SlideShare a Scribd company logo
© 2015 ServiceNow All Rights Reserved 1Confidential
Configuration Management
DataBase (CMDB)
Puru Amradkar
© 2015 ServiceNow All Rights Reserved 2Confidential
What is a CMDB?
A Configuration Management Database is a
powerful single system of record of
configuration items. When properly
maintained, it provides an essential
component for successful deployment of IT
Operations Management, IT Service
Management, Asset Management,
Compliance and Configuration Management.
CMDB
© 2015 ServiceNow All Rights Reserved 3Confidential 3
Why do you need a CMDB?
© 2015 ServiceNow All Rights Reserved 4Confidential
Use Cases for a CMDB
 Configuration Management
 Business Application Impact Analysis
 Asset Management/Financial Optimization
 Compliance
© 2015 ServiceNow All Rights Reserved 5Confidential
Enterprise Cloud
Cloud Management
Orchestration
Discovery
Event Management
Service
Mapping
HR
Facilities
Marketing
Legal
Finance
Change
Incident
Problem
Financial
Management
Risk
Audit
Vendor
SDLC
Demand
Resource Project
Security
Operations
Customer
Service
Field
Asset
Test
More
CMDB
Security
Application
Logic
Application
Development
Analytics
User
Experience
Vulnerability
Response
Secure
Integrations
Secure
Integrations
© 2015 ServiceNow All Rights Reserved 6Confidential
ServiceNow CMDB is Enterprise Services Repository
Accurate, Comprehensive, Real-time store for Infrastructure and Services
This foundation is essential for automation of any part of Infrastructure
and Services
Why ServiceNow CMDB?
© 2015 ServiceNow All Rights Reserved 7Confidential
Key Differentiators
ServiceNow
• Part of ServiceNow platform
• Real time , scalable enterprise
services repository
• Drives all aspect of service life
cycle
• Actionable data quality insights
Competitors
• Premium charged for CMDB
• Stage CMDB
• Integrated with multiple products
to drive service life cycle
• Basic data quality insights
© 2015 ServiceNow All Rights Reserved 8Confidential 8
Business Application Impact Analysis
 IT Service Management
 Data Center Migration
 Event Management
© 2015 ServiceNow All Rights Reserved 9Confidential 9
Business Application Impact Analysis
 IT Service Management
 Data Center Migration
 Event Management
© 2015 ServiceNow All Rights Reserved 10Confidential
Lost in Translation Infrastructure Perspective
Servers
Applications
Storage
Virtualization
Cloud
Network
Uh, oh. The disk drive on this server just crashed.
What services are going to be impacted?
Business Perspective
Sales CRM System
Customer Support
Financial Reporting
HR Benefits Site
Uh, oh. The disk drive on this server
What services are going to be im
What is going on with our HR Benefits website?
It is soooo slow.
g on with our HR Benefits website?
It is soooo slow.
We are going to need to apply a patch to some of
our older Windows servers. Who are the service
owners I need to notify?
We are going to need to apply a patch
older Windows servers. Who are the s
need to notify?
We have a busy season coming up. How much can
my service handle and can I add more capacity?
© 2016 ServiceNow All Rights ReservedConfidential
#Know16
© 2016 ServiceNow All Rights Reserved
© 2015 ServiceNow All Rights Reserved 11Confidential
Services
Service-Oriented CMDB
Infrastructure Perspective
Servers
Applications
Storage
Virtualization
Cloud
Network
Business Perspective
Sales CRM System
Customer Support
Financial Reporting
HR Benefits Site
© 2016 ServiceNow All Rights ReservedConfidential
#Know16
© 2016 ServiceNow All Rights Reserved
© 2015 ServiceNow All Rights Reserved 12Confidential
What Are Service Models?
ITIL
A Service Model is a hierarchical model of the services, assets and the infrastructure
created by recording the relationships in the CMDB between configuration items.
© 2015 ServiceNow All Rights Reserved 13Confidential 13
© 2015 ServiceNow All Rights Reserved 14Confidential
Automatically Populating the CMDB from Multiple Sources
Service Mapping
Horizontal Discovery
Automated Top-Down Discovery
Infrastructure Discovery & Mapping
3rd Party CI Source
3rd Party CI Source
SN CMDB
© 2015 ServiceNow All Rights Reserved 15Confidential
Service Mapping
Populating the ServiceNow CMDB for Impact Analysis
Automated Top-down Discovery
CMDB
Credit Check Human Resources E-Banking
Automated CI
Identification/
Reconciliation
© 2015 ServiceNow All Rights Reserved 16Confidential
Business Applications
• It is an application that is understood and delivered to business customers to support a
related set of interactions or internal business activities. It supports one or more
business functions known internally to the business as well as to IT.
• The business layers are often underpinned by one or more IT services and supports
peer-2-peer relationships to model dependencies and drive improved impact analysis.
• Examples are Customer Management and Human Resources
What is a Business Application?
© 2015 ServiceNow All Rights Reserved 17Confidential
The Solution: Business Application Mapping
• Understand the architecture of the applications to map
– What is the application server, database, web server, messaging server on which it depends
– How are these components configured to communicate to one another
• Configuration files
• Database entries
• Web Service calls
• Access credentials at for the operating systems of these servers to discover these
components
Requirements to map a Business Application
© 2015 ServiceNow All Rights Reserved 18Confidential 18
Business Impact Analysis
 IT Service Management
 Data Center Migration
 Event Management
© 2015 ServiceNow All Rights Reserved 19Confidential
Business Service Impact Analysis
IT SERVICE MANAGEMENT
Managing an Incident or Problem on technology
requires an understanding of the impacted
business service in order to determine an
accurate urgency for the incident.
Performing a Change on technology without
understanding the impact on business services
can result in a disruption of the service.
CMDB
Incident Management Problem Management Change & Release Mgmt.
© 2015 ServiceNow All Rights Reserved 20Confidential
Business Application
IT Service Management without a CMDB
Complex BUSINESS APPLICATIONS are made up of
components that are supported by several SERVERS
and NETWORK DEVICES
The SERVERS and NETWORK DEVICES on which
the BUSINESS APPLICATIONS run can be
anywhere in the Data Center
And might move to different SERVERS on a
regular basis
Business Application Data Center
© 2015 ServiceNow All Rights Reserved 21Confidential
IT Service Management without a CMDB
Without an accurate CONFIGURATION
MANAGEMENT DATABASE, any change to a
device in the Data Center could affect a critical
BUSINESS APPLICATION and the affect will not
be known until it is too late!
Business Application
Data Center
✖
Change Management
© 2015 ServiceNow All Rights Reserved 22Confidential
IT Service Management with a CMDB
With an accurate CONFIGURATION MANAGEMENT DATABASE, populating
Business Services and their relationship to the technical infrastructure, the affect
to the business will be known immediately.
Changes will not affect Business Continuity.
Business Application
Data Center
✔ CMDB
App
Top-Down Business
Service Discovery
App
Change Management
© 2015 ServiceNow All Rights Reserved 23Confidential 23
Business Application Impact Analysis
 Data Center Migration
 IT Service Management
 Event Management
© 2015 ServiceNow All Rights Reserved 24Confidential
The CMDB is populated
with infrastructure
components and Business
Applications
CMDB: Data Center Migration Workflow
Data Center
Move Strategy
Budgeting
Site Selection
Establish Schedule
Data Center
Discovery
Analysis & Planning Execution
Physical/Virtual Inventory
Application Mapping
Component Dependencies
Dependency Analysis
Establish Move Groups
Command Center Management
Real-Time Communication
Physical/Virtual Migration
CMDB
© 2015 ServiceNow All Rights Reserved 25Confidential
Configuration
Items
Infrastructure
Discovery
ServiceNow
Discovery
• CMDB is populated with
infrastructure and top-down
discovery
• Repeated discoveries track
changes in dynamic
environments
CMDB: Data Center Migration
Service Maps
Top-Down
Business
Discovery
Email
Credit Check E-Banking
ServiceWatch
Discovery
CMDB
© 2015 ServiceNow All Rights Reserved 26Confidential
Data Center Migration: Dependency Analysis
• Identify a server that will be
involved in a data center move
or reconciliation.
• Query CI and Immediately
View Dependencies
• Click on Map View to see
Dependencies
© 2015 ServiceNow All Rights Reserved 27Confidential
Data Center Migration: Dependency Analysis
Dependent
Database
Server
Dependent
Application
Server
© 2015 ServiceNow All Rights Reserved 28Confidential 28
Business Impact Analysis
 Event Management
 IT Service Management
 Data Center Migration
© 2015 ServiceNow All Rights Reserved 29Confidential
NETWORK OPERATIONS
CENTER (NOC)
Infrastructure Monitoring without the CMDB
Events/
Metrics
• Typical NOC Centers only
Monitor Technology
THERE ARE INCIDENTS ON SERVERS?
HOW IS IT AFFECTING THE BUSINESS?
• There is no Business
Context from Events
• Proper Urgency or Business
Impact cannot be
Determined
Data Center
Urgency? Impact? Severity?
© 2015 ServiceNow All Rights Reserved 30Confidential
Data Center
Infrastructure Monitoring with the CMDB
• A Populated CMDB
with Mapped
Business Services
provides Business
Context to Events
• Network Operators
can now address
Incidents with the
Necessary Priority
Application Events
Server Events
Network Events
NETWORK OPERATIONS
CENTER (NOC)
Urgency?
Financial
App
Impact?
Operations
Severity?
HR App
CMDB
Service Maps
Automated Discovery
© 2015 ServiceNow All Rights Reserved 31Confidential 31
Asset Management/Financial Optimization
© 2015 ServiceNow All Rights Reserved 32Confidential
Asset Management/Financial Optimization
How do you know what software applications are installed in your organization?
How do you manage the Lifecycle of hardware and software from purchase request to
delivery?
Do you know which software applications are installed for which your company does
not have sufficient licenses?
Do you know where you are paying maintenance on software licenses that you are not
using?
Questions to ask a customer:
© 2015 ServiceNow All Rights Reserved 33Confidential
Populating the ServiceNow CMDB for Asset Management
Automated CI
Identification/
Reconciliation
Horizontal Discovery
CMDB
Infrastructure Discovery & Mapping
3rd Party Integration Home Grown
• Blazent
• BDNA
• SCCM
© 2015 ServiceNow All Rights Reserved 34Confidential
• CMDB is populated with
infrastructure discovery
• Software and hardware
assets are inventoried
and tracked against
contracts and software
licenses
Asset Management and the CMDB
Asset Reports
ServiceNow
Discovery
Software and
Hardware Assets
Configuration
Items
CMDB
Asset Artifacts
Procurements
Contracts
Software Licenses
Consumables
Configuration Items
© 2015 ServiceNow All Rights Reserved 35Confidential 35
Compliance
© 2015 ServiceNow All Rights Reserved 36Confidential
CMDB Compliance for Configuration Audits
• Show that the latest patches are installed on all Operating Systems, Databases, and
critical sub-systems
• Prove that there is a QA Server for each Server in Production
• Make sure there is no single point of failure for clustered databases and application
servers
Example Configuration Audits:
© 2015 ServiceNow All Rights Reserved 37Confidential
CMDB: Compliance and Audits
Auditing the Infrastructure
• Internal corporate procedures
and government regulations
require time-consuming
compliance and auditing of
applications and servers
• Performing such audits manually
can take weeks of effort or can
be done quickly automatically
with an accurately populated
CMDB
© 2015 ServiceNow All Rights Reserved 38Confidential
Populating the ServiceNow CMDB for Compliance Reports
Automated CI
Identification
Horizontal Discovery
Service Mapping
Infrastructure Discovery & Mapping
Automated Top-down Discovery
CMDB
© 2015 ServiceNow All Rights Reserved 39Confidential
Example Configuration Audits
• Show that we have the latest
patches installed on our
Operating Systems, Databases,
Operating Systems, and critical
sub-systems
• Prove that we have a QA Server
for each Server in Production
• Make sure there is no single
point of failure for our clustered
databases and application
servers
Compliance: Configuration Audits
CMDB
Configuration
Items
Configuration
Items
Infrastructure
Discovery
ServiceNow
Discovery
Audit Reports
© 2015 ServiceNow All Rights Reserved 40Confidential 40
Compliance
Actual versus Desired State
© 2015 ServiceNow All Rights Reserved 41Confidential
Compliance: Actual versus Desired State
A “Desired State” is set to CMDB data
Configuration Items as necessary in order to
ensure that resources adhere to standards such
as memory and disk space or patch levels.
C.I.
C.I. C.I.
C.I. Windows Host
Attribute OS Version
Desired State Windows 6.3.9600
Actual State Windows 6.1.7601
Attribute Memory
Desired State 8192 MB
Actual State 4096 MB
Attribute OS Service Pack
Desired State Service Pack 2
Actual State Service Pack 1
Attribute Disk Space (GB)
Desired State 85899345920
Actual State 42949672960
© 2015 ServiceNow All Rights Reserved 42Confidential
Compliance: Actual versus Desired State
The Change process will set
the “Desired State”.
Discovery will populate the
“Actual State”.
C.I.
C.I. C.I.
C.I. Windows Host
Attribute OS Version
Desired State Windows 6.3.9600
Actual State Windows 6.1.7601
Attribute Memory
Desired State 8192 MB
Actual State 4096 MB
Attribute OS Service Pack
Desired State Service Pack 2
Actual State Service Pack 1
Attribute Disk Space (GB)
Desired State 85899345920
Actual State 42949672960
ServiceNow
Platform
ServiceNow
Discovery
Infrastructure
Discovery
Configuration
Items
Change
Process
© 2015 ServiceNow All Rights Reserved 43Confidential
Compliance: Actual versus Desired State
C.I.
C.I. C.I.
C.I. Windows Host
Attribute OS Version
Desired State Windows 6.3.9600
Actual State Windows 6.1.7601
Attribute Memory
Desired State 8192 MB
Actual State 4096 MB
Attribute OS Service Pack
Desired State Service Pack 2
Actual State Service Pack 1
Attribute Disk Space (GB)
Desired State 85899345920
Actual State 42949672960
The desired state report
gets generated reporting
the CIs that fail to match
the actual versus desired
state.
© 2015 ServiceNow All Rights Reserved 44Confidential 44
Configuration Management
© 2015 ServiceNow All Rights Reserved 45Confidential
CMDB driving Configuration Management/Cloud Automation
• Strategic software deployments for QA, Staging or Production require deploying
multiple software components and configuring dependencies
• Regular maintenance requires deployment of patches and updates to software
components
• In the event of a disaster, an emergency deployment of software is necessary to
continue normal business operations
Example Configuration Management Scenarios:
© 2015 ServiceNow All Rights Reserved 46Confidential
Configuration Management
Data Center
CMDB
Configuration
Scenarios
Orchestration and
Cloud Automation
© 2015 ServiceNow All Rights Reserved 47Confidential 47
Cloud Infrastructure Management
© 2015 ServiceNow All Rights Reserved 48Confidential
CMDB in Cloud Infrastructure
• Hierarchical Configuration Items (CI)
- Datacenter CI, Rack CI, Server CI
- Instance CI, Application, Database CI
• Keeping CIs healthy
- Discovery to keep it fresh
- Actual vs Desired
- Audit framework
- Audit tests
• Data sync with other systems
CMDB
Cloud Automations
• Provisioning
• AHA
• Cloning
• Retire
• Rename instance
Data Center Operations
• Hardware additions
• Capacity management
• Inventory
• Usage, Growth
• More …
Systems Engineering
• Monitoring
• Patching
• Planned maintenance
• More..
Network Management
• Hardware additions
• Network operations
• VPN settings
• More …
Operations Center,
Support
• Live site support
• Disaster recovery
• Customer requests
• More..
Others
© 2015 ServiceNow All Rights Reserved 49Confidential
Thank you

More Related Content

What's hot

Change Management ITIL
Change Management ITILChange Management ITIL
Change Management ITIL
dkmorgan51
 
Managed it services
Managed it servicesManaged it services
Managed it services
Gss America
 
CMDB as a Corporate Asset
CMDB as a Corporate AssetCMDB as a Corporate Asset
CMDB as a Corporate Asset
Abbas Haider Ali
 
CMDB Building Blocks
CMDB Building BlocksCMDB Building Blocks
CMDB Building Blocks
Joshua Schuller
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
Antonio Rolle
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 
Digital Operating Model & IT4IT
Digital Operating Model & IT4ITDigital Operating Model & IT4IT
Digital Operating Model & IT4IT
David Favelle
 
Running the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4ITRunning the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4IT
cccamericas
 
ITSM and ITOM Coming Together
ITSM and ITOM Coming TogetherITSM and ITOM Coming Together
ITSM and ITOM Coming Together
OpsRamp
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
Axios Systems
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
David Castro
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs
 
Kunalhasija CMDB & ITIL
Kunalhasija CMDB & ITILKunalhasija CMDB & ITIL
Kunalhasija CMDB & ITIL
Kunal Hasija
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog OverviewChristopher Glennon
 
Introducing ITIL
Introducing ITILIntroducing ITIL
Introducing ITIL
Robert Thomas
 
ITS Managed Services Introduction
ITS Managed Services IntroductionITS Managed Services Introduction
ITS Managed Services Introduction
Jorge Sebastiao
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
Razak Mohammed Ali
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
Marvin Sirait
 
Large-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSCLarge-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSC
Amazon Web Services
 

What's hot (20)

Change Management ITIL
Change Management ITILChange Management ITIL
Change Management ITIL
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
CMDB as a Corporate Asset
CMDB as a Corporate AssetCMDB as a Corporate Asset
CMDB as a Corporate Asset
 
CMDB Building Blocks
CMDB Building BlocksCMDB Building Blocks
CMDB Building Blocks
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
Digital Operating Model & IT4IT
Digital Operating Model & IT4ITDigital Operating Model & IT4IT
Digital Operating Model & IT4IT
 
Running the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4ITRunning the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4IT
 
ITSM and ITOM Coming Together
ITSM and ITOM Coming TogetherITSM and ITOM Coming Together
ITSM and ITOM Coming Together
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
 
Kunalhasija CMDB & ITIL
Kunalhasija CMDB & ITILKunalhasija CMDB & ITIL
Kunalhasija CMDB & ITIL
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog Overview
 
Introducing ITIL
Introducing ITILIntroducing ITIL
Introducing ITIL
 
ITS Managed Services Introduction
ITS Managed Services IntroductionITS Managed Services Introduction
ITS Managed Services Introduction
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
Large-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSCLarge-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSC
 

Similar to CMDB - Use Cases

The value of SAAS for ITSM
The value of SAAS  for ITSM The value of SAAS  for ITSM
The value of SAAS for ITSM
IT Service and Support
 
Improve IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and IronstreamImprove IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and Ironstream
Precisely
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
CA Technologies
 
Transformational IT Management in the Application Economy
Transformational IT Management in the Application EconomyTransformational IT Management in the Application Economy
Transformational IT Management in the Application Economy
CA Technologies
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
CA Technologies
 
HGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint DesignHGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint DesignHGConcept Inc.
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
CA Technologies
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
CA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
CA Technologies
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Codemotion
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
CA Technologies
 
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
AppDynamics
 
Improve Visibility and Control using ServiceNow CMDB.pdf
Improve Visibility and Control using ServiceNow CMDB.pdfImprove Visibility and Control using ServiceNow CMDB.pdf
Improve Visibility and Control using ServiceNow CMDB.pdf
Aelum Consulting
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld
 
Redefining End-to-End Monitoring: Service Model Integration
Redefining End-to-End Monitoring: Service Model IntegrationRedefining End-to-End Monitoring: Service Model Integration
Redefining End-to-End Monitoring: Service Model Integration
SL Corporation
 
APM Talk
APM TalkAPM Talk
APM Talk
MongoDB
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancialTim Hinkle
 
Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
Denny Muktar
 
Ensuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application EconomyEnsuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application Economy
CA Technologies
 

Similar to CMDB - Use Cases (20)

The value of SAAS for ITSM
The value of SAAS  for ITSM The value of SAAS  for ITSM
The value of SAAS for ITSM
 
Improve IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and IronstreamImprove IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and Ironstream
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Transformational IT Management in the Application Economy
Transformational IT Management in the Application EconomyTransformational IT Management in the Application Economy
Transformational IT Management in the Application Economy
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
 
HGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint DesignHGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint Design
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
 
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
 
Improve Visibility and Control using ServiceNow CMDB.pdf
Improve Visibility and Control using ServiceNow CMDB.pdfImprove Visibility and Control using ServiceNow CMDB.pdf
Improve Visibility and Control using ServiceNow CMDB.pdf
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
Redefining End-to-End Monitoring: Service Model Integration
Redefining End-to-End Monitoring: Service Model IntegrationRedefining End-to-End Monitoring: Service Model Integration
Redefining End-to-End Monitoring: Service Model Integration
 
APM Talk
APM TalkAPM Talk
APM Talk
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
 
Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
 
Ensuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application EconomyEnsuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application Economy
 

Recently uploaded

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 

Recently uploaded (20)

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 

CMDB - Use Cases

  • 1. © 2015 ServiceNow All Rights Reserved 1Confidential Configuration Management DataBase (CMDB) Puru Amradkar
  • 2. © 2015 ServiceNow All Rights Reserved 2Confidential What is a CMDB? A Configuration Management Database is a powerful single system of record of configuration items. When properly maintained, it provides an essential component for successful deployment of IT Operations Management, IT Service Management, Asset Management, Compliance and Configuration Management. CMDB
  • 3. © 2015 ServiceNow All Rights Reserved 3Confidential 3 Why do you need a CMDB?
  • 4. © 2015 ServiceNow All Rights Reserved 4Confidential Use Cases for a CMDB  Configuration Management  Business Application Impact Analysis  Asset Management/Financial Optimization  Compliance
  • 5. © 2015 ServiceNow All Rights Reserved 5Confidential Enterprise Cloud Cloud Management Orchestration Discovery Event Management Service Mapping HR Facilities Marketing Legal Finance Change Incident Problem Financial Management Risk Audit Vendor SDLC Demand Resource Project Security Operations Customer Service Field Asset Test More CMDB Security Application Logic Application Development Analytics User Experience Vulnerability Response Secure Integrations Secure Integrations
  • 6. © 2015 ServiceNow All Rights Reserved 6Confidential ServiceNow CMDB is Enterprise Services Repository Accurate, Comprehensive, Real-time store for Infrastructure and Services This foundation is essential for automation of any part of Infrastructure and Services Why ServiceNow CMDB?
  • 7. © 2015 ServiceNow All Rights Reserved 7Confidential Key Differentiators ServiceNow • Part of ServiceNow platform • Real time , scalable enterprise services repository • Drives all aspect of service life cycle • Actionable data quality insights Competitors • Premium charged for CMDB • Stage CMDB • Integrated with multiple products to drive service life cycle • Basic data quality insights
  • 8. © 2015 ServiceNow All Rights Reserved 8Confidential 8 Business Application Impact Analysis  IT Service Management  Data Center Migration  Event Management
  • 9. © 2015 ServiceNow All Rights Reserved 9Confidential 9 Business Application Impact Analysis  IT Service Management  Data Center Migration  Event Management
  • 10. © 2015 ServiceNow All Rights Reserved 10Confidential Lost in Translation Infrastructure Perspective Servers Applications Storage Virtualization Cloud Network Uh, oh. The disk drive on this server just crashed. What services are going to be impacted? Business Perspective Sales CRM System Customer Support Financial Reporting HR Benefits Site Uh, oh. The disk drive on this server What services are going to be im What is going on with our HR Benefits website? It is soooo slow. g on with our HR Benefits website? It is soooo slow. We are going to need to apply a patch to some of our older Windows servers. Who are the service owners I need to notify? We are going to need to apply a patch older Windows servers. Who are the s need to notify? We have a busy season coming up. How much can my service handle and can I add more capacity? © 2016 ServiceNow All Rights ReservedConfidential #Know16 © 2016 ServiceNow All Rights Reserved
  • 11. © 2015 ServiceNow All Rights Reserved 11Confidential Services Service-Oriented CMDB Infrastructure Perspective Servers Applications Storage Virtualization Cloud Network Business Perspective Sales CRM System Customer Support Financial Reporting HR Benefits Site © 2016 ServiceNow All Rights ReservedConfidential #Know16 © 2016 ServiceNow All Rights Reserved
  • 12. © 2015 ServiceNow All Rights Reserved 12Confidential What Are Service Models? ITIL A Service Model is a hierarchical model of the services, assets and the infrastructure created by recording the relationships in the CMDB between configuration items.
  • 13. © 2015 ServiceNow All Rights Reserved 13Confidential 13
  • 14. © 2015 ServiceNow All Rights Reserved 14Confidential Automatically Populating the CMDB from Multiple Sources Service Mapping Horizontal Discovery Automated Top-Down Discovery Infrastructure Discovery & Mapping 3rd Party CI Source 3rd Party CI Source SN CMDB
  • 15. © 2015 ServiceNow All Rights Reserved 15Confidential Service Mapping Populating the ServiceNow CMDB for Impact Analysis Automated Top-down Discovery CMDB Credit Check Human Resources E-Banking Automated CI Identification/ Reconciliation
  • 16. © 2015 ServiceNow All Rights Reserved 16Confidential Business Applications • It is an application that is understood and delivered to business customers to support a related set of interactions or internal business activities. It supports one or more business functions known internally to the business as well as to IT. • The business layers are often underpinned by one or more IT services and supports peer-2-peer relationships to model dependencies and drive improved impact analysis. • Examples are Customer Management and Human Resources What is a Business Application?
  • 17. © 2015 ServiceNow All Rights Reserved 17Confidential The Solution: Business Application Mapping • Understand the architecture of the applications to map – What is the application server, database, web server, messaging server on which it depends – How are these components configured to communicate to one another • Configuration files • Database entries • Web Service calls • Access credentials at for the operating systems of these servers to discover these components Requirements to map a Business Application
  • 18. © 2015 ServiceNow All Rights Reserved 18Confidential 18 Business Impact Analysis  IT Service Management  Data Center Migration  Event Management
  • 19. © 2015 ServiceNow All Rights Reserved 19Confidential Business Service Impact Analysis IT SERVICE MANAGEMENT Managing an Incident or Problem on technology requires an understanding of the impacted business service in order to determine an accurate urgency for the incident. Performing a Change on technology without understanding the impact on business services can result in a disruption of the service. CMDB Incident Management Problem Management Change & Release Mgmt.
  • 20. © 2015 ServiceNow All Rights Reserved 20Confidential Business Application IT Service Management without a CMDB Complex BUSINESS APPLICATIONS are made up of components that are supported by several SERVERS and NETWORK DEVICES The SERVERS and NETWORK DEVICES on which the BUSINESS APPLICATIONS run can be anywhere in the Data Center And might move to different SERVERS on a regular basis Business Application Data Center
  • 21. © 2015 ServiceNow All Rights Reserved 21Confidential IT Service Management without a CMDB Without an accurate CONFIGURATION MANAGEMENT DATABASE, any change to a device in the Data Center could affect a critical BUSINESS APPLICATION and the affect will not be known until it is too late! Business Application Data Center ✖ Change Management
  • 22. © 2015 ServiceNow All Rights Reserved 22Confidential IT Service Management with a CMDB With an accurate CONFIGURATION MANAGEMENT DATABASE, populating Business Services and their relationship to the technical infrastructure, the affect to the business will be known immediately. Changes will not affect Business Continuity. Business Application Data Center ✔ CMDB App Top-Down Business Service Discovery App Change Management
  • 23. © 2015 ServiceNow All Rights Reserved 23Confidential 23 Business Application Impact Analysis  Data Center Migration  IT Service Management  Event Management
  • 24. © 2015 ServiceNow All Rights Reserved 24Confidential The CMDB is populated with infrastructure components and Business Applications CMDB: Data Center Migration Workflow Data Center Move Strategy Budgeting Site Selection Establish Schedule Data Center Discovery Analysis & Planning Execution Physical/Virtual Inventory Application Mapping Component Dependencies Dependency Analysis Establish Move Groups Command Center Management Real-Time Communication Physical/Virtual Migration CMDB
  • 25. © 2015 ServiceNow All Rights Reserved 25Confidential Configuration Items Infrastructure Discovery ServiceNow Discovery • CMDB is populated with infrastructure and top-down discovery • Repeated discoveries track changes in dynamic environments CMDB: Data Center Migration Service Maps Top-Down Business Discovery Email Credit Check E-Banking ServiceWatch Discovery CMDB
  • 26. © 2015 ServiceNow All Rights Reserved 26Confidential Data Center Migration: Dependency Analysis • Identify a server that will be involved in a data center move or reconciliation. • Query CI and Immediately View Dependencies • Click on Map View to see Dependencies
  • 27. © 2015 ServiceNow All Rights Reserved 27Confidential Data Center Migration: Dependency Analysis Dependent Database Server Dependent Application Server
  • 28. © 2015 ServiceNow All Rights Reserved 28Confidential 28 Business Impact Analysis  Event Management  IT Service Management  Data Center Migration
  • 29. © 2015 ServiceNow All Rights Reserved 29Confidential NETWORK OPERATIONS CENTER (NOC) Infrastructure Monitoring without the CMDB Events/ Metrics • Typical NOC Centers only Monitor Technology THERE ARE INCIDENTS ON SERVERS? HOW IS IT AFFECTING THE BUSINESS? • There is no Business Context from Events • Proper Urgency or Business Impact cannot be Determined Data Center Urgency? Impact? Severity?
  • 30. © 2015 ServiceNow All Rights Reserved 30Confidential Data Center Infrastructure Monitoring with the CMDB • A Populated CMDB with Mapped Business Services provides Business Context to Events • Network Operators can now address Incidents with the Necessary Priority Application Events Server Events Network Events NETWORK OPERATIONS CENTER (NOC) Urgency? Financial App Impact? Operations Severity? HR App CMDB Service Maps Automated Discovery
  • 31. © 2015 ServiceNow All Rights Reserved 31Confidential 31 Asset Management/Financial Optimization
  • 32. © 2015 ServiceNow All Rights Reserved 32Confidential Asset Management/Financial Optimization How do you know what software applications are installed in your organization? How do you manage the Lifecycle of hardware and software from purchase request to delivery? Do you know which software applications are installed for which your company does not have sufficient licenses? Do you know where you are paying maintenance on software licenses that you are not using? Questions to ask a customer:
  • 33. © 2015 ServiceNow All Rights Reserved 33Confidential Populating the ServiceNow CMDB for Asset Management Automated CI Identification/ Reconciliation Horizontal Discovery CMDB Infrastructure Discovery & Mapping 3rd Party Integration Home Grown • Blazent • BDNA • SCCM
  • 34. © 2015 ServiceNow All Rights Reserved 34Confidential • CMDB is populated with infrastructure discovery • Software and hardware assets are inventoried and tracked against contracts and software licenses Asset Management and the CMDB Asset Reports ServiceNow Discovery Software and Hardware Assets Configuration Items CMDB Asset Artifacts Procurements Contracts Software Licenses Consumables Configuration Items
  • 35. © 2015 ServiceNow All Rights Reserved 35Confidential 35 Compliance
  • 36. © 2015 ServiceNow All Rights Reserved 36Confidential CMDB Compliance for Configuration Audits • Show that the latest patches are installed on all Operating Systems, Databases, and critical sub-systems • Prove that there is a QA Server for each Server in Production • Make sure there is no single point of failure for clustered databases and application servers Example Configuration Audits:
  • 37. © 2015 ServiceNow All Rights Reserved 37Confidential CMDB: Compliance and Audits Auditing the Infrastructure • Internal corporate procedures and government regulations require time-consuming compliance and auditing of applications and servers • Performing such audits manually can take weeks of effort or can be done quickly automatically with an accurately populated CMDB
  • 38. © 2015 ServiceNow All Rights Reserved 38Confidential Populating the ServiceNow CMDB for Compliance Reports Automated CI Identification Horizontal Discovery Service Mapping Infrastructure Discovery & Mapping Automated Top-down Discovery CMDB
  • 39. © 2015 ServiceNow All Rights Reserved 39Confidential Example Configuration Audits • Show that we have the latest patches installed on our Operating Systems, Databases, Operating Systems, and critical sub-systems • Prove that we have a QA Server for each Server in Production • Make sure there is no single point of failure for our clustered databases and application servers Compliance: Configuration Audits CMDB Configuration Items Configuration Items Infrastructure Discovery ServiceNow Discovery Audit Reports
  • 40. © 2015 ServiceNow All Rights Reserved 40Confidential 40 Compliance Actual versus Desired State
  • 41. © 2015 ServiceNow All Rights Reserved 41Confidential Compliance: Actual versus Desired State A “Desired State” is set to CMDB data Configuration Items as necessary in order to ensure that resources adhere to standards such as memory and disk space or patch levels. C.I. C.I. C.I. C.I. Windows Host Attribute OS Version Desired State Windows 6.3.9600 Actual State Windows 6.1.7601 Attribute Memory Desired State 8192 MB Actual State 4096 MB Attribute OS Service Pack Desired State Service Pack 2 Actual State Service Pack 1 Attribute Disk Space (GB) Desired State 85899345920 Actual State 42949672960
  • 42. © 2015 ServiceNow All Rights Reserved 42Confidential Compliance: Actual versus Desired State The Change process will set the “Desired State”. Discovery will populate the “Actual State”. C.I. C.I. C.I. C.I. Windows Host Attribute OS Version Desired State Windows 6.3.9600 Actual State Windows 6.1.7601 Attribute Memory Desired State 8192 MB Actual State 4096 MB Attribute OS Service Pack Desired State Service Pack 2 Actual State Service Pack 1 Attribute Disk Space (GB) Desired State 85899345920 Actual State 42949672960 ServiceNow Platform ServiceNow Discovery Infrastructure Discovery Configuration Items Change Process
  • 43. © 2015 ServiceNow All Rights Reserved 43Confidential Compliance: Actual versus Desired State C.I. C.I. C.I. C.I. Windows Host Attribute OS Version Desired State Windows 6.3.9600 Actual State Windows 6.1.7601 Attribute Memory Desired State 8192 MB Actual State 4096 MB Attribute OS Service Pack Desired State Service Pack 2 Actual State Service Pack 1 Attribute Disk Space (GB) Desired State 85899345920 Actual State 42949672960 The desired state report gets generated reporting the CIs that fail to match the actual versus desired state.
  • 44. © 2015 ServiceNow All Rights Reserved 44Confidential 44 Configuration Management
  • 45. © 2015 ServiceNow All Rights Reserved 45Confidential CMDB driving Configuration Management/Cloud Automation • Strategic software deployments for QA, Staging or Production require deploying multiple software components and configuring dependencies • Regular maintenance requires deployment of patches and updates to software components • In the event of a disaster, an emergency deployment of software is necessary to continue normal business operations Example Configuration Management Scenarios:
  • 46. © 2015 ServiceNow All Rights Reserved 46Confidential Configuration Management Data Center CMDB Configuration Scenarios Orchestration and Cloud Automation
  • 47. © 2015 ServiceNow All Rights Reserved 47Confidential 47 Cloud Infrastructure Management
  • 48. © 2015 ServiceNow All Rights Reserved 48Confidential CMDB in Cloud Infrastructure • Hierarchical Configuration Items (CI) - Datacenter CI, Rack CI, Server CI - Instance CI, Application, Database CI • Keeping CIs healthy - Discovery to keep it fresh - Actual vs Desired - Audit framework - Audit tests • Data sync with other systems CMDB Cloud Automations • Provisioning • AHA • Cloning • Retire • Rename instance Data Center Operations • Hardware additions • Capacity management • Inventory • Usage, Growth • More … Systems Engineering • Monitoring • Patching • Planned maintenance • More.. Network Management • Hardware additions • Network operations • VPN settings • More … Operations Center, Support • Live site support • Disaster recovery • Customer requests • More.. Others
  • 49. © 2015 ServiceNow All Rights Reserved 49Confidential Thank you