A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://www.ibm.com/think/topics/configuration-management below:

What Is Configuration Management? | IBM

What is configuration management (CM)?

Configuration management is a systems engineering process that helps businesses maintain the performance quality and functionality of a given product, system or other IT asset throughout its lifecycle.

Tailored configuration management (CM) practices enable system administrators to track the state of assets (like computer systems, servers and applications) so that teams can quickly identify issues, effectively manage change control and prevent configuration drift and unnecessary downtime.

The discipline started in the U.S. military—namely the Department of Defense—which sought to increase the lifespan of its hardware equipment without sacrificing performance over time. The military eventually created the 480 series, a set of governing standards for maintaining technical equipment, which evolved into the ANSI–EIA–649 (the National Consensus Standard for Configuration Management) in 1998.

The primary goal of CM is to control the evolution of complex systems and create vigilant record-keeping processes that streamline and accelerate IT asset management. CM practices ensure that a system's design, implementation and operational information are always in sync, facilitating efficient version management and preventing the system instabilities that can occur with untracked modifications. In other words, CM ensures that IT assets remain in their desired state, regardless of how they evolve over time.

Keep your head in the cloud 


Get the weekly Think Newsletter for expert guidance on optimizing multicloud settings in the AI era.

How does the configuration management process work?

CM processes are driven by management tools that allow IT administrators to build a workstation or server with specific settings and then apply those settings to other assets. Used in concert with IT service management (as defined by the ITIL), CM requires teams to monitor the state of a system in real time to identify aberrant behavior and/or opportunities for patches, updates or upgrades.

Specifically, CM involves the following key processes:

Configuration identification

Configuration identification is the process of determining the attributes that define every aspect of a configuration item (CI) at any point in time. It also includes pivotal decisions about configuration items (the software or infrastructure initiative, module or API the team will monitor and control), identifiers (the unique serial or version number or other tracking mechanism for each CI) and baselines (typically, the configuration of a working production environment).

Configuration change control

Configuration change control, also called configuration control, is a strategy for handling changes systematically so that asset integrity remains consistent across its lifespan. It typically involves several stabilizing practices, including submitting change proposals, evaluating each proposal’s cost and benefits, getting the requisite approvals from authorizing parties, and implementing and documenting changes.

Configuration status accounting (CSA)

 CSA involves documenting all configuration identification details (e.g., location, version, current status) and change details (date, responsible party, description of modifications). The process also includes generating regular status and historical records for stakeholders, verifying all records for accuracy and creating an accessible audit trail.

Configuration audits

Configuration auditing is the formal process of assessing how well CI and CM practices conform to the established standards and baselines, including identifying and resolving anomalies. Auditing might entail evaluation of physical attributes, functional attributes or both.

Configuration management plan

A CMP outlines the specific CM practices, procedures and schedules designated for a particular project or organization. It usually includes information about related processes, as well as complete details on CM scope and objectives, CM activities, roles and responsibilities, baseline management, team training procedures and any tools the team will use to support the process.

What are configuration management tools? 

Configuration management tools—from open-source programs like Ansible, Jira, Puppet, SaltStack and CFEngine to proprietary solutions like IBM AIOps Insights—help system administrators minimize the complexity of CM by automating most of its associated processes. CM tools can manage code versions, track system changes and automate the building and deployment processes.

They enable teams to change base configurations from a central location; categorize and manage CIs by group/subgroup; automate CI identification, updates and patches; install new settings across groups; and locate outdated or underperforming configurations.

CM tools include technologies like:

Configuration management benefits

Effective configuration management is essential for optimizing IT automation within a business. It helps teams make informed decisions about changes to their IT infrastructure and assets, and it facilitates clear communication among stakeholders by prioritizing clear, constant documentation of system states throughout the lifecycle.

In DevOps environments, CM enables IT administrators to further automate infrastructure management and deployment processes. In agile environments, CM helps teams more easily access and triage configuration tasks to streamline project management practices. And in CI/CD environments, CM tools automate modifications so that teams can immediately deploy approved code and configuration changes to live systems.

CM also offers significant benefits for quality control and risk management across a gamut of industries, from software development and healthcare to manufacturing and IT service management (ITSM). And it has myriad use cases for a range of IT environments, including: 

Security automation

CM tools can apply policies consistently across a network and configure intrusion detection systems and firewalls automatically.

Edge automation

CM tools can set up and manage remote infrastructure systems, like IoT assets, server equipment and network and security protocols.

Network automation

CM tools can configure network devices, like routers, automatically.

Configuration management best practices

The sheer volume of data CM programs generate can add complexity to any organization’s IT asset management process. Therefore, optimizing the benefits of CM programs and tools requires adequate planning, resources and personnel training. To maximize the effectiveness of configuration management systems, teams can: 


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4