EP2537126A2 - Verfahren, computerprogram-produkt sowie computerlesbares speichermedium zur generischen erstellung eines strukturbaums zur beschreibung eines it-verfahrens - Google Patents
Verfahren, computerprogram-produkt sowie computerlesbares speichermedium zur generischen erstellung eines strukturbaums zur beschreibung eines it-verfahrensInfo
- Publication number
- EP2537126A2 EP2537126A2 EP11702941A EP11702941A EP2537126A2 EP 2537126 A2 EP2537126 A2 EP 2537126A2 EP 11702941 A EP11702941 A EP 11702941A EP 11702941 A EP11702941 A EP 11702941A EP 2537126 A2 EP2537126 A2 EP 2537126A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- elements
- child
- server
- relations
- tree
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
Definitions
- the invention relates to a method, a computer program product and a computer-readable storage medium for the generic creation of a structure tree for describing an IT process with a complete environment of clients, computer program product and computer-readable storage medium for generically creating a structure tree.
- Servers, middleware components, applications and network components that an end user needs to complete a specific IT-enabled business process.
- An IT process is the completely installed, interconnected, and possibly activated environment, consisting of clients, servers, middleware components, applications, and network components that an end user needs to complete a specific, IT-enabled business process.
- the invention provides an overall treatment of an IT process. This concerns
- the description for the IT process installation follows the sequence Root Node - IT Method - Server - Middleware - Application.
- the servers are first installed.
- the middleware e.g. a JEE application server is installed, and then the actual customer-specific application is installed on it.
- CDM Common Data Model
- a CDM essentially consists of data definitions that are organized in a logical model and stored in a predefined way in a database. This allows resource instances to be identified and information about the instances and their relationships to each other managed.
- Business and infrastructure processes can be related to the IT systems that deliver the service based on the CDM.
- the data For example, they are grouped into groups that are subdivided into physical units, network, administration, storage, etc.
- the organization takes place hierarchically through object classes and their instances.
- the hierarchy starts with a root element that contains the abstract classes from which the logical and physical classes are derived.
- Subclasses inherit the abstract properties of their parent parent classes.
- the instances of the classes ultimately represent the resources.
- the instances are assigned attributes that are specified for the associated class. Instances can still have relationships with each other. Any relationship between two resource instances obeys given definitions, depending on the nature of the relationship. In general, there can be many different relationships between the same classes and their instances.
- Each instance represented in a CDM has a name and a label associated with it, and each name is assigned a unique name using specific naming rules.
- a technical server name is formed by linking the following information:
- the object of the present invention is to provide a method for the generic creation of a structure tree for describing the topology of an IT method with which it is possible to collect and manage all the information required for the overall handling of an IT process in a defined structure that all processes relevant to the management of an IT process can be drawn from a data source and automated.
- the method according to the invention has the goal of optimally supporting the collation of all technical parameters of IT processes in such a way that the basic information for the commercial processing of the ordering process, the installation of the IT process, the monitoring of the provided IT process and the scheduling new releases can be made homogeneously from a uniform data structure.
- the description of an IT process is made in a predefined order in such a way that already acquired information is retained.
- a device which comprises a storage medium on which a program is stored, which can be read by a data processing system and enables the data processing system to collect all information required for the overall handling of an IT process in a defined structure and so that all automatable processes relevant to the management of an IT process are automatically performed by the data processing system.
- FIG. 1 shows a representation of the allowed parent-child relationships on the basis of an acyclically directed graph.
- the parent element Parent (1) has 2 children, namely Child 1 (2) and Child 2 (3).
- Child 2 (3) is also Child of Child 1 (2). It is not permissible to create the parent element Parent (1) as a child (or even child) of its child element Child 2 (3) (5), otherwise a loop would be created.
- FIG. 2 shows how the names are uniquely formed in unique and non-unique elements.
- label means the proper name of the element.
- the overall name is formed from the proper name and the name of the superordinate elements.
- FIG. 3 is shown in FIG. 2 and shows a representation of a reference (10) on an element (9).
- FIG. 5 shows an illustration of details in the structure tree of an IT method (17) using the example of the IP addresses (19, 21, 24, 28) and IP services / IP ports (20, 22, 25, 26, 29 ).
- Fig. 6 shows the modeling of a data connection by a secondary relation (13).
- the sender entity (30) sends data to the IP address 172.12.13.15 (38), port 80 (39) of the recipient entity (37).
- the data connection is described as a secondary relation (13) since only an existing destination port can be addressed and this port only exists if the receiver instance also exists.
- FIG. 7 is derived from FIG. 6 and shows the designation of a data connection by means of a separate element (42). This is e.g. needed to describe data connections with DNS name resolution.
- Fig. 8 is derived from Fig. 7 and shows a plurality of transmitters (43, 48) transmitting via a DNS connection (42) to a plurality of receivers (53, 58).
- the named data connection is assigned to a plurality of parent objects (36) which have been grouped as data transmitters within different transmitter instances (43, 48).
- the DNS service itself is not shown here.
- Fig. 9 shows the modeling of network services affecting a data link.
- the data services shown here by way of example of a firewall rule (64) and a loadbalancing rule (66) are created as child elements of a named data connection (42) and linked to the elements of the associated physical components (63, 65) via secondary relations (13).
- Fig. 10 shows how grouping elements are inserted.
- the grouping elements for the two IT process groups (68, 74), the two releases (70, 71) of the IT process 1 (69) and the two installation strands A (72) and the release 1 .1 (70) belonging to B (73) are shown here hexagonal.
- FIG. 11 shows the representation of an IT method (77) with two releases (78, 79), in which the middleware instances (81, 82) have been designed differently.
- An Apache (82) is installed on a server (80) used in Release 1 (78) and Release 2 (79). In Release 2 (79), however, the Apache 2 (81) will be installed as another Apache on this server. If the server (80), as shown in Figure 1 1, unique models, is not, or only about additional relations between the middleware instance and the release or attributes representable that Apache 2 (81) only for release 2 (79 ) belongs.
- FIG. 12 shows the combination solution according to the invention of the problem set out in the description of FIG. 11.
- the server is modeled non-unique in the two releases (83, 84) to illustrate the IT procedural context. It is then linked to the unique modeled physical server (89), which is unique in the enterprise, in the platform tree (88) by secondary relation (13).
- FIG. 13 shows a diagram of how, when the process steps for providing an IT process are carried out, the information required for the complete installation of the IT process is provided successively.
- the information to be described is listed on the left, the respective information provider at the top. Hatched areas indicate missing information, in black areas the information is complete.
- FIG. 14 shows how, by means of a value-source mechanism in the acquisition of new elements, the choices for names and / or attributes are restricted on the basis of the information already present in the structure tree above the element.
- FIG. 15 shows which differences are detected when comparing two exemplary releases (78, 79). Changes are shown in bold, such as the removal of the group INet (99) with the parent and child relations (98), the addition of the element Apache Webserver2 (87) with the relation (100) and the change of the attribute type of "Solaris9""SolarislO" in element Serverl (96, 97).
- FIG. 16 shows by way of example how substructure trees are exported.
- the substructure tree of the illustrated sender instance (30) is detected up to its end element "Named data connection" (42) and then linked via a secondary relation to the receiver instance (I P -port, 39)
- I P -port 39
- the export of the tree from the child element here I P-Port, 39
- the export now contains all the information needed to model the data connection, and the information of the destination IP address (38) and the recipient instance (37) missing without this upward export is now available available in the export.
- FIG. 17 shows how both the IT process installation and the monitoring of the IT process access the same data record, but represent different structure trees.
- the representation of the structure tree for the monitoring (right) is inverted (note the positioning of elements 18 and 101). Both trees may contain additional grouping elements that are not relevant to the conversion, and may need to be added by other means (elements 78 and 102).
- FIG. 18 shows by way of example how a cluster of type a (eg Veritas) is represented. Veritas is installed here on 2 servers (107, 108) and then provides a stand-alone operating system instance (1 04) for the procedures.
- Veritas is installed here on 2 servers (107, 108) and then provides a stand-alone operating system instance (1 04) for the procedures.
- FIG. 19 shows the exemplary representation of a type b cluster.
- the data sender (sender instance 1, 43 and analog sender instance 2 48) responds to a DNS farm address (109).
- the DNS load balancing service (not shown here - the network equipment in which the DNS address 109 is resolved) optionally returns the IP address 172.12.13.14 (54) or 172.12.1 3.1 5 (59) as the destination. This alternately addresses the receiver instances 1 (53) and 2 (58).
- FIG. 20 shows how the example clusters from FIGS. 19 and 20 are mapped onto the monitoring structure tree.
- the elements (104), (1 10), (1 1 1) for the monitoring are translated into the parent element "cluster" (1 14) these cluster elements (1 1 5) / (1 16) are elements (107) / (108) and (53) / (58), respectively, whereas in the operating system cluster this information can be derived immediately from the installation structure tree, In the case of the two other types of load balancing, this information must be determined indirectly by evaluating the data connections (109) or (36).
- FIG. 21 shows the modeling of element-specific monitoring using the example of a web server (1 1 7).
- FIG. 22 shows by way of example how the respective application parts (101) of an IT process can be assigned to the business processes (102) of a user, which can then be monitored with end-to-end monitoring tools (123).
- FIG 23 shows how the IT process is planned, inter alia, with the required quantities and qualities of the servers (124, 126, 129) with the help of the substructure tree "IT process" (77) ) the assignment to the exact physical instances takes place (133, 134).
- Figure 24 shows a simple IT method that provides two middleware components (Apache 140 and JBOSS 141) linked (148) to one another on a virtual server (KVA1 -206v, 138). The virtual server is assigned to a physical server (RZ1 -471 1 .linux, 154) via a secondary relation (13).
- FIG. 25 shows the IT method from FIG. 24, which was expanded by the database Oracle DB-KVA1 (161).
- the terminal group (159) i. the user of the IT procedure, represented as a client of the type OSS terminal group.
- the secondary relations (13) here show the data connections from the terminal (159) to the web server (140), from the web server (140) to the application server JBOSS (141), from the application server (141) to the database (161).
- Figure 26 shows how two different client groups (Internet 159, Extranet 165) access a Web server farm (140) via the DNS address www.kva1.com (233). The load balancing is controlled by the DNS service.
- the parameters required for this purpose are stored as attributes in the DNS data connection (233).
- the DNS name is responsible for the IT process and is unique worldwide. Therefore, the DNS name is unique and the primary child of the IT process environment (137).
- the data connections (147) use this name via secondary relations (13), here the relations between the elements (147) and (233).
- FIG. 27 shows the use of the information of the structure tree in several target systems.
- Data structure for the offer definition (172), the asset definition (173), the quality assurance (174), the determination, ranking and parameterization of the installation tasks (175) are provided from the structure tree of the IT process description shown on the left (172 to 178). , object-specific monitoring (176), service-oriented monitoring (177) and IT governance (178).
- the data are prepared accordingly (shown here at 179, 181, 182, 184, possibly also other cases) and the appropriate data users (186, 187, 180, 188, 189, 190, 191, 183, 192, 185) posed.
- FIG. 28 illustrates how various tools cooperate to provide overall treatment of an IT process based on the tree of structure.
- the structure tree itself is held in different clients (195), which are the basis for the entry process or the installation process.
- the circular elements (21 9 to 223) each denote an analysis component of the structure tree.
- the target systems or users (196) that process the information from the structure tree.
- FIG. 29 shows by way of example what a template for a technical IT process description may look like (left) and how it is used to model an IT process (right).
- the template for the configuration of an Apache web server on a Linux server (236, with child elements 237 to 242, 139, 147) used here comprises the basic representations of all elements required from the IT process view, starting with the Linux server ( 237), through the IT procedure installation base (139) (file systems, groups, rights) to the middleware Apache (239) and all data connectivity (238, 240, 241, 242, 147).
- the attributes for the individual elements are pre-assigned with values, e.g. with the current version numbers of the Linux operating system and the Apache web server.
- the template can be used for each of the two Apache web servers (246, 252).
- the template is transferred in each case by means of the Smart Copy mechanism (243) in the IT process description under the IT process environment production (245).
- FIG. 30 shows how a reference architecture (260, with associated child elements) uses performance elements of a service catalog (235, with associated child elements) and technical solutions (254, with associated child elements) as the description basis.
- the reference architecture (260, with associated child elements) is then available as an independent copy template for the modeling of an IT process description shown on the right. At the top left, the template known from FIG.
- the performance elements from the Apache server on Linux service catalog (236 with associated child elements) are merged together with the information server elements from the technical solutions area (255 with associated child elements) in a reference architecture (261 with associated child elements).
- both the reference architecture and other individual elements from the service catalog or from the technical solutions can be used.
- any combination of reference architectures, service catalogs, technical solutions, and other elements e.g., 253 and 272
- any combination of reference architectures, service catalogs, technical solutions, and other elements would be conceivable.
- both the previously described reference architecture (261, with associated child elements) and another Apache on Linux (Apache on Linux) are shown. 2, 252 with associated child elements) has been inserted; in addition, other elements became an OSS_Server virtual; z / OS Host (253) and the spec docu system (272).
- the invention is based on a suitable modeling of the IT process from which all information relevant to the IT process can be displayed and processed automatically. For this it is necessary that the information self-consistent and clearly modeled. Furthermore, it must be ruled out that hidden loops can occur when the information is automatically processed. Since the modeling should already be available in the run-up to the realization of the IT process, the modeling takes place generically. This also has the advantage that even changes in the IT process topology can be handled without having to wait for concrete implementations of the elements.
- the method according to the invention as claimed in claim 1 provides a method for generically creating a structure tree for describing the topology of an IT method. It models the complete environment of clients, servers, middleware components, applications, and network components that an end user needs to complete a specific IT-enabled business process.
- the elements of the metamodel correspond to the components of the IT process.
- Each of the elements used in the structure tree is assigned a metaelement type in the meta-model.
- the meta-model describes which element types are allowed.
- the element types include all common generic IT components, such as server, middleware, storage, etc. Furthermore, it is determined which attributes are permitted and / or required for the element types and which relations with their associated attributes are allowed between the elements.
- Loop freedom is achieved by using an acyclic directed graph as the meta-structure.
- An acyclic directed graph starts at a root element under which all elements in parent-child relationships (4) are arranged.
- Kindelemia (2, 3) arrange themselves under their respective parent elements (1).
- the child elements may themselves be parent elements (2) of further child elements (3), but with the restriction that they may not have child elements which in turn belong to their own parent elements (5, see Figure 1). Since the formal structure of the meta-structure prevents the element elements from being assigned to a parent element even when the elements are created. can be net, which in turn are already created as their parent element, unwanted loops can not even arise.
- the inventive method further ensures that a child element only ever has a relation with his / her parent element (s). You can not create a second relation between the same elements in an existing relation between parent element and child element.
- this restriction prevents the same server from being added to a server cluster twice.
- Each of the elements contained in the structure tree can be specified with attributes.
- Suitable parameters for finetuning components depend on many and sometimes also on technical parameters. This detailed knowledge is irrelevant for an initial installation of an IT process.
- a database for an IT process can be set up using simple commands such as CREATE TABLE, INSERT, ....
- the 500 special alparameter for configuring the database are irrelevant during the initial installation.
- the information contained in a structure tree of an IT process is further processed for the overall treatment of an IT process.
- the recorded structure tree can be used in a variety of ways. There are always similar steps that can be summarized in special components.
- IT process description (visualized in tree view or graphically as a generically generated architectural image)
- FIG. 27 An overview of the target systems is provided by FIG. 27.
- the commercial target systems (186, 187) use the information by means of a converter (179) in the bidding phase.
- the elements modeled in a structure tree are provided with article numbers and prices.
- the offer management can be controlled until the conclusion of the contract.
- Asset Management and Capacity Management This supports, for example, the assignment of servers or storage in the IT process.
- Asset management is the asset management of an IT process. There each element is assigned its unique ID. In addition, it manages contact information for customers, contract IDs, and the like. In addition, asset management builds on capacity management, in which the total existing and the occupied or still available resources are managed in terms of volume. Asset management uses the structure turbaum (170) Information about how many resources should be allocated.
- complex checking routines (181) can access the prepared data (174) in order to carry out more complex checks which go beyond the contexts previously recorded in the structure tree (170).
- the information contained in the structure tree (170) is accessed in order to determine the installation tasks, to arrange them in an appropriate order (182) and to parameterize them suitably (175).
- the actual installation can be monitored by a workflow component (182).
- the individual installation tasks are either carried out automatically by suitable scripts (189), or work tasks are set in the change management (190), which are then to be carried out manually by the responsible operations managers.
- the installation status is transmitted to asset management (191) and capacity management.
- IT-process-specific monitoring tasks recorded in the tree in the individual monitoring systems (183) can be commissioned.
- the structure tree as described in claim 12 may be machine-turned (184) and then supplied to the service-oriented monitoring system (192). Both tasks also require interpretation of the information from the specification tree (170) to set up or configure the monitoring systems.
- extracts from the information acquired in the structure tree (170) can be transferred to the enterprise architecture management (185).
- the information supports planning, for example, by knowing the currently used version numbers for each IT process / environment for each element, or by providing all technical data relationships between different IT processes. This supports matching against known data relationships between IT procedures.
- Claim 2 describes an advantageous embodiment of claim 1.
- the uniqueness of the naming for the elements of the generic meta-structure is governed by unique and non-unique elements.
- Unique elements (6, 7) are those whose proper name (generally consisting of element type and element name) occurs exactly once in the context of topology.
- Non-unique elements (8, 9) receive their unique names in the topology only because, when the element is generated, their proper name is linked to the name of the parent element to form an overall name (see FIG. 2). The proper name of non-unique items does not need to be unique.
- the overall name for the non-unique elements of the platform group is formed by its proper name in association with the parent element by a primary relation defining the name. Because the overall name of the non-unique element must be unique, non-unique elements can never have more than one primary relation to a parent element. Accordingly, according to the invention, the formalism of the metastructure prevents the assignment of more than one primary relation to a non-unique child element.
- Data connections describe the data exchange between sender and receiver, e.g. based on an IP connection.
- the sender can only send data to a receiver if the receiver exists and is ready to receive.
- the data connection is therefore modeled as a secondary relation (13) (see Figure 6).
- a plurality of transmitters are combined by allowing a plurality of parent objects (36) to the named data connection (42) (see FIG.
- DNS-based "load balancing” ie the load distribution to multiple target systems by means of a distribution algorithm, eg round robin, in which the target systems are assigned in turn with transactions, there are several recipients (eg 60/55 or their parents 31)
- the over A DNS connection can be addressed, and the data connection in the meta-model is also advantageously modeled as a separate element.
- transparent services may influence the data or the data flow. For example, firewalls can prevent the accessibility of certain destinations, or load balancers can use their own algorithms to forward the data to different destinations.
- Net address translation (NAT) and port translation may also be such services.
- the engagement in a data connection is advantageously modeled in the meta-model as a child element (64, 66) to a named data connection (42).
- a firewall rule (64) can be attached to a named data connection as a child element.
- the firewall itself is modeled as an IT component (63), since the technical device itself is managed via IP connections (see Figure 9).
- IT component 63
- other synchronous and asynchronous data connections may also be described, e.g. Fiber Channel connections, file transfers and message queues.
- the structure trees can be structured in a clear and easy to maintain manner by applying groupings of elements (see Figure 10).
- grouping elements that also have attributes can be modeled using both unique and non-unique elements.
- a separate branch is created in the specification tree.
- Such substructures can also be used to model the IT process from different points of view. Using primary and / or secondary relations, the substructures can be interconnected.
- groupings can be modeled that associate the IT process (77) with a generic IT process group (76, eg all IT processes of a specific customer).
- the IT procedure (77) for its part, can be divided into individual releases (78, 79), and a platform group (88, also referred to as a platform tree), in which the physical components are shown concretely. This enables an efficient and flexible presentation of the information about the development of the IT-procedure over the different releases (see figure 1 1).
- claim 5 is described how the information shown in Figure 13, required to create the structure tree information is advantageously detected and used.
- the distribution, service management, release management, platform operations management, IT process management, etc. involve numerous different stations (roles, areas of responsibility) in the provision of an IT process.
- the modeling of the IT process of the present invention takes into account all these stations to provide a consistent and automatable basis for comprehensive management.
- the process for acquiring the information required for a complete installation of an IT process goes through the following steps:
- a service catalog (197) which describes the standardized power elements.
- the service catalog defines the performance elements, describes these performance elements in the sense of a product catalog, structurally describes these performance elements in the sense of the structure tree as a template and defines a price model for the purchase of benefits.
- Another option for including templates in the creation of a structure tree is when the software is designed using a standardized software
- Modeling language is created. This can be done for example in the known modeling language UML (Unified Modeling Language).
- UML Unified Modeling Language
- the information contained in the software modeling is used to create the rough structure of the structure tree. For example, as part of the design of an application, a UML
- Diagram (server components, 198). This diagram type provides information about the basic structure of an IT process. Here are the basic interconnections of the IT process included, possibly even first specifications regarding the versions to be used, such as an operating system or a web server "at least version xx" etc. This image also provides information, whether a certain software is cluster-aware or not.
- reference architectures and other technical solutions are also possible to use as copy templates for creating a structure tree of an IT process.
- Technical solutions are ultimately identical to service components of the service catalog, with the difference that there is no universal pricing model yet, but that the prices are agreed individually. From the perspective of the technical IT process description and its templates, there are therefore no changes.
- reference architectures should be made up of service catalogs or at least technical solutions.
- the reference architecture is offered as a template, which normally includes several performance elements and technical solutions. In principle, however, it also offers the possibility of supplementing other elements outside the definitions of the service catalog and the technical solutions.
- the cost-determining factors number, performance parameters and type of the power elements to be used are determined, e.g. Number of CPUs to be used, main memory, disk space, service and performance levels. This may be, for example, how many servers of which type (124, 126, 129), middleware, database and application instances, on which environment types (125, 130 or 127, 131), operating systems, etc. to which Price and under which conditions (eg service level, operating time, ...) should provide the service.
- an offer is created for the new environment to the end customer.
- service note items are assigned that relate to the service modules in the service catalog. Possibly. After several improvements, the contract is concluded.
- the IT procedure is recorded on the one hand in the commercial systems (225), and on the other hand, the entry for the automated IT process installation (214) has to be completed.
- the detection of the IT process including specializations such as groupings, e.g. for building installation groups and creating data connections within the IT process and their IT processes.
- the illustrated data connections describe the "useful data traffic" of the application.Server and other IT process elements are described non-unique in this illustration, since the correct description of a single release is the focus here.
- an IT process element is assigned to exactly one platform element after all assignments have been completed.
- Some of the assignments from the IT process elements to the platform elements can be directly accessed from other data sources. For example, the assignment of a server to its network switch. In these cases, the assignment can be automated.
- the physical sites to apply For distributed environments, ensure that the requirements are met from a business continuity point of view. Locations are chosen in terms of data relationships within and to / outside the IT process and the availability of resources and network areas.
- IT procedural IP addresses e.g. Alias addresses for web servers are independent of the I P addresses of the underlying servers.
- c. The host names of physical, logical, and virtual servers are set. If not already available, IP addresses for normal data traffic, backup and system management are assigned to the servers. d. The names of the middleware components and applications specified in step 2) are checked.
- Element-specific monitoring tasks can be defined for the individual elements, which are particularly important for monitoring the IT process. If these tasks are well structured, they can be described with a high degree of standardization so that the object-specific monitoring tools can be configured automatically.
- the capture process requires manual capture of information about the IT process in several places. The goal must be to be able to perform these surveys as error-free as possible and at the same time as uncomplicated and fast as possible. In the claims 6 and 7 aids are provided, which support the detection process in this sense.
- a further advantageous embodiment of the invention according to claim 7 contributes to the avoidance of errors in the detection of the information for the structure tree of the IT process.
- the label of the corresponding element in the selection can also be taken into account.
- API or web service instead of accessing a data table with the same search terms, a corresponding access to an API or a web service takes place. API or web service returns corresponding valid values in list form. This is advantageous, for example, in the dynamic determination of valid IP addresses for an element.
- Claim 8 describes how it is advantageous if already structured information about the IT method is available and should be automatically transferred to the meta-model.
- topologies or topology components of the IT process can be directly adopted from other data sources.
- the assignment of network components such as switches to servers in network management systems is maintained autarkic, or the assignment of virtual systems to servers is self-sufficient under control of its own management system.
- Such predetermined structures can often be exported from the management systems. After a little formatting, these structures can be imported directly into the meta model via bulk import (mass data import).
- the structure to be read in must refer to a unique node element below which the mass data structure is to be read.
- the elements, attributes, primary and secondary relations are created or deleted. Then the relations and meta types are checked for their validity. If the check reveals that at least one primary relation or at least one metatype is not valid, the entire import process is aborted.
- Claim 9 describes how already detected partial structures of the structure tree can be duplicated and inserted elsewhere in the structure tree. Frequently, multiple IT structures need to capture structures that are nearly identical. In most cases, only server names, IP addresses or one or two attributes change between these different substructures. Otherwise, these substructures are completely identical. In order to avoid having to create the acquisition from scratch again and again, a recorded structure can easily be duplicated using the Smart Copy / Smart Paste function and adapted as part of the duplication process.
- relations of parent elements which lie outside the cut tree can also be transferred (duplicated) to child elements of the copied subtree upon insertion onto the newly created child elements. This can affect both primary and secondary relations.
- Claim 10 describes how, in the meta-model according to the invention, the conditions are advantageously created to convert the structure tree into the monitoring structure tree.
- This business process is supported by one or more IT procedures.
- These IT processes are based on the IT process-specific application software, which is based on middleware components and servers is provided and the various persistence layers, eg database instances uses.
- the monitoring structure tree is thus mirrored below the IT process (FIGS. 17, 77) in relation to the installation structure tree.
- FIG. 18 On the left is the structure tree of the process installation, on the right the monitoring structure tree is shown. If clusters come into play, the conversion of the structure tree into the monitoring service tree is much more difficult.
- three functionalities first have to be distinguished from the installation point of view: a) The application software of the clustered element shown in FIG. 18 provides internally for a data comparison between the various technical application instances, which appear to the outside as one instance. This is e.g. to a Veritas cluster too. Outwardly, the Veritas cluster places an operating system instance, e.g.
- the primary server 100n (107) after a short takeover time, the secondary server 200n (108) takes over the provisioning of the operating system instance Serve OOc (104).
- the servers can be both logical and virtual servers. The servers must already be up before Veritas is installed. Therefore, the connection via secondary rela- tions (13).
- the monitoring tree is derived from the process tree.
- clusters For service-oriented monitoring, clusters require threshold values from which the failure of a number of these cluster elements defined by the threshold value is to be displayed in a service-oriented monitoring process and possibly evaluated as critical.
- the threshold values necessary for this are given as an attribute to the associated cluster group elements (Veritas cluster (104), DNS data connection (109) and local load balancing (1 1 1)), s. FIG. 20.
- monitoring tool (1 18) For the object-specific monitoring of individual elements (1 17) (eg operating system instances, middleware or database instances, every monitorable object), it is possible to define in the specification tree with which monitoring tool (1 18) these are monitored and, if necessary, with which monitoring tasks / Scripts (1 19, 120, 121). This is shown in FIG.
- the monitoring tool (1 18) is modeled here as a child element of the monitored element (1 7).
- Service-oriented monitoring can use this information to classify the events in order to present the events in the appropriate context.
- the individual elements "monitoring task x" (1 19, 120, 121) each comprise a machine-readable representation of the monitoring task and the description of the associated handling instruction or the associated troubleshooting script.
- turbaum directly integrates a monitoring event database, which is particularly helpful for IT-process-specific monitoring.
- Claim 11 describes how the generic tree trees can be adapted to also manage the enterprise-wide architecture control.
- the connections of the IT processes are required from the perspective of the business processes (102).
- the business processes (102) are provided by one or more IT processes.
- the existing technical dependencies between the IT procedures and within the IT procedures are therefore relevant.
- the structure tree for the IT process installation can provide substantial contributions in two directions:
- the structure tree can advantageously also be supplemented for the automated IT process installation in such a way that the respective application parts within the IT processes are assigned to the business processes (102) of the customer.
- This may provide a basis for establishing end-to-end active monitoring (123) or functional monitoring systems, see Figure 22. Both the end-to-end active
- Monitoring tools (1 23) as well as the technical monitoring systems can be assigned monitoring tasks and instructions or solution scripts (1 19, 120, 121).
- Claim 12 describes a method with which parts of a structure tree can be exported into a data format that supports the representation.
- archived structured data Such a file format is formed, for example, by the Extensible Markup Language (XML).
- XML Extensible Markup Language
- the purely downstream export does not include all the information needed to install an IT process. This is e.g. when modeling a data connection.
- the export from "sender instance” (30) contains all information up to the destination port (here "80 http", 39).
- the information is missing as to which IP address (38) and to which receiver instance (37) this port belongs.
- Claim 13 describes a method for planning and implementing an upgrade for an IT method using structure trees applied according to the invention.
- upgrading an IT process it usually does not make sense to completely dismantle the old release and then completely rebuild the new release. For this reason, it is desirable to determine the differences between two planning statuses of releases, or the differences between two subtrees.
- the comparison is made according to claim 13, by first exporting the structure tree of the existing release in a file format that supports the presentation of hierarchically structured data, eg in XML. This subtree will be referred to below with subtree A. Then the structure tree of the planned release is created and also exported to a file format that supports the display of hierarchically structured data.
- the structure tree of the planned release will be referred to below as subtree B.
- the data are structured in uniform formats, they can be compared automatically, ie with the aid of a data processing system.
- the results of the comparison are also output in a structured form, whereby one or more files are created (see Figure 15).
- Trees are compared by renaming the root element of sub-tree A to the label of sub-tree B before the comparison. This leads to corresponding temporary name changes of the non-unique child elements and child children of the root element of sub-tree A. These name changes can be detected and be treated accordingly in the comparison, so that by means of the method according to the invention information can be obtained in a comparable manner about the differences between two similar trees.
- a machine-readable storage medium for example a CD-ROM, DVD, etc. is set up so that the data stored thereon can be read out by machine so as to interact with a programmable computer system so that the computer system at least one of the in the Claims 1 to 13 mentioned processes.
- a computer program product is created with program code stored on a machine-readable carrier.
- This computer program product can run on a computer so that at least one of the methods mentioned in claims 1 to 13 is executed on the computer.
- a user wants to use an IT process from his PC via the Internet.
- the building blocks should consist of a well-structured, database-based service catalog, e.g. taken from the product catalog of the provider of IT operations for an IT procedure.
- the data of these templates should be machine readable.
- an operating system instance (18) may be reachable from a plurality of I P addresses (19, 21) or may provide multiple IP services (20), (22) (see Figure 5).
- an Apache web server (140) should be used as the web server
- a JBOSS JEE application server (141) should be used as the application server (148) that the Apache web server can send data to the ajp port (150 above) of the JBOSS JEE application server.
- the software application (142) is to run on the JBOSS JEE application server (141) (see Figure 24).
- the OSS server KVA1 -206v (138) is used as a virtual IT process server containing web and application server.
- the IT process should be installed automatically and integrated into the company-wide architecture control of the user. Furthermore, reporting on the availability of the IT procedure and its elements as well as service-oriented monitoring and incident management of the IT procedure should be ensured to the user without any additional effort. In addition, the provider wants to settle the services without further administrative overhead.
- the virtual OSS server belongs to the element type Server, the web and application server to the element type Middleware and the software application to the element type Application.
- the attributes permitted or required for the respective element types are used to record and manage the information relevant to the installation and maintenance of the IT process. In addition, additional information can be created.
- a structure tree is now created to describe the topology of the IT process, which is based on an acyclically directed graph as the meta-structure.
- the structure tree starts with a root element. All elements of the IT process are now hierarchically arranged in parent-child relationships under the root element.
- the formalism of the meta-structure prevents a child element from being assigned to a parent element, which elements are already created as their parent element. As a result, unwanted loops can not arise at all (see FIG. 1).
- the central element is a service catalog that describes the standardized performance elements.
- the service catalog defines the service elements.
- the Apache server in this example is a web server of certain types, based on a Linux server (OSS process server) with defined file systems.
- these performance elements are described literally in the sense of a product catalog and structurally in the sense of the structure tree as a template.
- the service catalog contains a price model for the purchase of benefits.
- the servers are pre-modeled in the template from the service catalog based on the Linux server.
- the OSS virtual process server (138) is the parent of the IT policy installation base (139) through a primary relation, thus the basis for its installability.
- the IT procedure installation base (139) defines a file and rights structure in which the other IT process components (here the Apache web server (140) and the JBOSS JEE application server (141)) are installed.
- the middleware components running on the IT procedure installation base are created via primary relations as their child elements.
- FIG. 29 only shows how a template for the Apache-on-Linux configuration is transferred to the modeling of an IT method.
- the template for the configuration of an Apache Web server and a JBOSS application server on a Linux server (237) used here includes all elements required from the IT process view, beginning with the Linux server (237), via the IT procedure installation base (file systems , Groups, rights) (139) to the two middlewares Apache (239) and the JBOSS (not shown in FIG. 29) and all data-related connectivities (240, 241, 242, 147, again without JBOSS components).
- the attributes for the individual elements are pre-assigned with values, eg with the current version numbers of the Linux operating system and the middleware server.
- the template is then transferred to the IT process descriptions (right in Figure 29) using the smart copy mechanism (243).
- the Smart Copy process can not delete or add items. All relations are retained within the copied subtree. Elements that are only connected via secondary relations in the template structure can not be edited, as there is only one referencing relation to these elements.
- the template "Apache-and-JBOSS-on-a-Linux-Server" is used once as part of the IT process description, resulting in the structure tree of Figure 24.
- some of the default values are replaced manually, for example replaced the Ipid 172.xyz of the Apache server with 172.1 7.75.87 (144).
- attributes can also be changed during the copying process.
- the template used is a UML diagram that is developed as part of the development of a new application for the IT process.
- UML modeling language
- This UML diagram (198) is converted so that it can be used as a template (208) for the IT process description according to the invention.
- This template contains information about which types of items are used in the IT process and how they are linked together through installation prerequisites and data connections.
- the structure tree shown in FIG. 24 results below the root element "root”, the structure tree shown in FIG. 24 results.
- the parent GRP elements (135-137) of the IT process description are initially created. They serve to structure the IT processes of customer A.
- the IT process considered here is specified more precisely by the subordinate elements customer process A1 (136). Associated with this is the GRP environment production (137). This is followed by the already mentioned IT process servers.
- GRP Area Data Center Production 152
- the IT platforms that can be used by the IT procedures are listed. These physical components are associated with the virtual components from the IT process description.
- an operating system instance i.e., a virtual server
- information on the required performance class (CPU power, main memory, ...) as well as safety information (e.g., site / fire section, ...) is needed. This information must then also be taken into account when assigning it to a physical server, as well as when assigning the I P addresses.
- the virtual OSS server must therefore be described by these attributes.
- the IT procedure installation base (139) defines a file and rights structure in which the other IT process components (here the Apache web server (140) and the JBOSS JEE application server (141)) are installed.
- Typical attributes for this IT process installation base are:
- IP service When requesting the IP address and also for subsequent decisions (for example with firewall rules), it must be clear in which network segment and which VPN the IP address is needed. In addition, server-side often several network cards are available. Here you may want to specify via which of these interfaces the IP address should be routed.
- the IP service must clearly define which IP service (name, e.g., http, https, ajp, ...) is assigned to which port or port, and whether the ports are to be created for UDP or TCP.
- the structure tree of the IT process is created, it is then passed to the commercial analysis method (Kfm, 219) according to FIG. 28, which determines the required article numbers of the service catalog (1 97) from this information (224) and then provides a first price information for created the customer.
- the commercial treatment could already be done, if not all technical details are known. For the commercial treatment, it is irrelevant, for example, whether the IP address 172.12.13.14 is awarded, because it may be sufficient to know that an IP address is even requested, and even this information may be obsolete commercially.
- the analysis method "QS-commercial” (200) checks whether valid article numbers could be determined and whether more complex dependencies (eg if element A is ordered with a high service level, then B must also be ordered with a high service level) in the sense of warnings, if there are serious differences between the old and the future new contract, eg price increase over 10%
- the system planning (and possibly also the release management) are supported by the analysis method "System Planning” (220).
- Capacity Management is supported with the analysis method "System Planning" (220). After the planning has been completed, the planned IT process description is initially quality-assured.
- the analysis method "Install” (221) determines the installation tasks and allows them to be executed. The execution is either automated by means of suitable installation scripts (227) or by the creation of change requests to the change management (228). All these tasks are under the control of Install (221).
- the analysis method "Mon” (222) updates the monitoring jobs for the object-specific monitoring systems (231) of the platform (Unix monitoring, web server monitoring, application monitoring, etc.) as well as for central business service monitoring (230), in which the Alarm messages from the different object-specific monitoring systems are correlated with each other.
- the analysis method "Gov” transfers information from the Installed client (218) to Enterprise Architecture Management (232), such as information about the components used and their versions, and information about the technical data relationships in the IT procedures.
- a given IT method is extended to include a separate database server (160) and a client (159). This is shown in FIG.
- the terminals are not modeled individually. However, in order to be able to create firewall rules automatically, the groups must be displayed on terminals in the IT procedure.
- a client who accesses the IT process via the Internet. Via attributes, this client (type OSS terminal group) receives the information about which VPN it is accessing.
- the database is initially modeled exactly like any other middleware component.
- a virtual server (160) is modeled on which an IT server Process installation base (139) for the database (161) is created (ie file systems, groups and rights).
- the database (161) is then created on this IT procedure installation base.
- the database receives some additional information about attributes that are important for the installation of the database, such as the database version, the character set, the SID, information on the sizes of the required file systems and the backup process.
- Additional child elements for the database instance can be used to describe additional patches or software options to be applied.
- the creation of tablespaces can also be described in this way.
- Database clusters such as For example, Oracle dataguard is described by inserting it as a parent element above the Oracle instances.
- FIG. 26 illustrates how two different client groups (159, 165) use the DNS service (233) to address a farm of web servers.
- the clients address the DNS address www.kva 1.com.
- the DNS service resolves this address and alternately outputs the IP addresses and ports of the two Web servers (ie 172.17.75.87 (234) or 172.17.75.88 (166) with port 80j as the destination address one or the other address will result from the selected load balancing procedure, most of which will be round-robin
- the load balancing procedure will be indicated as an attribute at the DNS address
- the DNS address ⁇ www.kva 1.com) is the responsibility of the IT process operations manager.
- This DNS address is modeled unique. She is the primary child of the IT process environment (1 37). This DNS address is used by defining it as a secondary child of one or more data connections (147) and in turn receiving the destination ports (146) as a secondary child.
- An Apache (82) is installed on a server (80) used in Release 1 (78) and Release 2 (79). Now in release 2 (79) another Apache (Apache2, 81) will be installed on this server (80).
- the server was modeled in a unique way, it could only be expressed via the tree via additional attributes or links that the Apache2 (81) is only valid in Release 2 (79) (see Figure 1 1).
- apache (85) is relevant in release 1 (78) and apache (86) and apache2 (87) in release 2 (79).
- the server (83, or 84) receives in this variant its name (not the label) with respect to the parent element release. In this representation, however, one loses the information that the servers (83 and 84) in Release 1 (78) and Release 2 (79) are identical. The label is the same, but not the name.
- the server is modeled twice: In the so-called process tree (left in Figure 12, below the process group (76)) he models non-unique (83 or 84). In the platform tree (on the right in FIG. 12, below the platform group (88)) it is modeled uniquely (89). The relationship between these server descriptions is established via a secondary relation (13), s. FIG. 12. In this combination solution, the platform tree is made available directly via import mechanisms. The recording of the process tree and the link to the elements in the structure tree is done manually in the context of commissioning the acquisition of operations.
- Another example describes how the information from the specification tree is used for automated IT process installation.
- all information in a suitable format eg. B. exported in XML (or provided in an API) and passed an installation machine.
- the installation machine determines the complete installation parameters for each element from the tree and determines the installation order of the elements.
- the installation parameters for each element are found by the automaton in the attributes of the IT Procedural elements, as well as in the attributes of his parents and child elements, and possibly also in the attributes of the parent or child elements of one of his child elements. Element-specific configurations and tuning parameters are accessible via references to other data sources. Possibly. In this step, the differences between the existing and future release status of the IT process environment are also determined, so that only the changes need to be installed.
- determining the installation tasks (175) e.g. determined that a Linux server, an Apache web server, an application server and a database should be installed.
- the algorithm in this example determines that the database has already been properly installed in a previous release, so this installation task can be skipped.
- the sequence of tasks sequentializes the installation tasks and puts them in an appropriate sequence.
- the underlying Linux server is first installed before the Apache web server is installed.
- a suitable parameter set must be transferred to the installation scripts. Also this is detected out of the tree.
- the actual installation is monitored by a workflow component.
- the individual installation tasks are either carried out by means of suitable scripts, or work tasks are set in change management, which are then to be carried out manually by the responsible operations managers.
- the installation status is transmitted to Asset Management and Capacity Management.
- excerpts from the information collected in the structure tree can also be transferred to Enterprise Architecture Management (178).
- the information supports the planning, for example, by knowing the currently used version numbers for each IT process / environment for each element, or by providing all technical data relationships between different IT processes. This supports the comparison against known data relationships between the IT procedures.
- information will be returned to the Financial Management (229), which will report on the Provision of IT process and start of service informed. Thus, then can be started with the settlement of benefits.
- FIG. 29 shows by way of example what a template for a technical IT process description may look like (left) and how it is used to model an IT process (right).
- the template for the configuration of an Apache web server on a Linux server (236, with child elements 237 to 242, 139, 147) used here comprises the basic representations of all elements required from the IT process view, beginning with the Linux server (237). , on the IT procedure installation base (139) (file systems, groups, rights) to the middleware Apache (239) and all data connectivity (238, 240, 241, 242, 147).
- the attributes for the individual elements are pre-assigned with values, e.g. with the current version numbers of the Linux operating system and the Apache web server.
- the template can be used for each of the two Apache web servers (246, 252).
- the template is transferred in each case by means of the Smart Copy mechanism (243) in the IT process description under the IT process environment production (245).
- IP address 172.a.b.c (240) is replaced from the basic representation of the Apache server (239) in the template after the smartcopy operation in the description of the apache (140) in the IT method by 172.17.75.87 (249).
- attributes can also be changed during the copying process.
- FIG. 30 shows how a reference architecture (260, with associated child elements) uses performance elements of a service catalog (235, with associated child elements) and technical solutions (254, with associated child elements) as the description basis.
- the reference architecture (260, with associated child elements) then stands as a separate copy template for the modeling of an IT process description shown on the right is available.
- the template known from FIG. 29 for the configuration of an Apache web server is shown on a Linux server.
- the bottom left is a template from the field of technical solutions, in which an information server (258) is created on an OSS Windows server (256). On the information server (258), a documentation system (259) and all data-related connectivities (240, 241, 242, 147) are created as application.
- the performance elements from the Apache server on Linux service catalog (236 with associated child elements) are merged together with the information server elements from the technical solutions area (255 with associated child elements) in a reference architecture (261 with associated child elements).
- both the reference architecture and other individual elements from the service catalog or from the technical solutions can be used.
- any combination of reference architectures, service elements from the service catalog, technical solutions and other elements eg 253 and 272 would be conceivable.
- both the previously described reference architecture (261, with associated child elements) and another Apache on Linux (Apache on Linux) are shown. 2, 252 with associated child elements) has been inserted; in addition, other elements became an OSS_Server virtual; z / OS Host (253) and the spec docu system (272).
- JBOSS Middleware JBOSS Application Server
- IP Address 1 33. IP port 1
- Apache Webserver 1 label: Apachel
- Veritas cluster operating system instance Serverl 00c
- Server 1 (Server 1 00n)
- 1 1 7 element to be monitored e.g. a web server instance
- Monitoring tool e.g. Nagios
- Plan Server 1 (#CPU, Memory #GB, Service Level, ...)
- Plan Server 2 (#CPU, Memory #GB, Service Level, ...)
- Plan Server 3 (#CPU, Memory #GB, Service Level, ...) 130.
- Middleware 2
- GRP area templates service catalog 236.
- GRP Template Linux Apache on Linux
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102010007967A DE102010007967A1 (de) | 2010-02-15 | 2010-02-15 | Verfahren, Computerprogramm-Produkt sowie computerlesbares Speichermedium zur generischen Erstellung eines Strukturbaums zur Beschreibung eines IT-Verfahrens |
PCT/EP2011/000501 WO2011098231A2 (de) | 2010-02-15 | 2011-02-03 | Verfahren, computerprogram-produkt sowie computerlesbares speichermedium zur generischen erstellung eines strukturbaums zur beschreibung eines it-verfahrens |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2537126A2 true EP2537126A2 (de) | 2012-12-26 |
Family
ID=43857726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11702941A Ceased EP2537126A2 (de) | 2010-02-15 | 2011-02-03 | Verfahren, computerprogram-produkt sowie computerlesbares speichermedium zur generischen erstellung eines strukturbaums zur beschreibung eines it-verfahrens |
Country Status (5)
Country | Link |
---|---|
US (1) | US20120317050A1 (de) |
EP (1) | EP2537126A2 (de) |
CA (1) | CA2789393A1 (de) |
DE (1) | DE102010007967A1 (de) |
WO (1) | WO2011098231A2 (de) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10585766B2 (en) * | 2011-06-06 | 2020-03-10 | Microsoft Technology Licensing, Llc | Automatic configuration of a recovery service |
DE102013006949A1 (de) | 2013-04-23 | 2014-10-23 | Db Systel Gmbh | Verfahren zur Gewährleistung der Funktionsfähigkeit eines technischen Systems im Hinblick auf dessen Konfiguration im Rahmen einer Installation bzw. Beseitigung von Komponenten |
DE202013003793U1 (de) | 2013-04-23 | 2013-05-08 | Db Systel Gmbh | Datenträger mit darauf gespeicherten Daten sowie eine Daten repräsentierende Signalfolge zur Gewährleistung der Funktionsfähigkeit eines technischen Systems im Hinblick auf dessen Konfiguration im Rahmen einer Installation bzw. Beseitigung von Komponenten |
US11074529B2 (en) | 2015-12-04 | 2021-07-27 | International Business Machines Corporation | Predicting event types and time intervals for projects |
US11120460B2 (en) | 2015-12-21 | 2021-09-14 | International Business Machines Corporation | Effectiveness of service complexity configurations in top-down complex services design |
US10929872B2 (en) | 2016-06-24 | 2021-02-23 | International Business Machines Corporation | Augmenting missing values in historical or market data for deals |
US10248974B2 (en) | 2016-06-24 | 2019-04-02 | International Business Machines Corporation | Assessing probability of winning an in-flight deal for different price points |
US10902446B2 (en) | 2016-06-24 | 2021-01-26 | International Business Machines Corporation | Top-down pricing of a complex service deal |
US10922089B2 (en) * | 2016-09-22 | 2021-02-16 | Groupon, Inc. | Mobile service applications |
US10673787B2 (en) * | 2017-10-03 | 2020-06-02 | Servicenow, Inc. | Virtual agent conversation service |
US11182833B2 (en) | 2018-01-02 | 2021-11-23 | International Business Machines Corporation | Estimating annual cost reduction when pricing information technology (IT) service deals |
US10755324B2 (en) | 2018-01-02 | 2020-08-25 | International Business Machines Corporation | Selecting peer deals for information technology (IT) service deals |
CN110955551B (zh) * | 2019-11-26 | 2023-05-26 | 上海新炬网络技术有限公司 | 一种基于tomcat中间件的故障智能诊断装置 |
CN112860850B (zh) * | 2021-01-21 | 2022-08-30 | 平安科技(深圳)有限公司 | 人机交互方法、装置、设备及存储介质 |
US20230057746A1 (en) * | 2021-08-21 | 2023-02-23 | UiPath, Inc. | User constrained process mining |
CN113673966B (zh) * | 2021-09-03 | 2024-03-08 | 卡奥斯数字科技(青岛)有限公司 | 信息安全建设方案生成方法、装置、电子设备及存储介质 |
CN115187181B (zh) * | 2022-09-14 | 2023-08-08 | 深圳星网信通科技股份有限公司 | 物资管理方法、服务器及其存储介质 |
CN117931133A (zh) * | 2022-10-12 | 2024-04-26 | 北京航天长征科技信息研究所 | 一种基于bom的科技信息服务建模方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050102665A1 (en) * | 2003-11-10 | 2005-05-12 | International Business Machines (Ibm) Corporation | Automatic parallel non-dependent component deployment |
US20070169109A1 (en) * | 2003-11-21 | 2007-07-19 | Peter Neswal | Method for the installation and configuration of software components |
US20070220509A1 (en) * | 2006-02-24 | 2007-09-20 | International Business Machines Corporation | System and method for deploying software based on matching provisioning requirements and capabilities |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606817B2 (en) * | 2006-08-02 | 2009-10-20 | Entity Labs, Ltd. | Primenet data management system |
US20090172674A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing the computer collection of information in an information technology environment |
US20090171731A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Use of graphs in managing computing environments |
US8880682B2 (en) * | 2009-10-06 | 2014-11-04 | Emc Corporation | Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations |
US8743121B2 (en) * | 2009-12-23 | 2014-06-03 | Bmc Software, Inc. | Smart impact views |
US8539018B2 (en) * | 2010-11-04 | 2013-09-17 | International Business Machines Corporation | Analysis of IT resource performance to business organization |
-
2010
- 2010-02-15 DE DE102010007967A patent/DE102010007967A1/de not_active Ceased
-
2011
- 2011-02-03 WO PCT/EP2011/000501 patent/WO2011098231A2/de active Application Filing
- 2011-02-03 US US13/577,726 patent/US20120317050A1/en not_active Abandoned
- 2011-02-03 CA CA2789393A patent/CA2789393A1/en not_active Abandoned
- 2011-02-03 EP EP11702941A patent/EP2537126A2/de not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050102665A1 (en) * | 2003-11-10 | 2005-05-12 | International Business Machines (Ibm) Corporation | Automatic parallel non-dependent component deployment |
US20070169109A1 (en) * | 2003-11-21 | 2007-07-19 | Peter Neswal | Method for the installation and configuration of software components |
US20070220509A1 (en) * | 2006-02-24 | 2007-09-20 | International Business Machines Corporation | System and method for deploying software based on matching provisioning requirements and capabilities |
Non-Patent Citations (1)
Title |
---|
See also references of WO2011098231A2 * |
Also Published As
Publication number | Publication date |
---|---|
US20120317050A1 (en) | 2012-12-13 |
CA2789393A1 (en) | 2011-08-18 |
WO2011098231A9 (de) | 2013-02-07 |
DE102010007967A1 (de) | 2011-08-18 |
WO2011098231A2 (de) | 2011-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2537126A2 (de) | Verfahren, computerprogram-produkt sowie computerlesbares speichermedium zur generischen erstellung eines strukturbaums zur beschreibung eines it-verfahrens | |
KR101891506B1 (ko) | 하나 이상의 클라우드 시스템 상에 애플리케이션들을 이식 가능하게 배치하기 위한 방법들 및 시스템들 | |
US7941398B2 (en) | Autopropagation of business intelligence metadata | |
DE60133648T2 (de) | System und verfahren zum führen von laufzeitdaten in einem server-netzwerk | |
DE112020004623T5 (de) | Ml-basierte ereignishandhabung | |
DE112010003144T5 (de) | Erweiterbare Grundstruktur zur Unterstützung verschiedener Einsatzarchitekturen | |
DE102006023974B4 (de) | System und Verfahren für maßgeschneiderte Anwendungsbestellung und Installation für Informationsverarbeitungssysteme | |
DE112011105186T5 (de) | Graphdatenbanken zum Speichern mehrdimensionaler Modelle von Software-Angeboten | |
DE112011103522T5 (de) | Erstellung eines Multidimensionalen Modells von Software-Angeboten | |
WO2015044374A1 (de) | Verfahren und einrichtung zur automatisierten erzeugung und bereitstellung wenigstens einer softwareanwendung | |
DE102018129366A1 (de) | System zur Verarbeitung und Speicherung von archivierungspflichtigen Daten | |
DE102012210064A1 (de) | Verwalten von aus Geschäftsobjekten erzeugten Ereignissen | |
EP2620868A1 (de) | Arbeitsfluss-Management-System für Computernetze | |
WO2021037378A1 (de) | Verfahren zum automatischen markieren, cluster-arbeitsknoten, cluster, netzwerk, computerprogramm und computerlesbares medium | |
WO2020002030A1 (de) | Verfahren und system zur bestimmung eines geeigneten installationsortes für eine zu installierende applikation in einer verteilten netzwerkumgebung | |
DE102013108306A1 (de) | Verfahren und System zur Synchronisation von Daten | |
WO2014173505A1 (de) | Verfahren zur gewährleistung der funktionsfähigkeit eines technischen systems im hinblick auf dessen konfiguration im rahmen einer installation bzw. beseitigung von komponenten | |
WO2014169938A1 (de) | Verfahren und system zur synchronisation von programmmasken | |
DE202013003793U1 (de) | Datenträger mit darauf gespeicherten Daten sowie eine Daten repräsentierende Signalfolge zur Gewährleistung der Funktionsfähigkeit eines technischen Systems im Hinblick auf dessen Konfiguration im Rahmen einer Installation bzw. Beseitigung von Komponenten | |
EP2927811B1 (de) | Verfahren zur Steuerung eines automatisierten Ablaufs | |
DE102006037968B4 (de) | Universelle und erweiterbare Datenverwaltung mit Beobachtungs- und Interprozesskommunikations-Mechanismen | |
DE112022004035T5 (de) | Verteilter Einsatz von Softwareanwendungen zur Prozessautomatisierung | |
EP2178267B1 (de) | Verfahren zur Ausführung von Diensten in einem dezentralen Datennetz | |
WO2017157386A1 (de) | Computersystem und verfahren zum betreiben eines computersystems | |
EP3783449A1 (de) | Allokation von geräten einer technischen anlage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
R17D | Deferred search report published (corrected) |
Effective date: 20130207 |
|
17P | Request for examination filed |
Effective date: 20130807 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20140506 |
|
APBK | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNE |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20200618 |