Having done the SMS to CMDB thing ... (using EIE and custom code.. a lot
faster!!).... Norm is correct in specifying that the "Last Logged In User"
is not necessarily correct under all circumstances.  What we have done in
CMDB 1.1 is only allow "one" User-to-Computer relationship to be defined for
the SMS interface, but allow any number of other User-to-Computer
relationships entered by anyone else for the same asset.  This allows the
"HAND-JAM" and SMS solution to co-exist.

So this is what happens:

- If the SMS interface notices that there is a user-to-computer relationship
that it (ie. the SMS interface) has created previously and the current value
of the logged-in-user is different than the current relationship, it deletes
the old relationship (this is audit logged) and creates the new one.
- If the SMS interface notices that there are no user-to-computer
relationships that it (ie. the SMS interface) has created previously for
this asset, it creates a new one.
- If the SMS interface notices that there is a user-to-computer relationship
that it (ie. the SMS interface) has created previously and the current value
of the logged-in-user is the same as the current relationship, it does
nothing.

That was the best that we could do... allow automation and 'HAND-JAM" to
co-exist.....

Terry



-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] Behalf Of Kaiser Norm E CIV USAF 96
CS/SCCE
Sent: Thursday, June 28, 2007 3:08 PM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB (U)


The issue I'm raising isn't that there isn't a unique method of
identifying a machine...there are clearly--as you well point
out--several options there.

Another one would be MAC address.  It's probably not as good as IUID,
but good enough.  That's what we use here in our homegrown asset system
and it works fine.

The issue is related to the fact that so many people tout the User to
Computer relationship as a benefit of CMDB.  My heartburn is, WHERE DOES
THE RELATIONSHIP COME FROM?! In many environments, I contend, the only
way is to HAND-JAM it.

Using a discovery tool of any sort will very often--if not MOST
often--deliver the WRONG answer because the data these solutions
typically rely on is the LAST LOGON attribute, which for reasons I've
already pointed out in an earlier post is not reliable.

So if you cannot discover it, you must HAND JAM it...and then keep it
current...day in, day out, day in, day out...

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Hennigan, Sandra H CTR OSD-CIO
Sent: Thursday, June 28, 2007 2:01 PM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB (U)

UNCLASSIFIED

Not yet using CMDB.

We are using the IUID in Asset Management.  Gov't purchasing requires
that companies we purchase from provide it and we use a barcode scanner
to bring in new data.  The IUID is actually a construct; routinely make,
model, serial number.

Dell, for one, will provide a terrific data file for the equipment
purchased, identifying items by the IUID.  On receipt of the data file,
usually a week or two after equipment delivery, we know just what should
have been received. And from the scan at the warehouse, we know what was
actually received.  The scan imports directly to the Asset record and I
have a form to which I import the data file.  An Escalation synchs the
new data with the Asset Record, matching by IUID and Serial number.
After synching, the Status of a Validate record is changed to
"Completed".  Records that didn't synch we know by Status and know what
doesn't match between the files.

For the CMDB, my plan is to use a Discovery tool. BeLarc System
Management Discovery tool is one product that will pull the IUID from
the BIOS.  YOU set up when to scan, when to synch data.

Sandra Hennigan

Enterprise Remedy Administrator
Office # 703-602-2525 x251
CACI - Ever Vigilant

Apparently, there is nothing that cannot happen today.  Mark Twain

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Kaiser Norm E CIV USAF 96
CS/SCCE
Sent: Thursday, June 28, 2007 1:42 PM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB (U)


You're putting this information in your CMDB through some automated
process? How often does it run?

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Hennigan, Sandra H CTR OSD-CIO
Sent: Thursday, June 28, 2007 11:55 AM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB (U)

UNCLASSIFIED

*****You don't set the owner relationship from a last logon value!" OK,
fine...where does it come from, then?**** Using the Item Unique
Identification (IUID) label, read from the system BIOS (Label is also
affixed to machine) is one method to determine "the" machine.

Sandra Hennigan

Enterprise Remedy Administrator
Office # 703-602-2525 x251
CACI - Ever Vigilant

Apparently, there is nothing that cannot happen today.  Mark Twain

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Kaiser Norm E CIV USAF 96
CS/SCCE
Sent: Thursday, June 28, 2007 12:09 PM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB


**

I don't know folks...I'm still not seeing it.  Again, I understand the
theory, but in the REAL WORLD I don't much practicality in it.



You made a great point-if I want to link incident to asset, I could pull
from the auto-discovery inventory...not pull from redundant data in the
Remedy server.



That alone presents issues-how, exactly, do you identify the true user
of a workstation? Here in our environment we have thousands of machines
that are logged onto by multiple users.  Who's the owner? One day a
fighter pilot logs onto machine A to check his email.  The
auto-discovery runs and "identifies" the pilot as the "owner" of machine
A.  The next day, the navigator logs onto machine A and gets an error
when he tries to open email.  So he calls the Help Desk.



The Help Desk analyst says, "Hey...let's use this newfangled ringy-dingy
ITSM thing to figure out what machine he's working on..." but lo and
behold the thing does not show that the navigator is using machine A,
because as far as it knows, machine A is owned by the fighter pilot...



So then you say, "Oh, no, no, no, Norm! You don't set the owner
relationship from a last logon value!" OK, fine...where does it come
from, then?



My point-data does not "magically" appear in the CMDB.  It gets there
via two different methods-some automated pull or by hand-jam.  But the
automated pull runs on some delayed schedule from another data source
that, in turn, may run on an automated schedule.  Thus, the data is
STALE.



In order to realize the benefits a lot of folks are touting, DATA MUST
BE REAL-TIME or darned-near close to it.



  _____

From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of David Sanders
Sent: Thursday, June 28, 2007 10:40 AM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB



Hi Norm



Well, look at it from another angle.  Does a CMDB add value at the
center of your service desk operations when all break/fix incidents and
planned change requests are linked to the relevant CI records?



For Incidents, you build up a picture not only of frequent Requesters
(training issues highlighted?), but also of problem hardware types or
patterns of issues that can then be addressed separately (as Problem
tickets?).



For change requests, the ONLY way you stand a chance of managing changes
is if you have clearly identified what assets or other CIs are being
changed, evaluate and authorize the changes, and than afterwards review
what has been done.  Discovery tools may give you an asset inventory to
do part of this, and may discover some physical topology (this database
runs on this virtual server, on this hardware; it uses this
switch/router etc.).  What auto-discovery can't give you is how this
fits into business processes, like this database is used for payroll,
which is part of HR systems, and who the dba is, who the Payroll and HR
business owners are, etc.  If changes are planned to this database, the
owner of the HR processes may need to be informed and to approve the
change and the schedule. The change may need to be assigned to the
correct dba.



The Incident linking part you can probably do with just auto-discovered
asset inventory, but the change stuff really needs the business context
information to be useful.  A decent CMDB will provide the business
context around the asset inventory, and will include people and process
links.  It will allow you to assess risk, business disruption and costs,
and plan changes properly. There is value there, but I'm not sure if
that value justifies the cost and effort involved in acquiring and
maintaining Atrium and SIM for your organization. Only you can answer
that question.



Regards



David Sanders

Remedy Solution Architect

Enterprise Service Suite @ Work

==========================

ARS List Award Winner 2005

Best 3rd party Remedy Application



See the ESS Concepts Guide
<http://www.westoverconsulting.co.uk/downloads/ESS_Concepts_Guide.pdf>



tel +44 1494 468980

mobile +44 7710 377761

email [EMAIL PROTECTED]



web http://www.westoverconsulting.co.uk
<http://www.westoverconsulting.co.uk/>



  _____

From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Kaiser Norm E CIV USAF 96
CS/SCCE
Sent: Thursday, June 28, 2007 2:40 PM
To: [email protected]
Subject: Re: Real-World Value of SMS & CMDB



I think we're coming at this from two different perspectives.
Agreed--the CMDB might be somewhat useful if you are in an environment
where NO OTHER AUTOMATION TOOLS EXIST.  But I was coming at this from
the perspective that certain "standard" network monitoring/management
tools are already in place--HPOV, AD, SMS, SNMP, etc.

For the sake of keeping a fruitful discussion alive, allow me to
counter:

__20060125_______________________This posting was submitted with HTML in
it___ __20060125_______________________This posting was submitted with
HTML in it___

________________________________________________________________________
_______
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"

________________________________________________________________________
_______
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"

________________________________________________________________________
_______
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"

____________________________________________________________________________
___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the
Answers Are"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to