BMC Discovery 11.0
This section describes the new features and enhancements that have been introduced in BMC Discovery version 11.0.
- Start anywhere application modeling: This is a new approach to application modeling which enables you to choose any entry point, or points into an application and begin modeling from there
- Cluster Discovery: BMC Discovery enables you to discover cluster instances and their configuration in your IT environment. BMC Discovery can discover configuration data for various clustering technologies, such as Microsoft Cluster Server, Symantec Veritas Cluster Server, and so on.
- EMC VPLEX discovery: Ability to discover EMC VPLEX storage devices.
- New UI: The UI has been updated to give a cleaner, more modern look and feel.
- Unified credentials UI: The credentials UI has been substantially revised and simplified, in line with the ongoing UI updates.
- vCenter discovery: Improved discovery of VMware ESX and ESXi hosts using vCenter.
- Software and infrastructure visualizations: The software context view has been extended to provide software and infrastructure visualizations. The infrastructure visualizations replaces the existing dependency visualizations, providing a simple editable view of the infrastructure related to any node you use to start viewing it.
- Processor information discovery: A processor information object in BMC Discovery represents a processor in a host.
This section describes the set of Release notes in version 11.0 of BMC Discovery.
These Release Notes detail the following information:
Integrations with other products.
Details of possible problems and how to solve them.
This topic describes and links to the ready-made PDF of this space. If the ready-made PDF of this space do not satisfy your requirements, you can export a custom PDF.
Ready-made PDF of this space
The following table provides ready-made PDF that contain snapshots of the content in this space.
|All PDF||1 Mar 2016||25.3 MB|
The following table lists topics that contain videos that supplement the text-based documentation.
This video explains how to navigate through the new UI in BMC Discovery 11.0.
This video helps you to understand what’s changed in the Credentials feature of BMC Discovery in version 11.0.
BMC Discovery integration with LDAP
This video demonstrates the integration of BMC Discovery 11.0 with LDAP using Microsoft Active Directory LDAP as an example.
|Introduction to start anywhere application modeling||03:49|
This video provides an introduction to Start anywhere application modeling, introduced in BMC Discovery in version 11.0.
What is the performance impact of running BMC Discovery?
Running BMC Discovery should have a minimal impact on your environment. The discovery techniques used are non-intrusive, lightweight and agent-free.
What can BMC Discovery discover in the network?
BMC Discovery is IP-based and can discover any host system with an IP connection including servers, workstations, network nodes, printers, wireless access points, and so on. In actuality, though, we aim BMC Discovery at datacenter discovery, and it is optimised to that purpose. For this reason, we do not explicitly support more client-side items, such as wireless access points, workstations and so on. Any support for those that does exist is a side effect of our support for server-side discovery, and we're unlikely to invest in improving it.
What discovery techniques do you use?
BMC Discovery uses a range of discovery techniques where appropriate. These include:
- Network scanning (looking for services on well-known TCP and UDP ports on IP-reachable machines).
- APIs and remote command execution (looking at specific processes running on each node, querying package managers and querying established inter-process communications mechanisms).
- SNMP (MIBs provide a rich source of management information).
Will any network security need to be disabled for the discovery process?
Obviously, the BMC Discovery appliance needs to be able to reach areas of the network in order to discover hosts. However various methods of providing secure access are possible without disabling firewalls and access control policies, including using VPN tunnels and using Windows proxy BMC Discovery appliances. Some IDS systems might identify certain activities (such as port scans) as suspicious.
What is the impact of my applications running on platforms that are not supported by BMC Discovery?
The discovery process will identify endpoints on such computers if they are visible from other hosts. You will need to complete details of programs running on them manually, though it might also be possible to categorize some of the components of the applications running on the unsupported platform either by which port it, or its counterpart, is listening on.
Can the product introduce any risk into my network or application infrastructure?
To provide a clear picture of your total IT infrastructure, BMC Discovery will actually reduce risk in your network by allowing you to weed out rogue elements that do not meet corporate policy, are out of date or provide potential security holes.
The BMC Discovery discovery process uses standard techniques that should not de-stabilize elements of the infrastructure.
Since there are always risks with deploying new technology, BMC's implementation plan involves analyzing areas of potential risk and achieving the right balance of risk and reward. BMC's test plan is also aimed at minimizing risk, ideally including testing in the customer's test environment.
Do I need to install any software on other computers?
The BMC Discovery ethos is agent-free management. BMC does not believe the logistical challenges associated with having an agent on every node is justifiable, so no BMC Discovery-specific software needs to be installed on other computers. The BMC Discovery user interface is entirely web-based.
Why is agent-free discovery so important?
Agent-based discovery relies upon a level of control of asset deployment that does not exist in most businesses. It also implies a significant cost overhead to maintain agents on each platform, including approving, testing and deploying the agents. Finally, agents might not be available for the range of target platforms that your organization uses. We use standard techniques that have individually been authorized and deployed.
How do I reset the BMC Discovery user password?
If you forget your user interface (UI) password to log in to BMC Discovery, you can reset the password at the command line.
tw_passwd utility enables you to change the password of a specified user interface user. To use the utility, enter the following command at command prompt:
where username is the name of the UI user to change.
Changing passwords for command line users
tw_passwd utility is for changing UI users' passwords. To change the passwords for command line users, as the root user, use the Linux command
passwd. This is described in Changing the root and user passwords
If you have any other questions about BMC Discovery, contact Customer Support.
BMC Discovery integrates with the following products:
BMC Atrium CMDB
BMC Discovery can synchronize discovered data to BMC Atrium CMDB using CMDB synchronization.
BMC Atrium Orchestrator
BMC Atrium Orchestrator integrates, automates, and orchestrates processes across multiple applications and tools. When integrated with BMC Discovery, BMC Atrium Orchestrator triggers a rescan of the virtual machine that was moved, and the source and destination hosts.