Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Success is in the Details

ITIL 4 guides businesses on how IT works today, how IT will work in the future - Agile, DevOps, etc

Last week I discussed why discovery is important and a few crucial questions to ask before starting the process.

Today’s post is about the details that are most likely to trip up a major data center project. A single piece of seemingly trivial hardware that isn’t moved over to the new environment can shut down a vital system or, because of interdependencies, multiple systems.

The items involved in IT Discovery that we’ll discuss are servers and storage.


Servers

The workhorses of your data center, information collected for every physical server should include 

  • Manufacturer and model number 
  • Physical attributes such as memory, CPU, storage, NICs, HBAs 
  • Firmware 
  • Location 
  • MAC addresses 
  • IP addresses and VLANs 
  • Configuration settings 
  • Operating systems or hypervisors 
  • Virtual servers running on each physical server 
  • Applications or services running on each physical/virtual server and known interrelationships between servers.

Keep in mind that not only are application and database servers important, but crucial infrastructure servers that support under the hood functionality areas are as well.


Storage

The cost of storage has dropped dramatically over the years, which means the cost of storing each gigabyte of critical data is a small fraction of what it once was. The downside is that low cost has encouraged data proliferation, little of which is ever deleted.

Critical data storage information that must be documented includes:

  • Where are all of the storage units and what data is stored where? What makes and models are in service?
  • Is the data structured or unstructured?
  • Which applications will be affected if some storage units are shut down for maintenance?
  • How is data backed up? Is all data backed up to the level warranted by its criticality? What, if any, archiving plans are in place?


Next time I’ll discuss discovery and networks, applications, middleware services, and contracts.

(See, “Success is in the details – Part II”)

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

Table of contentsWhat is CMDB, and why is it important for your cloud initiatives?CMDBs and change managementCMDBs and incident managementCMDBs and problem managementCompliance reporting made easy with CMDBsImpact analysis with CMDBs and cloud assetsMake better, fact-based decisions with Virima for…

Table of contentsHow does asset discovery work?What types of IT assets can you discover?NetworksServersPCs, laptops, and mobile devicesBenefits of IT asset discoveryLess time spent on cataloging IT assetsBetter and detailed IT reportsStreamlined IT asset acquisitionEnsuring compliance with security policies A single…

Table of contentsWhy stakeholder communications are importantHow to prepare for incident communicationIncident management best practicesCommunication plan High-quality major incident management communication plan Using visualizations in stakeholder communicationsIncident mitigation with visualizations Virima can help you with incident management Incidents are a part of business,…

Table of contentsAsset managementTracking and labeling assets’ locations and states through an asset register Tracking and managing software licenses Managing end-user devicesKeeping tabs and handling decommissioned assetsConfiguration managementIdentifying configuration items in the CMS Controlling  and managing all changes made to assets Understanding impact on…

Some people think that an IT service desk is the same thing as an IT help desk. It isn’t and we’re  going to explain the difference between service desk and help desk. Sure, there are some similarities, but there are…

Table of contentsA CMDB tool can maintain all other tools What is CMDB in ServiceNow?What are ServiceNow CMDB best practices?A few ServiceNow CMDB best practices include:Defining your goalsForming a configuration management teamEstablishing a governance structureUnderstanding configuration item designIntegrating with key business…

Table of contentsStep 1. Determine business objectivesStep 2. CMDB discovery toolsStep 3. ITSM system integrationStep 4. Equip data owners/data stewards with the right toolsStep 5. Data management and retention planStep 6. CMDB: data visualizationLearn more about these steps by watching…

Incident management is crucial while dealing with major incidents. They are the crises that have widespread impacts on your employees, disrupt your operations, and impact your ability to deliver on customer expectations.  While you may assume your company is prepared…

Table of contentsUnderstanding business service mappingA modern approach to business service dependency mappingDiscovery planning processUse casesVirima simplifies service mapping and IT discovery Business service mapping is the area of configuration management that perplexes so many IT professionals. Yet, it provides…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

IT asset management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Inventory management can exist without IT asset management, and in fact, it does in many organizations as it has been in existence…