© 2015 Ayehu Software Technologies Ltd. All rights reserved. Quite often, IT automation is feared with the notion that it’s complex, requires resources and large investments. The solution is simply to start small – gain quick wins in automating repetitive tasks, before expanding automation into more complex processes. In this eBook we assembled 10 IT tasks that you should easily automate to free up resources and launch new IT process automation projects. Enjoy, Ayehu’s Founder and CEO il.linkedin.com/in/gabbynizri Share this eBook Page 3 www. ayehu.com Share this eBook Page 4 www. ayehu.com How much time does your IT team (and Help Desk group) spend on Active Directory password resets and locked accounts? This can sum-up to tens of According hours on a weekly basis, depending on the to the Burton Group, company size password management can cost $250 per user, and number of user requests. Frequent password resets, coupled with a complex password policy, lead to repeated account lockouts. per year. In some cases, IT support personnel handle password reset calls for almost 40% of their working day. The procedure for each call includes phone authentication, execution of reset, confirmation, and documenting the call closure. Share this eBook Page 5 www. ayehu.com Automating password reset alone can drop helpdesk queries by more than 30%. The automated alternative: An automated workflow that handles the entire process. Users initiate the resolution through a self service portal. The workflow then reset the password or unlocks the account and sends it back to users. Optionally, it may first request a staff confirmation via SMS. The results of such process reduce support calls and reduce enduser downtime. Admins can view and control user actions, and have more time to focus on more valuable tasks. See the ‘Active Directory reset password’ workflow in action! Share this eBook Page 6 www. ayehu.com One of the most frequent causes of unscheduled downtime for applications is a critical disk space shortfalls. In fact, insufficient disk space on one of your SQL Servers, IIS applications, or Exchange can be more disruptive than any other system or network failure. A simple issue, such as fast-growing log files that consume disk space, can cause a server to crash. If such a simple task is neglected, it can lead to an expensive downtime and hours of lost work. Disk Space is probably on every IT or system administrator’s task list, yet it continues to be a major cause of outages. Share this eBook Page 7 www. ayehu.com Monitoring and proactively maintaining your servers with disk clean-up jobs is a repetitive, time-consuming task. You can make it easy for you by just automating it as you wish. The automated alternative: An automated workflow that: • Monitors servers for low disk space • Archives, deletes or moves any logs or temp files to a different location • Sends notifications about disk space • Can be scheduled to run on regular basis, or to be initiated based on a trigger Robots cleanup pools automatically. What about your server disk space? See the ‘Free up disk space’ workflow in action! Share this eBook Page 8 www. ayehu.com Regardless whether ‘going green’ is a social trend or not, you can take simple actions to significantly reduce energy consumption and cut IT operational costs. Ford, the US-base car manufacturer, estimated that 60 percent of its global employees did not shutdown their computers at the end of a working day. Doing so, according to Ford, would save 16,000-25,000 metric tones of carbon dioxide a year and $1.2M in energy costs. Average energy savings per computer over 12 month period can reach $36. Do the math! Share this eBook Page 9 www. ayehu.com The automated energy saving alternative: A workflow that turns to standby mode all network-connected idle computers or servers, based on rules and policies. The switch to standby mode is preferred to a forced shutdown, as it eliminates complications and the need for long wait for boot up each morning. “We are saving over $2000 per day with a simple automated workflow that switches all our PCs to standby mode.” - IT Manager at a large bank See the ‘Shutdown remote computers’ workflow in action! Share this eBook Page 10 www. ayehu.com Change may be a good thing for the world, but not necessarily for the Sys admins. How many times you had some issues with users deleting or changing files then claiming they never touched them? If you have users trying to blame you for their system errors due to file changes you should start monitoring them now! You need to have monitoring on your mission critical app’ files and folders, for any change or to check data integrity. But this is not the only reason why you should do that! a hint - IT security and Compliance. Knowing that a change occurred is important as knowing who made the change in the first place. Share this eBook Page 11 www. ayehu.com The automated alternative: A pre-defined set of workflows that automate daily routine tasks on your mission-critical files and folders: • Monitor changes, file deletion, file size, last modified • File parsing and data integrity • Handle any change or errors with automated alerts notifications and remediation tasks as needed. • Delete, Move, Archive, Compress files etc… to maintain system availability See the ‘Monitor file and folder’ workflow in action Share this eBook Page 12 www. ayehu.com How many times a day do you find yourself having to restart a service remotely because of frequent changes to application configuration files, service crashes, or the need to release system memory? And there is always a backup or email service that stops working just when you are having a night out or watching your favorite game. Once again, you need to remotely connect to the server, restart and check service availability, this can take a while! Share this eBook Page 13 www. ayehu.com The automated alternative: Setup a workflow that is either scheduled or automatically triggered via alert. The workflow should: • Monitor Windows/Linux services, backup, antivirus, spooler, email, app services • Diagnose and troubleshoot events Automating service restart can reduce risk and application downtime by 90%! • Send an alert (email, SMS) in case a service failed • Perform semi-automated remediation either restart the service automatically, or wait first for a human decision received via email or SMS See how to ‘Restart services remotely’ using a workflow Share this eBook Page 14 www. ayehu.com Do you find yourself repetitively executing SQL queries to extract data for IT and business use and then emailing the results? Instead of you or a DBA becoming a bottleneck for simple, but time-consuming data retrievals in a variety of use cases, automation can help you expand your data provisioning with faster service and even let the users access to do that hands-off your databases! Share this eBook Page 15 www. ayehu.com The automated alternative: An automated workflow that connects and retrieves data from an SQL database, generates the retrieved data to an output in a text format or in excel file and sends it via email or SMS to designated user. The workflow utilizes several actions and also includes email notification to the admin on error. It can be either scheduled or run on-demand per user request (via email or SMS), without the need to involve DBA or highly skilled IT guy to do this simple task. See how you can ‘Automate SQL Query’ using a workflow Share this eBook Page 16 www. ayehu.com Many Windows servers use shared domain admin accounts to run applications. Security compliance regulations and best practices suggest that administrator account passwords used by Windows services must be changed every 30 to 90 days. Normally, the credentials used by Windows services must be manually updated for each service on every server. While the password update takes place, the service is essentially off-line. A typical manual change takes about five minutes per service. With 4-6 services per server, this amounts to ~20 minutes for changing each server manually. Share this eBook Page 17 www. ayehu.com The automated alternative: An automated workflow that: • Extracts the server and service list from a text file, CMDB or any other inventory) • Changes the service account logon password for each of the servers and services Automating the service account change process, reduces time from minutes to • Restarts the service as needed seconds, with zero • Documents the process and sends reports errors and meets • It notifies upon success or failure of password change compliance. regulation and See how you can ‘Change Service Account Password’ Share this eBook Page 18 www. ayehu.com You are probably aware of the fact that at least 70% of security events that cause enterprises losses involve inside users. The Windows system generates log data throughout its operation, so that if there's a problem with your Windows system, it is probably listed in the Event Log. The problem is that manually tracking issues across all Windows event logs can take time to find and troubleshoot. Monitoring event logs can alert you on security threats, system or app failure, create audit reports that saves you a lot of time finding historical information Share this eBook Page 19 www. ayehu.com The automated alternative: An automated process that parses the Windows event logs (application, security, system etc…) and alerts about critical events of mission-critical applications like Exchange, IIS, MS-SQL. The process will trigger an alert to notify the relevant person who can instantly respond to the event and take action with no delays. The process will also document every step in the workflow for future investigation and statistical reports. This process doesn’t have to be executed using any agent install on your machine, simply allow WMI on your remote server. See the ‘Monitor Windows event logs’ workflow in action! Share this eBook Page 20 www. ayehu.com Automating VMware tasks using scripting tools is possible but requires highly skilled personnel. Scripting tasks such as VM provisioning, deployment, creating snapshots and so on… might be more complicated than seems at first. A VM snapshot is a copy of the VM disk file (VMDK) at a certain point in time. It preserves the file system and system memory of your VM by enabling you to revert to that snapshot in case something goes wrong. Making Risky Changes If you plan to make risky changes in a VM, testing new software, take a snapshot before you begin to make those risky changes. Snapshots can be real lifesavers when upgrading or patching applications or servers. Share this eBook Page 21 www. ayehu.com So no matter if you are a newbie or PowerCLI expert, you better start automating this task: Start with creating a policy for VMware snapshot. Then design a process that creates and/or deletes snapshots. The workflow process will be triggered based on your backup policy and will: • Read a list of target virtual machines • Create a snapshot for each selected VM server in the list Snapshots can grow quite quick . As snapshots are stored on the same volume as the VM, the potential is there to run out of space quick. You should monitor for disk size and delete old snapshots as needed. • Delete snapshots so you keep space for new ones. make sure this task follows the VMware snapshots best practice See the ‘Create VMware snapshots’ workflow in action Share this eBook Page 22 www. ayehu.com It’s 7am and the phones are ringing in the IT department. The email system is down, and everyone from the CEO to the secretary is calling to say there’s a problem. Thanks to monitoring system, IT already noticed that something was wrong – but the number of calls clarifies the impact of the problem. When you don’t have Because email is a mission-critical system at your company, if the Level 1 support engineer cannot fix the problem quickly within the SLA, an escalation process should kick in. outage and long escalation process in place, minor incidents can turn into a major nightmare! IT departments, Help Desks, NOC team must have escalation processes in place at least for the mission-critical system failures. Share this eBook Page 23 www. ayehu.com The automated alternative: You should have an automated process that includes the following steps: • Automatically captures alert from monitoring system • Notifies L1 to identify the issue severity and priority and attempt to resolve it within the SLA • If problem is not resolved, escalate to L2, to fix the problem or escalate up to L3. • Close loop, update ticket, and notify relevant personnel about status and closure of that incident. Learn more about ‘Incident escalate Incidents’ process Share this eBook Page 24 www. ayehu.com Automate repetitive IT tasks in less than 5 minutes with pre-defined templates that can be customized easily to your needs.