We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJonah Laity
Modified over 2 years ago
Loading data into CMDB - Best practices for the entire process Shivraj Chavan Anand Ahire BMC Software
© 2013 WWRUG Canada Inc. All Rights Reserved 2 Agenda Why you should never do CMDB only project Guidance on – Should this be in the CMDB? The Life of a CI Various best practices Q&A
© 2013 WWRUG Canada Inc. All Rights Reserved 3 Typical Failed CMDB Project We need to have a CMDB - Why? … because Lets load data into it - What data? … whatever data we have laying around So, that took a long time! - And the CMDB is big, out of date, and isnt bringing any value See, I told you that CMDB thing was complex and useless hype - Another big data store offering no value is obviously not the desire Avoid doing a CMDB only project
© 2013 WWRUG Canada Inc. All Rights Reserved 4 CONSUMERS vs. Providers Although providers supply the data for the CMDB, the important players for the CMDB are really the consumers Consumers do interesting and useful things with the data Providers simply load data Without consumers – who cares what data is loaded - In fact, if no one consumes the data, it shouldnt be loaded
© 2013 WWRUG Canada Inc. All Rights Reserved 5 Have an XYZ project, that includes using the CMDB (for XYZ substitute – Incident, Change, Problem, …) We need to improve our Change Management process - The CMDB is not an end in itself, it is an enabler for other processes - You must have a goal and a focus for how you want to USE the CMDB Change Management needs to know about servers, applications, services, and their relationships - If no one is consuming a piece of data, it should not be in the CMDB - When in doubt, DO NOT put data into the CMDB until someone asks for it Look at the improvements in the Change Management process - Failed changes and disruption to service because of change are down - I can see how the CMDB makes Change Management better Lets look at the Incident Management process; how can we improve? - There will be many different XYZ projects that all increase content and use of that content in the CMDB The CMDB is a long journey; but there is incremental value at every step along the way
© 2013 WWRUG Canada Inc. All Rights Reserved 6 Choose your data sources wisely Good data providers do the following: - Provides data for CDM classes you need to populate in the CMDB - Provides data that is not already provided by a different data source - Can populate attribute values which can uniquely identify CI - Periodically updates data - Periodically flags data as no longer present in the environment - Indicates when the data was last updated - Updates, maintains, and deletes relationships as well as CIs Manual Data entry: - Example: Asset Sandbox in ITSM - There are some classes we expect to populate manually, like Business Service CMDB provides context NOT content
© 2013 WWRUG Canada Inc. All Rights Reserved 7 Automated Discovery is a Requirement Without automated discovery processes, data accuracy CANNOT be maintained Data is inaccurate before you can complete loading it
© 2013 WWRUG Canada Inc. All Rights Reserved 8 Value Path Applications Services Running Software Virtual Layer: Virtual Machines Physical Layer: Servers, Network Devices = CI, CI Attributes, CI Relationships Auto maintained by likes of ADDM in Atrium CMDB = CI, CI Attributes, CI Relationships Maintained by Atrium CMDB = CI = Relationship Atrium CMDB HighValue Less Value Incident, Problem, Change, Config
© 2013 WWRUG Canada Inc. All Rights Reserved 9 The Life of a CI Atrium CMDB SCCM Dataset MS SCCM IMPORT Dataset Atrium Integrator CIs Any Data Source ADDM Dataset ADDM CIs Only load data that you need! Define dataset per provider Have different plan for Initial vs delta loads Run multiple copies of key steps like CMDBOutput step in spoon Think about error handling especially for custom jobs Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved The Life of a CI Production Dataset NORMALIZATIONNORMALIZATION Atrium CMDB SCCM Dataset IMPORT Dataset ADDM Dataset RECONCILIATIONRECONCILIATION Product Catalog CIs Normalize before you Identify Dont normalize all classes Batch mode – initial or large data, Continuous – steady state Use Impact Normalization for Change Mgmt or BPPM Use Suite Rollup / Version rollup for SWLM Always use Reconciliation, even for a single source Keep your data clean, normalized, and identified Use qualifications to filter data Use Standard Identification and Merge Rules Put your most specific identification rule first Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved 11 The Life of a CI Production Dataset Atrium CMDB BPPM SIM ITBM ITSM Dashboards Do not modify data in production dataset directly. Always use sandbox datasets for manual changes If no one consumes the data, it shouldnt be loaded Periodically check for duplicates and take remediation action Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved The Life of a CI Production Dataset NORMALIZATIONNORMALIZATION Atrium CMDB SCCM Dataset MS SCCM IMPORT Dataset Atrium Integrator CIs Any Data Source BPPM SIM ITBM ITSM Dashboards Extract Transform Load Cleanse and Reconcile Consume ADDM Dataset ADDM RECONCILIATIONRECONCILIATION CIs Product Catalog CIs
© 2013 WWRUG Canada Inc. All Rights Reserved 13 Normalization and Reconciliation example Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: Host Name: John Smith Laptop Model: MB134B/A Software: MSWord Version: 2004 Host Name: John Smith Laptop Model: MB134B/A Software: MSWord Version: 2004 Host Name : John Smith Laptop Model: Apple MacBook Pro 15" Software : MSWD Version : Host Name : John Smith Laptop Model: Apple MacBook Pro 15" Software : MSWD Version : Data Source 1 Web Services Database Host Name: John Smith Laptop Model: Apple MacBook Pro 15 Software: Microsoft Word Version: Host Name: John Smith Laptop Model: Apple MacBook Pro 15 Software: Microsoft Word Version: Reconciled Data Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 2004 Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 2004 Normalized Data Atrium CMDB Production Dataset Data Source 2
© 2013 WWRUG Canada Inc. All Rights Reserved 14 Performance considerations Establish an Integration Server In many cases when performance is an issue, poor database configuration and / or indexing is the cause Consider indexing attributes used in Identification rules Check query plans, review and correct them Are DB backups happening when Reconciliation jobs are running? Use qualifications whenever possible to filter your data Fine tune thread settings and use Private Queue
© 2013 WWRUG Canada Inc. All Rights Reserved 15 Summary Dont do standalone CMDB project, CMDB is a means to ends Approach CMDB project from consumer side not provider Dont boil the ocean - Start small, prove value and iterate - but there is incremental value at every step along the way Normalize before you reconcile Always reconcile and use sandbox for manual editing Service orientation is where real value lies; model services NOW
© 2013 WWRUG Canada Inc. All Rights Reserved 16 Q & A Anand Ahire Principal Product Manager – Atrium Core
© 2013 WWRUG Canada Inc. All Rights Reserved 17 You are Allowed to Extend the CDM – BUT DONT Do EVERYTHING possible to design using the CMDB default data model - There is a mapping paper on the web site to help with mapping decisions - https://communities.bmc.com/docs/DOC If there is a request to extend, really evaluate whether there is really no existing class that it would be appropriate to map things into If you do extend the model, make sure you follow best practices - Model for the CONSUMER not the provider - Add as few extensions as possible - Consider that not all consumers can see a new class
© 2013 WWRUG Canada Inc. All Rights Reserved 18 References Hardware Requirements and SizingHardware Requirements and Sizing – Documentation Best Practices for CMDB Design & ArchitectureBest Practices for CMDB Design & Architecture – Webinar What CIs should I push into my CMDB?What CIs should I push into my CMDB? – Documentation Understanding Atrium IntegratorUnderstanding Atrium Integrator – Webinar Understanding Normalization and the Product CatalogUnderstanding Normalization and the Product Catalog – Webinar Importing custom Product Catalog dataImporting custom Product Catalog data – Documentation Understanding ReconciliationUnderstanding Reconciliation – Webinar Common Data Model and mapping data to CMDBCommon Data Model and mapping data to CMDB – Documentation Fine tuning ARS for CMDB applications like NE, RE, etc.Fine tuning ARS for CMDB applications like NE, RE, etc. – KA https://docs.bmc.com/docs/display/public/ac81/Investigating+CM DB+Data+Issues
The ESC-QuickBooks Integration For Use with ESC Version 12.
SharePoint Governance Questions January 2014 ©2014 SUSAN HANLEY LLC.
2 Welcome To Defect Management Training Objective: The objective of this course is to learn about standards that emphasize a best practice approach for.
Public Information Version 3.1: 1/1/2012 Introducing Instant Business Intelligence To IT BI Project Managers What you need, when you need it
1 GREY BOX TESTING Web Apps & Networking Session 10 Boris Grinberg
Chapter 7 – Design and Implementation 1Chapter 7 Design and implementation Note: These are a modified version of Ch 7 slides available from the authors.
Version 4.1 CCNA Discovery 2– Chapter 7. Contents 7.1: ISP Services : TCP / IP Protocols 7.2: 7.3: DNS 7.3: 7.4: Application Layer Protocols 7.4.
Community Empower Preparedness and Interaction Training.
IT203 Unit 2: Gather Information and Define Requirements Gathering Information Copyright © 2012 Pearson Education, Inc. Publishing as Prentice HallChapter2.1.
What happened to IPv5? and other oft asked IPv6 questions The Internet Society, IPv6 and You Susan Estrada.
1 Dimensional Modeling Dr. Jerry Rosenbaum The Rose Tree Group Myriad Solutions
1 Data Warehousing Denis Manley Enterprise Systems FT228/3.
Help Desk Procedures Topic: Tasks of the Help Desk Operator Written by Greg Webb while at Information Technology, Sydney Institute of Technology. Current.
Describing Your Program and Choosing an Evaluation Focus Thomas J. Chapel, MA, MBA Chief Performance Officer (Acting) CDC/Office of the Director/OCOO Presented.
The Operating System and the Central Processing Unit 4 Although CS420 is not a hardware course, the OS and the CPU are highly interdependent and indeed.
10-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright: ©2005 by Elsevier Inc. All rights reserved. 1 Author: Graeme C. Simsion and Graham C. Witt Chapter 10 Logical Database Design.
Manage an IT Project. Aim This presentation is prepared to support and give a general overview of the ‘How to Manage and IT Project’ Guide and should.
Windows 2008 Active Directory Configuration – Week 4 of 6 Microsoft Test: Mark McCoy MCSE, CNE, CISSP.
Mobile App Development & Localisation Eric Chubb Alchemy Software Development 14 th June 2012.
© 2013 A. Haeberlen, Z. Ives NETS 212: Scalable and Cloud Computing 1 University of Pennsylvania Case studies September 24, 2013.
1 Meridio Training – Consulting Elite. 2 Course objectives By the end of this training session you will: Understand why the Elite programme is being introduced.
Testing Relational Database. Overview Once the design of a database system has been completed, the developers are ready to move into the implementation.
1 Notes content copyright © 2004 Ian Sommerville. NU-specific content copyright © 2004 M. E. Kabay. All rights reserved. Requirements Engineering Processes.
Cold Calling – Sales Training Jim Tersteeg. Cold Calling What is it? –Cold calling is the process of collecting the required information on your targeted.
An Introduction to Object Modeling An Introduction to Object Modeling The approach of using object modeling during systems analysis and design is called.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 10 Architectural Design.
Computing Fundamentals Module Lesson 6 Using Technology to Solve Problems Computer Literacy BASICS.
Build a database I: Design tables for a new Access database Start with a plan Before you start planning, remember a key fact: Databases organize your information.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
© 2016 SlidePlayer.com Inc. All rights reserved.