bp302: future proofing enterprise it
Post on 15-Jul-2015
189 Views
Preview:
TRANSCRIPT
BP302: Future-Proofing Enterprise IT
Daniel Reimann, panagenda Franz Walder, panagenda
Getting Started – Introduction – What can you expect from this session? – “In Cloud We Trust” … seriously?
Infrastructure Assessment Best Practices – Stakeholders, goals and frustration – Key factors identified and explained – Focus topic: User activity analysis (who uses what and how?) – Focus topic: Client performance, optimization and virtualization
Summary: More Information = Smarter Decisions
Agenda
Daniel Reimann, Head of Technical Account Management – Over 15 years of experience in Notes / Domino – Focus on IBM Notes Client optimization and infrastructure analysis – Lives in Germany and travels A LOT –
Franz Walder, Product Manager
– Over 15 years experience in (what used to be) the Lotus universe – Administrator, developer, virtualization enthusiast – Lives in Austria (hence the funny accent)
Introduction
What can you expect from this session?
Best Practices at assessing an infrastructure
Giving an overview, with detailed information on a few focus topics – Focus topics will include hands-on best practices
Demo is based on prepared visualizations
– IBM has two offerings: IBM Domino DoubleCheck and ISSC HealthCheck
Even if you are not faced with one of our scenarios just yet,
awareness will help you with the challenges you might be confronted with
“In Cloud We Trust” … seriously?
XPages HTML 5 WebSphere
The classic: Upgrade projects take 12 to 18 months to reach the target ...
Traditional approach
Project
stable stable change
In many smaller, constant and always current steps forward.
Agile solution approach
Continuous change
Agility equals success and segmentation is the key
Continuous change
Agile solution approach
Let’s not forget interactions and interfaces!
Agile solution approach
Continuous change
Infrastructure Assessment Key Factors & Best Practices
Stakeholders, Goals and Frustration
Identifying and understanding your stakeholders – Motivators of your stakeholders (Management / Governance, Technical, Business) – Different angles and responsibilities breed different views
Clarifying goals is essential for all parties involved
– Why you do it has a big influence on setting your goal – Having a clear goal will allow you to measure success
Minimize frustration by providing the best possible information
– Don’t be afraid to ask questions and challenge “bold claims”
What Domino Administrators Have to Cope With
Servers
Databases Clients
Hardware (CPU, Memory), Data storage Network connection, Configuration, Databases, Tasks, Mail traffic, ...
ODS, Size, Reader fields, Deployment Design, Number & size of documents, Security, Performance, …
Hardware, Data storage, Network Connection, Deployment Integrity,
Configuration, Security
Across the board Geographical Distribution
Connectivity (Bandwidth, Structure) Online/Offline Access
Clustering/Load balancing Distributed Responsibilities
Key Factors: The Platform
Network / Bandwidth – Service Availability vs. Quality of Service
Hardware Considerations – Pick the platform according to the staff you (want to) have – SAN and Storage often no more then adjacent domains
Virtualization in general
– Pick the platform according to the staff you (want to) have – Tons of performance improvements with Domino since 8.5.x
Key Factors: Network / Bandwidth
Key Factors: Network / Bandwidth
?
? ?
?
On Premises
Key Factors: Network / Bandwidth
?
? ?
?
Off Premises
Key Factors: Network / Bandwidth
Key Factors: The Platform (cont.)
Network / Bandwidth – Service Availability vs. Quality of Service
Hardware considerations – Customers often pick the platform according to the staff they (want to) have – SAN and Storage are often no more than adjacent domains
Virtualization in general
– Customers often pick the platform according to the staff they (want to) have – Tons of performance improvements with Domino since 8.5.x
Key Factors: The Application Landscape
Application type / design suggests transformation goal – Possible destinations: Web application (e.g. XPages), mobile app, Notes browser plugin – Dependencies: hard coded links to the current infrastructure (Mail, DLL, Fax, names, etc.)
Transformation potential
– Domino mass mail converts to Connections community – Read-only databases converts to web page
Focus Topics – Client landscape: determining, assessing and optimizing according to current and future state – Infrastructure utilization: understanding who uses what and how is understanding cost
Key Factors: From Micro to Meta
Security / Compliance check in the existing infrastructure – ID Policies, Access Rights, NAB Cleanup
Deployment Integrity – Duplicate replicas, template inheritance, external applications
Infrastructure usage broken down to organization / location
– Who owns an application / process? – Pick the right application to start your transformation – Location awareness prevents guesswork when it comes to network planning
Focus Topic User Activity Analysis
User Activity Analysis: Why is it important?
Actionable Items / Project Support – High impact users and databases / unused databases – Calculate resource requirements – Verifying and justifying licensing cost
Strategic Insight – HR data integration (cross referencing departments and locations) – Differentiating between mail, business applications and 3rd party system tools – Transformation potential (differentiate complexity based on usage patterns) – Historic view and trends allow better decision making
User Activity: How to get the data manually
DB Activity: LOG.NSF – documents with form type “Activity”
– View selection formula: SELECT FORM = "Activity" – Add columns that are interesting in your scenario
User Activity: How to get the data manually (cont.)
DB Activity: LOG.NSF – database activity details
– Note there is a 1400 activity entry maximum per database (FIFO) – There is also a 64K size limit for the user activity – More details in IBM Technote #1086245
User Activity: How to get the data manually (cont.)
DB Activity: CATALOG.NSF
– related information, but different focus – Full text index details – Replication information – ACL overview
Note: Domino does not distinguish between user, server or maintenance tasks activity at this level
User Activity Analysis: Example Visualizations
User Activity Analysis: Example Visualizations (cont.)
User Activity Analysis: Example Visualizations (cont.)
User Activity Analysis: Example Visualizations (cont.)
User Activity Analysis: Example Visualizations (cont.)
User Activity Analysis: Example Visualizations (cont.)
Focus Topic Client Landscape Optimization
Give users the clients they need to be successful in their job – Notes client – Notes Browser Plug-in – Citrix client – Web browser – Mobile Device
Choose clients depending on … – complexity and variety of applications – network demand generated by particular users – the need for online / offline capabilities
Client Landscape Optimization: Client Types
Consolidating is the first step towards transformation
Client side conditions that break integrity / security – Local replicas of databases which aren’t accessible on the server side anymore – Local replicas beyond cut-off date which would re-create already deleted documents – Local replicas with identical replica IDs – ID files of several users on one client – Signature IDs with too many rights in client ECLs
Client Landscape Optimization: Security & Compliance
ODS = On Disk Structure – ODS 16 = Notes 2 – ODS 17 = Notes 3 – ODS 20 = Notes 4 (or templates) – ODS 41 = Notes 5 – ODS 43 = Notes 6 & 7 – ODS 48 = Notes 8 – ODS 51 = Notes 8.5/9.0 – ODS 52 = Notes >= 9.0.1
The difference between ODS 43 and 52 = up to 80% LESS FILE I/O; average 50% less. – Also helps with slow local fixed disks, not just SAN/NAS! – Think servers, too!
Client Landscape Optimization: Notes ODS
Fortunately, since Notes 8.5.2 you can use – NSF_UpdateODS=1 + CREATE_RX_DATABASES=1 (add Notes release for X, e.g. 9 or 85) – This will do a one-time upgrade of all local databases in the background – Use with extreme care if your data directories are on a network drive! ( Load balance) – Note that end users cannot access databases during compact (mail file replicas) – Note that names.nsf and bookmark.nsf are upgraded at next client startup ( Splash screen)
Client Landscape Optimization: Notes ODS (cont.)
Since version 6.5, Notes has two install modes, Single User and Multiuser – Multiuser is highly recommended to be used for a standard user install! – Multiuser comes with a shared data directory referenced in the stub notes.ini file – The shared data directory is the single storage folder for templates out of which a new Notes data
directory is created for every user logging on to this machine
Example location of the shared data directory on Windows 7/8 (Notes 9.x) – C:\ProgramData\IBM\Notes\Data\Shared
However, if custom files are copied into the ‘Shared‘ directory, they‘re NOT taken over into
the user‘s personal Notes data folder upon creation! Wouldn‘t this be nice?
Client Landscape Optimization: Multiuser
There‘s a great built-in feature to an IBM Notes Multiuser install to copy over custom files into the user‘s personal data folder upon Notes startup
– Create a directory named ‘Common‘ at the same level as the Shared Data directory lives
Example on Windows 7/8 (Shared Data directory) – C:\ProgramData\IBM\Notes\Data\Shared
Example on Windows 7/8 (Common directory) – C:\ProgramData\IBM\Notes\Data\Common
All files and folders placed into ‘Common‘ are copied into the user‘s personal Data
directory upon Notes startup – if they don‘t exist there yet!
Client Landscape Optimization: Multiuser (cont.)
A user‘s Notes Data directory doesn‘t need to be kept on disk after logoff – Administrators can wipe all personal data folders daily from Citrix / TS servers or VDI clients – Use IBM or third-party roaming to build a user‘s personal data directory from scratch – Re-creating a user‘s Data directory every day during Notes startup also reduces help-desk calls
regarding corrupt local databases/files dramatically
Client Landscape Optimization: Multiuser (cont.)
Most of the time consumed during the first startup of a Notes Standard client relates to building the Workspace directory!
– Remember to configure anti-virus scanners properly (exclude folders) – Use the ‘Common‘ directory method to deploy a prepared workspace directory into a user‘s Notes
data directory which reduces initial Notes startup time by up to 80%!
Speed Geeking! Join us at 6:15PM TODAY to see this in a live demo! Draw your stopwatches!
Client Landscape Optimization: Multiuser (cont.)
Summary More information = Smarter Decisions
Summary & Recommendations
With so many choices of technologies, picking the right one isn’t easy – Assessing your current infrastructure is vital – Think about what goals should be achieved – Only make decisions based on facts in your environment – Consolidations and optimizations are often way more rational than a platform change
Links to sources about topics mentioned in this presentation:
– http://slideshare.net/panagenda/a-performance-boost-for-your-ibm-notes-client – http://slideshare.net/panagenda/panagenda-idna-ibm-collaboration-the-future-is-now
Thank You!
Questions?
daniel.reimann@panagenda.com TechnOasis #G3 franz.walder@panagenda.com
Engage Online
SocialBiz User Group socialbizug.org – Join the epicenter of Notes and Collaboration user groups
Social Business Insights blog ibm.com/blogs/socialbusiness – Read and engage with our bloggers
Follow us on Twitter – @IBMConnect and @IBMSocialBiz
LinkedIn http://bit.ly/SBComm – Participate in the IBM Social Business group on LinkedIn
Facebook https://www.facebook.com/IBMConnected – Like IBM Social Business on Facebook
Notices and Disclaimers Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com, BrassRing®, Connections™, Domino®, Global Business Services®, Global Technology Services®, SmartCloud®, Social Business®, Kenexa®, Notes®, PartnerWorld®, Prove It!®, PureSystems®, Sametime®, Verse™, Watson™, WebSphere®, Worklight®, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
top related