Host Inventory Pre-Installation Setup > Configure Host Discovery Policies to Populate the Host Inventory
  
Version 10.0.01
Configure Host Discovery Policies to Populate the Host Inventory
Host Discovery begins with a Discovery Policy, which identifies the Data Collector that will gather information about hosts in your environment. In addition, a policy has an associated set of credentials, WMI proxies, and paths to access commands on the hosts. For additional prerequisite details, see Host Resources Prerequisites and Configurations, Host Access Requirements, and Host Inventory Configuration Steps.
A Discovery Policy typically is used once to initially populate your host inventory. Executing a discovery policy more than once has no effect for hosts that were previously discovered. To identify and resolve connectivity issues, see Validate Host Connectivity.
Although all hosts can be included in a single policy, you might want to create one or more Host Discovery Policies in the following recommended groupings:
by OS (Windows or Linux) - This grouping is essential, as the probes and parameters are OS-specific.
by common attributes, such as User ID, password, access control commands (sudo, pbrun, sesudo), PATH
by application, such as Oracle or Exchange
Discovery Policy Considerations
If your enterprise configures hosts to lock out access after multiple failed authentication attempts, take the following tips into consideration:
If you choose more than one credential in the Discovery Policy credentials list, you risk host authentication failure lock-out. The discovery process will try the first credentials and if they fail, discovery will try the next credentials that you’ve selected. Therefore, if your hosts are configured to prevent multiple authentication retries, multiple failed attempts may cause a lock-out.
If multiple Discovery Policies are running simultaneously, with one policy using an IP address to access the host and the other policy using a name to access the host, the multiple access attempts may cause a lock-out. Note that if the authentication attempts are successful, only one host record is added to the inventory.
Configure a Discovery Policy
Note: A Discovery Policy typically is used once to initially populate your host inventory. Executing a discovery policy more than once has no effect for the subsequent runs for hosts that have already been discovered and added to the inventory.
For additional information about Host Inventory Discovery and Management, see:
Before Discovering Hosts
Execute and Monitor Host Discovery
Validate Host Connectivity
Host Inventory Search and Host Inventory Export
To create/edit Host Discovery Policies, select Admin > Data Collection > Host Inventory
1. In the Host Inventory toolbar at the top of the browser window, click Discover Hosts.
2. Add, Edit, or Delete settings using the buttons at the bottom of the window.
3. Click Add to configure settings and then click OK.
 
Field
Description
Sample Values
Name*
Assign a name to identify this Discovery Policy.
 
Collector*
Select the data collector from the drop-down list
 
Domain*
Select the Hitachi Storage Viewer Domain from the list; for most environments, only one Domain is displayed. Multiple domains facilitate management for Managed Services Providers (MSPs).
 
Host addresses*
A range of IP addresses can be specified
 
Hostnames and/or IP addresses can be listed, separated by commas
192.168.0.1-250
 
172.168.1.21, ABChost1, ABChost2, 172.168.1.58
Excludes
List any known IP addresses that you know are not valid for host collection; for example, the IP address of a printer. IP address ranges are also supported.
 
Configuration options
This list gets populated when you select a Domain at the top of the Host Discovery Policies window.
Credentials
WMI Proxies
Paths
Expand these lists to select the configurations to be used by this Discovery Policy.
IMPORTANT NOTE: If you choose more than one credential in the list, you risk host authentication failure lock-out. The discovery process will try the first credentials and if they fail, discovery will try the next credentials that you’ve selected. Therefore, if your hosts are configured to prevent multiple authentication retries, multiple failed attempts may cause a lock-out.
 
Collecting from Clustered SQL Server and Oracle Applications
Collection from clustered SQL Server and Oracle applications requires a specific data collection configuration. Typically, when configuring a Host Discovery Policy, the IP address of the specific host/node should be configured in the policy for direct access to the host’s data. See Configure a Discovery Policy.
In a clustered environment, however, the following configurations are required to gather the host data.
Host collection requires the IP address or host name of the Cluster (not the IP address or host name of the Cluster Node) in the Host Discovery Policy. See Figure 12.1 Host Discovery Policy Configuration Steps.
The Application Probe requires the IP address or host name of the Cluster (not the IP address or host name of the Cluster Node). See Figure 12.2 for an Application Probe Example.
Note: If Cluster Nodes already have been discovered, they should be removed from the Host Inventory.
Figure 12.1 Host Discovery Policy Configuration Steps
 
Figure 12.2 Application Probe Example