BMC Discovery 11.3: Getting Started
BMC Discovery 11.3: Getting Started
BMC Discovery 11.3: Getting Started
3
Getting started
Key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Discovering cloud services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Virtual Appliance with Agentless Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Data Provenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Exhaustive Pattern Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Related topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
BMC Discovery components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The Community Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Configipedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Find a particular product, storage system, load balancer, or other network device . . . . . . . . . . . . . . . . . . . . . . . . 10
Solve your problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Community Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
What's next on Configipedia? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Active Directory Windows proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
application map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
blackout window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
BMC Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
bonding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Collaborative Application Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
command-line utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Credential Windows proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
data aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Data Integration Point (DIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
datastore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Directly Discovered Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
development appliance (on the customer site) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Discovery Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
External events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
functional component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Functional Component Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
inferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Learn the basics of the Key concepts Understand key concepts and core functionality so that you can begin using BMC Discovery right away.
BMC Discovery product. (see page 5)
Start using BMC End-to-end Run your first basic discovery without credentials, examine the results, and configure credentials for
Discovery. process (see page complete discovery. Schedule discovery runs and prevent discovery of specified IP addresses or ranges.
16)
Learn more about the Next steps Learn about the way that you can further enhance the discovery of your IT infrastructure and business
capabilities of BMC applications such as patterns and TKUs, deep database discovery, and Collaborative Application Mapping.
Discovery.
Key concepts
This section contains the following information important to understanding BMC Discovery:
Process overview
BMC Discovery is a data center discovery solution that automatically discovers data center inventory, configuration and
relationship data, and maps applications to the IT infrastructure. BMC Discovery establishes the foundation for improving
IT processes and productivity by providing timely and actionable insight to make informed decisions in IT service
management, asset management and infrastructure/operations management. Benefits include reducing the number of
incidents caused by change, reducing the time taken to isolate the root cause, reducing the time taken to prepare for
audits, preventing audit penalties, prioritizing incidents based on business impact, and optimizing data center hardware
and software.
Find It – Guarantee data accuracy and reduce costs to collect data center inventory, configuration and
relationship data via an automated discovery process.
Manage It – Leverage rich data to improve IT processes and productivity by replacing guesswork with data-driven
decisions.
Optimize It – Add business context to IT management processes by understanding how the data center
infrastructure supports business applications.
BMC Discovery can discover multi-cloud environments thanks to BMC’s partnership with both Microsoft Azure and
Amazon Web Services (AWS). BMC Discovery takes an agnostic approach to representing the multi-cloud assets and
relationships. It can map assets and their dependencies to represent data center, public cloud, and private cloud
environments. BMC performs this deep discovery in a cloud-friendly manner, leveraging APIs and agentless protocols.
This allows for a holistic view of the entire IT environment, including hybrid application deployments.
Data Provenance
Data accuracy you can verify and trust. For an automated discovery tool to be trusted and accepted by the user
community, it must provide transparency into how the data was obtained. BMC Discovery’s Provenance feature shows
the actual command that was executed, the output of the command, and the timestamp when it happened. There’s no
searching through log files – all this information is available right in the UI.
Provenance provides indisputable evidence why this data can be trusted and thus speeds adoption of the data into IT
processes.
Related topics
Key concepts
Getting started
Discovery Engine
Information about your organization's hardware and software is obtained by the Discovery Engine. The Engine uses
credentials, which are held in a secure encrypted vault, to log into target hosts using variety of methods, such as SSH,
Telnet, WMI and SNMP. Once logged in, the Discovery Engine executes commands, the results of which are returned and
stored in the datastore as directly discovered data (DDD). Windows discovery uses an external proxy running on a
dedicated windows server to log into and scan Windows hosts in the estate.
Reasoning
The Discovery Engine is supported by Reasoning which intelligently infers information about hosts and programs from
the DDD returned. The process of adding DDD to the datastore causes Reasoning to execute patterns against the DDD.
Each pattern represents knowledge about particular software or hardware and Reasoning uses this knowledge to create
more detailed "inferred" data. Inferred data is the representation of the scanned IT environment and is stored in the
datastore. The provenance of each item of inferred data is also stored meaning that when examining an inferred entity in
the UI, you can examine the information which was used to create it.
Patterns can be updated, either through monthly Technology Knowledge Update (TKU) releases, or by writing new
patterns using The Pattern Language (TPL).
Datastore
The datastore is the database in which the DDD and inferred data is stored. Data written to the datastore is instantly
indexed allowing you to search for items of interest using simple keywords in the UI. In addition to the DDD and inferred
data mentioned, the datastore holds TKU information, patterns, operational data and some configuration data.
The datastore uses a graph model meaning that it represents data as nodes connected to each other with relationships.
This is more suited to modeling the complex relationships in an IT environment than a relational database.
CMDB Synchronization
CMDB synchronization provides a means of keeping data in the BMC Atrium CMDB continuously synchronized with
information discovered by BMC Discovery. The BMC Discovery data model is different from the Common Data Model
(CDM) used in the CMDB, so the synchronization mechanism transforms the required information from one data model
to the other.
You should start application modeling from anywhere that is interesting in the context of the application you are
modeling. The best way of doing this is the search box in the top right of the UI. Enter the name or other detail of
something you know to be in the application, and explore the data from there. When you see what you are looking for,
start modeling.
The models produced with start anywhere application modeling are simple to create and work on the basis of data that
has already been discovered from you network, data that is held in the BMC Discovery datastore. This does not mean
that the models are static, rather, they update automatically to reflect the current data. So, if you scan the application
and a new component of the application is discovered, it is automatically linked in to the existing components, and
reflected when you view the model again. If the new component is of a type that you have excluded from the model, it is
still in the datastore, but not included in the application model.
Clustering
Clustering, also known as Big Discovery, enables you to discover and get usable results from even the largest Data
Centers in the shortest time possible with the help of clusters. A cluster consists of two or more coordinated BMC
Discovery machines, one of which is in control of the group and is referred to as the coordinator. Additional machines
can be added to the cluster at any time. When you do so, the system spreads the existing data out amongst all the
machines evenly, in order to maximize performance and utilization of each machine in the cluster. This can take a while
to happen, but the system is fully usable while it happens: you can do discovery and browse the data.
You can configure clusters with fault tolerance meaning that if a machine fails, it can be removed and replaced, without
any consequent loss of data, and without interrupting normal operation. Managing your cluster has been made as simple
as possible. Use any machine in the cluster to manage all others: update TKUs, add credentials and scans, and even
upgrade the product itself from a single place. Regardless of data center size or complexity, BMC Discovery delivers a
refreshed view of your data center as often as needed. Clustering delivers powerful, actionable data center insight in the
shortest possible time:
Related topics
BMC Discovery
You are periodically reminded of the terms of this agreement by a pop up dialog. The dialog can be dismissed by clicking
the Close button.
Terms and Conditions - opens a page which shows the license terms of the Community Edition.
Additional limitations
In addition to the limitation on discovery, the following features are disabled:
Clustering
Multi-Appliance Consolidation
CMDB Synchronization
Integration SDKs
REST API
Productized Integrations
LDAP integration
Single Sign On
Mainframe discovery
Configipedia
Some information on Configipedia is accessible to BMC customers only. For a user to identify themselves as a
BMC customer, we require them to be a registered community member and to enter their BMC Support ID.
On restricted pages, BMC customers who fulfill the above criteria will see the full text of the page. Other users
will see a limited version of the page.
Configipedia™ Contains:
See the Latest TKU and OS Upgrade documentation for the the latest Technology Knowledge Update (TKU), Extended
Find a particular product, storage system, load balancer, or other network device
Look for information about a particular product, publisher or pattern. Find out what BMC Discovery uses to find that
product and what information it can give you.
Check out the lists of supported network devices, printers, SNMP managed devices, storage systems and load balancers.
Read more...
Read more...
Community Knowledge
BMC Discovery is designed to be expanded. Go here to see how you can benefit from the knowledge of the wider BMC
Discovery community, and how you can add to that knowledge!
Read more...
Read more...
application map
A dynamic, automatically maintained representation of application structures in your environment. An effective
application map identifies the key relationships between how your business operates and the infrastructure that
supports it. It also becomes the initial, crucial part of Service Impact Analysis by maintaining accurate service models for
BSM.
blackout window
A configuration that enables you to prevent access to the CMDB during sensitive times. During a blackout window, all
processing of the CMDB synchronization queue is paused, and processing cannot resume until the window ends.
BMC Discovery
Automates the process of populating the BMC Atrium Configuration Management Database (BMC Atrium CMDB) by
exploring IT systems to identify hardware and software, and then creating configuration items (CIs) and relationships
from the discovered data.
bonding
Enables you to join two NICs as a single physical device so that they appear as one interface. This is usually performed to
provide failover capabilities or load balancing. Also known as teaming.
command-line utility
A tool that you can run on a command-line interface to configure BMC Discovery by obtaining information from specific
systems.
component
A general term that is used to mean one part of something more complex. For example, a computer system might be a
component of an IT service, and an application might be a component in an application server.
consolidation
The playback of scanned data from multiple scanning appliances to a single consolidation appliance.
data aging
Discovered data is regarded as valid at the time of its last successful scan. The nature of IT infrastructure means that
frequent, minor changes to configurations, hosts, and software are common. Consequently, discovered data can be
regarded as becoming less current with the passing of time. In BMC Discovery when data passes a certain configurable
aging threshold, it is destroyed.
datastore
All data used by the BMC Discovery system is held in an object database. The datastore treats data as a set of objects and
the relationships between them.
Discovery
The part of the BMC Discovery system that communicates with host systems, and obtains information from them.
Discovery is driven by Reasoning which infers detailed information about hosts and programs and populates the
datastore. See also Reasoning Engine.
Discovery endpoint
The endpoint of a single Discovery access, the IP address of the discovery target.
Discovery Run
A scan of one or more Discovery endpoints, specified as an IP address, address, or range of addresses that are scanned
as an entity. For each Discovery Run, a node is created that records information such as the user who started the run,
the start and end time, and so forth.
External events
An event received from an external system used to trigger a pattern.
functional component
A node created by patterns based on Functional Component Definitions. The functional component is a single block of
information that combines similar functionality into logical groups that help application owners and data consumers
discover applications at discovery time.
host
A node in the model which represents a physical or virtual computer system including information about its OS and its
physical or virtual hardware. A host is sometimes referred to as an OSI (Operating System Instance). See Glossary.
ID
A unique identifier for a node (also known as a node ID). For a BMC Discovery node, an internal identifier that is used as
an index by the database. It is a binary identifier represented in hexadecimal format. An ID is not intended to be human-
readable; it is designed to be used by the datastore (for example, 4e4fd2c2ae4ccf123272d8446e486f7374. It identifies a
stored node, not the item that the node represents. If the node corresponding to an entity is destroyed, and a new node
is subsequently created for it, the new node will have a different ID, but it will have the same key.
inferencing
The act of drawing conclusions about data based on what is known about other data.
key
A unique identifier for the entity that a node represents. Unlike the node ID, the key of a node is persistent.
kind
The type of a node, such as Host or Person. Also referred to as node kind.
lifecycle
The conditions that describe when an entity comes into existence to when it no longer exists. For nodes in the BMC
Discovery model, the lifecycle stages are:
Current — Describes nodes that exist in the model. BMC Discovery contains evidence that nodes currently exist
in your environment.
Destroyed — Describes nodes that have been marked as destroyed (yet remain in the model).
Purged — Describes destroyed nodes that have been purged from the model. Purging a node indicates that it no
longer exists in the model and it has been removed from the datastore.
logical host
A hardware or software host that is contained in a virtual machine (software), a collaborating host in a cluster
(hardware) or a blade in a blade server (hardware).
Model rule
Rules used in visualizations and Start anywhere application modeling.
node
An object in the BMC Discovery datastore that represents an entity in the environment. Nodes have a kind, such as
'Host', and a number of named attributes. Nodes can be connected to other nodes using relationships. Most node kinds
have a key that uniquely identifies the entity in the environment.
node ID
See ID (see page 13).
node kind
The type of a node, such as a Host or Software Instance. The default set of nodes and their associated attributes and
relationships are defined in the BMC Discovery taxonomy.
pattern
In BMC Discovery, the Pattern Language (TPL) creates and maintains the model. Each pattern in TPL has a
corresponding pattern node in the model, which is related to the nodes that the pattern maintains. Patterns are used to
extend the functionality of the reasoning engine.
production hours
The core business hours corresponding to a specific time zone. Typically, Discovery scans are scheduled at non-
production hours to avoid any potential impact on the BMC Discovery end users, or target critical systems when they are
the busiest, or schedule any CMDB synchronization black-out windows to avoid impacting the AR System and CMDB end
users.
provenance
Meta-information describing how inferred information came to exist. It is generated as Reasoning builds and maintains
the model. Provenance information is stored as relationships in the model.
Reasoning Engine
An event-based engine that orchestrates and drives the population of different parts of the data model through a series
of rules that make up the core functionality of the BMC Discovery product. It is extensible through the use of patterns.
relationship link
The connection between two roles in a relationship.
RemQuery
A utility that enables you to execute commands on remote Windows hosts in a similar way to the commercial PsExec
utility.
When BMC Discovery requests a discovery action using the RemQuery utility, RemQuery copies a binary (itself) to the
ADMIN$ share on the target system, and then installs and runs that binary as a service. Each of these steps requires Local
Administrator permissions. The service is then used to execute the discovery scripts. At the end of the scan, the service
is stopped and uninstalled, but the executable is left in the ADMIN$ share. If a copy already exists, it is not copied again.
removal
The concept of taking data out of the model using one or more of the BMC Discovery lifecycle methodologies (Aging,
Destroyed or Purged).
role
The responsibility or actions of the relationship between two nodes. A node with a relationship to another node acts in a
role in the relationship, which indicates its part of the relationship. For example, in a 'Dependency' relationship, one node
has the role 'Dependant' and the other has the role 'DependedUpon'.
Rules Engine
Another term used to describe the Reasoning Engine. The Rules Engine processes the rules that are generated from
Patterns, in order to maintain the model. The Rules Engine is an Event Condition Action (ECA) engine.
rules
Small fragments of executable code that run in the Rules Engine in BMC Discovery. Rules are generated from patterns
when they are activated. Additional core rules are distributed with BMC Discovery.
scanner file
A scanner file is a plain text file that is used to simulate the discovery of a system that is unreachable, or one that you are
not permitted to scan. You create a scanner file by running the standard discovery commands on a host and saving the
output. Only the standard discovery commands are run on the host; information that is discovered by patterns is not
available.
seed data
In Collaborative Application Mapping, a small sample of host names that are involved in the application or component
names. The goal of finding seed data is to provide just a few pieces of information to the application owner (typically
communicated through e-mail or instant message) that are clues to help determine what to start investigating.
taxonomy
The template defining the nodes, attributes, and relationships used by BMC Discovery and stored in the datastore. The
BMC Discovery taxonomy also defines how much of the data model is represented in the user interface.
total duration
The time it takes to discover and process the data from the target (the duration between the start and end times). See
also Session Establishment Duration (see page 16) and Total Discovery Duration (see page 16).
trigger
The conditions under which a pattern executes. Triggers correspond to the creation, confirmation, modification, or
destruction of a node.
Windows proxy
A discovery proxy that is installed on a Windows system, on which the discovery process is controlled by a Linux-based
appliance (known as the master). See Active Directory Windows proxy (see page 11) and Credential Windows proxy
(see page 12).
End-to-end process
The end-to-end process for getting started with BMC Discovery is as follows:
Installing the Windows proxy manager and proxies (see page 24)
Next steps
The BMC Discovery appliance can be configured to use https rather than http. If you then specify a login URL which uses
http, you are automatically redirected to the https page. See HTTPS Configuration for more information.
1. Enter the BMC Discovery URL in your browser's address bar. It might look like the following example:
http://ip-address/
Where ip-address is the address of the virtual machine, which is displayed when you log in to the virtual
machine hosting the BMC Discovery using VMware console. If you received the login URL from your
administrator, it might have the host name instead of the IP address.
If your administrator has configured single sign on, you are redirected to the single sign on login page. After you
have successfully logged in, you are redirected back to the BMC Discovery UI.
If you are unable to log in to BMC Discovery using BMC Remedy SSO, use the local login URL to access the BMC
Discovery UI and log in as a local user.
http://ip-address/ui/LocalLogin
2. Enter the username and password provided by your system administrator, or if this is the first time that anyone
has accessed the appliance, use the following default values:
Password: system
3. If you are using the Community Edition, agree to the terms and conditions of the Community Edition license by
selecting the I accept the Terms and Conditions of use check box. To review the license, click the Terms and
Conditions link.
4. Click Login.
6. Change the system user password, to do this, complete the following fields:
7. Change the password for the command line user root. This can only be done if the default password has not
been changed. A message is displayed if the password has been changed
Verify password - enter the new root password again to verify it.
8. Change the password for the command line user tideway. This can only be done if the default password has not
been changed. A message is displayed if the password has been changed
Verify password - enter the new tideway password again to verify it.
9. It is strongly recommended that you secure the credential vault with a passphrase. If you choose not to, clear the
Set Passphrase checkbox. Otherwise:
Verify password - enter the new credential vault passphrase again to verify it.
The main BMC Discovery home page displays (see Viewing the Home page).
By default, the command line passwords that you enter must have at least one lowercase letter, one uppercase letter,
one numeric character, and one special character. They must also contain a minimum of six characters, at least 4
characters must have been changed against the last password, and there must be no more than three repeated
characters.
Related topics
End to end process
HTTPS configuration
The BMC Discovery appliance is designed and built with security in mind; a description of the security considerations and
the types of measure taken are described in the Security section.
Related topics
Enabling HTTPS
Security
To start discovery
5. Select IP Address. You can also perform a cloud scan here by selecting the Cloud option, though you must have
configured cloud credentials and enabled cloud discovery.
Note
As you enter text, the UI divides it into pills, discrete editable units, when you enter a space or a comma.
According to the text entered, the pill is formatted to represent one of the previous types or presented as
invalid.
Invalid pills are labeled with a question mark. You can also paste a list of IP addresses or ranges into this
field. If any pills are invalid, a message stating the number of invalid pills is displayed above the range field.
Clicking the link applies a filter which shows only invalid pills which you can then edit or delete. The filter
can be removed by clicking clear in the Showing n of n label below the Range field. There is no paste
option on the context sensitive (right click) menu.
Warning: You cannot paste a comma-separated list of IP address information into the Range field in
Firefox. This can crash the browser. You can use a space separated list without any problems.
• To edit a pill, click the pill body and edit the text.
• To delete a pill, click the X icon to the right of the pill, or click to edit and delete all of the text.
• To view the unformatted source text, click the source toggle switch. The source view is useful for
copying to a text editor or spreadsheet. Click the source toggle switch again to see the formatted pill
view.
Underneath the entry field is a filter box. Enter text in the filter box to only show matching pills.
7. Select Sweep Scan level for the discovery run. In sweep scan mode, the discovery is trying to determine what is
at each endpoint in the scan range.
8. Enter a label for the discovery run. Where the discovery run is referred to in the UI, it is this label that is shown.
9. For multitenant deployments, select the company name to assign to the discovery run. This drop-down list is
only displayed if multitenancy has been set up. If (No company) is displayed, or a company name that you were
expecting is missing, refresh the list by clicking Lookup Companies on the CMDB Sync. See multitenancy for more
information about this feature.
Next steps
Related topics
End to end process
System login
Active Directory proxy—Runs as an Active Directory user, and uses those user credentials to connect to
Windows hosts within the Active Directory domain. Credentials are not stored in the BMC Discovery credential
vault.
Credential proxy—Runs as a local administrator user. Credentials are stored in the BMC Discovery credential
vault and are provided to the proxy as required.
A single Windows host may run both types of proxy. To handle complex Active Directory environments, it is possible to
run multiple Active Directory proxies as different users. The Active Directory proxy can also be used in a legacy Windows
Workgroup environment to connect to workgroup members using the proxy's workgroup credentials.
The BMC Discovery Proxy Manager (Proxy Manager) is used to manage the running proxies and their configuration, and
to establish secure connections with approved BMC Discovery appliances. Installation of the Proxy Manager and
Windows proxies is described in Adding Windows proxies.
1. To show the reports that are available on the discovered data, click Explore > Reports.
2. To view the Possible Host Endpoints, click Possible Host Endpoints from the Discovery Diagnostics section.
5. Continue based on the dominant OS class. This enables you to model a larger proportion of your environment in
the first instance, and then return to the other OS class for more complete modeling.
If UNIX is the predominant OS class in the scanned environment, you can continue scanning by entering
credentials to gather more information. Ideally, these credentials are valid for a range of computers and
have sufficient rights to run system-level commands to discover richer data. Adding a credential is the
same whether you add it for UNIX systems or Windows systems accessed through a Credential Windows
proxy. You do not need to add credentials for systems accessed through the Active Directory Windows
proxy because it uses the permissions of the user it was installed as. For more information, see Adding
device credentials.
6. If Windows is the predominant OS class, you must download and install a BMC Discovery Windows proxy to
perform Windows-specific discovery tasks. Go to Installing the Windows proxy manager and proxies (see page
24).
Related topics
End to end process
4. Click Explore > Data to display the reports that are available on the discovered data.
Comparing the results to the Discovery reports page after the credential free scan (see page 25), you can see
that significantly more information was obtained on the later scan.
Now you can examine the hosts that BMC Discovery has discovered.
Destroying hosts
If you have reached the maximum number of devices (60) permitted in the Community Edition of BMC Discovery,
discovery stops and you cannot start any new discovery runs. Ideally, you should only target discovery runs at the devices
that you are interested in scanning.
If you need to carry out further work and scan additional hosts, you must destroy some existing ones so that you can
start discovery again.
3. Select the hosts that you want to destroy by clicking the selection box at the left of the host row. You can select
multiple hosts. You can also select all hosts by clicking the selection box at the left of the heading row.
4. Click Destroy.
5. Click OK to destroy the hosts, or click Cancel to return to the hosts page without destroying any hosts.
1. Create a credential or access key in the tool you use to access the cloud provider. For Amazon Web Services
(AWS), this is the AWS Identity and Access Management (IAM) console.
2. Create a cloud credential in BMC Discovery using the credential or access key you just created.
These steps are described in greater detail in Discovering Amazon Web Services. The following procedure describes
performing the cloud discovery run once you have configured ad tested your credentials.
3. To add a scheduled cloud run, select Scheduled and fill in the scheduling information as with normal scheduled
discovery runs.
4. Select Cloud.
5. Select the provider from the drop-down list. Select Amazon Web Services
6. Select the appropriate cloud credential. If none are available, you must add one.
7. Select the region to scan, for example, for Amazon Web Services, US East (N. Virginia). You can also select all
regions by clicking the All button.
8. Click OK.
Examine results
Once you have scanned, you can examine the results. The screen below shows a discovered VM running in AWS.
Scanning the hosts assumes that the appliance or proxy has network access to hosts running in the cloud, for example,
using a VPN.
Public IP addresses do not respond to ICMP pings. You must disable "Ping before scanning", otherwise all
scans are dropped reporting no response.
Scheduled
3. Enter the information for the exclude range in the fields, using the following table as a guide.
Field name Details
Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, this label is shown.
4. Click OK.
The Excluded Ranges tab is displayed with the new exclusion.
If you specify a scheduled exclude range that blocks 65535 IP addresses or more of a scan range, new IP addresses from
that scan are not added to the scan queue until at least one of the blocked IP addresses is allowed to scan.
As you enter text, the UI divides it into pills (discrete editable units) when you enter a space or a comma. According to the text
entered, the pill is formatted to represent one of the previous types or presented as invalid.
Pills are not supported in Opera.
Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, this label is shown.
Start Based on the selected frequency of the scheduled exclude, you are presented with the following start options:
• Weekly by days of week—You are provided with buttons for each day and drop-down menus for the start time in hours and
minutes. You can select one or more days from the day buttons.
• Once per week—You are provided with drop-down menus to select the day of the week and the start time in hours and minutes.
• Monthly by day of month—You are provided with drop-down menus to select the day of the month and the start time in hours and
minutes.
• Monthly by week of month—You are provided with drop-down menus to the select the week, the day of the week, and the start
time in hours and minutes.
For example, to start a scheduled weekly exclude which starts on Friday at 19:30 hrs and continues until Saturday, do the following:
End Based on the selected frequency of the scheduled exclude, you are presented with the following end options:
• Weekly by days of week—You are provided with the drop-down menus to select the end time in hours and minutes.
• Once per week—You are provided with the drop-down menus to select the day of the week and time to end a scheduled exclude.
• Monthly by day of month—You are provided with menus to select the day of the month and time to end a scheduled exclude.
• Monthly by week of month—You are provided with the drop-down menus to the select the number of days and the time within
which a scheduled exclude must end.
For example, to end a scheduled weekly exclude which starts on Friday at 19:30 hrs and continues until 21 hours 30 minutes on
Saturday (see the example for the Start field in the previous row), you will select 21 hours and 30 minutes from the time drop-down
menu.
From the Exclude Ranges tab of the Discovery Status page, select individual, multiple, or all exclude ranges to enable or
disable. If the exclude range is in progress, it is canceled if you make and apply any changes.
Related topics
Performing a discovery run
Scheduling discovery
You can choose times and frequencies for performing discovery, whether the discovery is for normal or cloud scans. The
cloud scan is different from other scan types as it simply retrieves information from the cloud provider API. To schedule
a discovery run, perform the following steps:
2. Select Scheduled.
The dialog displays Frequency, Targeting, Ping, Start, and End menus.
3. Click OK.
The Scheduled Runs tab is displayed with the new scheduled discovery run.
The table below describes explanation of all the fields that are required either for normal scan or cloud scan:
Label Enter a label for the discovery run. Where the discovery run is referred to in the UI, it is this label that is shown.
Timing Select the timing for the discovery run. This is either:
Scheduled — Enter information for the scan to occur at any time and for a specified amount of time .
Targeting Select the target for the discovery run. This is either:
Note
As you enter text, the UI divides it into pills, discrete editable units, when you enter a space or a comma. According to the text entered, the pill is
formatted to represent one of the previous types or presented as invalid.
Invalid pills are labeled with a question mark. You can also paste a list of IP addresses or ranges into this field. If any pills are invalid, a message
stating the number of invalid pills is displayed above the range field. Clicking the link applies a filter which shows only invalid pills which you can
then edit or delete. The filter can be removed by clicking clear in the Showing n of n label below the Range field. There is no paste option on the
context sensitive (right click) menu.
Warning: You cannot paste a comma-separated list of IP address information into the Range field in Firefox. This can crash the browser. You can
use a space separated list without any problems.
• To edit a pill, click the pill body and edit the text.
• To delete a pill, click the X icon to the right of the pill, or click to edit and delete all of the text.
• To view the unformatted source text, click the source toggle switch. The source view is useful for copying to a text editor or spreadsheet.
Click the source toggle switch again to see the formatted pill view.
Underneath the entry field is a filter box. Enter text in the filter box to only show matching pills.
Level Select the level for the discovery run. This is either:
Full Discovery — Retrieves all the default info for hosts, and complete full inference.
Sweep Scan — Performs a sweep scan, trying to determine what is at each endpoint in the scan range. It will attempt to login to a device
to determine the device type.
Ping Select a ping for the discovery run to be performed. This can be:
• Use default
• Ping before scanning
• Do not ping before scanning
Public Select Allow patterns to scan in this range if you want patterns to be able to trigger scans on endpoints in this range.
Frequency Select a frequency for the discovery run to be performed. This can be:
• Every n hours
• Weekly by days of week
• Once per week
• Monthly by day of month
• Monthly by week of month.
Start Based on the selected scan frequency, you are presented with different options to start scheduled scans. Discovery must be running at this
time.
• Every n hours: You are provided with drop down menus to choose the frequency of the scan (every 1, 2, 3, 4, 6, 8, and 12 hours), start times at
minutes past the hour, and the hours after which the scan should start. For example, if a scan is scheduled to occur every two hours, then the
starting hours may be 00, 02, 04, and so on, or 01, 03, 05, and so on.
• Weekly by days of week: You are provided with buttons for each day and drop down menus for the start time in hours and minutes. You can
select one or more days from the day buttons. The selected buttons appear with a Yellow border.
• Once per week: You are provided with drop down menus to select the day of the week and the start time in hours and minutes.
• Monthly by day of month: You are provided with drop down menus to select the day of the month and the start time in hours and minutes.
• Monthly by week of month: You are provided with drop down menus to the select the week, the day of the week, and the start time in hours
and minutes.
For example, to start a scheduled weekly discovery run which starts on Friday at 19:30 hrs and continues until Saturday, you will do the
following:
3. From the time drop down menu, select 19 hours and 30 minutes.
End You can choose end a scheduled scan when it is completed by selecting when completed.
Alternatively, use the available option to end the scan which is based on the selected scan frequency. If the duration of the end time expires
before the scan has completed, then the scan is suspended until the next scheduled time that the scan occurs. The scan resumes from the point
where it was previously suspended.
• Every n hours: This scan type does not have a scheduled end time; they run to completion.
• Weekly by days of week: You are provided with the drop down menus to select the end time in hours and minutes.
• Once per week: You are provided with the drop down menus to select the day of the week and time to end the scan.
• Monthly by day of month: You are provided with the menus to select the day of the month and time to end the scan.
• Monthly by week of month: You are provided with the drop down menus to the select the number of days and the time within which the scan
must end.
For example, to end a scheduled weekly discovery run which starts on Friday at 19:30 hrs and continues until 21 hours 30 minutes on Saturday
(see the example for the Start field above), you will select 21 hours and 30 minutes from the time drop down menu.
Following are the additional fields required for cloud scan discovery:
Provider Specify the type of cloud provider such as Amazon Web Services or Microsoft Azure.
Credentials The list populates the credentials corresponding to the selected cloud provider.
Next steps
For more information, see Performing a discovery run.
Related topics
Excluding ranges from discovery
admin
appmodel
discovery
Use the system user only for configuration tasks which require system privileges.
2. In the Security Policy section of the Administration page, ensure the "Disabled Accounts can be reactivated"
option is set to Yes
3. In the Security section of the Administration page, click the Users icon.
5. On the Set Password page, enter the new password in each text entry field and click Apply.
6. After you have changed the passwords for each user, log off from the system user account by clicking the logout
icon at the top right of the page.
BMC, BMC Software, and the BMC Software logo and the BMC marks are the exclusive properties of BMC Software, Inc. and are registered or may be registered
in the U.S and in other countries. BladeLogic and other BladeLogic marks are the exclusive properties of Bladelogic, Inc. and are registered or may be registered in
the U.S and in other countries. All other trademarks or registered trademarks are the property of their respective owners.
Cisco Nexus®, Cisco IMC Web API® are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Compuware, the Compuware logo and all other Compuware Software product and service names are owned by Compuware Corporation and are registered or
pending registration in the US Patent and Trademark Office or in the trademark offices of other countries.
AIX, DB2 Universal Database, and IBM are trademarks or registered trademarks of International Business Machines Corporation in the United States, other
countries, or both.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
UNIX® is the registered trademark of The Open Group in the US and other countries.
The information included in this documentation is the proprietary and confidential information of BMC Software, Inc., its affiliates, or licensors. Your use of this
information is subject to the terms and conditions of the applicable End User License agreement for the product and to the proprietary and restricted rights
notices included in the product documentation.
Click here for the provisions described in the BMC License Agreement and Order related to third party products or technologies included in the BMC product.