Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

How ITOM is Relevant in a DevOps World

First consider DevOps impact in terms of functional areas of IT operational management ITOM.

IT Operations Management (ITOM), which is operational practices based on event management, performance monitoring, and CMDB use, becomes increasingly useful in a DevOps world as it forms a foundation for delivering on the promise of DevOps with less risk. 

DevOps is a set of practices that brings developers together with IT infrastructure teams to ensure application releases can be moved into a production environment quickly and frequently while mitigating the risk of older release management practices.

DevOps tools can lower the risk by providing quick releases through automation and operational intelligence of the deployment process, however, application releases are not the only changes being made to the operational environment. Network changes, server patching, automated cloud migrations, database maintenance, and other changes all impact the operational environment. 


The Mutual Relationship 

Without the capability to control and document these changes, not only can an automated release fail, but also the ability to troubleshoot the reason for  failure could become a time-consuming, manual effort without the right tools and processes. 

ITOM creates the foundation for success which DevOps tools need, the core being a Configuration Management Database (CMDB) that is both built and maintained through automation of IT discovery and service-mapping solutions. 

As the pace of change increases and DevOps takes hold in an organization, particularly one that leverages cloud services, the legacy practice of building and maintaining a CMDB manually is insufficient. 

The CMDB requires continual updates of core changes through native IT discovery and mapping tools and through integration to Cloud Management Systems to match the rate of change in a digital practice.


CMDB and ITOM: Functions in the IT Environment

As systems are in operation, software, and application requirements drive changes that cause the configuration of the system to drift from its original configuration. Simultaneously, an automated deployment program and application developers are expecting the system’s last-known configuration. 

If configuration drift is not tracked through IT discovery and documented in CI (Configuration Item) records, and the team is unaware of the drift, then the deployment can fail, causing an incident that’s difficult to resolve except by reversing the change. 

With a well-maintained CMDB, this shift can be discovered and prevented by a small adjustment to the automated deployment program. Then, the CMDB must be checked for configuration changes, alerting the DevOps team, and then proceeding after they review/approve the continuation as shown below:

 


While some impacts will be detected before deployment, others will occur during the longer term. ITOM, combined with Proactive Problem-Management activities, can still prevent an impact. 

Event monitoring and incident management records form a base of historical knowledge, while predictive analytics and proactive problem management can be used to identify and adjust before a business gets impacted. 

After proactively preventing the issue, Problem Management is then able to seek the root cause of any recurring errors and address them permanently without firefighting.


A Real-world DevOps Example

Updates to an application a DevOps team manages cause the application to be more valuable to new business units. Demand for the application increases, causing capacity, and performance concerns. 

Monitoring and cloud management systems trap these automatically and react by allocating more server capacity and database space. The problem-management team reviews the recurring alerts, which is then able to track the issue to increased business demand. 

The team engages the primary business stakeholders to assess the likelihood of continued growth and evaluates the need for permanent capacity changes to be made. Team members are also able to make the business units aware that cloud costs will increase as a result of the increased demand.

As a result of the automation, the business never experienced the potential performance issues or major incidents caused by growth and IT was able to work directly with the business to address concerns and plan upgrades without ever creating a business impact. This proactive capability, which ITOM and automation supports, enabled IT to improve its standing with the business.


Virima: Your Partner in IT Management

Virima solutions are easy to use and configure. They also produce useful, actionable reports about your IT environment that can help you identify and resolve challenges before they become disruptive problems. For more examples of how discovery automation and a visualized CMDB can completely change the dynamics of IT management download this whitepaper or contact Virima to discuss your IT operational needs.

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

Table of contentsIT Asset Management (ITAM) is an important part of every IT organizationManaging devices includes managing the entire lifecycle of assetsCybersecurity asset management elevates ITAM to the next levelITAM vs CSAM: Which is a better investment?Stay ahead of all…

Table of contentsThe most important concepts in the CMDBRelationship with other CMDB componentsDifferences between CI relationships and CI dependenciesWhat are configuration item (CI) relationships?Why do you need to define CI relationships?What are configuration item (CI) dependencies?Why do you need to…

Table of contentsIT discovery can be an effective tool for vulnerability managementStaying ahead of cyber threatsVirima Discovery uncovers vulnerabilities and automatically remediates them  Most of the world's largest companies have hit the headlines for all the wrong reasons due to…

As an IT manager, keeping up with emerging cybersecurity threats is daunting. With asset management taking on increasing importance in the digital age, failing to protect your data can have serious implications. For example, the SolarWinds Orion attack in late…

Table of contentsWhat is agentless asset discovery?Agent vs. agentless discoveryBenefits of using agentless discoveryWhen to use agentless discovery?How Virima’s agentless discovery streamlines the discovery processStreamline your IT asset discovery process with Virima What is agentless asset discovery? Agentless asset discovery…

The IT asset discovery process is an essential part of modern IT management. With the massive adoption of hardware and software and the cost of these technologies, it becomes necessary to ensure they are tracked and inventoried. An IT asset…

Table of contentsThe evolving role of ITIT service mapping – the journey so farThe ViVID advantageGetting the most out of your ServiceNow investmentWhen a single solution is not enough The IT department of the future isn't just about server farms…

Table of contentsWhat is IT discovery?Why is a good IT discovery process important?Why should you invest in IT asset discovery1. Invest in the right technology2. Gain visibility of your digital environment3. A proactive security process4. Stay compliant with data security…

Table of contentsUnderstanding the service ecosystemIdentifying the change eventsPrioritizing service impactService mapping is critical to your change management plan1. No more guesswork about ‘what changed’ in your IT environment2. Identify quickly what caused a service outage and respond immediately3. Determine…

Table of contentsKeeping CMDB accurate and up-to-date with application dependency mapping Reducing IT complexity with dynamic visualization of complex CMDB relationshipsAddressing security vulnerabilities on a day-to-day basisStrengthening regulatory compliance Cloud migration and cloud cost optimizationLowering overall IT investment by streamlining operationsTackle your…