SlideShare a Scribd company logo
1 of 6
Download to read offline
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
Configuration Management for the Rest of Us

Page 1 of 5

Subscribe

PDF Download

Vol. 2.27

"Configuration
Management for
the Rest of Us"

Back Issues

JULY 12, 2006

DITY Weekly Reader
The workable, practical guide to Do IT
Yourself

Configuration Management is probably the least understood and most important
service management process. Yet most have no idea how to start and many think it
requires huge investments. But you don't need to spend big bucks to get real
benefits. It all starts with a single word...
By Hank Marquis

The IT Infrastructure Library® (ITIL®) describes Configuration Management (CM) as a
method for controlling infrastructure and services.

hank

The ITIL goes into detail describing the goals and activities relating to CM. Given these
descriptions CM, it can appear that ITIL implementation is not possible without a mature CM
process.

MARQUIS
Articles
E-mail
Bio

This is not true, but the use of over-generalizations like “account for all the IT assets and
configurations within the organization and its services” can cause new practitioners to
become confused and overwhelmed.

Coupled with vendor hype and management misunderstanding, practitioners quickly lose sight of the single
reason for CM — controlling changes.
Losing focus on the purpose of CM makes it more difficult than it would be otherwise. A clear understanding
of the real purpose of CM can make it easier to achieve, help explain its benefits, and provide a roadmap for its
justification and implementation.
There are three basic approaches available to the practitioner regarding CM: Purchase or build a
comprehensive system, or codify and enhance existing systems.
Purchasing or building a CM product is expensive. But there is an alternate approach — using the CM systems
virtually ever organization already has in place.
Following I explain the real purpose of CM, show you how to uncover your current CM systems, and provide a
plan to implement CM with real benefits for little or no additional cost.

http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm

7/9/2006
Configuration Management for the Rest of Us

Page 2 of 5

The Real Purpose of Configuration Management
Regardless of what you heard, read, or seen, the purpose of CM is to control changes through creation and
maintenance of documentation. This is not the same as Change Management, which is a process for
evaluating and handling change requests in the pursuit of quality of service improvement.
CM is a process to identify, record, maintain, report on, and verify documentation. Change Management and
other ITIL processes use this documentation to make better decisions. Creating and maintaining records of
Configuration Items (CI) such as hardware, software, and the documentation related to these CIs is all CM
describes, nothing more and nothing less.
The activities of CM all relate to the simple idea of creating and maintaining a database of information
regarding CIs, and then inserting the usage of this database into the decision making process. This simple
understanding is the path to success regarding CM, and the establishment of that almost mythical of things,
the Configuration Management Database, or CMDB.

The Truth about the CMDB
Many think the CMDB is a single, all-powerful database. They attribute amazing abilities to the CMDB. They
grant it capabilities never intended and often not required. Many vendors inadvertently contribute to this
confusion with extended claims of functionality based on their unique capabilities.
If I could rename the CMDB, I would call it the Configuration Management Databank. This sounds simple,
but a large part of the problem practitioners have with CM stems from the use of the word database and what
people think the word database means. The practitioner reading the ITIL see's database and immediately
starts thinking of SQL, server's, administration, and new software licenses.
Many have forgotten (or never knew) that databases consist of one or more banks of data. Webster defines
“Database” as “a usually large collection of data organized especially for rapid search and retrieval.” Webster
also defines “Databank” as an alternate term for “Database.” Such databanks are often independent, and often
geographically distributed among several repositories.
Many think a database is a single thing. The result is confusion, and the mistaken belief by practitioners that
CM and the CMDB are more than they really are. In truth, there is no such thing as a single CMDB. If I were
to call the CMDB anything, I would call it a type of hypertext engine.
In a Hypertext system, any object, whether it describes a piece of data (e.g., text, video, or audio) or a physical
thing (e.g., hardware, software, person, building, document) can link to any other object. It does not matter
where, physically, the object resides. Hypertext systems are particularly useful for organizing large amounts of
disparate information. The World Wide Web (WWW) is a hypertext system that is clearly not a single
database. The CMDB, like the WWW, is a logical construct that references many sources of information and
physical objects.
Forget the idea of the single, all-encompassing, database. Start thinking about linking together all the
collections of information you already have and use in your day to day activities. This is what a CMDB really
is.
I hope that you now understand that there is no such a thing as a single CMDB, and have an idea of how to
start creating your own Configuration Management Databank!

Uncovering Your Own CMDB
Know that you understand what a CMDB actually is; you can start to think about uncovering your own. I say
uncovering because virtually every single IT organization already has many repositories of data and
information.

http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm

7/9/2006
Configuration Management for the Rest of Us

Page 3 of 5

Somewhere in your organization there are records regarding hardware and software models, versions, etc.
Without a doubt you have their manuals and software CD-ROMs nearby. Right now, someone has an Excel
spreadsheet with records of office system configurations. Finance has an asset register tracking hardware and
software purchased. Someone else is using Access to track software licenses. Over there is a shelf holding user
manuals, next to that is a closet with spare hardware. Elsewhere there are diagrams of services, circuits, and
systems in Visio or maybe PowerPoint.
My first point is that CM is the process of managing the information relating to your infrastructure. My second
point is that you most likely have a huge amount of CM data and information already in place — you probably
just never thought of it this way before. Commonly, IT organizations have much of the data but lack a single
process for managing and using the data. Without such management control the data is not available to other
processes or kept up to date.
The first step is to locate all of the sources of information relating to your hardware and software. Don't worry
about a single repository for Incident, Problem, Known Error, or Change records for now. (You probably
already have a system that tracks Incidents, Problems, and Known Errors or their equivalent right now — your
ticketing system.)
Focus instead on the CIs relevant to delivering your vital services. Locate the existing information repositories,
but leave them in their current form for now. Your goal is not to impose major new projects on existing teams,
but rather to locate sources of data and formalize their maintenance and control. Create a spreadsheet of
where your configuration information resides.
With this simple step of locating the sources of data and taking them under management control, you now
have a CMDB and can begin to realize the benefits of CM!

Getting Started
Now that you know you can have a CMDB and a CM process that delivers real value relatively quickly and
inexpensively, you need a plan. Here is a plan to get you going.
Planning — A CM process begins with a plan. Your CM plan needs to include:
purpose and scope of CM
a description of the CIs and services to which the CM plan applies
a time line showing important CM activities completion
a description of current and expected CM tools (e.g. what you have and expect to find)
related documentation such as existing CM plans or plans from suppliers
a listing of relevant documents and their interrelationships
policies describing CM management activities
the organization, responsibilities and authorities of relevant interested parties
qualifications and training of staff to support CM
criteria for the selection of CIs
frequency, distribution, and control of reports
The CM plan must explain and describe how you plan to achieve each of the following CM process activities.
The ITIL provides great detail on these, so the following are highlights only.
Identification — the selection and identification of CIs and their relationships. Identification includes
assigning unique identifiers and version numbers to CIs, applying labels to CIs as appropriate, and entering
the CI into the appropriate databank. For service-level CIs, the selection of resource-level CIs and the
descriptions of their interrelationships should describe the services' structure. Good selection and
identification criteria include:
regulatory requirements

http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm

7/9/2006
Configuration Management for the Rest of Us

Page 4 of 5

g
y q
criticality in terms of risks and safety
new or modified technology
interfaces with other CIs
procurement conditions
support and service considerations
Control — procedures that ensure no change to any CI without controlling documentation such as an updated
service or product specification, or a RFC. In your CM plan, define how you will accurately update CMDB
records. Include:
management authorizations and relationships of those in authority
procedures for control of changes to CI records within the CMDB
methods to communicate changes from physical CIs to their CMDB records
Status Accounting — reporting on changes to CIs throughout their lifecycle. Include methods to track CIs
from ordering to depreciation. Unlike Control, Status Accounting seeks to maintain a historical record for the
CI. This includes baselines, linked Incident, Problems, Known Errors, etc.
methods for collecting, recording, processing and maintaining status accounting records
definition of the content and format for all configuration status accounting reports
Verification and audit — a series of reviews to verify the presence and configuration of CIs with their
respective records within the CMDB. Include in the plan:
a list of audits planned
procedures to be used
authorizations required (within and without IT)
description of report and expected contents
Configuration Care and Feeding

Summary
Remember, the real purpose of CM and the CMDB is to control CIs. Initially, use the CMDB to enhance
maintenance decisions, expand into using the CMDB to evaluate Requests for Change (RFCs) in support of
Change and Release Management.
To support Change Management, identify critical components (CIs) that underpin key systems or applications.
Some common examples of these types of CIs include:
power supplies
shared servers
central routers and switches
high worth users
shared applications
high speed network connections
vital audit, security, and production systems
With the sources of configuration information located, your next step is to combine CI information into
services. This requires more work, so start small. Focus on new services, or “problem” services in need of
improvement. Start by defining service CIs – composed of these critical infrastructure CIs. This will help
stabilize your infrastructure by reducing unexpected consequences of changes.
Following the rest of the CM process defined in the ITIL allows you to maintain the integrity of the CMDB as
d i E bli h
bj i
b i
h
i
l
i
d CM
l

http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm

7/9/2006
Configuration Management for the Rest of Us

Page 5 of 5

you expand it. Establish management objectives to bring other services or locations under CM control.
Perform audits to ensure integrity and find new CIs. Begin to use the CMDB for impact analysis for Changes.
Relate Incidents, Problems, and Known Errors to services and specific CIs in the CMDB.
Over time, you can migrate to new systems if required. You will know what you need, and how to achieve it.
You might even find it worthwhile to purchase a system — and you will have established the value proposition
to justify them.
With your new understanding, and your plan in hand, you are ready to realize the benefits of Configuration
Management!
-Where to go from here:
Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
Download this article in PDF format for use at your own convenience, click here.
Browse back-issues of the DITY Newsletter, click here.
Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved.

http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm

7/9/2006

More Related Content

What's hot

TOE Datacenters Final
TOE Datacenters FinalTOE Datacenters Final
TOE Datacenters Final
Jason Harris
 

What's hot (20)

Dit yvol3iss9
Dit yvol3iss9Dit yvol3iss9
Dit yvol3iss9
 
Positioning And Understanding Virtualisation
Positioning And Understanding VirtualisationPositioning And Understanding Virtualisation
Positioning And Understanding Virtualisation
 
The Belgian Railways Journey to Enterprise Information Management
The Belgian Railways Journey to Enterprise Information ManagementThe Belgian Railways Journey to Enterprise Information Management
The Belgian Railways Journey to Enterprise Information Management
 
The Joy Of Bits
The  Joy  Of  BitsThe  Joy  Of  Bits
The Joy Of Bits
 
Solix Cloud – Managing Data Growth with Database Archiving and Application Re...
Solix Cloud – Managing Data Growth with Database Archiving and Application Re...Solix Cloud – Managing Data Growth with Database Archiving and Application Re...
Solix Cloud – Managing Data Growth with Database Archiving and Application Re...
 
Dit yvol4iss03
Dit yvol4iss03Dit yvol4iss03
Dit yvol4iss03
 
Cloud services full description
Cloud services full descriptionCloud services full description
Cloud services full description
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Chapter 04 it-8ed-volonino
Chapter 04 it-8ed-voloninoChapter 04 it-8ed-volonino
Chapter 04 it-8ed-volonino
 
50516
5051650516
50516
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Data Governance, understand what you already know (IBM Global Business Services)
Data Governance, understand what you already know (IBM Global Business Services)Data Governance, understand what you already know (IBM Global Business Services)
Data Governance, understand what you already know (IBM Global Business Services)
 
Case studyskleasing v0.4
Case studyskleasing v0.4Case studyskleasing v0.4
Case studyskleasing v0.4
 
TOE Datacenters Final
TOE Datacenters FinalTOE Datacenters Final
TOE Datacenters Final
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Ecm sales training sample day 1
Ecm sales training sample  day 1Ecm sales training sample  day 1
Ecm sales training sample day 1
 
Computanews 152 Final
Computanews 152 FinalComputanews 152 Final
Computanews 152 Final
 
How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT Infrastructure
 
The Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessThe Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern Business
 
Life in Hell: The Experience of Successful BI Managers
Life in Hell: The Experience of Successful BI ManagersLife in Hell: The Experience of Successful BI Managers
Life in Hell: The Experience of Successful BI Managers
 

Viewers also liked (17)

Dit yvol3iss40
Dit yvol3iss40Dit yvol3iss40
Dit yvol3iss40
 
Dit yvol3iss49
Dit yvol3iss49Dit yvol3iss49
Dit yvol3iss49
 
Dit yvol2iss48
Dit yvol2iss48Dit yvol2iss48
Dit yvol2iss48
 
Dit yvol4iss39
Dit yvol4iss39Dit yvol4iss39
Dit yvol4iss39
 
Dit yvol2iss34
Dit yvol2iss34Dit yvol2iss34
Dit yvol2iss34
 
Dit yvol2iss40
Dit yvol2iss40Dit yvol2iss40
Dit yvol2iss40
 
Dit yvol4iss50
Dit yvol4iss50Dit yvol4iss50
Dit yvol4iss50
 
Dit yvol2iss45
Dit yvol2iss45Dit yvol2iss45
Dit yvol2iss45
 
Dit yvol3iss14
Dit yvol3iss14Dit yvol3iss14
Dit yvol3iss14
 
Dit yvol4iss06
Dit yvol4iss06Dit yvol4iss06
Dit yvol4iss06
 
Dit yvol3iss32
Dit yvol3iss32Dit yvol3iss32
Dit yvol3iss32
 
Dit yvol3iss46
Dit yvol3iss46Dit yvol3iss46
Dit yvol3iss46
 
Dit yvol3iss26
Dit yvol3iss26Dit yvol3iss26
Dit yvol3iss26
 
Dit yvol3iss29
Dit yvol3iss29Dit yvol3iss29
Dit yvol3iss29
 
Dit yvol3iss2
Dit yvol3iss2Dit yvol3iss2
Dit yvol3iss2
 
Dit yvol3iss24
Dit yvol3iss24Dit yvol3iss24
Dit yvol3iss24
 
Dit yvol2iss8
Dit yvol2iss8Dit yvol2iss8
Dit yvol2iss8
 

Similar to Dit yvol2iss27

The Value of Standards-based CMDB Federation
The Value of Standards-based CMDB FederationThe Value of Standards-based CMDB Federation
The Value of Standards-based CMDB Federation
David Messineo
 
The Enduring Myth of CMDB White Paper - 2.0
The Enduring Myth of CMDB White Paper - 2.0The Enduring Myth of CMDB White Paper - 2.0
The Enduring Myth of CMDB White Paper - 2.0
Chris Hodder
 

Similar to Dit yvol2iss27 (20)

Dit yvol3iss4
Dit yvol3iss4Dit yvol3iss4
Dit yvol3iss4
 
Dit yvol3iss8
Dit yvol3iss8Dit yvol3iss8
Dit yvol3iss8
 
2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB
 
Dit yvol1iss3
Dit yvol1iss3Dit yvol1iss3
Dit yvol1iss3
 
The Value of Standards-based CMDB Federation
The Value of Standards-based CMDB FederationThe Value of Standards-based CMDB Federation
The Value of Standards-based CMDB Federation
 
Dit yvol1iss4
Dit yvol1iss4Dit yvol1iss4
Dit yvol1iss4
 
Dit yvol3iss5
Dit yvol3iss5Dit yvol3iss5
Dit yvol3iss5
 
What are the benefits of configuration management database - (ITIL 4 Foundat...
What are the benefits of configuration management database -  (ITIL 4 Foundat...What are the benefits of configuration management database -  (ITIL 4 Foundat...
What are the benefits of configuration management database - (ITIL 4 Foundat...
 
Dit yvol2iss41
Dit yvol2iss41Dit yvol2iss41
Dit yvol2iss41
 
Dit yvol2iss28
Dit yvol2iss28Dit yvol2iss28
Dit yvol2iss28
 
Dit yvol2iss2
Dit yvol2iss2Dit yvol2iss2
Dit yvol2iss2
 
Dit yvol3iss6
Dit yvol3iss6Dit yvol3iss6
Dit yvol3iss6
 
Dit yvol2iss17
Dit yvol2iss17Dit yvol2iss17
Dit yvol2iss17
 
Dit yvol1iss2
Dit yvol1iss2Dit yvol1iss2
Dit yvol1iss2
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docx
 
The Enduring Myth of CMDB - White Paper
The Enduring Myth of CMDB - White PaperThe Enduring Myth of CMDB - White Paper
The Enduring Myth of CMDB - White Paper
 
The Enduring Myth of CMDB White Paper - 2.0
The Enduring Myth of CMDB White Paper - 2.0The Enduring Myth of CMDB White Paper - 2.0
The Enduring Myth of CMDB White Paper - 2.0
 
Download White Paper : CMDB Implementations - A Tale of Two Extremes
Download White Paper : CMDB Implementations - A Tale of Two ExtremesDownload White Paper : CMDB Implementations - A Tale of Two Extremes
Download White Paper : CMDB Implementations - A Tale of Two Extremes
 
Dit yvol4iss11
Dit yvol4iss11Dit yvol4iss11
Dit yvol4iss11
 
Dit yvol2iss13
Dit yvol2iss13Dit yvol2iss13
Dit yvol2iss13
 

More from Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Dit yvol2iss27

  • 1. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 2. Configuration Management for the Rest of Us Page 1 of 5 Subscribe PDF Download Vol. 2.27 "Configuration Management for the Rest of Us" Back Issues JULY 12, 2006 DITY Weekly Reader The workable, practical guide to Do IT Yourself Configuration Management is probably the least understood and most important service management process. Yet most have no idea how to start and many think it requires huge investments. But you don't need to spend big bucks to get real benefits. It all starts with a single word... By Hank Marquis The IT Infrastructure Library® (ITIL®) describes Configuration Management (CM) as a method for controlling infrastructure and services. hank The ITIL goes into detail describing the goals and activities relating to CM. Given these descriptions CM, it can appear that ITIL implementation is not possible without a mature CM process. MARQUIS Articles E-mail Bio This is not true, but the use of over-generalizations like “account for all the IT assets and configurations within the organization and its services” can cause new practitioners to become confused and overwhelmed. Coupled with vendor hype and management misunderstanding, practitioners quickly lose sight of the single reason for CM — controlling changes. Losing focus on the purpose of CM makes it more difficult than it would be otherwise. A clear understanding of the real purpose of CM can make it easier to achieve, help explain its benefits, and provide a roadmap for its justification and implementation. There are three basic approaches available to the practitioner regarding CM: Purchase or build a comprehensive system, or codify and enhance existing systems. Purchasing or building a CM product is expensive. But there is an alternate approach — using the CM systems virtually ever organization already has in place. Following I explain the real purpose of CM, show you how to uncover your current CM systems, and provide a plan to implement CM with real benefits for little or no additional cost. http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm 7/9/2006
  • 3. Configuration Management for the Rest of Us Page 2 of 5 The Real Purpose of Configuration Management Regardless of what you heard, read, or seen, the purpose of CM is to control changes through creation and maintenance of documentation. This is not the same as Change Management, which is a process for evaluating and handling change requests in the pursuit of quality of service improvement. CM is a process to identify, record, maintain, report on, and verify documentation. Change Management and other ITIL processes use this documentation to make better decisions. Creating and maintaining records of Configuration Items (CI) such as hardware, software, and the documentation related to these CIs is all CM describes, nothing more and nothing less. The activities of CM all relate to the simple idea of creating and maintaining a database of information regarding CIs, and then inserting the usage of this database into the decision making process. This simple understanding is the path to success regarding CM, and the establishment of that almost mythical of things, the Configuration Management Database, or CMDB. The Truth about the CMDB Many think the CMDB is a single, all-powerful database. They attribute amazing abilities to the CMDB. They grant it capabilities never intended and often not required. Many vendors inadvertently contribute to this confusion with extended claims of functionality based on their unique capabilities. If I could rename the CMDB, I would call it the Configuration Management Databank. This sounds simple, but a large part of the problem practitioners have with CM stems from the use of the word database and what people think the word database means. The practitioner reading the ITIL see's database and immediately starts thinking of SQL, server's, administration, and new software licenses. Many have forgotten (or never knew) that databases consist of one or more banks of data. Webster defines “Database” as “a usually large collection of data organized especially for rapid search and retrieval.” Webster also defines “Databank” as an alternate term for “Database.” Such databanks are often independent, and often geographically distributed among several repositories. Many think a database is a single thing. The result is confusion, and the mistaken belief by practitioners that CM and the CMDB are more than they really are. In truth, there is no such thing as a single CMDB. If I were to call the CMDB anything, I would call it a type of hypertext engine. In a Hypertext system, any object, whether it describes a piece of data (e.g., text, video, or audio) or a physical thing (e.g., hardware, software, person, building, document) can link to any other object. It does not matter where, physically, the object resides. Hypertext systems are particularly useful for organizing large amounts of disparate information. The World Wide Web (WWW) is a hypertext system that is clearly not a single database. The CMDB, like the WWW, is a logical construct that references many sources of information and physical objects. Forget the idea of the single, all-encompassing, database. Start thinking about linking together all the collections of information you already have and use in your day to day activities. This is what a CMDB really is. I hope that you now understand that there is no such a thing as a single CMDB, and have an idea of how to start creating your own Configuration Management Databank! Uncovering Your Own CMDB Know that you understand what a CMDB actually is; you can start to think about uncovering your own. I say uncovering because virtually every single IT organization already has many repositories of data and information. http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm 7/9/2006
  • 4. Configuration Management for the Rest of Us Page 3 of 5 Somewhere in your organization there are records regarding hardware and software models, versions, etc. Without a doubt you have their manuals and software CD-ROMs nearby. Right now, someone has an Excel spreadsheet with records of office system configurations. Finance has an asset register tracking hardware and software purchased. Someone else is using Access to track software licenses. Over there is a shelf holding user manuals, next to that is a closet with spare hardware. Elsewhere there are diagrams of services, circuits, and systems in Visio or maybe PowerPoint. My first point is that CM is the process of managing the information relating to your infrastructure. My second point is that you most likely have a huge amount of CM data and information already in place — you probably just never thought of it this way before. Commonly, IT organizations have much of the data but lack a single process for managing and using the data. Without such management control the data is not available to other processes or kept up to date. The first step is to locate all of the sources of information relating to your hardware and software. Don't worry about a single repository for Incident, Problem, Known Error, or Change records for now. (You probably already have a system that tracks Incidents, Problems, and Known Errors or their equivalent right now — your ticketing system.) Focus instead on the CIs relevant to delivering your vital services. Locate the existing information repositories, but leave them in their current form for now. Your goal is not to impose major new projects on existing teams, but rather to locate sources of data and formalize their maintenance and control. Create a spreadsheet of where your configuration information resides. With this simple step of locating the sources of data and taking them under management control, you now have a CMDB and can begin to realize the benefits of CM! Getting Started Now that you know you can have a CMDB and a CM process that delivers real value relatively quickly and inexpensively, you need a plan. Here is a plan to get you going. Planning — A CM process begins with a plan. Your CM plan needs to include: purpose and scope of CM a description of the CIs and services to which the CM plan applies a time line showing important CM activities completion a description of current and expected CM tools (e.g. what you have and expect to find) related documentation such as existing CM plans or plans from suppliers a listing of relevant documents and their interrelationships policies describing CM management activities the organization, responsibilities and authorities of relevant interested parties qualifications and training of staff to support CM criteria for the selection of CIs frequency, distribution, and control of reports The CM plan must explain and describe how you plan to achieve each of the following CM process activities. The ITIL provides great detail on these, so the following are highlights only. Identification — the selection and identification of CIs and their relationships. Identification includes assigning unique identifiers and version numbers to CIs, applying labels to CIs as appropriate, and entering the CI into the appropriate databank. For service-level CIs, the selection of resource-level CIs and the descriptions of their interrelationships should describe the services' structure. Good selection and identification criteria include: regulatory requirements http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm 7/9/2006
  • 5. Configuration Management for the Rest of Us Page 4 of 5 g y q criticality in terms of risks and safety new or modified technology interfaces with other CIs procurement conditions support and service considerations Control — procedures that ensure no change to any CI without controlling documentation such as an updated service or product specification, or a RFC. In your CM plan, define how you will accurately update CMDB records. Include: management authorizations and relationships of those in authority procedures for control of changes to CI records within the CMDB methods to communicate changes from physical CIs to their CMDB records Status Accounting — reporting on changes to CIs throughout their lifecycle. Include methods to track CIs from ordering to depreciation. Unlike Control, Status Accounting seeks to maintain a historical record for the CI. This includes baselines, linked Incident, Problems, Known Errors, etc. methods for collecting, recording, processing and maintaining status accounting records definition of the content and format for all configuration status accounting reports Verification and audit — a series of reviews to verify the presence and configuration of CIs with their respective records within the CMDB. Include in the plan: a list of audits planned procedures to be used authorizations required (within and without IT) description of report and expected contents Configuration Care and Feeding Summary Remember, the real purpose of CM and the CMDB is to control CIs. Initially, use the CMDB to enhance maintenance decisions, expand into using the CMDB to evaluate Requests for Change (RFCs) in support of Change and Release Management. To support Change Management, identify critical components (CIs) that underpin key systems or applications. Some common examples of these types of CIs include: power supplies shared servers central routers and switches high worth users shared applications high speed network connections vital audit, security, and production systems With the sources of configuration information located, your next step is to combine CI information into services. This requires more work, so start small. Focus on new services, or “problem” services in need of improvement. Start by defining service CIs – composed of these critical infrastructure CIs. This will help stabilize your infrastructure by reducing unexpected consequences of changes. Following the rest of the CM process defined in the ITIL allows you to maintain the integrity of the CMDB as d i E bli h bj i b i h i l i d CM l http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm 7/9/2006
  • 6. Configuration Management for the Rest of Us Page 5 of 5 you expand it. Establish management objectives to bring other services or locations under CM control. Perform audits to ensure integrity and find new CIs. Begin to use the CMDB for impact analysis for Changes. Relate Incidents, Problems, and Known Errors to services and specific CIs in the CMDB. Over time, you can migrate to new systems if required. You will know what you need, and how to achieve it. You might even find it worthwhile to purchase a system — and you will have established the value proposition to justify them. With your new understanding, and your plan in hand, you are ready to realize the benefits of Configuration Management! -Where to go from here: Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. Download this article in PDF format for use at your own convenience, click here. Browse back-issues of the DITY Newsletter, click here. Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved. http://www.itsmsolutions.com/newsletters/DITYvol2iss27.htm 7/9/2006