SlideShare a Scribd company logo
Scoping for BMC Discovery
(ADDM)
WES FITZPATRICK 2017-08-19
Agenda
What is BMC Discovery?
Why BMC Discovery?
How does Discovery work?
Service/Application Modelling
Security Considerations
Prerequisite Walkthrough
Requirements Gathering
What is BMC Discovery?
BMC Discovery
◦ Formerly known as Tideway
◦ Bought by BMC (2009), renamed ADDM (Atrium
Discovery and Dependency Mapping)
◦ Renamed to BMC Discovery (2016)
Clean and Transparent
◦ Agentless
◦ Minimum effort for end-client resource
◦ Immediate results
◦ Platform agnostic – web-based UI
◦ Full visibility to ‘how and why’ things were
inferred
Fully Automated
◦ Servers (physical, virtual), desktops, clusters,
databases, software, network devices, storage…
◦ Dependencies and relationships
◦ Software and hardware lifecycle reporting
◦ Atrium CMDB integration
Dashboards and Reporting
◦ Search for anything in the data store
◦ Powerful analytics
◦ Dependency visualizations
◦ Custom reporting
◦ “Deep Dive” navigation
What is BMC Discovery?
Visibility of Your Infrastructure
Discovery captures and provides automatically
discovered configuration and relationship data, providing
many different views.
Why BMC Discovery?
Largest Reference Library
◦ 40,000+ SW & OS versions
◦ 3000 network devices, 1000 relationship types
◦ 20 Storage brands
◦ 100 Middleware types
Enabler for Application/Service Mapping
◦ Simplified ‘Start Anywhere’ tool
◦ More complex/deep application/service modelling
Ease of Integration
◦ REST API
◦ CSV, XML, PDF Export
◦ CMDB Integration
◦ Email
Reporting
◦ Single click ‘provenance’ reporting
◦ End of Life/Support reports and dashboards
◦ 200+ customizable out of the box reports
Visibility
◦ Visibility of overall utilisation of infrastructure
◦ Instant view of virtualization
◦ Software audits
◦ Cloud readiness
Risk Reduction
◦ Assess impact of change/migration
◦ Identify Single Points of Failure
Why BMC Discovery?
Return on Investment
◦ 5-Year ROI of 470%
◦ $128K Business benefits over 5 years per 100
servers
◦ 8 month payback period
◦ 7,000 Pounds of hardware cleared off data
centre floor
Increased Visibility
◦ 80% Reduced effort to map applications
◦ 60% Reduction in audit prep time from 90 to 30
days
Plan Transitions
◦ 66% Reduced time to plan and approve changes
More Effective ITSM
◦ 80% Reduction in incidents caused by change
◦ 28% Reduction in volume of events
More Info:
http://media.cms.bmc.com/documents/BMC-
Discovery-Updated-May-2017.pdf
IDC Report
How Does Discovery Work?
How Discovery Works
User
Discovery Appliance
Discovery scan is run
on ip range...
IP ranges and credentials entered into
appliance...
• Ships as self contained virtual image
• Hosted on customer virtual platform
• ESX/ESXi 4.1 and later
• Disk allocation only – no requirement for OS install
• BMC supports the appliance and platform (RHEL)
User
Discovery Appliance
Discovery scan is run
on ip range...
How Discovery Works
Administrator accesses the appliance via UI
(HTTP/HTTPS) and CLI (SSH) via local login or
AD/LDAP
Ports used for initial sweep scan:
• TCP: 4, 22, 80, 135, 139, 514
• TCP/UDP: 161 (SNMP)
• TCP: 23 (telnet) (optional)
• TCP: 513 (rlogin) (optional)
• ICMP Type 8 Echo Request (ping)
Discovery performs an initial sweep to determine
what endpoints respond (if ip range/subnet entered)
and will use the port configuration to determine
what type of device is discovered.
How Discovery Works – Servers and Network
Devices
If Discovery determines there is a valid device on the endpoint it will attempt to
log in with supplied credentials and run standard commands to retrieve CI data:
• Hardware
• OS
• Software
• Communication
Default ports required for successful (full) Host discovery:
• Linux/Unix
• 22 – SSH
• 23 – Telnet
• 413 – rlogin
• SNMP
• 161
• VMWare
• 443 – HTTPS
• 902 –vSphere API
• Ports can be customised
Discovery Appliance
Discovery
Windows Proxy
How Discovery Works - Windows
Default ports required for successful (full) Host discovery:
Appliance:
• ICMP Type 8 “ping”
• 135 – DCOM Service Control
• 1024-1030 – Restricted DCOM, used after initial negotiation
Used by Proxy:
• 135 – DCOM Service Control
• 139 – NetBIOS (NT4 RemQuery)
• 445 – SMB (RemQuery)
• 1024-65535 – Unrestricted DCOM (WMI), used after initial negotiation
A Windows proxy is needed for discovery of Windows servers.
The service (Active Directory/Local Admin) is hosted on a standard
Windows server.
• Windows 2008 SP2 – 2012 R2
• Server supplied and supported by end-client
Multiple proxies can be configured
for one or more appliances.
Appliance and Proxy
communicate on ports 4321-4323
Discovery
Windows Proxy
How Discovery Works - Consolidation
Where there is a requirement for other appliances
(and proxies) it is possible to consolidate data to
another appliance.
Consolidation uses port 25032
Consolidator
Scanner
How Discovery Works - Clustering
In order to improve performance on larger estates, clustering can be enabled
to share the discovery workload.
• Coordinator and Members act as one appliance (individual UIs – changes
are replicated across set)
• A cluster can still act as a consolidator/scanner
• A cluster can still connect to proxies
• Members need to be on the same subnet to gain the performance
advantage
User
Coordinator
Member
Member
Ports:
• 25030 – Cluster Manager
• 25031 – Datastore
communication
• 25032 – Reasoning
communication
How Discovery Works – Protocol Summary
Scanner
Consolidator
(Cluster)User Windows Proxy
Appliance Discovery:
• SSH
• ICMP (Ping)
• DCOM
Consolidation:
• CORBA
Clustering:
• CORBA
User Access:
• SSH
• HTTP
• HTTPS
• AD/LDAP
Proxy:
• AD/LDAP
• Local Admin Credential
Windows Discovery:
• DCOM
• NetBIOS (NT4 only)
• SMB
• WMI
How Discovery Works – Firewall Summary
Scanner
Consolidator
(Cluster)User Windows Proxy
1. Input target IP
ranges/subnets/address into
ADDM for scanning.
2. ADDM runs credential-less
“sweep scan” across network.
3. Add login credentials to
ADDM for relevant systems.
5. The raw discovery data is
reasoned by ADDM which
may also trigger additional
discovery patterns.
4. ADDM runs full discovery
scan across network.
Service/Application
Modelling
What is a Business Application?
An enterprise software tool or the technical
architecture of a service
Typically comprised of a number of other
applications, software or databases.
Examples: Exchange, Payroll, Intranet, ITSM
May be split by environment and/or Line of
Business
Usually not provided by OOTB by BMC (TKU
updates)
What is a Business Application?
Part of a Service
Switches
Hosts
Software Instances & Database Servers
Processes, Services, Config Files, Runtimes Environments, Websites, etc…
Business Application Instance
Service
What is a Business Application?
Database
Server
Application
Server
Web
Server
Business
Application
Instance
Simplified Business Application Instance (BAI) Example
Application Models
Part of the Service Model
Represent your custom business applications made up of individual instances of software
◦ e.g. applications, databases, webservers
Helps in business impact analysis by showing direct relationships and dependencies in the
application/hardware stack
Helps in understanding what your business application is made up of
Application Models and Service Models are consumed by ITSM processes such as Incident,
Problem, Change for:
◦ Faster time to recovery
◦ Less incident escalations
◦ Planning changes
◦ Impact Analysis
Security Considerations
Typical Security Concerns
Credentials
◦ Stored in an encrypted vault
◦ Can use SSH keys and Active Directory proxy
Client Data
◦ Discovery is currently NOT cloud hosted – data is stored within appliance datastore
◦ Access can be controlled via LDAP and limited RBAC
Platform Scripts
◦ Administrator access only
◦ ‘Read Only’ for other users if necessary
Security of Appliance
◦ Penetration tested and hardened
◦ https://docs.bmc.com/docs/display/DISCO111/Appliance+hardening
Secure Communications
Secure communications between elements of Discovery uses CORBA over TLS (Transport Layer
Security) with the following details:
◦ Protocol: TLSv1.2
◦ Encryption: AES_256_CBC
◦ Message hashing: SHA1
◦ Key Exchange: DHE_RSA (2048)
It is enabled using certificates in the following locations:
◦ Each Appliance (Scanning or Consolidation)
◦ Each Windows Proxy (Active Directory or Credential)
◦ Certificate Authority public certificate on each Appliance and Proxy
◦ Customer specific certificates can be used
Prerequisite Walkthrough
Virtual Appliance
◦ Supplied in OVF (Open Virtualisation Format)
◦ Production Use: VMware ESX/ESXi 4.1 or above
◦ Test and Dev: VMware Workstation 8.0 and
above, VMware Player 4.0 and above
◦ 64-bit only
These recommendations differ from what BMC
publishes.
Hosting (Recommendations)
Resource POC Small (<500)
Datacentre
(<5000)
Enterprise
(20000+)
CPUs 2 4 8 8
RAM (GB) 2 8 16 32
Swap (GB) 4 16 32 32
Local Disk (GB) 37 100 100 100
Datastore (GB) 37 200 500 1TB
Backup (GB) N/A 200 500 1TB
Windows Proxy
Hosted on a virtual server with one of the following OS types:
◦ Windows 2008 SP2
◦ Windows 2008 R2
◦ Windows 2012
◦ Windows 2012 R2
Minimum host specification
◦ 2GHz Intel Pentium 4 CPU 512k cache (or equivelant)
◦ 4GB Memory
◦ 100GB Disk
Credentials
Windows
◦ Local Admin account with WMI rights
◦ Administrative shares should not be disabled (enabled by default)
◦ Netstat
Unix/Linux
◦ SSHD or SSH key
◦ Standard user account with non-root privileges
◦ Sudo or sudoers file for privileged commands
SNMP
◦ Community strings to logon to network devices/printers/etc.
Other Considerations for DC Deployment
Limited RBAC can be configured through Group mappings in the UI, but this can break
functionality if you are not careful
BMC Discovery is not a multi-tenanted solution – all data is visible to any administrator with
visibility to the data model.
◦ The appliance does however support multi-tenancy sync.
Overlapping IPs can be handled at a basic server level, but due to the nature of relationship
mapping, ownership can be mismatched.
◦ If your environment is not NAT’d then non-consolidated appliance deployment is recommended (with
direct integration to CMDB)
It is not possible to use Discovery as a typical ‘manual’ CMDB – i.e. you cannot add/edit CI’s and
attributes manually.
◦ The primary method of population is automated discovery, it is then possible to create custom patterns
to add additional custom CI’s and attributes through scanning.
Summary of Prerequisite Actions
Hosting for Discovery appliance(s)
Hosting for Windows Proxy(s)
Rollout of credentials – Linux/Unix, Windows, Virtual Containers
Network configuration – appliance, proxies, firewalls, ACLs, IDS, IDS
Obtain change approvals for above actions and for scanning environment
Identify target environments – IP/subnet ranges and exclude ranges
Access for consultant to
◦ The appliance and proxies via HTTP and SSH
◦ Use of tools such as PuTTy, WinSCP, Notepad++, Regex Coach, Chrome or Firefox
Administrators and Users must be able to access Discovery appliances through HTTP(S) and SSH
(administrators)
Requirements Gathering
Infrastructure
What OSIs and Devices do you want to discover?
◦ OS/Device type
◦ Virtual/Physical
◦ How many (OS breakdown)
◦ How to access
◦ Additional commands needed beyond platform scripts?
Datacenters?
◦ How many
◦ Locations
Any firewall issues?
◦ Network zones, DMZ
General security issues?
◦ Credentials
◦ Access rights management
Traversys Limited
team@traversys.io
www.traversys.io

More Related Content

What's hot

Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法についてAzure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Shinya Yamaguchi
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説
Yusuke Kodama
 
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
HostedbyConfluent
 
Running AWS Locally
Running AWS LocallyRunning AWS Locally
Running AWS Locally
Chris Gillespie
 
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS SummitAWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
Amazon Web Services
 
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
Amazon Web Services Korea
 
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
Amazon Web Services Korea
 
Serverless Architecture and Best Practices
Serverless Architecture and Best PracticesServerless Architecture and Best Practices
Serverless Architecture and Best Practices
Amazon Web Services
 
Db 진단 및 튜닝 보고 (example)
Db 진단 및 튜닝 보고 (example)Db 진단 및 튜닝 보고 (example)
Db 진단 및 튜닝 보고 (example)
중선 곽
 
Azure Active Directory 利用開始への第一歩
Azure Active Directory 利用開始への第一歩Azure Active Directory 利用開始への第一歩
Azure Active Directory 利用開始への第一歩
Yusuke Kodama
 
DATADOG TIPS #1
DATADOG TIPS #1DATADOG TIPS #1
DATADOG TIPS #1
Naoya Nakazawa
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
Amazon Web Services
 
【第1回EMS勉強会】Autopilot設計時のポイント
【第1回EMS勉強会】Autopilot設計時のポイント【第1回EMS勉強会】Autopilot設計時のポイント
【第1回EMS勉強会】Autopilot設計時のポイント
yokimura
 
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
Yusuke Kodama
 
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
fisuda
 
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
HostedbyConfluent
 
AWS RDS
AWS RDSAWS RDS
AWS RDS
Mahesh Raj
 
FIWARE Big Data Ecosystem : Cygnus
FIWARE Big Data Ecosystem : CygnusFIWARE Big Data Ecosystem : Cygnus
FIWARE Big Data Ecosystem : Cygnus
fisuda
 
External should that be a microservice
External should that be a microserviceExternal should that be a microservice
External should that be a microservice
Rohit Kelapure
 
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
Amazon Web Services
 

What's hot (20)

Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法についてAzure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
Azure AD とアプリケーションを SAML 連携する際に陥る事例と対処方法について
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説
 
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
Intelligent, Automatic Restarts for Unhealthy Kafka Consumers on Kubernetes w...
 
Running AWS Locally
Running AWS LocallyRunning AWS Locally
Running AWS Locally
 
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS SummitAWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
AWS CloudFormation macros: Coding best practices - MAD201 - New York AWS Summit
 
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
오토스케일링 제대로 활용하기 (김일호) - AWS 웨비나 시리즈 2015
 
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
AWS 클라우드 비용 최적화를 위한 모범 사례-AWS Summit Seoul 2017
 
Serverless Architecture and Best Practices
Serverless Architecture and Best PracticesServerless Architecture and Best Practices
Serverless Architecture and Best Practices
 
Db 진단 및 튜닝 보고 (example)
Db 진단 및 튜닝 보고 (example)Db 진단 및 튜닝 보고 (example)
Db 진단 및 튜닝 보고 (example)
 
Azure Active Directory 利用開始への第一歩
Azure Active Directory 利用開始への第一歩Azure Active Directory 利用開始への第一歩
Azure Active Directory 利用開始への第一歩
 
DATADOG TIPS #1
DATADOG TIPS #1DATADOG TIPS #1
DATADOG TIPS #1
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
【第1回EMS勉強会】Autopilot設計時のポイント
【第1回EMS勉強会】Autopilot設計時のポイント【第1回EMS勉強会】Autopilot設計時のポイント
【第1回EMS勉強会】Autopilot設計時のポイント
 
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
詳説!Azure AD 条件付きアクセス - 動作の仕組みを理解する編
 
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
FIWARE Orion Context Broker コンテキスト情報管理 (Orion 3.4.0対応)
 
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
Exposing and Controlling Kafka Event Streaming with Kong Konnect Enterprise |...
 
AWS RDS
AWS RDSAWS RDS
AWS RDS
 
FIWARE Big Data Ecosystem : Cygnus
FIWARE Big Data Ecosystem : CygnusFIWARE Big Data Ecosystem : Cygnus
FIWARE Big Data Ecosystem : Cygnus
 
External should that be a microservice
External should that be a microserviceExternal should that be a microservice
External should that be a microservice
 
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
Securing Serverless Workloads with Cognito and API Gateway Part I - AWS Secur...
 

Similar to Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited

V mware view™ poc jumpstart service
V mware view™ poc jumpstart serviceV mware view™ poc jumpstart service
V mware view™ poc jumpstart service
solarisyougood
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessment
solarisyougood
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginners
Tobias Koprowski
 
WebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination FeaturesWebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination Features
Chris Bailey
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
MongoDB
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Jeff Stokes
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
Citrix
 
What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2
Aidan Finn
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
eG Innovations
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
Lai Yoong Seng
 
Apresentação Microsoft Azure no SASPI 5
Apresentação Microsoft Azure no SASPI 5Apresentação Microsoft Azure no SASPI 5
Apresentação Microsoft Azure no SASPI 5
Lucas Chies
 
How to Deploy WSO2 Enterprise Integrator in Containers
How to Deploy WSO2 Enterprise Integrator in ContainersHow to Deploy WSO2 Enterprise Integrator in Containers
How to Deploy WSO2 Enterprise Integrator in Containers
WSO2
 
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid CloudVMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
K.Mohamed Faizal
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
KoprowskiT_SQLSat419_WADBforBeginners
KoprowskiT_SQLSat419_WADBforBeginnersKoprowskiT_SQLSat419_WADBforBeginners
KoprowskiT_SQLSat419_WADBforBeginners
Tobias Koprowski
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
Ingram Micro Cloud
 
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
SIPfoundry
 

Similar to Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited (20)

V mware view™ poc jumpstart service
V mware view™ poc jumpstart serviceV mware view™ poc jumpstart service
V mware view™ poc jumpstart service
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessment
 
Bcit win8 ws2012 session
Bcit win8 ws2012 sessionBcit win8 ws2012 session
Bcit win8 ws2012 session
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginners
 
WebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination FeaturesWebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination Features
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
 
Apresentação Microsoft Azure no SASPI 5
Apresentação Microsoft Azure no SASPI 5Apresentação Microsoft Azure no SASPI 5
Apresentação Microsoft Azure no SASPI 5
 
How to Deploy WSO2 Enterprise Integrator in Containers
How to Deploy WSO2 Enterprise Integrator in ContainersHow to Deploy WSO2 Enterprise Integrator in Containers
How to Deploy WSO2 Enterprise Integrator in Containers
 
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid CloudVMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
KoprowskiT_SQLSat419_WADBforBeginners
KoprowskiT_SQLSat419_WADBforBeginnersKoprowskiT_SQLSat419_WADBforBeginners
KoprowskiT_SQLSat419_WADBforBeginners
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
SIPfoundry CoLab 2013 - Cloud virtualization of the sipXecs communications so...
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited

  • 1. Scoping for BMC Discovery (ADDM) WES FITZPATRICK 2017-08-19
  • 2. Agenda What is BMC Discovery? Why BMC Discovery? How does Discovery work? Service/Application Modelling Security Considerations Prerequisite Walkthrough Requirements Gathering
  • 3. What is BMC Discovery?
  • 4. BMC Discovery ◦ Formerly known as Tideway ◦ Bought by BMC (2009), renamed ADDM (Atrium Discovery and Dependency Mapping) ◦ Renamed to BMC Discovery (2016) Clean and Transparent ◦ Agentless ◦ Minimum effort for end-client resource ◦ Immediate results ◦ Platform agnostic – web-based UI ◦ Full visibility to ‘how and why’ things were inferred Fully Automated ◦ Servers (physical, virtual), desktops, clusters, databases, software, network devices, storage… ◦ Dependencies and relationships ◦ Software and hardware lifecycle reporting ◦ Atrium CMDB integration Dashboards and Reporting ◦ Search for anything in the data store ◦ Powerful analytics ◦ Dependency visualizations ◦ Custom reporting ◦ “Deep Dive” navigation What is BMC Discovery?
  • 5. Visibility of Your Infrastructure Discovery captures and provides automatically discovered configuration and relationship data, providing many different views.
  • 7. Largest Reference Library ◦ 40,000+ SW & OS versions ◦ 3000 network devices, 1000 relationship types ◦ 20 Storage brands ◦ 100 Middleware types Enabler for Application/Service Mapping ◦ Simplified ‘Start Anywhere’ tool ◦ More complex/deep application/service modelling Ease of Integration ◦ REST API ◦ CSV, XML, PDF Export ◦ CMDB Integration ◦ Email Reporting ◦ Single click ‘provenance’ reporting ◦ End of Life/Support reports and dashboards ◦ 200+ customizable out of the box reports Visibility ◦ Visibility of overall utilisation of infrastructure ◦ Instant view of virtualization ◦ Software audits ◦ Cloud readiness Risk Reduction ◦ Assess impact of change/migration ◦ Identify Single Points of Failure Why BMC Discovery?
  • 8. Return on Investment ◦ 5-Year ROI of 470% ◦ $128K Business benefits over 5 years per 100 servers ◦ 8 month payback period ◦ 7,000 Pounds of hardware cleared off data centre floor Increased Visibility ◦ 80% Reduced effort to map applications ◦ 60% Reduction in audit prep time from 90 to 30 days Plan Transitions ◦ 66% Reduced time to plan and approve changes More Effective ITSM ◦ 80% Reduction in incidents caused by change ◦ 28% Reduction in volume of events More Info: http://media.cms.bmc.com/documents/BMC- Discovery-Updated-May-2017.pdf IDC Report
  • 10. How Discovery Works User Discovery Appliance Discovery scan is run on ip range... IP ranges and credentials entered into appliance... • Ships as self contained virtual image • Hosted on customer virtual platform • ESX/ESXi 4.1 and later • Disk allocation only – no requirement for OS install • BMC supports the appliance and platform (RHEL)
  • 11. User Discovery Appliance Discovery scan is run on ip range... How Discovery Works Administrator accesses the appliance via UI (HTTP/HTTPS) and CLI (SSH) via local login or AD/LDAP Ports used for initial sweep scan: • TCP: 4, 22, 80, 135, 139, 514 • TCP/UDP: 161 (SNMP) • TCP: 23 (telnet) (optional) • TCP: 513 (rlogin) (optional) • ICMP Type 8 Echo Request (ping) Discovery performs an initial sweep to determine what endpoints respond (if ip range/subnet entered) and will use the port configuration to determine what type of device is discovered.
  • 12. How Discovery Works – Servers and Network Devices If Discovery determines there is a valid device on the endpoint it will attempt to log in with supplied credentials and run standard commands to retrieve CI data: • Hardware • OS • Software • Communication Default ports required for successful (full) Host discovery: • Linux/Unix • 22 – SSH • 23 – Telnet • 413 – rlogin • SNMP • 161 • VMWare • 443 – HTTPS • 902 –vSphere API • Ports can be customised Discovery Appliance
  • 13. Discovery Windows Proxy How Discovery Works - Windows Default ports required for successful (full) Host discovery: Appliance: • ICMP Type 8 “ping” • 135 – DCOM Service Control • 1024-1030 – Restricted DCOM, used after initial negotiation Used by Proxy: • 135 – DCOM Service Control • 139 – NetBIOS (NT4 RemQuery) • 445 – SMB (RemQuery) • 1024-65535 – Unrestricted DCOM (WMI), used after initial negotiation A Windows proxy is needed for discovery of Windows servers. The service (Active Directory/Local Admin) is hosted on a standard Windows server. • Windows 2008 SP2 – 2012 R2 • Server supplied and supported by end-client Multiple proxies can be configured for one or more appliances. Appliance and Proxy communicate on ports 4321-4323
  • 14. Discovery Windows Proxy How Discovery Works - Consolidation Where there is a requirement for other appliances (and proxies) it is possible to consolidate data to another appliance. Consolidation uses port 25032 Consolidator Scanner
  • 15. How Discovery Works - Clustering In order to improve performance on larger estates, clustering can be enabled to share the discovery workload. • Coordinator and Members act as one appliance (individual UIs – changes are replicated across set) • A cluster can still act as a consolidator/scanner • A cluster can still connect to proxies • Members need to be on the same subnet to gain the performance advantage User Coordinator Member Member Ports: • 25030 – Cluster Manager • 25031 – Datastore communication • 25032 – Reasoning communication
  • 16. How Discovery Works – Protocol Summary Scanner Consolidator (Cluster)User Windows Proxy Appliance Discovery: • SSH • ICMP (Ping) • DCOM Consolidation: • CORBA Clustering: • CORBA User Access: • SSH • HTTP • HTTPS • AD/LDAP Proxy: • AD/LDAP • Local Admin Credential Windows Discovery: • DCOM • NetBIOS (NT4 only) • SMB • WMI
  • 17. How Discovery Works – Firewall Summary Scanner Consolidator (Cluster)User Windows Proxy 1. Input target IP ranges/subnets/address into ADDM for scanning. 2. ADDM runs credential-less “sweep scan” across network. 3. Add login credentials to ADDM for relevant systems. 5. The raw discovery data is reasoned by ADDM which may also trigger additional discovery patterns. 4. ADDM runs full discovery scan across network.
  • 19. What is a Business Application? An enterprise software tool or the technical architecture of a service Typically comprised of a number of other applications, software or databases. Examples: Exchange, Payroll, Intranet, ITSM May be split by environment and/or Line of Business Usually not provided by OOTB by BMC (TKU updates)
  • 20. What is a Business Application? Part of a Service Switches Hosts Software Instances & Database Servers Processes, Services, Config Files, Runtimes Environments, Websites, etc… Business Application Instance Service
  • 21. What is a Business Application? Database Server Application Server Web Server Business Application Instance Simplified Business Application Instance (BAI) Example
  • 22. Application Models Part of the Service Model Represent your custom business applications made up of individual instances of software ◦ e.g. applications, databases, webservers Helps in business impact analysis by showing direct relationships and dependencies in the application/hardware stack Helps in understanding what your business application is made up of Application Models and Service Models are consumed by ITSM processes such as Incident, Problem, Change for: ◦ Faster time to recovery ◦ Less incident escalations ◦ Planning changes ◦ Impact Analysis
  • 24. Typical Security Concerns Credentials ◦ Stored in an encrypted vault ◦ Can use SSH keys and Active Directory proxy Client Data ◦ Discovery is currently NOT cloud hosted – data is stored within appliance datastore ◦ Access can be controlled via LDAP and limited RBAC Platform Scripts ◦ Administrator access only ◦ ‘Read Only’ for other users if necessary Security of Appliance ◦ Penetration tested and hardened ◦ https://docs.bmc.com/docs/display/DISCO111/Appliance+hardening
  • 25. Secure Communications Secure communications between elements of Discovery uses CORBA over TLS (Transport Layer Security) with the following details: ◦ Protocol: TLSv1.2 ◦ Encryption: AES_256_CBC ◦ Message hashing: SHA1 ◦ Key Exchange: DHE_RSA (2048) It is enabled using certificates in the following locations: ◦ Each Appliance (Scanning or Consolidation) ◦ Each Windows Proxy (Active Directory or Credential) ◦ Certificate Authority public certificate on each Appliance and Proxy ◦ Customer specific certificates can be used
  • 27. Virtual Appliance ◦ Supplied in OVF (Open Virtualisation Format) ◦ Production Use: VMware ESX/ESXi 4.1 or above ◦ Test and Dev: VMware Workstation 8.0 and above, VMware Player 4.0 and above ◦ 64-bit only These recommendations differ from what BMC publishes. Hosting (Recommendations) Resource POC Small (<500) Datacentre (<5000) Enterprise (20000+) CPUs 2 4 8 8 RAM (GB) 2 8 16 32 Swap (GB) 4 16 32 32 Local Disk (GB) 37 100 100 100 Datastore (GB) 37 200 500 1TB Backup (GB) N/A 200 500 1TB
  • 28. Windows Proxy Hosted on a virtual server with one of the following OS types: ◦ Windows 2008 SP2 ◦ Windows 2008 R2 ◦ Windows 2012 ◦ Windows 2012 R2 Minimum host specification ◦ 2GHz Intel Pentium 4 CPU 512k cache (or equivelant) ◦ 4GB Memory ◦ 100GB Disk
  • 29. Credentials Windows ◦ Local Admin account with WMI rights ◦ Administrative shares should not be disabled (enabled by default) ◦ Netstat Unix/Linux ◦ SSHD or SSH key ◦ Standard user account with non-root privileges ◦ Sudo or sudoers file for privileged commands SNMP ◦ Community strings to logon to network devices/printers/etc.
  • 30. Other Considerations for DC Deployment Limited RBAC can be configured through Group mappings in the UI, but this can break functionality if you are not careful BMC Discovery is not a multi-tenanted solution – all data is visible to any administrator with visibility to the data model. ◦ The appliance does however support multi-tenancy sync. Overlapping IPs can be handled at a basic server level, but due to the nature of relationship mapping, ownership can be mismatched. ◦ If your environment is not NAT’d then non-consolidated appliance deployment is recommended (with direct integration to CMDB) It is not possible to use Discovery as a typical ‘manual’ CMDB – i.e. you cannot add/edit CI’s and attributes manually. ◦ The primary method of population is automated discovery, it is then possible to create custom patterns to add additional custom CI’s and attributes through scanning.
  • 31. Summary of Prerequisite Actions Hosting for Discovery appliance(s) Hosting for Windows Proxy(s) Rollout of credentials – Linux/Unix, Windows, Virtual Containers Network configuration – appliance, proxies, firewalls, ACLs, IDS, IDS Obtain change approvals for above actions and for scanning environment Identify target environments – IP/subnet ranges and exclude ranges Access for consultant to ◦ The appliance and proxies via HTTP and SSH ◦ Use of tools such as PuTTy, WinSCP, Notepad++, Regex Coach, Chrome or Firefox Administrators and Users must be able to access Discovery appliances through HTTP(S) and SSH (administrators)
  • 33. Infrastructure What OSIs and Devices do you want to discover? ◦ OS/Device type ◦ Virtual/Physical ◦ How many (OS breakdown) ◦ How to access ◦ Additional commands needed beyond platform scripts? Datacenters? ◦ How many ◦ Locations Any firewall issues? ◦ Network zones, DMZ General security issues? ◦ Credentials ◦ Access rights management

Editor's Notes

  1. UNIX Credentials sshd or ssh key or standard user account Public-key cryptography where "encryption and decryption using separate keys Not possible to derive the encryption key from the encryption key Appliance holds private key publice key deployed to target hosts Credentials stored in a vault Blowfish encryption Secured with a passphrase Passwords never exposed ADDM team, operators or Users Sudo used for privilege escalation Commands and arguments specified to prevent spawning any arbitrary commands
  2. Naming convention tends to be abstract, custom names designated by the business or high-level function.
  3. 1. A service is supported by one or more Business Applications 2. A BAI depends on Software and Databases 3. Software and Databases depend on processes, services and other components running on Hosts 4. Hosts depend on switches for connectivity === This top down view in Discovery is referred to as ‘provenance’. Where a node within Discovery can be drilled down by it’s provenance to see underlying dependencies and associations. BAM only requires us to look at the Hosts, Software and Application levels.
  4. In Discovery terminology we refer to a discovered or inferred component as an “Instance”. === This is a fairly common example, many business applications take this form, with or without a webserver, but it should not always be assumed to be the case. === In some cases these may reside on the same server. Discovery has a Database (Berkley DB), Webserver (Apache) and Application (based on Python) – but these all run from 1 virtual machine.