Part 5 - DCIM-For-Dummies - 3rd-Edition
Part 5 - DCIM-For-Dummies - 3rd-Edition
E eryone ishes for a crystal ball to see into the future. The
ability to determine hen a lanned or un lanned disru tion
ill occur and hat systems and a lication or loads ill be
affected eludes many data center mana ers. It s also frustratin
that millions of sensor and telemetry oints could shed li ht on
the ine itable. Still, the ability to consume and rocess the data
in a meanin ful manner is dauntin for a mere mortal human .
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
» Optimizing your data center workloads
Chapter 3
Exploring Next-
Generation DCIM
I
n this chapter, I describe several next-generation data center
integration management (DCIM) capabilities and modules that
you should look for in your DCIM solution.
Workload Optimization
As data centers grow in scale and complexity, it’s no longer suf-
cient to only monitor s ace, o er, and coolin . System uti-
lization, or the lack of it, is increasingly being scrutinized as
enterprises routinely discover that upwards of 20 percent of the
servers in their data center are “ghost servers” that idly consume
energy but serve no business function.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Critical components to help you truly optimize an application’s
full or load include see Fi ure
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Ultimately, all the applications and data your organization man-
ages depend on a stable and secure physical infrastructure.
Whether this infrastructure is located in your own data cen-
ters, in a hosted colocation facility, or at the edge, you must be
certain these resources are not intentionally or unintentionally
compromised.
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Monitoring: Inspect what you expect, rinse, and repeat.
Proactively scan to determine changes made to the physical
compute infrastructure. Compare against the single source
of truth and change management protocols. Inspect, record,
and report any changes that are outside the baseline or set
of expected changes. Update the DCIM source of truth asset
database.
» Alerting and reporting: Share the knowledge. Correlating
changes to the physical compute environment and reporting
them to concerned groups pro ides many bene ts IT
operations can see repeat o enders ma ing unauthori ed
or undocumented changes. This can help you avoid unex-
pected changes to power or the introduction of potentially
harmful equipment and software, leading to disruptions or
catastrophic events. Security teams can monitor for vulner-
abilities introduced by unauthorized devices, applications,
and network connections. Finance can accurately audit and
validate inventory to ensure support, maintenance, and
license expenses are accurately accounted for.
Machine Learning
The scale, com le ity, and re uired o timi ation of modern data
centers re uires mana ement by arti cial intelli ence AI
because data centers increasingly cannot be planned and man-
a ed ith traditional rules and heuristics. Se eral use cases lend
themsel es es ecially ell to AI and machine learnin
These materials are © 2021 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.