Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Success is in the Details

ITIL 4 guides businesses on how IT works today, how IT will work in the future - Agile, DevOps, etc

Last week I discussed why discovery is important and a few crucial questions to ask before starting the process.

Today’s post is about the details that are most likely to trip up a major data center project. A single piece of seemingly trivial hardware that isn’t moved over to the new environment can shut down a vital system or, because of interdependencies, multiple systems.

The items involved in IT Discovery that we’ll discuss are servers and storage.


Servers

The workhorses of your data center, information collected for every physical server should include 

  • Manufacturer and model number 
  • Physical attributes such as memory, CPU, storage, NICs, HBAs 
  • Firmware 
  • Location 
  • MAC addresses 
  • IP addresses and VLANs 
  • Configuration settings 
  • Operating systems or hypervisors 
  • Virtual servers running on each physical server 
  • Applications or services running on each physical/virtual server and known interrelationships between servers.

Keep in mind that not only are application and database servers important, but crucial infrastructure servers that support under the hood functionality areas are as well.


Storage

The cost of storage has dropped dramatically over the years, which means the cost of storing each gigabyte of critical data is a small fraction of what it once was. The downside is that low cost has encouraged data proliferation, little of which is ever deleted.

Critical data storage information that must be documented includes:

  • Where are all of the storage units and what data is stored where? What makes and models are in service?
  • Is the data structured or unstructured?
  • Which applications will be affected if some storage units are shut down for maintenance?
  • How is data backed up? Is all data backed up to the level warranted by its criticality? What, if any, archiving plans are in place?


Next time I’ll discuss discovery and networks, applications, middleware services, and contracts.

(See, “Success is in the details – Part II”)

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…

The importance of discovery comes from what it provides to the users of the Configuration Management Database (CMDB): trustworthy data and greater speed to value. Without discovery, the CMDB database is built by feeds and data entry, which can lead to…

Your Next IT Discovery Tool ‘MUST’ Include Support for Multi-Cloud According to the predictions by Gartner, over 75% of midsize and large organizations will adopt a multi-cloud or hybrid IT strategy in 2021. Companies across the world are increasingly turning…

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

Are you planning a move to the cloud, or have you already made the move and now want to make the most of it? No matter which category you are in, you need the right technology and tools to get…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…