Capacity Report Sub-Processes
The Capacity Report is the outcome of monitoring activities.
My Capacity Report outline is structured around three sub-processes
to ITIL capacity management best practices:
- business capacity management (BCM) includes
Stakeholder Review of Business Plans, Business Needs, IT Strategy, Forecasts, Trends, Financial Plans, Budgets, etc.
to ensure that future business requirements for IT Services are considered, planned and implemented in a timely fashion
according to financial management metrics such as sales effectiveness, market share, time to market, profit, cash flow, and return on investment (ROI);
- service capacity management (SCM) considers
Service Reviews, the Service Catalog, Alerts, Changes, Problems, Service Monitoring, etc.
to build a model used to ensure that the performance of all services (as detailed in SLA and SLR targets )
is monitored and measured, and that the collected data is recorded, analyzed, and reported;
- resource capacity management (RCM) considers
Ops Schedules, Deployment Plans, Dev Plans, Incidents, Problems, Alerts, Changes, Resource Monitoring, etc.
to build a model used to to ensure that
all components within the IT Infrastructure (as finite resources) are monitored and measured, and that
the collected data is recorded, analyzed, and reported.
These subprocesses share a common set of
activities that are applied from different perspectives:
- Demand management *
- Workload management
- Performance Monitoring *
- Analysis
- Modeling (Modelling) *
- Optimization
- Change initiation
- Service monitoring
- Trend analysis
Application sizing *
The MOF (Microsoft Operations Framework) recommends that
Operating Level Agreements (OLAs) be broken down by the following categories of infrastructure:
- Service
- Application
- Middleware (includes database)
- Operating system
- Hardware
- Network (local area network)
- Facilities
- Egress (service supplied outside of IT, such as power, HVAC, and water)
Analysis of data aims to identify issues such as:
- Inappropriate distribution of workload across available resources
- Unexpected increase in transaction rate
- Contention (data, file, memory, processor)
- Inappropriate locking strategy
- Inefficient use of memory
- Inefficiencies in the application design
| |
From the MOF:
|
|