SlideShare une entreprise Scribd logo
Service Operation
IT Infrastructure Library Versi 3
• Sumber:
“An Introductory Overview of ITIL v3” version
1.0, UK Chapter of itSMF
Isi Publikasi Inti (Core) ITIL v3
Fungsi “Service Operation”
• The purpose of Service Operation is to deliver
agreed levels of service to users and customers,
and to manage the applications, technology and
infrastructure that support delivery of the
services.
• It is only during this stage of the lifecycle that
services actually deliver value to the business,
and it is the responsibility of Service Operation
staff to ensure that this value is delivered.
Keseimbangan Yg Harus Dijaga
• internal IT view versus external business view
• stability versus responsiveness
• quality of service versus cost of service
• reactive versus proactive activities
Tanda-tanda “Sehat”
• Many organizations find it helpful to consider
the “operational health” of services.
• This identifies “vital signs” that are critical for
execution of Vital Business Functions.
• If these are within normal ranges, the system or
service is healthy.
• This leads to a reduction in the cost of
monitoring, and enables staff to focus on areas
that will lead to service success
Event Management Process
• An event is a change of state that has
significance for the management of a
configuration item or IT service
• Merupakan indikasi:
▫ something is not functioning correctly, leading to
an incident being logged.
▫ normal activity, or a need for routine intervention
such as changing a tape
Event vs Monitoring
• Event management depends on monitoring, but
it is different.
▫ Event management generates and detects
notifications,
▫ monitoring checks the status of components even
when no events are occurring.
Penanganan Pasca “Event”
• After an event has been detected it may lead to
an Incident, Problem or Change, or it may
simply be logged in case the information is
needed.
• Response to an event may be automated or may
require manual intervention. If
• actions are needed then a trigger, such as an
SMS message or an incident being
• automatically logged, can alert support staff.
Incident Management Process
• “unplanned interruption to an IT service, or a
reduction in the quality of an IT service.”
• Failure of a configuration item that has not yet
impacted service is also an incident.
• Fungsi Incident Management:
▫ restore normal service as quickly as possible, and
▫ to minimize the adverse impact on business operations
• Incidents are often detected by event management,
or by users contacting the service desk.
• Incidents are categorized to identify who should
work on them and for trend analysis, and they are
prioritized according to urgency and business
impact.
Contoh Pengelompokan Insiden
Eskalasi Insiden
• If an incident cannot be resolved quickly, it may
be escalated.
• Functional escalation passes the incident to a
technical support team with appropriate skills;
hierarchical escalation engages appropriate
levels of management.
• After the incident has been investigated and
diagnosed, and the resolution has been tested,
the Service Desk should ensure that the user is
satisfied before the incident is closed.
Pengguna
Contoh Eskalasi Masalah Dari User
1
3
Komunikasi lewat
Komputer
(misal: webcam)
Komunikasi lewat
telepon
Tier 1
Operator
Tier 2
Remote
Tier 3
Kunjungan
Local Vendor
Tier 4
Pengiriman
Operator 1
Operator 2
Operator n
Ahli Bidang TI
Ahli Bidang SI
Ahli Bidang
proses bisnis
AhliSI/
Perwakilan
diKanw
TI
TIK
il
Kirim Ahli SI/TI
dari TIK
AND/
OR
Pengiriman ke Pusat
melalui Tier 3 terlebih
dahulu
Pengiriman ke Pusat
tanpa melalui Tier 3
Request Fulfillment Process
• a request from a user for:
▫ information or
▫ advice, or
▫ a standard change, or
▫ access to an IT service
• Kegunaan “Request Fulfillment Process”:
▫ enable users to request and receive standard services;
▫ to source and deliver these services;
▫ to provide information to users and customers about
services and procedures for obtaining the services;
▫ And to assist with general information, complaints and
comments.
• All requests should be logged and tracked.
• The process should include appropriate approval before
fulfilling the request
Access Management Process
• The purpose of the Access Management process is to
provide the rights for users to be able to access a
service or group of services, while preventing access
to non-authorized users
• Access Management is concerned with identity
(unique information that distinguishes an
individual) and rights (settings that provide access
to data and services).
• The process includes:
▫ verifying identity and entitlement,
▫ granting access to services,
▫ logging and tracking access, and
▫ removing or modifying rights when status or roles
change.
Problem Management Process
• A problem is a cause of one or more incidents.
• The cause is not usually known at the time a
problem record is created, and the problem
management process is responsible for further
investigation.
• The key objectives:
▫ to prevent problems and resulting incidents from
happening,
▫ to eliminate recurring incidents and
▫ To minimize the impact of incidents that cannot be
prevented.
• Bisa menggunakan teori manajemen mutu, seperti
Pareto analysis dan Ishikawa diagram!
“80% masalah disebabkan oleh 20% sumber”
Fishbone (Ishikawa) DIagram
1
8
• Gunakan P
mengidenti
dan akar m
ost-It untuk
fikasi masalah
asalah
• Gambarkan fishbone pada
lembar kerja (flipchart) dan
tempelkan Post-It tadi.
• Tidak perlu mengisi semua
cabang
Akar
masalah
Cakupan Problem Management
• diagnosing causes of incidents,
• Determining the resolution, and
• ensuring that the resolution is implemented
• maintains information about problems
• Records appropriate workarounds and
resolutions.
Workarounds are documented in a Known Error
Database, which improves the efficiency and
effectiveness of Incident Management.
Common Service Operation Activities
• monitoring and control: to detect the status
of services and CIs and takeappropriate
corrective action
• console management/operations bridge: a
central coordination point for monitoring and
managing services
• management of the infrastructure: storage,
databases, middleware, directory services,
facilities/data centre etc.
Service Desk Function
• The Service Desk provides a single central point
of contact for all users of IT.
• The Service Desk usually logs and manages all
incidents, service requests and access requests
and provides an interface for all other Service
Operation processes and activities.
Tanggung jawab Service Desk
• logging all incidents and requests, categorizing
and prioritizing them
• first-line investigation and diagnosis
• managing the lifecycle of incidents and requests,
escalating as appropriate and closing them when
the user is satisfied
• keeping users informed of the status of services,
incidents and requests.
Service desk tidak harus berarti IT help desk! Di beberapa
tempat, service desk bahkan merupana sistem pelayanan
publik dari sebuah kementrian yang berbasis TI.
Penempatan struktur “Service Desk”
• local service desk: physically close to the users
• centralized service desk: allows fewer staff to
deal with a higher volume of calls
• virtual service desk: staff are in many locations
but appear to the users to be a single team
• follow the sun: Service Desks in different time
zones give 24-hour coverage by passing calls to a
location where staff are working.
IT Operations Management Function
• IT Operations Management is responsible for the
management and maintenance of the IT
infrastructure required to deliver the agreed level of
IT services to the business.
• Ada 2 jabatan penting di fungsi ini:
▫ IT Operations Control is usually staffed by shifts of
operators who carry out routine operational tasks.
They provide centralized monitoring and control,
usually from an operations bridge or network
operations centre.
▫ Facilities Management is responsible for management
of data centres, computer rooms and recovery sites.
Facilities Management also coordinates large-scale
projects, such as data centre consolidation or server
▫ consolidation.

Contenu connexe

Similaire à 05. itil v3 service operation 2020.pptx

ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
Happiest Minds Technologies
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
Technology considerations
Technology considerationsTechnology considerations
Technology considerations
MusTufa Nullwala
 
pm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptxpm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptx
Jayz41
 
Naveen Kumar Srivastav
Naveen Kumar SrivastavNaveen Kumar Srivastav
Naveen Kumar Srivastav
Naveen Srivastav
 
Dit yvol4iss06
Dit yvol4iss06Dit yvol4iss06
Dit yvol4iss06
Rick Lemieux
 
ITIL service design
ITIL service designITIL service design
ITIL service design
Rasha Ragab
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operation
Muhammad Zamzani
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)
Darshan Khant
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library)
Nghia Le
 
Chapter 2: Service Desk
Chapter 2: Service DeskChapter 2: Service Desk
Chapter 2: Service Desk
itsmIEP
 
Goh Phik Li
Goh Phik LiGoh Phik Li
Goh Phik Li
Phik Li Goh
 
Anshuman Lohani _Operations
Anshuman Lohani _OperationsAnshuman Lohani _Operations
Anshuman Lohani _Operations
Anshuman Lohani
 
Professional and Motivated
Professional and MotivatedProfessional and Motivated
Professional and Motivated
Nykki Humphrey
 
Intro-to-ITIL-WatITis2012.pptx
Intro-to-ITIL-WatITis2012.pptxIntro-to-ITIL-WatITis2012.pptx
Intro-to-ITIL-WatITis2012.pptx
Manoj603126
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
Ronald Bartels
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
Muhannad Kalbouneh
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
ITIL Indonesia
 
Problem Manager
Problem ManagerProblem Manager
Problem Manager
Sakshi Mahajan
 
Resume
ResumeResume
Resume
Ramu Shastry
 

Similaire à 05. itil v3 service operation 2020.pptx (20)

ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Technology considerations
Technology considerationsTechnology considerations
Technology considerations
 
pm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptxpm_training_-_process_tool_v1.4.pptx
pm_training_-_process_tool_v1.4.pptx
 
Naveen Kumar Srivastav
Naveen Kumar SrivastavNaveen Kumar Srivastav
Naveen Kumar Srivastav
 
Dit yvol4iss06
Dit yvol4iss06Dit yvol4iss06
Dit yvol4iss06
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operation
 
IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)IT Infrastructure @ Essar Oil Ltd.(ITIL)
IT Infrastructure @ Essar Oil Ltd.(ITIL)
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library)
 
Chapter 2: Service Desk
Chapter 2: Service DeskChapter 2: Service Desk
Chapter 2: Service Desk
 
Goh Phik Li
Goh Phik LiGoh Phik Li
Goh Phik Li
 
Anshuman Lohani _Operations
Anshuman Lohani _OperationsAnshuman Lohani _Operations
Anshuman Lohani _Operations
 
Professional and Motivated
Professional and MotivatedProfessional and Motivated
Professional and Motivated
 
Intro-to-ITIL-WatITis2012.pptx
Intro-to-ITIL-WatITis2012.pptxIntro-to-ITIL-WatITis2012.pptx
Intro-to-ITIL-WatITis2012.pptx
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
 
Problem Manager
Problem ManagerProblem Manager
Problem Manager
 
Resume
ResumeResume
Resume
 

Dernier

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Dernier (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

05. itil v3 service operation 2020.pptx

  • 2. • Sumber: “An Introductory Overview of ITIL v3” version 1.0, UK Chapter of itSMF
  • 3. Isi Publikasi Inti (Core) ITIL v3
  • 4. Fungsi “Service Operation” • The purpose of Service Operation is to deliver agreed levels of service to users and customers, and to manage the applications, technology and infrastructure that support delivery of the services. • It is only during this stage of the lifecycle that services actually deliver value to the business, and it is the responsibility of Service Operation staff to ensure that this value is delivered.
  • 5. Keseimbangan Yg Harus Dijaga • internal IT view versus external business view • stability versus responsiveness • quality of service versus cost of service • reactive versus proactive activities
  • 6. Tanda-tanda “Sehat” • Many organizations find it helpful to consider the “operational health” of services. • This identifies “vital signs” that are critical for execution of Vital Business Functions. • If these are within normal ranges, the system or service is healthy. • This leads to a reduction in the cost of monitoring, and enables staff to focus on areas that will lead to service success
  • 7. Event Management Process • An event is a change of state that has significance for the management of a configuration item or IT service • Merupakan indikasi: ▫ something is not functioning correctly, leading to an incident being logged. ▫ normal activity, or a need for routine intervention such as changing a tape
  • 8. Event vs Monitoring • Event management depends on monitoring, but it is different. ▫ Event management generates and detects notifications, ▫ monitoring checks the status of components even when no events are occurring.
  • 9. Penanganan Pasca “Event” • After an event has been detected it may lead to an Incident, Problem or Change, or it may simply be logged in case the information is needed. • Response to an event may be automated or may require manual intervention. If • actions are needed then a trigger, such as an SMS message or an incident being • automatically logged, can alert support staff.
  • 10. Incident Management Process • “unplanned interruption to an IT service, or a reduction in the quality of an IT service.” • Failure of a configuration item that has not yet impacted service is also an incident. • Fungsi Incident Management: ▫ restore normal service as quickly as possible, and ▫ to minimize the adverse impact on business operations • Incidents are often detected by event management, or by users contacting the service desk. • Incidents are categorized to identify who should work on them and for trend analysis, and they are prioritized according to urgency and business impact.
  • 12. Eskalasi Insiden • If an incident cannot be resolved quickly, it may be escalated. • Functional escalation passes the incident to a technical support team with appropriate skills; hierarchical escalation engages appropriate levels of management. • After the incident has been investigated and diagnosed, and the resolution has been tested, the Service Desk should ensure that the user is satisfied before the incident is closed.
  • 13. Pengguna Contoh Eskalasi Masalah Dari User 1 3 Komunikasi lewat Komputer (misal: webcam) Komunikasi lewat telepon Tier 1 Operator Tier 2 Remote Tier 3 Kunjungan Local Vendor Tier 4 Pengiriman Operator 1 Operator 2 Operator n Ahli Bidang TI Ahli Bidang SI Ahli Bidang proses bisnis AhliSI/ Perwakilan diKanw TI TIK il Kirim Ahli SI/TI dari TIK AND/ OR Pengiriman ke Pusat melalui Tier 3 terlebih dahulu Pengiriman ke Pusat tanpa melalui Tier 3
  • 14. Request Fulfillment Process • a request from a user for: ▫ information or ▫ advice, or ▫ a standard change, or ▫ access to an IT service • Kegunaan “Request Fulfillment Process”: ▫ enable users to request and receive standard services; ▫ to source and deliver these services; ▫ to provide information to users and customers about services and procedures for obtaining the services; ▫ And to assist with general information, complaints and comments. • All requests should be logged and tracked. • The process should include appropriate approval before fulfilling the request
  • 15. Access Management Process • The purpose of the Access Management process is to provide the rights for users to be able to access a service or group of services, while preventing access to non-authorized users • Access Management is concerned with identity (unique information that distinguishes an individual) and rights (settings that provide access to data and services). • The process includes: ▫ verifying identity and entitlement, ▫ granting access to services, ▫ logging and tracking access, and ▫ removing or modifying rights when status or roles change.
  • 16. Problem Management Process • A problem is a cause of one or more incidents. • The cause is not usually known at the time a problem record is created, and the problem management process is responsible for further investigation. • The key objectives: ▫ to prevent problems and resulting incidents from happening, ▫ to eliminate recurring incidents and ▫ To minimize the impact of incidents that cannot be prevented. • Bisa menggunakan teori manajemen mutu, seperti Pareto analysis dan Ishikawa diagram!
  • 17. “80% masalah disebabkan oleh 20% sumber”
  • 18. Fishbone (Ishikawa) DIagram 1 8 • Gunakan P mengidenti dan akar m ost-It untuk fikasi masalah asalah • Gambarkan fishbone pada lembar kerja (flipchart) dan tempelkan Post-It tadi. • Tidak perlu mengisi semua cabang Akar masalah
  • 19. Cakupan Problem Management • diagnosing causes of incidents, • Determining the resolution, and • ensuring that the resolution is implemented • maintains information about problems • Records appropriate workarounds and resolutions. Workarounds are documented in a Known Error Database, which improves the efficiency and effectiveness of Incident Management.
  • 20. Common Service Operation Activities • monitoring and control: to detect the status of services and CIs and takeappropriate corrective action • console management/operations bridge: a central coordination point for monitoring and managing services • management of the infrastructure: storage, databases, middleware, directory services, facilities/data centre etc.
  • 21. Service Desk Function • The Service Desk provides a single central point of contact for all users of IT. • The Service Desk usually logs and manages all incidents, service requests and access requests and provides an interface for all other Service Operation processes and activities.
  • 22. Tanggung jawab Service Desk • logging all incidents and requests, categorizing and prioritizing them • first-line investigation and diagnosis • managing the lifecycle of incidents and requests, escalating as appropriate and closing them when the user is satisfied • keeping users informed of the status of services, incidents and requests. Service desk tidak harus berarti IT help desk! Di beberapa tempat, service desk bahkan merupana sistem pelayanan publik dari sebuah kementrian yang berbasis TI.
  • 23. Penempatan struktur “Service Desk” • local service desk: physically close to the users • centralized service desk: allows fewer staff to deal with a higher volume of calls • virtual service desk: staff are in many locations but appear to the users to be a single team • follow the sun: Service Desks in different time zones give 24-hour coverage by passing calls to a location where staff are working.
  • 24. IT Operations Management Function • IT Operations Management is responsible for the management and maintenance of the IT infrastructure required to deliver the agreed level of IT services to the business. • Ada 2 jabatan penting di fungsi ini: ▫ IT Operations Control is usually staffed by shifts of operators who carry out routine operational tasks. They provide centralized monitoring and control, usually from an operations bridge or network operations centre. ▫ Facilities Management is responsible for management of data centres, computer rooms and recovery sites. Facilities Management also coordinates large-scale projects, such as data centre consolidation or server ▫ consolidation.