Self-service server change management
First Claim
1. A method for performing server change management, the method comprising:
- receiving, by computer software running on computer hardware, a change request made by a requester, the requester having an identity corresponding to an authorization, with respect to server changes, to only request changes for a set of endpoints associated with an application, the set of endpoints being within an enterprise system having managed endpoints;
identifying, by the computer software running on the computer hardware, certain endpoints of the set of endpoints, the certain endpoints being available to the requester according to the authorization for making the requested change;
retrieving, by the computer software running on the computer hardware, a list of endpoints including the certain endpoints;
receiving, by the computer software running on the computer hardware, a selection by the requester of a first endpoint from the list of endpoints, the first endpoint being an endpoint on which the change request will be performed;
identifying, by the computer software running on the computer hardware, from within a set of possible change types, a subset of change types that may be performed on the first endpoint based on a governing policy;
receiving, by the computer software running on the computer hardware, a selection by the requester of a first change type from the subset of change types;
retrieving, by the computer software running on the computer hardware, a set of resource attributes of the first endpoint based on the first change type, the set of resource attributes being the names and characteristics of the first endpoint;
determining, by the computer software running on the computer hardware, a set of change parameters for the set of resource attributes, the set of change parameters being adjustable values associated with the set of resource attributes;
identifying, by the computer software running on the computer hardware, change window requirements for the first change type based on the set of change parameters;
evaluating, by the computer software running on the computer hardware, compliance of the set of change parameters with a set of business policies;
determining, by the computer software running on the computer hardware, that the first change type is a safe change capable of being performed outside of a change window;
executing, by the computer software running on the computer hardware, the change request on the first endpoint without regard for the change window; and
returning to the requester, by the computer software running on the computer hardware, an execution result of the change request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided to eliminate many of the manual steps in a server change management process, creating a self-service experience for a change requester. The method may automatically retrieve the current state of a server; constrain the requested change to a valid, feasible specification; verify that the requested change is compliant with business policies; implement the changes automatically; and develop a knowledge base of automated change risk that is used to modify the change management business process by identifying safe changes that can be performed outside of change windows and/or during change freezes. The method can be applied to changes to physical servers, virtual servers, and servers in a cloud environment.
34 Citations
20 Claims
-
1. A method for performing server change management, the method comprising:
-
receiving, by computer software running on computer hardware, a change request made by a requester, the requester having an identity corresponding to an authorization, with respect to server changes, to only request changes for a set of endpoints associated with an application, the set of endpoints being within an enterprise system having managed endpoints; identifying, by the computer software running on the computer hardware, certain endpoints of the set of endpoints, the certain endpoints being available to the requester according to the authorization for making the requested change; retrieving, by the computer software running on the computer hardware, a list of endpoints including the certain endpoints; receiving, by the computer software running on the computer hardware, a selection by the requester of a first endpoint from the list of endpoints, the first endpoint being an endpoint on which the change request will be performed; identifying, by the computer software running on the computer hardware, from within a set of possible change types, a subset of change types that may be performed on the first endpoint based on a governing policy; receiving, by the computer software running on the computer hardware, a selection by the requester of a first change type from the subset of change types; retrieving, by the computer software running on the computer hardware, a set of resource attributes of the first endpoint based on the first change type, the set of resource attributes being the names and characteristics of the first endpoint; determining, by the computer software running on the computer hardware, a set of change parameters for the set of resource attributes, the set of change parameters being adjustable values associated with the set of resource attributes; identifying, by the computer software running on the computer hardware, change window requirements for the first change type based on the set of change parameters; evaluating, by the computer software running on the computer hardware, compliance of the set of change parameters with a set of business policies; determining, by the computer software running on the computer hardware, that the first change type is a safe change capable of being performed outside of a change window; executing, by the computer software running on the computer hardware, the change request on the first endpoint without regard for the change window; and returning to the requester, by the computer software running on the computer hardware, an execution result of the change request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for performing server change management, the computer program product comprising a non-transitory computer readable storage medium having stored thereon:
-
first program instructions programmed to receive a change request made by a requester, the requester having an identity corresponding to an authorization, with respect to server changes, to only request changes for a set of endpoints associated with an application, the set of endpoints being within an enterprise system having managed endpoints; second program instructions programmed to identify, by the computer software running on the computer hardware, certain endpoints of the set of endpoints, the certain endpoints being available to the requester according to the authorization for making the requested change; third program instructions programmed to retrieve a list of endpoints including the certain endpoints; fourth program instructions programmed to receive a selection by the requester of a first endpoint from the list of endpoints, the first endpoint being an endpoint on which the change request will be performed; fifth program instructions programmed to identify from within a set of possible change types, a subset of change types that may be performed on the first endpoint based on a governing policy; sixth program instructions programmed to receive a selection by the requester of a first change type from the subset of change types; seventh program instructions programmed to retrieve a set of resource attributes of the first endpoint based on the first change type, the set of resource attributes being the names and characteristics of the first endpoint; eighth program instructions programmed to determine a set of change parameters for the set of resource attributes, the set of change parameters being adjustable values associated with the set of resource attributes; ninth program instructions programmed to identify change window requirements for the first change type based on the set of change parameters; tenth program instructions programmed to evaluate compliance of the set of change parameters with a set of business policies; eleventh program instructions programmed to determine that the first change type is a safe change capable of being performed outside of a change window; twelfth program instructions programmed to execute the change request on the first endpoint without regard for the change window; and thirteenth program instructions programmed to return to the requester an execution result of the change request. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for performing server change management, the computer system comprising:
-
a processor(s) set; and a computer readable storage medium; wherein; the processor set is structured, located, connected and/or programmed to run program instructions stored on the computer readable storage medium; and the program instructions include; first program instructions programmed to receive a change request made by a requester, the requester having an identity corresponding to an authorization, with respect to server changes, to only request changes for a set of endpoints associated with an application, the set of endpoints being within an enterprise system having managed endpoints; second program instructions programmed to identify, by the computer software running on the computer hardware, certain endpoints of the set of endpoints, the certain endpoints being available to the requester according to the authorization for making the requested change; third program instructions programmed to retrieve a list of endpoints including the certain endpoints; fourth program instructions programmed to receive a selection by the requester of a first endpoint from the list of endpoints, the first endpoint being an endpoint on which the change request will be performed; fifth program instructions programmed to identify from within a set of possible change types, a subset of change types that may be performed on the first endpoint based on a governing policy; sixth program instructions programmed to receive a selection by the requester of a first change type from the subset of change types; seventh program instructions programmed to retrieve a set of resource attributes of the first endpoint based on the first change type, the set of resource attributes being the names and characteristics of the first endpoint; eighth program instructions programmed to determine a set of change parameters for the set of resource attributes, the set of change parameters being adjustable values associated with the set of resource attributes; ninth program instructions programmed to identify change window requirements for the first change type based on the set of change parameters; tenth program instructions programmed to evaluate compliance of the set of change parameters with a set of business policies; eleventh program instructions programmed to determine that the first change type is a safe change capable of being performed outside of a change window; twelfth program instructions programmed to execute the change request on the first endpoint without regard for the change window; and thirteenth program instructions programmed to return to the requester an execution result of the change request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification