Feeds

Give me CMDB before I die

Rather more than just a trendy new acronym

The Power of One Brief: Top reasons to choose HP BladeSystem

If there's a fashionable topic in the enterprise at the moment, it's ITIL (the IT Infrastructure Library, a collection of best practices for managing IT operations) and its contribution to IT Governance. For developers, it's all about designing holistic systems, with operational resilience, upgrade, maintenance and even change management processes built in.

The Configuration Management Database, or CMDB, is fundamental to ITIL (see page 17 in the Introduction to ITIL here). This is an interesting little database design exercise in itself, and there's a lot of hype around CMDB at the moment, with lots of claimed CMDB products and precious few real-world practical implementations of the concept.

The CMDB concept also has a potentially rich future, since one could envisage it storing metadata relating to the quality of the information in it (how up-to-date, how reliable) and not only managing the operational infrastructure as it is now but also providing the basis of “what if” impact analysis of future changes. Ultimately, it could power a risk management process, identifying areas that are poorly managed now and forewarning of potential operational issues in the future. Now, there's a chance for developers to write some interesting applications!

So I was keen to meet with Jim White and Dustin McNabb of Managed Objects, to talk about the general design issues behind its fully-functional CMDB 360 product (it's had a CMDB for a while, but its earlier model wasn’t exactly “live” – the information in it had to be exported to other tools). This looks like a welcome addition to the current crop of CMDBs, typified by BMC's Atrium, but I don’t want to review CMDBs just now, I want to talk about some of the database design issues.

For a start, you probably already have all the information needed for your CMDB already, although the CMDB is more than an asset list, it stores the relationships between configuration items too. You really ought to have an automatically-maintained asset management database these days (surely you didn’t just through away all that expensive effort you put in for Y2k – that’s irony, by the way) and every bit of infrastructure technology has its own configuration file. However, Jim White points out, just applying “extract, transform and load” (ETL) to all this stuff and dumping it a relational database doesn’t give you a real CMDB (and the ETL process is probably going to be harder than you expect anyway).

ETL gives you duplicate data, collected in batch somewhat after the event – so which is the authoritative version of the data? The original data, wherever it is, of course, which means that the CMDB will first stop being trusted and then become neglected. However, before then it will become very big and deliver a classic “single point of failure” – if all configuration changes are made through the CMDB (as they must be, if it is to mean anything), if it fills up or fails, or slows to a crawl, operational systems slow down and stop. Not a good idea and probably the final nail in this kind of CMDB’s coffin.

So, let's start again and look at the CMDB requirements. These come from analysis of ITIL processes, of course, but Jim and Dustin directed me to research white papers from Ronni J. Colville of Gartner (ID Number: G00136977, 3 February 2006) and Thomas Mendel & Jean-Pierre Garbani (with Peter O’Neill and Reedwan Iqbal) of Forrester (Best Practices: The “Just Enough” CMDB, April 12, 2006, available here – free registration required), which provide usefully independent summaries.

Colville points out that configuration management and the CMDB are separate things - the CMDB is the data and metadata repository underlying configuration management, but it doesn't deliver configuration management of or by itself. Gartner seems to identity 3 key CMDB requirements:

  1. Federation, the ability to link to and logically integrate multiple existing, physical, sources of configuration data without moving them;
  2. Reconciliation, to rationalize conflicting instances of configuration items or components from different sources;
  3. Visualization, to provide users of the CMDB with logical and/or physical illustrations of the peer-to-peer and hierarchical relationships between configuration items.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.