Skip to content

Virtualization and server management

With i-doit, you can document and manage physical servers, virtual machines and virtualization environments centrally and comprehensibly.
hosts, VMs, clusters, resources and dependencies are mapped in a structured manner and are available at all times.

rating-stars-transparent-white 4.7/5 on Capterra | 2,000+ satisfied customers

use-case-single-virtualization-server-management-header

The 6 most important functions for virtualization and server management

icon-configuration-management-database-lt Centralized management of physical servers

Physical servers are centrally documented and managed with hardware, location, operating system and role.

 
icon-book-open-lt Mapping of virtualization environments

Virtualization platforms such as VMware, Hyper-V or Proxmox are mapped in a structured manner - including hosts, clusters and resources.

 
icon-databases-lt Virtual machine management

Virtual machines are clearly assigned to hosts and clusters, including configuration, operating system and status.

 
icon-gears-lt Depiction of dependencies and relationships

Relationships between servers, VMs, storage, networks and services are clearly documented.

 
icon-action-repeat-lt Status, maintenance and life cycle management

The status, maintenance, changes and life cycles of servers and virtual machines remain traceable at all times - from commissioning to ongoing operation and decommissioning.

 
icon-book-lt Evaluations and planning Server and virtualization data can be specifically evaluated and used for capacity planning, audits and decisions.  

Automatic inventory of servers, VMs and clusters via discovery or monitoring tools

Why is an automatic inventory of servers, VMs and clusters crucial?

In dynamic IT environments, server, virtualization and cluster structures are constantly changing. If these changes are documented manually, outdated inventory lists and information gaps quickly arise.
i-doit automatically records servers, virtualization hosts, virtual machines and other components via connected discovery or monitoring tools. Changes during operation are recognized and updated in the CMDB in a structured manner - without manual maintenance.

Advantages:

  • Significantly less manual effort for documentation and maintenance
  • Up-to-date database instead of outdated inventory lists
  • Changes to systems are recognized and traceable at an early stage
  • Reliable basis for operations, capacity planning and audits
  • Higher data quality thanks to automated and consistent recording

use-case-servermanagement-jdisc

Documentation of virtualization hosts and clusters

How do you keep track of virtualization hosts and clusters?

Without central documentation, it is difficult to understand the relationships between hosts, clusters, storage and networks. This makes operation, planning and error analysis more difficult.
i-doit documents virtualization hosts and clusters in a structured and centralized way. Cluster affiliations, resources and basic configurations are recorded and logically linked. Dependencies become transparently visible.

Advantages:

  • Clear overview of all virtualization hosts and clusters
  • Transparent display of dependencies and resources
  • Faster orientation in the event of faults or maintenance
  • Better planning of capacities and expansions
  • Reliable documentation for operation and testing
use-case-server-management-cluster

Management of virtual machines and Docker containers

How do you manage virtual machines and containers centrally and transparently?

Without central documentation, it is difficult to understand the relationships between hosts, clusters, storage and networks. This makes operation, planning and error analysis more difficult.
i-doit documents virtualization hosts and clusters in a structured and centralized way. Cluster affiliations, resources and basic configurations are recorded and logically linked. Dependencies become transparently visible.

Advantages:

  • Clear overview of all virtualization hosts and clusters
  • Transparent display of dependencies and resources
  • Faster orientation in the event of faults or maintenance
  • Better planning of capacities and expansions
  • Reliable documentation for operation and testing
use-case-server-hostaddress-virtualserver-prod1

System and emergency manuals stored centrally

How do you provide system and emergency manuals centrally?

System and emergency documentation is often spread across files, wikis or emails. In the event of a malfunction, this costs valuable time and makes collaboration more difficult.
i-doit enables the central storage of system and emergency manuals directly on servers, VMs, clusters or services. Operating instructions, restart plans and technical descriptions are always available and clearly assigned.

Advantages:

  • Quick access to all system-relevant information
  • Clear instructions in the event of a fault or emergency
  • Reduced downtimes thanks to structured documentation
  • Reliable basis for audits and emergency tests
  • Better handover to new employees or service providers
use-case-cmdb-emergency-manual

Document and assign software and licenses centrally

How do you reliably document and manage software and licenses?

Without a central overview of software and licenses, risks quickly arise due to over- or under-licensing. Runtimes and assignments remain unclear, especially during migrations or changes.
i-doit documents installed software and associated licenses centrally and assigns them clearly to servers, VMs or containers. License models, versions and terms are monitored and those responsible are informed in good time.

Advantages:

  • Clear overview of deployed software and licenses
  • Automatic notifications when licenses expire
  • Clear assignment to servers, VMs and containers
  • Less risk from over- or under-licensing
  • Better preparation for audits and manufacturer checks
  • Reliable basis for planning and cost control
use-case-lisence
Contact (1)

Book your personal live demo

Our i-doit team will be happy to take the time to advise you personally on your application.

Suitable add-ons

Our add-ons for modular function expansion

add-on-flows-box
i-doit Add-on Flows

Create powerful automations without programming knowledge, simply start them on a schedule or manually at the touch of a button.

See more

add-on-smart-bundle-box
i-doit Add-on Smart Bundle

Get 4 powerful add-ons for the price of 2! Flows, Documents, Analysis and Forms.

See more

add-on-documents-box
i-doit Add-on Documents

Automatically create documents as PDFs with daily updated data (e.g. hardware handover certificate or disaster recovery plan).

View more

add-on events box
i-doit Add-on Events

Automate the operation of your data center with the latest data from the CMDB. Events trigger and control further processes.

See more

add-on-maintenance-box
i-doit Add-on Maintenance

The maintenance add-on supports the planning, execution and documentation of maintenance and inspections. Maintenance intervals, dates and responsibilities are managed centrally and linked directly to the respective devices, installations or systems.

View more

add-on-api-box
i-doit Add-on Api

With the API add-on, data can be automatically read, written and updated in i-doit. Perfect for integrations with ticket systems, inventory tools or your own automations.

See more

add-on-analysis-box
i-doit Add-on Analysis

Add-on for powerful data analysis. Calculate service costs, check the data quality of the CMDB and carry out failure simulations.

See more

add-on-forms-box
i-doit Add-on Forms

Easily create forms that you can make available to users for simplified data entry. Example: Allow users to document hardware or goods themselves.

View more

add-on-isms-box
i-doit Add-on ISMS

Set up an information security management system with risk analysis and management in accordance with ISO 27001.

View more

add-on-checkmk2-box
i-doit Add-on Checkmk2

Integrate the Checkmk2 monitoring system into i-doit. This supports comparisons between TARGET and ACTUAL from CMDB and monitoring.

View more

add-on-trigger-box
i-doit Add-on Trigger

Store buttons with your own triggers and start IT processes directly from i-doit - e.g. the automatic deployment of a virtual machine.

See more

add-on viva2-box
i-doit Add-on VIVA2

With this add-on, you can create an information security management system (ISMS) in accordance with the BSI's IT baseline protection methodology.

View more

Related use cases

i-doit offers companies comprehensive functions and interfaces

Connection of third-party systems (API)
Connection of third-party systems (API)

You connect ticket systems, automation tools and monitoring systems such as Zammad or n8n directly via API.

View use case

Workplace Management
Workplace Management

You document workstations with devices, peripherals and responsible persons and control handovers and returns centrally.

View use case

Audit management
Audit management

You control audits centrally, plan audits, document results and automatically generate audit reports.

View use case

Auditing and reporting
Auditing and reporting

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

View use case

Automatic notifications for deadlines and guarantees
Automatic notifications for deadlines and guarantees

You are automatically informed about deadlines, licenses and guarantees and can keep an eye on the status and need for action.

View use case

Automatic network inventory
Automatic network inventory

You automatically record clients, servers, printers and peripherals and document hardware, software and QR codes centrally.

View use case

Authorization and access management
Authorization and access management

You manage users, accounts and rights centrally, document responsibilities and control access per system, including LDAP and group connections.

View use case

Data protection incident management
Data protection incident management

You document data protection incidents in compliance with the GDPR, assess risks and derive measures centrally.

View use case

Document management
Document management

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

View use case

Creation of restart plans
Creation of restart plans

You create technical and organizational restart plans with automatic calculation of the restart times.

View use case

GAP analysis
GAP analysis

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

View use case

Incident management and ticketing
Incident management and ticketing

You link tickets to affected devices, analyze causes via dependencies and monitor SLAs centrally.

View use case

Inventory with QR
Inventory with QR codes

You record and uniquely identify assets using QR and barcodes, create individual labels and take a mobile inventory of devices using the app and printer tool.

View use case

Concepts, emergency and system manuals
Concepts, emergency and system manuals

You document emergency concepts, system manuals, backups and disaster recovery centrally and comprehensibly.

View use case

Life cycle management
Life cycle management

They document maintenance and lifecycles, make changes traceable, automate processes and keep an eye on responsibilities and warranty periods.

View use case

Supplier management
Supplier management

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

View use case

Action management
Action management

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

View use case

Monitoring live data integration
Monitoring live data integration

You integrate monitoring data directly into the IT documentation, see asset failures and link statuses to the change history.

View use case

Network and cabling management
Network and cabling management

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

View use case

Onboarding / offboarding of employees
Onboarding / offboarding of employees

You control entries and exits, including device handovers, returns and proof of instruction, centrally...

View use case

Risk management
Risk management

i-doit enables protection requirement analyses with automatic inheritance into the infrastructure, risk assessment and tracking of measures.

View use case

Security incident management
Security incident management

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

View use case

Software and license management
Software and license management

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

View use case

Location management
Location management

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

View use case

Contract management
Contract management

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

View use case

Virtualization and server management
Virtualization and server management

You keep an eye on servers, VMs, dependencies and certificates centrally and automatically synchronized.

View use case