SlideShare a Scribd company logo
1 of 3
Download to read offline
ZENOSS EVENT MANAGEMENT
EVENT MANAGEMENT
ITIL defines an event as any detectable or discernible occurrence that has significance for the
management of the IT infrastructure of the delivery of IT service and evaluation of the impact a deviation
might cause to the services. They are notifications which can be created by IT service (e.g. note that a
manual backup was performed), Configuration Items (individual device’s event logs which are read and
gathered by Zenoss – e.g. windows notes an application started), and finally by monitoring tools such as
Zenoss (e.g. query a server and note CPU usage above set thresholds).
Types of tools
Detecting deviation from normal operation and knowing the status of Configuration Items is essential for
effective service operation. This is provided by Zenoss which performs active monitoring by polling CIs to
determine status and availability, alerting or reporting on any exceptions to the appropriate team
members and/or systems such as TouchPaper. Zenoss also performs passive monitoring, allowing for
Configuration Items to push events or alerts to Zenoss for recording and action.
Application
Zenoss will perform automatic Event Management for any aspect of service management that needs to
be controlled and is compatible or configurable for automated event monitoring. This includes:
 Configuration Items
o Some, to confirm they maintain a consistent state (Availability)
o Others, to record and/or automate their changing state, updating the Configuration
Management System (CMS) and Configuration Management Database (CMDB).
 Environmental conditions (Temperature, Power, etc)
 Software license monitoring for utilisation and location of installed license assets
 Security (failed login attempts or locked accounts)
 Normal activity
o Application usage
o Server performance
o Resource usage
BUSINESS VALUE
Zenoss event management can deliver a number of advantages including early incident detection,
incident forecasting, assistance in root cause analysis, tracking and insurance of regular activity/jobs,
reduction of resource intensive manual monitoring, capacity and availability management and
automated operations.
Early Incident Detection
Through polling of servers and receiving of events Zenoss can detect incidents and quickly alert
appropriate team members to the incident, allowing quicker response, possibly before the users have
detected or encountered the issue or any significant damage is done (failed air-conditioner and rising
heat in a computer room).
Incident Forecasting
Zenoss will monitor performance and capacity, alerting based on thresholds to allow IS to respond to
impending problems before they affect the systems and/or business. This can include high CPU usage or
the approaching capacity of a hard disk. Dashboards and performance reports can also allow team
members to manually sight impending issues where appropriate.
Assistance in Root Cause Analysis
Zenoss will assist in root cause analysis by allowing easy reading of a system’s events in the lead-up to an
incident, together with performance data gathered on or before the issue. A centralised, easy to use and
access database of the system’s installed software, hardware model, serial number and location can also
assist in speeding up diagnosis of problems. Dashboards can also assist team members in quickly
sighting a related cause to an incident they’ve been made aware of by allowing a quick view of
performance or events across other systems that may be causing the issue.
Tracking and insurance of regular activity/jobs
Zenoss will monitor states at set times where business process activity is expected or receive updates or
failure notifications from systems and report or alert on a lack of coherence with expected process. This
can include scheduled backups or process runs such as GAINS weekend forecasting and replenishment.
Reduction of resource intensive manual monitoring
Because Zenoss is a highly configurable monitoring tool, capable of advanced analysis and alerting,
certain manual system checks can be replaced by a reliable automated checking which will report
exceptions to the team members, leaving them to conduct more innovative work such as improved
functionality or exploring new ways for the business to exploit technology to increase competitive
advantage.
Capacity and Availability Management
Zenoss’ availability management can signal appropriate team members to exceptions, allowing
appropriate early response but also capacity planning for either response to capacity issues or future
planning and budgeting. Availability reporting can also assist in determining problem areas that may
require further work to improve availability or reduce incidents and facility KPI reporting.
Automated Operations
Zenoss will be setup to respond automatically in some instances, to resolve incidents quickly either for
known, recurring problems or for new incidents. Problem generation in TouchPaper can also be
automated to facilitate root cause analysis of the problem by a team member and alerts/notifications
will make team members aware of the issue, even though it was immediately repaired.
ITIL EVENT MANAGEMENT MODEL

More Related Content

What's hot

Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
Jan Wong
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
Susan Rantall
 

What's hot (20)

Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Osprey Bank Risk
Osprey Bank RiskOsprey Bank Risk
Osprey Bank Risk
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionUnderstanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Brochure YASENSE
Brochure YASENSEBrochure YASENSE
Brochure YASENSE
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
 
10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems
 
System1 details
System1 detailsSystem1 details
System1 details
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
How to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful AnalyticsHow to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful Analytics
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 

Similar to ZENOSS EVENT MANAGEMENT

Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White Paper
Cicero, Inc.
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
Atul Dhingra
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
ncct
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Peter Reynolds
 
Fusion of mantenance and control data A need For the process.pdf
Fusion of mantenance and control data A need For the process.pdfFusion of mantenance and control data A need For the process.pdf
Fusion of mantenance and control data A need For the process.pdf
camilo256481
 
Ni tutorial-14415-en (1)
Ni tutorial-14415-en (1)Ni tutorial-14415-en (1)
Ni tutorial-14415-en (1)
mzai2003
 

Similar to ZENOSS EVENT MANAGEMENT (20)

ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
 
Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White Paper
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
Simplify Data Center Monitoring With a Single-Pane View
Simplify Data Center Monitoring With a Single-Pane ViewSimplify Data Center Monitoring With a Single-Pane View
Simplify Data Center Monitoring With a Single-Pane View
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Plant Maintenance & Condition Monitoring
Plant Maintenance & Condition MonitoringPlant Maintenance & Condition Monitoring
Plant Maintenance & Condition Monitoring
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
End to-end root cause analysis minimize the time to incident resolution
End to-end root cause analysis minimize the time to incident resolutionEnd to-end root cause analysis minimize the time to incident resolution
End to-end root cause analysis minimize the time to incident resolution
 
Enterprise Broadband Business Appications
Enterprise Broadband Business AppicationsEnterprise Broadband Business Appications
Enterprise Broadband Business Appications
 
Fusion of mantenance and control data A need For the process.pdf
Fusion of mantenance and control data A need For the process.pdfFusion of mantenance and control data A need For the process.pdf
Fusion of mantenance and control data A need For the process.pdf
 
Accounting information system.pptx
Accounting information system.pptxAccounting information system.pptx
Accounting information system.pptx
 
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster RecoveryContrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
 
Ni tutorial-14415-en (1)
Ni tutorial-14415-en (1)Ni tutorial-14415-en (1)
Ni tutorial-14415-en (1)
 
Soffront Employee helpdesk
Soffront Employee helpdeskSoffront Employee helpdesk
Soffront Employee helpdesk
 
MSTS - Management Security Technology Suite
MSTS - Management Security Technology SuiteMSTS - Management Security Technology Suite
MSTS - Management Security Technology Suite
 
Asset Management Software - Ebizframe Transform
Asset Management Software - Ebizframe TransformAsset Management Software - Ebizframe Transform
Asset Management Software - Ebizframe Transform
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Shashi_Bhushan
Shashi_BhushanShashi_Bhushan
Shashi_Bhushan
 

ZENOSS EVENT MANAGEMENT

  • 1. ZENOSS EVENT MANAGEMENT EVENT MANAGEMENT ITIL defines an event as any detectable or discernible occurrence that has significance for the management of the IT infrastructure of the delivery of IT service and evaluation of the impact a deviation might cause to the services. They are notifications which can be created by IT service (e.g. note that a manual backup was performed), Configuration Items (individual device’s event logs which are read and gathered by Zenoss – e.g. windows notes an application started), and finally by monitoring tools such as Zenoss (e.g. query a server and note CPU usage above set thresholds). Types of tools Detecting deviation from normal operation and knowing the status of Configuration Items is essential for effective service operation. This is provided by Zenoss which performs active monitoring by polling CIs to determine status and availability, alerting or reporting on any exceptions to the appropriate team members and/or systems such as TouchPaper. Zenoss also performs passive monitoring, allowing for Configuration Items to push events or alerts to Zenoss for recording and action. Application Zenoss will perform automatic Event Management for any aspect of service management that needs to be controlled and is compatible or configurable for automated event monitoring. This includes:  Configuration Items o Some, to confirm they maintain a consistent state (Availability) o Others, to record and/or automate their changing state, updating the Configuration Management System (CMS) and Configuration Management Database (CMDB).  Environmental conditions (Temperature, Power, etc)  Software license monitoring for utilisation and location of installed license assets  Security (failed login attempts or locked accounts)  Normal activity o Application usage o Server performance o Resource usage
  • 2. BUSINESS VALUE Zenoss event management can deliver a number of advantages including early incident detection, incident forecasting, assistance in root cause analysis, tracking and insurance of regular activity/jobs, reduction of resource intensive manual monitoring, capacity and availability management and automated operations. Early Incident Detection Through polling of servers and receiving of events Zenoss can detect incidents and quickly alert appropriate team members to the incident, allowing quicker response, possibly before the users have detected or encountered the issue or any significant damage is done (failed air-conditioner and rising heat in a computer room). Incident Forecasting Zenoss will monitor performance and capacity, alerting based on thresholds to allow IS to respond to impending problems before they affect the systems and/or business. This can include high CPU usage or the approaching capacity of a hard disk. Dashboards and performance reports can also allow team members to manually sight impending issues where appropriate. Assistance in Root Cause Analysis Zenoss will assist in root cause analysis by allowing easy reading of a system’s events in the lead-up to an incident, together with performance data gathered on or before the issue. A centralised, easy to use and access database of the system’s installed software, hardware model, serial number and location can also assist in speeding up diagnosis of problems. Dashboards can also assist team members in quickly sighting a related cause to an incident they’ve been made aware of by allowing a quick view of performance or events across other systems that may be causing the issue. Tracking and insurance of regular activity/jobs Zenoss will monitor states at set times where business process activity is expected or receive updates or failure notifications from systems and report or alert on a lack of coherence with expected process. This can include scheduled backups or process runs such as GAINS weekend forecasting and replenishment. Reduction of resource intensive manual monitoring Because Zenoss is a highly configurable monitoring tool, capable of advanced analysis and alerting, certain manual system checks can be replaced by a reliable automated checking which will report exceptions to the team members, leaving them to conduct more innovative work such as improved functionality or exploring new ways for the business to exploit technology to increase competitive advantage. Capacity and Availability Management Zenoss’ availability management can signal appropriate team members to exceptions, allowing appropriate early response but also capacity planning for either response to capacity issues or future planning and budgeting. Availability reporting can also assist in determining problem areas that may require further work to improve availability or reduce incidents and facility KPI reporting.
  • 3. Automated Operations Zenoss will be setup to respond automatically in some instances, to resolve incidents quickly either for known, recurring problems or for new incidents. Problem generation in TouchPaper can also be automated to facilitate root cause analysis of the problem by a team member and alerts/notifications will make team members aware of the issue, even though it was immediately repaired. ITIL EVENT MANAGEMENT MODEL