Designing your MOM Solution
The primary purpose of the designing phase is to document your current network topology, and to map your MOM solution to your current topology. This design phase also includes designing the user experience and planning for hardware requirements, based on the resulting topology design. This phase of the project requires cross-team collaboration to obtain an accurate picture of your current network topology, and to propose and review MOM topologies. Key roles during this phase are the MOM Topology Designer and the Network Security Designer. These two roles work together to ensure that the MOM implementation works with your organizations network security requirements and security boundaries. The main sections of the design phase are:
Evaluate and Map the Current Network Topology
Identify and Map Computer Monitoring Scenarios
Identify and Map Network Operations Center Monitoring Scenarios
Identify and Map Reporting and Reporting Database Scenarios
Evaluate and Map the Current Network Topology
Start the design phase by gathering accurate topology maps of your current network environment. Include data that might impact the deployment of MOM components and agents, including the following:
Link speeds between remote locations
Domain trust relationships
Firewalls
Also, document current and future plans for:
Network growth
Significant modifications to the network infrastructure
Identify and Map Computer Monitoring Scenarios
Create a separate map to diagram the proposed computer monitoring scenarios, including:
Physical location of computers.
Location of applications and computers to be monitored.
Service level monitoring--agent and/or agentless monitoring requirements.
Security features (untrusted domains and firewalls).
Identify and Map Network Operations Center Monitoring Scenarios
Create a separate map to diagram the Network Operations Centers, and data centers that require access to MOM functionality, including the following:
Physical location.
Number and type of MOM users.
MOM functionality required by MOM users.
Security features (untrusted domains and firewalls).
Identify and Map Reporting and Reporting Database Scenarios
Create a separate map to diagram the Reporting and Reporting database components, including the following:
Physical location of Reporting servers.
Data storage considerations.
Security considerations, including security access for users running and viewing reports.