What is needed to set-up a TADDM Discovery run?
• The discovery scope: Typically a valid IP range, a subnet or a specific component, the discovery scope signifies the span of the discovery process. • Access lists: Access lists specify the read-only access credentials needed to discover and query the components for its appropriate configuration attributes and dependencies. The access mechanism varies based on the type of components discovered: • SNMP community strings to discover the network elements • SSH to discover the configuration and dependencies of the hosts/operating systems • Protocols like JMX, SQL, WMI and other standards access mechanisms to discover application software • Schedule: TADDM’s discovery process can be executed on demand, as part of a schedule, or driven by externally triggered events.