Feeds

CMDB implementation? What do you think

Is there a wrong way to do it...

  • alert
  • submit to reddit

Reducing security risks from open source software

Reg Technology Panel If you've had any encounters recently with vendors who sell service management solutions, you'll undoubtedly have had the acronyms "ITIL" and "CMDB" thrown at you on quite a few occasions. ITIL is the best practice framework that basically tells you how to deliver IT services effectively and efficiently, and one of the basic principles behind it is if you don't know what's in your IT infrastructure and how all the pieces hang together, you stand a snowflake in Hell's chance of extending it, maintaining it and supporting it successfully.

This is where Configuration Management Databases, aka CMDBs come in. The idea is to build a repository or set of linked repositories that hold details of not just IT assets, but how they relate to both each other and the higher level services they enable – i.e. all of the configuration and dependency related information. This is obviously pretty handy for all kinds of things, from troubleshooting issues when they arise in a help desk context, to figuring out the impact of a proposed system change or new system rollout so all of the necessary preparations can be made. The same repository keeps track of how things change over time, which has advantages in compliance terms as well as from an operational management perspective.

CMDBs are a great idea in principle and if most IT departments could wave a magic wand and have one magically appear, pre-populated with all of the details of their infrastructure, systems and services, they would probably embrace the whole concept immediately. Back in the real world, however, it ain't that easy, and the attractive sounding CMDB idea soon translates to a bunch of complex and difficult questions such as:

How many CMDBs do we actually need or want? One big central repository, or multiple repositories that coordinate with each other? If the latter, how do we keep them synchronised?

Then there is the question of whether CMDBs compliment or conflict with more traditional asset management systems or other ways in which configuration management information is held, e.g. within systems monitoring and management software suites. And when it comes to implementation, should we start by sucking all of our asset information into the CMDB first then building up the higher level view of logical systems and services from that, or should we start by defining the services that are most important to the business, then pull in the details of the components they are dependent on more selectively?

Tales of CMDB implementations crashing and burning because of problems with the implementation approach are all too common, and while various gurus and advisors all have an opinion on what works and what doesn't, there is no better means of hammering out the right and wrong way than to ask lots of people who have "been there, done that" for their experiences.

So, if you have experience of, or even just an opinion on, some of the questions we have raised above, we need your input into the latest Reg survey. There are some traditional tick and bash multiple choice questions in there, but also a chance to express yourself freely, so get across there now and let us know what you know.

As usual, we'll then pull everything together and feed back the results for the collective benefit of the broader Reg Reader community.®

Eight steps to building an HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.