session 2.8: discovery and populating the ibm tivoli change ... · discovery and populating the ibm...

27
Session 2.8: Discovery and Populating the IBM Tivoli Change & Configuration Management Database

Upload: hathuy

Post on 09-Apr-2018

219 views

Category:

Documents


2 download

TRANSCRIPT

Session 2.8:Discovery and Populating the IBM Tivoli Change & Configuration Management Database

Marcus BooneMarket Manager

Mark PreslandSoftware Engineer

AgendaIT Challenge and IT Service Management

(ITSM) Strategy

ITSM Architecture and Design

Discovery Library Adapters

Automated Agentless Discovery

CCMDB Data Management

Application Experts and

Tools

DatabaseExperts

and Tools

Desktop Experts

and Tools

NetworkExperts

and Tools

Server Experts

and Tools

Mainframe Experts

and Tools

Storage Experts

and Tools

IT Service Management is the Optimal Intersection of People, Process, Information and Technology

Availability Management

Change Management

Change Management

Security Management

Service Level Management

Information Lifecycle

ManagementRelease

Management

www

PeopleInterconnectedProductive

ProcessBased on Best PracticesAutomatedCustomizable

Information StandardizedFederatedSecure

TechnologyIntegratedVirtualizedRole Based

Effective and Efficient Delivery of IT Services in Support of Business Goals

Open Process Automation

Library(OPAL)

IBM Global Technology

Services

Ecosystem of System

Integrators and Business Partners

IBM Tivoli Unified Process(ITUP)

Best Practices

Change and ConfigurationManagement Database (CCMDB)

Server, Network & Device

ManagementStorage

ManagementSecurity

ManagementBusiness

ApplicationManagement

Service Delivery

& SupportService

DeploymentInformation

ManagementBusinessResilience

IT CRM & Business

Management

A Comprehensive Approach to IT Service Management

IT Service Management Platform

IT Process Management Products

IT Operational Management Products

IBM IT Service Management

AgendaIT Challenge and IT Service Management

(ITSM) Strategy

ITSM Architecture and Design

Discovery Library Adapters

Automated Agentless Discovery

CCMDB Data Management

Data Subsystem

Discovery LibraryIntegrated User Interfaces

Process Runtime Environment & Services

IT Infrastructure, Transactions,Users, and Business Processes

Integration Adapters

Agentless DiscoveryData Federation---.--.-----.-==.=-.-

---.--.-----.-==.=-.----.--.-----.-==.=-.-

---.--.-----.-==.=-.-

Integration Modules

---.--.-----.-==.=-.-

CommonProcess monitorReporting EngineLook and FeelTask FlowConfigure policy

Configuration &Change Management

Release Management

AvailabilityManagement

Storage Management

Functional interfaces

Operational Management Products (IBM & 3rd party)

Process SpecificTasks

Process SpecificTasks

IT Service Management Architecture

CMDBReconciliationData Normalization

Process Managers

Color LegendGreen = CCMDBYellow = Process Managers

Process

AgendaIT Challenge and IT Service Management

(ITSM) Strategy

ITSM Architecture and Design

Discovery Library Adaptersz/OS DLA Demo

Automated Agentless Discovery

CCMDB Data Management

What is the IBM Discovery Library?What is the IBM Discovery Library?The IBM Discovery Library facilitates a lightweight, common way to share

information about discovered resources and relationships.

An XML schema specification, called IDentity Markup Language (IDML)

A set of recommended practices for deploying, utilizing and managing the discovery library, and for creating XML files contained in the discovery library.

Code (written by IBM and others) that creates the XML filesRelicore, Cendura, nLayers partnerships announced May 2005

What is the Discovery Library File Store?Discovery Library File Store (DLFS)

Any directory or folder capable of storing XML filesRequires credentials (username, password) given to Authors

and ReadersRequires transfer protocol (best practice sFTP) to put and get

files.Discovery Library

File StoreAuthors

Require write accessRequire rename ability

ReadersRequire read access

Populating the CCMDB with the Discovery Library

Discovery LibraryFile Store

Bulk Updates

Authors

Management Software System

Non-IBM products, Homegrown sources of Record, etc…

ISV

Customer

Readers

CMDB

CMDB

Discovery LibraryFile Store

Bulk Updates

TBSM

Authors may use one of more of a variety of

techniques to publish their information into the

discovery library (e.g. Discovery Library

API, IDML, XSLT)

The discovery library contains sequences

of data from individual authors,

“bulk” or “delta”discoveries.

Readers may consume the data directly via consumption of the

IDML, or indirectly via an infrastructure-based

component such as the CCMDB

TPM

Discovery Library Support Available Now 2H06*

Business Systems Manager 3.1

Composite Application Manager for Response Time Tracking v6.0

Configuration Manager 4.2.3+

Provisioning Manager 5.1

Service Level Advisor 2.1

Storage Manager 5.3

TotalStorage Productivity Center 3.1

TMS (Monitoring 6.1)

WebSphere Studio Asset Analyzer

z/OS

Composite Application Manager for Service Oriented Architecture

Composite Application Manager for WebSphere

InfoMan

Peregrine Service Center

Provision

Proviso

Real-time Active Dashboard

Remedy

WebSphere Resource Registry

zNetView

* Roadmap subject to change

z/OS DLA Demonstration

AgendaIT Challenge and IT Service Management

(ITSM) Strategy

ITSM Architecture and Design

Discovery Library Adapters

Automated Agentless Discovery

CCMDB Data Management

Key Aspects of CCMDB Discovery1. Know what you have

- Application Mapping with Dependencies> CCMDB performs a complete discovery and stores

information;» On the Applications including their Dependencies» On the Servers that are hosting the applications» On the network (routers, switches, etc)

2. Learn how its configured (and changed)- Configuration Auditing

> CCMDB tracks changes in the applications» Depicts that information on the map» Depicts that information thru reports

3. Compare it to others- Compliance

> Compare configuration to “golden master”» Compare to your standard

INVENTORY

ORDER ENTRY

LOGISTICS

How CCMDB Discovery WorksAPI

Discovery Engine& Sensors

Data Center Reference Model

Configuration Management Database

Run-Time Environment

External Applications

CCMDBClient

CCMDB Server

CCMDB Discovery ProcessBasic Discovery Requirements

Scope

- Specifies span of discovery

- Specified as IP addresses (subnet, range, specific IP address)

Access list

- “Read-only” access credentials to discover and query the components for itsconfigurations and dependencies

- Logins/passwords, community strings

Interval

- On demand

- Scheduled

Discovery Engine and SensorsAgent-free discovery engine

Collects the data to instantiate the Data Center Reference Model

Discovered data center infrastructure stored in CCMDB repository

Consumes minimal bandwidth and CPU resources

Uses open and standard protocols to access/query components

- SNMP

- SSH, WMI, Telnet

- JMX, SQL, LDAP

Secure communication between sensors and discovered components

Scheduled, coordinated and managed by discovery engine

CCMDB Out of the Box Discovery Sensor MatrixWeb Servers

Apache 1.x, 2.xiPlanet 4.xiPlanet/SunOne 6.xIIS 5.x, 6.xIBM HTTP Server 6.x

Application ServersWebSphere 4.x, 5.xWebLogic 5.x, 6.x, 7.x, 8.xOracle JBoss 4.xApache Tomcat 4.x, 5.xLotus Domino 6.0, 6.5

DatabasesOracle 8.x, 9.x, 10g/ISybase ASE 12.xSybase IQ 12.xDB2 7.x, 8.xMS SQL 2000PostGres SQL 7.x, 8.xMySQL 4.x

Routers and SwitchesCisco Routers IOS10.3+ Cisco Switches IOS 10.3+, CAT OSExtreme Switches Summit 48/48iHP Procurve Switches (SNMP supported)

FirewallsCisco PIX 6.xNetscreen Firewall (All)Checkpoint Firewall (Nokia and Solaris installs)

Load BalancersAlteon Load Balancer 3.0+F5 Big IP Load BalancerF5 DNS Server

Storage DevicesEmulex HBAsBrocade Switches (SNMP supported)EMC Symmetrix and Clarion series (EMC solution enabler 5.5 and 6.0)

ApplicationsPeopleSoftSAPSeibelNetegrityRemedy

Universal Data Sensor for 3rd Party Applications

CiscoWorks 2000MS SMS 2003

ServicesMS Active Directory 2000, 2003SunOne Directory Server 5.xWFS (Samba) 3.x

Supported Hosts/OSSolaris 2.6, 2.7, 2.8. 2.9 Red Hat Linux, Suse Linux AIX 4.x, 5.x HPUX 11.0, 11i Windows NT 4.0, 2000, 2003

Layer 2 Topology Support Discover host to Layer 2 element’s physical connection

Benefits:“if I change this switch configuration, what application will get affected?”

“Show me the entire cross tier dependency of this application”

Business Application DiscoveryAutomates the process of creating and maintaining business

application groupingsReduces time/labor to create/maintain application groupingImproved accuracy of business application structure composition

Flexible application definition schemesApplication DescriptorsApplication signature templates Software components grouping

Multiple granularity of business application definitionContainer level – WebLogic servers, Oracle DBDeep module level - WAR files, EAR files, ASP assemblies, DB schema

AgendaIT Challenge

IT Service Management (ITSM) Strategy

ITSM Architecture and Design

Discovery Library Adapters

Automated Agentless Discovery

CCMDB Data Management

CMDB Name Correlation (Reconciliation)

IT environment

Systems Management TCM

ServerATPM

DCM025 Homegrown Third party App

….

CDM BasedNaming Rules

ComputerSystem naming rules1.manufacturer name, machine model, serial number (MMTS), and virtual machine ID2.System board UUID3.Mac address – this is used for client computer system

If a CI type has multiple naming rules, multiple valid names may be created for a CI instance. The CMDB name correlation processing will correlate these name instances, detect and fix duplicates.

Multiple systems management applications are managing the computer system.

The common data model defines the naming rules to be used for each CI type.

Each naming rule defines the attributes required for that CI type

Each Mgmt system has its own local store and representation of the computer system

H ostA.ibmcom

H ostA

H ostA

LABEL/D ESC

\\....\..JJI38

\\...\.....1245

\\....\.......T1

\\....\...JZ

\\..\....Y

\\...\....X

\\...\.....C

\\...\...B

\\....\.....A

IDENTITFIER

012

901

890

789

567

456

345

234

123

ID GUID

T ask

T ask

T ask

SW Comp

SW Comp

SW Comp

C ompSys

C ompSys

C ompSys

TIMESTAMPST YPE

H ostA .ibmcom

H ostA

H ostA

LABEL/D ESC

\\....\..JJI38

\\...\.....1245

\\....\.......T1

\\....\...JZ

\\..\....Y

\\...\....X

\\...\.....C

\\...\...B

\\....\.....A

IDENTITFIER

012

901

890

789

567

456

345

234

123

ID GUID

T ask

T ask

T ask

SW Comp

SW Comp

SW Comp

C ompSys

C ompSys

C ompSys

TIMESTAMPST YPE

Runs On567123

Runs On456123

TYPETOFROM

Runs On567123

Runs On456123

TYPETOFROM

M anaged E lem ent

Relationship

General PurposeInstance Tables

TCM

TPM

SCM

MSSN ame

\\...\...C357

\\...\...B246

\\...\...A135

A liasM SS GUID

TCM

TPM

SCM

MSSN ame

\\...\...C357

\\...\...B246

\\...\...A135

A liasM SS GUID

M anagem ent Softw are System

357123

246123

135123

MSS GU IDGUID

357123

246123

135123

MSS GU IDGUID

M SS M anaged E lem ent Link

MSS Identifers

Relationships

222

123

222

123

M anaged Elem ent Alias

Hardw are (Asset)

123123

Com puter S ystem

Operating S ystem

Protocol Endpoint

IP Netw ork

Softw are Product (Asset)

Softw are Com ponent

ConfigurationItem Tables

CMDB Data Store

Manufacture name, machine model, Serial number, Virtual mach IDsb UUID, FQHN, Mac addrFQHN

sb UUIDFQHN

Mac addr, FQHNSb UUID

Major Integration ApproachesData Consolidation

Creating a single repository for consuming application to obtain the information from a single source.All information are physically stored in the repository.Plus

- Performance – local data access

Data FederationProvide a middleware for application to access data from different data sources as if it were a single source, regardless of the location, format, or access language. Does not physically bring data into the central repository.Plus

- Cost – implementation, maintenance, personnel- Access to the most current data

CMDB

CMDB APIs

H o s tA .i b m c o m

H o s tA

H o s tA

L A B E L /D E S C

\ \.. . . \ . .J J I3 8

\ \.. . \ . . .. .1 2 4 5

\ \.. . . \ . .. . . . .T 1

\ \.. . . \ . .. J Z

\ \.. \ . . . .Y

\ \. . . \ . . .. X

\ \. . . \ . . .. .C

\ \.. . \ . . .B

\ \. . . . \ . .. . .A

I D E N T IT F IE R

0 1 2

9 0 1

8 9 0

7 8 9

5 6 7

4 5 6

3 4 5

2 3 4

1 2 3

ID G U I D

T a s k

T a s k

T a s k

S W C o m p

S W C o m p

S W C o m p

C o m p S y s

C o m p S y s

C o m p S y s

T IM E S T A M P ST Y P E

H o s tA .i b m c o m

H o s tA

H o s tA

L A B E L /D E S C

\ \.. . . \ . .J J I3 8

\ \.. . \ . . .. .1 2 4 5

\ \.. . . \ . .. . . . .T 1

\ \.. . . \ . .. J Z

\ \.. \ . . . .Y

\ \. . . \ . . .. X

\ \. . . \ . . .. .C

\ \.. . \ . . .B

\ \. . . . \ . .. . .A

I D E N T IT F IE R

0 1 2

9 0 1

8 9 0

7 8 9

5 6 7

4 5 6

3 4 5

2 3 4

1 2 3

ID G U I D

T a s k

T a s k

T a s k

S W C o m p

S W C o m p

S W C o m p

C o m p S y s

C o m p S y s

C o m p S y s

T IM E S T A M P ST Y P E

R u n s O n5 6 71 2 3

R u n s O n4 5 61 2 3

T Y P ET OF R O M

R u n s O n5 6 71 2 3

R u n s O n4 5 61 2 3

T Y P ET OF R O M

M a n a g e d E le m e n t

R e la t io n s h ip

G e n e ra l P u rp o s eIn s ta n c e T a b le s

T C M

T P M

S C M

M S S N a m e

\\.. . \ . . .C3 5 7

\\.. . \ . . .B2 4 6

\\.. . \ . . .A1 3 5

A li a sM S S G U ID

T C M

T P M

S C M

M S S N a m e

\\.. . \ . . .C3 5 7

\\.. . \ . . .B2 4 6

\\.. . \ . . .A1 3 5

A li a sM S S G U ID

M a n a g e m e n t S o f tw a re S ys te m

3 5 71 2 3

2 4 61 2 3

1 3 51 2 3

M S S G U IDG U ID

3 5 71 2 3

2 4 61 2 3

1 3 51 2 3

M S S G U IDG U ID

M S S M a n a g e d E le m e n t L in k

M S S Id e n t if e rs

R e la t io n s h ip s

2 2 2

1 2 3

2 2 2

1 2 3

M a n a g e d E le m e n t A l ia s

H a rd w a re ( A s s e t )

1 2 31 2 3

C o m p u te r S y s te m

O p e r a t in g S ys te m

P ro t o c o l E n d p o in t

IP N e tw o rk

S o ftw a r e P ro d u c t ( A s s e t )

S o f tw a re C o m p o n e n t

C o n f ig u r a t io nIte m T a b le s

Physical Data Store

Data Consolidation Service

StorageDevices

Hardware Devices:disks, processors,

etc.

Network devices:routers, bridges,

hubsSoftware: operating

systems, applications,middleware,

subcomponentsConfiguration Items

Management Interfaces(SNMP, WMI, API’s, etc.)

IBM Information Integrator

Logical Data Store (Pluggable Data Adapters)Logical Data Store (Pluggable Data Adapters)

Databases

UDB, Oracle, Informix…

Web ServicesFlat FileWord doc, images?….

Non-Relational Data StoresXML, Excel…

Data level Security

Tivoli CMDB Data Integration Architecture

Structured Data SourceNon-Structured Data Source

API Data Source

Custom Adapters

Portal Framework Out of the box Reports Custom Queries

Enterprise Dashboard Business Intelligence Reporting Tools

Session 2.8:Discovery and Populating the IBM Tivoli Change & Configuration Management Database

Disclaimers and TrademarksNo part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation.Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.THE INFORMATION PROVIDED IN THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. The following terms are trademarks or registered trademarks of the IBM Corporation in either the United States, other countries or both: DB2, e-business logo, eServer, IBM, IBM eServer, IBM logo, Lotus, Tivoli, WebSphere, Rational, z/OS, zSeries, System z.Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States and/or other countries.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries.UNIX is a registered trademark of The Open Group in the United States and other countries.Linux is a trademark of Linus Torvalds in the United States and other countries.Other company, product, or service names may be trademarks or service marks of others.ITIL® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is Registered in the U.S. Patent and Trademark Office.IT Infrastructure Library® is a Registered Trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.