SlideShare a Scribd company logo
Applications, Firewalls & 
Routers 
Extending discovery to network devices and their relationships to your 
applications. 
Presented by Wes Fitzpatrick – wfitzpatrick@cssdelivers.com
ADDM Current Discovery Capability – pros and cons 
• ADDM is very good at mapping: 
• Application 2 software dependencies 
• Software 2 software, host dependencies 
• Host 2 host, neighbouring switch dependencies 
• Technical and operational dependencies 
• Not so good for: 
• Switch and router neighbours 
• Firewall neighbours 
• Load balancer neighbours 
• Logical or functional application dependencies
Application Architecture as seen by ADDM
Application Architecture as seen by the Organisation 
https://rmohan.com/?p=436
Business Cases 
• Multinational retailer 
• 1500 OSIs comprised of Windows, Unix, AS400s, Exadata and Netezza. 
• Application stack included F5 load balancers and AS400 messaging 
subsystems. 
• Tier 1 Investment bank 
• 10,000 OSIs 
• Decentralised ADDM deployments to Americas, EMEA, APAC datacentres. 
• BAM not used – single focus on remote firewalled connections.
Getting Load Balancers into the Model 
• SNMP Only 
• Creates a NetworkDevice node 
• No direct relationship to SIs or BAIs. 
• Solution 
• Trigger on a web server SI type 
• Create an link through DiscoveryAccess and update an attribute on the SI 
• Trigger on NetworkDevice 
• Create an SI for “F5 Load Balancer” 
• Reverse lookup DiscoveredNetworkConnection for port to process mapping 
• All communicating software!
Getting Firewalls into the Model 
• Can be discovered (unsupported device) 
• Custom TPL needed 
• SNMP? 
• No direct way to link to a Host or Router
Getting Firewalls into the Model 
http://www.xpresslearn.com/networking/design/network-design-series-ii/# 
• Bank Environment
Getting Firewalls into the Model 
• Bank Environment 
• No TPL required (no application models) 
• No 3rd party software available 
• Scanning additional domains/zones not permitted 
• NMAP not permitted 
• SNMP login to firewalls/routers not permitted 
• Traceroute? Maybe…. 
"Hop-count-trans" by Stagira - http://commons.wikimedia.org/wiki/File:Hop-count-trans.png#mediaviewer/File:Hop-count-trans.png
Getting Firewalls into the Model cont… 
• Solution 
• Obtained a pre-defined list of “hand-off” routers 
• Started with pool of 100 dev hosts 
• TPL out of the question 
• Expanded to 1000 prod hosts 
• 200,000 remote IP addresses in ADDM (40,000 unique records) 
• Filtered to 7500 unique remote IPs, 230 outside of firewall 
• Output 4 csv files: 
• Hosts with hand-off router connections 
• Hosts with no remote connections 
• Traceroute timings 
• Connection details 
• Average 3 seconds per traceroute, 90 minutes to run.
Summary 
• Multinational retailer 
• In the process of mapping their additional applications. 
• Application models now considered core to move. 
• Tier 1 Investment bank 
• 1st Stage proof of concept success. 
• Considering expanding script to other datacenters for holistic view.
Summary 
• Application Models can be extended to include 
• Routers 
• Load Balancers 
• Firewalls 
• ADDM is a ‘must-have’ tool for datacentre migrations 
• Provides visibility of ‘what’ is connected ‘where’ 
• Important to understand how the application model differs from HLD
Questions? 
https://communities.bmc.com/ideas/7623 
http://www.slideshare.net/WesFitzpatrick/bmc-addm-cheat-sheet-css-delivers- 
37644290

More Related Content

What's hot

SeminĂĄrio OCT
SeminĂĄrio OCTSeminĂĄrio OCT
SeminĂĄrio OCT
Mariana Carvalho
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloud
Innfinision Cloud and BigData Solutions
 
Corneal topography
Corneal topographyCorneal topography
Corneal topography
Sanaa1993
 
VISUAL FIELD by suraj chhetri
 VISUAL FIELD by suraj chhetri VISUAL FIELD by suraj chhetri
VISUAL FIELD by suraj chhetri
Suraj Chhetri
 
Slit lamp evaluation
Slit lamp evaluationSlit lamp evaluation
Slit lamp evaluation
ManasiNayak
 
A scan anu101 updated
A scan anu101 updatedA scan anu101 updated
A scan anu101 updated
Anurag Shukla
 
Visual field examination
Visual field examinationVisual field examination
Visual field examination
MayuriBorgohainHazar
 
Gonioscopy
GonioscopyGonioscopy
Gonioscopy
Swetha Ravichandran
 
INDOCYANINE GREEN ANGIOGRAPHY
INDOCYANINE GREEN ANGIOGRAPHYINDOCYANINE GREEN ANGIOGRAPHY
INDOCYANINE GREEN ANGIOGRAPHY
Pooja Kandula
 
MACULAR DYSTROPHIES
MACULAR DYSTROPHIESMACULAR DYSTROPHIES
MACULAR DYSTROPHIES
Vaibhav Khanna
 
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
Тернопільська обласна універсальна наукова бібліотека
 
Optical abberations pp
Optical abberations ppOptical abberations pp
Optical abberations pp
Hakobyan Sevada
 
Anisometropia
AnisometropiaAnisometropia
Anisometropia
University of Gondar
 
SCLERITIS
SCLERITIS SCLERITIS
SCLERITIS
MEDICS india
 
Heterophoria n tropia
Heterophoria n tropiaHeterophoria n tropia
Heterophoria n tropiaJunu Shrestha
 
OCT Machines
OCT Machines OCT Machines
OCT Machines
Dr Samarth Mishra
 
Congenital nystagmus
Congenital nystagmusCongenital nystagmus
Congenital nystagmus
Krati Gupta
 
Contrast sensitivity
Contrast sensitivityContrast sensitivity
Contrast sensitivity
Tahseen Jawaid
 

What's hot (20)

SeminĂĄrio OCT
SeminĂĄrio OCTSeminĂĄrio OCT
SeminĂĄrio OCT
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloud
 
Corneal topography
Corneal topographyCorneal topography
Corneal topography
 
VISUAL FIELD by suraj chhetri
 VISUAL FIELD by suraj chhetri VISUAL FIELD by suraj chhetri
VISUAL FIELD by suraj chhetri
 
Hess chart
Hess chartHess chart
Hess chart
 
Slit lamp evaluation
Slit lamp evaluationSlit lamp evaluation
Slit lamp evaluation
 
A scan anu101 updated
A scan anu101 updatedA scan anu101 updated
A scan anu101 updated
 
Visual field examination
Visual field examinationVisual field examination
Visual field examination
 
Gonioscopy
GonioscopyGonioscopy
Gonioscopy
 
INDOCYANINE GREEN ANGIOGRAPHY
INDOCYANINE GREEN ANGIOGRAPHYINDOCYANINE GREEN ANGIOGRAPHY
INDOCYANINE GREEN ANGIOGRAPHY
 
MACULAR DYSTROPHIES
MACULAR DYSTROPHIESMACULAR DYSTROPHIES
MACULAR DYSTROPHIES
 
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
Краєзнавчі ресурси бібліотеки та їх використання в інформаційно-бібліографічн...
 
Optical abberations pp
Optical abberations ppOptical abberations pp
Optical abberations pp
 
Anisometropia
AnisometropiaAnisometropia
Anisometropia
 
SCLERITIS
SCLERITIS SCLERITIS
SCLERITIS
 
Visual field assessment
Visual field assessmentVisual field assessment
Visual field assessment
 
Heterophoria n tropia
Heterophoria n tropiaHeterophoria n tropia
Heterophoria n tropia
 
OCT Machines
OCT Machines OCT Machines
OCT Machines
 
Congenital nystagmus
Congenital nystagmusCongenital nystagmus
Congenital nystagmus
 
Contrast sensitivity
Contrast sensitivityContrast sensitivity
Contrast sensitivity
 

Viewers also liked

Update CMDB Using Discovery Topology (BMC ADDM)
Update CMDB Using Discovery Topology (BMC ADDM) Update CMDB Using Discovery Topology (BMC ADDM)
Update CMDB Using Discovery Topology (BMC ADDM)
Vyom Labs
 
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMFundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMSandeep Bhatia
 
Addmi 07-taxonomy
Addmi 07-taxonomyAddmi 07-taxonomy
Addmi 07-taxonomyodanyboy
 
Resume-BMC-ADDM-2-Experience
Resume-BMC-ADDM-2-ExperienceResume-BMC-ADDM-2-Experience
Resume-BMC-ADDM-2-ExperienceAjay Purushothaman
 
Cheat sheets for coding
Cheat sheets for codingCheat sheets for coding
Cheat sheets for coding
Isaac Oteyo
 
Google Cheat Sheet
Google Cheat SheetGoogle Cheat Sheet
Google Cheat Sheet
Sergio Falcetti
 
Install Word Press with xampp
Install Word Press with xamppInstall Word Press with xampp
Install Word Press with xampp
Mehdi Sharifirad
 
Twitter Guide Cheat Sheet
Twitter Guide Cheat SheetTwitter Guide Cheat Sheet
Twitter Guide Cheat Sheet
Sharath g
 
MySQL Cheat Sheet
MySQL Cheat SheetMySQL Cheat Sheet
MySQL Cheat Sheet
Chen Dominique
 
Difference WAMP and XAMPP
Difference WAMP and XAMPPDifference WAMP and XAMPP
Difference WAMP and XAMPP
Jainul Musani
 
Sql ppt
Sql pptSql ppt
Sql pptAnuja Lad
 
Effective 15-minute presentations - Cheat Sheet
Effective 15-minute presentations - Cheat SheetEffective 15-minute presentations - Cheat Sheet
Effective 15-minute presentations - Cheat Sheet
Jan Schrage
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDB
ManageEngine
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
Seth Familian
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
 

Viewers also liked (17)

Update CMDB Using Discovery Topology (BMC ADDM)
Update CMDB Using Discovery Topology (BMC ADDM) Update CMDB Using Discovery Topology (BMC ADDM)
Update CMDB Using Discovery Topology (BMC ADDM)
 
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDMFundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
Fundamentals of SACM,ITAM,ITIL,BMC Discovery-ADDM
 
Addmi 07-taxonomy
Addmi 07-taxonomyAddmi 07-taxonomy
Addmi 07-taxonomy
 
Resume-BMC-ADDM-2-Experience
Resume-BMC-ADDM-2-ExperienceResume-BMC-ADDM-2-Experience
Resume-BMC-ADDM-2-Experience
 
Resume_Krishna
Resume_KrishnaResume_Krishna
Resume_Krishna
 
Cheat sheets for coding
Cheat sheets for codingCheat sheets for coding
Cheat sheets for coding
 
Google Cheat Sheet
Google Cheat SheetGoogle Cheat Sheet
Google Cheat Sheet
 
Install Word Press with xampp
Install Word Press with xamppInstall Word Press with xampp
Install Word Press with xampp
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to php
 
Twitter Guide Cheat Sheet
Twitter Guide Cheat SheetTwitter Guide Cheat Sheet
Twitter Guide Cheat Sheet
 
MySQL Cheat Sheet
MySQL Cheat SheetMySQL Cheat Sheet
MySQL Cheat Sheet
 
Difference WAMP and XAMPP
Difference WAMP and XAMPPDifference WAMP and XAMPP
Difference WAMP and XAMPP
 
Sql ppt
Sql pptSql ppt
Sql ppt
 
Effective 15-minute presentations - Cheat Sheet
Effective 15-minute presentations - Cheat SheetEffective 15-minute presentations - Cheat Sheet
Effective 15-minute presentations - Cheat Sheet
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDB
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similar to Extending ADDM Discovery to Firewalls, Applications and Routers

Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Deepak Shankar
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
Dhruv Sharma
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
Prasenjit Sarkar
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
Cohesive Networks
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyser
Alex Moskvin
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
Sagi Brody
 
Taming unruly apps with open source networking
Taming unruly apps with open source networkingTaming unruly apps with open source networking
Taming unruly apps with open source networking
Susan Wu
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
shira koper
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
AFCEA International
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
Sanjay Kumar (Seeking options outside India)
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
Muhammad ismail Shah
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
Jaime Martin Losa
 
SMARTxAC / Network Polygraph
SMARTxAC / Network PolygraphSMARTxAC / Network Polygraph
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
NiviV4
 
cloud computng
cloud computng cloud computng
cloud computng Krishna Gali
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
Sachin Gowda
 

Similar to Extending ADDM Discovery to Firewalls, Applications and Routers (20)

Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
IaaS with Software Defined Networking
IaaS with Software Defined NetworkingIaaS with Software Defined Networking
IaaS with Software Defined Networking
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyser
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Taming unruly apps with open source networking
Taming unruly apps with open source networkingTaming unruly apps with open source networking
Taming unruly apps with open source networking
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
 
SMARTxAC / Network Polygraph
SMARTxAC / Network PolygraphSMARTxAC / Network Polygraph
SMARTxAC / Network Polygraph
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
cloud computng
cloud computng cloud computng
cloud computng
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Extending ADDM Discovery to Firewalls, Applications and Routers

  • 1. Applications, Firewalls & Routers Extending discovery to network devices and their relationships to your applications. Presented by Wes Fitzpatrick – wfitzpatrick@cssdelivers.com
  • 2. ADDM Current Discovery Capability – pros and cons • ADDM is very good at mapping: • Application 2 software dependencies • Software 2 software, host dependencies • Host 2 host, neighbouring switch dependencies • Technical and operational dependencies • Not so good for: • Switch and router neighbours • Firewall neighbours • Load balancer neighbours • Logical or functional application dependencies
  • 4. Application Architecture as seen by the Organisation https://rmohan.com/?p=436
  • 5. Business Cases • Multinational retailer • 1500 OSIs comprised of Windows, Unix, AS400s, Exadata and Netezza. • Application stack included F5 load balancers and AS400 messaging subsystems. • Tier 1 Investment bank • 10,000 OSIs • Decentralised ADDM deployments to Americas, EMEA, APAC datacentres. • BAM not used – single focus on remote firewalled connections.
  • 6. Getting Load Balancers into the Model • SNMP Only • Creates a NetworkDevice node • No direct relationship to SIs or BAIs. • Solution • Trigger on a web server SI type • Create an link through DiscoveryAccess and update an attribute on the SI • Trigger on NetworkDevice • Create an SI for “F5 Load Balancer” • Reverse lookup DiscoveredNetworkConnection for port to process mapping • All communicating software!
  • 7. Getting Firewalls into the Model • Can be discovered (unsupported device) • Custom TPL needed • SNMP? • No direct way to link to a Host or Router
  • 8. Getting Firewalls into the Model http://www.xpresslearn.com/networking/design/network-design-series-ii/# • Bank Environment
  • 9. Getting Firewalls into the Model • Bank Environment • No TPL required (no application models) • No 3rd party software available • Scanning additional domains/zones not permitted • NMAP not permitted • SNMP login to firewalls/routers not permitted • Traceroute? Maybe…. "Hop-count-trans" by Stagira - http://commons.wikimedia.org/wiki/File:Hop-count-trans.png#mediaviewer/File:Hop-count-trans.png
  • 10. Getting Firewalls into the Model cont… • Solution • Obtained a pre-defined list of “hand-off” routers • Started with pool of 100 dev hosts • TPL out of the question • Expanded to 1000 prod hosts • 200,000 remote IP addresses in ADDM (40,000 unique records) • Filtered to 7500 unique remote IPs, 230 outside of firewall • Output 4 csv files: • Hosts with hand-off router connections • Hosts with no remote connections • Traceroute timings • Connection details • Average 3 seconds per traceroute, 90 minutes to run.
  • 11. Summary • Multinational retailer • In the process of mapping their additional applications. • Application models now considered core to move. • Tier 1 Investment bank • 1st Stage proof of concept success. • Considering expanding script to other datacenters for holistic view.
  • 12. Summary • Application Models can be extended to include • Routers • Load Balancers • Firewalls • ADDM is a ‘must-have’ tool for datacentre migrations • Provides visibility of ‘what’ is connected ‘where’ • Important to understand how the application model differs from HLD

Editor's Notes

  1. Intro… Name, CSS, Title Examples
  2. Typical application model is built from the bottom up via dependencies.
  3. However many organisations have more of a top down view of logical or functional dependencies that include firewalls, switches, routers and load balancers. An application server may be considered as having a logical dependency on a database server, the webservers have a logical dependency on the load balancers – though operationally or technically they work independent of each other. Many organisations we are encountering have a desire to see things in the model which ADDM does not currently provide OOTB. These additional components are critical to an organisation that wants to see where that application sits as a dependency within their datacentre – especially when considering datacentre migrations.
  4. Since April this year, CSS have already assisted 2 customers in preparation for Datacentre migrations.
  5. ADDM discovers the load balancers by SNMP only. The taxonomy restricts relationships from a NetworkDevice to DisocveryAccess, Subnets, IPAddress and NetworkInterfaces. We had limited time to model the application stack and include Load Balancer communicating relationships. 1st approach was to pick some common web server SIs and trigger and then lookup through DiscoveredNetworkConnection to find the load balancer and add as an attribute. 2nd approach – by creating a “Load Balancer” SI, were able to reverse lookup DiscoveredNetworkConnection and map ALL communicating software instances – no longer dependent on defining web servers. These appeared in the visualisation under Inferred Software Communication.
  6. ADDM can discover firewalls – however you need to access them from a DiscoveryAccess node – they do not create inferred nodes. There is software that can achieve this. There may also be scripted ways to link to a host to a router or firewall, but these were not available.
  7. Initial requirements gathering…
  8. We were allowed to run traceroute and had CLI access. After speaking to their networks guy we got a list of hand-off routers – routers which neighbour one of the firewalls – the bank could use these routers to determine where the Hosts were connecting. TPL was ruled out of the question – we looked at the option of running it but as well as adding significant scan time, each host may have up to 100 remote connections, and may also share connections. You would be running traceroutes multiple times against the same targets. After increasing the test pool size the script was taking a very long time to execute, so we worked on putting in logic that ensured traceroute only ran once and all hosts were updated. We added timings so that anyone running the script could prepare for the best time to run and they could also compare traceroute time by subnet.