Skip to main content

Configuration Management

  • Chapter
  • First Online:
Principles of Computer Systems and Network Management
  • 1125 Accesses

A computer system consists of many components including hardware devices such as servers, routers, switches, and firewalls and software systems such as the operating system and applications. Each such component allows the operator to change its settings to customize its behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For Apache httpd.conf, one can also omit the interface address and copy the configuration file across without any changes – assuming that the web-server process is expected to be reachable through each of the network interfaces on the machine, as opposed to a specified one.

  2. 2.

    Strictly speaking, ITIL CMDB stores dependencies about services and processes into a central repository in addition to the configuration items of different devices. A repository containing only configuration information does not strictly conform to the definition of CMDB, but the term CMDB is loosely used in industry to refer to such repositories. In this book, we are going with the looser definition used in the industry.

References

  1. R. Shomaly, A model based approach to network, service and customer management systems: Object oriented technology, BT Technology Journal, 11(3): 123–130, November 1993.

    Google Scholar 

  2. T. Eilam et al., Managing the configuration complexity of distributed applications in internet data centers, IEEE Communications Magazine, March 2006.

    Google Scholar 

  3. J. Strassner, Policy -based Network Management: Solutions for Next Generation, Morgan Kaufmann, August 2003.

    Google Scholar 

  4. S. Jajodia et al., A unified framework for enforcing multiple access control policies. In: Proceedings of the ACM International SIGMOD Conference on Management of Data, May 1997.

    Google Scholar 

  5. D. Agrawal, K-W. Lee, and J. Lobo, Policy -based management of networked computing systems. IEEE Communications, 43(10):69–75, 2005.

    Article  Google Scholar 

  6. UK Office of Government Commerce, The Introduction to the ITIL Service LifeCycle Book, August 2007.

    Google Scholar 

  7. R. Talpade, and J. Singh, Compliance assessment of IP networks: A necessity today, Information Systems Control Journal, 4: 51–53, April 2007.

    Google Scholar 

  8. D. Agrawal et al., Policy based validation of SAN configuration, Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, June 2004.

    Google Scholar 

  9. Y. Li et al., Modeling and Verifying Configuration in Service Deployment, IEEE International Conference on Services Computing, Chicago, IL, September 2006.

    Google Scholar 

  10. W. De Pauw and J. Vlissides, Visualizing object-oriented programs with Jinsight, Lecture Notes in Computer Science, In: Lecture Notes on Computer Science, ECOOP’98 Workshop Reader, July 1998.

    Google Scholar 

  11. O. Crameri et al., Staged deployment in mirage, an integrated software upgrade testing and distribution system. ACM SIGOPS Operating System Review, 41(6): 221–236, December 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dinesh Chandra Verma .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Chandra Verma, D. (2009). Configuration Management. In: Principles of Computer Systems and Network Management. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-89009-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-89009-8_7

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-89008-1

  • Online ISBN: 978-0-387-89009-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics