5-07Enabling Config Mgmt w Mercury Appl Mapping

APPLICATION MANAGEMENT
ENABLING CONFIGURATION MANAGEMENT
WITH MERCURY APPLICATION MAPPING
Whether providing services on the Internet or to internal customers,
using custom or packaged applications such as ERP or CRM, today’s IT
organizations are under increasing pressure to align themselves with
their company’s business processes. These processes are often
deployed across multiple global locations, traversing packaged, custom,
and legacy applications. With increasing business pressure to meet high
availability and performance requirements, and the increasing complexity
of the underlying systems that support these business processes, IT
organizations must be able to quickly isolate and resolve any problems
that may arise. In order to do so, they must maintain an accurate map of
the configuration of their environment. For most IT organizations this is a
difficult and time-consuming task. Mercury Application Mapping™ delivers
accurate, complete, automatically, and continuously updated application
maps that organizations can use for a broad range of configuration
management activities, including change management processes, data
center moves, geographic replication and disaster recovery, server
consolidation, business impact analysis, dependency impact analysis,
asset management, and policy compliance.
TABLE OF CONTENTS
Managing Rapid Growth and Constant Change …………………………………3
Customers Manage Change with Mercury Application Mapping Today ………9
The Nature of Today’s Business Applications ……………………………………4
Configuration and Change Management Processes ………………………9
Drawbacks of Manual Topology Maps ………………………………………5
Data Center Moves ……………………………………………………………10
Accurate, Automated, Up-To-Date Topology Maps …………………………5
Geographic Replication and Disaster Recovery……………………………10
Introducing Mercury Application Mapping ………………………………………6
Server Consolidation …………………………………………………………11
Automated Infrastructure Discovery …………………………………………6
Business Impact Analysis ……………………………………………………11
Mapping Infrastructure Elements to Applications ……………………………6
Dependency Impact Analysis …………………………………………………12
How it Works ……………………………………………………………………7
Asset Management ……………………………………………………………12
A Solid Foundation for Implementing Configuration Management
Best Practices ………………………………………………………………………9
Policy Compliance ……………………………………………………………13
Using Mercury Application Mapping in Your IT Organization …………………14
APPLICATION MANAGEMENT
Managing Rapid Growth and Constant Change
Managing today’s IT organizations is an exercise in managing rapid growth and constant change — and
the inevitable increase in complexity that both growth and change bring. Rapidly expanding IT
infrastructure brings a constant stream of new systems into high-end data center environments, at
rates up to 40-50 percent. Combine this with the churn generated by a three- to four-year technology
replacement cycle, and the overall number of new systems an IT environment in a given year easily tops
70 percent.
Now consider that business processes require the support of multiple applications, each of which use
multiple server, storage, software, and network resources that are sometimes distributed over multiple
geographic locations. Day-to-day operations require bringing new applications online, scaling and
upgrading existing ones, consolidating and relocating servers, and implementing disaster recovery plans
— all just to keep up with the increasing demand to achieve the best performance and throughput as
possible within budget constraints. It quickly becomes clear that IT organizations need help managing
the sheer volume of change in their environment.
IT organizations are also feeling the pinch of having to provide more and better services for less. Lineof-business (LOB) managers demand service-level agreements (SLAs) that provide greater performance
and availability levels. IT organizations have difficulty committing to and managing towards their SLAs
because of a lack of insight into the critical path between the applications they deliver and the
underlying infrastructure elements, or Configuration Items (CIs), such as servers, storage, and networks,
which support them.
Managing information technology silos separately leads to a lack of accountability as to what teams are
responsible for which components throughout the application lifecycle. Managing applications using
manually created application maps — if ever completed — is a complex, time-consuming, and errorprone process because maps are outdated sometimes moments after they are created. These methods
have long been known to be costly, ineffective, and inflexible — yet methods to manage new network
architectures are still evolving.
WWW.MERCURY.COM
3
APPLICATION MANAGEMENT
The Nature of Today’s Business Applications
Today’s complex business processes are often supported by multiple applications, and each application
tends to have a set of infrastructure elements — some unique, and some shared — supporting it (Figure
1). As the complexity and dynamic nature of IT infrastructure grows, management techniques must
increasingly be automated.
To help them cope with rapid growth, constant change, and the demand to deliver more for less, many
IT organizations are adopting IT service management frameworks, or best-practices methodologies, like
ITIL, that include configuration management as a key operational process. As the basis for these
methodologies, IT organizations must understand what applications and infrastructure elements support
which business processes, and the nature of their complex interdependencies. Anything less than
complete knowledge can result in lower performance and availability levels. This is because without
accurate application maps, IT organizations cannot easily work down from a business process problem
to the infrastructure element causing it. Likewise, an IT organization noticing a failed component cannot
easily work upward to determine which business processes are at risk.
Figure 1: Today’s business services are supported by multiple applications, each of which relies on a dynamic set of configuration items.
It is difficult to maintain up-to-date application maps in today’s data centers given that change — both
planned and unplanned — is the norm. Every day, administrators change network components, add or
remove servers from load-balanced service groups, consolidate multiple functions onto larger servers,
upgrade operating systems, patch applications, and add or remove disk devices from storage systems.
Then there are the unplanned changes. The server that was taken offline because of a memory failure.
The database table that ran out of space and an extra disk drive allocated to alleviate the crunch. The
WWW.MERCURY.COM
4
APPLICATION MANAGEMENT
spare server used to smooth a sudden spike in Web traffic. The 24-port network switch replaced with a
48-port switch when its power supply failed. All of these changes, planned and unplanned, affect
application maps every hour of every day.
Drawbacks of Manual Topology Maps
Configuration management methodologies require accurate, up-to-date topology maps, but many
organizations are left to create them manually, resulting in a cascading set of problems:
• Manual configuration maps are difficult to keep up-to-date.
• Out-of-date configuration maps lead to false assumptions.
• False assumptions regarding what infrastructure supports what application contribute to lower
application availability and increased Mean Time To Repair (MTTR) because IT staff is limited in its
ability to isolate problems.
• With incorrect configuration data, changes in the data center, including moves, configuration
changes, server upgrades, replacement, and consolidation, have unforeseen consequences that put
the company’s business at risk.
• With out-of-date application maps, implementing service management best practices can be difficult
or impossible. A simple process such as approving a change, making a change, and validating that
the change has been performed correctly is hard to implement when the very configuration map
used for validation is out-of-date.
Accurate, Automated, Up-To-Date Topology Maps
Application maps are a requirement for IT service management processes, but creating and maintaining
them remains a difficult task. Mercury Application Mapping, a powerful new configuration management
solution from Mercury, automatically provides complete and accurate insight into the dependencies
between infrastructure elements and the applications they support, helping to increase business
process performance and availability. Mercury Application Mapping allows IT personnel to determine the
impact that a change might have on their business processes by automatically analyzing “what-if”
scenarios. In addition, Mercury Application Mapping can tie a service interruption to a planned or
unplanned change by maintaining a change audit log and reporting on all changes taking place in a
given time. Mercury Application Mapping can help manage change in fast-paced data center
environments by dynamically auditing and updating application maps on a continuous basis. Used as a
standalone configuration management solution, IT organizations use Mercury Application Mapping to
support change management processes and for a host of configuration management functions
including business impact analysis, data center moves, geographic replication, disaster recover, server
consolidation, dependency impact analysis, asset management, and standards compliance.
WWW.MERCURY.COM
5
APPLICATION MANAGEMENT
Introducing Mercury Application Mapping
Mercury Application Mapping provides the foundation for a new generation of configuration
management solutions. Unlike manual techniques and agent-based tools, Mercury Application Mapping
continuously and automatically discovers and maps IT services to the underlying infrastructure
elements that support them. Mercury Application Mapping provides IT organizations with complete and
accurate topology maps that include elements that might not have been recognized as having a role in
a particular application, with the power to do so either with or without the use of agents. Indeed,
unexpected infrastructure elements are often the ones causing problems because they can be
overlooked as configurations are changed, and their failure isn’t otherwise linked to the applications
they support. Mercury Application Mapping eliminates this problem because all infrastructure elements
are automatically discovered and included in topology maps.
With up-to-date application maps, companies using Mercury Application Mapping can more closely
align their information technology with their business objectives by providing IT organizations with the
tools they need to manage rapid growth, constant change, and increasing complexity within a business
context. Mercury Application Mapping allows IT personnel to instantly drill down from a high-level
application problem to isolate the change responsible for causing a problem. The application maps that
it produces can support a wide range of configuration management processes, including creating
blueprints for disaster recovery, data center moves and consolidation, automatic verification of changes,
and day-to-day activities including infrastructure upgrades, changes, and server consolidation.
Automated Infrastructure Discovery
Unlike other network-oriented discovery tools, Mercury Application Mapping continuously explores
every configuration item from Layers 2-7 of the OSI model within a running production environment,
mapping the relationships between resources and the applications that they support. Mercury
Application Mapping accomplishes this either with or without the use of agents, depending on the
specific environment or mode of use. It locates resources, including:
• Java 2 Platform, Enterprise Edition (J2EE) components and interdependencies,
• Database components such as tablespaces, users, and jobs,
• Software assets such as installed products, patches,
• System resources such as servers, CPUs, memory, network interfaces, and storage devices, and
• Network devices such as routers, switches, and load balancers, switch ports, VLANs, and firewalls.
Mapping Infrastructure Elements to Applications
Once Mercury Application Mapping discovers infrastructure elements, it maps relationships and
dependencies between them, including network connectivity between servers and switches, logical
connectivity between network-based services, and internal relationships such as message queues and
inter-process communication mechanisms. The result is a highly accurate, comprehensive topology map
of applications and business services.
WWW.MERCURY.COM
6
APPLICATION MANAGEMENT
The key technology behind Mercury Application Mapping is its
Topology Query Language (TQL), an intuitive, drag-and-drop
mechanism for creating application or service definitions that
describe resources and applications that have been discovered.
Providing out-of-the-box intelligence, Mercury Application
Mapping includes predefined TQL templates for anything from
complete J2EE applications, Siebel, SAP, or Microsoft Exchange
environments, all the way down to single Oracle databases, and
IBM WebLogic or BEA servers. If a needed predefined template is
not available out-of-the-box, TQL’s drag-and-drop interface can
be used to create customized models that describe entire
applications. A custom description of a bond trading application
is illustrated in Figure 2.
Customers can use TQL application descriptions directly or
modify them to suit their own environments. Once constructed,
TQL definitions provide an automated mechanism for mapping
discovered resources to dynamic application models. The result
Figure 2: TQL allows application descriptions
to be built using fundamental components
provided with Mercury Application Mapping.
is an efficient, directed exploration of data center environments
even as they evolve and change.
How it Works
In a nutshell, Mercury Application Mapping uses a set of fundamental object models and TQL
descriptions of the environment to be explored. It discovers infrastructure elements according to the
object models, matches elements to TQL application descriptions, and provides discovered application
maps for use by higher-level tools (Figure 3):
CONFIGURATION
MANAGEMENT
DATA CENTER
CONSOLIDATION
SERVICE
LEVEL
BUSINESS
AVAILABILITY
POLICY
COMPLIANCE
IMPACT
ANALYSIS
END USER
MANAGEMENT
SYSTEM
AVAILABILITY
J2EE APPS
3-TIER APPS
EXCHANGE
SIEBEL
WEBLOGIC
NT
DB
TOPOLOGY QUERY LANGUAGE
CMDB
OPEN MODEL
DISCOVERY
APPLICATIONS
DESKTOPS
SWITCHES/ROUTERS
FILES
DATABASES
SERVERS
Figure 3: Mercury Application Mapping uses TQL models to drive the discovery process, storing results in a configuration database for
use by applications like Mercury Business Availability Center.
WWW.MERCURY.COM
7
APPLICATION MANAGEMENT
• At the lowest level, many common infrastructure elements are discovered using out-of-the-box
discovery patterns. Mercury Application Mapping uses more than 130 discovery patterns that span
levels 2-7 of the OSI model.
• Application templates are created using the drag-and-drop TQL interface using the basic object
models provided with the product. Additional application packages support the mapping of custom
and additional application classes.
• The discovery process efficiently explores the IT environment, locating all infrastructure elements (or
configuration items) described by the object models. The discovery process maps basic
infrastructure elements first, and successively spirals into each element to further discover its
attributes and interdependencies.
• Once the discovery process is complete, the infrastructure elements and their interdependencies are
pattern-matched against the TQL application descriptions to provide a complete and accurate map
of the application environment. An example of how the TQL description of the bond trading
application might yield multiple instances of the application is illustrated in Figure 4.
• The discovered topology is stored in a repository designed to support high-speed and high-volume
queries of object types, their attributes, and interrelationships. This repository is available to
applications that then integrate the application maps with external data to provide specific insights
into the IT environment. For example, application maps from two different times can be compared
and their differences highlighted.
Figure 4: Discovery using the bond application description yields a production, staging, and test instance of the application.
WWW.MERCURY.COM
8
APPLICATION MANAGEMENT
A Solid Foundation for Implementing Configuration Management Best Practices
Mercury Application Mapping provides a solid foundation for implementing best practices for
configuration and change management, data center moves, asset management, business impact
analysis, disaster recovery, and policy compliance. Because Mercury Application Mapping creates a
permanent record of all infrastructure elements and their relationships to the applications they support,
customers can use the historic record to automatically detect and manage change and its impact.
Mercury Application Mapping can support many best practices with its out-of-the-box capabilities.
Customers can also access the configuration management database directly, using it as the foundation
for their own tools that support their business practices. Mercury’s CMDB has an open architecture that
includes an Application Programming Interface (API), that allows customers to integrate its findings into
other applications both in batch mode and programmatically.
Customers Manage Change with Mercury Application Mapping Today
Mercury customers are using Mercury Application Mapping today to manage change in a number of
ways, including supporting configuration and change management processes, data center moves,
geographic replication and disaster recovery, server consolidation, business impact analysis,
dependency impact analysis, asset management, and policy compliance.
Configuration and Change Management Processes
Rapid rates of change and increasing architectural complexity has a direct impact on a company’s
ability to do business. Indeed, many IT organizations estimate that more than 90 percent of their
outages occur as the result of planned or unplanned changes. Planned changes can cause outages
because administrators don’t always know what business processes depend on their applications
before they make a change that they believe to be benign. Likewise, unplanned changes, such as a
failure to properly implement a planned change, can cause outages from the loss of a critical
application component.
Many IT organizations work to manage change with a change control board that meets on a periodic
basis to assess, approve, and communicate to staff regarding changes to applications. Without
complete visibility into the IT infrastructure, however, the board must make decisions based on
incomplete information, sometimes discovering after the fact that an approved change causes an
unexpected incompatibility.
With Mercury Application Mapping facilitating configuration and change management processes,
change control boards work with full knowledge of their IT infrastructure and its interdependencies.
With full, up-to-date knowledge, they can make more reasoned decisions on the impact of proposed
changes. They can better assess the impact of changes by using Mercury Application Mapping to help
answer “what if” questions. Change control boards can implement best practices of authorizing
changes, implementing them, and then compare configuration snapshots to verify that only the
authorized changes were made, and that they were made correctly. Mercury Application Mapping can
automatically detect and report changes as they are made, and it can produce a change log for later
audit and verification.
WWW.MERCURY.COM
9
APPLICATION MANAGEMENT
Application maps can improve communication within IT organizations. Database management teams
supporting a large number of databases can now easily see how each of their databases support
business-critical applications. Application teams can refer to application maps to see how their
applications support high-level business processes, and how they are interconnected into the whole IT
infrastructure. Better knowledge and better communication, helps to reduce the risk of change.
Data Center Moves
Data center moves are a fact of life for IT organizations, and the methodologies in use today have
advanced from moving a rack of equipment at a time to moving one application at a time. Manually
creating application maps is a time-consuming, error-prone process. It inevitably misses some key
assets, and even when created accurately, maps are out-of-date as soon is they have been created.
Complete knowledge of what infrastructure supports which applications can help IT organizations
better plan data center moves, reducing the risk and uncertainty of simply moving servers, storage, and
network components and hoping to plug them all back together in exactly the same way. Once
application maps are created, independent applications can be identified, and then moved one at a
time, reducing the risk inherent with rack-at-once or all-at-once move, as well as validating correctness
and compliance once the move has been completed.
Mercury Application Mapping’s discovery process reduces the resources and time required to identify
all infrastructure elements used by an application. Its ability to locate all resources in heterogeneous
environments results in a reliable, single repository of both assets and their relationships. This
information is useful before, during, and after the actual move.
Geographic Replication and Disaster Recovery
As companies realize the degree to which their business operations depend on their IT infrastructure, a
growing number are operating multiple, geographically distributed replicas of their applications. Using
one of many geographic load balancing or fail-over mechanisms, these companies help to ensure
continuous operation despite the failure of an entire data center or network connectivity. Likewise for
organizations stopping short of supporting multiple, continuously-operating sites, they know that they
must be prepared to reconstruct their entire infrastructure in the event of a long-term or permanent
loss of a data center. IT managers know that they need offsite backups of all software, switch, router,
and load balancer configurations, and customer data itself.
Whether a site is replicated for continuous operation or as insurance against a failure in the main data
center, manually created application maps are quickly out-of-date, often incomplete, and timeconsuming to produce in the first place. Once a data center is replicated, manual application maps
provide no automatic way to verify that the replication was completed accurately. Indeed, ongoing
manual audits of business continuance plans are costly and cumbersome, leaving many organizations
simply hoping that disaster never strikes.
Application maps created by Mercury Application Mapping can create accurate maps of existing
application infrastructure. These maps are first used during the replication process and later used once
WWW.MERCURY.COM
10
APPLICATION MANAGEMENT
the data center is replicated in order to verify correctness. Given that change is a constant in today’s
data centers, application maps can be continuously updated so that IT organizations can continuously
maintain the secondary data center as a faithful replica of the primary one.
Mercury Application Mapping’s automated discovery process locates not only all physical resources,
but also software resources including application and operating system versioning, patch levels, and
logical connectivity to other components, whether within the same server or across the network.
Server Consolidation
Consolidating multiple applications onto a single server, or consolidating multiple servers on a server
farm into one, is one technique that IT organizations use to fight the battle against cost and complexity.
Using a smaller number of more powerful servers results in fewer devices to manage, helping to
increase economies of scale and reduce administration costs. Consolidation onto larger, vertically
scaled servers helps to increase total availability while reducing total cost of ownership. With today’s
servers capable of hosting a large number of applications simultaneously, IT organizations need to ask
how their consolidation choices might affect other characteristics like overall application availability,
security, and performance. If, for example, server consolidation eliminates redundancy that is needed
for application availability, the cost savings of consolidation must be weighed against the reduction in
availability. Using complete, accurate application maps provided by Mercury Application Mapping, IT
organizations can more clearly assess the impact of changes before they make them.
Business Impact Analysis
IT organizations are typically tasked to deliver business services to their client organizations subject to
specific SLAs, yet with few tools to help them manage at the business level. In order to identify the
impact that a planned change might have, as well as detect the impact of a change that has already
been made, IT organizations need some way to understand the relationships between the configuration
items and the business processes they support. Unfortunately, most IT organizations attempt to manage
their applications and higher-level business processes by managing the network elements that support
them. If a server runs out of memory, a database management system delivers poor performance, or a
network switch begins to fail, network management systems begin to show alerts that often propagate
across many different infrastructure elements, creating a storm of red alerts that obscure the source of
the problem. The difficulty of problem isolation is compounded by the fact that without understanding
the business impact of a problem, network engineers typically attend to each problem with the same
priority. Indeed, in such an environment it’s easy to lose sight of which problems are affecting a lowpriority backup or development system, and which ones are affecting the company’s ability to do
business.
Some network management systems provide dashboard views that relate systems to applications, but
they do so based on maps that require many months to create and constant updates to stay current. In
contrast, Mercury Application Mapping can automatically integrate the status of infrastructure elements
to dynamic application maps, giving instant insight into how a problem affects higher-level functions. It
can help to eliminate alert floods and help focus IT staff on isolating the problem rather than being
WWW.MERCURY.COM
11
APPLICATION MANAGEMENT
distracted by extraneous alerts. Instead of giving each problem the same priority, operators can focus
on the failures affecting business operations first. This approach helps to increase utilization of valuable
IT staff members while reducing the cost of down time by placing the focus on the right problems.
Dependency Impact Analysis
Just as business impact analysis displays real-time information on how business processes are affected
by infrastructure elements, dependency impact analysis enables organizations to explore the business
impact of hypothetical failures. With the power to ask “what if” questions and instantly see the impact of
a failure, IT organizations can better assess whether their current infrastructure adequately supports
their SLAs. LOB managers can assess the impact of resource failures and how they affect applications,
business processes, and end-user experience.
Mercury Application Mapping’s dependency impact analysis feature can provide insight in a number of
dimensions, including availability, performance, and change. For a database, for example, it can analyze
the impact of an unavailable table (availability dimension), long queue lengths (performance
dimension), and of an infrastructure element upgrade (change dimension). Dependency impact analysis
uses TQL element descriptions to percolate the impact of such status changes up through the
application descriptions.
Asset Management
Physical asset tags and manual inventory techniques don’t even begin to address the asset
management requirements of today’s IT organizations. It’s a given that IT organizations must have up-todate lists so that their finance departments can accurately account for their capital assets. But with
today’s data centers supporting multiple business units, each one structured as its own profit center, IT
organizations need to keep track of what assets support which applications. Of course with the rapid
growth, high churn rate, and constant change in today’s data centers, it’s easy to miss assets and
allocate them to the wrong applications when manual processes are used.
Mercury Application Mapping, with its automatic discovery and mapping of all assets, helps to reduce
time and costs, and delivers current, up-to-date maps. With accurate application maps, it’s easy to get
a complete picture of inventory from an application perspective, including critical data like the number
of servers supporting each application.
Mercury’s Configuration Management Database provides a single, central source that can be used to
support asset management in two ways. As a foundation for configuration and change management
processes, asset information can be extracted from the CMDB as part of Mercury Application
Mapping’s many viewing modes. When used to track and analyze IT expenditures, IT organizations can
export data from the CMDB for import into its asset-tracking system, or they can utilize the CMDB’s API
to programmatically extract the required data for use by the company’s finance organization.
WWW.MERCURY.COM
12
APPLICATION MANAGEMENT
Policy Compliance
In the United States and other countries, an increasing number of regulations require specific actions to
be taken to conform with securities exchange laws and with other laws that safeguard the privacy of
customers, as well as to enforce internal IT security policies. In the United States, Sarbanes-Oxley has
stimulated a wide range of changes in the way that companies do business, from accounting to
information technology. IT organizations need a mechanism to provide the required visibility as well as
to ensure and report upon their compliance with Sarbanes-Oxley. The COBIT model includes more than
100 processes and more than 200 control objectives including access control, IT operations, and
disaster recovery. For example, some of COBIT’s control objectives require mapping configuration,
security, and management activities.
Attempting to accomplish this broad range of objectives manually brings up several problems. When
configuration changes are performed on per-application basis by a team supporting each specific
application, compliance is difficult to achieve because each team must objectively follow exactly the
same procedures. System security and access control is often not auditable. When monitoring changes
with manual processes, errors result causing violations of control processes. Once established, ongoing
compliance requires significant investment simply due to the enormous rate of change in IT
organizations.
Mercury Application Mapping automatically discovers and maps all IT infrastructure, reducing the
number of IT staff and time needed to identify all infrastructure elements. It can help ensure system
security by automatically discovering changes so that they can be attributed to a specific change
authorization or corrected as an unauthorized change. Mercury’s single CMDB provides a central
repository that supports audit traces and validating IT services against stated operational objectives.
Mercury Application Mapping specifically automates the following control objectives:
• Ensuring continuous service (DS4) by mapping applications and disaster recover sites.
• Ensuring system security (DS5) by automating the discovery of applications, infrastructure elements,
and their relationships to insecure sites and systems.
• Managing configuration (DS9) with automated discovery and a single repository for securities access
control processes.
• Managing operations (DS13) when using Mercury Application Mapping with Mercury Business
Availability Center™ to map and monitor the infrastructure that matters for regulatory compliance.
WWW.MERCURY.COM
13
APPLICATION MANAGEMENT
Using Mercury Application Mapping in Your IT Organization
Mercury Application Mapping delivers fundamental technology to support a broad range of
configuration management best practices that an increasing number of IT organizations are
implementing today. It can support change management processes, data center moves, geographic
replication, disaster recovery, server consolidation, business impact analysis, dependency impact
analysis, asset management and standards compliance. Mercury Application Mapping continuously,
automatically discovers all IT infrastructure, including software components, from Layer 2 to Layer 7 of
the ISO model, either with or without the use of agents. With all infrastructure elements inventoried and
their interrelationships stored in a central configuration management database, IT organizations can
refer to and compare historical configurations to detect changes and compare configurations against
their own gold standards. Mercury Application Mapping can also be configured to automatically notify
administrators of changes that it detects, and custom views can be created based on the TQL
descriptions of applications.
Continuous, automated discovery and mapping of applications and infrastructure elements reduces
time, expense, and dramatically increases accuracy of configuration management processes. With the
chance of human error reduced so significantly, many IT organizations are eager to begin using Mercury
Application Mapping. Fortunately, there are three ways that this technology can be put to use in your
organization:
• Standalone Use: Mercury Application Management can be used as a standalone solution to support
the configuration management processes described in this paper.
• Operations Package: Mercury offers an integrated bundle of Mercury Application Mapping with
Mercury System Availability Management™. This enables customers to integrate infrastructure element
monitoring strategies with their configuration management processes and the discovered application
topology, saving time and expense by using the same intuitive interfaces for both critical activities.
• Mercury Business Availability Center: For organizations wanting to have the most comprehensive
configuration management, system monitoring, and business process management capabilities
available, Mercury Business Availability Center includes Mercury Application Mapping as the key
technology linking business processes with infrastructure elements. Customers using Mercury
Business Availability Center have access to configuration management features as well as the ability
to apply monitoring and management policies based on their application models. Mercury Business
Availability Center integrates application maps with information from infrastructure element
monitoring, business process monitoring, and user experience measurements. With this
comprehensive package, IT organizations can manage applications from a business perspective,
linking SLAs to the applications and elements that support them — all while providing a
comprehensive foundation for configuration management processes. The benefits of this solution are
discussed more fully in the Mercury white paper titled Linking Business Applications and IT
Infrastructure with Mercury Application Mapping.
WWW.MERCURY.COM
14
Mercury Interactive is the global leader in business technology optimization (BTO). We are committed to helping customers optimize the business value of IT.
WWW.MERCURY.COM
© 2004 Mercury Interactive Corporation. Patents pending. All rights reserved. Mercury Interactive, the Mercury Interactive logo, the Mercury logo, Mercury Business Availability Center, Mercury Application Mapping, and Mercury System
Availability Management are trademarks of Mercury Interactive Corporation in the United States and/or other foreign countries. All other company, brand, and product names are marks of their respective holders. WP-1262-1004