Tag Archives: Monitoring

Turbonomic 5.9 adds visibility into YOUR cloud!

As of late I’ve been making it somewhat of a personal goal to try to learn more about cloud – AWS in particular.  I’ve been going through the training over at acloud.guru, messing around with the free tier in AWS, and toying with the possibility of writing my AWS Certified Solutions Architect Associate exam.  Now, one thing that I have learned over the past couple of months is that AWS is a beast – there is a lot of services provided – and gaining visibility into these services, from both a cost and performance aspect seems next to impossible.  Now this post isn’t going to be focused around my struggles, but more so on how Turbonomic (formerly VMTurbo), more specifically the recently announced 5.9 version, can help organizations to bridge that visibility gap and achieve that ultimate goal of achieving maximum performance at a minimum cost.

Turbonomic 5.9 – Making Hybrid Cloud possible.

Although this is a minor release it certainly does come with some major enhancements to the product in terms of cloud integration.  Turbonomic has always done a great job at monitoring our on-premises environments – ensuring that VMs and services are right sized and running in the most cost efficient way, yet ensuring that performance and SLAs have been met.  Their supply-demand analytics engine is next to none when in it comes determining these placements, automatically resolving issues, and providing an instant ROI to organizations datacenters.  That said more and more organizations are now looking to move away from housing their own datacenters and investigating cloud enabled solutions, be it public, private, or a hybrid model – and, in a typical customer fashion – we really want to use the same tools and concepts that we are used to.  Turbonomic 5.9 seems to deliver on this expectation with the addition of a number of cloudy features to the product (summarized below)

  • Cloud Migration Planning – 5.9 gives us the ability to perform very in-depth cost analysis of moving our workloads to the public cloud.  IE. What would it cost me to move workload x to Amazon?  What would the costs be with migrating workload a and b to Azure?  What’s the cost comparison of migrating workload x from this AWS region to this Azure region?  Getting cost estimates from Azure, AWS, and SoftLayer in regards to these questions is very beneficial when performing feasibility studies around cloud adoption and migration.
  • Workload Specific Costing – Once we have our workloads in the cloud, Turbonomic will now track and report cost metrics, in real-time back to the dashboard.
  • Cloud Budgeting – Imagine setting a defined budget for your cloud services and seeing just how that budget is being consumed across the different regions, tags, and workloads defined with in it.  Aside from seeing your real-time budget impacts, Turbonomic will also take into account past costs in order to project future cloud consumption costs based on your growth and performance needs.  Also, if you have some sort of discounted account or agreement with either of the cloud providers, Turbonomic uses your credentials – so they are getting YOUR actual costs – not industry averages!
  • Lower Cloud Costs – This is really what Turbonomic is about IMO – ensuring you a reaching maximum performance at the lowest cost – and now we see this in the cloud as well.  Think about gaining visibility into what it my cost to scale up to a larger instance, or how much you can save by scaling down.  Turbonomic can predict these costs as well as even automatically scale these instances down, or better yet, suspend them during times they aren’t needed.

So yeah – all the benefits of the previous version of Turbonomic is now applicable to cloud – allowing organizations to get that “single pane of glass” cost viewing of both their on-premises workloads next to their AWS, Azure, or SoftLayer workloads as well!  Certainly these aren’t the only enhancements that have been released with 5.9 – we are also blessed with some pretty hefty performance impacts to the analytics engine as well – think 9 minutes to analyze and report on 100,000 VMs – not too shabby.  Also, as highlighted during their TFD presentations recently – the HTML5 interface is currently running in “dual” mode – with the intention of having all functionality fully available by the end of 2017!  But to me, the meat and potatoes of this release revolve around cloud.  Turbonomic answers a lot of the costing questions that come with cloud – and from what they claim, can lower your cloud bill by an average of 30%!  That should enable for a very fast ROI for organizations!  If you want to read more about the new features as I haven’t covered off all of them, definitely check out the Turbonomic “What’s New” page!  Also Vladan Seget has a great round up on his blog as well as Dave Henry on his!  And hey – if you want to check it all out for yourself you can grab yourself a free 30 day full featured trial of Turbomonic here!


Runecast – Proactive performance for your VMware environment! – Part 1 – Configuration

Have you ever opened up the VMware Hardening Guide and checked your environment against every single item listed?  How about combed through the VMware Knowledge Base looking for all KB articles that apply to the exact software builds and hardware you have?  No?  How about taken a list of industry best practices and ensured that you are indeed configured in the best possible way?  Of course we haven’t – that would certainly take a lot of time and most organizations simply don’t have the resources to throw at those types of tasks.  All that said what if I told you that there was a piece of software that could pretty much instantly tell you whether you are or are not compliant in those exact three scenarios?  Interested yet?  I thought you might be…

Enter Runecast

logoBefore writing this review I’d never heard of Runecast, so first, a little bit about the company.  Runecast was founded in 2014 in the quaint ol’ city of London in the UK.  Their goal, to provide pro-active monitoring to our vSphere environments in order to save us time, prevent outages before they  happen, ensure compliance at all times and simply make our environments more secure.  Now there is only four things listed there – but they are four things that Runecast does really, really well.  With that said, I could talk about how much I enjoyed doing this review forever, but it’s best just to jump right in and get monitoring…


runecast-addvcenterAs far as installation goes Runecast come bundled as a virtual appliance, so it’s just a matter of deploying the analyzer into our environment.  To help you get started Runecast offers a 30 day full-featured free trial that you can try out!  Configuration wise we really only have a couple of steps to perform; pointing the Runecast Analyzer at our vCenter Server and configuring our ESXi hosts to forward their logs.  After deployment you should be brought to a screen similar to the one shown to the left.  Simply follow the ‘Settings’ link and enter in your required vCenter Server information into Runecast as shown below.


Remember how we mentioned that configuration is divided into two steps.  The first, connecting to our vCenter environment is now complete.  The second, setting up the forwarding of logs is completely optional and can be completed at any time.  We can still get valuable data from Runecast without having log forwarding set up, however in order to achieve a more holistic view of our environment we will continue to setup log forwarding.

There are many ways to setup our ESXi hosts to send their logs to Runecast.  We can set them up manually, use some a PowerCLI script, or enter the Runecast Analyzer information into our Host Profile.  The Runecast interface has the smarts to configure this for us as well.  This review will follow the steps in order to setup log forwarding from within the Runecast Analyzer UI.

Selecting the “Status” section from the Log Analysis group, and then clicking on the ‘wrench’ icon will allow us to configure one or many of our hosts to send their log files to Runecast.  This process provides the same results as if we were to go and set the syslog advanced setting directly on the hosts configuration. That said, utilizing Runecast for this seems like a much more automated and easier process.   As you can see below, we also have the option to send our VM log files as well which is a good idea if you are looking for complete visibility into your virtualization stack.


As far as configuration goes we are now done!  That’s it!.  2 simple steps and we are ready to start detecting problems within our environment.  The process of going out and collecting data from our vCenter Server is called ‘Analyze’ within Runecast.  Our analysis can be configured to occur via a schedule by navigating to the settings page (gear icon in top right) or can be run on-demand by clicking the ‘Analyze Now’ button from any screen within the application.


How long this process takes greatly depends on the size of your environment.  My test environment, be it simple and small, only took a couple of minutes to gather the data.  I’m sure this time would increase in a 32 host cluster with 1000 or so VMs though.    That said, for the amount of data it gathers and the amount of comparisons going on behind the scenes Runecast does a very efficient job at processing everything.

Navigating back to the ‘Dashboard’ as shown below immediately let’s us start to explore the results of this analysis process.  Almost instantaneously we can see many issues and best practices that can be applied within our environment.  As you can see below I had a number of issues discovered – and I’ve only had Runecast up and running for less than 5 minutes.


Runecast Terminology

Lets take a minute and dig a little into the data that is displayed on the ‘Dashboard’ screen.  Mostly everything that Runecast monitors and does is rolled up here, giving us an at-a-glance view of everything you need to know.  Let’s break down the items that we are seeing here…

Issues – The term “issue” within Runecast basically represents a detected problem in our infrastructure – this can come from any single or combined instance of configuration settings, log file analysis, or software and hardware versions.  Although the source of discovering issues could be from configuration settings or log files, all issues belong to one of three categories within Runecast; Knowledge Base articles, Security Guidelines, or Best Practices, explained below…

KB’s – Runecast actively piles through the vast amounts of VMware Knowledge Base articles and displays to us any that may apply to our environment based on the hardware and software versions and configuration we are running.

Best Practices – All of our inventory objects and configuration items are routinely scanned to determine whether or not they meet any best practices related to VMware.  This allows us to see if we simply Pass or Fail in terms having our environment running in it’s best possible configuration.

Security Compliance – Security Compliance takes all of the items within the official VMware Security Hardening guides and compares that to of the configuration of our infrastructure.  At a glance we are able to see how we stack up against the recommended security practices provided by VMware.

It’s these four items; Issues, KB’s, Best Practices, and Security Compliance that are at the core of the Runecast analytical engine.  Runecast automatically combs through all of these items and determines which ones apply to our environment, then reports back in a slick clean UI, allowing us to see whether we are in compliance or not!  In the next part of our review we will go into each of these items in a lot more detail – explaining how to drill down, resolve, and exclude certain metrics from our dashboards.  For now , I certainly recommend checking out Runecast for yourself – as you saw, it’s a simple install that can be up and running in your environment very quickly.  So, while you wait for part 2 of the review head on over to the Runecast page and grab yourself a free 30 day trial  to start reporting on your environment.  I’m sure you will be surprised at all of the abnormalities and non-compliant configurations you find right off the hop – I know I was!  Stay tuned for part 2.