1 Global Technology Services Best Practices for Deploying a CMDB in large-scale Environments Alexander Keller, Suraj Subramanian, Abstract We describe best practices for deploying a Configuration Management Database (CMDB) that we have developed during several recent client engagements. Given the complexity and novelty of CMDB solutions that deal with discovering, storing and tracking actual Configuration Items (CIs), many enterprises rely on service delivery organizations - such as IBM Global Technology Services - to perform the configuration and roll-out of the system into production. This can be either done on the customer premises (within the scope of a so-called project-based service engagement), or by subscribing to a managed service, and thus leveraging the IT service management environment that the service provider has already set up. Often, enterprises severely underestimate the effort involved in setting up IT service management infrastructures by mistakenly equating the setup of such a complex system with the mere installation project of a shrink-wrapped, self-contained product. This, however is not the case: The immense heterogeneity of data center resources makes that no single vendor can cover the breadth of managed resource types when new product versions ship every 12 months, often by means of integrating acquisitions into the product portfolio. Consequently, today s IT Service Management systems rather resemble construction kits and frameworks that require a good deal of tailoring and customization to become useable and useful to the customer. The present paper attempts to provide an insider view into the issues that a CMDB deployment architecture needs to address. In our work, we found that the success of a CMDB deployment project can be attributed to a set of tradeoffs and best practices, especially when it comes to tuning the performance of the system and orchestrating the distributed components of a CMDB so that they work well together. By grounding our work in a concrete case study and by referring to real-life requirements, we demonstrate how to develop an operational architecture by using an off-the-shelf CMDB product. We point out the key design points of our architecture and describe the tradeoffs we had to make, which we subsequently distill into a set of best practices that have been successfully applied in sizing, estimating and implementing subsequent CMDB deployment engagements.
2 Motivation: Tracking Dynamic Data Center Topologies DBMS App Cluster Load Balancer Front End Requests 10,000 20,000 servers: Windows 2000 and 2003 Solaris/Sparc (large DB servers) Solaris/i86 Linux (often on Blade s) 3-6 data center locations heavy use of load balancers: ~ Every application tier is frontended by a load balancer Every server in the environment belongs to a load-balanced pool Load balancer pools get reshuffled every few hours Load balancers are deployed pairwise: Primary Backup Slide 2 One of the major challenges in today s data centers consists in discovering, tracking and auditing the configuration and relationships of several thousand heterogeneous servers and the operating systems, middleware and software they host. Configuration Management Data Bases (CMDB) are widely regarded as a means to achieve this goal. Deploying CMDBs in large-scale environments, however, brings its own challenges: Due to the need for adapting the data center infrastructure to continuously changing workloads, topologies are becoming increasingly dynamic, which requires frequent refresh cycles of the information contained in a CMDB. On the other hand, a CMDB needs to keep track of the Configuration Items (CIs) it stores at a certain level of detail in order to be useful. It is the tradeoff between the level of detail and the freshness of information that makes CMDB implementations particularly challenging in practice. The above figure depicts an increasingly common data center topology: while the separation of a distributed application in a variety of tiers (front-end, application, database) has been common practice for quite some time, we increasingly see that every tier is load balanced, in order to swap servers in and out of a load balanced pool. Load balancers play a special role because they provide a means for efficient workload-to-resource allocation by directing traffic to systems that have spare capacity available. From a management perspective, load balancers are a valuable source of management information because they keep track of the utilization and health of the servers that are part of the load-balanced pools. As such, load balancers are excellent monitoring points from which a resource discovery application (or a CMDB) can learn about the existence and status of servers without going directly to the servers. This paper is structured as follows: we first introduce a typical customer scenario on slide 2 and identify the functional and nonfunctional requirements on a CMDB on slides 3 and 4, respectively. On slide 5, we describe the distributed architecture of Tivoli Application Dependency Discovery Manager (TADDM), a commercial CMDB implementation with a focus on configuration item discovery and tracking. Subsequently, we focus on the design and performance engineering of our distributed solution (slide 7) and list the best practices we have identified (slides 8 11). Finally, an evaluation of performance is presented on slide 12. We, conclude the paper by summarizing key findings and by pointing out areas for further research.
3 CMDB Usage in a Customer Environment Reporting Orchestration Provisioning Policy Problem Actions Management Incident Task Execution Management Auth & Request access service Mgmt Change Release Mgmt Change Asset Lifecycle Mgmt. Event Mgmt. ITIL based Management Applications CMDB API CMDB Application Actual CMDB Configuration DB Items (CIs) Custom Extension for Load Balancer CMDB API Discovery Sensors Federation Load Balancer Custom Data Source Handlers Logical & Physical Resources Slide 3 A lot of effort is often spent in integrating the CMDB with already existing infrastructure and applications. The central role that the CMDB plays for an enterprise is illustrated by the following, typical functions it performs: Discovery Capabilities: a CMDB typically ships out-of-the-box with a set of agent-less discovery sensors that allow it to explore the details of a managed resource type (e.g., pools of a load balancer, or the volumes of a storage array). In addition, a CMDB may be able to connect to a set of SNMP-enabled or proprietary agents that are located on the managed systems in order to gain access to relevant data. However, due to the large amount of heterogeneous resources, vendors often ship software development kits that allow the customer to create custom server extensions for managed resources that are not covered by the standard set of sensors. Configuration Items that are discovered as often referred to as actual CIs. Persistent storage in RDBMS: while today s CMDBs follow an object-oriented approach sometimes derived from the Common Information Model (CIM) the data typically gets persisted in a common-off-the-shelf relational database management system (RDBMS). While this typically results in running the RDBMS on a separate server than the CMDB application, an additional implication is that an object/relational mapping needs to be performed. This, in turn, may impose limitations on integrating existing, custom RDBMS-based data collection tools in the CMDB, e.g., by means of federation. Reconciliation: It is well possible that a managed system is discovered by more than one sensor (e.g., a server gets discovered through a native operating system-level sensor and through an SNMP sensor). Whenever this is the case, the CMDB needs to reconcile the different views into a single resource. To do so, it follows a set of rules that govern the identity of a managed resource: e.g., a combination of serial number, MAC address, IP address for a computer system. Baselining and Reporting: at any given point in time, a snapshot of the CIs can be taken to form a configuration baseline against which audits can be performed. A suitable way to carry out audits is by means of generating custom reports, which often create significant workload on the CMDB. Programmatic Access to CIs via CMDB API: the fact that the CMDB stores authoritative configuration data in a normalized format makes it a prime data source for a variety of management applications that implement the ITIL  best practices (depicted at the top of the figure). Driving tools off the CMDB adds further workload. Dependency Visualization and Topology Maps: the graphical representation of logical and physical topologies and the browsing of dependency relationships are often viewed as key features of a CMDB. In practice, where we regularly encounter CMDBs that have several millions of CIs, we found that great care has to be taken to restrict the amount of CIs that will be displayed. Otherwise, the CMDB spends a significant amount of time trying to render a topology that will be of no use to the customer as several thousand CIs and relationships clobber the display canvas.
4 Non-functional Requirements on a CMDB Different SLAs for discovery cycles for different managed resource types: a 6-hour duty cycle for ~ load balancer pairs a 24-hour duty cycle for all the remaining IT infrastructure assets (both Hardware and Software) Tools and applications use CMDB as authoritative data source additional workload on CMDB High Availability and Disaster Recovery: Determine at which parts of the system need to address this Devise data replication strategy for redundant systems extra workload on CMDB However: a CMDB is not a monitoring tool! it is not intended to cover real-time resource status None of the above requirements are met by today s products out-of-the-box significant amount of architecture and design needed Slide 4 In addition to being seamlessly integrated into the customer environment, a CMDB deployment needs to address a variety of nonfunctional requirements: First and foremost, one needs to determine what timespan between the discovery of a CI and it being made available to the management applications or the graphical console is deemed acceptable. While it is understood that a CMDB will not be able to cover resource status in real-time, there is broad consensus that data older than 3 days is often considered worthless, especially if the CMDB is the basis of tools, such as resource provisioning systems. An interesting variation of this problem occurs when different types of resources need to be prioritized, e.g., when load balancer pools get reshuffled every 6 hours, and the CMDB should reflect this while the CIs of all remaining infrastructure assets may be up to one day old. The role of the architecture becomes especially important when such a feature has to be designed around a CMDB implementation that does not support preemptive scheduling by suspending/resuming jobs. Second, the fact that customers drive tools and ITIL processes off the central CMDB makes that the system needs to be sized so that it has enough capacity even when it refreshes its data (or specify a blackout period during which no tools or reports may be run against the CMDB). Reporting in particular places significant workload on the system, which may in some cases necessitate the separation of the CMDB in a read-only (for reporting and tool access) and a write-only (data refresh from the environment) part. Third, there may be a need to design the system with a focus towards high availability (within a data center) and disaster recovery (across different data centers) if the CMDB is considered mission-critical. Here, one needs to strike a balance between the cost for redundant systems, and whether it is acceptable to only harden the system on which the part of the CMDB is stored against which reports/tools are run.
5 TADDM: A hierarchical CMDB Implementation Enterprise CMDB TADDM D B TADDM DB Domain CMDB 5 Domain CMDB 4 Synchronization TADDM D B Domain CMDB 1 TADDM DB Domain CMDB 2 Domain CMDB 3 TADDM DB TADDM DB Discovery Discovery Firewall Load Balancer Slide 5 Router Win s Win GWs Linux/Solaris s Switch Router Win GWs Linux/Solaris s Win s Anchor Tivoli Application Dependency Discovery Manager (TADDM)  is IBM s implementation of the parts of a CMDB that relate to the agent-less discovery, tracking and auditing of actual configuration items. As depicted in the figure above, TADDM is a hierarchical, distributed system that can scale to very large, geographically distributed environments. It consists of 4 layers: 1. Enterprise CMDB (ecmdb): This is the top-level system of record for an enterprise in terms of discovered data center equipment. Because an ecmdb does not perform discovery tasks, it is populated with data from one or more Domain CMDBs (see below). Such synchronization with a Domain CMDB can be run from the ecmdb either on a schedule or on-demand. The enterprise CMDB has an API (CLI, java and web services interfaces) that is used to query the consolidated data across the enterprise. In addition, the ecmdb can be queried by means of a report generator. 2. Domain CMDB (dcmdb): its primary responsibility consists in discovering a delimited subset (aka domain) of the managed resources that exist in the data center. Every dcmdb needs it own database to store the discovered CIs. Discoveries can be started manually or scheduled from the GUI, or invoked through an API (CLI, java and web services) by an external application. Managed Resources are typically grouped into scopes (typically by specifying IP ranges and/or individual addresses). It is important to combine the right scope of devices that need to be scanned or discovered via the dcmdb with the proper profile (the level of detail of information gathered); otherwise, discoveries can take a very long time. This leads us to Tradeoff #1: Discovery Breadth vs. Discovery Depth 3. Windows Gateways and Anchor s: the former translate the secure shell (ssh) commands issued by TADDM into Windows Management Instrumentation (WMI) commands Windows systems understand; the latter tunnel firewalls by means of ssh so that systems located behind a firewall can be discovered. 4. Managed Resources: the systems that need to be discovered: servers, middleware, applications, storage, networking equipment, load balancers etc. TADDM provides about 50 out-of-the-box discovery sensors for a variety of managed resources (e.g., Oracle database, WebSphere Application, VMWare, Veritas Storage, SNMP devices etc.). Using sensors implies that the credentials for the managed resources need to be stored at the Domain CMDB level (or access granted by means of ssh keys); a collection of discovery sensors that will be applied to a given scope is called a profile. The architectural challenge consists in estimating the right number of Domain CMDBs, Windows Gateways and Anchor s so that the solution meets the requirements described on slide 3. In addition, one has to orchestrate the interworking of the various components of TADDM as there are a few limitations that impact the order of tasks: 1. a dcmdb can either run a discovery, or synchronize with the ecmdb, but not both simultaneously. 2. there is no pre-emptive scheduling of discoveries, i.e., there is no graceful suspend/resume of discoveries. 3. there is no concurrent synchronization the ecmdb can only synchronize with one dcmdb at a time. From these constraints, we derive Tradeoff #2: Discovery Time vs. Synchronization Time
6 Domain CMDB: System Model for Resource Discovery Max # of Discovery worker threads dwcount # of TopoPump threads topopumpcount # of storage attempts dbtriescount Sensors Topology Builder Agents RDBMS Performance trade-offs: If dwcount and topopumpcount too low low throughput If dwcount >> topopumpcount Sensors are kept waiting (red arrows) If #TopoPump threads large retries for DB writes and/or storage errors (orange arrows) Slide 6 In order to set the stage for the following performance engineering discussion, it is important to gain an understanding of the Domain TADDM system model by breaking down the overall discovery process into the following two phases: 1. Discovery by means of resource-specific Sensors: The upper bound for the number of concurrently executing discovery worker threads can be set by dwcount. 2. Topology building: this phase addresses the reconciliation of configuration items that have been discovered through different sensors, their physical storage in the database, and the creation of dependency topology maps. topopumpcount is the configuration variable that sets the maximum number of topology threads; dbtriescount is the maximum number of times the topology builder will try to successfully commit a CI to the database. The last step of the topology building process consists in the execution of the view manager to build the topology maps that can be browsed through the GUI. From the above discussion, it follows that one of the key performance optimization problems around discovery consists in determining the optimum values for dwcount and topopumpcount. These values, in turn, are heavily influenced by a variety of configuration parameters for the database, Java Virtual Machine, and operating system and last but not least by the hardware characteristics of the servers that host the TADDM and database servers. Tradeoff #3: Discovery Speed vs. Data Consistency Increasing dwcount makes the discovery go faster because more sensors are executing concurrently. Increasing topopumpcount increases the rate of CIs stored in the database. However, over a certain level, data consistency is affected because after the threshold set in dbtriescount is reached, the system drops the data it cannot store. While analytic approaches based on statistical and control models have successfully been applied to determine such parameter settings in somewhat related problems, the optimization problem that would need to be solved in the present case is significantly more complex than the one described in : while prior art focuses on explaining the tuning parameters of a single DB2 database server by several counters and gauges, the current case involves not only configuration parameters applying to multiple levels of software within the same system (note that TADDM has discovery sensors for over 50 different resource types, each yielding a different amount of CIs), but is spread across several physical servers. Recall from slide 5 that, additionally, Windows Gateways and/or Anchor s may be involved in the discovery process.
7 Performance Engineering: Design Alternatives Alternative 1: Dedicated domain CMDB for each Resource Type Advantage: Each Domain CMDB for servers can run on a 24-hour cycle A single Domain CMDB discovers ~ load balancers every 6 hours Drawbacks: 10,000 20,000 servers need to be reconciled at the ecmdb level Very high workload will overwhelm ecmdb 1 dedicated CMDB for load balancers insufficient to finish within 6-hour duty cycle Relationship between components in the data center might not be current. Alternative 2: Keep discovery local by partitioning discovery scopes in 6-hour buckets in order to reconcile servers and load balancer pools at a domain CMDB level Advantage: Exploits opportunities for concurrent reconciliation with several Domain CMDBs Guarantees more current relationship information at the dcmdb level Few reconciliation work at the ecmdb level Drawbacks: Requires iterative design of scopes to make sure the scheduled slots are not overrun Larger changes in server counts (> 100) require (manual) rebalancing of scopes. Adding more dcmdb s to the equation will burden the ecmdb. Slide 7 In order to meet the requirement of accommodating different discovery duty cycles for load balancers and servers (6h and 24h, respectively) and assuming a size of the distributed environment of about 15,000 servers (the median between the 10,000 to 20,000 servers we frequently encounter in client engagements), we need to design a system that consists of multiple Domain CMDBs that synchronize into an Enterprise CMDB. The topology of the system is similar to the one depicted on slide 5. We will now recap the deployment tradeoffs identified so far: 1. Tradeoff #1: Discovery Breadth vs. Discovery Depth: While we need to identify the details for each system at an OS-level (and thus require at least OS-level discovery level 2 capability with credentials), we are able to disable the sensors for which no corresponding resources exist in the environment. 2. Tradeoff #2: Discovery Time vs. Synchronization Time: There is an upper bound to the synchronization time that stems from the ecmdb: Given that each Domain CMDB needs to synchronize 4 times per day with the ecmdb, and the absence of concurrent syncs, it follows that 24 hours >> #dcmdb x synctime per dcmdb. For 6 dcmdbs, this number is 4 hours; for 5 Domain CMDBs, the number is 4 hours and 12 minutes. However, on a domain CMDB level, 4 hours encompass both discovery and synchronization times because a dcmdb can always do only one thing at a time. 3. Tradeoff #3: Discovery Speed vs. Data Consistency: on a dcmdb level, we need to make sure that we encounter as few storage errors as possible. The maximum allowable number of dwcount is therefore determined by the maximum number of topopumpcount that does not produce storage errors. Comparison of Design Alternatives for Domain CMDB Assignment and CI Reconciliation Approach 1: Assign different Resource Types to different Domain CMDBs Using a dedicated domain CMDB for discovering spread across several data centers and one or more dedicated domain CMDBs for servers seems straightforward because it allows to implement different discovery cycles in a seemingly simple way. The major issue that prevents this approach, however, is the fact that the reconciliation between individually discovered servers by means of sensors and the same servers being located in a separately discovered load balancer pool would happen at the enterprise CMDB level. Reconciling 15,000 servers and 1000 load balancers at an ecmdb level will overwhelm the system and make the ecmdb the bottleneck. This lack of scalability alone makes this approach unfeasible in practice; additional drawbacks are listed in the slide above.
8 Approach 2: Keep Discovery local and upload disjoint data sets to ecmdb This approach consists in creating schedules for discovering and reconciling load balancers and servers on a per-dcmdb basis. In other words, we define a domain and use a dcmdb for every data center so that all the equipment within the domain (load balancers, servers and other devices) are discovered by the local dcmdb. Data from all the local dcmdb is then consolidated at the enterprise CMDB, and under the assumption that only few inter-data center dependencies exist, the reconciliation effort at the ecmdb level is minimal because disjoint data sets are uploaded to it (i.e., there are no or only very few interdependencies between resources located in different data centers). While the enforcement of the locality principle keeps reconciliation of managed resources confined to the boundaries of a domain, the additional cost incurred is that one needs to make sure that the servers and load balancers are partitioned into scopes in a way that their discovery will finish within the allocated timeframes. One issue is that there is currently no provision to automatically balance the scope depending on discovery times; instead, it has to be done manually. Consequently, whenever managed resources are newly introduced, they need to be assigned to a scope, and the size of the scope (including types of servers) needs to be monitored to make sure no schedule overrun occurs.
9 Scope Definition Layout for a Domain CMDB Scope #4 Scope #3 Scope #1 0:00 am 11:59 pm The 4 server scopes contain disjoint sets of servers, including unused IP addresses There is one load balancer scope that is executed 4x/day Every load balancer is discovered and sync ed on a 6-hour duty cycle Syncs happen 4 times a day, each containing a LB scope update and one server scope Every server is discovered and sync ed on a 24-hour duty cycle Each scope is manually defined product enhancement needed for dynamic scopes Slide 8 Scope Definition is the process where we try to progressively and iteratively build a set of scope definitions against which a successful discovery can be initiated, while taking into account variables like adherence to schedule completion time, synchronization performance and type of infrastructure to be discovered. For the sake of our example, we assume that we need a total of five domain CMDBs to cover the whole range of enterprise IT assets. The key is that separate scopes are defined for servers and load balancers. While the same load balancer scope (yellow color in the above figure) will be executed every six hours, each of the four server scopes (blue color) contains a disjoint set of servers. In other words, the overall server population of a data center is distributed across 4 disjoint scopes. Each of these 4 server scopes runs once a day, thus meeting the 24-hour SLA for servers. This ensures that every Domain CMDB meets the requirement; what is missing so far is the synchronization so that the updates are propagated to the Enterprise CMDB. To accomplish this, each discovery step (run server and, subsequently, load balancer scopes) must be followed by an ecmdb synchronization. Since we are constrained by a 24-hour duty cycle, it is important to make sure that the dcmdbs are able to accomplish the scans and the synchronization within the stipulated timeframe. It is essential that this collective process (Discovery+Synchronization) be completed in less than 6 hours for every dcmdb that is a part of this setup. In particular: Every Scope discovery must finish in under 4 hours. Every Load Balancer Scope must finish in less than 1 hour. The synchronization process must complete in less than 1 hour. This ideal scope layout was achieved by running discovery many times and iteratively building the right server scopes. The algorithm for creating and balancing the server scopes is described on the following slide 9. We observe that the domain CMDB is continuously running discoveries, which are followed by synchronizations with the ecmdb. In other words, the domain CMDB is almost never idle. Assigning discovery profiles to scopes A discovery profile is a list of sensors that will be executed on the discovered system in order to obtain its hardware and software configuration. Discovery profiles are defined for each scope. In order to prevent invocation of unneeded sensors in each scope, we create two different discovery profiles: one for the load balancer scope, another for the 4 server scopes. The former profile contains only the sensors that relate to load balancers, one of which being the SNMP sensor. The latter profile contains all the sensors for managed resource types (servers, storage, operating systems, middleware, applications etc.) that must be detected.
10 Algorithm for balancing Scopes 1. Run Initial Discovery 2. For each discovered subnet: 1. Determine #servers within each subnet 2. Classify servers by OS 3. Count servers on a per-os basis (in particular Windows) 3. Subnet_list := Sort subnets in descending order according to # of servers 4. Divide total amount of servers by # of scopes 1. Yields threshhold of Windows/Unix servers 5. For each scope set: 1. Determine for each OS if target # of servers > threshhold 2. Move subnets between scopes so that each approximates threshhold 6. Run Discovery, determine median scope execution time 1. if median > allowed_time_interval: error (too many servers, need additional dcmdb) 7. For each scope set: 8. Goto 6 1. If scope execution time < allowed_time_interval: end (success) 2. if actual_time => median, place subnets on unload_list 3. if actual_time < median, obtain subnet(s) from unload_list Slide 9 As mentioned before, the key to implementing different discovery cycles for different resource types in TADDM is to fill the allocated time intervals in a way that minimizes the likelihood of schedule overruns. The following algorithm, described in pseudo-code, is used to partition a given server population into scopes with minimal variability. The first phase of the algorithm aims at identifying what resources are present in a given address range, and get a feeling how they are distributed across the various subnets. This is accomplished by a credential-less TADDM level 1 discovery, which first identifies resources on the network by a ping command, and subsequently attempting to determine the operating systems by means of their nmap  fingerprint. The results are being counted on a per-subnet basis and classified by their operating system (either Windows and other ); the subnets are then ordered by the number systems they contain, in descending order. While this gives an accurate count of the live systems on the network, the number of Windows servers is important sizing information for the Windows gateways that need to be deployed in order to perform deeper discoveries (OS level 2 and application level 3) subsequently. Recall that non-windows systems are directly discovered by means of the discovery sensors running on the dcmdb. Subsequently, one divides the number of Unix/Linux and Windows systems, respectively by the amount of scopes that has been derived from the SLAs on the discovery cycles. This gives the average number of Unix and Windows systems that need to be discovered in each scope, which we need to target. We then iterate over the descending subnet list and move subnets across the scopes. In a second phase of the algorithm, we need to fine-tune the initial distribution because we still may have large differences in terms of number of CIs between systems even if they run the same operating system. To accomplish this, we leverage the level 2 and level 3 discovery capabilities that require credentials and summarize the execution times of each discovery sensor on a permachine basis. If we find that the median execution time of the scopes is above the time interval allotted to each scope, we need to deploy an additional domain CMDB because clearly because there is no solution to the server-to-scope allocation problem in the current configuration. We would then split the scope list into two parts, allocate each to a dcmdb and restart the algorithm. Otherwise, what remains to be done is the re-allocation of subnets between scopes until the variance in terms of discovery times is minimized. The above steps need to be done over a period of time in order to ensure that the SLA pertaining to the discovery duty cycles are met. In addition, scope time overruns must be monitored so that changes in the data center do not lead to large variances between the scopes when old systems are retired and new systems are deployed, or subnets get (de)allocated.
11 Scope & Synchronization Plan for Domain & Enterprise CMDBs ecmdb DC #5 Scope #1 Scope #3 Scope #4 DC #4 Scope #1 Scope #3 Scope #4 DC #3 Scope #1 Scope #3 Scope #4 DC #2 Scope #1 Scope #3 Scope #4 DC #1 Scope #1 Scope #3 Scope #4 Slide 10 0:00 am 12 noon 11:59 pm While the process of defining a scope layout for each dcmdb is quite complicated because of the numerous variables that need to be accounted for, the picture gets even more complex if we need to account for multiple dcmdbs that need to interact with an ecmdb. To ensure consistency in the data and the discovery runs, one needs to make sure that the scopes are staggered so that a discovery of resources will be followed by a synchronization to the ecmdb. Synchronization exports all the changes since the last sync from the dcmdb, sends them over the wire, and subsequently imports the changes into the ecmdb. The above figure depicts the staggered scope layout from the previous slide when we apply it to the 5 Domain CMDBs we need to set up, one in each data center. The reason why the schedules of the Domain CMDBs are offset by an hour is because the ecmdb can only sync with one Domain CMDB at a time. One implication is that the Enterprise CMDB is running almost continuously (apart from four 1-hour breaks when no dcmdb is sync ing); a second implication is that this scheme hits its peak when a 6th Domain CMDB is switched on, in case a large amount of additional servers needs to be accommodated. There would simply be no more room in the ecmdb schedule to accommodate any dcmdb beyond the 6 th instance. From the above figure, it is clear that managing a total of 60 discover and synchronize operations across 5 dcmdbs needs to be orchestrated by means of a scheduler that is external to the ecmdb and dcmdbs. In particular, the scheduler needs to keep track which dcmdb is running a discovery, and which dcmdb is synchronizing with the ecmdb at any given point in time. Based on this information, and by accounting for the task dependency chains server discovery load balancer discovery synchronize with ecmdb the scheduler invokes the necessary operations on all 5 dcmdbs (start discovery) and the ecmdb (initiate synchronization with dcmdb #x). To do so, the following commands must be accessible through an API: On the Domain CMDBs, the API needs to expose commands that allows the start and stop of every discovery, as well as a status inquiry to find out if the dcmdb is running a discovery. On the Enterprise CMDB, the API must expose a command that allows the start of the synchronization with a dcmdb, as well as a status inquiry that returns if the ecmdb is currently synchronizing, and, if yes, with which Domain CMDB. While the former API existed in the product out-of-the-box, we designed the latter API and worked with the TADDM development team to incorporate it into the product. The details of this work are given on the following slide 11.
12 Initiating Synchronization from an External Scheduler Non-blocking Invocation of the ecmdb through both a Java API and shell script api.sh -u username -p password sync <start stop status> -d <domaincmdbname> Slide 11 As mentioned before, the Enterprise CMDB serves as the system of record. Data synchronization needs to be done from the dcmdb to the ecmdb on a regular basis to ensure that the data is current and valid. In other words, synchronization from a Domain CMDB to the Enterprise CMDB is a pull-based mechanism, initiated by the ecmdb or an external scheduler. The sequence diagram highlighted above illustrates the synchronization process. The external scheduling system needs to the have the client APIs and the right set of credentials to initiate this session. This Java and command-line API can be invoked by any external system that has the right credentials. The following steps are involved in controlling the synchronization actions: 1. The external scheduler connects to the ecmdb with the right set of credentials (not depicted in the figure) 2. The external scheduling system makes a call to the ecmdb to see if a synchronization is in process 3. If no synchronization is in progress, the scheduler issues a command to start the synchronization with a particular domain CMDB 4. Synchronization status is monitored periodically 5. When synchronization completes, the ecmdb polls the next dcmdb to start synchronization with it. Recall that only one domain CMDB can synchronize with the ecmdb at a time. Also, if a new dcmdb is added to the system, it needs to be manually added to the ecmdb domain list.
13 Discovered Resources and Times for a Domain CMDB About 1000 Equivalents can be discovered on a 4-hour cycle 4 x 4 hour cycles 16 hours total 4 x 1 hour for load balancer discovery 62 load balancers discovered in 38 minutes 4 x 1 hour for synchronization to ecmdb A sample Domain comprises a 64k IP address range (# live servers: 3,116) Scope# / subnets 12 x /21 subnets 8 x /24 subnets 1 x /30 subnet 12 x /21 subnets 9 x /24 subnets 1 x /16 subnet 8 x /21 subnets 1 x /23 subnet 7 /24 subnets 2 x /21 subnets 6 x /24 subnets Duration 2:43 hours 3:45 hours 3:50 hours 3:30 hours Type Details 394 Windows s 433 Solaris and Linux s 389 Windows s 333 Solaris and Linux s 322 Windows s 521 Solaris and Linux s 463 Windows s 261 Solaris and Linux s Slide 12 In order to evaluate whether the approach presented over the past few slides is feasible and accomplishes its goals, we will now provide sample data from one of the domain CMDBs to provide the reader with quantitative evidence. An enterprise data center contains a set of heterogeneous systems comprising servers, load balancers and network devices. In our experiment, every domain CMDB was configured to discover a set of IP subnets totaling 64K IP addresses, which are split into smaller subnets of 2K, 4K, and 8K addresses. Each discovery scope was then built according to the algorithm described on slide 9; each scope contains a mix of 2K, 4K and 8K addresses. Configuring the system in this fashion ensured that the discovery times met the required SLAs. One can see that while 3 out of 4 scopes are relatively close in terms of duration, the first scope is faster. The reason why did not add additional systems from the other scopes is that we wanted to keep some room in case whole subnets with additional servers are deployed in the domain. One may wonder why the discoveries start from scratch every day by pinging potentially lightly populated IP subnets instead of leveraging prior knowledge (e.g., scanning only the topmost protocol layers of already discovered IP addresses). The reason is that we need to make sure that the discovery 1) picks up any newly installed system(s) and 2) flags (by means of an audit) what systems have recently gone offline for root cause identification and 3) make sure all systems connected to IP subnets are accounted for. The following are additional observations: 1. The discovery times are higher whenever Windows s are part of the scope definitions. This is attributed to the fact that the discoveries of Windows servers is done via the Windows Gateways, which introduce additional delays. Also, a large amount of information is collected, resulting in the creation of about 450 CIs for every Windows server. 2. The discovery of Unix based systems is comparatively faster than Windows machines. Unix servers add about 150 CIs (Configuration Items) to the core tables of a dcmdb. The scan times are directly proportional to the number of CIs discovered. 3. The above table distinguishes only between operating systems. In the case of Solaris systems specifically, the above table is somewhat misleading because a Solaris system may be a 4-way rack-mounted x86-type server, or a large database server with more than 2000 NAS devices. 4. The Discovery times of Network Devices, especially, is dependent on the number of components that are attached / connected to them.
14 Conclusion and Outlook Deploying a CMDB means debugging the Client Environment! Duplicate IP Addresses appear during Discovery because: DNS zone files are misconfigured (reverse lookups don t match resource records for forward lookups) VMWare configuration policy reuses GUIDs, MAC addresses, serial #s Systems are discovered through 2 different TADDM sensors and TADDM discovery interrupted before topology builder has finished reconciling the discovered resources A genuine CMDB classification (IP, MAC, serial#) error Credentials for OS-Level and Application level Discovery: it takes weeks until one gets any credentials at all one may not get all the credentials as s, Network, Storage, Apps, Databases, etc. are administered separately Areas for further Research CMDB Integration with Data Warehouses A CMDB keeps track of every change since day 1 the data in the CMDB grows monotonically Set data expiration schedules to move data into a Data Warehouse Improve transactional Consistency of CMDB with massive parallel writes Explore Map/Reduce-type algorithms Improve Accuracy for predicting Equipment Type and Sizings Which and how much equipment needs to be bought is one of the first questions asked by a Customer Slide 13 We have described best practices for deploying a Configuration Management Database (CMDB), which we have developed from several past client engagements. We found that while such best practices are crucial to ensure the success of the engagement, they need to be complemented by a good deal of social engineering : We found that in particular after the initial discovery, the customer may see for the first time what the environment really looks like and also what may be wrong with it! The above slide lists several concrete examples where the CMDB classified systems differently than expected by the administrators; each of these cases were initially flagged as product issues, but turned out later on to be genuine anomalies. In addition, the customer s processes for obtaining credentials to explore the systems may be suboptimal and may add several weeks to the duration of an engagement. There are a variety of areas for further research in the area of CMDB architecture and deployment: Some, like the need for developing a strategy of moving data from the live CMDB into data warehouses, may become apparent only long after the project team has handed over the running system to the customer. Others, like improving the current issues with transactional consistency (highlighted on slide 6) will have direct positive impact on the scalability of the system. Finally, the earliest opportunity for a long-lasting impact (good or bad) on the project is the initial sizing of the environment to determine the type and amount of equipment that needs to be purchased. Improving techniques for modeling and estimating the performance of the CMDB will significantly help improve the time-to-market for a CMDB project, and thus its profitability. References  IT Infrastructure Library: Service Transition, Office of Government Commerce and TSO, 2007  M. Burgess. Cfengine: A site configuration engine. Computing Systems, 8(3), USENIX Association, see also:  Y. Diao et al., Service Level Management: A dynamic Discovery and Optimization Approach, IEEE Transactions on Network and Service Management, Volume 1, Number 2, IEEE, December, 2004  Gucer, V. et al., Deployment Guide Series: IBM Tivoli Application Dependency Discovery Manager V7.1, IBM Redbook sg247616, August, 2008  nmap Network Mapper: Free Security Scanner For Network Exploration. (as of February 2009)
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
VERITAS Cluster Server v2.0 Technical Overview V E R I T A S W H I T E P A P E R Table of Contents Executive Overview............................................................................1 Why VERITAS
High Availability Solutions & Technology for NetScreen s Security Systems Features and Benefits A White Paper By NetScreen Technologies Inc. http://www.netscreen.com INTRODUCTION...3 RESILIENCE...3 SCALABLE
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
HP Systems Insight Manager and HP OpenView Working Better Together to Deliver End-to-End Management, from Hardware Infrastructure to Business Service Availability Executive Summary... 2 Challenges of Managing
BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER Table of Contents Executive Summary............................................... 1 New Functionality...............................................
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER Table of contents EXECUTIVE SUMMARY...1 WHY A CMDB?...2 The importance of configuration management...2 Goals...2
Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM
Atrium Discovery for Storage solution white paper EXECUTIVE SUMMARY As more IT systems are deployed that depend on storage infrastructure to provide business services, and with the adoption of technology
zenterprise The Ideal Platform For Smarter Computing Eliminating Redundant Software Eliminating Redundant Software Is Harder To Do Than Infrastructure Consolidation but potential savings are greater! To
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect email@example.com Validating if the workload generated by the load generating tools is applied
Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
Leveraging Best Practices for SolarWinds IP Address Manager Share: Leveraging Best Practices for SolarWinds IPAM SolarWinds IP Address Manager (IPAM) is a comprehensive IP address management solution that
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
PH073-Williamson.book Page 1 Thursday, June 17, 2004 3:53 PM C H A P T E R 1 Introduction to WebSphere Administration T his book continues the series on WebSphere Application Server Version 5 by focusing
This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more
Datasheet FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Central console and advanced management functions for ETERNUS DX storage environments..
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage Table of Contents What's New? Platform Questions Customer Benefits Fit with Other EMC Products What's New? What is
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
WHITE PAPER Introduction... 2 Reduce Tool and Process Sprawl... 2 Control Virtual Server Sprawl... 3 Effectively Manage Network Stress... 4 Reliably Deliver Application Services... 5 Comprehensively Manage
Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services
Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.
How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM) Look what people are saying, source Linkedin IT Service Management Forum:
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
Bigdata High Availability (HA) Architecture Introduction This whitepaper describes an HA architecture based on a shared nothing design. Each node uses commodity hardware and has its own local resources
Session Code Here Active/Active 2 Clusters for HA and Scalability Ariff Kassam xkoto, Inc Tuesday, May 9, 2006 2:30 p.m. 3:40 p.m. Platform: 2 for Linux, Unix, Windows Market Focus Solution GRIDIRON 1808
OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)
Automatically discover application dependencies and configurations providing the visibility necessary to improve IT Service Management IBM Tivoli Application Dependency Discovery Manager Highlights Gain
THOUGHT LEADERSHIP WHITE PAPER Four Steps to Faster, Better Application Dependency Mapping Laying the Foundation for Effective Business Service Models By Adam Kerrison, Principal Product Developer, BMC
Chapter 32 WebSphere Application Server V6.1 Extended Deployment: Overview and Architecture The WebSphere Application Server Extended Deployment (WAS XD) package provides many extensions to existing functionality
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Administration Guide for the System Center Cloud Services Process Pack Microsoft Corporation Published: May 7, 2012 Author Kathy Vinatieri Applies To System Center Cloud Services Process Pack This document
CMDB Federation DMTF Standards for Federating CMDBs and other Management Data Repositories Synopsis Many organizations base IT management on a configuration management system consisting of a configuration
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
1 A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability Availability and Serviceability System James H. Laros III, Sandia National Laboratories (USA)  Abstract This paper
Oracle Enterprise Manager Ops Center Configuring a Virtual Datacenter 12c Release 1 (126.96.36.199.0) E27347-01 June 2012 This guide provides an end-to-end example for how to use Oracle Enterprise Manager Ops
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend
Holistic Performance Analysis of J2EE Applications By Madhu Tanikella In order to identify and resolve performance problems of enterprise Java Applications and reduce the time-to-market, performance analysis
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) firstname.lastname@example.org United States Smart Grid systems
NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform
White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
DELL s Oracle Database Advisor Underlying Methodology A Dell Technical White Paper Database Solutions Engineering By Roger Lopez Phani MV Dell Product Group January 2010 THIS WHITE PAPER IS FOR INFORMATIONAL
AD207: Advances in Data Integration with Lotus Enterprise Integrator for Domino 6.5 Sarah Boucher, Manager Enterprise Integration Development Goals Overview of Lotus Enterprise Integration offerings and
Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Connect Executive Overview This white paper describes how Cisco VFrame Server Fabric ization Software works with IBM BladeCenter H to provide
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications by Samuel D. Kounev (email@example.com) Information Technology Transfer Office Abstract Modern e-commerce
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
on CHANGE MANAGEMENT ABOUT THIS... 2 IT AND CHANGE MANAGEMENT... 3 RESPONDING TO PERFORMANCE AND ACCOUNTABILITY DEMANDS...3 AN EMERGING NEED FOR CHANGE MANAGEMENT...3 DEFINING CHANGE MANAGEMENT... 4 WHAT
Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation firstname.lastname@example.org 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open
SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional