veritas configuration manager josé maría fernández [email protected]

13
Veritas Configuration Manager José María Fernández [email protected]

Post on 20-Dec-2015

222 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

Veritas Configuration Manager

José María Fernández

[email protected]

Page 2: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 2Symantec Confidential

Why do configuration changes cause downtime?

App3 User

App2 User

App1 User

IT Staff

Page 3: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 3Symantec Confidential

4. Integrate these controls into processes such as change and incident mgmt

3. Proactively avoid outages with proper impact analysis

1. Stop unauthorized changes

What Steps Should Customers Take?

2. Correlate incidents with change

Page 4: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 4Symantec Confidential

Veritas Configuration Manager: Core Functionality

AUTO DISCOVER

COMPARE SERVERS

TRACK CHANGES

MAP DEPENDENCIES

Page 5: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 5Symantec Confidential

How Does Veritas Configuration Manager work?

Infrastructure Software

OS & Patch Levels

Middleware Software

Database Software

File System

Memory CPU

Network I/O

Custom Applications

Enterprise Applications

WHAT IS DISCOVERED? WHAT CONSUMABLES ARE CREATED?

Inventory Reports

Compliance

Change Audits

WHAT IS TRACKED?

Who?

When?

Before/After?

Impacted?

Page 6: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 6Symantec Confidential

Value ExtractionCore Platform

VCM ServerManaged Servers

Configuration Repository

Lightweight VCM Agents

VCM System Architecture

Web UI

Reporting

Integration

Comparison

Page 7: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 7Symantec Confidential

Enterprise Architecture

Page 8: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 8Symantec Confidential

Hardware Configuration

Page 9: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 9Symantec Confidential

Software Configuration

Page 10: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 10Symantec Confidential

Service View, Dependency Map and Change Notification

Page 11: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 11Symantec Confidential

Change Audit: Who, When, What

Page 12: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 12Symantec Confidential

Change Details: Before / After

Page 13: Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

VERITAS Server Foundation 13Symantec Confidential

&ANSWERS

QUESTIONS