Levels of discovery
TADDM provides four levels of discovery: Level 1 discovery, Level 2 discovery, Level 3 discovery, and utilization discovery.
- Level 1 discovery
- TADDM sensor scanning that discovers basic information about the
active computer systems in the runtime environment. This scanning
is also known as credential-less discovery because it
requires no credentials. It uses the Stack Scan sensor and the IBM® Tivoli® Monitoring
Scope sensor.
Level 1 discovery is very shallow. It collects only the host name, operating system name, IP address, fully qualified domain name, and Media Access Control (MAC) address of each discovered interface. Also, the MAC address discovery is limited to Linux® on System z® and Windows systems.
Level 1 discovery does not discover subnets. For any discovered IP interfaces that do not belong to an existing subnet that is discovered during Level 2 or Level 3 discovery, new subnets are created based on the value of the com.collation.IpNetworkAssignmentAgent.defaultNetmask property in the collation.properties file.
- Level 2 discovery
- TADDM sensor scanning that discovers detailed information about
each operating system in the runtime environment. This scanning is
also known as credentialed discovery, and it requires
operating system credentials.
Level 2 discovery collects application names and the operating system names and port numbers that are associated with each running application. If an application has established a TCP/IP connection to another application, this information is collected as a dependency.
- Level 3 discovery
- TADDM sensor scanning that discovers detailed information about the application infrastructure, deployed software components, physical servers, network devices, virtual systems, and host data that are used in the runtime environment. This scanning is also known as credentialed discovery, and it requires both operating system credentials and application credentials.
- utilization discovery
- TADDM sensor scanning that discovers utilization information for the host system. A utilization discovery requires operating system credentials.
Level 2 and Level 3 discoveries collect more detailed information than Level 1 discoveries. If objects that are created during a Level 2 or Level 3 discovery match objects that were previously created by a Level 1 discovery, the objects that were created by the Level 1 discovery are replaced by the newly created objects, which, in turn, causes the Globally Unique Identifiers (GUIDs) for the objects to change. Therefore, in general, Level 1 data should not be used for integration with other products.