+ All Categories
Home > Documents > Veritas Configuration Manager

Veritas Configuration Manager

Date post: 09-Feb-2016
Category:
Upload: joshua
View: 48 times
Download: 0 times
Share this document with a friend
Description:
Veritas Configuration Manager. José María Fernández [email protected]. Why do configuration changes cause downtime?. App1 User. App2 User. App3 User. IT Staff. What Steps Should Customers Take?. 1. Stop unauthorized changes. 2. Correlate incidents with change. - PowerPoint PPT Presentation
Popular Tags:
13
Veritas Configuration Manager José María Fernández [email protected]
Transcript
Page 1: Veritas Configuration Manager

Veritas Configuration ManagerJosé María Fernández [email protected]

Page 2: Veritas Configuration Manager

VERITAS Server Foundation 2Symantec Confidential

Why do configuration changes cause downtime?

App3 User

App2 User

App1 User

IT Staff

Page 3: Veritas Configuration Manager

VERITAS Server Foundation 3Symantec Confidential

4. Integrate these controls into processes such as change and incident mgmt

3. Proactively avoid outages with proper impact analysis

1. Stop unauthorized changes

What Steps Should Customers Take?

2. Correlate incidents with change

Page 4: Veritas Configuration Manager

VERITAS Server Foundation 4Symantec Confidential

Veritas Configuration Manager: Core Functionality

AUTO DISCOVER

COMPARE SERVERS

TRACK CHANGES

MAP DEPENDENCIES

Page 5: Veritas Configuration Manager

VERITAS Server Foundation 5Symantec Confidential

How Does Veritas Configuration Manager work?

Infrastructure Software

OS & Patch Levels

Middleware Software

Database Software

File System

Memory CPU

Network I/O

Custom Applications

Enterprise Applications

WHAT IS DISCOVERED? WHAT CONSUMABLES ARE CREATED?

Inventory ReportsCompliance

Change Audits

WHAT IS TRACKED?

Who?

When?

Before/After?

Impacted?

Page 6: Veritas Configuration Manager

VERITAS Server Foundation 6Symantec Confidential

Value ExtractionCore PlatformVCM ServerManaged Servers

Configuration Repository

Lightweight VCM Agents

VCM System Architecture

Web UI

Reporting

Integration

Comparison

Page 7: Veritas Configuration Manager

VERITAS Server Foundation 7Symantec Confidential

Enterprise Architecture

Page 8: Veritas Configuration Manager

VERITAS Server Foundation 8Symantec Confidential

Hardware Configuration

Page 9: Veritas Configuration Manager

VERITAS Server Foundation 9Symantec Confidential

Software Configuration

Page 10: Veritas Configuration Manager

VERITAS Server Foundation 10Symantec Confidential

Service View, Dependency Map and Change Notification

Page 11: Veritas Configuration Manager

VERITAS Server Foundation 11Symantec Confidential

Change Audit: Who, When, What

Page 12: Veritas Configuration Manager

VERITAS Server Foundation 12Symantec Confidential

Change Details: Before / After

Page 13: Veritas Configuration Manager

VERITAS Server Foundation 13Symantec Confidential

&ANSWERS

QUESTIONS


Recommended