SlideShare a Scribd company logo
Pre-Con Ed: Make Better Sense out
of the World of CMDB and Change
Management
John Weston
Sr. Principal Consultant, Service Management — CA Technologies
AMX29E
AGILE MANAGEMENT
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
© 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2016 presentation is intended for informational purposes only and does not
form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for
accuracy by CA.
Terms of this Presentation
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
INTRODUCTION
CMDB DEPLOYMENT GUIDELINES
ADVANCED CMDB FUNCTIONS
CHANGE AND CONFIGURATION MANAGEMENT
1
2
3
4
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CMDB Deployment Guidelines
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Management
 A service is any system, process, access or other capability that IT
provides its customers according to established expectations of
availability and quality.
 Configuration Items (CIs) are entities—usually subject to Change
Management—that are vital to the delivery of a defined service, including
– physical servers
– VMs
– applications
 Configuration Management is the process responsible for discovering and
maintaining baseline definitions of services, CIs, and CI relationships.
Definitions
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Management
 Establish CI inventory
 Create and manage CI and Service relationships and dependencies
 Manage CI and Service configuration baselines
 Support Root Cause Analysis and Change Impact Analysis
 Provide change detection and configuration drift analysis
 Drive Continuous Service Improvement for CI and Service
configurations through tolerance mapping
Functions and Benefits
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
General Guidelines for the CMDB
 Not every asset is a CI and not every CI is an asset. Here is a good guideline for
what constitutes a CI: is it subject to your Change Management policies?
 Assets can be entered into the Management Database (MDB) and give benefits to
Incident, Problem, and Change Management.
 Do not feel like you must discover everything in order to have a useful CMDB.
– You don’t necessarily need all possible attributes for a given CI
– You don’t need to model all CIs and Services in your infrastructure
 Keep change discovery and configuration remediation in the Management Data
Repositories (MDRs).
 Take a look at CA Configuration Automation. You probably have an entitlement to
it through CA Service Desk Manager.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Your Customers View IT
Service
End
Users
Identity
Manager
Firewall
Applications
Switch
Load
Balancer Portal
SAP
PSFT
Siebel
Web Services
3rd Party
applications
Web
Servers
Databases
Router
Mainframe
DatabaseThe end user doesn’t care about any of this
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Defining Services
 Services are often made
up of many layers
 Connecting layers is
what makes Services
useful but complicated
 We need to find these
connections to navigate
through the layers
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Hierarchies
Service
Layer
Service
Subset
Layer
System
Layer
Logical
Host
Layer
Physical
Host
Layer
Service
Sub-Service
Logical
Partition
Computer
Hardware
Storage
Hardware
Storage
LUN
Network
Zone
Firewall
Hardware
Network
Hardware
System
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service
Layer
Service
Subset
Layer
System
Layer
Logical
Host
Layer
Physical
Host
Layer
Peer-to-Peer Relationships
Storage
Hardware
Network
Hardware
Storage
LUN
Network
Zone
Firewall
Hardware
Service
Sub-Service
Computer
Hardware
System
Logical
Partition
Peer-to-Peer relationships should be considered carefully
because the more “sideways” steps you take the more
unclear it is if a potential dependency exists.
Dependency? Dependency? Dependency? Dependency?
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Structure Guidelines
Select the Appropriate Structure
Service Mgt = Hierarchy
System Mgt =
Technology-to-Technology
Cost Mgt =
Technology-to-Cost/Contract
Add / Remove hierarchy
layers as required
+
Technology layers can be
skipped if inappropriate
Start Simple….
Then build complexity…
Services, Systems & Computers
Adding Storage, Networks, etc..
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CI Relationship Guidelines
 Start with the out-of-the-box CI relationships
 Define Provider-Dependent relationships between two
Service layers and between CI Families in each Layer
 Modify the CMDB Visualizer relationship formatting
– Assign a different color to each Relationship Type
– Keep Black the peer-to-peer Relationship Types within a layer
– Keep in mind that peer-to-peer relationships will not show up
in the Visualizer when you use the Impact Analysis and Root Cause
Analysis filters
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Advanced CMDB Functions
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Transaction Work Area
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Transaction Work Area (TWA)
 The TWA is a staging area for storing, reviewing, and
modifying CI and CI relationship transactions before importing
them into the CMDB proper.
 Primary uses
– Avoid creating multiple records for what is actually one CI
– Avoid creating one record for what are actually multiple CIs
– Transform CI data to conform with CMDB policies, for example where
multiple MDRs have different naming conventions
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The TWA Process
 Load CI and CI relationship data into the TWA. Note that
reconciliation is not attempted at this point. Sources:
– The web interface
– GRLoader utility with the -lttwa (load into initial state) or -lttwar (load
into ready state) options
– Native SQL queries
 Modify the data as needed, using the Service Desk web
interface or native SQL queries.
From Discovery Source to the TWA
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The TWA Process
 Load data from the TWA into the CMDB using the
GRLoader utility with the -lftwa (load transactions from TWA)
or -lftwai (load from TWA and inactivate successful
transactions) options
From the TWA to the CMDB
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Item Reconciliation
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Item (CI) Reconciliation
 Purpose: assign imported CI attributes to
existing CIs where appropriate, and avoid
creating duplicates. Name = server1
Mac address =
11:11:11:11:11
Name = server1
Mac address =
22:22:22:22:22
Name = server1
Questions about these three imported CIs:
How many servers should we now have in the CMDB?
How do we determine the “surviving” CI or CIs?
What happens to eliminated duplicates?
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Reconciliation Priorities
 ID (ca_owned_resource uuid)
 Federated Data
– Federated Asset ID
– MDR Name
– MDR Class
 Reconciliation attributes
– Name
– Serial Number
– Asset Number
– System Name
– DNS Name
– MAC Address
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Reconciliation Rules
Name
Serial
Number
Asset
Number
System
Name DNS Name
MAC
Address Result
Unique Null Null Null Null Null CI created
Null Unique Null Null Null Null CI created
Null Null Unique Null Null Null CI created
Null Null Null Unique Null Null CI created
Null Null Null Null Unique Null CI created
Null Null Null Null Null Unique CI created
Duplicate Duplicate Duplicate Unique Duplicate Duplicate CI created
Unique Duplicate Duplicate Duplicate Duplicate Duplicate Recognized as duplicate CI
Null Null Null Null Unique Unique CI created
Null Null Null Null Duplicate Unique Recognized as duplicate CI
Null Null Null Null Unique Duplicate Recognized as duplicate CI
Duplicate Duplicate Unique Duplicate Duplicate Duplicate CI created
Duplicate Unique Duplicate Duplicate Duplicate Duplicate CI created
Duplicate Duplicate Duplicate Duplicate Duplicate Unique Recognized as duplicate CI
Duplicate Duplicate Duplicate Duplicate Unique Duplicate Recognized as duplicate CI
Duplicate Duplicate Duplicate Duplicate Unique Unique Recognized as duplicate CI
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Ambiguous Configuration Items
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Ambiguous CIs
 An ambiguous CI is one that may be a duplicate.
 A CI’s ambiguity index measures its potential for being a duplicate.
It is a count of all of the other CI attributes that match any of its
reconciliation attributes.
– It’s a simple sum of the counts of “CIs with matching name,” “CIs with matching serial
number,” etc.
– Example: Ambiguity Index 2 means that there are two matching attributes in the CMDB,
but they might be from the same CI.
 Calculate the ambiguity index by running the cmdb_update_ambiguity
command.
– Example: cmdb_update_ambiguity - m all - d MSSQL - u ServiceDesk - p
sdmpassword -s sdmserver1 –level info
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Dealing with Ambiguous CIs
 Identify them
– Scoreboard query
– Administration tab
– Reconciliation tab on a particular CI record
 Resolve them
– Do nothing or modify the offending CI attributes
– Mark as not ambiguous: removes the CI from lists of ambiguous CIs
– Inactivate the ambiguous CI: removes the CI from normal CI lists
– Supersede: a good option if one or more MDRs will continue to send
updates of the CI in question
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Superseded Configuration Items
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Superseded CIs
 As we saw previously, superseded CIs are sometimes created
when resolving ambiguous CIs
 Incoming updates to a superseded CI are redirected to the
superseding CI
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Should You Supersede This CI?
 For one-off updates it is better to fix input data than to supersede a CI.
Superseding generally will be used where you have little control over
incoming transactions.
 Superseded CIs are flagged as inactive and by default cannot be updated
via the web UI.
 Since a superseded CI will not be updated its attributes and other data are
allowed to atrophy.
 If you supersede a superseding CI then all updates will be redirected to the
higher superseding CI, as expected.
Some Considerations
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
GRLoader
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Examples of GRLoader Commands
 cmdb_update_ambiguity -m all -d MSSQL -u username -p
password -s server -level info — Runs an ambiguity check
 grloader -u username -p password -s
http://localhost:8080 -i spreadsheet.xlsx –lttwa —
Loads from an Excel spreadsheet into the TWA
 grloader -u username -p password -s
http://localhost:8080 -i spreadsheet.xlsx –a —
Allows updates from a spreadsheet directly to the CMDB
 grloader -u username -p password -s
http://localhost:8080 -sc Windows —
Lists attributes of the specified class (in this case the Windows class).
33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
GRLoader Considerations
 A number of CI attributes are validated against values from tables
rather than being free text entry fields. The import must have valid
values for these fields:
– audit_userid
– bm_rep
– bm_status
– class
– company_bought_for_uuid
– contact_1
– contact_2
– contact_3
– delete_flag
– department
– expense_code
– family
– location
– manufacturer
– model
– operating_system
– org_bought_for_uuid
– priority
– repair_org
– resource_contact
– resource_owner_uuid
– service_org
– service_type
– status
– supplier
– vendor_repair
– vendor_restore
34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change and Configuration Management
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Combining the Two Disciplines
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change Management
 The process of managing updates to IT infrastructure
 Provides a control structure to authorize changes
 Defines clear roles and responsibilities to implement changes
 Optimized Change Management results in:
– Fewer incidents and problems
– Swifter resolution of problems when they do occur
– Efficient fulfillment of strategic improvement requests
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Where Does the CMDB Come In?
 Track configuration changes
against baselines and/or
gold standards
 Detect and correct configuration
drift before it impacts availability
or performance of applications
or services
 Ensure managed servers are
updated to the latest
configuration specifications
Detection of
Configuration
Error
Service
Incident
Opened
System
Isolation /
Quarantine
Analysis /
Known Error
Change
Request
Opened
Change
Request
Approved
Change
Deployed
Compliance
Verified
38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Audit and Control Facility
39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Configuration Audit and Control Facility (CACF)
 The CACF bridges Change Management and Configuration
Management. It can also leverage discovery solutions.
 Goals of the CACF
– Allow for identification of CI attributes that will be updated as part of a
Change Order.
– Verify successful implementation of the attribute updates.
– Ultimately, ensure that the CMDB’s accuracy is maintained.
40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CACF Roles and Responsibilities
 CMDB Administrator
– Defines managed CI attributes.
– Defines the policies for updating managed attributes.
 What to do with “rogue” updates (i.e., those not associated with a Change Order)
 Which MDRs are authorized to update which attributes
– Defines which Change statuses reflect editable Changes and which statuses
represent verification states.
 Change Analyst
– Specifies the attributes that will be updated in a particular Change.
– For each attribute, indicates whether the update will be verified and
in which way.
41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How Change Verification Works
 Change Order must be in a Verification in Progress state
 An update to the relevant CI is loaded via the web interface, GRLoader, or
web services API.
 Based on the CACF verification policy for this update one or more of the
following actions will be taken:
– The update is accepted, and the CI is updated
– The update is deferred to the TWA so that a user can assess it
– An Incident is created
– The update is rejected
 The CA Service Management wiki has great recommendations on setting
up CACF and especially Change verification.
42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Change Verification Policies
 Allow Update Only if Matches Change Specification:
depending on the incoming update CACF will either verify the
update and close the Change Order or fail the verification.
 Set After Change Verified: closing the Change Order
automatically updates the CI attribute to the planned value.
 Accept the Planned Value: analyst manually confirms the
accuracy of the planned value and accepts it, which updates
the CI.
Some Examples
43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Results
While Configuration Management touches on many aspects of IT in one way or
another, its link to and dependence on Change Management is particularly
important. In today’s session we have learned about some of the CA Service Desk
Manager CMDB capabilities. We have also discussed the sorts of pitfalls and
opportunities to watch for when preparing to deploy Configuration Management.
You can see benefits from your initial forays into Configuration Management,
but the discipline also rewards an iterative approach of continual improvement.
Summary
A Few Words to Review
44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
AMX121S
Case Study: Using Process Automation in CA Service
Catalog to Deliver Services Faster
11/16/2016 at 3:45 pm
AMX18S
Slaying the Dragons of Agile, DevOps and ITSM
Information Flow
11/16/2016 at 4:30 pm
AMX10S
Case Study: ITSM Process Automation at Cerner: We’re
all in!
11/17/2016 at 3:00 pm
45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Service Desk
and Support
Analyst xFlow
Experience
Software and
Hardware Asset
Management
Request
Management
and Self-service
Management
Insights –
Reporting and
Dashboards
46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Questions?
47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Thank you.
Stay connected at communities.ca.com

More Related Content

PPTX
Pre-Con Ed: Software Asset Management: Working in the Trenches
PPTX
Pre-Con Ed: What's New in CA Service Management
PPTX
Pre-Con Ed: Building Basic Workflows in CA Service Management
PPTX
Pre-Con Ed: CA Software Asset Management - Key Customer Topics
PPTX
Pre-Con Ed: Upgrading to CA Service Management
PPTX
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
PPTX
Pre-Con Ed: Building Advanced Workflows in CA Service Management
PDF
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...
Pre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: What's New in CA Service Management
Pre-Con Ed: Building Basic Workflows in CA Service Management
Pre-Con Ed: CA Software Asset Management - Key Customer Topics
Pre-Con Ed: Upgrading to CA Service Management
Pre-Con Ed: CA Service Management: Building an Awesome Catalog of Services Pe...
Pre-Con Ed: Building Advanced Workflows in CA Service Management
Pre-Con Ed: How to Get the Most out of Your DB2, DB2 Management, and Analytic...

What's hot (20)

PDF
CA IDMS Buffer Tuning
PDF
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
PDF
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
PDF
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
PPTX
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-service
PDF
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
PDF
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
PDF
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
PDF
Pre-Con Ed: Exploiting Operational Intelligence within Database Management tools
PDF
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
PDF
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
PDF
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
PDF
Driving Down Costs for DB2 Management
PPTX
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
PDF
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
PDF
Delivering CA Workload Automation from a SaaS Platform
PDF
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
PDF
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
PDF
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
PDF
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
CA IDMS Buffer Tuning
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Explore What’s New in CA Performance Management 3.0
Hands-on Lab: Get the Most Out of CA Service Management Unified Self-service
Pre-Con Ed: What's New with CA DB2 Tools for Administration, Utilities, Perfo...
Pre-Con Ed: Simplify Administration and Reporting in CA Application Performan...
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Exploiting Operational Intelligence within Database Management tools
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Upgrading CA Workload Automation DE to R12
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Driving Down Costs for DB2 Management
Pre-Con Ed: There has to be a Better Way to Fast Test Coverage!
Case Study: Exelon's Innovative CA PPM Upgrade Yields Valuable Outcomes for I...
Delivering CA Workload Automation from a SaaS Platform
Pre-Con Ed: Using SQL to Access Your CA IDMS Databases
Use Case: Migrating from Terma Jaws to CA Workload Automation iDash
Pre-Con Ed: Critical Path Analysis with CA Workload Automation (AE) iDash - O...
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Ad

Viewers also liked (17)

PDF
Information Mining and the CMDB
PDF
Why CMDB - 7 Fundamental Use Cases
PPTX
Ontology Diagrams for Successful Knowldge Capture and Transfer
PPTX
ITIL 2011 Foundation Overview
PDF
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
PDF
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
PDF
Building a Configuration Management Database from the Ground Up
PPT
Kunalhasija CMDB & ITIL
PPTX
IT Service Catalogs: 5 Keys to Good Service Design
PPTX
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
PPTX
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
PPT
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
PPT
Cracking the CMDB Enigma
PDF
CMDB as a Corporate Asset
PPTX
Building a devops CMDB
PPT
Defining Services for a Service Catalog
PPT
IT Service Delivery Model Overview
Information Mining and the CMDB
Why CMDB - 7 Fundamental Use Cases
Ontology Diagrams for Successful Knowldge Capture and Transfer
ITIL 2011 Foundation Overview
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
Building a Configuration Management Database from the Ground Up
Kunalhasija CMDB & ITIL
IT Service Catalogs: 5 Keys to Good Service Design
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
Cracking the CMDB Enigma
CMDB as a Corporate Asset
Building a devops CMDB
Defining Services for a Service Catalog
IT Service Delivery Model Overview
Ad

Similar to Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management (20)

PDF
Pre-Con Education: Effective Change/Configuration Management With CA Service...
PDF
The Enduring Myth of CMDB White Paper - 2.0
PDF
The Enduring Myth of CMDB - White Paper
PPT
D Config Mgt.ppt
PDF
CI Lifecycle in ServiceNow CMDB_ A Comprehensive Guide.pdf
PPT
A Practical Guide to CMDB Deployment in a Tivoli Environment
PDF
Dit yvol2iss27
PDF
Dit yvol3iss25
PPT
ITIL version 2: Foundation Training
PDF
Dit yvol3iss16
PDF
Download White Paper : CMDB Implementations - A Tale of Two Extremes
PPS
Ni2 demo april07
 
PDF
CI lifecycle in ServiceNow CMDB and its importance..pdf
PPTX
Getting a Deeper Look at Your IBM® Z and IBM i Data in ServiceNow
PDF
Gartner Cmdb Article
 
PPT
Module establish business data structure
PDF
The Essential Guide for Automating CMDB population and maintenance
PDF
SMB250: Stop Making Unforced Errors: Improve Management of your Configuration...
PPT
Ravi Scm Final
PDF
Dit yvol3iss4
Pre-Con Education: Effective Change/Configuration Management With CA Service...
The Enduring Myth of CMDB White Paper - 2.0
The Enduring Myth of CMDB - White Paper
D Config Mgt.ppt
CI Lifecycle in ServiceNow CMDB_ A Comprehensive Guide.pdf
A Practical Guide to CMDB Deployment in a Tivoli Environment
Dit yvol2iss27
Dit yvol3iss25
ITIL version 2: Foundation Training
Dit yvol3iss16
Download White Paper : CMDB Implementations - A Tale of Two Extremes
Ni2 demo april07
 
CI lifecycle in ServiceNow CMDB and its importance..pdf
Getting a Deeper Look at Your IBM® Z and IBM i Data in ServiceNow
Gartner Cmdb Article
 
Module establish business data structure
The Essential Guide for Automating CMDB population and maintenance
SMB250: Stop Making Unforced Errors: Improve Management of your Configuration...
Ravi Scm Final
Dit yvol3iss4

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Mobile App Security Testing_ A Comprehensive Guide.pdf
1. Introduction to Computer Programming.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
A comparative analysis of optical character recognition models for extracting...
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks

Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management

  • 1. Pre-Con Ed: Make Better Sense out of the World of CMDB and Change Management John Weston Sr. Principal Consultant, Service Management — CA Technologies AMX29E AGILE MANAGEMENT
  • 2. 3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. Terms of this Presentation
  • 3. 5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda INTRODUCTION CMDB DEPLOYMENT GUIDELINES ADVANCED CMDB FUNCTIONS CHANGE AND CONFIGURATION MANAGEMENT 1 2 3 4
  • 4. 6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CMDB Deployment Guidelines
  • 5. 7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Management  A service is any system, process, access or other capability that IT provides its customers according to established expectations of availability and quality.  Configuration Items (CIs) are entities—usually subject to Change Management—that are vital to the delivery of a defined service, including – physical servers – VMs – applications  Configuration Management is the process responsible for discovering and maintaining baseline definitions of services, CIs, and CI relationships. Definitions
  • 6. 8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Management  Establish CI inventory  Create and manage CI and Service relationships and dependencies  Manage CI and Service configuration baselines  Support Root Cause Analysis and Change Impact Analysis  Provide change detection and configuration drift analysis  Drive Continuous Service Improvement for CI and Service configurations through tolerance mapping Functions and Benefits
  • 7. 9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD General Guidelines for the CMDB  Not every asset is a CI and not every CI is an asset. Here is a good guideline for what constitutes a CI: is it subject to your Change Management policies?  Assets can be entered into the Management Database (MDB) and give benefits to Incident, Problem, and Change Management.  Do not feel like you must discover everything in order to have a useful CMDB. – You don’t necessarily need all possible attributes for a given CI – You don’t need to model all CIs and Services in your infrastructure  Keep change discovery and configuration remediation in the Management Data Repositories (MDRs).  Take a look at CA Configuration Automation. You probably have an entitlement to it through CA Service Desk Manager.
  • 8. 10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Your Customers View IT Service End Users Identity Manager Firewall Applications Switch Load Balancer Portal SAP PSFT Siebel Web Services 3rd Party applications Web Servers Databases Router Mainframe DatabaseThe end user doesn’t care about any of this
  • 9. 11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Defining Services  Services are often made up of many layers  Connecting layers is what makes Services useful but complicated  We need to find these connections to navigate through the layers
  • 10. 12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Hierarchies Service Layer Service Subset Layer System Layer Logical Host Layer Physical Host Layer Service Sub-Service Logical Partition Computer Hardware Storage Hardware Storage LUN Network Zone Firewall Hardware Network Hardware System
  • 11. 13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Layer Service Subset Layer System Layer Logical Host Layer Physical Host Layer Peer-to-Peer Relationships Storage Hardware Network Hardware Storage LUN Network Zone Firewall Hardware Service Sub-Service Computer Hardware System Logical Partition Peer-to-Peer relationships should be considered carefully because the more “sideways” steps you take the more unclear it is if a potential dependency exists. Dependency? Dependency? Dependency? Dependency?
  • 12. 14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Structure Guidelines Select the Appropriate Structure Service Mgt = Hierarchy System Mgt = Technology-to-Technology Cost Mgt = Technology-to-Cost/Contract Add / Remove hierarchy layers as required + Technology layers can be skipped if inappropriate Start Simple…. Then build complexity… Services, Systems & Computers Adding Storage, Networks, etc..
  • 13. 15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CI Relationship Guidelines  Start with the out-of-the-box CI relationships  Define Provider-Dependent relationships between two Service layers and between CI Families in each Layer  Modify the CMDB Visualizer relationship formatting – Assign a different color to each Relationship Type – Keep Black the peer-to-peer Relationship Types within a layer – Keep in mind that peer-to-peer relationships will not show up in the Visualizer when you use the Impact Analysis and Root Cause Analysis filters
  • 14. 16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Advanced CMDB Functions
  • 15. 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Transaction Work Area
  • 16. 18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Transaction Work Area (TWA)  The TWA is a staging area for storing, reviewing, and modifying CI and CI relationship transactions before importing them into the CMDB proper.  Primary uses – Avoid creating multiple records for what is actually one CI – Avoid creating one record for what are actually multiple CIs – Transform CI data to conform with CMDB policies, for example where multiple MDRs have different naming conventions
  • 17. 19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The TWA Process  Load CI and CI relationship data into the TWA. Note that reconciliation is not attempted at this point. Sources: – The web interface – GRLoader utility with the -lttwa (load into initial state) or -lttwar (load into ready state) options – Native SQL queries  Modify the data as needed, using the Service Desk web interface or native SQL queries. From Discovery Source to the TWA
  • 18. 20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The TWA Process  Load data from the TWA into the CMDB using the GRLoader utility with the -lftwa (load transactions from TWA) or -lftwai (load from TWA and inactivate successful transactions) options From the TWA to the CMDB
  • 19. 21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Item Reconciliation
  • 20. 22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Item (CI) Reconciliation  Purpose: assign imported CI attributes to existing CIs where appropriate, and avoid creating duplicates. Name = server1 Mac address = 11:11:11:11:11 Name = server1 Mac address = 22:22:22:22:22 Name = server1 Questions about these three imported CIs: How many servers should we now have in the CMDB? How do we determine the “surviving” CI or CIs? What happens to eliminated duplicates?
  • 21. 23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Reconciliation Priorities  ID (ca_owned_resource uuid)  Federated Data – Federated Asset ID – MDR Name – MDR Class  Reconciliation attributes – Name – Serial Number – Asset Number – System Name – DNS Name – MAC Address
  • 22. 24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Reconciliation Rules Name Serial Number Asset Number System Name DNS Name MAC Address Result Unique Null Null Null Null Null CI created Null Unique Null Null Null Null CI created Null Null Unique Null Null Null CI created Null Null Null Unique Null Null CI created Null Null Null Null Unique Null CI created Null Null Null Null Null Unique CI created Duplicate Duplicate Duplicate Unique Duplicate Duplicate CI created Unique Duplicate Duplicate Duplicate Duplicate Duplicate Recognized as duplicate CI Null Null Null Null Unique Unique CI created Null Null Null Null Duplicate Unique Recognized as duplicate CI Null Null Null Null Unique Duplicate Recognized as duplicate CI Duplicate Duplicate Unique Duplicate Duplicate Duplicate CI created Duplicate Unique Duplicate Duplicate Duplicate Duplicate CI created Duplicate Duplicate Duplicate Duplicate Duplicate Unique Recognized as duplicate CI Duplicate Duplicate Duplicate Duplicate Unique Duplicate Recognized as duplicate CI Duplicate Duplicate Duplicate Duplicate Unique Unique Recognized as duplicate CI
  • 23. 25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Ambiguous Configuration Items
  • 24. 26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Ambiguous CIs  An ambiguous CI is one that may be a duplicate.  A CI’s ambiguity index measures its potential for being a duplicate. It is a count of all of the other CI attributes that match any of its reconciliation attributes. – It’s a simple sum of the counts of “CIs with matching name,” “CIs with matching serial number,” etc. – Example: Ambiguity Index 2 means that there are two matching attributes in the CMDB, but they might be from the same CI.  Calculate the ambiguity index by running the cmdb_update_ambiguity command. – Example: cmdb_update_ambiguity - m all - d MSSQL - u ServiceDesk - p sdmpassword -s sdmserver1 –level info
  • 25. 27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Dealing with Ambiguous CIs  Identify them – Scoreboard query – Administration tab – Reconciliation tab on a particular CI record  Resolve them – Do nothing or modify the offending CI attributes – Mark as not ambiguous: removes the CI from lists of ambiguous CIs – Inactivate the ambiguous CI: removes the CI from normal CI lists – Supersede: a good option if one or more MDRs will continue to send updates of the CI in question
  • 26. 28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Superseded Configuration Items
  • 27. 29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Superseded CIs  As we saw previously, superseded CIs are sometimes created when resolving ambiguous CIs  Incoming updates to a superseded CI are redirected to the superseding CI
  • 28. 30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Should You Supersede This CI?  For one-off updates it is better to fix input data than to supersede a CI. Superseding generally will be used where you have little control over incoming transactions.  Superseded CIs are flagged as inactive and by default cannot be updated via the web UI.  Since a superseded CI will not be updated its attributes and other data are allowed to atrophy.  If you supersede a superseding CI then all updates will be redirected to the higher superseding CI, as expected. Some Considerations
  • 29. 31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD GRLoader
  • 30. 32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Examples of GRLoader Commands  cmdb_update_ambiguity -m all -d MSSQL -u username -p password -s server -level info — Runs an ambiguity check  grloader -u username -p password -s http://localhost:8080 -i spreadsheet.xlsx –lttwa — Loads from an Excel spreadsheet into the TWA  grloader -u username -p password -s http://localhost:8080 -i spreadsheet.xlsx –a — Allows updates from a spreadsheet directly to the CMDB  grloader -u username -p password -s http://localhost:8080 -sc Windows — Lists attributes of the specified class (in this case the Windows class).
  • 31. 33 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD GRLoader Considerations  A number of CI attributes are validated against values from tables rather than being free text entry fields. The import must have valid values for these fields: – audit_userid – bm_rep – bm_status – class – company_bought_for_uuid – contact_1 – contact_2 – contact_3 – delete_flag – department – expense_code – family – location – manufacturer – model – operating_system – org_bought_for_uuid – priority – repair_org – resource_contact – resource_owner_uuid – service_org – service_type – status – supplier – vendor_repair – vendor_restore
  • 32. 34 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change and Configuration Management
  • 33. 35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Combining the Two Disciplines
  • 34. 36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change Management  The process of managing updates to IT infrastructure  Provides a control structure to authorize changes  Defines clear roles and responsibilities to implement changes  Optimized Change Management results in: – Fewer incidents and problems – Swifter resolution of problems when they do occur – Efficient fulfillment of strategic improvement requests
  • 35. 37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where Does the CMDB Come In?  Track configuration changes against baselines and/or gold standards  Detect and correct configuration drift before it impacts availability or performance of applications or services  Ensure managed servers are updated to the latest configuration specifications Detection of Configuration Error Service Incident Opened System Isolation / Quarantine Analysis / Known Error Change Request Opened Change Request Approved Change Deployed Compliance Verified
  • 36. 38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Audit and Control Facility
  • 37. 39 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Configuration Audit and Control Facility (CACF)  The CACF bridges Change Management and Configuration Management. It can also leverage discovery solutions.  Goals of the CACF – Allow for identification of CI attributes that will be updated as part of a Change Order. – Verify successful implementation of the attribute updates. – Ultimately, ensure that the CMDB’s accuracy is maintained.
  • 38. 40 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CACF Roles and Responsibilities  CMDB Administrator – Defines managed CI attributes. – Defines the policies for updating managed attributes.  What to do with “rogue” updates (i.e., those not associated with a Change Order)  Which MDRs are authorized to update which attributes – Defines which Change statuses reflect editable Changes and which statuses represent verification states.  Change Analyst – Specifies the attributes that will be updated in a particular Change. – For each attribute, indicates whether the update will be verified and in which way.
  • 39. 41 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Change Verification Works  Change Order must be in a Verification in Progress state  An update to the relevant CI is loaded via the web interface, GRLoader, or web services API.  Based on the CACF verification policy for this update one or more of the following actions will be taken: – The update is accepted, and the CI is updated – The update is deferred to the TWA so that a user can assess it – An Incident is created – The update is rejected  The CA Service Management wiki has great recommendations on setting up CACF and especially Change verification.
  • 40. 42 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Change Verification Policies  Allow Update Only if Matches Change Specification: depending on the incoming update CACF will either verify the update and close the Change Order or fail the verification.  Set After Change Verified: closing the Change Order automatically updates the CI attribute to the planned value.  Accept the Planned Value: analyst manually confirms the accuracy of the planned value and accepts it, which updates the CI. Some Examples
  • 41. 43 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Results While Configuration Management touches on many aspects of IT in one way or another, its link to and dependence on Change Management is particularly important. In today’s session we have learned about some of the CA Service Desk Manager CMDB capabilities. We have also discussed the sorts of pitfalls and opportunities to watch for when preparing to deploy Configuration Management. You can see benefits from your initial forays into Configuration Management, but the discipline also rewards an iterative approach of continual improvement. Summary A Few Words to Review
  • 42. 44 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME AMX121S Case Study: Using Process Automation in CA Service Catalog to Deliver Services Faster 11/16/2016 at 3:45 pm AMX18S Slaying the Dragons of Agile, DevOps and ITSM Information Flow 11/16/2016 at 4:30 pm AMX10S Case Study: ITSM Process Automation at Cerner: We’re all in! 11/17/2016 at 3:00 pm
  • 43. 45 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Service Desk and Support Analyst xFlow Experience Software and Hardware Asset Management Request Management and Self-service Management Insights – Reporting and Dashboards
  • 44. 46 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
  • 45. 47 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Thank you. Stay connected at communities.ca.com

Editor's Notes

  • #2: As you build out your presentation, here are a few dos and don’ts.