Addmi 11-intro to-patterns

682 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
682
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • There must be no structure in the ZIP file!
  • Addmi 11-intro to-patterns

    1. 1. Introduction to Patterns How the Intelligence Works
    2. 2. Outline <ul><li>Pattern Basics </li></ul><ul><ul><li>What is a pattern? </li></ul></ul><ul><ul><li>Where do I get new patterns? </li></ul></ul><ul><ul><li>Pattern Controls </li></ul></ul><ul><li>Demystifying Patterns </li></ul><ul><ul><li>Pattern components </li></ul></ul><ul><ul><li>Patterns and the Model </li></ul></ul><ul><ul><li>Patterns and Provenance </li></ul></ul><ul><li>Simple Pattern Configuration </li></ul>
    3. 3. Pattern Basics
    4. 4. What Is a Pattern? <ul><li>A way to customise Atrium Discovery so it can infer things in the datastore based upon data collected </li></ul><ul><li>Patterns are event driven </li></ul><ul><li>Written in The Pattern Language (TPL) </li></ul><ul><li>Common software types can recognised by built-in TKU (updated monthly) </li></ul><ul><li>Some organisations need their own custom written patterns </li></ul><ul><ul><li>Extend discovery information collected </li></ul></ul><ul><ul><li>Uncommon or custom software components </li></ul></ul><ul><ul><li>Business Applications which are specific to the organization </li></ul></ul>
    5. 5. What Can Patterns Do? <ul><li>Triggered during the discovery process </li></ul><ul><ul><li>A certain OS version is found </li></ul></ul><ul><ul><li>A certain process is running </li></ul></ul><ul><li>Can take the initial information collected and use it to collect new data </li></ul><ul><ul><li>Pattern matching details within the process arguments </li></ul></ul><ul><li>May go back to the host and run other commands </li></ul><ul><ul><li>Collect configuration files </li></ul></ul><ul><ul><li>Collect inventory information from databases </li></ul></ul><ul><ul><li>Use very specific commands to discover version </li></ul></ul><ul><li>Pattern management under the discovery tab </li></ul><ul><ul><li>Discovery -> Pattern Management </li></ul></ul>
    6. 6. Where Do I Get New Patterns? <ul><li>The Knowledge Update (TKU) service </li></ul><ul><ul><li>Regular releases of a TKU </li></ul></ul><ul><li>A TKU can contain </li></ul><ul><ul><li>New Patterns </li></ul></ul><ul><ul><li>Updates to existing Patterns </li></ul></ul><ul><ul><li>Updates to End of Life Data </li></ul></ul><ul><ul><li>Updates to Hardware Reference Data </li></ul></ul><ul><li>Updated every month, with new/updated patterns </li></ul><ul><ul><li>TKU-CORE-2009-06-1.zip </li></ul></ul><ul><ul><ul><li>Core patterns for detecting Software Instances </li></ul></ul></ul><ul><ul><li>TKU-DBDETAILS-2009-06-1.zip </li></ul></ul><ul><ul><ul><li>Deep database discovery </li></ul></ul></ul><ul><ul><li>TKU-SUPPORTDETAILS-2009-06-1.zip </li></ul></ul><ul><ul><ul><li>Last dates for software support </li></ul></ul></ul>
    7. 7. Upload and Activate Patterns <ul><li>Upload a single pattern </li></ul><ul><ul><li>TPL files (.tpl) </li></ul></ul><ul><ul><li>Forms a single Pattern Package </li></ul></ul><ul><li>Upload batches of patterns </li></ul><ul><ul><li>In zip files </li></ul></ul><ul><ul><li>The zip file is the Pattern Package </li></ul></ul>
    8. 8. Controlling Patterns <ul><li>Patterns are grouped into packages, which are grouped into modules </li></ul><ul><li>Activate or deactivate patterns to change the behavior of discovery </li></ul>
    9. 9. Deactivate and Delete <ul><li>If a package or pattern is deactivated, it does not execute during Discovery </li></ul><ul><ul><li>Can reactivate to include in the next discovery run </li></ul></ul><ul><li>Deleting a pattern or package of patterns: </li></ul><ul><ul><li>all data which was inferred based upon patterns in that package is also deleted </li></ul></ul>
    10. 10. Demystifying Patterns
    11. 11. Example Pattern <ul><li>Each pattern must have a trigger </li></ul><ul><ul><li>If matched successfully this become the Primary Inference for the SI or BAI </li></ul></ul><ul><ul><li>Triggers are matched at the point of discovery </li></ul></ul>Triggered on DDD node Finds a host node in the datastore Infers a Software Instance node
    12. 12. Triggers <ul><li>Every pattern has a trigger </li></ul><ul><ul><li>Contained within the “triggers” declaration </li></ul></ul><ul><li>When a pattern “fires” the trigger declaration has been met </li></ul><ul><ul><li>Example: the host has a certain process running </li></ul></ul><ul><ul><li>Example: An SI has been created or modified </li></ul></ul>
    13. 13. Trigger Example
    14. 14. Data Model Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
    15. 15. Data Model – Provenance <ul><li>Provenance is the source of all inferred information and is automatically tracked </li></ul><ul><ul><li>Stored with Inference relationships </li></ul></ul><ul><ul><li>Referred to by the role of the evidence node </li></ul></ul><ul><li>The three core roles: </li></ul><ul><ul><li>Primary </li></ul></ul><ul><ul><li>Contributor </li></ul></ul><ul><ul><li>Associate </li></ul></ul><ul><li>Superseded relationships – marked destroyed </li></ul>
    16. 16. Data Model – Maintainer and Request <ul><li>Maintainer and Request inference relationships are a specific type of provenance </li></ul><ul><li>Every node created or update by a pattern is linked back to the pattern that is responsible for it’s maintenance: </li></ul><ul><li>Every pattern based discovery request, successful or not, is linked back to the pattern that requested it </li></ul>Business Application Pattern Maintainer Discovery Result Pattern Request
    17. 17. Data Model – Current Live Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
    18. 18. Data Model – Old Superseded Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
    19. 19. Data Model – Maintainer Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
    20. 20. SI Provenance Example
    21. 21. Host Provenance Example <ul><li>Use the “Show Provenance” button to show </li></ul><ul><li>Provenance is defined as: </li></ul><ul><ul><li>The records or documents authenticating such an object or the history of its ownership. </li></ul></ul>
    22. 22. SI Version Provenance <ul><li>How we know the full version of java? </li></ul><ul><ul><li>Click through the provenance link to the DiscoveredCommandResult node </li></ul></ul>
    23. 23. SI Version Provenance Results <ul><li>Answer: </li></ul><ul><ul><li>The java version was determined as the result of running the java command with the “-fullversion” flag </li></ul></ul>
    24. 24. Maintaining Pattern
    25. 25. Pattern Configuration
    26. 26. Why Have Configurations? <ul><li>Allows changes to behaviour using the UI </li></ul><ul><ul><li>Without pattern editing, or reactivation </li></ul></ul><ul><li>Typical uses </li></ul><ul><ul><li>Turn pattern options on/off </li></ul></ul><ul><ul><li>Update paths to find files or commands </li></ul></ul><ul><ul><li>Any other parameters </li></ul></ul>
    27. 27. Where Does it Appear? (1) <ul><li>If configuration blocks are defined in the pattern </li></ul>
    28. 28. Where Does It Appear? (2) <ul><li>On the “All pattern module configurations” page </li></ul><ul><ul><li>Discovery > Pattern Management > View Configuration of all Patterns </li></ul></ul>
    29. 29. How Changes Are Applied <ul><li>User must have correct permission to edit: </li></ul><ul><ul><li>reasoning/pattern/config </li></ul></ul><ul><ul><li>Otherwise can view readonly </li></ul></ul><ul><li>Changes take place immediately </li></ul><ul><ul><li>Be careful if discovery is running </li></ul></ul><ul><ul><li>Warning shown if this is the case </li></ul></ul>
    30. 30. <ul><li>Online Documentation: </li></ul><ul><ul><li>http://www.tideway.com/confluence/display/81/Pattern+Management </li></ul></ul><ul><ul><li>http://www.tideway.com/confluence/display/Configipedia/Schedule+and+Roadmap </li></ul></ul>Further Resources

    ×