Reducing Risk During a Data Center Migration

lanir-shachamAlthough data center migration projects are multifaceted—from construction to cooling to provisioning software and storage—the primary objective is to facilitate the delivery of IT services to end users in a cost-effective manner.

If applications are not performing up to par after a data center migration, it doesn’t really matter how good the cooling, power and servers are running. That is why it is imperative to invest in the right monitoring tools as part of the data center migration. The Importance of Benchmarking before a Data Center Migration

The Importance of Benchmarking before a Data Center Migration

Consider a scenario where a business-critical application is moved from an old data center to a new one as part of a data center migration. Users start complaining that the application is not running the same as it did before the data center migration. As the CIO or data center director, you may feel that this is impossible. After all, the new data center has more powerful servers, more capacity and more network bandwidth!
Tip #1: In order to avoid this scenario, it is important to benchmark application performance from the end user perspective both before and after the data center migration.

Consider a scenario where a business-critical application is moved from an old data center to a new one as part of a data center migration. Users start complaining that the application is not running the same as it did before the data center migration. As the CIO or data center director, you may feel that this is impossible. After all, the new data center has more powerful servers, more capacity and more network bandwidth!

Tip #1: In order to avoid this scenario, it is important to benchmark application performance from the end user perspective both before and after the data center migration.

Consider another scenario: one of the applications that needs to move as part of the data center migration has a large number of dependencies, increasing its complexity. It calls external web services, the mainframe, and third-party applications. However, how can you be certain what all of those dependencies are in order to ensure they are available in the new data center after the migration?

All dependencies of the application must be automatically detected prior to the data center migration in order to rule out human error.

Mitigating risk after a Data Center Migration

Once the new location has been established and wired, the servers have been put into place, and all software has been installed, you are ready to start funneling traffic to your new masterpiece. What can you do if—despite all of your meticulous planning—traffic starts hitting your new application and performance is unacceptable?

Millions of dollars have been invested in the data center migration, project milestones have been met, the applications are up, but if users are not happy with performance that is all that matters.

Tip #2: Make sure that you don’t make any assumptions about the state of the data center after the data center migration. The only way to know for certain there are no problems once the applications have been moved is to automatically detect every individual transaction from each and every user and follow its path throughout the data center. By accounting for all transactions through all hops, you will always know when or if service is disrupted. Most importantly, you will know exactly what the problem is so you can fix it instead of rolling back to the old data center.

Data Center Migration and SharePath

Data center relocations are projects that bring significant risk to the business. This risk can be mitigated with a solid plan that focuses on understanding the current business transaction workload and data center configuration, as well as the future data center configuration and associated business transaction workloads.

  • SharePath by Correlsense mitigates the technical and financial risks associated with the complex projects like data center migrations.
  • SharePath quickly identifies the behavior of business transactions and their subordinate technical transactions.
    This transparency greatly improves the relationship between IT staff and business personnel challenged with the implementation of high risk, multimillion dollar projects. Click here to watch a video.