Mark Jones Senior Product Manager How Automation Can Help You: Use Cases for NetIQ Aegis™

Slides:



Advertisements
Similar presentations
Oracle Enterprise Manager Grid Control: Day in the Life of An Admin Wilson N. López – Solution Specialist.
Advertisements

Presented by Nikita Shah 5th IT ( )
Copyright © 2006 Quest Software Quest SharePoint Management.
Steve Lewis J.D. Edwards & Company
Service Manager 2012 Overview
Open ticket. Populate with data gathered Event Validation Gather CI service data, check for known outages Update event with ticket # Resolve incident.
Dan Stolts Chief Technology Strategist Microsoft Corporation Blog: Managing and Monitoring Critical Infrastructure.
Major Incident Process
Integrating The Datacenter OpalisRobot MOM Operator.
OpalisRobot™ Demonstration Actual Run Book Procedure Actual Data center Run Book Procedure documenting for Level 1 staff how to both VERIFY.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
AppManager 7: Deep Technical Dive Tim Sedlack & Michi Schniebel Sr. Product Managers.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Best Practices – Overview
Maintaining and Updating Windows Server 2008
Automating Datacenter Using System Center 2012 Harpreet Singh Rana Consultant Microsoft Corporation MGT328.
ITIL: Why Your IT Organization Should Care Service Support
Using the Windows Event Viewer and Task Scheduler Chapter 5.
Security Guidelines and Management
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Managing DHCP. 2 DHCP Overview Is a protocol that allows client computers to automatically receive an IP address and TCP/IP settings from a Server Reduces.
ITimpulse NOC process This is an interactive, detailed, step wise guide explaining how alerts are managed at our NOC. This document contains information.
Hands-On Microsoft Windows Server 2008
Automated, Standardized, Self-service Private Cloud Service Delivery Travis Wright Principal Program Manager Microsoft Corporation.
A look at the current initiatives within UWE such as SharePoint, consolidation and virtualisation as well as some of the technology trends we can see coming.
Ripple Technologies, Inc 7/98 LogCaster. Ripple Technologies, Inc 7/98 LogCaster NT Real Time System Monitoring.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Sven Kniest Automation Evangelist NetIQ MGT221 Bans Sagoo Solutions Engineer NetIQ MGT221.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Event Management & ITIL V3
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
Module 9 Configuring Messaging Policy and Compliance.
Private Cloud Service Delivery and Automation with Microsoft System Center 2012 Sean Christensen Senior Technical Product Marketing Manager Microsoft Corporation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Overview Managing a DHCP Database Monitoring DHCP
Server Virtualization & Disaster Recovery Ryerson University, Computer & Communication Services (CCS), Technical Support Group Eran Frank Manager, Technical.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
Microsoft Virtual Academy. STANDARDIZATION SELF SERVICEAUTOMATION Give Customers of IT services the ability to identify, access and request services.
RECAP Datacenter Admin “Service Provider” Application Owner “Service Consumer”
Microsoft Management Seminar Series SMS 2003 Change Management.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
System Center & SharePoint On- Prem Matija Blagus, Acceleratio
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Stop following incidents Register and analyze Describe your tasks step by step Make it part of your DNA If you know what you did the last month you.
Capacity Planning in a Virtual Environment Chris Chesley, Sr. Systems Engineer
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
Maintaining and Updating Windows Server 2008 Lesson 8.
SQL Advanced Monitoring Using DMV, Extended Events and Service Broker Javier Villegas – DBA | MCP | MCTS.
UFIT Infrastructure Self-Service. Service Offerings And Changes Virtual Machine Hosting Self service portal Virtual Machine Backups Virtual Machine Snapshots.
Self Service Service Delivery & Automation Deploy Configure Service Model DC Admin Operate Monitor Virtual Physical Public Cloud Private Cloud Virtual.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
SQL Database Management
Operating System Review
Michael Mast Senior Architect
Operating System Review
ITIL: Why Your IT Organization Should Care Service Support
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
ITIL: Why Your IT Organization Should Care Service Support
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
ITIL: Why Your IT Organization Should Care Service Support
Designing IIS Security (IIS – Internet Information Service)
Ch 10. Maintaining and Automating SQL Server
Presentation transcript:

Mark Jones Senior Product Manager How Automation Can Help You: Use Cases for NetIQ Aegis™

Our Vision For IT Process Automation 3 Years In The Making 3 years ago NetIQ had a vision for converging our systems & security management products to support consolidated incident & event handling. But customers said, help us connect to our other tools as well. We’re the Noah’s Ark of tools – we have two of everything. VP of Operations at a major Financial Institution So we altered our plan to give customers greater control of the tools they’ve already invested in by creating a strategy for heterogeneous IT Process Automation (ITPA).

Introducing NetIQ ® Aegis™ The Control & Automation Platform for IT Processes NetIQ Aegis is a software platform that models, automates, measures and improves run books and ITIL-based processes, bringing control and automation to IT Operations ITIL Process (macro) Run Books (micro ) Automate Model Measure Improve

Use Case #1 Sympathetic Event Correlation NetIQ Aegis 4. AppManager receives sympathetic access failure events From application and web servers 5. Aegis’ correlation engine sees the sympathetic events And matches them to pre- defined rules 2. AppManager receives event From the agent on the server 1. SQL Server down event 6. Aegis closes the sympathetic events Reducing the volume of AppManager events to be dealt with Update comments in the original event accordingly 3. AppManager event triggers an Aegis workflow Correlation engine begins listening for sympathetic events that match rules NetIQ AppManager Database Server Web Server Application Server ! ! ! Additional correlation examples: Suppress machine down events from hosts on attached subnets when a router fails Identify root cause from multiple events, e.g. a congested network segment identified by a combination of Network ResponseTime events, and high queue lengths on some Exchange servers

Use Case #2 Managing Maintenance Modes NetIQ Aegis 4. Aegis sets the maintenance mode in AppManager On the right machine at the right time 6. Aegis’ sends a reminder before the expiration of maintenance With an opportunity to “snooze” or extend via 2. Aegis receives the and parses Identifies the resource to set maintenance mode on and the time window 1.Application owner sends an request to set maintenance mode Using an Outlook form 7. Aegis stops maintenance mode On time with no further approval 3. Aegis sends a reminder before the start of maintenance With an opportunity to cancel via NetIQ AppManager 5. Administrator performs maintenance Application Owner Outlook Form Aegis sends confirming maintenance stoppage 8

Use Case #3 Low Disk Space Response 3.Aegis requests disk usage analysis from AppManager Identify top N culprits by folder, file type, age Extra attention on known temp file storage areas 4.Aegis sends to admin requesting approval to clean up Embed results of disk usage analysis & link to Aegis web site 2.AppManager detects condition AppManager Knowledge Script generates event 1.Available disk space falls below threshold Likely caused by temp file growth 5.Administrator approves partial cleanup through Aegis (or by replying to ) Admin can select individual folders or file types for deletion, archiving or user attention 6.Aegis commands AM to perform cleanup Delete approved files and analyze new disk space status 7.Aegis sends confirmation to admin Identify files deleted and new disk space status NetIQAppManager NetIQ Aegis Admin AppManager Agent Archive Trash

Use Case #4 VM Dynamic Performance Management NetIQ Aegis 9. Verify improved service performance Repeat as necessary for up to 3 new guests total 4. Provision new VM guest Clone VM, configure LAN settings, etc & boot 5. Apply post-image updates per corp standard Patches, configuration updates since VM image was created 2. Identify VM host with spare capacity 1. Detect poor performance on VM-hosted service Performance problem detected by AppManager ResponseTime 6. Configure applications Machine-specific settings required on guest and other machines in business service 7. Validate application function Verify proper application function before bringing into production 8. Bring new guest into production rotation Configure load balancer, application controller or similar VMWare Virtual Center Attachmate WinInstall Load Balancer or Controller VMware ESX Hosts 3. Gain approval to provision new VMs Send to admin with proposed changes, requesting approval to automatically respond NetIQAppManager Admin Critical Business Service

Use Case #5 Web Server Sequential Restart 3. Aegis blocks new sessions to first server Uses NetIQ AppManager to configure load balancer 4. Aegis commands AppManager to monitor for server to reach zero active sessions Users “bleed” off as they end their sessions on their own; AppManager sends event when zero session remain 2. Admin initiates “Restart Web Farm” Runbook Customized runbook automated by Aegis 1. Admin applies a patch to all web servers Reboot needed to finalize 5. Aegis commands AppManager to restart the web server Aegis waits for notification that reboot is complete 6. Aegis commands AM to test basic functionality Verify that web server properly performs expected duties 7. Aegis enables new sessions to the server Uses NetIQ AppManager to configure load balancer NetIQAppManager NetIQ Aegis Admin AttachmateWinINSTALL Active Sessions Web Servers Load Balancer 8. Aegis verifies web site health Users are accessing the rebooted server successfully and no Response Time or other errors reported on the web farm 9. Send progress notification to Admin Include % remaining & ETA for completion 10. Go to Step 3 for next server Iterate until all servers completed

Use Case #6 Incident Management Other Sources (RFCs, CMDB, NetIQ Change Guardian, etc.) 3.Create helpdesk ticket Apply proper classifications Embed link to web page with related incidents 4.Helpdesk staff works ticket Relevant information already collected & presented with ticket 2.Collect related events from other data sources Changes, tickets, intrusions, etc during same time period Broaden scope to other machines in business service and correlate 1.Incident occurs Performance problem detected by AppManager ResponseTime 5.Monitor existing incident management workflow Support ticketing workflow with Aegis Investigation Assistance Wait for ticket to be resolved (not closed) 6.Initiate Incident Probation Period Verify proper service restoration, record in ticket Search all tools for unanticipated downstream impacts, reopen ticket if found 7.Coordinate post-incident review for Problem Management Request explanatory info from stakeholders, e.g. how well was incident handled, how to prevent recurrence Produce unified report for management NetIQ AppManager Helpdesk NetIQ Aegis Incident Stakeholder s Management Ticketing

Use Case #7 Change Management AppManager 8. Correlate changes to impacts Search other tools for downstream impacts from change such as performance problems, new vulnerabilities, etc. All Data Sources (Net. Mgmt, Etc) 4. Change Requester executes change per approved ticket Actions bounded by change control tool 1. Change is requested & approved via existing “Request for Change” process 6. Reconcile audited changes to the approved RFC Group audited changes by time, machine, individual Request review of changes: auth or unauth, relevant ticket ID, etc Update ticket and CMDB with related changes 7. Perform system health check After change, verify proper service levels “Request for Change” Process NetIQ Aegis Change Requester Management 9. Coordinate Post-Change Review Change is “completed” but not “closed” until the CAB has completed review Tripwire, NetIQ Change Guardian, etc Administrator 2. Detect approved change request Monitor Remedy or other change management system 5. Change audit tool detects actual config changes Tripwire or NetIQ Change Guardian NetIQ Change Administrato r CMDB 3. Provision access in change control tool Managed by NetIQ Change Administrator Incident Stakeholders

Use Case #8 Vulnerability Management 8. Relate changes to impacts Search other tools for downstream impacts from change such as performance problems, new vulnerabilities, etc. All Data Sources (VM, SM, Etc) 3. Request permission to remediate via existing Change Management process (RFC) Group by machine, service, vulnerability class, etc. 1. Initiate vulnerability & policy violation scan Or scan on an existing schedule 5. Initiate remediation Using provisioning tools such as WinINSTALL, SMS, etc. or by assigned administrator 7. Perform system health check After change, verify that remediation did not impact service levels AppManager Remedy NetIQ Aegis Secure Configuration Manager Administrator 2. Identify resulting vulnerabilities 4. Monitor for approved RFC Patch Manager, WinINSTALL, SMS, Etc 6. Initiate vulnerability scan to verify remediation Verify that vulnerability was indeed remediated 9. Close change request Or escalate if impacts are found