World Library  
Flag as Inappropriate
Email this Article

Configuration management database

Article Id: WHEBN0003267841
Reproduction Date:

Title: Configuration management database  
Author: World Heritage Encyclopedia
Language: English
Subject: Information Technology Infrastructure Library, Configuration management, Definitive Media Library, Cmdbuild, Application Interface Specification
Collection: Information Technology Management
Publisher: World Heritage Encyclopedia

Configuration management database

A configuration items (CI), as well as descriptive relationships between such assets. When populated, the repository becomes a means of understanding how critical assets such as information systems are composed, what their upstream sources or dependencies are, and what their downstream targets are.


  • Purpose and Benefits 1
  • Contents 2
    • CI attributes and data 2.1
    • Relationships between CIs 2.2
    • Configuration item types 2.3
  • CMDB schematic representations 3
  • Challenges 4
  • References 5
  • External links 6
  • See also 7

Purpose and Benefits

CMDBs are used to keep track of the state of different things that are normally referred to as assets, such as products, systems, software, facilities, and people as they exist at specific points in time, as well as the relationships between such assets. The maintenance of such state related information allows for things like the reconstruction of such assets, at any point in their existence, as well as for things such as impact analysis, in the cases of root cause analysis or change management.

The IBM ITSM framework describes the use of the CMDB as it is tied to software development and all aspects of an information system as it moves through the Systems development life-cycle.[1]

The Information Technology Infrastructure Library framework, also known as ITIL describes the use of CMDBs as part of infrastructure operations and support. In the ITIL context, a CMDB represents the authorized configuration of the significant components of the IT environment.

A CMDB helps an organization understand the relationships between the components of a system and track their configurations. The CMDB is a fundamental component of the ITIL framework's Configuration Management process. CMDB implementations often involve federation, the inclusion of data into the CMDB from other sources, such as Asset Management, in such a way that the source of the data retains control of the data. Federation is usually distinguished from ETL (extract, transform, load) solutions in which data is copied into the CMDB.

CMDBs can be used for many things, including but not limited to business intelligence,[2] software and hardware builds,[3] and impact analysis for, both, Change management[4] and Incident management.[5]


The CMDB contains and records data records that are also called configuration items (CI). It also provides details about the important attributes of CIs and the relationships between them.

CI attributes and data

Depending on the CI type or category, there are many attributes that might be captured:

  1. CI Unique Identifier or Identification Code
  2. CI Name or Label (often, both, long names and short names)
  3. CI Abbreviations or Acronyms
  4. CI Description
  5. CI Ownership (organizations and people)
  6. CI Importance

There can be many more, depending on the CI types. In some cases, there may be hundreds of attributes.

Because attributes are defined by metadata, CMDBs also contain metadata, and thus the concept overlaps with that of a metadata repository, which is also used to more effectively run IT organizations. Configuration management addresses how the data is to be kept up to date, which has historically been a weakness of metadata repositories.

Relationships between CIs

At a minimum relationships are often composed of a Source CI that is related to a Target CI. In the case of more advanced relationships, such as semantic relationships, it is desirable to have a descriptor between the Source CI and Target CI that helps provide context. For example, "Database X" is related as a "Component" of "Application Y". The descriptor is also known as a Predicate.

Configuration item types

A Configuration item type (or CI Type) is the data type of the element or configuration item an enterprise wishes to store within the CMDB. At a minimum, all software, hardware, network, and storage CI Types are stored and tracked in a CMDB. As enterprises mature, they start to also track business CI Types in their CMDB, as well, such as organizations, people, markets, products, and 3rd party entities such as vendors and partners. This allows the relationships between CIs to become more meaningful and the CMDB to become stronger source for knowledge management.

A key success factor in implementing a CMDB is the ability to automatically discover information about the CIs (auto-discovery) and track changes as they happen.

CMDB schematic representations

CMDBs schematic structures, also known as database schemas (or just "schemas"), take on multiple forms. Two of the most common forms are those of a relational data model and a semantic data model.

Relational data models are based on first-order predicate logic and all data is represented in terms of tuples that are grouped into relations. In the relational model, related records are linked together with a "key", where the key is unique to an entry's data type definition. Such relational models provide declarative methods for specifying data and queries. In other words, users directly state what information the database contains and what information they want from it, and let the database system take care of describing data structures for storing the data and retrieval procedures for answering queries.

Semantic data models typically rely on the resource description framework and use a model that simply relates any thing to any other thing through the use of a relationship descriptor, giving context to how things are related to each other.


There are three core challenges to creating and maintaining a CMDB.

The first challenge has to do with what it takes to get all relevant data into your CMDB. In this case, collecting all the data, throughout each record's or CI's life cycle becomes critical. This means putting in processes and tools to collect the most recent changes to data as it occurs.

The second challenge has to do with maintaining your data, once it's in the CMDB, as it will change regularly and rapidly. Organizations that spend the investment to build out their CMDBs often find that one of the biggest challenges is the work and investment to maintain the data, after it's stored. This is because data about CIs and the relationships between them are constantly changing. Enterprises soon learn that manual maintenance of relationships is a significant undertaking that is often not planned for or expected.

The third challenge has to do with making your data usable and useful, after it's in your CMDB. Most CMDBs are just databases. This means they have no traits, features, or benefits of more complex applications. They lack tools to view data via complex visualizations or tools for advanced discovery. This means that most enterprises need to invest the funds, time, and energy to develop an application layer that adds such constructs to their CMDB, which adds a layer of complexity and cost that most enterprises do not plan for or expect. However, once implemented correctly, these features coupled with the CMDB become much more than just a database. The combination becomes the foundation for an Enterprise Library.

It is because of the above three challenges that most enterprises opt to purchase their CMDBs, rather than designing, building, delivering, and supporting them, themselves.


  1. ^ H. Madduri, S.S.B. Shi, R. Baker, N. Ayachitula (6 April 2010). "A configuration management database architecture in support of IBM Service Management". Institute of Electrical and Electronics Engineers, The (IEEE).  
  2. ^ Anchuri, P.; Zaki, M. J.; Barkol, O.; Bergman, R. (11 Dec 2011). "Infrastructure Pattern Discovery in Configuration Management Databases via Large Sparse Graph Mining". IEEE: Data Mining (ICDM), 2011 IEEE 11th International Conference on: 11–20.  
  3. ^ Chang, William Y.; Hosame, Abu-Amara; Feng Sanford, Jessica (2010). Building and Configuring Enterprise Cloud Services. Springer Science+Business Media B.V. pp. 273–308.  
  4. ^ Sauvé, Jacques; Rebouças, Rodrigo; Moura, Antão; Bartolini, Claudio; Boulmakoul, Abdel; Trastour, David (2006). Business-Driven Decision Support for Change Management: Planning and Scheduling of Changes. Springer Berlin Heidelberg. pp. 173–184.  
  5. ^ Gupta, R.; Prasad, K. H. (2 June 2008). "Automating ITSM Incident Management Process". IEEE: Autonomic Computing, 2008. ICAC '08. International Conference on: 141–150.  

External links

See also

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.