Discovery jobs
  • 20 Apr 2024
  • 4 Minutes to read
  • PDF

Discovery jobs

  • PDF

Article summary

Configure Discovery job to identify various devices within an organization, including Servers, Networks, Links, Printers, and Laptops. Once discovered, these devices are saved in their respective modules for easy access and management.

To start the Discovery job activity, you have to adopt the following steps as shown in the illustration below.

User persona: Application Designer

Let's explore the following Use Case for configuring Discovery jobs!
Use Case

User persona:Application Designer

Solution
Amy, the analyst wants to identify the devices present in the IT landscape. She wants to configure the order of execution of the protocols. After discovering the device, she wants to view the listed devices in the Scanned Result section and the undiscovered devices in the Errors Result section.Amy can use Discovery job feature under Discovery module. Based on which the Servers, Networks, Links, Printers, and Laptop devices in the organization can be identified. The discovered devices are saved in their respective modules. She can configure multiple subnets for a job and configure protocols, such as WMI, SNMP, SSH to discover devices in the given subnet range. 

Configure Discovery Job

To configure the Discovery job, perform the following steps:

  1.  Navigate to Home > Analyst > Discovery.Figure: Discovery

  2.  Click Discovery, and the following page is displayed.Figure: User Dashboard

  3.  Navigate to Discovery on the left panel and the page appears as shown below.Figure: Details and Jobs

  4. Click Discovered Jobs and the following page is displayed. The list of configured jobs, and the status of jobs that have been completed, not started or already completed are displayed.Figure: Discovery jobs

  5. On the Discovery job page, click New on the panel.
    Figure: Configure job details

  6. Select the Tenant and fill in the required details. For more information about the fields and icons on the Discovery job page, see Field Description.

    Field Description
    FieldDescription

    Discovery From (Proxy)

    If you select Proxy Server in the Monitoring Source field, the Discovery From (Proxy) field is displayed. Select the Proxy device from the list to discover devices from the selected proxy server.

    Job Name

    Type in the job name that will perform the Common Discovery.

    Run As User DOMAIN\usernameType the user domain or user name. 
    PasswordSpecify the password for the field.
    Re-enter PasswordRe-enter the password for the field.
    Notify Once CompleteIf selected, after completing the discovery task an e-mail notification is sent to the Administrator.
    Subnet
    TypeSelect the Type as Subnet.
    Ping Protocol

    The following protocols are available to select:

    Figure: Ping Protocol

    ICMP: Bidirectional Ping is required from the Proxy to all the targeted systems and server to the Proxy.

    TCP/UDP: Port 7 is used for checking the reachability of the system IP address. If there is any environment restriction on using ICMP-based ping, TCP Ping can be leveraged.
    Subnet FromType in the subnet numbers.
    Subnet ToType in the subnet numbers.
    Enable Nmap DiscoveryIf toggle is enabled,Nmap Discovery will be enabled. If Nmap is not enabled, Summit uses standard discovery functionality.
    Consider all IP Addresses till the last octet of the Subnet ToIf toggle is enabled,, it includes a range of IP addresses available within a specific subnet. For example, if you have an IP address like "192.168.1.0/24," the "24" indicates that the first three octets (192.168.1) are used for the network portion, and the remaining fourth octet (0) is available for assigning host addresses within that subnet. The range of usable IP addresses, in this case, would be from "192.168.1.1" to "192.168.1.254," leaving "192.168.1.0" as the network address and "192.168.1.255" as the broadcast address.
    Extended Discovery

    The following protocols are available to select:

    Figure: Protocols

    SNMP: Select the SNMP check box and the SNMP version from drop-down list. Specify the SNMP strings and the timeout (in seconds) and if SNMP check box is selected, then SNMP Version has to be specified. Select the SNMP version from the list: SNMPV1, SNMPV2c, SNMP V3

    If SNMPV3 is selected, the AuthType field is displayed. Select the Authentication Type from the list:

    AuthNoPriv: If selected you have to specify the authentication details. You have to select the SNMP user and authentication mode( SHA or MD5)

    AuthPriv: If selected you have to specify the SNMP user, authentication mode, privilege password, and privilege protocol.

    NoAuthNoPriv: If selected authentication and privilege is not applicable. You have to select the SNMP user from the list.

    You can provide ping time out for each protocol. Select any one monitoring protocol option. Type in the respective protocol details, as required.

    WMI: Select the WMI check box, the WMI user from the drop-down list, and specify the timeout in seconds.

    Note
    • The WMI protocol is used to mainly monitor the event status that is configured in the server.
    • New fields Software Discovery, Advanced Software Discovery, and Additional Discovery check boxes are populated when you select WMI protocol.

    SSH: Select the SSH check box and the SSH user from the drop-down list, Specify the SSH Port No. and the timeout (in seconds).

    Select the SSH check box and SNMP version.

    Set Time ForSpecify the ping retry and ping timeout (in microseconds).
    Thread TimeoutIt is required when the multi-threaded Discovery is performed. If a thread is not discovered in one attempt, the application retries the Discovery attempt until the time (in seconds) specified in this field. If the respective thread is not discovered within the specified time, a thread timeout error message is displayed.

  7. Click Next to schedule the Discovery job.
    Figure: Schedule the Discovery job
    Here you can specify the Schedule Type, Schedule Time and Time Zone.

  8. Click Submit to save the Discovery job.

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.