A computer system consists of many components including hardware devices such as servers, routers, switches, and firewalls and software systems such as the operating system and applications. Each such component allows the operator to change its settings to customize its behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For Apache httpd.conf, one can also omit the interface address and copy the configuration file across without any changes – assuming that the web-server process is expected to be reachable through each of the network interfaces on the machine, as opposed to a specified one.
- 2.
Strictly speaking, ITIL CMDB stores dependencies about services and processes into a central repository in addition to the configuration items of different devices. A repository containing only configuration information does not strictly conform to the definition of CMDB, but the term CMDB is loosely used in industry to refer to such repositories. In this book, we are going with the looser definition used in the industry.
References
R. Shomaly, A model based approach to network, service and customer management systems: Object oriented technology, BT Technology Journal, 11(3): 123–130, November 1993.
T. Eilam et al., Managing the configuration complexity of distributed applications in internet data centers, IEEE Communications Magazine, March 2006.
J. Strassner, Policy -based Network Management: Solutions for Next Generation, Morgan Kaufmann, August 2003.
S. Jajodia et al., A unified framework for enforcing multiple access control policies. In: Proceedings of the ACM International SIGMOD Conference on Management of Data, May 1997.
D. Agrawal, K-W. Lee, and J. Lobo, Policy -based management of networked computing systems. IEEE Communications, 43(10):69–75, 2005.
UK Office of Government Commerce, The Introduction to the ITIL Service LifeCycle Book, August 2007.
R. Talpade, and J. Singh, Compliance assessment of IP networks: A necessity today, Information Systems Control Journal, 4: 51–53, April 2007.
D. Agrawal et al., Policy based validation of SAN configuration, Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, June 2004.
Y. Li et al., Modeling and Verifying Configuration in Service Deployment, IEEE International Conference on Services Computing, Chicago, IL, September 2006.
W. De Pauw and J. Vlissides, Visualizing object-oriented programs with Jinsight, Lecture Notes in Computer Science, In: Lecture Notes on Computer Science, ECOOP’98 Workshop Reader, July 1998.
O. Crameri et al., Staged deployment in mirage, an integrated software upgrade testing and distribution system. ACM SIGOPS Operating System Review, 41(6): 221–236, December 2007.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chandra Verma, D. (2009). Configuration Management. In: Principles of Computer Systems and Network Management. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-89009-8_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-89009-8_7
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-89008-1
Online ISBN: 978-0-387-89009-8
eBook Packages: EngineeringEngineering (R0)