{"id":5619,"date":"2015-07-11T16:47:55","date_gmt":"2015-07-11T06:47:55","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=5619"},"modified":"2015-07-11T16:47:55","modified_gmt":"2015-07-11T06:47:55","slug":"the-lazy-admin","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2015\/07\/11\/the-lazy-admin\/","title":{"rendered":"The lazy admin"},"content":{"rendered":"<p>Are you an industriously busy backup administrator, or are you lazy?<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5621\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk.jpg\" alt=\"Asleep at desk\" width=\"600\" height=\"600\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk.jpg 600w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk-150x150.jpg 150w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk-300x300.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk-144x144.jpg 144w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/07\/bigStock-Sleeping-at-Desk-50x50.jpg 50w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>When I started in IT in 1996, it wasn&#8217;t long before I joined a Unix system administration team that\u00a0had an\u00a0ethos which has guided me throughout my career:<\/p>\n<blockquote><p>The best sysadmins are lazy.<\/p><\/blockquote>\n<p>Even more so than system administration, this applies to anyone who works in data protection. The best people in data protection are lazy.<\/p>\n<p>Now, there&#8217;s two types of lazy:<\/p>\n<ul>\n<li><strong>Slothful lazy<\/strong> \u2013 What we normally think of when we think of &#8216;lazy&#8217;; people who just don&#8217;t really do much.<\/li>\n<li><strong>Proactively lazy<\/strong> \u2013 People who\u00a0do as much as they can in advance in order to have more time for the unexpected (or longer term projects).<\/li>\n<\/ul>\n<p>If you&#8217;d previously thought I&#8217;d gone nuts suggesting\u00a0I&#8217;ve spent my career trying to be lazy (particularly when\u00a0colleagues read my blog), you&#8217;ll hopefully be having that &#8220;ah&#8230;ha!&#8221; moment realising I&#8217;m talking about being proactively lazy. This was something I learnt in 1996 \u2013 and\u00a0almost twenty years down\u00a0the track I&#8217;m pleased to see whole slabs of the industry (particularly infrastructure and\u00a0data protection) are finally following suit and allowing me to openly talk about the virtues of being lazy.<\/p>\n<p>Remember that embarrassingly enthusiastic dance Steve Ballmer was recorded doing years and years ago at a Microsoft conference while he chanted\u00a0&#8220;<a href=\"https:\/\/www.youtube.com\/watch?v=Vhh_GeBPOhs\" target=\"_blank\">Developers! Developers! Developers!<\/a>&#8221; A proactively lazy data protection administrator chants &#8220;Automate! Automate! Automate!&#8221; in his or her head throughout the day.<\/p>\n<p>Automation is the key to being\u00a0operationally\u00a0lazy\u00a0yet\u00a0proactively efficient.\u00a0It&#8217;s also exactly what\u00a0we see being the focus of DevOps, of\u00a0cloud service providers, and massive scale\u00a0converged infrastructure. So what are the key areas for automation? There&#8217;s a few:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.enterprisesystemsbackup.com\/blog\/what-is-a-zero-error-policy\/\" target=\"_blank\">Zero error policies<\/a> \u2013 I&#8217;ve been banging the drum about zero error policies for over a decade now. If you want the TL;DR summary, a zero error policy is the process of automating the review of backup results such that the only time you get an alert is\u00a0when a failure happens. (That also\u00a0means treating any new &#8220;unknown&#8221; as\u00a0a failure\/review situation until\u00a0you&#8217;ve included it\u00a0in the\u00a0review process.)<\/li>\n<li><a href=\"https:\/\/nsrd.info\/blog\/2015\/03\/16\/service-catalogues-and-backups\/\" target=\"_blank\">Service Catalogues <\/a>and Policies \u2013\u00a0Service catalogues allow standard offerings that\u00a0have been well-planned,\u00a0costed and associated clearly with an architected system. Policies are the\u00a0functional structures that enact the service catalogue approach and allow you to\u00a0minimise the effort (and therefore\u00a0the risk of human error) in configuration.<\/li>\n<li>Visual Dashboards \u2013\u00a0Reports are OK, notifications are useful, but visual dashboards are absolutely\u00a0the best at providing an &#8220;at a\u00a0glance&#8221; view of a system. I may joke about Infographics from time to time, but there&#8217;s no questioning we&#8217;re a visual species \u2013 a lot of information can be pushed into a few simple glyphs or coloured charts*. There&#8217;s something to be said for a big tick to indicate everything&#8217;s OK, or\u00a0an equally big X to indicate you need to dig down a little to see what&#8217;s not working.<\/li>\n<\/ul>\n<p>There&#8217;s potentially a\u00a0lot of work\u00a0behind\u00a0achieving that \u2013 but there are shortcuts.\u00a0The fastest way to achieving it is sourcing solutions that have already been built. I still see the\u00a0<em>not-built-here<\/em> syndrome plaguing some IT environments,\u00a0and\u00a0while sometimes it may have a good rationale, it&#8217;s\u00a0an indication of that perennial problem of companies thinking <a href=\"http:\/\/unsane.info\/your-business-isnt-unique\/\" target=\"_blank\">their use cases are unique<\/a>. The combination of the business, the specific employees,\u00a0their specific customers and the market may make each business potentially unique, but the core functional IT requirements (&#8220;deploy infrastructure&#8221;, &#8220;protect data&#8221;, &#8220;deploy applications&#8221;, etc.) are standard\u00a0challenges. If\u00a0you can spend 100% of the time building it yourself from the ground up to do exactly what you need, or you can get something that does 80% and all you have to do is extend the last 20%, which is going to be faster?\u00a0Paraphrasing Isaac Newton:<\/p>\n<blockquote><p>If I have seen further it is by standing on the shoulders of giants.<\/p><\/blockquote>\n<p>As you can see, being lazy properly is hard\u00a0work \u2013 but it&#8217;s an inevitable requirement of the pressures businesses now place on IT to be adaptable, flexible and\u00a0<em>fast<\/em>. The\u00a0proactively lazy data protection service provider can step back out of the way of business functions and offer services\u00a0that are both readily deployable and reliably work, focusing his or her time on\u00a0automation and real problem solving rather than all that boring\u00a0repetitive\u00a0busyness.<\/p>\n<p>Be proudly lazy: it&#8217;s the best way to work.<\/p>\n<p>&#8212;<br \/>\n* Although I think we have to be careful about\u00a0building too many\u00a0simplified reports around\u00a0colour without considering the usability to the colour-blind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you an industriously busy backup administrator, or are you lazy? When I started in IT in 1996, it wasn&#8217;t&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1133,17,20],"tags":[95,1250,749,1237],"class_list":["post-5619","post","type-post","status-publish","format-standard","hentry","category-best-practice","category-policies","category-scripting","tag-administration","tag-policies","tag-policy","tag-proactive"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1sD","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=5619"}],"version-history":[{"count":8,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5619\/revisions"}],"predecessor-version":[{"id":5628,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5619\/revisions\/5628"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=5619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=5619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=5619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}