on	
  
>	
  
How	
  Splunk	
  Stores	
  
Data	
  
How	
  Splunk	
  Stores	
  Data	
  
"   As	
  Splunk	
  indexes	
  your	
  data	
  it	
  creates	
  a	
  bunch	
  of	
  files	
  
–  Raw	
  data	
  in	
  compressed	
  for	
  (rawdata)	
  
–  Indexes	
  that	
  point	
  to	
  the	
  raw	
  data,	
  plus	
  some	
  meta	
  data	
  files	
  (Index	
  Files)	
  
"   The	
  index	
  files	
  reside	
  in	
  directories	
  known	
  as	
  a	
  “bucket”	
  
"   A	
  bucket	
  Moves	
  through	
  Several	
  Stages	
  as	
  it	
  ages	
  
–  Hot	
  &	
  Warm	
  	
  $SPLUNK_HOME/var/lib/splunk/defaultdb/db/*	
  	
  
–  Cold	
  	
  $SPLUNK_HOME/var/lib/splunk/defaultdb/colddb/	
  
–  Frozen	
  	
  Archive	
  (Can	
  sEll	
  be	
  searched	
  and	
  thawed)	
  	
  
"   File	
  name	
  Format	
  	
  db_<newest_Eme>_<oldest_Eme>_<localid>_<guid>	
  	
  
	
  
28	
  
Splunk	
  Index	
  Buckets	
  
29	
  
Bucket	
  	
  
Stage	
  
DescripQon	
   Searchable?	
  
Hot	
   Newly	
  Indexed	
  Data,	
  One	
  or	
  
more	
  hot	
  buckets	
  per	
  Index	
  
Yes	
  
Warm	
   Data	
  rolled	
  from	
  hot.	
  There	
  
are	
  many	
  warm	
  buckets	
  
Yes	
  
Cold	
   Data	
  rolled	
  from	
  cold.	
  There	
  
are	
  many	
  cold	
  buckets	
  
Yes	
  
Frozen	
   Data	
  rolled	
  from	
  cold.	
  Splunk	
  
deletes	
  frozen	
  data	
  by	
  
default,	
  but	
  it	
  can	
  also	
  be	
  
archived.	
  Archived	
  data	
  can	
  
later	
  be	
  thawed	
  
Can	
  be	
  
Storage	
  Considera=ons	
  
"   Storage	
  requirements	
  !=	
  Index	
  Volume	
  (GB/day)	
  
–  Search	
  profile	
  and	
  number	
  of	
  searches	
  is	
  just	
  as	
  important	
  
–  Also	
  must	
  consider	
  data	
  reten=on	
  
" Splunk	
  u=lizes	
  I/O	
  to	
  perform	
  both	
  Searching	
  AND	
  Indexing	
  
–  Load	
  =	
  Search	
  Volume	
  +	
  Indexing	
  Volume	
  
–  Index	
  load	
  is	
  write	
  intensive	
  
–  Search	
  load	
  is	
  read	
  intensive	
  against	
  the	
  data	
  searched	
  (current	
  vs	
  recent	
  vs	
  old)	
  
–  SSDs	
  generally	
  provide	
  higher	
  performance	
  over	
  HDDs,	
  but	
  at	
  a	
  cost	
  
30	
  
Storage	
  Considera=ons	
  
"   What	
  is	
  the	
  use-­‐case?	
  
–  IT	
  Opera=ons	
  use-­‐cases	
  typically	
  search	
  against	
  recent	
  data	
  (e.g.	
  –	
  0	
  to	
  14	
  days)	
  
–  Security	
  and	
  Analy=cs	
  use-­‐cases	
  typically	
  search	
  all	
  data	
  (e.g.	
  –	
  days	
  to	
  months	
  
to	
  years)	
  
"   What	
  is	
  the	
  typical	
  =me	
  span	
  of	
  the	
  data	
  searched?	
  
–  Most	
  ad-­‐hoc	
  searches	
  are	
  against	
  current	
  or	
  recent	
  data	
  	
  
–  Analy=cs	
  may	
  span	
  a	
  very	
  large	
  =me	
  frame	
  
–  Security	
  forensics	
  typically	
  search	
  all	
  data	
  
–  Reports	
  or	
  Aler=ng	
  Searches	
  might	
  be	
  over	
  the	
  past	
  day	
  or	
  week	
  
31	
  
Splunk	
  Index	
  Replica=on	
  –	
  High	
  Availability	
  
32	
  
2	
  
Master	
  asks	
  the	
  redundant	
  	
  
peer	
  to	
  act	
  as	
  primary	
  
3	
  
Peers	
  copies	
  the	
  search	
  
files	
  /	
  index	
  files	
  /	
  raw	
  data	
  
2	
  
3	
  
1	
  
Master	
  auto-­‐detects	
  that	
  a	
  
peer	
  is	
  down	
  
1	
  
•  Default	
  is	
  3X	
  Replica=on	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
Scalable	
  Cluster	
  Base	
  Architecture	
  
Send	
  data	
  from	
  1000s	
  of	
  servers	
  using	
  combina=on	
  of	
  Splunk	
  Forwarders,	
  syslog,	
  WMI,	
  message	
  queues,	
  or	
  other	
  remote	
  protocols	
  
Auto	
  load-­‐balanced	
  forwarding	
  to	
  as	
  many	
  Splunk	
  Indexers	
  as	
  you	
  need	
  to	
  index	
  terabytes/day	
  
Offload	
  search	
  load	
  to	
  Splunk	
  Search	
  Heads	
  	
  
33	
  
" Automa=c	
  load	
  balancing	
  linearly	
  	
  
scales	
  indexing	
  
" Distributed	
  search	
  and	
  MapReduce	
  
linearly	
  scales	
  search	
  and	
  repor=ng	
  
Splunk	
  Real-­‐Time	
  Analy=cs	
  	
  
Data	
  
Parsing	
  Queue	
  
Parsing	
  Pipeline	
  
•  Source,	
  event	
  typing	
  
•  Character	
  set	
  
normaliza=on	
  
•  Line	
  breaking	
  
•  Timestamp	
  iden=fica=on	
  
•  Regex	
  transforms	
  
Indexing	
  
Pipeline	
  
Real-­‐=me	
  
Buffer	
  
Raw	
  data	
  
Index	
  Files	
  
Real-­‐=me	
  
Search	
  
Process	
  
Monitor	
  Input	
  
Index	
  Queue	
  
TCP/UDP	
  Input	
  
Scripted	
  Input	
  
Splunk	
  
Index	
  
34	
  
Distributed	
  File	
  System	
  
(semi-­‐structured)	
  
Key/Value,	
  Columnar	
  or	
  	
  
Other	
  (semi-­‐structured)	
  
RelaQonal	
  Database	
  
	
  (highly	
  structured)	
  
MapReduce	
  
Cassandra	
  
Accumulo	
  
MongoDB	
  
Splunk	
  -­‐	
  Big	
  Data	
  Technologies	
  
SQL	
  &	
  
MapReduce	
  
NoSQL	
  
Temporal,	
  Unstructured	
  
Heterogeneous	
  
Hadoop	
  
RDBMS	
   HDFS	
  Storage	
  +	
  	
  
MapReduce	
  
Real-­‐Time	
  Indexing	
  
35	
  
Oracle	
  
MySQL	
  
IBM	
  DB2	
  
Teradata	
  
Copyright	
  ©	
  2013	
  Splunk,	
  Inc.	
  
Hunk	
  -­‐	
  Hadoop	
  
Image	
  Search	
  with	
  Hunk	
  
hEp://blogs.splunk.com/2013/10/18/images-­‐search-­‐with-­‐splunk-­‐and-­‐hunk/	
  
37	
  
•  Image	
  search	
  on	
  HDFS	
  using	
  Splunk	
  
•  Select	
  images	
  based	
  on	
  ranges	
  of	
  color	
  
•  3	
  parts	
  	
  
•  The	
  Preprocessor	
  using	
  Hadoop	
  Record	
  
reader	
  in	
  Java	
  
•  Splunk	
  Search	
  
•  Splunk	
  UI	
  
•  search	
  index=images	
  |	
  eval	
  score=color1+color2+
…+colorN	
  |	
  sort	
  -­‐score	
  by	
  image	
  
	
  
Why	
  Splunk	
  &	
  Hunk	
  
•  Schema	
  on	
  the	
  Fly	
  –	
  fast,	
  flexible,	
  interac=ve	
  analy=cs	
  experience.	
  	
  	
  
•  Interac=ve	
  Search	
  –	
  you	
  don’t	
  to	
  know	
  anything	
  about	
  the	
  data	
  in	
  advance,	
  
Hunk	
  automa=cally	
  adds	
  structure	
  and	
  iden=fies	
  fields	
  of	
  interest,	
  keywords,	
  
top	
  values,	
  and	
  paEerns	
  over	
  =me	
  
•  Results	
  Preview	
  –	
  query	
  results	
  are	
  streamed	
  back	
  in	
  real	
  =me.	
  Pause	
  and	
  
refine	
  queries	
  without	
  having	
  to	
  wait	
  for	
  jobs	
  to	
  finish.	
  
•  Drag	
  and	
  Drop	
  Analy=cs	
  –	
  quickly	
  create	
  charts,	
  visuals	
  ,	
  and	
  dashboards	
  using	
  
pivot	
  
•  Rich	
  App	
  ecosystem	
  for	
  popular	
  applica=ons	
  and	
  data	
  types	
  
•  Hunk	
  –	
  Search	
  and	
  Report	
  on	
  na=ve	
  HDFS	
  without	
  inges=ng	
  the	
  data	
  
38	
  
Challenges	
  With	
  Open	
  Source	
  Analy=cs	
  	
  
•  Open	
  source	
  sozware	
  such	
  as	
  Hadoop	
  and	
  Cassandra	
  require	
  significant	
  
services	
  effort	
  —	
  as	
  much	
  as	
  20X	
  higher	
  personnel	
  costs	
  rela=ve	
  to	
  sozware	
  
purchases.	
  	
  
•  Challenges	
  Ge|ng	
  Value	
  from	
  Data	
  in	
  Hadoop	
  
•  Easy	
  storage	
  but	
  hard	
  analy=cs:	
  difficult	
  for	
  non-­‐specialists	
  to	
  explore,	
  analyze	
  and	
  
visualize	
  data	
  
•  Complex	
  technology:	
  wide	
  range	
  of	
  open	
  source	
  projects	
  
•  Hard-­‐to-­‐staff	
  skills:	
  must	
  write	
  MapReduce	
  jobs	
  or	
  pre-­‐define	
  schemas	
  for	
  Hive	
  
•  Hadoop	
  was	
  designed	
  to	
  be	
  a	
  batch	
  job	
  processing	
  system,	
  ie	
  you	
  start	
  a	
  job	
  
and	
  see	
  results	
  in	
  a	
  range	
  from	
  tens	
  of	
  minutes	
  to	
  days.	
  
39	
  
Gartner,	
  “Big	
  Data	
  Drives	
  Rapid	
  Changes	
  in	
  Infrastructure	
  and	
  	
  
US$232	
  Billion	
  in	
  IT	
  Spending	
  Through	
  2016”,	
  October	
  17,	
  2012	
  
Splunk	
  and	
  Hadoop	
  
40	
  
"   Hunk:	
  
–  Main	
  use	
  case	
  =	
  Analyze	
  Hadoop	
  Data	
  using	
  Hadoop	
  Processing	
  
"  	
  Splunk	
  Hadoop	
  Connect:	
  	
  
–  Main	
  use	
  case	
  =	
  Real-­‐=me	
  export	
  data	
  from	
  Splunk	
  to	
  Hadoop	
  
"   Hunk	
  Archive	
  	
  
–  Main	
  use	
  case	
  =	
  Archive	
  Splunk	
  indexers	
  to	
  Hadoop	
  
"   Splunk	
  HadoopOps:	
  
–  Main	
  use	
  case	
  =	
  Monitor	
  Hadoop	
  
41	
  
Integrated	
  Analy=cs	
  Pla•orm	
  
Full-­‐featured,	
  
Integrated	
  
Product	
  
Insights	
  for	
  
Everyone	
  
Works	
  with	
  
What	
  You	
  
Have	
  Today	
  
Explore	
   Visualize	
   Dashboard
s	
  
Share	
  Analyze	
  
Hadoop	
  Clusters	
   NoSQL,	
  EMR,	
  S3	
  Buckets	
  
Hadoop	
  Client	
  Libraries	
  
for	
  Diverse	
  Data	
  Stores	
  
Hunk	
  –	
  Unique	
  	
  
42	
  
1.  Run	
  NaQvely	
  in	
  Hadoop:	
  
–  Use	
  Hadoop	
  MapReduce	
  	
  
2.  Mixed	
  Mode:	
  	
  
–  Allows	
  for	
  data	
  Preview	
  
3.  Auto	
  deploy	
  SplunkD	
  to	
  DataNodes:	
  
–  On	
  the	
  fly	
  Indexing	
  
4.  Access	
  Control:	
  
–  Allows	
  for	
  many	
  users	
  /	
  many	
  Hadoop	
  directories	
  /	
  support	
  Kerberos	
  	
  	
  
5.  Schema	
  On	
  the	
  Fly	
  
Mixed-­‐mode	
  Search	
  
43	
  
Time	
  
Hadoop	
  MR	
  /	
  
Splunk	
  Index	
  
Splunk	
  Stream	
  
Switch	
  over	
  
=me	
  	
  
preview	
  
preview	
  
•  Data	
  Preview	
  	
  
•  Allows	
  users	
  to	
  search	
  interac=vely	
  by	
  pausing	
  and	
  
refining	
  queries	
  
44	
  
Role-­‐based	
  Security	
  for	
  Shared	
  Clusters	
  
Pass-­‐through	
  
Authen=ca=on	
  
•  Provide	
  role-­‐based	
  security	
  
for	
  Hadoop	
  clusters	
  
•  Access	
  Hadoop	
  resources	
  
under	
  security	
  and	
  
compliance	
  
•  Integrates	
  with	
  Kerberos	
  
for	
  Hadoop	
  security	
  
Business	
  
Analyst	
  
MarkeQng	
  
Analyst	
  
Sys	
  
Admin	
  
Business	
  	
  
Analyst	
  	
  
Queue:	
  	
  
Biz	
  AnalyQcs	
  
MarkeQng	
  
Analyst	
  
Queue:	
  
MarkeQng	
  
Sys	
  	
  
Admin2	
  
Queue:	
  	
  
Prod	
  
Hadoop	
  as	
  a	
  Self	
  Service	
  
45	
  
Copyright	
  ©	
  2013	
  Splunk,	
  Inc.	
  
Thank	
  you	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Jeff	
  Wiggins	
  
Systems	
  Engineer	
  Manager,	
  	
  
Emerging	
  Technologies	
  @	
  EMC	
  
Splunk…so	
  Big	
  and	
  Flashy	
  
Building	
  Massive	
  and	
  Efficient	
  Indexer	
  
Storage	
  Environments	
  for	
  Splunk	
  
Architecture	
  MaEers…	
  
Scale-up Scale-Out
SPLUNK	
  STORAGE	
  REQUIREMENTS	
  
•  High-­‐Performance	
  Storage	
  	
  	
  	
  	
  	
  	
  	
  
–  Rare	
  &	
  Sparse	
  Searches	
  
•  High-­‐Capacity	
  Storage	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
–  Long-­‐Term	
  Reten=on	
  
•  Scale-­‐Out	
  Infrastructure	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
–  	
  Indexer	
  &	
  Search	
  Heads	
  
•  De-­‐dupe	
  &	
  Compression	
  	
  	
  
–  Clustered	
  Indexer	
  Deployments	
  
•  Backup	
  &	
  Security	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
–  Data	
  Protec=on	
  &	
  Compliance	
  
ENTERPRISE	
  PERFORMANCE	
  AND	
  DATA	
  SERVICES	
  
Indexers	
  
Search	
  Heads	
  
Capacity	
  Triggered	
  
HOT	
  
WARM	
  
COLD	
  
DAS	
  PRESENTS	
  CHALLENGES	
  
SPLUNK DAS ENVIRONMENT
1
Dedicated Storage Infrastructure
•  Silo that only runs Splunk
2
Compromised Availability
•  SSDs & servers fail
•  Index rebuilds can take hours to days
3
Lack of Enterprise Data Protection
•  No Snapshots or Compliance
•  DR limited to Multisite Clustering
4
Poor Storage Efficiency
•  Multiple copies of data
•  Multisite Clustering Increases Overhead
5
Non-Optimized Growth
•  Fixed compute to storage ratio
•  Servers must maintain storage symmetry
6
Management complexity
•  Multiple management points
1x
2x
3x
2x
3x
1x
WHY	
  EMC	
  FOR	
  SPLUNK	
  
OPTIMIZED	
  INFRASTRUCTURE	
  FOR	
  BIG	
  &	
  FAST	
  DATA	
  
	
  
	
  
OpQmized	
  Shared	
  
Storage	
  &	
  Tiering	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Hot & Warm
Data Deployed
On XtremIO or
ScaleIO
Cold & Frozen
Data Deployed
On Isilon
	
  
Powerful	
  Data	
  Services	
  	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Encyption &
Security
Index File
Compression
Deduplication Of
Clustered Indexes
Snapshots For
Backups
Cost-­‐EffecQve	
  &	
  Flexible	
  
Scale-­‐Out	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Scale-Out Capacity &
Compute Independently Or
As Converged Platform
Why	
  Flash?!?	
  
Economic	
  Influences	
  
	
  
ü  Consumer	
  Demand	
  
ü  Data	
  Services	
  Reducing	
  
Impact	
  of	
  Applica=on	
  
Data	
  Copies	
  
ü  Flash	
  technology	
  has	
  
improved	
  at	
  a	
  faster	
  rate	
  
than	
  Moore’s	
  Law	
  
Intelligent	
  Scale-­‐out	
  Flash	
  
HDD	
  
AGILE
WRITEABLE
SNAPSHOTS
INLINE
DATA AT REST
ENCRYPTION
XTREMIO DATA
PROTECTION
INLINE
DEDUPLICATION
INLINE
COMPRESSION
ALWAYS-ON
THIN
PROVISIONING
XTREMIO	
  DATA	
  SERVICES	
  
ALWAYS-­‐ON,	
  INLINE,	
  ZERO	
  PENALTY,	
  FREE	
  
	
  
 
Data	
  Services	
  For	
  Hot	
  &	
  
Warm	
  Data	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Self-Encrypting
Flash Drives
Index File
Compression
Dedupe Clustered
Index Copies
In-Memory Data
Copy Services
EMC	
  XTREMIO	
  &	
  SPLUNK	
  
ALL-­‐FLASH	
  INFRASTRUCTURE	
  FOR	
  HOT	
  &	
  WARM	
  DATA	
  
Scale-Out Flash For
I/O-Bound Data
>1M IOPS & <1ms Latencies
High-Speed Search
Accelerate SuperSparse
& Rare Searches
Indexers	
  
Search	
  Heads	
  
EMC	
  SCALEIO	
  &	
  SPLUNK	
  
CONVERGED	
  ARCHITECTURE	
  FOR	
  HOT	
  &	
  WARM	
  DATA	
  
Indexers	
  
Search	
  Heads	
  
Servers	
  
Network	
  
Storage	
  
Converged	
  Splunk	
  
Architecture	
  
Leveraging	
  Exis=ng	
  Hardware	
  
Investments	
  
5K	
  IOPS	
  
1	
  TB	
  
5K	
  IOPS	
  
1	
  TB	
  
5K	
  IOPS	
  
1	
  TB	
  
5K	
  IOPS	
  
1	
  TB	
  
5K	
  IOPS	
  
1	
  TB	
  
Shared	
  Capacity	
  &	
  
Performance	
  
Remove	
  Silos	
  &	
  Increase	
  ROI	
  On	
  
DAS	
  Capacity	
  &	
  No	
  Single	
  Point	
  
Of	
  Failure	
  
25K	
  IOPS	
  &	
  5TB	
  
OneFS	
  
EMC	
  Isilon	
  –	
  Deep	
  and	
  WIDE	
  Storage	
  
Single	
  Volume/	
  	
  
File	
  System	
  
Policy	
  based	
  
Tiering	
  
Simplicity	
  &	
  
Ease	
  of	
  Use	
  
Linear	
  
Scalability	
  
MulQ-­‐protocol	
  
support	
  
High	
  
Performance	
  
Unmatched	
  
Efficiency	
  
Easy	
  
Growth	
  
Consolidate,	
  Protect	
  &	
  
Secure	
  Cold	
  Data	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
SmartLock Protects
Cold & Frozen Data
SmartDedupe For
Clustered Indexes
Snapshots IQ
For Backups
EMC	
  ISILON	
  &	
  SPLUNK	
  
LOW-­‐COST	
  &	
  SECURE	
  SCALE-­‐OUT	
  FOR	
  COLD	
  DATA	
  
	
  
High-Speed Ingest
& Long-Term Retention With
Native HDFS Integration
Indexers	
  
Search	
  Heads	
  
Scale-Out Capacity
Up To 50PB Of Highly
Available Capacity
Self-Encrypting
Drives
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 58	
  
For more information:
§  Read more about Scalar’s infrastructure practice model:
§  https://www.scalar.ca/en/what-we-do/#/services/pillar/infrastructure-en
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 59	
  
Connect with us!
§  @scalardecisions
§  Scalar Decisions
§  Facebook.com/
ScalarDecisions

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.Mindtree Ltd.
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree Ltd.
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Cloud computing
Cloud computingCloud computing
Cloud computingjhoejoe
 

Was ist angesagt? (20)

Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Andere mochten auch

Terabyte-scale image similarity search: experience and best practice
Terabyte-scale image similarity search: experience and best practiceTerabyte-scale image similarity search: experience and best practice
Terabyte-scale image similarity search: experience and best practiceDenis Shestakov
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar Decisions
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsSpredfast
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overviewpatmisasi
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Thomas Wendt
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
4000 sf downtown dt
4000 sf downtown   dt4000 sf downtown   dt
4000 sf downtown dtChris Fyvie
 
1500 to 3000 sf proximity mtcc
1500 to 3000 sf   proximity mtcc1500 to 3000 sf   proximity mtcc
1500 to 3000 sf proximity mtccChris Fyvie
 

Andere mochten auch (20)

Terabyte-scale image similarity search: experience and best practice
Terabyte-scale image similarity search: experience and best practiceTerabyte-scale image similarity search: experience and best practice
Terabyte-scale image similarity search: experience and best practice
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
4000 sf downtown dt
4000 sf downtown   dt4000 sf downtown   dt
4000 sf downtown dt
 
1500 to 3000 sf proximity mtcc
1500 to 3000 sf   proximity mtcc1500 to 3000 sf   proximity mtcc
1500 to 3000 sf proximity mtcc
 

Ähnlich wie Optimize IT Infrastructure

Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionGeorg Knon
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunk
 
Splunk live london_grs
Splunk live london_grsSplunk live london_grs
Splunk live london_grsjenny_splunk
 
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud   saa s plattform für operational intelligenceWebinar splunk cloud   saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligenceGeorg Knon
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAmazon Web Services
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunk
 
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewSplunk
 
Big Data Session 1.pptx
Big Data Session 1.pptxBig Data Session 1.pptx
Big Data Session 1.pptxElsonPaul2
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunk
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Splunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics WebinarBill Wong
 
Splunk introduction
Splunk introductionSplunk introduction
Splunk introductionTruong Cuong
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Matt Stubbs
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 

Ähnlich wie Optimize IT Infrastructure (20)

Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT Operations
 
Splunk live london_grs
Splunk live london_grsSplunk live london_grs
Splunk live london_grs
 
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud   saa s plattform für operational intelligenceWebinar splunk cloud   saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligence
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - Splunk
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - Overview
 
Big Data Session 1.pptx
Big Data Session 1.pptxBig Data Session 1.pptx
Big Data Session 1.pptx
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics Webinar
 
Splunk introduction
Splunk introductionSplunk introduction
Splunk introduction
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 

Mehr von Scalar Decisions

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de ScalarScalar Decisions
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study SummaryScalar Decisions
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Scalar Decisions
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_revScalar Decisions
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introductionScalar Decisions
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Decisions
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationScalar Decisions
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.Scalar Decisions
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreScalar Decisions
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Scalar Decisions
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudyScalar Decisions
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyScalar Decisions
 

Mehr von Scalar Decisions (20)

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de Scalar
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_rev
 
Cloudforms Workshop
Cloudforms WorkshopCloudforms Workshop
Cloudforms Workshop
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
 
XtremIO
XtremIOXtremIO
XtremIO
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of Virtualization
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case Study
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case Study
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Optimize IT Infrastructure

  • 1. October 15, 2015 Optimize your IT Infrastructure with Scalar, EMC and Splunk
  • 2. Scalar leads Canadian Business to the Next Generation of IT through Innovation, Expertise & Service
  • 3. 3 DAVID WIEDASECK SR. Partner Sales Engineer dw@splunk.com JEFFREY WIGGINS ETD SE Manager jeffrey.wiggins@emc.com MICHAEL TRAVES Solutions Architect michael.traves@scalar.ca
  • 4. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 4 Scalar Client Solutions Security Context-Based Enterprise Security Infrastructure Integration of Emerging Technologies Cloud Hybrid Cloud Solutions
  • 5. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 5 Splunk Analytics – Use Cases Operational Intelligence §  IT Operations: Utilization, Capacity Growth §  Security: Fraud Detection, Real-time Detection of Threats, Forensics §  Internet of Things (IoT): Sensor Data, Machine-to-Machine, Machine-Human Interactions
  • 6. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 6 Consulting – Solution Design §  Business Drivers §  Alignment with IT §  Stakeholders and Big Data Teams §  (Data Scientists, Business Analysts, Marketing, IT, CxO, Dir.) §  Sizing §  Ingest Performance and Scalability, Search & Index §  Infrastructure – Scale Out §  Compute (Virtual, Physical) §  Network (1/10/40GbE) §  Storage (Hot/Warm and Cold/Frozen Tiers) §  Data Security and Protection (Distributed or Consolidated)
  • 7. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 7 Consulting – Deployment §  Build §  Pilot and Pre-production §  Proof of Value §  Integration with Big Data and Data Lake Initiatives §  Validate §  Performance and Scalability §  Availability §  Customize §  Dashboards §  Reporting and Alerting
  • 8. 8
  • 9. We want to work with YOU 9
  • 10. But why should you work with US? 10
  • 11. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 11 Top Tier Technical Talent §  Engineers average 15 years of experience §  World-class experts from some of the leading organizations in the industry §  Dedicated PMO, finance, sales and operations teams
  • 12. Copyright  ©  2013  Splunk,  Inc.   Splunk  Big  Data  Analy=cs  
  • 13. Machine  Data  OR  Big  Data?  
  • 14. AND VALUABLE SPLUNK - MAKE MACHINE DATA ACCESSIBLE, USABLE TO EVERYONE What  is  Machine  Data    hEps://youtu.be/3YEE3RfXVVA  
  • 15. COLLECT  DATA   FROM  ANYWHERE   SEARCH   AND  ANALYZE   EVERYTHING   GAIN  REAL-­‐TIME   DATA   INTELLIGENCE   The  Power  of  Splunk   15  
  • 16. 16   Turning  Machine  Data  Into  Business  Value   Index  Untapped  Data:  Any  Source,  Type,  Volume   Online   Services   Web   Services   Servers   Security   GPS   Loca=on   Storage   Desktops   Networks   Packaged   Applica=ons   Custom   Applica=ons  Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   RFID   On-­‐   Premises   Private     Cloud   Public     Cloud    Ask  Any  QuesQon   ApplicaQon  Delivery   Security,  Compliance   and  Fraud   IT  OperaQons   Business  AnalyQcs   Industrial  Data  and   the  Internet  of  Things  
  • 17. What  Does  Machine  Data  Look  Like?   Sources   Order  Processing   TwiTer   Care  IVR   Middleware     Error   17  
  • 18. Machine  Data  Contains  CriQcal  Insights   Customer  ID   Order  ID   Customer’s  Tweet     Time  Wai=ng  On  Hold   TwiEer  ID   Product  ID   Company’s  TwiEer  ID   Customer  ID  Order  ID   Customer  ID   Sources   Order  Processing   TwiTer   Care  IVR   Middleware     Error   18  
  • 19. Machine  Data  Contains  CriQcal  Insights   Order  ID   Customer’s  Tweet     Time  Wai=ng  On  Hold   Product  ID   Company’s  TwiEer  ID   Order  ID   Customer  ID   TwiEer  ID   Customer  ID   Customer  ID   Sources   Order  Processing   TwiTer   Care  IVR   Middleware     Error   19  
  • 20. SPLUNK TODAY   20   Mainframe Data VMware Platform for Machine Data Exchange PCI Security DB Connect MobileForwarders Syslog, TCP, Other Sensors, Control Systems 600+ Ecosystem of Apps Stream
  • 22. IT  Opera=ons   API   SDKs   UI   Server,  Storage,   Network   Server   Virtualiza=on   Opera=ng   Systems   Custom     Applica=ons   Business     Applica=ons   Cloud   Services   App  Performance   Monitoring  Ticke=ng/Other   Web  Intelligence   Mobile   Applica=ons  
  • 23. Servers   Storage   Desktops  Email   Web   Transac=on   Records   Network   Flows   DHCP/  DNS   Hypervisor   Custom   Apps   Physical   Access   Badges   Threat   Intelligence   Mobile   CMBD   23   Security   Intrusion     Detec=on   Firewall   Data  Loss   Preven=on   An=-­‐ Malware   Vulnerability   Scans   Authen=ca=on   TradiQonal  SIEM  
  • 24. Business  Intelligence   Soda  Company  Use  Case   "   Soda  Company  extracts  data  from  vending  machines,  social  media,  and  loyalty   programs   –  Distribu=on   –  New  product  development   –  Insight  into  consumer  buying  paEerns   "   "without  data  you're  just  a  person  with  an  opinion".     "   Customers  face  challenges  with  “data  cartels”  within  their  organiza=on   "   Need  to  “free  the  data  lake”    from  ridgid  structured  data  warehouse   applica=ons   24  
  • 25. Analy=cs     "   What  we  are  looking  for  or  Why  will  depend  on  Who  we  ask     –  What  are  the  normal  characteris=cs  for  a  dog?   ê  Dog  Show:  height,  weight,  coat,  gait,  posture   ê  Veterinarian:  Immuniza=ons,  history  of  illness,  injuries,  diet   ê  Parent:  Suitability  for  children,  temperament,  allergies     ê  Data  Scien=st:    Mean  +/-­‐  Standard  devia=on   25   -­‐mean  +  std.  dev   -­‐Mean   -­‐Mean  –  std.dev  
  • 26. Internet  of  Things   26   CorrelaQon  Criteria   "   MAC  address  same   "   Content  in  Search  Results   "   Purchase  =me   Search  Results   (ApplicaQon  Logs)   Device  ID   (MAC  Address)   Time  of  Search   Content   Purchased   (IDA  #)   Device   (MAC  Address)   Time  of  Search   Amount  of   Purchase  ($)   Billing  (Structured  Data)   Search  (Machine  Data)   Business  Value   "   Revenues  driven  by  Search   "   Improving  local  content  mix     "   BeEer  search  results   "   Tailor  content  promo=on   >  
  • 27. How  Splunk  Stores   Data  
  • 28. How  Splunk  Stores  Data   "   As  Splunk  indexes  your  data  it  creates  a  bunch  of  files   –  Raw  data  in  compressed  for  (rawdata)   –  Indexes  that  point  to  the  raw  data,  plus  some  meta  data  files  (Index  Files)   "   The  index  files  reside  in  directories  known  as  a  “bucket”   "   A  bucket  Moves  through  Several  Stages  as  it  ages   –  Hot  &  Warm    $SPLUNK_HOME/var/lib/splunk/defaultdb/db/*     –  Cold    $SPLUNK_HOME/var/lib/splunk/defaultdb/colddb/   –  Frozen    Archive  (Can  sEll  be  searched  and  thawed)     "   File  name  Format    db_<newest_Eme>_<oldest_Eme>_<localid>_<guid>       28  
  • 29. Splunk  Index  Buckets   29   Bucket     Stage   DescripQon   Searchable?   Hot   Newly  Indexed  Data,  One  or   more  hot  buckets  per  Index   Yes   Warm   Data  rolled  from  hot.  There   are  many  warm  buckets   Yes   Cold   Data  rolled  from  cold.  There   are  many  cold  buckets   Yes   Frozen   Data  rolled  from  cold.  Splunk   deletes  frozen  data  by   default,  but  it  can  also  be   archived.  Archived  data  can   later  be  thawed   Can  be  
  • 30. Storage  Considera=ons   "   Storage  requirements  !=  Index  Volume  (GB/day)   –  Search  profile  and  number  of  searches  is  just  as  important   –  Also  must  consider  data  reten=on   " Splunk  u=lizes  I/O  to  perform  both  Searching  AND  Indexing   –  Load  =  Search  Volume  +  Indexing  Volume   –  Index  load  is  write  intensive   –  Search  load  is  read  intensive  against  the  data  searched  (current  vs  recent  vs  old)   –  SSDs  generally  provide  higher  performance  over  HDDs,  but  at  a  cost   30  
  • 31. Storage  Considera=ons   "   What  is  the  use-­‐case?   –  IT  Opera=ons  use-­‐cases  typically  search  against  recent  data  (e.g.  –  0  to  14  days)   –  Security  and  Analy=cs  use-­‐cases  typically  search  all  data  (e.g.  –  days  to  months   to  years)   "   What  is  the  typical  =me  span  of  the  data  searched?   –  Most  ad-­‐hoc  searches  are  against  current  or  recent  data     –  Analy=cs  may  span  a  very  large  =me  frame   –  Security  forensics  typically  search  all  data   –  Reports  or  Aler=ng  Searches  might  be  over  the  past  day  or  week   31  
  • 32. Splunk  Index  Replica=on  –  High  Availability   32   2   Master  asks  the  redundant     peer  to  act  as  primary   3   Peers  copies  the  search   files  /  index  files  /  raw  data   2   3   1   Master  auto-­‐detects  that  a   peer  is  down   1   •  Default  is  3X  Replica=on                                
  • 33. Scalable  Cluster  Base  Architecture   Send  data  from  1000s  of  servers  using  combina=on  of  Splunk  Forwarders,  syslog,  WMI,  message  queues,  or  other  remote  protocols   Auto  load-­‐balanced  forwarding  to  as  many  Splunk  Indexers  as  you  need  to  index  terabytes/day   Offload  search  load  to  Splunk  Search  Heads     33   " Automa=c  load  balancing  linearly     scales  indexing   " Distributed  search  and  MapReduce   linearly  scales  search  and  repor=ng  
  • 34. Splunk  Real-­‐Time  Analy=cs     Data   Parsing  Queue   Parsing  Pipeline   •  Source,  event  typing   •  Character  set   normaliza=on   •  Line  breaking   •  Timestamp  iden=fica=on   •  Regex  transforms   Indexing   Pipeline   Real-­‐=me   Buffer   Raw  data   Index  Files   Real-­‐=me   Search   Process   Monitor  Input   Index  Queue   TCP/UDP  Input   Scripted  Input   Splunk   Index   34  
  • 35. Distributed  File  System   (semi-­‐structured)   Key/Value,  Columnar  or     Other  (semi-­‐structured)   RelaQonal  Database    (highly  structured)   MapReduce   Cassandra   Accumulo   MongoDB   Splunk  -­‐  Big  Data  Technologies   SQL  &   MapReduce   NoSQL   Temporal,  Unstructured   Heterogeneous   Hadoop   RDBMS   HDFS  Storage  +     MapReduce   Real-­‐Time  Indexing   35   Oracle   MySQL   IBM  DB2   Teradata  
  • 36. Copyright  ©  2013  Splunk,  Inc.   Hunk  -­‐  Hadoop  
  • 37. Image  Search  with  Hunk   hEp://blogs.splunk.com/2013/10/18/images-­‐search-­‐with-­‐splunk-­‐and-­‐hunk/   37   •  Image  search  on  HDFS  using  Splunk   •  Select  images  based  on  ranges  of  color   •  3  parts     •  The  Preprocessor  using  Hadoop  Record   reader  in  Java   •  Splunk  Search   •  Splunk  UI   •  search  index=images  |  eval  score=color1+color2+ …+colorN  |  sort  -­‐score  by  image    
  • 38. Why  Splunk  &  Hunk   •  Schema  on  the  Fly  –  fast,  flexible,  interac=ve  analy=cs  experience.       •  Interac=ve  Search  –  you  don’t  to  know  anything  about  the  data  in  advance,   Hunk  automa=cally  adds  structure  and  iden=fies  fields  of  interest,  keywords,   top  values,  and  paEerns  over  =me   •  Results  Preview  –  query  results  are  streamed  back  in  real  =me.  Pause  and   refine  queries  without  having  to  wait  for  jobs  to  finish.   •  Drag  and  Drop  Analy=cs  –  quickly  create  charts,  visuals  ,  and  dashboards  using   pivot   •  Rich  App  ecosystem  for  popular  applica=ons  and  data  types   •  Hunk  –  Search  and  Report  on  na=ve  HDFS  without  inges=ng  the  data   38  
  • 39. Challenges  With  Open  Source  Analy=cs     •  Open  source  sozware  such  as  Hadoop  and  Cassandra  require  significant   services  effort  —  as  much  as  20X  higher  personnel  costs  rela=ve  to  sozware   purchases.     •  Challenges  Ge|ng  Value  from  Data  in  Hadoop   •  Easy  storage  but  hard  analy=cs:  difficult  for  non-­‐specialists  to  explore,  analyze  and   visualize  data   •  Complex  technology:  wide  range  of  open  source  projects   •  Hard-­‐to-­‐staff  skills:  must  write  MapReduce  jobs  or  pre-­‐define  schemas  for  Hive   •  Hadoop  was  designed  to  be  a  batch  job  processing  system,  ie  you  start  a  job   and  see  results  in  a  range  from  tens  of  minutes  to  days.   39   Gartner,  “Big  Data  Drives  Rapid  Changes  in  Infrastructure  and     US$232  Billion  in  IT  Spending  Through  2016”,  October  17,  2012  
  • 40. Splunk  and  Hadoop   40   "   Hunk:   –  Main  use  case  =  Analyze  Hadoop  Data  using  Hadoop  Processing   "    Splunk  Hadoop  Connect:     –  Main  use  case  =  Real-­‐=me  export  data  from  Splunk  to  Hadoop   "   Hunk  Archive     –  Main  use  case  =  Archive  Splunk  indexers  to  Hadoop   "   Splunk  HadoopOps:   –  Main  use  case  =  Monitor  Hadoop  
  • 41. 41   Integrated  Analy=cs  Pla•orm   Full-­‐featured,   Integrated   Product   Insights  for   Everyone   Works  with   What  You   Have  Today   Explore   Visualize   Dashboard s   Share  Analyze   Hadoop  Clusters   NoSQL,  EMR,  S3  Buckets   Hadoop  Client  Libraries   for  Diverse  Data  Stores  
  • 42. Hunk  –  Unique     42   1.  Run  NaQvely  in  Hadoop:   –  Use  Hadoop  MapReduce     2.  Mixed  Mode:     –  Allows  for  data  Preview   3.  Auto  deploy  SplunkD  to  DataNodes:   –  On  the  fly  Indexing   4.  Access  Control:   –  Allows  for  many  users  /  many  Hadoop  directories  /  support  Kerberos       5.  Schema  On  the  Fly  
  • 43. Mixed-­‐mode  Search   43   Time   Hadoop  MR  /   Splunk  Index   Splunk  Stream   Switch  over   =me     preview   preview   •  Data  Preview     •  Allows  users  to  search  interac=vely  by  pausing  and   refining  queries  
  • 44. 44   Role-­‐based  Security  for  Shared  Clusters   Pass-­‐through   Authen=ca=on   •  Provide  role-­‐based  security   for  Hadoop  clusters   •  Access  Hadoop  resources   under  security  and   compliance   •  Integrates  with  Kerberos   for  Hadoop  security   Business   Analyst   MarkeQng   Analyst   Sys   Admin   Business     Analyst     Queue:     Biz  AnalyQcs   MarkeQng   Analyst   Queue:   MarkeQng   Sys     Admin2   Queue:     Prod  
  • 45. Hadoop  as  a  Self  Service   45  
  • 46. Copyright  ©  2013  Splunk,  Inc.   Thank  you  
  • 47. Copyright  ©  2015  Splunk  Inc.   Jeff  Wiggins   Systems  Engineer  Manager,     Emerging  Technologies  @  EMC   Splunk…so  Big  and  Flashy   Building  Massive  and  Efficient  Indexer   Storage  Environments  for  Splunk  
  • 49. SPLUNK  STORAGE  REQUIREMENTS   •  High-­‐Performance  Storage                 –  Rare  &  Sparse  Searches   •  High-­‐Capacity  Storage                               –  Long-­‐Term  Reten=on   •  Scale-­‐Out  Infrastructure                     –   Indexer  &  Search  Heads   •  De-­‐dupe  &  Compression       –  Clustered  Indexer  Deployments   •  Backup  &  Security                                         –  Data  Protec=on  &  Compliance   ENTERPRISE  PERFORMANCE  AND  DATA  SERVICES   Indexers   Search  Heads   Capacity  Triggered   HOT   WARM   COLD  
  • 50. DAS  PRESENTS  CHALLENGES   SPLUNK DAS ENVIRONMENT 1 Dedicated Storage Infrastructure •  Silo that only runs Splunk 2 Compromised Availability •  SSDs & servers fail •  Index rebuilds can take hours to days 3 Lack of Enterprise Data Protection •  No Snapshots or Compliance •  DR limited to Multisite Clustering 4 Poor Storage Efficiency •  Multiple copies of data •  Multisite Clustering Increases Overhead 5 Non-Optimized Growth •  Fixed compute to storage ratio •  Servers must maintain storage symmetry 6 Management complexity •  Multiple management points 1x 2x 3x 2x 3x 1x
  • 51. WHY  EMC  FOR  SPLUNK   OPTIMIZED  INFRASTRUCTURE  FOR  BIG  &  FAST  DATA       OpQmized  Shared   Storage  &  Tiering                       Hot & Warm Data Deployed On XtremIO or ScaleIO Cold & Frozen Data Deployed On Isilon   Powerful  Data  Services                         Encyption & Security Index File Compression Deduplication Of Clustered Indexes Snapshots For Backups Cost-­‐EffecQve  &  Flexible   Scale-­‐Out                   Scale-Out Capacity & Compute Independently Or As Converged Platform
  • 52. Why  Flash?!?   Economic  Influences     ü  Consumer  Demand   ü  Data  Services  Reducing   Impact  of  Applica=on   Data  Copies   ü  Flash  technology  has   improved  at  a  faster  rate   than  Moore’s  Law   Intelligent  Scale-­‐out  Flash   HDD  
  • 53. AGILE WRITEABLE SNAPSHOTS INLINE DATA AT REST ENCRYPTION XTREMIO DATA PROTECTION INLINE DEDUPLICATION INLINE COMPRESSION ALWAYS-ON THIN PROVISIONING XTREMIO  DATA  SERVICES   ALWAYS-­‐ON,  INLINE,  ZERO  PENALTY,  FREE    
  • 54.   Data  Services  For  Hot  &   Warm  Data                       Self-Encrypting Flash Drives Index File Compression Dedupe Clustered Index Copies In-Memory Data Copy Services EMC  XTREMIO  &  SPLUNK   ALL-­‐FLASH  INFRASTRUCTURE  FOR  HOT  &  WARM  DATA   Scale-Out Flash For I/O-Bound Data >1M IOPS & <1ms Latencies High-Speed Search Accelerate SuperSparse & Rare Searches Indexers   Search  Heads  
  • 55. EMC  SCALEIO  &  SPLUNK   CONVERGED  ARCHITECTURE  FOR  HOT  &  WARM  DATA   Indexers   Search  Heads   Servers   Network   Storage   Converged  Splunk   Architecture   Leveraging  Exis=ng  Hardware   Investments   5K  IOPS   1  TB   5K  IOPS   1  TB   5K  IOPS   1  TB   5K  IOPS   1  TB   5K  IOPS   1  TB   Shared  Capacity  &   Performance   Remove  Silos  &  Increase  ROI  On   DAS  Capacity  &  No  Single  Point   Of  Failure   25K  IOPS  &  5TB  
  • 56. OneFS   EMC  Isilon  –  Deep  and  WIDE  Storage   Single  Volume/     File  System   Policy  based   Tiering   Simplicity  &   Ease  of  Use   Linear   Scalability   MulQ-­‐protocol   support   High   Performance   Unmatched   Efficiency   Easy   Growth  
  • 57. Consolidate,  Protect  &   Secure  Cold  Data                     SmartLock Protects Cold & Frozen Data SmartDedupe For Clustered Indexes Snapshots IQ For Backups EMC  ISILON  &  SPLUNK   LOW-­‐COST  &  SECURE  SCALE-­‐OUT  FOR  COLD  DATA     High-Speed Ingest & Long-Term Retention With Native HDFS Integration Indexers   Search  Heads   Scale-Out Capacity Up To 50PB Of Highly Available Capacity Self-Encrypting Drives
  • 58. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 58   For more information: §  Read more about Scalar’s infrastructure practice model: §  https://www.scalar.ca/en/what-we-do/#/services/pillar/infrastructure-en
  • 59. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 59   Connect with us! §  @scalardecisions §  Scalar Decisions §  Facebook.com/ ScalarDecisions