Do you have any ITOM Runbook, Best Practices, Optimization Techniques or checklists that will help us as we start using ITOM in production?

Sufian Abu
Tera Contributor

ITOM RunBook, Best Practices, Optimization Techniques

We are in the middle of implementing ITOM components. We have had Discovery for a long time but implementing Event Management, Service Mapping, Operator Dashboard, etc. 

We are looking for:

  • ITOM Runbook (daily/weekly/event-driven checklists, best practices, optimization TO DO, etc)
  • ITOM Analytics (how to harvest the gathered data. We are also looking into Metrics Intelligence. Any guidance on what you would recommend us to focus on)

Will greatly appreciate your guidance and recommendations.

NOTE - We are also implementing ITBM (APM, TPM - focusing on defining internally driven Lifecycle Management) and BCM. Focusing on ITOM in this ITOM Forum but also looking for the same for these modules.

Thanks,
Sufian

4 REPLIES 4

tim_broberg
ServiceNow Employee
ServiceNow Employee

Credential management:

  1. You don't really want to use one credential with unlimited authority for everything.
  2. It's really hard to manage one credential with limited authority for everything because the limits are complex.
  3. When you authenticate with a credential that has inappropriate permissions for the task at hand, it still authenticates, it just fails to get the work done. The credential iterator doesn't view that as a failure, so it doesn't try another credential.
  4. If all of the above is correct in your use case, then you therefore need to use credential aliases (AKA tags) to control which credentials get used for which purpose.

I'm coming from a perspective of ssh credentials and sudoers permissions here, but the principles apply elsewhere.

    - Tim.

Sufian Abu
Tera Contributor

Tim - I think you replied to an incorrect post.

Thanks, Sufian, but no, these are best practices for managing credentials.

Thanks Tim!