Wednesday, March 16, 2011

Configuration Management Principles

Configuration Administration ('CM' hereafter) means that a great deal of different things to various people. Weighty tomes have been written describing the goals, policies, procedures, benefits, pitfalls, and a selection of meanings of CM. One recent CM plan I labored on is a 20-something web page doc wanting to element this facts and how it relates to the client's projects.



Infrastructure Hardware


Computer Gaming Lab by Angelo State University



Why does it matter?
In a large business network it's not unusual to have lots of or hundreds of network devices. In case you make sense all your switches, routers, firewalls and other community appliances, and then you consider how many lines of configuration settings employ to every one, you are able to see there is an important investment in your own networks' configuration which must be protected.






Version management - All things is maintained in a Model Handle resource such as those provided by Serena (commercial software) or Subversion (Open Source). A few agreed set of things (Configuration Items, or CIs for short) saved within the equipment represent baselines. In other words, they are the set of revisions currently in production. They are really not necessarily the most up-to-date revisions. Builds intended for deployment to any post-development surroundings (QA, Test, Prod, whatever) are always pulled from Model Control, and never copied directly from a innovation environment.






Therefore configuration settings on your network have to be backed up, verified for compliance with any corporate governance policy or safety standard, and consistency of configs maintained across the estate.






Unapproved adjustments are launched from a mixture of sources such as security violations, inappropriate utilizer activity, and administrator errors.  Even a seemingly benign alteration might have far-reaching unintended penalties to IT security, effectiveness and reliability.  Over time, system configurations deviate additional and additional removed from established standards.  This is certainly remarked as "configuration drift", and the greater the drift, the greater the risk posed to the dependability of an IT help stack.






The most important guideline for the purpose is to begin CM early within the venture life cycle. The task supervisor ought to determine the conceivable fluidity of the venture early on, and create the appropriately scaled configuration administration system in the course of the venture planning in preference to half-way via the execution. Whenever inquired which sort they might do in a different way now time, most teams say they would instigate their alter management activities earlier in their now project, instead of viewing it as an add-on or afterthought (.






How does it work?
To date, the increase in network gadget hardware has taken place at a a lot faster rate than the equal increase in network management or network configuration administration software. In various respects it is understandable - Network Devices did not definitely have managing or configuring initially as they have been black boxes that both handed information or not. It was only with the coming of shared network infrastructures like Ethernet that this configuration of addresses and protocols developed into crucial and some consideration made of the network topology to cater for traffic moves and volumes.




Find out the secrets of configuration management here.
Merle Linsin is our current Configuration Management savant who also discloses information spyware doctor with antivirus,block email lotus notes,download limewire on their blog.

No comments:

Post a Comment