Granular configuration automation is here! sep1st 2010

  • 629 views
Uploaded on

Learn what the exciting Granular Configuration Automation approach is all about and how visibility into granular configuration can reduce risk to environment stability, security and compliance.

Learn what the exciting Granular Configuration Automation approach is all about and how visibility into granular configuration can reduce risk to environment stability, security and compliance.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
629
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
11
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Granular Configuration Automation Is Here!
    An Introduction to Granular Configuration Automation
  • 2. Something is broken
  • 3.
  • 4. THE RISK OF DOWNTIME IN NUMBERS
  • 5. THE RISK OF DOWNTIME IN NUMBERS
  • 6. THE RISK OF DOWNTIME IN NUMBERS
  • 7. THE RISK OF DOWNTIME IN NUMBERS
  • 8.
  • 9. Critical Financial Information Leaked
    Erroneous ATM Transactions
    Major Slowdown
    in Retail Banking System
    Duration : A few weeks
    Impact
    • Lost credibility
    • 10. Customers sue
    • 11. IT staff spends days plugging holes
    • 12. Full IT reorganization
    Duration: 2 weeks
    Impact
    • Customer complaints skyrocket
    • 13. Employee productivity falls by 20%
    • 14. 10 IT people dedicated to investigation efforts
    Duration : 2 days
    Impact
    • Class action lawsuit pending
    • 15. IT staff puts in days to recover
    The Cause?a single file was not properly deployed during a patch deployment…
    The Cause?a JAR file was not properly configured to production database during release
    The Cause? a debug switch on one of the application servers was turned on…
  • 16. IBM WebsphereApplication Server
    holds over
    16,000
    configuration parameters
    alone
  • 17. SURVEY: HOW VALUABLE IS GRANULAR CONFIGURATION INFORMATION ?
    Over 75%
    “VERY VALUABLE“
    114 IT Infrastructure and Operations managers
  • 18. WHY NOW?
    LIMITED VISIBILITY INTO GRANULAR CONFIGURATION
    NEW IT INFRASTRUCTURE
    COMPLEXITY
    DYNAMICS
    Virtualization and Deployment Automation result in limited visibility into environment configuration
    Significant increase inpace of change
    (monthly releases, daily updates)
    16,000 Configuration parameters to Websphere Application Server alone…
    STABILITY
    EFFICIENCY
    COMPLIANCE
  • 19. WHAT IS GRANULAR CONFIGURATION AUTOMATION
  • 20.
  • 21. PILLARS OF GRANULAR CONFIGURATION AUTOMATION EFFECTIVENESS
    DISCOVER an IT environment's configuration at the most granular level
    ANALYZE the high volume of identified granular information to focus on what matter most
    PRESENT information essential for IT automation such as a detailed bill-of-material, granular changes, configuration differences etc. in a clear, easily available manner
  • 22. POTENTIAL APPLICATIONS
    PUTTING GRANULAR CONFIGURATION TO USE
    • Tap into environments’ configuration information at the granular level
    • 23. Leverage granular information for many different applications
    Granular
    Configuration
    Release Validation
    Incident Investigation
    Granular
    Configuration
    Incident Prevention
    Knowledge
    Granular
    Configuration Information
    Cloud
    Disaster Recovery  Verification
    Virtualization
    Compliance
    Security
  • 24. GRANULAR CONFIGURATION AUTOMATION ENHANCES ITIL V3 INITIATIVES
    Less Risk, More Uptime and Greater Stability
  • 25. TAMING THE VITUALIZATION BEAST
    Virtualization brings new configuration challenges.
    Granular Configuration Automation Can Help.
  • 26. “The benefits of virtualization are eroded when virtual machine go unchecked”
    eWeek
    VIRTUALIZATION BENEFITS ARE BEING UNDERMINED
    “Virtual Machine Sprawl Is a Rising Datacenter Cost”
    IDC
    “The downside of virtualization is losing the visibility into my environment”Jon Blomeier, Hershey
    “A top-down, application-centric approach is needed”
    Forrester
  • 27. VIRTUALIZING IT ENVIRONMENT – REAL CONFIGURATION CHALLENGES
    LIMITED VISIBILITY INTO VM CONTENT
    • The VM encapsulates the guest environment turning it into black box
    • 28. Dynamic allocation of VMs skews visibility into the environment architecture and configuration
    • 29. Abundant amounts of environmental information hide real issues
    SPRAWL
    • Ease of VM deployment causes uncontrolled spread of VMs
    • 30. Drift/deviation from desired configuration create risks from application to virtual infrastructure
    • 31. “Invisible” images
    ?
    “The cost of managing virtual environments may be higher than expected…”Gartner
    ?
    ?
    ?
    LIMITING INFRASTRUCTURE PERSPECTIVE
    • Separation of virtual infra from guest content drives management by VM rather than by the application
    • 32. The focus of virtualization vendors on just the virtualization platform complicates business application management for an enterprise
  • HOW GRANULAR CONFIGURATION AUTOMATION HELPS
    DELIVERS GRANULAR VISIBILITY INTO THE VM CONTENT
    • Top-down: application > application infrastructure > guest OS > virtual infrastructure
    • 33. Turn date overflow into actionable information through impact knowledge base
    CONTROL SPRAWL AND MANAGE DRIFT
    • Powerful end-to-end environment (and not server) comparison
    • 34. Compare inherently different environments
    • 35. Apply analytics to focus on what matters most
    APPLIES AN APPLICATION-LEVEL PERSPECTIVE
    • Logical architecture view independent of physical or virtual topology
    • 36. Combine virtual and physical environments into a single view to control heterogeneous environments
    • 37. Out-of-the-box support for common application technologies (Websphere AS, Websphere PS, WebLogic, Jav, .NET, ASP.NET applications and more)
    • 38. Visual modeling of custom applications (no programming)
  • CMDB IS DEAD, LONG LIVE CMDB
  • 39. GRANULAR CONFIGURATION AND CMDB: A HOLISTIC APPROACH
    Enriching CMDB with granular information
    1
    CMDB
    Configuration Verification and Audit – ensuring exact representation of production
    IT Environment
    2
    CMDB
  • 40. KEEP IT TICKING
    When any little mis-configuration of a single parameter poses high risk to your environment, you need Evolven Comparison for detecting threats and minimizing downtime.
    Evolven Comparison™A Granular Configuration Automation Solution
  • 41. EVOLVEN COMPARISON OVERVIEW
    • A Granular Configuration Automation solution that helps to obtain and maintain environment stability
    • 42. Identify and analyzechanges and differences that put environment stability at risk, by:
    • 43. Comparing different environments
    • 44. Comparingcurrent environment with its historical working snapshot or golden baseline
    • 45. Key capabilities:
    • 46. Compares the entire environment (applications and underlying infrastructure)
    • 47. Compares environment configuration and content in-depth
    • 48. Analyzes changes and differences with focus on criticality and impact
  • EVOLVEN SOLUTIONSLess Risk, More Uptime and Greater Stability
    Release Validation
    Incident Investigation
    Release with Confidence
    Brings certainty and reduce risk, by assuring integrity in environments, providing visibility into the release content and ensuring that the release transitions as expected
    A High Stakes Race Against Time
    Slash investigation time and effort by a staggering 50%, minimize system downtime and prevent incidents from impacting overall operations
    Disaster Recovery Verification
    ITIL
    Don't Let Your Disaster Recovery Environment Let You Down
    Verify consistency and integrity of your disaster recovery environment, and enable a compliant environment that won't let you down
    Boost Your ITIL Initiatives
    Evolven Comparison assists in many ITIL v3 areas – helping customers achieve less risk, more uptime and greater stability.
    LEARN MORE:
    Virtualization
    http://www.evolven.com/solutions.html
    Tame the Virtualization Beast
    Take control of virtualization’s new configuration challenges and risk: manage drift, ensure integrity and control sprawl. Reduce outage risk and minimize downtime
  • 49. LEARN MORE
    THANK YOU!
    Evolven Solutionshttp://www.evolven.com/solutions.html
    Videos, Presentations etc.
    http://www.evolven.com/newsroom/resources.html
    Feedback, Ideas, Questions:
    Martin Perlin – Director of Marketing
    martin@evolven.com
    Bloghttp://www.evolven.com/blog