SlideShare a Scribd company logo
1 of 45
Pre-Con Ed: Make Better Sense out
of the World of CMDB and Change
Management
John Weston
Sr. Principal Consultant, Service Management — CA Technologies
AMX29E
AGILE MANAGEMENT
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
© 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2016 presentation is intended for informational purposes only and does not
form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for
accuracy by CA.
Terms of this Presentation
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
INTRODUCTION
CMDB DEPLOYMENT GUIDELINES
ADVANCED CMDB FUNCTIONS
CHANGE AND CONFIGURATION MANAGEMENT
1
2
3
4
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CMDB Deployment Guidelines
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Management
 A service is any system, process, access or other capability that IT
provides its customers according to established expectations of
availability and quality.
 Configuration Items (CIs) are entities—usually subject to Change
Management—that are vital to the delivery of a defined service, including
– physical servers
– VMs
– applications
 Configuration Management is the process responsible for discovering and
maintaining baseline definitions of services, CIs, and CI relationships.
Definitions
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Management
 Establish CI inventory
 Create and manage CI and Service relationships and dependencies
 Manage CI and Service configuration baselines
 Support Root Cause Analysis and Change Impact Analysis
 Provide change detection and configuration drift analysis
 Drive Continuous Service Improvement for CI and Service
configurations through tolerance mapping
Functions and Benefits
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
General Guidelines for the CMDB
 Not every asset is a CI and not every CI is an asset. Here is a good guideline for
what constitutes a CI: is it subject to your Change Management policies?
 Assets can be entered into the Management Database (MDB) and give benefits to
Incident, Problem, and Change Management.
 Do not feel like you must discover everything in order to have a useful CMDB.
– You don’t necessarily need all possible attributes for a given CI
– You don’t need to model all CIs and Services in your infrastructure
 Keep change discovery and configuration remediation in the Management Data
Repositories (MDRs).
 Take a look at CA Configuration Automation. You probably have an entitlement to
it through CA Service Desk Manager.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Your Customers View IT
Service
End
Users
Identity
Manager
Firewall
Applications
Switch
Load
Balancer Portal
SAP
PSFT
Siebel
Web Services
3rd Party
applications
Web
Servers
Databases
Router
Mainframe
DatabaseThe end user doesn’t care about any of this
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Defining Services
 Services are often made
up of many layers
 Connecting layers is
what makes Services
useful but complicated
 We need to find these
connections to navigate
through the layers
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Hierarchies
Service
Layer
Service
Subset
Layer
System
Layer
Logical
Host
Layer
Physical
Host
Layer
Service
Sub-Service
Logical
Partition
Computer
Hardware
Storage
Hardware
Storage
LUN
Network
Zone
Firewall
Hardware
Network
Hardware
System
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service
Layer
Service
Subset
Layer
System
Layer
Logical
Host
Layer
Physical
Host
Layer
Peer-to-Peer Relationships
Storage
Hardware
Network
Hardware
Storage
LUN
Network
Zone
Firewall
Hardware
Service
Sub-Service
Computer
Hardware
System
Logical
Partition
Peer-to-Peer relationships should be considered carefully
because the more “sideways” steps you take the more
unclear it is if a potential dependency exists.
Dependency? Dependency? Dependency? Dependency?
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Structure Guidelines
Select the Appropriate Structure
Service Mgt = Hierarchy
System Mgt =
Technology-to-Technology
Cost Mgt =
Technology-to-Cost/Contract
Add / Remove hierarchy
layers as required
+
Technology layers can be
skipped if inappropriate
Start Simple….
Then build complexity…
Services, Systems & Computers
Adding Storage, Networks, etc..
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CI Relationship Guidelines
 Start with the out-of-the-box CI relationships
 Define Provider-Dependent relationships between two
Service layers and between CI Families in each Layer
 Modify the CMDB Visualizer relationship formatting
– Assign a different color to each Relationship Type
– Keep Black the peer-to-peer Relationship Types within a layer
– Keep in mind that peer-to-peer relationships will not show up
in the Visualizer when you use the Impact Analysis and Root Cause
Analysis filters
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Advanced CMDB Functions
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Transaction Work Area
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Transaction Work Area (TWA)
 The TWA is a staging area for storing, reviewing, and
modifying CI and CI relationship transactions before importing
them into the CMDB proper.
 Primary uses
– Avoid creating multiple records for what is actually one CI
– Avoid creating one record for what are actually multiple CIs
– Transform CI data to conform with CMDB policies, for example where
multiple MDRs have different naming conventions
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The TWA Process
 Load CI and CI relationship data into the TWA. Note that
reconciliation is not attempted at this point. Sources:
– The web interface
– GRLoader utility with the -lttwa (load into initial state) or -lttwar (load
into ready state) options
– Native SQL queries
 Modify the data as needed, using the Service Desk web
interface or native SQL queries.
From Discovery Source to the TWA
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The TWA Process
 Load data from the TWA into the CMDB using the
GRLoader utility with the -lftwa (load transactions from TWA)
or -lftwai (load from TWA and inactivate successful
transactions) options
From the TWA to the CMDB
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Item Reconciliation
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Item (CI) Reconciliation
 Purpose: assign imported CI attributes to
existing CIs where appropriate, and avoid
creating duplicates. Name = server1
Mac address =
11:11:11:11:11
Name = server1
Mac address =
22:22:22:22:22
Name = server1
Questions about these three imported CIs:
How many servers should we now have in the CMDB?
How do we determine the “surviving” CI or CIs?
What happens to eliminated duplicates?
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Reconciliation Priorities
 ID (ca_owned_resource uuid)
 Federated Data
– Federated Asset ID
– MDR Name
– MDR Class
 Reconciliation attributes
– Name
– Serial Number
– Asset Number
– System Name
– DNS Name
– MAC Address
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Reconciliation Rules
Name
Serial
Number
Asset
Number
System
Name DNS Name
MAC
Address Result
Unique Null Null Null Null Null CI created
Null Unique Null Null Null Null CI created
Null Null Unique Null Null Null CI created
Null Null Null Unique Null Null CI created
Null Null Null Null Unique Null CI created
Null Null Null Null Null Unique CI created
Duplicate Duplicate Duplicate Unique Duplicate Duplicate CI created
Unique Duplicate Duplicate Duplicate Duplicate Duplicate Recognized as duplicate CI
Null Null Null Null Unique Unique CI created
Null Null Null Null Duplicate Unique Recognized as duplicate CI
Null Null Null Null Unique Duplicate Recognized as duplicate CI
Duplicate Duplicate Unique Duplicate Duplicate Duplicate CI created
Duplicate Unique Duplicate Duplicate Duplicate Duplicate CI created
Duplicate Duplicate Duplicate Duplicate Duplicate Unique Recognized as duplicate CI
Duplicate Duplicate Duplicate Duplicate Unique Duplicate Recognized as duplicate CI
Duplicate Duplicate Duplicate Duplicate Unique Unique Recognized as duplicate CI
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Ambiguous Configuration Items
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Ambiguous CIs
 An ambiguous CI is one that may be a duplicate.
 A CI’s ambiguity index measures its potential for being a duplicate.
It is a count of all of the other CI attributes that match any of its
reconciliation attributes.
– It’s a simple sum of the counts of “CIs with matching name,” “CIs with matching serial
number,” etc.
– Example: Ambiguity Index 2 means that there are two matching attributes in the CMDB,
but they might be from the same CI.
 Calculate the ambiguity index by running the cmdb_update_ambiguity
command.
– Example: cmdb_update_ambiguity - m all - d MSSQL - u ServiceDesk - p
sdmpassword -s sdmserver1 –level info
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Dealing with Ambiguous CIs
 Identify them
– Scoreboard query
– Administration tab
– Reconciliation tab on a particular CI record
 Resolve them
– Do nothing or modify the offending CI attributes
– Mark as not ambiguous: removes the CI from lists of ambiguous CIs
– Inactivate the ambiguous CI: removes the CI from normal CI lists
– Supersede: a good option if one or more MDRs will continue to send
updates of the CI in question
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Superseded Configuration Items
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Superseded CIs
 As we saw previously, superseded CIs are sometimes created
when resolving ambiguous CIs
 Incoming updates to a superseded CI are redirected to the
superseding CI
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Should You Supersede This CI?
 For one-off updates it is better to fix input data than to supersede a CI.
Superseding generally will be used where you have little control over
incoming transactions.
 Superseded CIs are flagged as inactive and by default cannot be updated
via the web UI.
 Since a superseded CI will not be updated its attributes and other data are
allowed to atrophy.
 If you supersede a superseding CI then all updates will be redirected to the
higher superseding CI, as expected.
Some Considerations
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
GRLoader
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Examples of GRLoader Commands
 cmdb_update_ambiguity -m all -d MSSQL -u username -p
password -s server -level info — Runs an ambiguity check
 grloader -u username -p password -s
http://localhost:8080 -i spreadsheet.xlsx –lttwa —
Loads from an Excel spreadsheet into the TWA
 grloader -u username -p password -s
http://localhost:8080 -i spreadsheet.xlsx –a —
Allows updates from a spreadsheet directly to the CMDB
 grloader -u username -p password -s
http://localhost:8080 -sc Windows —
Lists attributes of the specified class (in this case the Windows class).
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
GRLoader Considerations
 A number of CI attributes are validated against values from tables
rather than being free text entry fields. The import must have valid
values for these fields:
– audit_userid
– bm_rep
– bm_status
– class
– company_bought_for_uuid
– contact_1
– contact_2
– contact_3
– delete_flag
– department
– expense_code
– family
– location
– manufacturer
– model
– operating_system
– org_bought_for_uuid
– priority
– repair_org
– resource_contact
– resource_owner_uuid
– service_org
– service_type
– status
– supplier
– vendor_repair
– vendor_restore
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change and Configuration Management
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Combining the Two Disciplines
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change Management
 The process of managing updates to IT infrastructure
 Provides a control structure to authorize changes
 Defines clear roles and responsibilities to implement changes
 Optimized Change Management results in:
– Fewer incidents and problems
– Swifter resolution of problems when they do occur
– Efficient fulfillment of strategic improvement requests
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Where Does the CMDB Come In?
 Track configuration changes
against baselines and/or
gold standards
 Detect and correct configuration
drift before it impacts availability
or performance of applications
or services
 Ensure managed servers are
updated to the latest
configuration specifications
Detection of
Configuration
Error
Service
Incident
Opened
System
Isolation /
Quarantine
Analysis /
Known Error
Change
Request
Opened
Change
Request
Approved
Change
Deployed
Compliance
Verified
38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Audit and Control Facility
39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Audit and Control Facility (CACF)
 The CACF bridges Change Management and Configuration
Management. It can also leverage discovery solutions.
 Goals of the CACF
– Allow for identification of CI attributes that will be updated as part of a
Change Order.
– Verify successful implementation of the attribute updates.
– Ultimately, ensure that the CMDB’s accuracy is maintained.
40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CACF Roles and Responsibilities
 CMDB Administrator
– Defines managed CI attributes.
– Defines the policies for updating managed attributes.
 What to do with “rogue” updates (i.e., those not associated with a Change Order)
 Which MDRs are authorized to update which attributes
– Defines which Change statuses reflect editable Changes and which statuses
represent verification states.
 Change Analyst
– Specifies the attributes that will be updated in a particular Change.
– For each attribute, indicates whether the update will be verified and
in which way.
41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Change Verification Works
 Change Order must be in a Verification in Progress state
 An update to the relevant CI is loaded via the web interface, GRLoader, or
web services API.
 Based on the CACF verification policy for this update one or more of the
following actions will be taken:
– The update is accepted, and the CI is updated
– The update is deferred to the TWA so that a user can assess it
– An Incident is created
– The update is rejected
 The CA Service Management wiki has great recommendations on setting
up CACF and especially Change verification.
42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change Verification Policies
 Allow Update Only if Matches Change Specification:
depending on the incoming update CACF will either verify the
update and close the Change Order or fail the verification.
 Set After Change Verified: closing the Change Order
automatically updates the CI attribute to the planned value.
 Accept the Planned Value: analyst manually confirms the
accuracy of the planned value and accepts it, which updates
the CI.
Some Examples
43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Results
While Configuration Management touches on many aspects of IT in one way or
another, its link to and dependence on Change Management is particularly
important. In today’s session we have learned about some of the CA Service Desk
Manager CMDB capabilities. We have also discussed the sorts of pitfalls and
opportunities to watch for when preparing to deploy Configuration Management.
You can see benefits from your initial forays into Configuration Management,
but the discipline also rewards an iterative approach of continual improvement.
Summary
A Few Words to Review
44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
AMX121S
Case Study: Using Process Automation in CA Service
Catalog to Deliver Services Faster
11/16/2016 at 3:45 pm
AMX18S
Slaying the Dragons of Agile, DevOps and ITSM
Information Flow
11/16/2016 at 4:30 pm
AMX10S
Case Study: ITSM Process Automation at Cerner: We’re
all in!
11/17/2016 at 3:00 pm
45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Service Desk
and Support
Analyst xFlow
Experience
Software and
Hardware Asset
Management
Request
Management
and Self-service
Management
Insights –
Reporting and
Dashboards
46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Questions?
47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Thank you.
Stay connected at communities.ca.com

More Related Content

What's hot

Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0CA Technologies
 
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-service
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-serviceHands-on Lab: Get the Most Out of CA Service Management Unified Self-service
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-serviceCA Technologies
 
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...CA Technologies
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...CA Technologies
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOCA Technologies
 
Pre-Con Ed: Exploiting Operational Intelligence within Database Management tools
Pre-Con Ed: Exploiting Operational Intelligence within Database Management toolsPre-Con Ed: Exploiting Operational Intelligence within Database Management tools
Pre-Con Ed: Exploiting Operational Intelligence within Database Management toolsCA Technologies
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...CA Technologies
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12CA Technologies
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...CA Technologies
 
Driving Down Costs for DB2 Management
Driving Down Costs for DB2 ManagementDriving Down Costs for DB2 Management
Driving Down Costs for DB2 ManagementCA Technologies
 
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!CA Technologies
 
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...CA Technologies
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformCA Technologies
 
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesPre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesCA Technologies
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashCA Technologies
 
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...CA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2CA Technologies
 

What's hot (20)

CA IDMS Buffer Tuning
CA IDMS Buffer TuningCA IDMS Buffer Tuning
CA IDMS Buffer Tuning
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
 
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-service
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-serviceHands-on Lab: Get the Most Out of CA Service Management Unified Self-service
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-service
 
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
 
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
Pre-Con Ed: Exploiting Operational Intelligence within Database Management tools
Pre-Con Ed: Exploiting Operational Intelligence within Database Management toolsPre-Con Ed: Exploiting Operational Intelligence within Database Management tools
Pre-Con Ed: Exploiting Operational Intelligence within Database Management tools
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
 
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
 
Driving Down Costs for DB2 Management
Driving Down Costs for DB2 ManagementDriving Down Costs for DB2 Management
Driving Down Costs for DB2 Management
 
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
 
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
 
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS DatabasesPre-Con Ed: Using SQL to Access Your CA IDMS Databases
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
 
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDashUse Case: Migrating from Terma Jaws to CA Workload Automation iDash
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
 
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 

Viewers also liked

Information Mining and the CMDB
Information Mining and the CMDBInformation Mining and the CMDB
Information Mining and the CMDBDavid Messineo
 
Why CMDB - 7 Fundamental Use Cases
Why CMDB - 7 Fundamental Use CasesWhy CMDB - 7 Fundamental Use Cases
Why CMDB - 7 Fundamental Use CasesDavid Messineo
 
Ontology Diagrams for Successful Knowldge Capture and Transfer
Ontology Diagrams for Successful Knowldge Capture and TransferOntology Diagrams for Successful Knowldge Capture and Transfer
Ontology Diagrams for Successful Knowldge Capture and TransferBrandon Olson
 
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby StepsHow to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Stepsdigitallibrary
 
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsIT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsNovell
 
Building a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpBuilding a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpNovell
 
Kunalhasija CMDB & ITIL
Kunalhasija CMDB & ITILKunalhasija CMDB & ITIL
Kunalhasija CMDB & ITILKunal Hasija
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignEvergreen Systems
 
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsService Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsEvergreen Systems
 
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...Evergreen Systems
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery ToolsAntonio Rolle
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB EnigmaAxios Systems
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service CatalogAxios Systems
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model OverviewMark Peacock
 

Viewers also liked (17)

Information Mining and the CMDB
Information Mining and the CMDBInformation Mining and the CMDB
Information Mining and the CMDB
 
Why CMDB - 7 Fundamental Use Cases
Why CMDB - 7 Fundamental Use CasesWhy CMDB - 7 Fundamental Use Cases
Why CMDB - 7 Fundamental Use Cases
 
Ontology Diagrams for Successful Knowldge Capture and Transfer
Ontology Diagrams for Successful Knowldge Capture and TransferOntology Diagrams for Successful Knowldge Capture and Transfer
Ontology Diagrams for Successful Knowldge Capture and Transfer
 
ITIL 2011 Foundation Overview
ITIL 2011 Foundation OverviewITIL 2011 Foundation Overview
ITIL 2011 Foundation Overview
 
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby StepsHow to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
 
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsIT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
 
Building a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpBuilding a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground Up
 
Kunalhasija CMDB & ITIL
Kunalhasija CMDB & ITILKunalhasija CMDB & ITIL
Kunalhasija CMDB & ITIL
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service Design
 
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsService Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
 
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
 
CMDB as a Corporate Asset
CMDB as a Corporate AssetCMDB as a Corporate Asset
CMDB as a Corporate Asset
 
Building a devops CMDB
Building a devops CMDBBuilding a devops CMDB
Building a devops CMDB
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service Catalog
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model Overview
 

Similar to Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management

Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...CA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancialTim Hinkle
 
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...CA Technologies
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®CA Technologies
 
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...HostedbyConfluent
 
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Canada
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned WayCA Technologies
 
Defining Microservices
Defining MicroservicesDefining Microservices
Defining MicroservicesMatt McLarty
 

Similar to Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management (20)

Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
 
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...
Hands-on Lab: Building Advanced Dashboards with Xtraction for CA Service Mana...
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
CMDB - Use Cases
CMDB - Use CasesCMDB - Use Cases
CMDB - Use Cases
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®
 
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
 
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud AdoptionCisco Connect Toronto 2017 - Simplifying Cloud Adoption
Cisco Connect Toronto 2017 - Simplifying Cloud Adoption
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned Way
 
Defining Microservices
Defining MicroservicesDefining Microservices
Defining Microservices
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management

  • 1. Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management John Weston Sr. Principal Consultant, Service Management — CA Technologies AMX29E AGILE MANAGEMENT
  • 2. 3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. Terms of this Presentation
  • 3. 5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda INTRODUCTION CMDB DEPLOYMENT GUIDELINES ADVANCED CMDB FUNCTIONS CHANGE AND CONFIGURATION MANAGEMENT 1 2 3 4
  • 4. 6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CMDB Deployment Guidelines
  • 5. 7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Management  A service is any system, process, access or other capability that IT provides its customers according to established expectations of availability and quality.  Configuration Items (CIs) are entities—usually subject to Change Management—that are vital to the delivery of a defined service, including – physical servers – VMs – applications  Configuration Management is the process responsible for discovering and maintaining baseline definitions of services, CIs, and CI relationships. Definitions
  • 6. 8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Management  Establish CI inventory  Create and manage CI and Service relationships and dependencies  Manage CI and Service configuration baselines  Support Root Cause Analysis and Change Impact Analysis  Provide change detection and configuration drift analysis  Drive Continuous Service Improvement for CI and Service configurations through tolerance mapping Functions and Benefits
  • 7. 9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD General Guidelines for the CMDB  Not every asset is a CI and not every CI is an asset. Here is a good guideline for what constitutes a CI: is it subject to your Change Management policies?  Assets can be entered into the Management Database (MDB) and give benefits to Incident, Problem, and Change Management.  Do not feel like you must discover everything in order to have a useful CMDB. – You don’t necessarily need all possible attributes for a given CI – You don’t need to model all CIs and Services in your infrastructure  Keep change discovery and configuration remediation in the Management Data Repositories (MDRs).  Take a look at CA Configuration Automation. You probably have an entitlement to it through CA Service Desk Manager.
  • 8. 10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Your Customers View IT Service End Users Identity Manager Firewall Applications Switch Load Balancer Portal SAP PSFT Siebel Web Services 3rd Party applications Web Servers Databases Router Mainframe DatabaseThe end user doesn’t care about any of this
  • 9. 11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Defining Services  Services are often made up of many layers  Connecting layers is what makes Services useful but complicated  We need to find these connections to navigate through the layers
  • 10. 12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Hierarchies Service Layer Service Subset Layer System Layer Logical Host Layer Physical Host Layer Service Sub-Service Logical Partition Computer Hardware Storage Hardware Storage LUN Network Zone Firewall Hardware Network Hardware System
  • 11. 13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Layer Service Subset Layer System Layer Logical Host Layer Physical Host Layer Peer-to-Peer Relationships Storage Hardware Network Hardware Storage LUN Network Zone Firewall Hardware Service Sub-Service Computer Hardware System Logical Partition Peer-to-Peer relationships should be considered carefully because the more “sideways” steps you take the more unclear it is if a potential dependency exists. Dependency? Dependency? Dependency? Dependency?
  • 12. 14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Structure Guidelines Select the Appropriate Structure Service Mgt = Hierarchy System Mgt = Technology-to-Technology Cost Mgt = Technology-to-Cost/Contract Add / Remove hierarchy layers as required + Technology layers can be skipped if inappropriate Start Simple…. Then build complexity… Services, Systems & Computers Adding Storage, Networks, etc..
  • 13. 15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CI Relationship Guidelines  Start with the out-of-the-box CI relationships  Define Provider-Dependent relationships between two Service layers and between CI Families in each Layer  Modify the CMDB Visualizer relationship formatting – Assign a different color to each Relationship Type – Keep Black the peer-to-peer Relationship Types within a layer – Keep in mind that peer-to-peer relationships will not show up in the Visualizer when you use the Impact Analysis and Root Cause Analysis filters
  • 14. 16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Advanced CMDB Functions
  • 15. 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Transaction Work Area
  • 16. 18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Transaction Work Area (TWA)  The TWA is a staging area for storing, reviewing, and modifying CI and CI relationship transactions before importing them into the CMDB proper.  Primary uses – Avoid creating multiple records for what is actually one CI – Avoid creating one record for what are actually multiple CIs – Transform CI data to conform with CMDB policies, for example where multiple MDRs have different naming conventions
  • 17. 19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The TWA Process  Load CI and CI relationship data into the TWA. Note that reconciliation is not attempted at this point. Sources: – The web interface – GRLoader utility with the -lttwa (load into initial state) or -lttwar (load into ready state) options – Native SQL queries  Modify the data as needed, using the Service Desk web interface or native SQL queries. From Discovery Source to the TWA
  • 18. 20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The TWA Process  Load data from the TWA into the CMDB using the GRLoader utility with the -lftwa (load transactions from TWA) or -lftwai (load from TWA and inactivate successful transactions) options From the TWA to the CMDB
  • 19. 21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Item Reconciliation
  • 20. 22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Item (CI) Reconciliation  Purpose: assign imported CI attributes to existing CIs where appropriate, and avoid creating duplicates. Name = server1 Mac address = 11:11:11:11:11 Name = server1 Mac address = 22:22:22:22:22 Name = server1 Questions about these three imported CIs: How many servers should we now have in the CMDB? How do we determine the “surviving” CI or CIs? What happens to eliminated duplicates?
  • 21. 23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Reconciliation Priorities  ID (ca_owned_resource uuid)  Federated Data – Federated Asset ID – MDR Name – MDR Class  Reconciliation attributes – Name – Serial Number – Asset Number – System Name – DNS Name – MAC Address
  • 22. 24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Reconciliation Rules Name Serial Number Asset Number System Name DNS Name MAC Address Result Unique Null Null Null Null Null CI created Null Unique Null Null Null Null CI created Null Null Unique Null Null Null CI created Null Null Null Unique Null Null CI created Null Null Null Null Unique Null CI created Null Null Null Null Null Unique CI created Duplicate Duplicate Duplicate Unique Duplicate Duplicate CI created Unique Duplicate Duplicate Duplicate Duplicate Duplicate Recognized as duplicate CI Null Null Null Null Unique Unique CI created Null Null Null Null Duplicate Unique Recognized as duplicate CI Null Null Null Null Unique Duplicate Recognized as duplicate CI Duplicate Duplicate Unique Duplicate Duplicate Duplicate CI created Duplicate Unique Duplicate Duplicate Duplicate Duplicate CI created Duplicate Duplicate Duplicate Duplicate Duplicate Unique Recognized as duplicate CI Duplicate Duplicate Duplicate Duplicate Unique Duplicate Recognized as duplicate CI Duplicate Duplicate Duplicate Duplicate Unique Unique Recognized as duplicate CI
  • 23. 25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Ambiguous Configuration Items
  • 24. 26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Ambiguous CIs  An ambiguous CI is one that may be a duplicate.  A CI’s ambiguity index measures its potential for being a duplicate. It is a count of all of the other CI attributes that match any of its reconciliation attributes. – It’s a simple sum of the counts of “CIs with matching name,” “CIs with matching serial number,” etc. – Example: Ambiguity Index 2 means that there are two matching attributes in the CMDB, but they might be from the same CI.  Calculate the ambiguity index by running the cmdb_update_ambiguity command. – Example: cmdb_update_ambiguity - m all - d MSSQL - u ServiceDesk - p sdmpassword -s sdmserver1 –level info
  • 25. 27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Dealing with Ambiguous CIs  Identify them – Scoreboard query – Administration tab – Reconciliation tab on a particular CI record  Resolve them – Do nothing or modify the offending CI attributes – Mark as not ambiguous: removes the CI from lists of ambiguous CIs – Inactivate the ambiguous CI: removes the CI from normal CI lists – Supersede: a good option if one or more MDRs will continue to send updates of the CI in question
  • 26. 28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Superseded Configuration Items
  • 27. 29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Superseded CIs  As we saw previously, superseded CIs are sometimes created when resolving ambiguous CIs  Incoming updates to a superseded CI are redirected to the superseding CI
  • 28. 30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Should You Supersede This CI?  For one-off updates it is better to fix input data than to supersede a CI. Superseding generally will be used where you have little control over incoming transactions.  Superseded CIs are flagged as inactive and by default cannot be updated via the web UI.  Since a superseded CI will not be updated its attributes and other data are allowed to atrophy.  If you supersede a superseding CI then all updates will be redirected to the higher superseding CI, as expected. Some Considerations
  • 29. 31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD GRLoader
  • 30. 32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Examples of GRLoader Commands  cmdb_update_ambiguity -m all -d MSSQL -u username -p password -s server -level info — Runs an ambiguity check  grloader -u username -p password -s http://localhost:8080 -i spreadsheet.xlsx –lttwa — Loads from an Excel spreadsheet into the TWA  grloader -u username -p password -s http://localhost:8080 -i spreadsheet.xlsx –a — Allows updates from a spreadsheet directly to the CMDB  grloader -u username -p password -s http://localhost:8080 -sc Windows — Lists attributes of the specified class (in this case the Windows class).
  • 31. 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD GRLoader Considerations  A number of CI attributes are validated against values from tables rather than being free text entry fields. The import must have valid values for these fields: – audit_userid – bm_rep – bm_status – class – company_bought_for_uuid – contact_1 – contact_2 – contact_3 – delete_flag – department – expense_code – family – location – manufacturer – model – operating_system – org_bought_for_uuid – priority – repair_org – resource_contact – resource_owner_uuid – service_org – service_type – status – supplier – vendor_repair – vendor_restore
  • 32. 34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change and Configuration Management
  • 33. 35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Combining the Two Disciplines
  • 34. 36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change Management  The process of managing updates to IT infrastructure  Provides a control structure to authorize changes  Defines clear roles and responsibilities to implement changes  Optimized Change Management results in: – Fewer incidents and problems – Swifter resolution of problems when they do occur – Efficient fulfillment of strategic improvement requests
  • 35. 37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where Does the CMDB Come In?  Track configuration changes against baselines and/or gold standards  Detect and correct configuration drift before it impacts availability or performance of applications or services  Ensure managed servers are updated to the latest configuration specifications Detection of Configuration Error Service Incident Opened System Isolation / Quarantine Analysis / Known Error Change Request Opened Change Request Approved Change Deployed Compliance Verified
  • 36. 38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Audit and Control Facility
  • 37. 39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Audit and Control Facility (CACF)  The CACF bridges Change Management and Configuration Management. It can also leverage discovery solutions.  Goals of the CACF – Allow for identification of CI attributes that will be updated as part of a Change Order. – Verify successful implementation of the attribute updates. – Ultimately, ensure that the CMDB’s accuracy is maintained.
  • 38. 40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CACF Roles and Responsibilities  CMDB Administrator – Defines managed CI attributes. – Defines the policies for updating managed attributes.  What to do with “rogue” updates (i.e., those not associated with a Change Order)  Which MDRs are authorized to update which attributes – Defines which Change statuses reflect editable Changes and which statuses represent verification states.  Change Analyst – Specifies the attributes that will be updated in a particular Change. – For each attribute, indicates whether the update will be verified and in which way.
  • 39. 41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Change Verification Works  Change Order must be in a Verification in Progress state  An update to the relevant CI is loaded via the web interface, GRLoader, or web services API.  Based on the CACF verification policy for this update one or more of the following actions will be taken: – The update is accepted, and the CI is updated – The update is deferred to the TWA so that a user can assess it – An Incident is created – The update is rejected  The CA Service Management wiki has great recommendations on setting up CACF and especially Change verification.
  • 40. 42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change Verification Policies  Allow Update Only if Matches Change Specification: depending on the incoming update CACF will either verify the update and close the Change Order or fail the verification.  Set After Change Verified: closing the Change Order automatically updates the CI attribute to the planned value.  Accept the Planned Value: analyst manually confirms the accuracy of the planned value and accepts it, which updates the CI. Some Examples
  • 41. 43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Results While Configuration Management touches on many aspects of IT in one way or another, its link to and dependence on Change Management is particularly important. In today’s session we have learned about some of the CA Service Desk Manager CMDB capabilities. We have also discussed the sorts of pitfalls and opportunities to watch for when preparing to deploy Configuration Management. You can see benefits from your initial forays into Configuration Management, but the discipline also rewards an iterative approach of continual improvement. Summary A Few Words to Review
  • 42. 44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME AMX121S Case Study: Using Process Automation in CA Service Catalog to Deliver Services Faster 11/16/2016 at 3:45 pm AMX18S Slaying the Dragons of Agile, DevOps and ITSM Information Flow 11/16/2016 at 4:30 pm AMX10S Case Study: ITSM Process Automation at Cerner: We’re all in! 11/17/2016 at 3:00 pm
  • 43. 45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Service Desk and Support Analyst xFlow Experience Software and Hardware Asset Management Request Management and Self-service Management Insights – Reporting and Dashboards
  • 44. 46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
  • 45. 47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Thank you. Stay connected at communities.ca.com

Editor's Notes

  1. As you build out your presentation, here are a few dos and don’ts.