process and workflow integration<\/li><\/ul>\n\n\n\nDevice Discovery and Inventory<\/h5>\n\n\n\n
Dynamically add new elements to be managed. This includes networks, servers, containers, applications, cloud services, etc. Need to be able to define rules to include as well as exclude elements. Integration with other inventory sources such as CMDBs are also helpful.<\/p>\n\n\n\n
Device and Service Classification<\/h5>\n\n\n\n
Examine devices in detail to understand what services are relevant and what configuration to collect and monitor for changes.<\/p>\n\n\n\n
Configuration Collection<\/h5>\n\n\n\n
Configuration information exists in many different forms, e.g. files, command line output, registry keys, database entries, APIs. The Change Monitoring system should be able to collect all of these types of configuration information and normalize the data. Being able to collect the proper information based on the type of application, system or device is critical to monitor the changes in an environment. <\/p>\n\n\n\n
Search Index and Parsing<\/h5>\n\n\n\n
Once the Configuration information is collected and consolidated, being able to index and analyze the configuration data in an IT-centric way enables the proper information to be provided to IT professionals. For example, IP addresses syntax, special symbols, etc have special meaning that should not be lost by the indexing process so that searching is intuitive for infrastructure management.<\/p>\n\n\n\n
Policy and Action<\/h5>\n\n\n\n
Configuration and monitoring policies can be defined to notify on policy non-compliance. Why is this important?<\/p>\n\n\n\n
Service Dependency<\/h5>\n\n\n\n
Analysis of the configuration data to determine dependencies between service components. This is the foundation for impact analysis and service visualization and enables related systems and information to be automatically collected and presented in context of the affected service<\/p>\n\n\n\n
User Workflow and Interaction<\/h5>\n\n\n\n
What the user is trying to accomplish should determine the workflow and interaction required to retrieve the configuration change information. Troubleshooting and searching for the root-cause of an incident is very different from searching for configuration information about a specific service.<\/p>\n\n\n\n
API and Reporting<\/h5>\n\n\n\n
The searching and filtering capability to retrieve the configuration data should be easily accessible via the API for reporting and integration with external systems.<\/p>\n\n\n\n
Process and Workflow Integration<\/h5>\n\n\n\n
The configuration change information should be integrated with the Change Request workflow to automatically audit the underlying infrastructure configuration changes related to the change request.<\/p>\n\n\n\n
Conclusion<\/h2>\n\n\n\n
A Change Monitoring solution does not requirement much effort to deploy. It can quickly and easily provide additional insights to the operational support team, enabling them to be more efficient at troubleshooting complex incidents. The configuration data is also invaluable to the security team and provides the necessary auditing required for many compliance requirements.<\/p>\n\n\n\n
Next in the series we will cover \u201cLevel 3 – Proactive\u201d when we make strategic proactive and preventative measures that will reduce unnecessary incidents and minimize change risks.
<\/p>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Bridging the Two Worlds, Part 2 In part 1 of the series, we provided an overview of how organizations have a tough time tracking their ongoing configuration changes in their IT and network infrastructure. Many have implemented change management processes to provide some approval and accountability for changes, however many config changes whether planned or […]<\/p>\n","protected":false},"author":5,"featured_media":2247,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"content-type":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1,33],"tags":[],"_links":{"self":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts\/2245"}],"collection":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/comments?post=2245"}],"version-history":[{"count":0,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/posts\/2245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/media\/2247"}],"wp:attachment":[{"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/media?parent=2245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/categories?post=2245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.siff.io\/wp-json\/wp\/v2\/tags?post=2245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}