IT Operations Management (ITOM)

What type of configuration items are you tracking?

What type of configuration items are you tracking?


Vivit-logoJPG.JPGI recently participated in a Vivit webinar, HP BSM - Panel Discussion: Customers Talk about Their Journey and Success with Eli Eyal of Playtech and Mark Laird of Steria. This series of posts will cover the questions we received from the audience.


What types of CIs [configuration items] are being tracked in your SHA systems? How do you define what the CIs are, and how are they tracked?


Eyal answered this question. 


“What we want to do with SHA (HP Service Health Analyzer) is not to monitor the host operating system metrics, we have monitoring for OS metrics and KPIs. For now, we are leaving them with static threshold, but we decided to actually go and turn the SHA into something more business-oriented, and to actually use the business CIs for our SHA. So we are adding from SiteScope we are collecting all information about our business, about our business usage, and we are in the gaming environment. We want to know how many players do we have, how many logins are in every five minutes, how many games are being played? And with SHA, using the metrics per service, per customer, this is a business-metric and business CI as well.


So we collect the information on the business CIs, and all the metrics on the business CIs, and with SHA we monitor the CIs as business. So if we have a problem with any of our customers, the business CI which has about ten metrics that is monitored simultaneously, if any of these metrics are out of their baseline, then we have knowledge about something that goes wrong with our customer and we actually know exactly which customer is having a problem.


Once we have this, we can also correlate it to other events that are coming in from our infrastructure, so we actually have an idea where it is, which customer is being impacted because we’re using the business CI and then from the events of infrastructure, we know exactly what is going on and where we want to search our problem.”


If it's not from the infrastructure, we know -- instantaneously, that there is a problem with our external vendors that we can’t monitor anyway, so we start with this.


So, the business CI are what we have in mind when we are monitoring with SHA and it actually brings us a lot of insight,  not only for monitoring but also for knowledge about our business and how it behaves. So a lot of our customers who actually see the business metrics that are being monitored by the BSM are excited to see not only the raw data that has been collected, but also about the knowledge of the baseline that they can actually know how their environment is working and what is expected out of it. So, we’re very excited to do our SHA monitoring on the business CIs.


Here are a few other blogs I encourage you to read if you are interested in learning more about this webinar:

·        Using HP BSM to address common pain points ·        Tips on improving a projected dashboard


Learn more about our Business Service Management suite here

  • operational intelligence
0 Kudos
About the Author