Private and Confidential ThinkControl & ProLiant Essentials Rapid Deployment Pack.

Slides:



Advertisements
Similar presentations
Executional Architecture
Advertisements

Computer Hardware & Systems
© 2010 Wipro Ltd - Confidential SGSN Automation Testing Using TTCN3 Authors: Jyothi Gavara Nikhil Rahul Ekka.
1 (Review of Prerequisite Material). Processes are an abstraction of the operation of computers. So, to understand operating systems, one must have a.
What’s New: Windows Server 2012 R2 Tim Vander Kooi Systems Architect
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
System Center Configuration Manager Push Software By, Teresa Behm.
Leveraging WinPE and Linux Preboot for Effective Provisioning Jonathan Richey | Director of Development | Altiris, Inc.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 11 Windows Server 2008 Virtualization.
MCT260-Operating Systems I Operating Systems I Introduction to Operating Systems.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
Overview Of Microsoft New Technology ENTER. Processing....
Integrate into existing systems with PowerShell integration modules Extend by building PS modules to enable integrating into other systems Optimize.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
SIM361. Services Cloud Deployment Fabric Hyper-V Bare Metal Provisioning Hyper-V, VMware, Citrix XenServer Hyper-V, VMware, Citrix XenServer Network Management.
TIBCO Designer TIBCO BusinessWorks is a scalable, extensible, and easy to use integration platform that allows you to develop, deploy, and run integration.
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Guide to MCSE , Second Edition, Enhanced 1 Objectives Understand and use the Control Panel applets Describe the versatility of the Microsoft Management.
Overview Print and Document Services Print Management console Printer properties Troubleshooting.
Background History Note 1 Refer to Soltis: Appendix.
Hands-On Microsoft Windows Server 2008
Module 14: Configuring Print Resources and Printing Pools.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Tim Vander Kooi Systems
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
Reducing TCO with Lifecycle Management
Operating System. Architecture of Computer System Hardware Operating System (OS) Programming Language (e.g. PASCAL) Application Programs (e.g. WORD, EXCEL)
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3.
Automatic Software Testing Tool for Computer Networks ADD Presentation Dudi Patimer Adi Shachar Yaniv Cohen
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
IT 456 Seminar 5 Dr Jeffrey A Robinson. Overview of Course Week 1 – Introduction Week 2 – Installation of SQL and management Tools Week 3 - Creating and.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
UpgradeX and CloudSuite What you need to know. WHY?
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
SC2012 Infrastructure Components Management Justin Cook (Data # 3) Principal Consultant, Systems Management Noel Fairclough (Data # 3) Consultant, Systems.
Microsoft Virtual Academy. STANDARDIZATION SELF SERVICEAUTOMATION Give Customers of IT services the ability to identify, access and request services.
X-WindowsP.K.K.Thambi The X Window System Module 5.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Microsoft Virtual Academy. System Center 2012 Virtual Machine Manager SQL Server Windows Server Manages Microsoft Hyper-V Server 2008 R2 Windows Server.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Selenium server By, Kartikeya Rastogi Mayur Sapre Mosheca. R
2: Operating Systems Networking for Home & Small Business.
An operating system (OS) is a collection of system programs that together control the operation of a computer system.
CITA 171 Section 1 DOS/Windows Introduction. DOS Disk operating system (DOS) –Term most often associated with MS-DOS –Single-tasking operating system.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
CIS 221 Lesson 2. What is the first phase of the of the Installation of Windows XP? MS-DOS phase Why is the MS-DOS phase needed? the computer required.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
If it’s not automated, it’s broken!
Introduction Service Management Automation
Windows 2012R2 Hyper-V and System Center 2012
Integrating ArcSight with Enterprise Ticketing Systems
System Center 2012 Configuration Manager
Building a Virtual Infrastructure
Cisco’s Intelligent Automation for Cloud
Dev Test on Windows Azure Solution in a Box
CS 31006: Computer Networks – The Routers
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Features Overview.
Microsoft Virtual Academy
Presentation transcript:

Private and Confidential ThinkControl & ProLiant Essentials Rapid Deployment Pack

Private and Confidential ThinkControl Architecture (High Level)

Private and Confidential Workflows

Private and Confidential What, Why and How? What is a Workflow? A workflow is the sequence of steps a system administrator would use to accomplish a task. Workflows can make use of existing native technologies and scripts already in your datacenter. Why use Workflows? Repeatable, error-free execution which can help reduce fire fighting and overtime costs. Allows your highly valued system administrators to work on enhancing processes instead of troubleshooting configuration issues. Allows your system administrators to be strategic instead of tactical. How do I create a Workflow? 1 st step- map out your process flow Modify an existing or create your own workflows using the ThinkControl GUI. Run the workflow

Private and Confidential More Detail Workflows allow for standard Input, standard output and standard error. Workflows are typically built around a smaller component called a Java Driver. These are essentially hardware and software drivers with input parameters. (e.g. load balancer IP address, service name, etc). Each step in a workflow requires input from a previous step in a workflow, in essence it is similar to a scripting language but when combined with a policy engine it allows you to meet business objectives. At any step in a workflow you can: –Invoke a java driver to control a hardware device or software element –Invoke another workflow –In the event of a failure in any step rollback or execute a recovery path

Private and Confidential Workflows are re-usable! A central component to Think Control is the Data Center Model (DCM) where all physical and logical assets are modeled. Workflows make use of the DCM to allow for an abstraction of both physical and logical operations. Workflows can be designed to be generic so that once created, a single workflow can be used for more than one purpose. For example, one could create a “Add server to application” workflow that can be invoked to apply to Windows 2000, Linux, and Solaris environments.

Private and Confidential Other capabilities 300+ predefined workflows Nestable- can embed one or more workflows into another Use of existing scripts Backout or recovery from failure Verification and audit capability Ability to interface to any command line interface or API of other products

Private and Confidential ThinkControl and the HP Rapid Deployment Pack

Private and Confidential HP Lab with ThinkControl

Private and Confidential Rapid Deployment Pack (RDP) Integration Demo Objective: Automatically scale a video streaming application when bandwidth on NIC reaches > 60% utilization. ThinkControl’s Domain: Create and enforce the policy Monitor the devices Trigger the PXE provisioning at the OS level through RDP Wait till finished Install the application level software Start software service and ensure running Update RDP of new server status ThinkControl RDP Altiris Smartstart

Private and Confidential RDP Integration Using RDP command line interface (axsched) to trigger OS deployment. Because RDP’s command line interface was Asynchronous needed to wait for status. Update RDP on server move from resource pool to application. Implication: Can use RDP and associated functionality to cover larger scope of System Administration tasks. ThinkControl RDP Altiris Smartstart Update RDP OS deploy Request Using CLI

Private and Confidential ThinkControl RDP Integration

Private and Confidential End