Data Center Discovery Best Practices



Similar documents
A VOYAGE OF DISCOVERY Data Center Optimization Requires Comprehensive Knowledge of All Data Center Assets and Relationships

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools

IBM Tivoli Netcool network management solutions for enterprise

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Dynamic Service Desk. Unified IT Management. Solution Overview

Network Virtualization

IBM Tivoli Asset Management for IT

Discovery and Usage data for Software License Management

Configuration Management System:

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Documentation for data centre migrations

Understanding the difference between Configuration Management, Asset Management, Inventory Management, Service Management and the CMDB

IBM EXAM QUESTIONS & ANSWERS

SafeNet DataSecure vs. Native Oracle Encryption

IBM Maximo Asset Management for IT

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

From Managing Boxes to Managing Business Processes

Cisco Secure Network Container: Multi-Tenant Cloud Computing

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

The Need for Service Catalog Design in Cloud Services Development

QRadar SIEM 6.3 Datasheet

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

CA Service Desk Manager

Cisco and VMware Virtualization Planning and Design Service

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Virtualization Impact on Compliance and Audit

ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents

Intelligent Inventory and Professional License Management

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

Device Lifecycle Management

Cloud and Data Center Security

Taking control of the virtual image lifecycle process

Best Practices for Managing Virtualized Environments

WhatsUpGold. v3.0. WhatsConnected User Guide

Cloud Service Rollout. Chapter 9

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

Preflight Checklist: Preparing for a Private Cloud Journey

Cisco Advanced Services for Network Security

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

SAP Solution Brief SAP Technology SAP IT Infrastructure Management. Unify Infrastructure and Application Lifecycle Management

Scalability in Log Management

Integrated IP Address Management Solution WHITEPAPER. Private Cloud Without Network Automation. Can it be done?

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Best Practices for Consolidation Projects

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

TRACK BEYOND THE RACK MANAGING IT ASSETS ACROSS THE ENTERPRISE

accelerating time to value in Microsoft Hyper-V environments

Deploying the CMDB for Change & Configuration Management

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Managing Traditional Workloads Together with Cloud Computing Workloads

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits?

IT Asset Management in Today's Complex Data Center

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

SAS 70 Type II Audits

EMC E Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models

Clavister InSight TM. Protecting Values

CA Service Desk Manager

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

CA Configuration Automation

Lecture 02b Cloud Computing II

Six Steps to SSL Certificate Lifecycle Management

Integrated Asset Tracking Solutions

Why you need an Automated Asset Management Solution

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

Why Plan B DR? Benefits of Plan B Disaster Recovery Service:

RIVERBED STEELCENTRAL NETMAPPER

Data Center Networking Managing a Virtualized Environment

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

Pragmatic Business Service Management

Service Orchestration: The Key to the Evolution of the Virtual Data Center

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

CMDB Federation. DMTF Standards for Federating CMDBs and other Management Data Repositories

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

End-user Security Analytics Strengthens Protection with ArcSight

Datacenter Migration Think, Plan, Execute

Information Technology Solutions

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Gaining Control of Virtualized Server Environments

DCIM Software and IT Service Management - Perfect Together

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Operating System Migration

Self-Service SOX Auditing With S3 Control

Cisco Unified Computing Remote Management Services

OPTIMIZING SERVER VIRTUALIZATION

Cloud Computing: What IT Professionals Need to Know

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

IBM System i Integrated Collaboration

How To Monitor Hybrid It From A Hybrid Environment

Atrium Discovery for Storage. solution white paper

Why a Server Infrastructure Refresh Now and Why Dell?

Verve Security Center

Network Application Performance Alignment to IT Best Practices

E-Guide. Sponsored By:

WHITE PAPER Oracle Enterprise Manager Ops Center Enables Datacenter Life-Cycle Automation

Best Practices for PCI DSS V3.0 Network Security Compliance

Transcription:

A Virima Technologies White Paper Data Center Discovery Best Practices How Leading IT Organizations Minimize Disruptions and Maximize ROI

Executive Overview If you were to ask CIOs and IT executives what are your top data center challenges? responding quickly and efficiently to shifting business priorities and elevating IT s value to the enterprise are undoubtedly at the top of many lists. To that end, forward-thinking IT professionals are looking at initiatives to transform the data center with new technologies and practices. What s on the horizon for your IT organization? Cloud computing, digital transformational, virtual machines, containers, automation, software defined networking and security safeguards are frequently mentioned IT projects, according to industry surveys. Many IT professionals are considering moving to a converged infrastructure to help break down a proliferation of silos. Reducing power and cooling requirements by replacing aging equipment with energy-efficient hardware are other goals. However, you can t transform (consolidate, migrate, optimize, virtualize) what you don t know. Data center discovery an accurate inventory of your data center ecosystem and assets -- may seem mundane, but it s the essential linchpin to successfully implementing service improvements. Any effort to transform your data center based on incomplete information, and without paying attention to the interdependencies between hardware, software, data and users will likely threaten existing business continuity. Additionally, many organizations have limited IT personnel resources with the expertise (or free time) necessary to conduct a thorough discovery of all IT assets, configurations, relationships and dependencies. This white paper examines the challenges of embarking on a thorough data center discovery and offers suggestions to overcome the obstacles commonly encountered, minimize disruptions and deliver the best return on IT investment: The Necessary Voyage of Discovery: What Have You Got? How Do The Pieces Fit? Success is in the Details: What You Need to Know (Servers, Storage, Networks, Applications, Services and Middleware, Contracts) Getting the Discovery Job Done

The Necessary Voyage of Discovery Doesn t the IT department already know what hardware and software they have, how it interacts and which users those assets support? After all, IT supports its systems every day. It s a valid question, and the answer, unfortunately, is probably no. Or, not in the detail required to successfully complete a data center move, consolidation or cloud migration without running into serious problems. The discovery phase is the critical first stage of a data center transformation project. In a complex environment, this phase can last months, particularly if performed manually. But businesses are not static. While the discovery phase is ongoing, new equipment may be added or decommissioned, new virtual instances created, and applications changed. Consequently, unless care is undertaken, the discovery phase deliverable may be out of date before it is completed. What Have You Got? Many organizations embark on major data center initiatives without first understanding what assets they have and their relationships to applications, business processes, and internal or external services. Without a comprehensive and up-to-date inventory of your IT assets, a project could result in loss of critical services because an asset, service, or dependency was overlooked. In most data centers, technology was added piece-by-piece over the years. A new server was brought in to support a newly computerized business function. A merger or acquisition amalgamated heterogeneous hardware and software and those most familiar with the acquired systems were no longer with the company post-merger. More storage units were added to accommodate new and/or growing databases. Networking components were added to improve connectivity and/or bandwidth. A visual inspection of hardware and a spreadsheet checklist is an error-prone exercise, particularly if equipment is spread out over multiple locations. What about virtual assets, such as data, applications and middleware? A single physical server may host multiple applications on several virtual servers, possibly running differing operating systems. How Do The Pieces Fit? Knowing what you have in your data center isn t enough. You must understand how every piece interrelates and what business processes they support, essentially what talks to what. Consider again that if employees with critical knowledge leave your company, their knowledge may go with them if there is no up-to-date documentation. Here are some questions to consider: Which storage units, networking gear, and physical or virtual servers support which applications? Who owns and uses those applications? What business processes depend on each application? What dependencies exist between applications and technologies? 2016 Virima Technologies. Page 3!

Without first answering these fundamental questions, changes to IT infrastructure may result in some applications not working at all because vital components were not incorporated into the new environment or necessary linkages were broken. Success is in the Details: What You Need to Know It s the details that are most likely to trip up a major data center project. One piece of seemingly trivial hardware that isn t moved over to the new environment can shut down a vital system or, because of interdependencies, multiple systems. Here is a sample data center checklist: 1. Servers The workhorses of your data center, information collected for every physical server should include: manufacturer and model number; physical attributes (memory, CPU, storage, NICs, HBAs); firmware; location; MAC addresses; IP addresses and VLANs; configuration settings; operating systems or hypervisors; virtual servers running on each physical server; applications or services running on each physical/virtual server; and known interrelationships between servers. Keep in mind that not only are application and database servers important, but crucial infrastructure servers that support under the hood functionality areas are as well. 2. Storage The cost of storage has dropped dramatically over the years, which means the cost of storing each gigabyte of critical data is a small fraction of what it once was. The downside is that low cost has encouraged data proliferation, little of which is ever deleted. Critical data storage information that must be documented includes: Where are all of the storage units and what data is stored where? What makes and models are in service? Is the data structured or unstructured? Which applications will be affected if some storage units are shut down for maintenance? How is data backed up? Is all data backed up to the level warranted by its criticality? What, if any, archiving plans are in place? 3. Networks Understanding your network infrastructure is a prerequisite for ensuring that vital connectivity is not disrupted. A complete inventory of all makes, models, IP addresses, and installed hardware options for a variety of devices should include routers, switches, firewalls, proxy servers, network appliances, and WAN topology. A thorough understanding of the role that each piece of equipment serves in your network architecture is also critical. Today s networks likely include a collection of local area networks, wide area networks and the bridges, routers, and security devices between them. Note that firewalls, load balancers, proxy

servers, VPN terminations, and caching appliances are often lumped in with other network components. Physical networking infrastructure may also support multiple virtual networks that are isolated from each other, possibly for security reasons. For example, a segregated network may be necessary to comply with Payment Card Industry (PCI) standards or regulatory requirements such as those imposed by the Health Insurance Portability and Accountability Act (HIPAA) or the Sarbanes-Oxley Act (SOX). Networks may not stop at your organization s walls. Support for third-party connectivity to credit card processors and supply chain partners, possibly through a private network or virtual private network, should also be taken into account. 4. Applications, Services and Middleware The discovery phase must catalog applications, services and middleware, including documenting functionality and applications that depend on them. Failure to recognize and accommodate the following components when reorganizing a data center may cause critical applications to fail: Applications that share information and interact in real-time and are supported by business, core and middleware services. Business services, such as a service used to check in an airline passenger, may draw data from several databases and access the functionality of a variety of applications. Core services support business applications, technology infrastructure and/or middleware. Examples include domain name services (DNS), directory services, authentication services, and FTP services. From an end-user perspective, these services operate transparently as long as they function properly. If a domain name server fails, every application in your organization may be impacted. Middleware services are essential elements that support business operations, including services for queuing and transaction management, transporting data, and coordinating data movement and transaction flows. 5. Contracts Hardware and software IT assets may have associated documentation that must be tracked, including contracts, warranty protection, maintenance and service contracts. For example, Service Level Agreements often guarantee the performance, reliability and availability of an IT asset or service. Keep in mind that a contract may be affected by a data center transformation. For example, if hardware is moved to a new geographic location to centralize operations, that move might impact service agreements. Or, virtualizing multiple servers onto one larger physical server may also affect software contracts. 2016 Virima Technologies. Page 5!

Getting the Discovery Job Done Manual discovery of all IT assets is a time-consuming, cumbersome, error-prone job. And by the time it is completed, assets may have been changed, added or removed. A tool that automates many discovery processes is necessary to make the task both cost-effective and comprehensive. Many existing tools are good at discovering the existing technologies in your data center, but may be less efficient, or possibly ineffectual, when it comes to matching those assets with the people and business processes they serve. To achieve this objective, the tool must automate as much of the discovery as possible, but also allow for the input, mapping and organization of information gathered from those with tribal knowledge of how things really work. Tools that provide scanning for network and security purposes are common, but typically don t show the big picture. Data collected by these tools must be correlated to provide a better view of the enterprise-wide infrastructure, including the interrelationships among the various components and people who use those components. And since these tools are usually deployed at the departmental level, it is often difficult for the discovery team to gain access, especially if they don t know they exist in the first place. Unfortunately, turf wars are not uncommon in data center transformations. Tools can also miss dependencies. Scans may occur at the wrong time to catch an occasional communication flow, so it is important to let dependency mapping scans run over long periods or at different intervals. And since an enterprise data center does not remain static during or after a discovery project, any tool should refresh the data on an ongoing basis. Likewise, the actual transformation doesn t take place over night so it s critical that operations and support teams are aware of changes as they occur. The initial discovery of assets and relationships should dove-tail into a thorough change management program. Without a highly automated tool, a data center discovery process requires particular expertise and can consume considerable time and resources. This often results in the need for external consultants to perform the work, which can be expensive. And as with any manual/point-in-time discovery, the information is static while the data center remains dynamic. At the end of the day, IT organizations are held accountable to rapidly respond to and support the goals of the organization, delivering the best return on investment as they do so. A comprehensive, automatic discovery tool that keeps the IT inventory configuration management database (CMDB) and relationship/dependency map up-to-date should be one of the lasting deliverables of any data center discovery. About Virima Technologies Virima Technologies, headquartered in Atlanta, Georgia, is an innovator in accelerated enterprise Data Center Transformation (DCT). Recognizing a need for improved automation in key areas of DCT programs, Virima created EcosystemManager, a cloud-based IT asset and service management platform (ITAM & ITSM). EcosystemManager includes automatic discovery of IT environments, a fullfeatured CMDB, project and risk management, and PinkVERIFY certified ITIL service management processes for configuration, change, incident, problem, request and knowledge management. The result is an easy to use ITAM and ITSM SaaS platform that provides unparalleled oversight of the IT ecosystem for management, audit, compliance and Information Technology Infrastructure Library (ITIL) support functions. Virima Technologies, Inc. 1155 Mt. Vernon Hwy., Suite 800, Atlanta, Georgia 30338 404-969-4180 Email: info@virima.com Website: virima.com