background image

ADM User’s Guide

46

VMware, Inc.

 

Limitations

VI

SDK

 

does

 

not

 

expose

 

some

 

information

 

and

 

therefore

 

ADM

 

cannot

 

discover

 

some

 

CIs.

 

Specifically,

 

the

 

following

 

CIs

 

will

 

not

 

be

 

discovered

 

through

 

VI

SDK:

Services

Configuration

 

files

License

 

files

Installed

 

software

Operating

 

system

 

kernel

 

related

 

information

 

(For

 

Example,

 

kernel

 

version)

Discovering Dependencies with Detail Discovery

This

 

section

 

provides

 

the

 

necessary

 

information

 

to

 

decide

 

the

 

method

 

to

 

discover

 

dependencies

 

and

 

to

 

configure

 

Detail

 

Discovery

 

to

 

discover

 

dependencies.

 

ADM Dependency Discovery Methods

Discovering

 

dependencies

 

is

 

done

 

through

 

ADM

 

using

 

either

 

of

 

the

 

following

 

methods:

 

Passive

 

and

 

Detail

 

Discovery

 

together

 

or

 

only

 

using

 

Detail

 

Discovery.

Passive

 

Discovery

 

assumes

 

that

 

a

 

packet

 

represents

 

a

 

dependency

 

between

 

two

 

hosts,

 

for

 

example,

 

there’s

 

most

 

likely

 

a

 

good

 

reason

 

that

 

host

 

A

 

sent

 

a

 

packet

 

to

 

host

 

B.

 

The

 

shortcoming

 

of

 

this

 

assumption

 

in

 

Passive

 

Discovery

 

might

 

not

 

identify

 

the

 

service

 

on

 

the

 

client

side

 

of

 

a

 

connection

 

(client

server

 

communication

 

usually

 

contains

 

much

 

more

 

information

 

on

 

the

 

server

 

side

 

than

 

on

 

the

 

client

 

side)

 

correctly.

 

As

 

a

 

result,

 

ADM

 

might

 

rely

 

on

 

Passive

 

Discovery

 

for

 

discovering

 

dependencies,

 

while

 

leveraging

 

Detail

 

Discovery

 

to

 

correctly

 

identify

 

the

 

service

 

on

 

the

 

client

 

side

 

of

 

the

 

connection.

However,

 

some

 

clients

 

have

 

regulatory,

 

business,

 

or

 

infrastructural

 

barriers

 

that

 

prevent

 

them

 

from

 

using

 

Passive

 

Discovery.

 

To

 

penetrate

 

these

 

clients,

 

ADM

 

allows

 

you

 

to

 

correctly

 

identify

 

dependencies

 

using

 

Detail

 

Discovery

 

only,

 

without

 

relying

 

on

 

Passive

 

Discovery.

 

The Process of Dependency Discovery Using Only Detail Discovery

To

 

discover

 

dependencies

 

using

 

Detail

 

Discovery,

 

ADM

 

must

 

leverage

 

the

 

capabilities

 

exposed

 

to

 

it

 

by

 

the

 

protocol

 

it

 

uses

 

to

 

connect

 

remotely

 

to

 

the

 

interrogated

 

host.

 

ADM

 

uses

 

a

 

cross

platform

 

and

 

widely

 

supported

 

program

 

called

 

netstat

 

for

 

remote

 

shell

 

protocols

 

(for

 

example,

 

SSH

 

and

 

Telnet)

 

and

 

WMI.

 

Since

 

WMI

 

does

 

not

 

expose

 

any

 

port

related

 

information,

 

netstat

 

is

 

used

 

to

 

run

 

commands

 

on

 

the

 

target

 

Windows

 

machine.

 

With

 

SNMP,

 

ADM

 

interrogates

 

a

 

standard

 

MIB2

 

table

 

that

 

exposes

 

information

 

about

 

open

 

TCP

 

connections

 

and

 

ports

 

used

 

by

 

applications

 

and

 

services

 

running

 

on

 

the

 

interrogated

 

host.

 

ADM

 

then

 

uses

 

heuristics

 

to

 

guess

 

the

 

protocols

 

used

 

by

 

those

 

connections.

Table 5

2

 

describes

 

what

 

ADM

 

discovers

 

about

 

dependencies

 

and

 

how.

 

N

OTE

   

ADM

 

uses

 

heuristics

 

to

 

guess

 

the

 

protocols

 

only

 

for

 

ports

 

that

 

are

 

lower

 

than

 

512.

Table 5-2.  

Dependency Discovering Methodology

What

How

Discover

 

the

 

open

 

connections

 

that

 

the

 

interrogated

 

host

 

has

 

to

 

other

 

hosts

 

on

 

the

 

network

 

(much

 

like

 

passive).

By

 

querying

 

the

 

services

 

exposed

 

by

 

the

 

ADM

 

protocol,

 

as

 

described

 

previously.

For

 

each

 

of

 

those

 

open

 

connections,

 

discover

 

the

 

service

 

that

 

is

 

using

 

the

 

connections.

 

ADM

 

finds

 

the

 

process

 

ID

 

(PID)

 

of

 

the

 

services

 

running

 

on

 

the

 

host,

 

and

 

matches

 

up

 

that

 

PID

 

with

 

the

 

PID

 

of

 

each

 

open

 

connection.

Note:

 

There

 

is

 

a

 

limitation

 

with

 

some

 

major

 

OS

 

platforms

 

(SunOS,

 

AIX,

 

and

 

HP

UX)

 

for

 

which

 

netstat

 

is

 

unable

 

to

 

retrieve

 

PID

 

information.

 

On

 

these

 

platforms,

 

this

 

capability

 

is

 

disabled.

Содержание VCENTER APPLICATION DISCOVERY MANAGER 6.1.1 - RESPOSITORY

Страница 1: ...scovery Manager 6 1 1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition To check for more recent editions o...

Страница 2: ...his documentation submit your feedback to docfeedback vmware com Copyright 2010 VMware Inc All rights reserved This product is protected by U S and international copyright and intellectual property la...

Страница 3: ...Log In to the ADM Console 15 3 Managing ADM 17 Groups 17 Discovery 17 Application Patterns 18 Changes 18 Fingerprints 19 Identifying Application by Ports 19 Aging 20 Deleting Aging Logs 21 Users 21 Ro...

Страница 4: ...tail Discovery for Dependencies 48 VMware Discovery 49 VMware Terminology Overview 49 VMware Discovery in ADM 49 Use Case 50 Using VI SDK for Detail Discovery 51 Capabilities 52 6 Application Patterns...

Страница 5: ...VMware Inc 5 Contents Complete Synchronize 68 Displaying ADM data in SAM 68 Custom Reports 70 9 Solver 71 Overview 71 Reports in the Solver Tab 71 Index 73...

Страница 6: ...ADM User s Guide 6 VMware Inc...

Страница 7: ...to http www vmware com support pubs Document Feedback VMware welcomes your suggestions for improving our documentation If you have comments send your feedback to docfeedback vmware com Technical Suppo...

Страница 8: ...n the job reference tools Courses are available onsite in the classroom and live online For onsite pilot programs and implementation best practices VMware Consulting Services provides offerings to hel...

Страница 9: ...the relationships and dependencies between these instances in real time The discovery data is stored in the Management Data Repository The map feature in the User Interface UI provides a graphical rep...

Страница 10: ...hange to a CI For example a change to a configuration file on a host is a change Change tracking Change tracking refers to a change in the discovered environment such as a change in the amount of acti...

Страница 11: ...n your data center The following discovery types apply IP discovery Detects hosts or other configuration items with a specific IP address when passive discovery fails to discover them Detail discovery...

Страница 12: ...ps described in VMware vCenter Application Discovery Manager Administration Guide VMware vCenter Application Discovery Manager Administration Guide also describes how to move an existing Single Box se...

Страница 13: ...ote database setup are described in VMware vCenter Application Discovery Manager Administration Guide NOTE Passive and Detail Discovery can run on single or multiple Collectors NOTE Passive and Detail...

Страница 14: ...ADM User s Guide 14 VMware Inc...

Страница 15: ...m using the ADM Console 1 Open Microsoft Internet Explorer 2 Type the IP address of the management appliance into the URL and click Go The Welcome screen appears 3 In the Username field type your user...

Страница 16: ...ADM User s Guide 16 VMware Inc...

Страница 17: ...lows you to classify CIs into logical sets or collections so that actions such as creating reports policies or viewing the inventory is applied to specific groups instead of the entire database of CIs...

Страница 18: ...1 lists and describes the information in the Change Tracking Policies List Click on the top of the column to sort the list by that column To view changes in the environment navigate to Change Tracking...

Страница 19: ...the network from the interface This depends on the network structure and permissions but usually there is no internet access and limited access to other resources on the net Invokes other programs ins...

Страница 20: ...nsole Creating an entity aging policy allows you to view the most updated state of your network since it is a constantly changing environment Aging is performed through aging policies When you create...

Страница 21: ...ns on how to perform these actions Role Based Access Control ADM provides role based access control This allows you to assign permission to a role instead of directly assigning permission to a user AD...

Страница 22: ...uide provides information about adding and configuring an active probe Advanced Configuration Sets parsing of configuration files Use only when an IT Compliance Analyzer Application Edition ITCA AE ap...

Страница 23: ...the license details including the license feature the amount licensed the amount used the expiration date and the serial number from the License properties page To view license details 1 From the ADM...

Страница 24: ...ADM User s Guide 24 VMware Inc...

Страница 25: ...sts There are three types of groups View Business Application and Cluster ADM administrators can perform the following actions in this tab Add Group Adds a new group Copy Group Opens a dialog box to c...

Страница 26: ...will refresh automatically Built In Groups The following groups are built into ADM Microsoft SQL Servers MySQL databases IIS servers VMware ESX Servers Jboss servers VMware virtual machines Routers S...

Страница 27: ...n create a group that consists of both Linux hosts and Oracle databases rule 1 Primary object host service J2EE application J2EE module or database instance rule 2 rule 3 rule 1 rule 2 rule 1 ADM grou...

Страница 28: ...ts hypervisors Service Basic all services running on hosts in scope with incoming protocols connection with outgoing protocols connection being accessed by URL running on host having configuration Ext...

Страница 29: ...E module Basic all J2EE modules deployed on J2EE applications running on services where services running on hosts in scope with incoming protocols connection with outgoing protocols connection Extensi...

Страница 30: ...ADM User s Guide 30 VMware Inc...

Страница 31: ...e Clicking on a host service or device will display its properties Discovery 5 Table 5 1 Types of Discovery Discovery Types Definition Passive Discovery Passive Discovery is the process in which netwo...

Страница 32: ...reate a policy The online help contains procedural information for Passive Discovery tasks Plans You can create a Passive Discovery plan from the Plan tab within the Passive Discovery Policy Definitio...

Страница 33: ...network Using these protocols you can obtain supplementary information about network hosts and add it to the MDR You can view the additional configuration information found by detail discovery in the...

Страница 34: ...scovered only once a week You want to exclude the Detail Discovery of hosts with specific host names or operating systems The Discovery Plan Definition screen is shown below Policies You can initiate...

Страница 35: ...on to all the default directories through which it searches The following is an example in which you would use this page 1 The default Oracle installation on UNIX is located at opt oracle but in your...

Страница 36: ...tributed setup the hosts to be discovered needs to be included in both a Detail Discovery policy and an Active Probe configuration The Detail Discovery policy includes a list of items to include in th...

Страница 37: ...IP address assigned to the ADM appliance The relevant ports are typically For SNMP UDP 161 For Telnet TCP 22 for SSH and TCP 23 For WMI access WMI Deployment Recommendations on page 41 and Firewall S...

Страница 38: ...these are stored by ADM internally in an encrypted form SSH Server Deployment Recommendations Firewall Settings SSH queries are normally performed on TCP port 22 on the server If a firewall exists be...

Страница 39: ...nformation Base MIB The core MIB which is available in most agents is called MIB 2 and it supplies system and hardware information Detail Discovery with SNMP ADM can act as an SNMP manager and collect...

Страница 40: ...eried both locally and remotely Remote queries are through RPC access to the WMI component using the remote access flavor of the COM technology known as Distributed Component Object Model DCOM Detail...

Страница 41: ...all problems you can deploy the Collector appliance in the same network as the managed hosts without a firewall between them If your environment requires a firewall between the Aggregator appliance an...

Страница 42: ...ne either locally on that host or remotely To configure WMI access on the managed hosts 1 If you are configuring a remote machine use a domain administrative account A local administrative account wil...

Страница 43: ...Group or user names list select the user who will be performing the Detail Discovery 4 Select Read Execute and Read from the Permissions for user list to grant the necessary permissions 5 Click OK to...

Страница 44: ...tart TlntSvr To log in to a machine using Telnet you need to be listed as a member of either the local TelnetClients group on that machine or as a member of the domain s TelnetClients group To modify...

Страница 45: ...o discover configure and monitor all aspects of VMware ESX servers and Virtual Center VI SDK on Virtual Center accesses information about the entire Virtual Infrastructure deployment whereas VI SDK on...

Страница 46: ...e clients ADM allows you to correctly identify dependencies using Detail Discovery only without relying on Passive Discovery The Process of Dependency Discovery Using Only Detail Discovery To discover...

Страница 47: ...covery only Discover the open ports that the services running on the interrogated host are using to listen for incoming connections service endpoints Both netstat and SNMP tables expose listening port...

Страница 48: ...ne IP are merged to appear as a single host Second Detail Discovery policies will be tailored to match the discovery protocol with the OS of the hosts in their scope This less frequent DEEP policy cre...

Страница 49: ...UI used to connect to the Virtual Center Server VMware Discovery in ADM ADM can discover VMware environment track changes in the environment and find dependencies within that environment ADM can disc...

Страница 50: ...plication One of the following protocols is allowed in the VMware Infrastructure environment SSH Telnet SNMP on the VMware ESX Server VI SDK with either Virtual Center or all of the ESX Server in the...

Страница 51: ...Discovery Policies page When entering the protocol type during detail discovery policy creation use any or all of the following protocols SSH SNMP on the ESX Server included in the VMware Infrastruct...

Страница 52: ...ory page and click Search This option is shown below Finding Dependencies Between a VMware Infrastructure and Virtualized Business Applications Assumptions You have completed active discovery of the V...

Страница 53: ...hat contains all the virtual machines in the VMware Infrastructure environment 2 To view the VMware Infrastructure environment do any of the following Automatically extend the group you created to inc...

Страница 54: ...ADM User s Guide 54 VMware Inc...

Страница 55: ...ces of a business application Creating application patterns helps you to easily follow any changes in a specific business application The instance is updated automatically if there are server changes...

Страница 56: ...ource or target of the application pattern Figure 6 3 demonstrates a connectivity rule that includes JDBC and HTTP connections as well as assigns the Apache Server as a source to the Jboss Server targ...

Страница 57: ...e based rule as a unification rule When the rule is applied it results in one instance being detected instead of several that contain all the same components For example you might not know how many AD...

Страница 58: ...instances that match that definition Viewing Application Pattern Definitions and Instances The application pattern definitions and instances are viewed and managed through the Manage tab The VMware v...

Страница 59: ...rs new instances once a day and is cleared by the user Name Name given to the Application Pattern when it was created Description Description of the Application Pattern Definition optional Last Discov...

Страница 60: ...tion Valid A green check mark means the application pattern instance was valid as of the last Refresh Name The name of the Application Pattern Instance ADM provides a default name but you can provide...

Страница 61: ...on pattern definition 1 Navigate to Manage Application Pattern Definitions 2 Click Add Application Pattern from the Actions pane on the left side of the screen 3 Create the node rules for each endpoin...

Страница 62: ...ed Application Pattern Instances page appears displaying the scope of these instances Select the application pattern instances that you would like to store and click Create Step 4 Storing Selected Ins...

Страница 63: ...n Host Inventory Report Device Inventory Report Service Inventory Report Connection Inventory Report Host Operating System Breakdown Report Host CPU Breakdown Report Host Kernel Version Breakdown Repo...

Страница 64: ...e Baseline Behavior Report Host Baseline Comparison Report Service Baseline Comparison Report Most Used Hosts Report Least Used Hosts Report Most Active Host Users Report Least Active Host Users Repor...

Страница 65: ...w the integration screen from the ADM Console click Connectors tab Depending on the applications you have installed and licensed you see the following tabs EMC Smarts Reports The VMware vCenter Applic...

Страница 66: ...Integration Status screen Table 8 1 ADM Smarts Integration Status Screen Information Field Description Last Sync Time Displays the time of the last successful ADM SAM synchronization Registration Sta...

Страница 67: ...opulated from the ADM to the SAM Since the ADM discovery process can result in a relatively large set of server and client resources you must carefully plan on the scope of integration The scope of in...

Страница 68: ...red the ADM and SAM integration the system must be synchronized for the SAM to retrieve the data The following two options are available for synchronizing Schedule the synchronization between the ADM...

Страница 69: ...pen an ADM console in context using the Smarts Launch in Context functionality right click an object and navigate to Client Tools Launch ADM Web Console as shown below As a result of integration the A...

Страница 70: ...the path for the browser running on a Solaris host For example BROWSER usr sfw bin mozilla 4 Save the file to the BASEDIR smarts actions client ADM directory Custom Reports In addition to standard re...

Страница 71: ...ition Reports Application upgrade Before upgrading your applications use this solution to identify applications hosts and services that are heavily utilized and are excellent candidates for upgrading...

Страница 72: ...ons continue functioning without interruption Create a short list of hosts that are being acquired or sold Create a short list of services that are being acquired or sold Show which other hosts and se...

Страница 73: ...stributed appliance solution 12 Distributed appliance with Remote Database solution 13 E Entity Aging 10 F Firewalls 37 G Groups Built in groups 26 User defined groups 26 L License 22 M Management Dat...

Страница 74: ...ADM User s Guide 74 VMware Inc...

Отзывы: