IT infrastructures and services management was and still is today an important part of my ‘business as usual‘ set of activities. Regardless of the tools and technologies implemented what I look for are always two features for monitoring and automation, simplicity and efficiency.
If monitoring is essential for having visibility on the overall infrastructure and for being proactive, automation is necessary for delivering consistent results in a timely manner especially in complex scenarios.
Continue reading “Powershell as glue for System Center Virtual Machine Manager (SCVMM) and VEEAM Backup & Replication”
The moment I heard about this book, I wanted to read it. The title is self-explanatory: “How Google Runs Production Systems”. It looked so interesting to me that I immediately purchased it. At that time I had other books waiting in my bookshelf, but I was so impatient to read this one, that I admit I started immediately after the Phoenix Project. This one was the one that I absolutely wanted to read.
The contents in this book are well organised, chapter after chapter it’s easy to accept the challenges that an organisation of this size had to conquer to become successful in managing the infrastructure, processes and people.
Continue reading “Site Reliability Engineering”
There is no such thing as the myth of a “perfect” green-field deployment. But in real life most of the times there is a just room/resources (e.g. time and money) for patches of green on a big brown-field.
What I really mean.. is that we can’t always keep up with the pace of new technologies and just re-design things from ground up following new trends without understanding or maintaining the legacy design or more importantly meeting the business needs.
Starting from the network and I like to create a basic network diagram will outline at glance things that could potentially limit infrastructure growth or expose it to potential risk that we need to mitigate. Designing , re-designing things well or better is based on getting the requirements right and verify that desired targets are met. To speed up this discovery process we use tools to gather the information we need. Continue reading “Powershell: How to perform Ping Sweep and Reverse-Lookup on a private network”