© 2010 IBM Corporation ® Provisioning Network Services in ITNCM.

Slides:



Advertisements
Similar presentations
How We Manage SaaS Infrastructure Knowledge Track
Advertisements

ICIS-NPDES Plugin Design Preview Webinar ICIS-NPDES Full Batch OpenNode2 Plugin Project Presented by Bill Rensmith Windsor Solutions, Inc. 3/15/2012.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Moving Data Lesson 23. Skills Matrix Moving Data When populating tables by inserting data, you will discover that data can come from various sources.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Data Synchronisation in Shoper 9 January 2010.
CCMDB 7.2.
T-FLEX DOCs PLM, Document and Workflow Management.
Troubleshooting.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Form Handling, Validation and Functions. Form Handling Forms are a graphical user interfaces (GUIs) that enables the interaction between users and servers.
© 2012 IBM Corporation Tivoli Workload Automation Informatica Power Center.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
ViciDocs for BPO Companies Creating Info repositories from documents.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
Module 10 Configuring and Managing Storage Technologies.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Hands-On Microsoft Windows Server 2008
WINDOWS SERVICES. Introduction You often need programs that run continuously in the background Examples: – servers –Print spooler You often need.
Configuration Management and Server Administration Mohan Bang Endeca Server.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 12.
1 PHP and MySQL. 2 Topics  Querying Data with PHP  User-Driven Querying  Writing Data with PHP and MySQL PHP and MySQL.
JavaScript, Fourth Edition
Module 7: Fundamentals of Administering Windows Server 2008.
Service Transition & Planning Service Validation & Testing
Chapter 8 Cookies And Security JavaScript, Third Edition.
Event Management & ITIL V3
IT 456 Seminar 5 Dr Jeffrey A Robinson. Overview of Course Week 1 – Introduction Week 2 – Installation of SQL and management Tools Week 3 - Creating and.
Computer Emergency Notification System (CENS)
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
© 2006 IBM Corporation Agile Planning Web UI. © 2006 IBM Corporation Agenda  Overview of APT Web UI  Current Issues  Required Infrastructure  API.
Windows Role-Based Access Control Longhorn Update
What's New in Kinetic Calendar 2.0 Jack Boespflug Kinetic Data.
Software Project Management
Copyright © 2012 UNICOM Systems, Inc. Confidential Information z/Ware Product Overview illustro Systems International A Division of UNICOM Global.
Overview of the Automated Build & Deployment Process Johnita Beasley Tuesday, April 29, 2008.
Jini Architecture Introduction System Overview An Example.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ICM – API Server & Forms Gary Ratcliffe.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
Hyperion Artifact Life Cycle Management Agenda  Overview  Demo  Tips & Tricks  Takeaways  Queries.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Interactions & Automations
Cognos 8 BI Configuration, Administration, and Upgrade Cognos 8 BI.
UNICOS LHCLoggingDB Josef Hofer EN/ICE/SCD. Agenda The LHC Logging Database Purpose of the LHCLogging component Basic concepts Advanced concepts Logging.
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
Can you do this in SmarTeam?
 Cloud Computing technology basics Platform Evolution Advantages  Microsoft Windows Azure technology basics Windows Azure – A Lap around the platform.
Maintaining and Updating Windows Server 2008 Lesson 8.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 OS Management with TPM for OS Deployment.
SoftUpdate New features and management technique.
Doron Orbach UCMDB Product Manager
Managing, Storing, and Executing DTS Packages
Running a Forms Developer Application
Software Configuration Management
PLM, Document and Workflow Management
z/Ware 2.0 Technical Overview
Data Virtualization Tutorial… CORS and CIS
Advanced Integration and Deployment Techniques
ITAS Risk Reporting Integration to an ERP
Features Overview.
Presentation transcript:

© 2010 IBM Corporation ® Provisioning Network Services in ITNCM

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems ITNCM: Intelligent Tool for Network Operations & Compliance Device Discovery Discover network devices in the network or utilize ITNM or flat file loads. Synchronize Changes Update configuration repository with planned and un-planned configuration changes across the network Direct Device Access Including command filtering and full keystroke logging for audit purposes Security Role-based control of who accesses what devices and what changes they can make within the network, including full workflow approvals. Rollback or Restore Configuration Restore configuration with or without a device reboot SmartModel™, Command Set Groups & Native Command Sets Intelligently apply changes with full error control or with vendor native scripts OS Upgrade Support Automatically management the upgrade of a devices operating system Full Network Change & Policy Management Lifecycle Support Pre-emptive and Current State Policy Compliance 2 Backup Configuration Single instance repository for all configuration and change information Bulk Configuration Changes Automate bulk configuration changes through reusable command sets with full fallout management and error handling Key Product Features Open NSM REST API REST API enabling ITNCM to be integrated with existing customer systems e.g. network provisioning, Cloud Provisioning

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems Network Service Management ( NSM ) The Goals of NSM is to: Simplify the Creation, Modification and Deletion of Network Services on Network Devices Create Service Templates that can hide the complexity of the Service away from the Client User Allow for easy management of the Service Templates in terms of Creation, Modification, Deletion, Importing and Exporting. Create a robust and reproducible Network Configuration Service Solution Allow the features of ITNCM to be available through a simple REST Interface

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM Service Templates NSM Service Templates allow the Service Template Designer: To Dictate how NCM Artifacts such as Native & Smart Modelled CommandSets are called in a controlled and ordered manner. Allow access to the IT NCM Artifacts without the need to have in- depth ITNCM knowledge or Java Code experience, the Service Templates are simple XML Configuration Files, all the complexity to interface to ITNCM is hidden from the Service Template Designer by NSM. Introduce the ability to manipulate client provided parameter values and inject new parameters values as needed for the ITNCM Commandsets. Control the life Cycle of a Network Service and decide how the Service can be deleted.

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM Service LifeCycle Full Change History and Control 5 NSM Service LifeCycle Network Service Design Service Template Designer plans what type of Network Service is needed. Command Set Creation Service Template Designer Uses ITNCM Tools to create the necessary Command Sets to create and maintain the Network Service on the Devices Service Template Creation Service Template Designer Uses Service Template XML to design how the Service should be Exposed to the Client User. They also decide how the Command Sets Parameters should be calculated and in what order they should execute. Import Service Templates Service Template Designer Uses the NSM Commandline Tools to import the Service Tenplate Design XML files into the ITNCM database. Client Views new Service The Client User uses the NSM Service Template REST URI's to view the new Service being offered Client Requests new Service The Client Users can now request the NSM Service of their choice using the NSM Service REST URI's. NSM executes Service NSM executes the Service as dictated by the Service Template. NSM communicates with ITNCM to create the Workitems needed to complete the Service on the Network Devices. Client Checks for Service Status The Client Users can view Service execution status using the NSM Service URI's. The Client User can also check for specific the specific configuration changes using Extractions. c Service Removal Depending on how the Service Template was designed either the Client Users can request for a Service to be Deleted using the NSM REST API or the Service Designer can create a schedule for when the Service is removed

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM Parameter Calculation NCM Command Sets NCM Commandsets takes parameter Values as calculated by NSM Parameter Engine and executes these on the Network Devices. NSM Parameter Engine Client Parameters NSM can accept Parameter Name/Values from the Client to pass directly to Commandsets or they NSM can use them in the NSM Parameter Engine to calculate other parameters. SQL Parameters NSM can query external or internal databases to retrieve parameter values. The Arguments to the Query can be provided by the Client or can be injected by the Service Template designer JavaScript Parameters NSM allow the execution of both NSM provided JavaScripts Methods to manipulate Parameters and also allows the Service Template Designer to provide their own Controlled JavaScript. Http Parameters NSM allows the retrieval of parameters by calling a HttpClient using the URL supplied by the Service Template Designer

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM Service Template Tools ITNCM DevelopmentITNCM Production Export and Import Tools NSM provides a range of tools to Export Service Templates and Import to other Systems. Typical use of these tools would be to move Service Templates from Development to Production Systems once verified. Search Tools NSM provides tools to search for Service Template with a range of filters such as Name, Creation Date and Device Vendors that the Service Template Supports, Cloning Tools NSM provides tools to take an existing Service Template and Clone it, thus making it easier to create Service Templates that are similar to other Service Templates. CRUD Tools NSM provides a range of tools to easily Create, Update and Delete Services Templates.

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM Service Templates main elements Parameters – Decide how the Parameters are to be calculated ( Client Provided, SQL, HTTP Request, Inject JavaScript or Constant Implementations – Controls which operations will get called and how/which parameters get calculated based on the Devices Vendor- Type-Model-OS (VTMOS). The Designer can use regular expressions to allow one implementation to support multiple Devices. One Service Template can have many implementations. ServiceOperations – Operations can be classified as CREATE or DELETE. Depending on the Http Method used on the Service URI, NSM will run either execute the CREATE operations when HTTP POST is used, and execute the DELETE Operations when HTTP DELETE is used by the Client using the NSM REST API. Operations – Define which ITNCM Artifacts need to run and in which order they should execute. Operations types can be COMMANDSET, EXTRACTION or DEVICE SYNC

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems Service ServiceTemplate Device Realm NSM REST URI's Device URI's can be used for Device Inventory gathering. It is also possible to retrieve the devices current configuration Realm URI's for searching ITNCM realms which are used to organize ITNCM Artifacts by Geographic, Policy, Security or any Customer specific realms. ServiceTemplate URI's allow the NSM REST API Client user query the ITNCM system for available Services that can be executed on a device. Service URI's allow the NSM REST API Client user to create, monitor and delete the Network Services provided by the Service Templates.

IBM Software Group | Lotus software IBM Software Group | Tivoli Software | IBM Security Systems NSM war is installed with the NCM Presentation Servers on IT NCM 6.4 NCM DB Presentation Server1 Presentation Server2 NSM war Worker Servers

IBM Software Group | Tivoli Software | IBM Security Systems NSM Main Client URI's Http GET Http GET Http GET id}/device/{device-id} Http POST Http GET Http DELETE

IBM Software Group | Tivoli Software | IBM Security Systems NSM Service Template basic structure

IBM Software Group | Tivoli Software | IBM Security Systems NSM Service Template Parameters

IBM Software Group | Tivoli Software | IBM Security Systems Constant Parameters structure Static values for a NSM Service Template Designer to Use

IBM Software Group | Tivoli Software | IBM Security Systems Client Parameters structure Enables a Client to set values before service execution Used in the client submission for service execution Client data is set to the value element of the clientParameter

IBM Software Group | Tivoli Software | IBM Security Systems Client List Parameters structure Special case Client parameter. Allows client to specify a list of values before service execution Each value in the list is used once during execution Creates repeated operation execution where Operation uses the list Order is optional and indicates order in which values must be used and repeat operations must be executed Allows for variable repetition of the same command to be executed

IBM Software Group | Tivoli Software | IBM Security Systems Inject Parameters structure Enables parameters to be manipulated before service execution using a JavaScript Engine Pre supplied JavaScript functions including sum, subtract, multiply, divide, ifEquals, concat and string manipulations Allows template designer to supply there own JavaScript code, using the element (executed under white list conditions) Uses a white list to exclude certain functionality from being executed Result is set to the value element of the injectParameter

IBM Software Group | Tivoli Software | IBM Security Systems Http Parameters structure Enables parameters to be manipulated before service execution HTTP REST GET requests are executed at service execution time Result is set to the value element of the httpParameter

IBM Software Group | Tivoli Software | IBM Security Systems SQL Parameters structure Enables parameters to be manipulated before service execution SQL is executed against the Database Connection located in the selected implementation at service execution time Result is set to the value element of the sqlParameter Note The database password is encrypted when stored.

IBM Software Group | Tivoli Software | IBM Security Systems Operation structure Operations are located under implementation Operation name is a combination of Realm and CommandSet name

IBM Software Group | Tivoli Software | IBM Security Systems Rules structure Rules are used to select the correct implementation for the client to submit for service execution Rule has one type currently “DeviceType” DeviceType expects 4 properties Vendor, Type, Model and OS – VTMOS Rule can be specified using Regular Expressions

IBM Software Group | Tivoli Software | IBM Security Systems Client service submission example The structure of the service template for execution is expected to have at least the ID of the service template and the ID of the device to execute the service against. Optionally it may have a list of client parameters needed to ensure the proper execution of the service.

IBM Software Group | Tivoli Software | IBM Security Systems  Client POSTs ServiceTemplate XML for Service creation.Response contains Service with a new ID and state = SUBMITTED  Client uses GET /service/{service-id}/status to poll service state. Responses contains minimal service record with ID and latest state.  Client uses GET /service/{service-id} to retrieve full record with child workitem entries  Client uses GET /service/{service-id}/workitem/{workitem-id} to retrieve workitem data. Contains UOW Log and a task result (if present) Client service submission cont'd

IBM Software Group | Tivoli Software | IBM Security Systems Service Processing  After client submits the service, NSM begins processing received XML into an active Service instance  Processing covers –CommandSet or Extraction resolution from ITNCM data systems –NSM Parameter evaluation and subsequent application to UOW CommandSet data  If any part of initial processing fails Service fails and processing stops –Initial processing includes Resolution of device and operation targets (commandset, extraction) Runtime Parameter evaluation  Active instance produces the following in ITNCM –1 Service UOW –1 or more UOWs in ITNCM (UOW merging is used if possible by the underlying submission system)  Service UOW provides a log of Service activity in ITNCM Client  NSM receives UOW processing/state change events to trigger updates in Service status  NSM updates Service UOW Log as state changes happen  Service UOW state reflects the state of the NSM Service

IBM Software Group | Tivoli Software | IBM Security Systems Service Processing Flow NSM REST Client ITNCMService UOWs Work Queue Active Service List Managed Devices Service Status Updates Configuration data UOW Events Worker Server POST ServiceTemplate XML

IBM Software Group | Tivoli Software | IBM Security Systems Service Delete  ServiceTemplates provide 2 mutually exclusive mechanisms for handling deletion of Services they create –DELETE Service operation for cleanup/removal of service actions –Timed delete for transient Services  Delete mechanisms only apply to Services which were successful  Delete serviceOperation provides dedicated work execution block to be carried out in response to DELETE /service/{service-id} URI  Time To Delete specifies time in minutes after which a Service will be removed from the database  ServiceTemplate may only specify either of TTD or DELETE serviceOperation

IBM Software Group | Tivoli Software | IBM Security Systems Reference ID A Service can be Posted for execution in 2 ways The first is by using the URI shown next and supplying the client service template for service execution Http POST to The Second is by using the URI shown next and suppling the client service template for service execution and a client generated reference ID Http POST to id} The Client can now request the service by their own supplied reference ID ( e.g. CustomerService_12345 ) using the URI shown next Http GET to

IBM Software Group | Tivoli Software | IBM Security Systems Command Line Tool Commands: create - creates a service template by using information from an XML file Format: /nsmadmin.sh command=create filename= [username= password= ][port= ] Example: /nsmadmin.sh command=create filename=/opt/IBM/serviceTemplate1.xml read - gets information about the latest version of a service template and outputs it to an XML file Format: /nsmadmin.sh command=read filename= id= [username= password= ][port= ] Example: /nsmadmin.sh command=read filename=serviceTemplateOutput.xml id=4 list - lists the latest versions of all service templates in an XML file Format: /nsmadmin.sh command=list filename= [username= password= ][port= ] Example: /nsmadmin.sh command=list filename=serviceTemplateOutputList.xml update - creates a new version of a service template by updating information in an existing service template. Format: /nsmadmin.sh command=update id= filename= [username= password= ][port= ] Example: /nsmadmin.sh command=update id=19 filename=/opt/IBM/tivoli/netcool/ncm/bin/QAJavaST.xml purge, clone, exportall, exportid, exportname, exportvendor, exportdaterange, import and importlist are the other tools options available

IBM Software Group | Tivoli Software | IBM Security Systems Troubleshooting I  Discussed in NSM API Guide –Generally, when a request encounters an error, NSM returns a HTTP Status code along with a specific NSM Error code. –HTTP Code indicates protocol level processing outcome –NSM Error codes documented in the API Guide and indicate failure category within NSM –For Service processing errors, detailed information can be found in ITNCM Service UOW log in the client and appropriate errors in the ITNCM log file $NCMHOME/logs/Intelliden.log  Diagnostic tools –Service UOW Log in ITNCM Client for Services –Intelliden.log for general & REST operation debugging  Logs –Logging system uses ITNCM logging –CLI import tool logs

IBM Software Group | Tivoli Software | IBM Security Systems Troubleshooting II  Detailed diagnosis and problem location for Services –Identify Service ID and execute GET on nsm/service/{service-id} in a browser to retrieve Service record –Examine service record and note serviceWorkKey attribute of the Service and id attributes of the child workItems. –Open ITNCM Client and locate Service UOW with ID matching value of serviceWorkKey. Open the log of this entry for detailed processing information. Also, use workItem id attributes to identify and examine individual UOWs via the client. –Execute GET nsm/service/{service-id}/workitem/{workitem-id} to retrieve UOW log and status info for a service workItem (or use the ITNCM Client to view the UOW log) –Open Intelliden.log to look for NSM processing error information