摘要:
Disclosed is a computer-implemented method, system and computer program(s) for migration of a source machine instance to a target machine instance of least one heterogeneous virtual server device managed within a cloud computing environment. The method includes discovering machine images of a cloud service provider and storing results in a computer-readable catalog containing cloud metadata comprised of machine image identifiers and information discovered about the machine images. The method further includes, in response to a request for migration document in a computer-readable form that comprises a specification of a required migration target machine instance, specifying weight/priority information for components to be included in the target machine instance, where the weight information indicates weights for operations comprising component installation, component removal and component upgrade in the target machine instance. The method also includes executing a best fit matching algorithm to examine the catalog in accordance with the weight/priority information to identify optimal machine images to be used for the migration of the source machine instance to the target machine instance.
摘要:
A system and method for reducing service latency includes dividing an information technology service for a customer into an infrastructure management service and a data management service. Data associated with the information technology service is stored in a backup memory. A set of infrastructure images related to the information technology service is stored at a cloud service provider. The infrastructure images are updated with software updates and hardware updates, as needed, and the data associated with the information technology service is updated through backup and restore mechanisms. The set of infrastructure images that have been updated with data with latest updates are started for recovery, continuity, testing, etc.
摘要:
A system and method for reducing service latency includes dividing an information technology service for a customer into an infrastructure management service and a data management service. Data associated with the information technology service is stored in a backup memory. A set of infrastructure images related to the information technology service is stored at a cloud service provider. The infrastructure images are updated with software updates and hardware updates, as needed, and the data associated with the information technology service is updated through backup and restore mechanisms. The set of infrastructure images that have been updated with data with latest updates are started for recovery, continuity, testing, etc.
摘要:
Disclosed is a method, system and a computer program for correlating an incident service ticket with an incident resource ticket. The method includes, in response to a creation of an incident service ticket in a certain service category; searching with a data processor for open incident resource tickets of the same or similar category; searching with the data processor based on a set of similarity rules for corresponding critical configuration items defined in business service configuration items and, if both searches succeed, searching with the data processor found incident resource tickets ordered by time using found critical configuration items and, if a match is found, declaring the incident service ticket to be correlated with the matching incident resource ticket. The exemplary embodiments further provide that, if both searches do not succeed, or if a match is not found, obtaining input from a dependency tree for the business service configuration items and if no related service configuration items for the service category are identified then concluding the performance of the method, otherwise searching with the data processor found incident resource tickets ordered by time using found related service configuration items. If no associated resource tickets are available then the method performs constraint adaptive probing of resources determined from the dependency tree to attempt to generate at least one corresponding resource ticket, and to search on any corresponding resource tickets that are generated for related configuration items.
摘要:
A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.
摘要:
A method for configuring multiple lifecycles, and associating each lifecycle with one or more subcategories of items includes receiving a request for a state change for an item in a current state; determining if the item's current state exists in the located lifecycle; wherein if the current state does not exist in the located lifecycle, the current state is updated with a series of update rules; determining if the current state has flags; wherein the flags are checked for one or more protection rules; generating a list of target states; receiving a user selected target state from the generated list; checking the selected target state for one or more associated protection rules; recording a state change for the selected target state in response to the satisfaction of the one or more associated protection rules, and if no protection rules are found; and propagating the state change.
摘要:
Methods, apparatus and computer program products decompose a service process into service process operations; filter the service operations based on at least one pre-determined criterion; identify at least one different service process operation to be used to replace an existing service process operation; and replace the existing service process operation with the at least one different service process operation. The service process can be decomposed using specific service features derived from reference service processes. The pre-determined criterion used to filter the service operations can constitute a service level; a service category; or a service process feature. A service process feature describes core functionality of the service.
摘要:
A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.
摘要:
A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered.
摘要:
A method for facilitating compliance testing in an environment is provided. The method includes defining each component as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for components against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the components that failed to meet respective ones of the selected Configuration Standards.