Intigua provides a Web console and an API-driven abstraction layer that automates the full end-to-end lifecycle of the management stack in your environment, including technologies such as Splunk, Hyperic, Puppet, IBM Tivoli, HP-OM, CA Audit, BMC Patrol, Microsoft SCOM, Symantec ESM and NetBackup.

This automated lifecycle includes all day-to-day administrative tasks related to the management stack itself — from initial provisioning to ongoing updates, configuration of settings on back-end management servers, continuous health monitoring and centralized remediation.

Intigua is the only off-the shelf solution and abstraction layer for orchestrating the management stack.  It integrates with and is complementary to cloud management platforms such as vCAC, which provision pre-configured images; and scripting tools such as Chef and Puppet, which provision operating systems and applications/middleware.

Product Capabilities Overview


Capability Description
Rapid management provisioning & upgrades Provision and configure management software on both end-points and back-end management servers — enabling your stack to move at the speed of the cloud
Policy-driven configuration Ensure management stack is consistent with policies & operational best practices throughout the full lifecycle
Centralized visibility for multiple teams Eliminate the overhead and delays of multiple management silos
REST API Control your management stack programmatically for the Software-Defined Data Center (SDDC)
Virtual containers Gain faster and more reliable installs by eliminating physical installation of agents
Sandboxing Ensure SLAs for Tier 1 apps
Centralized access to agent log files Eliminate delays and overhead to gain root access to servers
Auditing & logging Log all activities for operations and compliance
Adaptive networking Automatically select the optimum path to end-points; eliminate firewall exceptions
vSphere Integration Auto-discover end-points to ensure they’re properly configured at all times
LDAP/Active Directory Integration Enterprise single sign-on (SSO) with role-based access control (RBAC).
Integrated security Authentication, authorization and encryption (including API usage)

Product Capabilities Detail

Rapid management provisioning & upgrades

Policy All cropped -- 08-12-13

Automation for the Entire Management Stack: Intigua automatically provisions & configures the management stack, including configuring settings on both server end-points and back-end management servers (Splunk, Hyperic, etc.).

policy-driven-configuration


Enable self-service IT by rapidly configuring & updating the management stack for new or existing VMs on-demand – based on policies executed by Intigua’s abstraction layer and policy engine. Complete the provisioning process by verifying connectivity between agents and back-end management servers, and automatically configuring management settings (such as daily or weekly backup schedules) on back-end management servers based on group membership.

Back to Top


POLICY-DRIVEN CONFIGURATION

Picture3large

Policy-Based Automation: Management packages are deployed based on policies associated with groups of servers, which can be tagged dynamically.

The speed of the cloud requires configurations to be driven by automated policies rather than by manual processes and custom scripts.  Intigua enables groups of servers to be configured consistently and automatically based on corporate policies for SLAs, security and operational best practices.  This can be driven either via externally-driven policies (contained in cloud management platforms or CMDBs, for example) or via internal policies stored internally to the Intigua system.

Intigua configures the entire management stack — on both server end-points and back-end management servers (such as settings for daily backup schedules) — supporting both agent-based and agentless solutions.

Back to Top


Centralized visibility for multiple teams

Continuous real-time visibility & control: The Intigua console and REST API provide continuous real-time visibility into the health status of all deployed virtual agents, across diverse management products. Agents can also be centrally started, stopped, and managed via the console or API.

Continuous real-time visibility & control: The Intigua console and REST API provide continuous real-time visibility into the health status of all deployed virtual agents, across diverse management products. Agents can also be centrally started, stopped, and managed via the console or API.

Eliminate management silos by providing centralized, real-time visibility and control for all your management technologies in a single unified portal, without requiring separate logins to each vendor-proprietary console.  Ensure that access to specific management products and servers is only available to authorized personnel via role-based access control (RBAC).  Supports newer organizational models based on a single vertical “Cloud Ops”  team as well as traditional structures based on multiple horizontal teams.

Agents are your eyes and ears into the state of your infrastructure.  When an agent stops working, you want to know before your users call the help desk with a performance or uptime issue that can impact SLAs.  Intigua’s virtual container enables continuous, real-time monitoring of all agent processes; alerts can be accessed via the Intigua console or REST API and sent to standard NOC dashboards via SNMP.  The container also enables centralized start/stop control over all agents, plus auto-remediation capabilities such as automatically re-starting agent processes (and related processes such as WMI) upon agent failure.

Back to Top


REST API

Integrate Intigua with cloud management platforms (vCAC, CloudStack, OpenStack, etc.) as well as workflow automation systems (vCO, HP-OO, etc.) and scripting tools (Chef, Puppet, etc.).   Enable your management stack to be controlled programmatically in the same way that virtualized servers, storage and networking are controlled today in the Software-Defined Data Center (SDDC) — via “infrastructure as code.”

Back to Top


Virtual containers

Virtual Agents are "zero install" agents that deliver the same functionality as their physical counterparts but don't make changes to the guest OS on which they are running, reducing time and risk to deploy them.

Virtual Agents are “zero install” agents that deliver the same functionality as their physical counterparts but don’t make changes to the guest OS on which they are running, reducing time and risk to deploy them.

Deploy and upgrade management agents more reliably — with fewer manual configuration and verification processes — by eliminating the need for invasive physical installations of agents.  Instead, agents are encapsulated and deployed as a single virtual container “sandbox” file (similar to a VMDK).  The container acts as a self-contained execution environment — with its own virtual file system, virtual registry, virtual service manager, etc. — reducing risk because all changes are contained within the protected sandbox which is decoupled and isolated from the underlying guest OS.  It also speeds deployment by eliminating installation-related reboots.

vAgents provide all of the same functionality as traditional, physically installed agents, such as registering with their back-end management servers and accessing the physical guest OS when required (for example, to scan the file system).  Roll-backs are easily accomplished by simply deleting the single virtual container file.

This approach also supports a best practice of maintaining fewer numbers of lightweight OS templates, that don’t need to be updated constantly — because management components are only added to VMs when they’re provisioned (based on policies), as incremental layers to base templates.

Back to Top


sandboxing

agent-sandboxing

Protecting performance & uptime for critical servers: Administrators can, for the first time, enforce centralized policies for CPU throttling, memory and I/O usage. They can also define proactive management functions such as auto-restarting agents upon failure and custom script-based actions, eliminating the need for manual intervention.

Protect critical servers and Tier 1 apps from misbehaving or overly-demanding agents by encapsulating agents in protective sandboxes and throttling agent resource consumption (CPU, memory) so it stays within defined limits.

Back to Top


Centralized access to agent log files

centralized-access-2ims

View agent log files without remote login: Administrators with appropriate permissions can easily view agent log files without the need to perform a remote login or request root access to servers, which significantly speeds troubleshooting operations.

Diagnosing operational issues – such as errors that occur when starting an agent, processing data, or shutting down the agent — usually requires examining agent log files to view informational and error messages.  This causes delays due to the need to gain approvals and schedule time with system administrators who can provide root access to servers.  Intigua allows IT to view agent log files on a read-only basis, from a central console.  This eliminates the need to login to remote servers, which speeds up remediation while minimizing risk to critical servers.

Back to Top


Auditing & logging

auditing-logging

Logs & alerts: All deployments, configuration changes and alerts are logged for operational support and compliance.

Capture a complete audit trail of all changes and other activities related to administration of the management stack.  Intigua supports Syslog for collection of Intigua logs in centralized repositories, while SNMP integration allows log messages to be raised as SNMP alerts and trapped by standard enterprise monitoring consoles.

Back to Top


Adaptive networking

Provides a choice of connectivity options between the Intigua server and managed end-points, powered by an adaptive networking scheme that selects the optimal channel and helps eliminate connectivity issues due to blocked firewall ports and other configuration issues.  Choices include: encrypted communication via the hypervisor channel (e.g., VMware VIX); CIFS/SMB or SSH for file transfer operations; and HTTP/HTTPS for standard client-server communication. Network options are prioritized according to customer preference, with a fallback mechanism that tries secondary or tertiary protocols when the primary scheme is unavailable. F or example, if a vAgent deployment via CIFS to a VM in the DMZ fails due to firewall rules, it is automatically retried via the hypervisor’s network channel.

Back to Top


vSphere Integration

Intigua integrates with VMware vCenter to auto-discover VMs and communicate directly with them via VMware’s secure communication channel and VMware Tools.  This enables servers to be automatically configured with the right management stack as soon as they are provisioned, based on the server type or group.

Back to Top


LDAP/Active Directory Integration

Single sign-on (SSO) support and auto-discovery of domain users and groups.  Designated users login to Intigua using domain credentials and are subject to role-based access as configured by the Intigua administrator.

Back to Top


Integrated Security

All communications throughout the Intigua system are secured from tampering, decryption and outside inspection.  Authentication and authorization are implemented via a built-in, role-based access scheme for local users as well as via integration with LDAP/Active Directory.  API commands can only be executed by specified users; enabling a new user for API access generates their API key, which must be valid and passed with each API request; API keys may be re-generated or disabled by administrators at any time.  For more details, please refer to the Intigua System Architecture & Security Guide

Back to Top