Configuration management database implementation with end-to-end cross-checking system and method
First Claim
1. A method of end-to-end configuration management, comprising:
- creating an inventory of servers of an enterprise;
creating an inventory of network components of the enterprise, wherein the inventory of network components includes at least some information related to relationships, dependencies, and/or information flowing among assets of the enterprise;
creating a first inventory of applications of the enterprise using a first inventory component executing on a processor including a tool configured to generate a list of applications deployed in the enterprise;
creating a second inventory of the applications of the enterprise using a second inventory component executing on a processor to automatically scan systems of the enterprise for at least one selected from the group consisting of;
executable files, residual files, directory trees, version files, and status reports, wherein the second inventory component is different from the first inventory component;
cross-checking the first and second inventories of the applications of the enterprise to create a master inventory of applications of the enterprise, the master inventory of the applications including at least some information related to at least some of the servers whereon the applications reside;
assigning a degree of confidence to each asset of the master inventory of applications based on the cross-checking, wherein the degree of confidence assigned to assets where data of the first inventory and the second inventory are in agreement is higher than the degree of confidence assigned to assets where data of the first inventory and the second inventory are in conflict;
cross-checking the inventory of servers and the at least some information related to the at least some of the servers whereon the applications reside from the master inventory of applications to create a master inventory of servers of the enterprise;
creating an inventory of people of the enterprise and cross-referencing the people with other assets of the enterprise;
creating an inventory of services provided by the enterprise, wherein each of the services provided by the enterprise is supported by at least one of the applications of the enterprise;
identifying end-to-end relationships from at least some of the servers, to at least some of the network components, to at least some of the applications, to at least some of the people, and to at least some of the services provided by the enterprise using the master inventory of servers, the inventory of network components, the master inventory of applications, the inventory of people, and the inventory of services; and
creating a map of the identified end-to-end relationships to graphically illustrate the identified relationships.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for end-to-end configuration management is provided. The system includes, a server component, a network component, an application component, a resources component, and a services component each operable to identify servers, communication network hardware, applications, human resources, and services, respectively, of the enterprise. The system further includes a management component operable to identify an end-to-end relationship between at least some of the communication network hardware to at least some of the servers, and from at least some of the servers to at least some of the applications, and from at least some of the applications to at least some of the human resources, and from at least some of the applications to at least some of the services.
25 Citations
20 Claims
-
1. A method of end-to-end configuration management, comprising:
-
creating an inventory of servers of an enterprise; creating an inventory of network components of the enterprise, wherein the inventory of network components includes at least some information related to relationships, dependencies, and/or information flowing among assets of the enterprise; creating a first inventory of applications of the enterprise using a first inventory component executing on a processor including a tool configured to generate a list of applications deployed in the enterprise; creating a second inventory of the applications of the enterprise using a second inventory component executing on a processor to automatically scan systems of the enterprise for at least one selected from the group consisting of;
executable files, residual files, directory trees, version files, and status reports, wherein the second inventory component is different from the first inventory component;cross-checking the first and second inventories of the applications of the enterprise to create a master inventory of applications of the enterprise, the master inventory of the applications including at least some information related to at least some of the servers whereon the applications reside; assigning a degree of confidence to each asset of the master inventory of applications based on the cross-checking, wherein the degree of confidence assigned to assets where data of the first inventory and the second inventory are in agreement is higher than the degree of confidence assigned to assets where data of the first inventory and the second inventory are in conflict; cross-checking the inventory of servers and the at least some information related to the at least some of the servers whereon the applications reside from the master inventory of applications to create a master inventory of servers of the enterprise; creating an inventory of people of the enterprise and cross-referencing the people with other assets of the enterprise; creating an inventory of services provided by the enterprise, wherein each of the services provided by the enterprise is supported by at least one of the applications of the enterprise; identifying end-to-end relationships from at least some of the servers, to at least some of the network components, to at least some of the applications, to at least some of the people, and to at least some of the services provided by the enterprise using the master inventory of servers, the inventory of network components, the master inventory of applications, the inventory of people, and the inventory of services; and creating a map of the identified end-to-end relationships to graphically illustrate the identified relationships. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 20)
-
-
9. A system for end-to-end configuration management, comprising:
-
a server component that identifies servers in an enterprise; a network component that identifies communication network hardware of the enterprise; a first application component executable on a processor that identifies a first set of applications of the enterprise, wherein the first application component automatically scans-systems of the enterprise to identify at least one selected from the group consisting of;
executable files, residual files, directory trees, version files, and status reports;a second application component executable on a processor that identifies a second set of applications of the enterprise, wherein the second application component is different from the first application component and generates a list of applications deployed in the systems of the enterprise; a resources component that identifies human resources of the enterprise; a services component that identifies services provided by the enterprise, wherein each of the services provided by the enterprise is supported by least one of the applications of the enterprise; and a management component that cross-checks the first set of applications and the second set of applications to create a master set of applications, and assigns a degree of confidence to the master set of applications, wherein the degree of confidence assigned to assets where data of the first set of applications and the second set of applications are in agreement is higher than the degree of confidence assigned to assets where data of the first set of applications and the second set of applications are in conflict; the management component further identifies relationships between at least some of the communication network hardware to at least some of the servers, and from at least some of the servers to at least some of the applications, and from at least some of the applications to at least some of the human resources, and from at least some of the applications to at least some of the services using the inventory of servers, the inventory of network components, the master set of applications, the inventory of people, and the inventory of services, and the management component creates a map of the identified relationships to graphically illustrate the identified relationship. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer implemented method for end-to-end configuration management, comprising:
-
identifying servers in an enterprise; identifying communication network hardware of the enterprise; identifying a first set of applications of the enterprise with a first inventory component executing on a processor by automatically scanning systems of the enterprise to identify at least one selected from the group consisting of;
executable files, residual files, directory trees, version files, and status reports;identifying a second set of applications of the enterprise with a second inventory component executing on a processor by generating a list of applications deployed in the enterprise, wherein the second inventory component is different from the first inventory component; identifying human resources of the enterprise; identifying services provided by the enterprise, wherein each of the services provided by the enterprise is supported by least one of the applications of the enterprise; cross-checking the first and the second set of the applications to create a master set of applications; assigning a degree of confidence to the master set of applications based on the cross-checking, wherein the degree of confidence assigned to assets where data of the first set of applications and the second set of applications are in agreement is higher than the degree of confidence assigned to assets where data of the first set of applications and the second set of applications are in conflict; determining relationships between at least some of the communication network hardware to at least some of the servers, and from at least some of the servers to at least some of the applications, and from at least some of the applications to at least some of the human resources, and from at least some of the applications to at least some of the services using the inventory of servers, the inventory of network components, the master inventory of applications, the inventory of people, and the inventory of services; creating a map of the relationships to graphically illustrate the relationships; and storing the map of the relationships on a computer readable storage medium. - View Dependent Claims (16, 17, 18, 19)
-
Specification