DevOps groups get incredible insight into the web and application environment
We’re announcing today the immediate availability of Services Topology View for our Virima ITAM/ITSM SaaS platform. This powerful new capability, added to Virima’s agentless Discovery App and full-featured CMDB, identifies the underlying IT components and connectivity between web servers, application servers, middleware and databases.
Enterprise DevOps groups, architects, and application owners can use this feature to better understand their environment and the impact of changes to applications and the components on which they rely. IT Ops teams can respond more effectively to reported problems by seeing the downstream effects an outage on a single component will have on the entire business service.
Virima Technologies, an innovator in data center transformation (DCT) and IT operations management, continues to help enterprises take the guesswork out of managing today’s complex IT environments with the addition of two significant features to Virima, its enterprise-level ITAM and ITSM tool
First, Virima’s agentless discovery of network devices via Simple Network Management Protocol (SNMP) has been enhanced to include Windows, Unix, and Linux servers as well as other SNMP enabled systems. Now, more device types and their attributes can be inventoried without the need for administrative authentication credentials. This reduces the time required to configure and run the scans which means faster results with less effort.
The second new feature is improved visualization of asset relationships and application dependencies, with multiple levels of […]
Manual discovery of all IT assets is a time-consuming, cumbersome, error-prone job. And by the time it’s completed, assets may have been changed, added or removed. A tool that automates many
discovery processes is necessary to make the task both cost-effective and comprehensive.
Many existing tools are good at discovering the existing technologies in your data center, but may be less efficient, or possibly ineffectual when it comes to matching those assets with the people and business processes they serve. To achieve this objective, the tool must automate as much of the discovery as possible, but also allow for the input, mapping and organization of information gathered from those with “tribal knowledge” of how things really work.
Tools that provide scanning for network […]
In my previous post I discussed what you need to know about servers, storage and networks when undertaking a discovery project. Today, I’ll discuss a few more items items you’ll want to learn about in discovery: applications, services, middleware and contracts.
• Applications, Services and Middleware
The discovery phase must catalog applications, services and middleware, including documenting
functionality and applications that depend on them. Failure to recognize and accommodate the
following components when reorganizing a data center may cause critical applications to fail:
- Applications that share information and interact in real-time and are supported by business,
core and middleware services.
- Business services, such as a service used to check in an airline passenger, may draw data
from several databases and access the functionality of a variety of applications.
- Core services support business applications, technology infrastructure and/or middleware.
Success is in the Details
Last week I discussed why discovery is important and some questions to ask before starting the process.
Today’s post is about the details that are most likely to trip up a major data center project. One piece of seemingly trivial hardware that isn’t moved over to the new environment can shut down a vital system or, because of interdependencies, multiple systems.
The first two items involved in discovery that we’ll discuss are servers and storage.
The workhorses of your data center, information collected for every physical server should include: manufacturer and model number; physical attributes (memory, CPU, storage, NICs, HBAs); firmware; location; MAC addresses; IP addresses and VLANs; configuration settings; operating systems or hypervisors; virtual servers […]