IT Vortex - Managed IT Services

Complexity: Cloud Computing’s Achilles Heel


While there are no easy answers or magical tools to address the complexity issues, some fundamental architectural planning can be done.

Now that cloud computing projects are in their second and third generations, some of the most advanced cloud computing developers and architects, including many of those in the Global 2000, are hitting an unexpected wall. It’s a wall that stops some enterprises dead in their tracks and can often lead to a negative ROI from use of the cloud that could end in disaster for the company. 

So, what’s going wrong?

In a word: Complexity. As enterprises move to private clouds, hybrid clouds, and now multi-cloud, the number of platforms, databases, devices, network, and end points continues to explode. All are different, with different types of operational requirements. Also count in the migrated and net-new cloud-based systems that get added to existing legacy systems, with few being replaced. 

All of this adds up to a tipping point where the growth of cloud computing increases enterprise IT complexity to a point where some enterprises experience zero or negative value from the cloud. The dream of operational cost reduction and increased agility gets replaced by sky-high operational costs and static and complex systems that can’t be changed. 

While there are no easy answers or magical tools to address the complexity issues, there is some fundamental architectural planning that can be done. Couple sound planning with a competent technology stack, and you can avoid cloud complexity, or even fix existing damage complexity may have already caused. 

This article explores a path to solutions that can help minimize the effects of cloud complexity for the modern enterprise. 

Cloud complexity emerging    

The Cloud Complexity Management Survey conducted by Deloitte Consulting LLP discovered that medium-sized businesses (33%) and large enterprises (37%) are believed to be the most vulnerable to the cloud complexity problem. The core message from this survey is that most large enterprises have the perception that they “have more complexity than expected.” Moreover, 47% of those surveyed considered this complexity as the primary risk to ROI.

At issue is the fact that the complexity problem snuck up on most enterprises moving to cloud computing. This is likely a surprise factor for a few common reasons:   

  • The migration to cloud computing was done with decoupled teams, on aggressive sprints, operating independently of each other. This led to the selection of different brands of public and private clouds, different security solutions, different governance solutions, and different management and monitoring technology stacks and approaches.
  • No common command-and-control. There is no significant foresight as to how to define and leverage common services, such as data, storage, and other infrastructure items. 
  • Operations without consideration.Systems are turned over to the CloudOps teams without regard to the effects of increasing complexity.  Budgets and resources are held static, while the workloads increase. 

Strategies

There are a few approaches to deal with cloud complexity, both proactive and reactive. Each has their own set of pluses and minuses. 

The proactive approach is to fix the issues listed above, namely poorly coordinated cloud projects, synergy with cloud solutions, and the ability to leverage common services, such as security and governance. Moreover, any strategy aimed at addressing cloud complexity needs to span traditional on-premises systems and those in the public cloud.

The upside is that you can avoid most of the complexity challenges before they become problems. However, the price of being proactive is to perhaps slow down the processes that are now highly Agile-focused. More importantly, modern enterprises’ IT shops typically don’t want to behave this way.

Reactive approaches mean that organizations respond to complexity issues after the fact. This assumes that cloud will include many decoupled and aggressive migration and net-new development projects, and there will be no close coordination between the projects. The mess that pops out of those projects will need to undergo the normalization of approaches and tooling associated with managing that complexity. 

By fixing complexity issues after the fact, the effort and money spent on normalizing cloud complexity will likely come back 100-fold. The advantage would be not having to deal with enterprises’ IT concerns, and still obtaining the same results.

Cloud complexity management

There are also two additional strategies to address cloud complexity:

First, abstraction. Using an abstraction layer with a least common denominator approach removes you from the complexity of dealing directly with cloud-native tools and interfaces.

This can easily be accomplished by leveraging tools that can remove you from dealing with the underlying native features of the cloud platforms or services. Tools such as cloud management platforms, API management platforms, and cloud services brokers are a few categories to consider.

Second, automation. Automating the use of interfaces can make operations that much easier and thus less complex. Orchestration tools are handy to help solve the complexity problem as well, tools such as Kubernetes, or others that deal with the automation of complex platforms.

However, the most important step in the process is to leverage an approach that will help you define your problem domain a bit better, decompose the domain into sub-domains, and then break those apart into solution patterns. As you can see from this figure on managing cloud complexity, we broke down the problem domain into 9 subdomains that cover the major solution patterns, from data to on-premises systems. Keep in mind that on-premises systems will also be a complexity factor in the use of cloud and should be considered inside of its own domain.

The idea here is to think about the complexity in fewer complex ways, including a list of things that are needed to do so. For instance, data includes abstraction, data hygiene, active metadata management, and data operations. All that must be understood to move to abstraction, automation, or most likely both.

This is a hard problem to solve, no matter what methodologies and technology you toss at the problem. It will be a core challenge for larger enterprises going forward. The message here is to understand that the problem exists or will likely exist and take concrete steps to solve it. 

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on tumblr
Share on whatsapp
Share on email

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

Tech Tips, Cyber Threat Mitigation, Cutting Edge Technology, Cost Savings and More!

 

IT Vortex, LLC is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You will consent to us contacting you for this purpose, by submitting the form.

Fortinet logo

Fortinet is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

microsoft logo

Name of the partner

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

ACTI Logo

Technology Reseller and Distributor, Certified Implementation Expertise with all ACTi products and services. IT Vortex has worked with ACTi for over a decade implementing security camera solutions for a multitude of industries with AI, Facial Recognition, License Plate Recognition, Loitering Detection, Cloud storage, and more.

Amazon_Web_Services_Logo

IT Vortex partners with AWS via VMware for the VMware on AWS offering that allows for cloud services fulfillment via AWS utilizing the same VMware products many companies already enjoy the benefits from.

Barracuda Logo

Barracuda Technology is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Cisco logo

Cisco Technology is offered in our Cloud Hosting Platform via DUO for MFA. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Condusiv Technologies logo

Condusiv Technology is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dell logo

Dell servers are a key component offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dropbox logo

We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

DTEN logo

We use DTEN extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

ingram micro cloud logo

Our distribution preferred partner for our technology offerings.

Apply for this position

Fill out the form below and our hiring team will reach out to you as soon as possible

microsoft logo

Various Microsoft technologies are offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

mitel logo

Our telephone platform of choice. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

NEAT Logo

We use NEAT extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

observe IT Logo

ObserveIT/Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Proofpoint essentials Logo

Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Solarwinds Logo

Solarwinds is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Trend Micro Logo
veeam green logo

Veeam is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

vmware logo

Our Datacenter is built on a VMWare architecture. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

wasabi logo

Wasabi is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

zoom-logo

We use Zoom extensively to meet internally and externally. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Security as a Service (SECaaS) by IT Vortex

Pricing Calculator

Choose a service, answer a few simple questions, and receive an individual quote for our services

User count by type

Fill out the form and we will call you to answer all your questions