Consider a conventional information center crammed with dozens or hundreds of bodily servers, network switches, storage gadgets and so forth. It is significant that IT staff and business leaders perceive precisely what is current within the surroundings and make certain that every system, OS and software is configured in a recognized and acceptable means. Consequently, configuration administration supplies an underlying consistency to the IT environment. When a tool requires service or replacement, an established configuration offers a baseline that can be preserved and applied to substitute devices. Consistency — doing the identical things in the same ways — additionally plays immediately into quality-of-service (QoS) and repair delivery, and configuration administration holds a core function right here.

what is configuration

Configuration management practices continue to evolve and now embrace remote resources and services. For instance, cloud users employ these practices and instruments to monitor the sources, providers and workloads deployed inside the public cloud. A CM course of and its supporting repository, CMDB or CMS, face the problem of overlapping and contradicting knowledge from sources across the enterprise. A configuration management plan should embody a approach to merge and reconcile CIs to present a single level of reference or sole supply of truth.

Information Middle And Cloud Community Management

The executable differs in language between the methods — Ansible and Salt Stack are Python based and Chef is Ruby. This workflow is much like operating ad-hoc shell scripts however offers a extra structured and refined expertise via the respective platforms ecosystems. Docker launched containerization that is a complicated form of configuration administration — like a configuration lockdown. Docker relies on configuration recordsdata called Dockerfiles, which include a listing of commands that are evaluated to reconstruct the expected snapshot of operating system state. Docker creates containers from these Dockerfiles that are snapshots of a preconfigured application.

An Ansible Playbook is a blueprint of automation duties, that are IT actions executed with restricted handbook effort throughout a listing of IT options. Several will retire and get replaced — and even one alternative may essentially definition of configuration change the configuration of the court. He proposed a mannequin of the solar system that based the distances between planetary orbits on a specific configuration of the 5 solids.

what is configuration

As adoption of the ITIL framework gained momentum, organizations started integrating network configuration management with IT service administration to reinforce visibility across IT companies and cut back operational costs. On the operations side, configuration management allows developers to stipulate an appropriate deployment surroundings for a build. This might contain creating and configuring VMs, however it’s also a strong way to create and configure containers using container management/orchestration tools such as Kubernetes.

Ansible, Salt Stack, Chef, Puppet

The course of additionally consists of generating common standing and historical records for stakeholders, verifying all data for accuracy and creating an accessible audit path. The self-discipline started in the U.S. military—namely the Department of Defense—which sought to increase the lifespan of its hardware equipment without sacrificing efficiency over time. The army eventually created the 480 sequence, a set of governing standards for sustaining technical equipment, which developed into the ANSI–EIA–649 (the National Consensus Standard for Configuration Management) in 1998. Bookmark these assets to learn about forms of DevOps groups, or for ongoing updates about DevOps at Atlassian.

With IT Ops managing interdependencies and software teams managing configuration as code, organizations can enjoy stable methods and exceptional uptime. Automating configuration management is important to establishing a reliable, consistent, and well-maintained IT environment at scale. Rather than relying on individuals to perform time-consuming guide configuration duties, automation permits teams to consistently deploy and decommission infrastructure components in much less time, with fewer opportunities for human errors. It also makes it potential to maintain consistent system settings across datacenter, cloud, and edge environments for an application’s complete life cycle, minimizing both performance and security points. Application deployment and configuration administration outline and implement the sources needed to run the build in a desired configuration. The last step is actual deployment, the place the construct is delivered for signoff to deployment — or routinely deployed to stay servers — and connected to operating services as desired.

what is configuration

Configuration administration solves this problem by creating a “source of truth” with a central location for configuration. It tends to be extra literal and detailed — for instance, if somebody asks you for directions to a Best Buy retailer, the imperative response would include all of the specific turns and distances to succeed in the destination. To get to a Best Buy store, the declarative response would be to offer the shop’s address — it would not matter much which route an individual takes to get there. Configuration management embraces declarative programming, which allows goals to be acknowledged more clearly and concisely.

What Is Configuration Management?

A centralized mainframe gave approach to racks of particular person servers, storage subsystems, networking gear and appliances, in addition to full-featured endpoint techniques such as desktop PCs. IT operations management (ITOM) is liable for managing IT necessities within an organization, overseeing the provisioning, capability, efficiency, and availability of IT infrastructure and assets. CM instruments can configure and handle virtual private clouds (VPCs), operating systems (OSs) and workload security1 in cloud computing environments. Configuration management heavily is decided by policy, process and automation, which should be built-in into the CM tool or platform. Although the advantages of configuration administration could be compelling, the technology is not good. CM platforms and practices pose challenges, beginning with adoption and integration.

By tracking dependencies, for instance, administrators can decide the impression that a hardware, software program, community or other outage might have on different systems or resources. Without the governance means of configuration management validating its contents, the repository is simply an operational database with unverified information, not a CMDB or CMS. Automated configuration audit and verification components entitle a repository to be leveraged as a licensed gold source of belongings. The major goal of CM is to control the evolution of advanced methods and create vigilant record-keeping processes that streamline and speed up IT asset administration. CM practices be positive that a system’s design, implementation and operational info are always in sync, facilitating environment friendly model management and preventing the system instabilities that can occur with untracked modifications.

CM tools corresponding to Ansible, Puppet, Chef and SaltStack are usually geared toward the latter a part of the CI/CD toolchain, where workloads are deployed into the data heart’s hardware surroundings. IT and business leaders readily adopted configuration administration with the explosion of enterprise computing in the Nineteen Seventies and Nineteen Eighties. Data middle operators realized that standardized practices had been very important to the established functionality of servers and systems inside a production setting.

The objective is to guarantee that any providers offered by IT can be found, dependable and safe. Adding configuration management information alongside code in a Git repository supplies a holistic model control view of an entire project. The following list of other configuration management instruments is designed to be stored in a Git repository and leverage Git model control monitoring. IT teams sometimes use specialised software program to define system settings—as nicely as build and preserve techniques based on those baseline settings. Like everything else on the planet of IT, effective configuration management includes people, course of, and technology. It requires a well-defined course of for managing configurations and adjustments, as well as monitoring compliance with this process.

ITIL has embraced configuration administration as a central part of its framework through its most up-to-date replace to ITIL v4 in 2019 and 2020. CM processes are pushed by administration tools that permit IT administrators to construct a workstation or server with particular settings and then apply those settings to other belongings. Used in concert with IT service administration (as defined by the ITIL), CM requires teams to watch the state of a system in real time to establish aberrant conduct and/or opportunities for patches, updates or upgrades. CI/CD configuration administration utilizes pull request-based code review workflows to automate deployment of code adjustments to a stay software program system. CI/CD may be set up in order that permitted configuration change requests can instantly be deployed to a working system.

He has driven organization-wide course of improvement with results of greater productiveness, greater quality, and improved customer satisfaction. He has built multi-national teams that worth self-direction and self-organization. When not talking or coding, you can find Ian indulging his passions in parsers, meta-programming, and domain-specific languages. Configuration administration is a needed tool for managing complex software program techniques. Lack of configuration administration could cause critical problems with reliability, uptime, and the flexibility to scale a system.


In addition to the expertise in community applied sciences and administration tools, people want to grasp and internalize the processes. Technology should allow standardization and automation to make sure smooth operation of the network. This dovetails with DevOps and related areas corresponding to infrastructure as code (IaC). The ITIL framework, which emerged in the Nineteen Eighties, launched rules and practices for enterprises to decide out, plan, deliver and keep IT companies. These allowed IT to operate as a business service quite than simply a price heart — an idea that continues to resonate today.

what is configuration

This might embrace protocols for how changes are requested and the way to define procurement, deployment and setup/configuration. Even when configurations are well documented and thoroughly enforced, configuration administration must account for the fact of periodic changes, similar to software upgrades and hardware refreshes. Infrastructure and architectural changes may be required to tighten safety and enhance performance. This might be as easy as opening a certain port on a firewall to accommodate an software’s new feature, or relocating a quantity of busy servers on the native community to improve performance of different applications on the subnet. As the CMDB grows and accommodates more configuration objects, it becomes attainable to foretell the impression of configuration adjustments, a key function in change administration.

Learning Ansible Fundamentals

In many instances, network management systems for larger networks can generate a lot of information that’s collected from telemetry and SNMP. Future CM tools must additionally be in a position to deal with the software-driven features of such an setting, during which containers usually exist for less than minutes or even seconds. This puts a particular emphasis on container orchestration tools for configuration administration. Components should be brought together and integrated right into a construct, and each resulting construct additionally carries unique version designations earlier than being tested and deployed. Configuration administration tracks the parts and ensures that a desired build uses only certain elements. The broad shift from mainframes to server-based computing in the early Nineteen Nineties multiplied the amount of hardware and units in the knowledge heart.

This was accomplished as a technical discipline to manage hardware and different material items. Configuration management was the method to maintain consistency of the functionality and efficiency with the necessities and design all through the lifecycle of defense tools. Moreover, each construct must be completely examined, and configuration management could be employed to specify the instruments and test recordsdata wanted to validate a given build.

Consequently, change administration is completely different than configuration management, but managing change — and the potential impacts of change on a production surroundings — is a crucial part of configuration administration. The element and formality concerned in a change management course of can range relying on the scale and type of group; a large and extremely regulated enterprise will typically use a detailed change administration course of. The evolution of information center applied sciences poses challenges for configuration management.