We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJonah Laity
Modified over 2 years ago
Loading data into CMDB - Best practices for the entire process Shivraj Chavan Anand Ahire BMC Software
© 2013 WWRUG Canada Inc. All Rights Reserved 2 Agenda Why you should never do CMDB only project Guidance on – Should this be in the CMDB? The Life of a CI Various best practices Q&A
© 2013 WWRUG Canada Inc. All Rights Reserved 3 Typical Failed CMDB Project We need to have a CMDB - Why? … because Lets load data into it - What data? … whatever data we have laying around So, that took a long time! - And the CMDB is big, out of date, and isnt bringing any value See, I told you that CMDB thing was complex and useless hype - Another big data store offering no value is obviously not the desire Avoid doing a CMDB only project
© 2013 WWRUG Canada Inc. All Rights Reserved 4 CONSUMERS vs. Providers Although providers supply the data for the CMDB, the important players for the CMDB are really the consumers Consumers do interesting and useful things with the data Providers simply load data Without consumers – who cares what data is loaded - In fact, if no one consumes the data, it shouldnt be loaded
© 2013 WWRUG Canada Inc. All Rights Reserved 5 Have an XYZ project, that includes using the CMDB (for XYZ substitute – Incident, Change, Problem, …) We need to improve our Change Management process - The CMDB is not an end in itself, it is an enabler for other processes - You must have a goal and a focus for how you want to USE the CMDB Change Management needs to know about servers, applications, services, and their relationships - If no one is consuming a piece of data, it should not be in the CMDB - When in doubt, DO NOT put data into the CMDB until someone asks for it Look at the improvements in the Change Management process - Failed changes and disruption to service because of change are down - I can see how the CMDB makes Change Management better Lets look at the Incident Management process; how can we improve? - There will be many different XYZ projects that all increase content and use of that content in the CMDB The CMDB is a long journey; but there is incremental value at every step along the way
© 2013 WWRUG Canada Inc. All Rights Reserved 6 Choose your data sources wisely Good data providers do the following: - Provides data for CDM classes you need to populate in the CMDB - Provides data that is not already provided by a different data source - Can populate attribute values which can uniquely identify CI - Periodically updates data - Periodically flags data as no longer present in the environment - Indicates when the data was last updated - Updates, maintains, and deletes relationships as well as CIs Manual Data entry: - Example: Asset Sandbox in ITSM - There are some classes we expect to populate manually, like Business Service CMDB provides context NOT content
© 2013 WWRUG Canada Inc. All Rights Reserved 7 Automated Discovery is a Requirement Without automated discovery processes, data accuracy CANNOT be maintained Data is inaccurate before you can complete loading it
© 2013 WWRUG Canada Inc. All Rights Reserved 8 Value Path Applications Services Running Software Virtual Layer: Virtual Machines Physical Layer: Servers, Network Devices = CI, CI Attributes, CI Relationships Auto maintained by likes of ADDM in Atrium CMDB = CI, CI Attributes, CI Relationships Maintained by Atrium CMDB = CI = Relationship Atrium CMDB HighValue Less Value Incident, Problem, Change, Config
© 2013 WWRUG Canada Inc. All Rights Reserved 9 The Life of a CI Atrium CMDB SCCM Dataset MS SCCM IMPORT Dataset Atrium Integrator CIs Any Data Source............................ ADDM Dataset ADDM CIs Only load data that you need! Define dataset per provider Have different plan for Initial vs delta loads Run multiple copies of key steps like CMDBOutput step in spoon Think about error handling especially for custom jobs Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved 10........................ The Life of a CI Production Dataset NORMALIZATIONNORMALIZATION Atrium CMDB SCCM Dataset IMPORT Dataset ADDM Dataset RECONCILIATIONRECONCILIATION Product Catalog CIs Normalize before you Identify Dont normalize all classes Batch mode – initial or large data, Continuous – steady state Use Impact Normalization for Change Mgmt or BPPM Use Suite Rollup / Version rollup for SWLM Always use Reconciliation, even for a single source Keep your data clean, normalized, and identified Use qualifications to filter data Use Standard Identification and Merge Rules Put your most specific identification rule first Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved 11 The Life of a CI Production Dataset Atrium CMDB BPPM SIM ITBM ITSM Dashboards................ Do not modify data in production dataset directly. Always use sandbox datasets for manual changes If no one consumes the data, it shouldnt be loaded Periodically check for duplicates and take remediation action Extract Transform Load Cleanse and Reconcile Consume
© 2013 WWRUG Canada Inc. All Rights Reserved 12........................ The Life of a CI Production Dataset NORMALIZATIONNORMALIZATION Atrium CMDB SCCM Dataset MS SCCM IMPORT Dataset Atrium Integrator CIs Any Data Source............................ BPPM SIM ITBM ITSM Dashboards................ Extract Transform Load Cleanse and Reconcile Consume ADDM Dataset ADDM RECONCILIATIONRECONCILIATION CIs Product Catalog CIs
© 2013 WWRUG Canada Inc. All Rights Reserved 13 Normalization and Reconciliation example Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 11.3.8 Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 11.3.8 Host Name: John Smith Laptop Model: MB134B/A Software: MSWord Version: 2004 Host Name: John Smith Laptop Model: MB134B/A Software: MSWord Version: 2004 Host Name : John Smith Laptop Model: Apple MacBook Pro 15" Software : MSWD Version : 11.3.8 Host Name : John Smith Laptop Model: Apple MacBook Pro 15" Software : MSWD Version : 11.3.8 Data Source 1 Web Services Database Host Name: John Smith Laptop Model: Apple MacBook Pro 15 Software: Microsoft Word Version: 11.3.8 Host Name: John Smith Laptop Model: Apple MacBook Pro 15 Software: Microsoft Word Version: 11.3.8 Reconciled Data Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 2004 Host Name: John Smith Laptop Model: Apple MacBook Pro 15" Software: Microsoft Word Version: 2004 Normalized Data Atrium CMDB Production Dataset Data Source 2
© 2013 WWRUG Canada Inc. All Rights Reserved 14 Performance considerations Establish an Integration Server In many cases when performance is an issue, poor database configuration and / or indexing is the cause Consider indexing attributes used in Identification rules Check query plans, review and correct them Are DB backups happening when Reconciliation jobs are running? Use qualifications whenever possible to filter your data Fine tune thread settings and use Private Queue
© 2013 WWRUG Canada Inc. All Rights Reserved 15 Summary Dont do standalone CMDB project, CMDB is a means to ends Approach CMDB project from consumer side not provider Dont boil the ocean - Start small, prove value and iterate - but there is incremental value at every step along the way Normalize before you reconcile Always reconcile and use sandbox for manual editing Service orientation is where real value lies; model services NOW
© 2013 WWRUG Canada Inc. All Rights Reserved 16 Q & A Anand Ahire Principal Product Manager – Atrium Core email@example.com
© 2013 WWRUG Canada Inc. All Rights Reserved 17 You are Allowed to Extend the CDM – BUT DONT Do EVERYTHING possible to design using the CMDB default data model - There is a mapping paper on the web site to help with mapping decisions - https://communities.bmc.com/docs/DOC-16471 If there is a request to extend, really evaluate whether there is really no existing class that it would be appropriate to map things into If you do extend the model, make sure you follow best practices - Model for the CONSUMER not the provider - Add as few extensions as possible - Consider that not all consumers can see a new class
© 2013 WWRUG Canada Inc. All Rights Reserved 18 References Hardware Requirements and SizingHardware Requirements and Sizing – Documentation Best Practices for CMDB Design & ArchitectureBest Practices for CMDB Design & Architecture – Webinar What CIs should I push into my CMDB?What CIs should I push into my CMDB? – Documentation Understanding Atrium IntegratorUnderstanding Atrium Integrator – Webinar Understanding Normalization and the Product CatalogUnderstanding Normalization and the Product Catalog – Webinar Importing custom Product Catalog dataImporting custom Product Catalog data – Documentation Understanding ReconciliationUnderstanding Reconciliation – Webinar Common Data Model and mapping data to CMDBCommon Data Model and mapping data to CMDB – Documentation Fine tuning ARS for CMDB applications like NE, RE, etc.Fine tuning ARS for CMDB applications like NE, RE, etc. – KA https://docs.bmc.com/docs/display/public/ac81/Investigating+CM DB+Data+Issues
CMDB Part 3 Review Questions © Copyright 2014 BMC Software, Inc. 1.
Executional Architecture Lecture Conceptual vs execution Conceptual Architecture Execution Architecture Component Connector Domain-level responsibilities.
IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
Managing Your Site – Lesson 61 Managing Your Site Lesson 6.
SMS Integration to Atrium Kelly Deaver BMC Technical Marketing.
6/3/2014 BMC Remedy Software License Management Example Manuel Linares.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Slide 1 Configuration Management. Slide 2 Goal – Primary Objective To provide a logical model of the IT infrastructure by identifying,controlling, maintaining.
CYPRESS Software Testing By Rick Clements
The CA MDB Revised May © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced.
7 Strategies for Extracting, Transforming, and Loading.
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
1 15 Making the System Operational Lecture Activities of the Implementation and Support Phases Figure 15-1.
©Ian Sommerville 2000Software Engineering, 6th edition. Chapter 29Slide 1 Configuration management l Managing the products of system change l Objectives.
02b | Create and Configure Test Plans (2 of 2) Anthony Borton | ALM Consultant, Enhance ALM Steven Borg | Co-founder & Strategist, Northwest Cadence.
You too can be one step closer to having a clean, pristine SharePoint environment! 1 Methods and Solutions for Dealing with Orphaned Sites in a Large Scale.
1 Lesson 13 Databases Computer Concepts BASICS 4 th Edition Wells.
Introduction to Product Family Engineering. 11 Oct 2002 Ver 2.0 ©Copyright 2002 Vortex System Concepts 2 Product Family Engineering Overview Project Engineering.
1 LibX – Connecting Users and Libraries Annette Bailey LITA National Forum October 2007.
Advanced SQL Schema Customization & Reporting Presented By: John Dyke As day to day business needs become more complex so does the need for specifically.
©2011 Quest Software, Inc. All rights reserved. Steve Walch, Senior Product Manager Blog: November, 2011 Partner Training Webcast.
2/2008 GISC 6382 UT-Dallas Briggs 1 Geometric Networks in ArcGIS Sewer, water, roads, etc..
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
3-1 4 Oracle Data Integrator First Project – Simple Transformations: One source, one target.
Linux Operations and Administration Chapter Seventeen Networking in a Linux Environment.
Marcel Zehner Partner | Private Cloud Architect itnetx gmbh Effizientes IT Service Management mit System Center Service Manager 2012.
Lecture 10 Sharing Resources. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all.
Test B, 100 Subtraction Facts
Delegated Admin Tool Edit User Profile Training Module.
An overview of Data Warehousing and OLAP Technology Presented By Manish Desai.
DATABASE SYSTEM CONCEPTS AND ARCHITECTURE CHAPTER 2 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
1 Introducing the Specifications of the Metro Ethernet Forum.
Addition Facts = = =
1 Advanced Archive-It Application Training: Quality Assurance October 17, 2013.
CARSAM Quick Reference Guide for Users May 2012 CORPORATE ACCOUNT RECONCILIATION.
Intro Asset Management Case Study Brian Baril, Solution Architect.
CMDB: Why, When and How? March 6, 2008 Delaware Valley Chapter Lou Eggert – USG, Inc.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 Week # 3 AS/400 Library List When you need to use any system object or an object that you have created, the system usually searches for the object in.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
© Paradigm Publishing, Inc Access 2010 Level 1 Unit 1Creating Tables and Queries Chapter 2Creating Relationships between Tables.
1 Computational Asset Description for Cyber Experiment Support using OWL Telcordia Contact: Marian Nodine Telcordia Technologies Applied Research
SPI NIGHTLIES Alex Hodgkins. SPI nightlies Build and test various software projects each night Provide a nightlies summary page that displays all.
Open Solutions for a Changing World™ Copyright 2005, Data Access Worldwide June 6-9, 2005 Key Biscayne, Florida 1 Application Deployment Stephen W. Meeley.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
© 2017 SlidePlayer.com Inc. All rights reserved.