Veritas Configuration ManagerJosé María Fernández [email protected]
VERITAS Server Foundation 2Symantec Confidential
Why do configuration changes cause downtime?
App3 User
App2 User
App1 User
IT Staff
VERITAS Server Foundation 3Symantec Confidential
4. Integrate these controls into processes such as change and incident mgmt
3. Proactively avoid outages with proper impact analysis
1. Stop unauthorized changes
What Steps Should Customers Take?
2. Correlate incidents with change
VERITAS Server Foundation 4Symantec Confidential
Veritas Configuration Manager: Core Functionality
AUTO DISCOVER
COMPARE SERVERS
TRACK CHANGES
MAP DEPENDENCIES
VERITAS Server Foundation 5Symantec Confidential
How Does Veritas Configuration Manager work?
Infrastructure Software
OS & Patch Levels
Middleware Software
Database Software
File System
Memory CPU
Network I/O
Custom Applications
Enterprise Applications
WHAT IS DISCOVERED? WHAT CONSUMABLES ARE CREATED?
Inventory ReportsCompliance
Change Audits
WHAT IS TRACKED?
Who?
When?
Before/After?
Impacted?
VERITAS Server Foundation 6Symantec Confidential
Value ExtractionCore PlatformVCM ServerManaged Servers
Configuration Repository
Lightweight VCM Agents
VCM System Architecture
Web UI
Reporting
Integration
Comparison
VERITAS Server Foundation 7Symantec Confidential
Enterprise Architecture
VERITAS Server Foundation 8Symantec Confidential
Hardware Configuration
VERITAS Server Foundation 9Symantec Confidential
Software Configuration
VERITAS Server Foundation 10Symantec Confidential
Service View, Dependency Map and Change Notification
VERITAS Server Foundation 11Symantec Confidential
Change Audit: Who, When, What
VERITAS Server Foundation 12Symantec Confidential
Change Details: Before / After
VERITAS Server Foundation 13Symantec Confidential
&ANSWERS
QUESTIONS