1 / 15

SLCES: Sustainable Sandbox Environments for Efficient IT Resource Management

SLCES (Solution Lifecycle Environment Services) provides sustainable sandbox environments to optimize IT resource utilization, enhance services expertise, and enable on-demand product environments through virtualization.

wortham
Download Presentation

SLCES: Sustainable Sandbox Environments for Efficient IT Resource Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Solution Lifecycle Environment Services (SLCES) Orientation June 4, 2012

  2. What is SLCES? McKesson Technology Products Platform Mgmt Services Structured Program Visible Governance Usage Scenarios • Ability to easily build/tear-down virtualized environments. • Application suite, data, and configuration is pre-established. • Will allow creation of multiple instances Sustainable Organization McKesson CONFIDENTIAL

  3. What Does It Provide? Environments SLCES Provides: Pilot processes for requests, issues, enhancements, etc… Operations to create and maintain integrity of environments SLCES does not replace your group’s responsibilities: • Guiding creation of configuration and data enhancements • Providing application expertise McKesson CONFIDENTIAL

  4. Objectives of SLCES • Provide sustainable sandbox environments via a long-term organization • Optimize spend on expensive IT resources: processor, disk, memory • Increase services expertise internally in a “safe environment”, before performing work at the customer site. • Enable on-demand and integrated product environments through virtualization • Leverage expertise across McKesson through sharing of pre-defined environment images • Allow individual user groups to modify data, application, and configuration as needed to improve triage, training, and installation processes • Allow you to focus on your team objectives, rather than creation and maintenance of sandbox environments McKesson CONFIDENTIAL

  5. Deployment Process 1 2 3 New virtual machines are engineered in the development workspace. The new virtual machine is converted into a read-only template. Templates are used to add virtual machines to a configuration*. When an environment is requested, all virtual machines in a configuration are deployed for use in a deploymentworkspace. Fenced Environment Configuration Fenced Environment Template Virtual Machine Virtual Machine Virtual Machine Other Templates Other Virtual Machines Other Virtual Machines Other Virtual Machines *Configuration is a collection of virtual machines in a fenced environment. Fenced environment means that virtual machines inside the fence are isolated from any machine outside. McKesson CONFIDENTIAL

  6. Multiple Deployed Environments McKesson CONFIDENTIAL

  7. Enhancement Process 2 3 1 If users find a configuration or data error from which everyone would benefit, there will be process to request the change be made in the development workspace. • Once complete, the new virtual machine is converted into a new read-only template and the configuration updated. Any new configuration deployments will now include the change. • The virtual machines in the deployment workspaces save changes while they are deployed for use. All changes are lost when the virtual machines un-deploy at the expiration date. A change here is permanent A change here is temporary Fenced Environment Configuration Fenced Environment Template’ Virtual Machine’ Virtual Machine’ Virtual Machine Other Virtual Machines Other Virtual Machines Other Virtual Machines Other Templates McKesson CONFIDENTIAL

  8. How Does It Work? Environment Familiarization

  9. Simple Example Environment Fenced Environment Remote Desktop Connection Windows Terminal Server VM DNS /Active Directory Server Application VM’s Interface VM’s Database VM’s McKesson CONFIDENTIAL

  10. Sharepoint Site • Logging Into the Terminal Server Procedures

  11. SharePoint Site The SLCES SharePoint site is available for your use. All inquiries, requests, and documentation are located here, including: • Issue/Enhancement request form – Link to Remedy • Environment request form • Application login guide http://mptsp.mckesson.com/mpt/cio/SLCES/SitePages/Home.aspx McKesson CONFIDENTIAL

  12. Issue Logging / Enhancement Request • For environment issues, data sets, configuration, or application additions use Log an Issue or Enhancement Requestlink on the SLCES SharePoint site, located on the left banner. • The link will take you to the SLCES Remedy web portal. You will enter your EID, select FIND then New Case. Please select an Urgency and Category. From there select Continueand you will be taken through a series of questions before you select Submit. • For issues, you may log: • Down servers • Login problems • Non-functioning products • Please do not log software defects. • After your request is submitted you will receive an email from Remedy confirming that your request was delivered and is being worked on. • Link: • http://remedyweb.mckesson.com/slces McKesson CONFIDENTIAL

  13. Logging Into the Integrated Environment’s Terminal Server Your environment is: 62.ER10.3.HSES.System DBA • Open Remote Desktop • Provide the IP address for the ISE environment: • Computer: 10.97.132.9 (will change periodically when refreshed) • Enter the following credentials: • User Name: Your EID • Password: McKesson1 • Log on to: ISE • *NOTE:  Upon initial login you will be prompted to change your password.  This can be changed to whatever you need and is NOT tied to your NAMCK password. • Once logged in you will be presented with desktop image that has pre-configured launch icons.* • Use the Application Login spreadsheet for each application’s user and password. • *After one hour of inactivity, the system will log you off • * The environment is limited to 25 concurrent users McKesson CONFIDENTIAL

  14. Verifying your environment • An environment image has been placed on the Terminal Server desktop. • Your Environment Name will be the name you select when entering in Remedy tickets or any other reference to your environment. • Your External IP, referenced on the previous slide,will be the IP address of the Terminal Server.   Once again this will be referenced for all communications with SLCES.

  15. Questions? SLCES / ISE Orientation

More Related