Discovery Probes and Sensors Lab Guide For Now
Discovery Probes and Sensors Lab Guide For Now
Lab
Guide
Discovery
201:
Custom
Probes
and
Sensors
Aleck
Lin
&
Ryan
Zulli
admin / Knowledge15
itil / Knowledge15
employee / Knowledge15
This
Page
Intentionally
Left
Blank
Lab
Prerequisites
Skills
needed
for
this
lab
are
a
core
understanding
of
the
ServiceNow
Discovery
technology,
comprehension
of
TCP/IP
protocols,
IP
networking
and
base
understanding
of
the
ServiceNow
core
platform.
Some
basic
JavaScript
knowledge
is
helpful.
Lab
Agenda
• Discover
Windows
Machine
o Custom
Windows
Probe
and
Sensor
• Discover
SNMP
Devices
o Discover
a
new
SNMP
Device
o Classify
non-‐OOB
SNMP
Devices
o Custom
SNMP
Probe
and
Sensor
• Q
&
A
Lab
Goal
This
lab
explains
how
to
use
WMI
to
gather
additional
Lab
1
information
from
Windows
machines.
Discover
Windows
Machine
WMI
Basics
WMI
is
an
implementation
of
the
Web-‐Based
Enterprise
Management
(WBEM)
standard.
WMI
provides
a
uniform
access
mechanism
to
a
vast
collection
of
Windows
management
data
and
methods.
WMI
offers
access
to
this
information
via
script,
C++
programming
interfaces,
dot
net
classes
(system.
management),
and
a
command
line
tool
(WMIC).
Other
WMI
capabilities
also
include
eventing,
remoting,
query,
views,
user
extensions
to
schema
and
instrumentation,
and
more.
Start
a
Discovery
To
start
off
the
lab,
a
discovery
run
is
obviously
needed.
Here
we
go!
1. Navigate to Discovery > Discovery Schedule. Click the Quick Discovery button.
2. In
the
center
of
the
browser,
a
pop-‐up
box
appears.
Enter
the
following:
• Target
IP:
127.0.0.1
• MID
Server:
win_mid_server
3. Click
OK
to
start
the
discovery.
4. The
window
navigates
directly
to
the
Discovery
status
record.
Click
the
number
attribute
to
open
the
record.
Lab
Goal
This
lab
explains
how
to
create
a
Windows
probe
and
sensor
Lab
1.1
to
gather
additional
information
from
Windows.
To
see
what
information
is
available
to
gather,
check
out
the
Win32
classes
Custom
(https://msdn.microsoft.com/en-‐
us/library/aa394084(v=vs.85).aspx)
on
the
MSDN.
Windows
Probe
and
This
lab
uses
the
Win32_PerfFormattedData_PerfOS_System
class
and
the
SystemUpTime
attribute
to
find
out
when
the
Sensor
Windows
server
was
last
restarted.
Build
a
Probe
1. Navigate
to
Discovery
Definition
>
Probes.
2. Click New.
4. Right
click
the
header
and
click
Save.
2. Enter
the
following
information
in
the
WMI
Field
table:
• WMI
path:
Win32_PerfFormattedData_PerfOS_System.SystemUpTime
3. Click
Submit.
2. Scroll to the bottom of the page and click New.
4. Click
Ok
to
get
it
started.
After
the
test
probe
is
done,
it
redirects
the
page
to
the
ECC
queue
entries
that
represent
the
probe
(output)
and
the
result
of
the
probe
(input).
The state of the probe result (input) is error because there is no sensor for the probe yet.
5. Click the ECC input entry and note the SystemUpTime value.
2. Click New.
type: “DiscoverySensor”
});
4. Click
Submit.
Add
the
Probe
to
the
Windows
Classifier
as
an
Exploration
Probe
1. Navigate
to
Discovery
Definition
>
Windows.
3. Click
Edit
under
the
Triggers
probes
tab.
4. Search for Windows – Last Bootup Time probe and add it to the slush bucket. Click Save.
2. Go
to
the
Devices
related
list
and
drill
into
the
Windows
CI
record.
4. Add the Start date field to the form and click Save.
5. Observe
that
the
Start
date
field
has
been
populated!
Lab
Goal
This
lab
explains
how
to
use
the
SNMP
protocol,
which
is
Lab
2
common
for
discovering
network
devices.
Before
beginning,
here
is
a
quick
overview
of
how
SNMP
works.
Discover
SNMP
Devices
SNMP
Basics
SNMP
stands
for
Simple
Network
Management
Protocol.
It
is
typically
used
to
for
network
devices,
such
as
routers,
switches,
printers,
UPS,
servers.
SNMP
devices
expose
management
data
as
variables
(identified
by
OIDs),
which
are
organized
in
hierarchies.
These
hierarchies
and
other
metadata
(such
as
type
and
description
of
the
variable)
are
described
by
MIBs
(Management
Information
Bases).
MIB
(Management
Information
Base)
typically
consists
of
many
managed
objects
(aka
variables).
There
are
two
types
of
managed
objects.
• Scalar
object,
which
defines
single
object
instance
• Tabular
object,
which
defines
multiple
related
object
instances
that
are
grouped
in
MIB
tables.
OIDs,
or
Object
Identifiers
are
what
uniquely
identify
managed
objects
in
a
MIB
hierarchy.
www.oid-‐info.com
is
a
great
site
to
look
up
OID
information.
ISO(1).Identified-‐organization(3).dod(6).internet(1).Mgmt(2).mib-‐2(1).system(1)
• sysDescr(1)
-‐-‐
Scalar
object
• sysObjectID(2)
• sysUpTime(3)
• sysContact(4)
• sysName(5)
• sysLocationu(6)
• sysServices(7)
• sysORLastChange(8)
• sysORTable(9)
-‐-‐
Tabular
object
To
access
an
object,
for
example,
the
sysDescr
object
with
the
OID
“1.3.6.1.2.1.1.1”,
typically
one
uses
command
line
tools
to
retrieve
the
object
value
through
clients
such
as
snmpwalk
or
snmpget.
Lab
Goal
This
lab
explains
how
to
discover
an
SNMP
device
with
its
IP
Lab
2.1
address
provided
for
you.
Discover
a
A
VPN
concentrator
device
is
available
for
the
purpose
of
this
lab.
New
SNMP
Device
Start
a
Discovery
To
start
off
the
lab,
a
discovery
run
is
needed.
Follow
these
steps.
3. In
the
center
of
the
browser,
a
pop-‐up
appears.
Enter
the
following:
• Target
IP:
127.0.0.1
• MID
Server:
win_mid_server
4. Click
OK
to
start
the
discovery.
5. After
clicking
OK,
the
navigation
takes
you
directly
to
the
Discovery
status
record
the
represent
the
Discovery.
2. Navigate
to
the
ECC
Queue
related
list,
and
click
the
SNMP
–
Classified:
xxx
OIDs
Input
record.
3. Click
the
XML
icon
and
from
the
data,
note
the
sysDescr
OID
that
shows
Cisco
Systems,
Inc./VPN
3000
Concentrator
Ver.
5. Notice
that
VPN
Concentrator
is
not
a
device
classified
out
of
the
box,
so
you
need
an
SNMP
classifier
for
it!
Lab
Goal
This
lab
explains
how
to
classify
a
SNMP
device
that
Discovery
Lab
2.2
does
not
find
out
of
the
box.
Classify
an
non-‐OOB
SNMP
Devices
In
this
lab,
we’ll
create
a
u_cmdb_ci_vpn_concentrator
table
that
extends
the
cmdb_ci_netgear
table.
Notice
the
“u_”
is
automatically
added
so
that
your
table
never
clashes
with
the
ones
that
ServiceNow
creates
(or
will
create).
We’ll
create
the
table
first
and
then
come
back
to
create
the
new
classification
for
the
VPN
concentrator.
2. Click
New.
4. Click
Submit.
2. Click
New.
3. Enter
the
following
information
in
the
classifier
record
• Name:
VPN
Concentrator
• Table:
VPN
Concentrator
4. Click
Submit.
5. Drill
back
into
the
record.
7. Enter
the
following
information
in
the
criteria
record.
• Oid:
1.3.6.1.4.1.3076.1.2.1.1.2.1
• Operator:
Is
• Manufacturer:
Cisco
• Model:
VPN
3000
Series
Concentrator
• Active:
Checked
• Table:
VPN
Concentrator
• Classifier:
VPN
Concentrator
8. Click Submit.
10. Type
snmp
in
the
search
box
of
the
slush
bucket.
11. Move
the
SNMP
–
Identity
and
SNMP
–
Routing
probes
to
the
right
side
of
the
slush
bucket.
3. Move
IP
address,
Start
Date,
Description
fields
to
the
right
of
the
slush
bucket.
5. Right-‐click
the
header
and
hover
over
Configure.
8. Click
Save.
Lab
Goal
This
lab
explains
how
to
create
custom
SNMP
probes
and
Lab
2.3
sensors.
Custom
The
goal
is
to
help
you
figure
out
how
you
can
leverage
the
Discovery
tool
to
gather
data
that
is
meaningful
to
your
SNMP
organization.
Probe
and
Sensor
Gather
Scalar
OID
Objects
In
this
exercise,
you
walk
through
how
to
build
a
probe
to
retrieve
a
scalar
OID
and
a
sensor
to
process
the
information
and
store
it
in
the
SNMP
device.
Build
a
Probe
1. Navigate
to
Discovery
Definition
>
Probes.
2. Click
New.
3. Enter
the
following
information
in
the
Probe
table.
• Name:
SNMP
–
Last
Bootup
Time
• Class:
SNMP
Probe
• Cached
results:
Unchecked
• Used
by
Discovery:
Checked
• Classic
mode:
Unchecked
• Description:
Use
SNMP
to
discover
last
bootup
time
• ECC
Queue
topic:
SNMP
• ECC
queue
name:
SNMP
–
Last
Bootup
Time
• Used
by
Orchestration:
Unchecked
4. Right
click
the
header
and
click
Save.
6. Enter
the
following
information
in
the
SNMP
Fields
table:
• OID:
iso.org.dod.internet.mgmt.mib-‐2.system.sysUpTime
• Comment:
Time
since
last
bootup
(in
hundredth
of
a
second)
7. Click
Submit.
2. Enter
the
following
information:
• Run
probe
against:
target
IP.
• Using
MID
server:
win_mid_server.
3. Click
OK
to
start
it.
4. After
the
test
probe
is
done,
it
redirects
the
page
to
the
ECC
queue
entries
that
represent
the
probe
(output)
and
the
result
of
the
probe
(input).
The
state
of
the
probe
result
(input)
is
error
because
there
is
no
sensor
for
the
probe
yet.
5. Click
the
ECC
input
entry
and
observe
that
the
payload
is
129600000
for
the
sysUpTime
OID.
Build
a
Sensor
1. Navigation
to
Discovery
Definition
>
Sensor.
2. Click
New.
ServiceNow,
Inc.
All
rights
reserved.
rights
reserved.
©
®2015
35
type: 'DiscoverySensor'
});
4. Click
Submit
to
save
the
record.
Add
Probe
to
the
SNMP
VPN
Concentrator
Classifier
as
an
Exploration
Probe
1. Navigate
to
Discovery
Definition
>
SNMP.
3. Click
Edit
under
the
Triggers
probes
tab.
4. Type
snmp
in
the
Search
box
of
the
slush
box.
ServiceNow,
Inc.
All
rights
reserved.
rights
reserved.
©
®2015
37
5. Move
the
SNMP
–
Last
Bootup
Time
record
to
the
right
side
of
the
slush
bucket.
6. Click
Save.
2. Go
to
the
Devices
related
list
and
drill
into
the
CI
and
observe
that
the
value
of
the
OID
has
indeed
been
added
to
the
Start
Date
field.