Upload
gervais-glenn
View
218
Download
1
Tags:
Embed Size (px)
Citation preview
CMDBCMDBCMDBCMDBConfiguration Management
DataBase
Key MessagesKey Messages
Review of developments to date
Long term and short term implementations
Agreement on Configuration Item Ownership
Process Architecture - EDSProcess Architecture - EDS
Raw Alerts/Alarms
Phone, Fax,Web
Tier One
Correlation Engine Network/SNMP Alert Inputs Agent Alarm Inputs Correlate for Root Cause
Shared Data Repository
DependencyData
RootIncident
Create/UpdateIncidents
RetrieveAssets
RetrieveSolutions
Retrieve/UpdatePeople
CentralSystems
Management
DistributedSystems
Management
Network &Other
Management
ExternalThird Party
ServiceVendors
JEApplication
Support
Tier Two
Hubs/Routers WorkstationsServers
PeopleKnowledge Assets Incidents Correlation
Users Networks
Service Desk Incident Management Change Management Service Order Management
Service Data Access and Update Functions
IncidentRe-Assign
Searchfor
Solution
Dispatch Incidents
Assig
n to
Tie
r 2
Su
pp
ort G
ro
up
Pro
activ
e
Rea
ctiv
e
Tier Three
Incident Sources
Shared Data Repository
Shared Data RepositoryShared Data Repository
a logical collection of data that is shared by all elements of the architecture at all levels. Access to the Shared Data Repository must, of necessitity, be carefully controlled; each data store in the repository will have a single owner, though there may be several readers and updaters who are given authority to access the store.
(EDS SOW)
a logical collection of data that is shared by all elements of the architecture at all levels. Access to the Shared Data Repository must, of necessitity, be carefully controlled; each data store in the repository will have a single owner, though there may be several readers and updaters who are given authority to access the store.
(EDS SOW)
Configuration Management Data BaseConfiguration Management Data Base
CMDBCMDBRepository for the information related to the managed and managing devicesand applications in the JE environment
Repository for the information related to the managed and managing devicesand applications in the JE environment
Correlation EngineCorrelation Engine
Stores network and Stores network and application typology application typology and and dependency dependency data. data.
Used to determine Used to determine probable root cause probable root cause for events in the for events in the managed environment managed environment that occur within close that occur within close temporal proximity to temporal proximity to each othereach other
Stores network and Stores network and application typology application typology and and dependency dependency data. data.
Used to determine Used to determine probable root cause probable root cause for events in the for events in the managed environment managed environment that occur within close that occur within close temporal proximity to temporal proximity to each othereach other
Configuration Management PoliciesConfiguration Management Policies The CMDB represents the actual
Production environment within JE Federal jurisdiction over Enterprise
as a collective entity JE will define the core desktop
environment for the customer External consultants must conform
to CMS
Configuration Item PoliciesConfiguration Item Policies
CI is line item in CMDB External Consultants may own CIs
– JE resource assigned to track compliance Federal control over CI labelling CIs in secure area CIs have version numbers CIs must pass environmental testing
before released to production
CMDB Access PrinciplesCMDB Access Principles
Maximize data integrity Minimize data maintenance costs Start small & demonstrate benefits Acknowledge cultural impediments
& develop plans to address them single data entry at source
CMDB Access PointsCMDB Access Points
TSC - North Bay
Who are the COs for these CIs ?
TSC - North Bay
What’s happening that affects this CI ?
CMDB Access PointsCMDB Access Points
Is there a bigger problem here ?
Who can potentiallybe affected ?
CMDB Access PointsCMDB Access Points
Where is that CI anyway ? How many devices
will we need replaced
next year ?
CMDB Access PointsCMDB Access Points
P.OP.O.EquipmentEquipment
RefreshRefresh
Examine
E-Form
Update CI
CMDB Access PointsCMDB Access Points
New New ProductsProducts
EnvironmentSimulated
Testing
New ImageNew Image
New ImageEntered as
New CI
CMDB Access PointsCMDB Access Points
P.OP.O.EquipmentEquipment
RefreshRefresh
Examine
E-Form
Update CIImage Assigned to WS CIImage Assigned to WS CI
CMDB Platform MigrationsCMDB Platform Migrations
MS Access
ActiveServerPage
ActiveServerPage
SQL
McAfeeHelpDesk
McAfeeHelpDesk
SQL
Replace
June 2000
Replace
Replication orDistributed DBMS
CI Ownership - IssuesCI Ownership - Issues
Aligning Responsibility, Authority and Work associated with CMDB population and maintenance
Overcoming cultural impediments
Distinguish Federal and Local responsibilities
Institutionalizing responsibility
Accommodating desires of different participants
CMDB Structure - seven categoriesCMDB Structure - seven categories
TechnologyTechnologyTechnologyTechnology
ApplicationsApplicationsApplicationsApplications
DataDataDataData
CommunicationsCommunicationsCommunicationsCommunications
IT ManagementIT ManagementIT ManagementIT Management
SecuritySecuritySecuritySecurity
Interface devices, utility service, application cooperation, distribution service, base platforms
Interface devices, utility service, application cooperation, distribution service, base platforms
Mission & Business Critical & Productivity Applications Mission & Business Critical & Productivity Applications
Data Base/Warehouse, Document management/modeling Data Base/Warehouse, Document management/modeling
Production servers/workstations, network schematics, Common Object Environments (COE)
Production servers/workstations, network schematics, Common Object Environments (COE)
ITSM Processes, SLA Mgmt, Performance monitoring ITSM Processes, SLA Mgmt, Performance monitoring
Policies & Principles, Virus Mgmt, Security/Control mechanisms Policies & Principles, Virus Mgmt, Security/Control mechanisms
Are these categories correct ?Are these categories correct ?
SystemsSystemsSystemsSystems CASE, programming and test tools
CASE, programming and test tools
End
CMDB Structure - TechnologyCMDB Structure - Technology
Sub-Category ConfigurationOwner
Application Cooperation
Base Platforms
Distribution Services
Interface Devices
Utility Services
To Legend
CMDB Structure - Network PlatformsCMDB Structure - Network PlatformsSub-Category Configuration
Owner
Client
Data
Servers
Voice
Desktop Devices
Peripherals
To Legend
CMDB Structure - ApplicationsCMDB Structure - ApplicationsSub-Category Configuration
Owner
Mission Critical
Business Critical
Personal Productivity
To Legend
CMDB Structure - DataCMDB Structure - Data
Sub-Category ConfigurationOwner
Modeling
Warehouse
Systems
Document Management
To Legend
CMDB Structure - CommunicationsCMDB Structure - CommunicationsSub-Category Configuration
Owner
Network Schematics (WAN) CTS
Network Schematics (JE)
Desktop COE - Win 95
Desktop COE - Win2000
Unix COE
Production PCs
Production Servers
To Legend
CMDB Structure - ITSMCMDB Structure - ITSM
Sub-Category ConfigurationOwner
Change
Configuration
Incident
Problem
CMDB Structure - Infrastructure Management ServicesCMDB Structure - Infrastructure Management Services
Sub-Category ConfigurationOwner
Asset
Contingency Planning
Cost
Event Alert
Performance
Production
Service Level
Software Control & Distribution
To Legend
CMDB Structure - SecurityCMDB Structure - Security
Sub-Category ConfigurationOwner
Security Profiles and Principles
Web Security
PKI
Virus Protection & Detection
Network Access Control and Monitoring
To Legend
CMDB Structure - System DevelopmentCMDB Structure - System Development
Sub-Category ConfigurationOwner
CASE Tools
Testing Tools
Programming Languages
Virus Protection & Detection
Network Access Control and Monitoring
To Legend
Thank you for your participationThank you for your participation
Together we can make it happen