Skip to main contentSkip to search
Powered by Zoomin Software. For more details please contactZoomin
Product Documentation | ServiceNowProduct Documentation | ServiceNow
Product Documentation | ServiceNow
  • Home
  • Technical Documentation
  • Release Notes
  • API Implementation
  • Accessibility
  • EnglishDeutsch日本語한국어FrançaisPortuguês
  • CommunityAsk questions, give advice, and connect with fellow ServiceNow professionals.
    DeveloperBuild, test, and deploy applications
    DocumentationFind detailed information about ServiceNow products, apps, features, and releases.
    ImpactAccelerate ROI and amplify your expertise.
    LearningBuild skills with instructor-led and online training.
    PartnerGrow your business with promotions, news, and marketing tools
    ServiceNowLearn about ServiceNow products & solutions.
    StoreDownload certified apps and integrations that complement ServiceNow.
    SupportManage your instances, access self-help, and get technical support.

Vancouver IT Operations Management

Filters

Clear All Filters
Versions
Products
Clear All Filters

Discover related items together with the main CI

Watch
Save as PDF
Save topicSave topic & subtopicsSave entire publication
Share this page
Share to emailCopy latest version URL
Feedback
Print
Table of contents
  • IT Operations Management
    • ITOM licensing and subscriptions
      • Exploring ITOM SU Licensing
        • Subscriptions for IT Operations Management
        • Subscriptions for Operational Technology Management (OTM)
      • Configuring ITOM SU Licensing
        • Update ServiceNow® ITOM SU Licensing
        • View subscription statistics for IT Operations Management
        • Review resource usage against allocated subscription units
        • Check CI count used for IT Operations Management subscriptions
        • Check which CI types require an IT Operations Management subscription
        • View CIs consuming ITOM subscription units
      • ITOM SU Licensing Reference
        • Components installed with ITOM SU Licensing
        • Subscriptions form for the ITOM products
        • ITOM SU Licensing dashboard
    • ITOM Store upgrades
    • ITOM Cloud Accelerate
      • Cloud Services Catalog
        • Exploring Cloud Services Catalog
        • Configuring Cloud Services Catalog
          • Install Cloud Services Catalog
          • Cloud Services Catalog setup for the Day 1 configuration task
            • Set up Amazon Web Services on Cloud Services Catalog
            • Set up Microsoft Azure Cloud on Cloud Services Catalog
          • Integrating Azure DevOps and the Continuous Integration-Continuous Deployment pipeline
            • Release pipelines and Azure DevOps by Cloud Services Catalog
            • Set up the Microsoft Azure DevOps console
            • Run Discovery on Azure DevOps config provider
            • Order a Microsoft Azure DevOps catalog item
          • Integrating Ansible with Cloud Services Catalog
            • Set up Ansible as a Day 1 task
            • Run Discovery on the Ansible config provider
            • Order an Ansible job template
          • Cloud Services Catalog administration guide
            • Permissions management for Cloud Services Catalog
            • Policies and permission levels on services
        • Using Cloud Services Catalog
          • Requesting Cloud Services
        • Exploring the My Stacks tab
          • Manage My Stacks
          • Work with stacks
          • View stack dependency
          • Stack activities view
          • Actions on stacks
          • Redirection to My Stacks
        • Exploring My Resources
          • Manage My Resources and resource filters
        • Out Of Box Catalogs using Cloud Services Catalog
          • Amazon Web Services EC2 Linux Out Of Box Catalog items
            • Amazon Web Services EC2 Linux Out Of Box permissions
          • Amazon Web Services EC2 Microsoft Windows Out Of Box Catalog items
            • Amazon Web Services EC2 Windows Out Of Box permissions
          • Amazon Web Services DynamoDB Out Of Box Catalog Items
            • Amazon Web Services DynamoDB Out Of Box permissions
          • Amazon Web Services S3 Bucket Out Of Box Catalog items
            • Amazon Web Services S3 Bucket Out Of Box permissions
          • Microsoft Azure Linux Out Of Box Catalog items
          • Microsoft Azure Windows Out Of Box Catalog items
          • Microsoft Azure Out Of Box permissions
          • Microsoft Azure Functions App Catalog items
          • Out Of Box Actions
          • Out Of Box Policies
        • CSC references
          • Stages of Azure DevOps in Release life cycle management
          • Azure DevOps permissions
          • Ansible permissions
          • Workaround to known issues
      • Cloud Migration Assessment
        • Exploring Cloud Migration Assessment
        • Cloud Migration Assessment configuration
        • Using Cloud Migration Assessment in Configurable Workspace
          • Planning the migration process
            • Analyzing your current infrastructure
            • Review your current infrastructure with Cloud Migration Assessment
              • Review detailed server information in Configurable Workspace
              • Review detailed information on virtual machines in Configurable Workspace
              • Review detailed application information in Configurable Workspace
            • Choosing migration strategy
          • Create assessment tasks for cloud migration in Configurable Workspace
          • Assign resources to assessment tasks in Configurable Workspace
          • Review applications associated with assessment tasks in Configurable Workspace
          • Monitor the cloud migration progress in Configurable Workspace
        • Cloud Migration Assessment reference
          • Components installed with Cloud Migration Assessment
          • Assessment dashboard in Configurable Workspace of Cloud Migration Assessment
          • Assessment task form in Configurable Workspace
          • Server list in Cloud Migration Assessment
          • Applications list in Cloud Migration Assessment
          • VMs on undiscovered servers list in Cloud Migration Assessment
          • Software requirements list in Cloud Migration Assessment
      • Cloud Configuration Governance
        • Exploring Cloud Configuration Governance
          • Install Cloud Configuration Governance
          • Install the CCG Content Pack
          • Set up Cloud Configuration Governance for AWS
            • Configure the trusting account for Cloud Configuration Governance and Cloud Action Library
            • Create an assume role configuration
          • Set up Cloud Configuration Governance for Microsoft Azure
          • Domain separation and Cloud Configuration Governance
        • Using Cloud Configuration Governance
          • Scan configuration
            • Create a scan configuration
            • Run a scan configuration
          • Scan run
          • Cloud Configuration Governance policies
            • Create a policy with the condition builder
            • Create a policy with the Integration Hub subflow
            • Create a policy through script
            • Test the policy
            • Create a configuration key
            • Create a resource collector
            • Create a configuration collector
            • Create a CI finder mapping
            • Create a policy set
            • Copy an Integration Hub subflow template
          • Remediation
            • Create a remediation catalog item
            • Create a remediation action
            • Run remediation
        • Cloud Configuration Governance reference
          • Cloud Configuration Governance dashboard
          • Cloud Configuration Governance roles and system properties
          • Cloud Configuration Governance Scan configuration form
          • Cloud Configuration Governance Policy form
          • Cloud Configuration Governance Configuration key form
          • Cloud Configuration Governance Resource collector form
          • Cloud Configuration Governance Service Account Assume Role Config form
          • Cloud Configuration Governance scripting reference
          • Cloud Configuration Governance actions reference
          • Cloud Action Library actions reference
          • Cloud permissions required to collect the base system Cloud Configuration Governance configuration keys
          • Components installed with Cloud Configuration Governance
      • Cloud Action Library
        • Exploring Cloud Action Library
          • Install Cloud Action Library
          • Set up Cloud Action Library for AWS
          • Set up Cloud Action Library for Microsoft Azure
          • Domain separation and Cloud Action Library
        • Cloud Action Library reference
          • Components installed with Cloud Action Library
          • AWS Enable EC2 Instance Monitoring action
          • AWS Get IAM Login Profile action
          • AWS List Images action
          • AWS Put S3 Bucket Encryption action
          • AWS Turn Off EC2 Instance action
          • Azure Turn Off Virtual Machine action
          • CAL - AWS List S3 Buckets action
          • CAL - AWS List VMs action
          • CAL - Azure List VMs action
          • CAL - Azure VM IP Metric action
          • CAL - Azure VM Monitoring Metric Data action
          • CAL - Integer Stream action
          • Disable AWS IAM User action
          • CAL - AWS Generate Credential Report subflow
          • CAL - AWS S3 Get Encryption subflow
          • CAL - Resolve Credential Alias subflow
          • CAL - Resolve MID subflow
          • CAL - AWS S3 Get ACL subflow
          • Cloud profiles with minimal permissions for Cloud Action Library actions and subflows
      • ITOM Cloud Accelerate reference
        • Plugins or applications installed with ITOM Cloud Accelerate
    • ITOM Visibility
      • ITOM Visibility product view
        • ITOM Visibility and CMDB tables
        • ITOM Visibility use case
        • ITOM Visibility considerations
      • Data collected by ITOM Visibility
        • Detailed information on products discovered by ITOM Visibility
        • Operating systems discovery
          • AIX server discovery
          • Azure Virtual Machine Scale Sets (VMSS) Instance discovery
          • Apache HBase instance discovery
          • HPUX discovery
          • Hyper-V discovery
          • Red Hat JBoss server discovery
            • Legacy: JBoss probes and sensors
          • Linux discovery
            • Linux Red Hat cluster discovery
          • Netware discovery
          • OS/X (Mac) discovery
          • Solaris discovery
          • Virtual machine (vm) discovery
          • VMware discovery
            • Discovery for VMware vCenter
              • Configure an alternate port for vCenter
              • Data collected for VMware vCenter Server
              • Datastore data collected by Discovery
            • ESXi server discovery
              • Configure ESXi resource pools
            • Standalone ESXi discovery
            • VMware virtual machines
              • VMware Workstation - Legacy
            • VM instance state and status fields
            • Datastore Discovery
          • Windows discovery
            • Windows server cluster discovery
          • z/OS discovery
        • Operating-system-level virtualization (OSLV) discovery
          • Docker virtualization
        • Software discovery
          • Active Directory Domain Controller discovery
          • Adobe JRun discovery
          • Apache web server discovery
          • Application Mapping for UNIX discovery
            • Using the lsof Command
          • Citrix License Server and Delivery Controller discovery
          • Clustered application discovery on Windows
          • Discovery with Software Asset Management
            • Configure a CI to display Software Asset Management data
          • Exchange Client Access Server (CAS) discovery
          • Exchange Hub Transport Servers discovery
          • Exchange MailBox discovery
          • General software package discovery
          • GlassFish Server discovery
          • HP Operations Manager discovery
          • HP Service Manager discovery
          • IBM WebSphere Message Broker (WMB) and WMB HTTP Listener discovery
          • IBM Websphere MQ discovery
          • Microsoft IIS server discovery
          • Microsoft SharePoint discovery
          • NGINX web server discovery
          • Oracle Tuxedo discovery
          • Puppet automation software discovery
            • Add the must_sudo parameter to the Puppet probe
          • SAP products discovery
          • SQL Server Analysis Services (SSAS) discovery
          • Microsoft SQL Server Integration Services (SSIS) discovery
          • Sun Java Enterprise System (JES) discovery
          • Tomcat server discovery
          • WebLogic application server discovery
            • Add sudo access for the Weblogic - Find config.xml probe
            • Identifying Windows WebLogic application servers
          • IBM WebSphere server discovery
        • Database discovery
          • Database catalog discovery
          • Database Administrator (DBA) report discovery
          • Microsoft SQL Server and Cluster discovery
          • MySQL discovery
          • MongoDB discovery
          • PostgreSQL discovery
          • Oracle database discovery
          • SAP Sybase ASE discovery
        • Network device discovery
          • Load balancer discovery
            • A10 load balancer discovery
            • Cisco ACE load balancer discovery
            • Cisco GSS load balancer discovery
            • Cisco CSS load balancer
            • Citrix NetScaler load balancer discovery
            • F5 BIG-IP load balancer discovery
            • HAProxy load balancer discovery with probes
              • Enable HAProxy load balancer discovery with probes
            • NGINX load balancer discovery
            • Radware Alteon load balancer discovery
            • Radware-appDirector load balancer discovery
            • Load balancer fields and probes
          • Layer 2 discovery
          • TCP connection discovery
          • IP address discovery
          • IP network discovery
          • Network printer discovery
          • Router and switch discovery
            • Turn off collection of port data for SNMP network devices
          • IP service and daemon discovery
          • Uninterruptible power supply (UPS) discovery
          • IBM WebSphere DataPower discovery
          • Cisco Unified Computing System (UCS)-HD device discovery
          • Dell Remote Assistant Card discovery
          • HTTP device discovery
            • Run discovery through an HTTP or HTTPS REST call
        • Storage discovery
          • Configure discovery of hosts with attached storage
            • Configure Discovery for UNIX or Linux hosts with attached storage
            • Configure Discovery for Windows hosts with attached storage
          • Discovery data collected for storage via a host
          • Storage Discovery via SMI-S and CIM
            • Discovery of storage area networks (SAN)
            • How CIM Discovery works
            • Configure SMI-S Provider for storage Discovery
            • Data collected by Discovery on storage devices
          • Data collected for Veritas Volume Manager on Linux
          • NetApp Server and Cluster discovery
          • Manage large storage payloads in Linux and Solaris
          • Storage discovery examples
        • Cloud resource discovery
          • Data collected for Amazon AWS Cloud Discovery
          • Data collected for Microsoft Azure Cloud Discovery
          • Data collected for GCP Cloud Discovery
          • Data collected for IBM Cloud Discovery
          • Data collected for Oracle Cloud Discovery
          • Data collected for VMware Cloud Discovery
      • Discovery
        • Discovery basics
          • Horizontal discovery process flow with probes and sensors
          • Horizontal discovery process flow with patterns
        • Request Discovery
        • Discovery setup
          • Set up Discovery without Guided Setup
          • Discovery Quick Start
          • Migrate from CAPI to Patterns
        • Exploring Cloud Discovery
          • Cloud Discovery setup using classic Cloud Discovery
          • Cloud Discovery setup using Cloud Discovery Workspace
          • Create schedules for discovering cloud resources in Cloud Discovery
          • Create a discovery schedule in Cloud Discovery Workspace
          • Amazon AWS Cloud Discovery
            • AWS events-driven discovery
              • Configure the AWS Config service to send event notifications to the ServiceNow instance
              • Scale the AWS cloud event schedulers
              • Create a database index for the Cloud Events table
          • Azure Cloud Discovery
            • Create Azure cloud credentials
            • Azure Cloud Discovery using Service Principal with SSH Certificates
            • Microsoft Azure Alert driven discovery
            • Azure change processing
              • Configure Azure change processing
              • Migrate to Azure change processing
              • Add change processing support for an Azure resource type
          • Google Cloud Platform discovery
            • Configure the Google Stackdriver Logging service to auto-update the CMDB
          • IBM Cloud Discovery
          • VMware Cloud Discovery
            • Configure the VMware Events service to auto-update the CMDB
          • Cloud Discovery reporting
            • Analytics and Reporting for Cloud Resources
              • Activate Analytics and Reporting for Cloud Resources
            • Cloud Resources dashboard
            • Cloud Resources Explorer
        • Container discovery
          • Kubernetes discovery
            • Container image scans for software decomposition
              • Scan container images
              • Configure the SBOM generation
              • Download a software bill of materials (SBOM)
              • Container image discovery
        • Certificate Inventory and Management
          • Visibility to TLS certificates
          • Manual flow for certificate requests
          • Automated certificate management for TLS certificates
          • Certificate Generation through Cert-Manager Integration
          • Certificate integrations and notifications
          • Certificate Inventory and Management references
            • Certificate Inventory and Management users and roles
        • Firewall Audits and Reporting
          • Visibility to Firewall inventory
          • Firewall rule requests
          • Firewall audits
          • Firewall Admin Workspace dashboard
          • Firewall Audits and Reporting calibration
        • Running discoveries in your network
          • Discovery Configuration Console
          • Schedule a horizontal Discovery
          • File-based Discovery
            • Run File-based Discovery
            • File-based Discovery references
          • Discover applications based on fingerprints
            • Calibrate fingerprint-based discovery
            • Application Fingerprints dashboard
          • Discovery Admin Workspace
            • Discover applications using application fingerprints or ITOM Content Service
          • Network discovery
          • Serverless Discovery
            • Create a pattern and a schedule for standard serverless Discovery
            • Create a pattern and a schedule for host-based serverless Discovery
        • Discovery configuration
          • Discovery properties
          • Discovery IP address configuration
          • Domain Separation and Discovery
          • Microsoft Just Enough Administration (JEA) for Discovery
          • SNMP support for Discovery
          • Discovery and SCCM together
          • Discovery classifiers
            • Create a Discovery CI classification
            • Create a Discovery process classification
              • On classification script objects for Discovery
              • Create a Discovery process handler
            • Create an HTTP classification
            • Classification for IP address discovery
              • Modify classifiers for IP address discovery
            • Use Windows Remote Management for classification
            • Reclassify a Windows Workstation machine as a server
            • Discovery classification parameters
            • Check IP service affinity for Discovery and Orchestration
          • Discovery identifiers
            • How Discovery identifiers work
            • Configure Discovery identity probes
            • Configure Discovery identity sensors
            • Serial number types for identification
          • Discovery status
            • Cancel a Discovery from a Discovery Status
            • Discovery timelines
            • The ECC queue for Discovery
            • Discovery device history
          • Logs for horizontal discovery
          • Validate commands used in discovery
        • Patterns and horizontal discovery
        • Discovery probes and sensors
          • List of Discovery probes
            • CIM probe
            • DNS probe
            • Horizontal Pattern probe
            • PowerShell probe
              • Create a custom PowerShell probe
            • SCPRelay probe
            • SNMP probes
              • SNMP probe parameters
              • Load a MIB module
              • SNMP probe MIB modules
            • SSHCommand probe
              • SSHCommand parameters
              • SSHCommand path
              • Shell script options
              • Discovery SSH commands not requiring a privileged user
              • Discovery SSH commands requiring a privileged user
            • vCenter probes and probe parameters
            • Windows probes and permissions
            • WMIRunner probe
            • Port probes
              • Shazzam probe, port probes, and protocols
              • Configure Shazzam probe
          • Discovery sensors
          • Discovery probe management
            • Create or modify a probe
            • Discovery probe permissions
            • Set probe parameters
          • Align versions of customized probes and sensors
          • Discovery multiprobes and multisensors
          • Example custom Discovery probe and sensor: populate a CI with text file values
        • Advanced Discovery configuration
          • gMSA configuration for Discovery
          • Credential-less Discovery with Nmap
            • Credential-less host Discovery
            • Credential-less Application Discovery
            • Nmap commands and data collected with credential-less Discovery
          • PowerShell for Discovery and Service Mapping
            • Set up MID Servers to use PowerShell
            • PowerShell remoting for Discovery
            • PowerShell commands run by Discovery
            • MID Server parameters for PowerShell
          • Application Dependency Mapping (ADM) for Discovery
          • Discovery behaviors
            • Create a Discovery behavior
            • Set up a load balancing behavior
            • Examples of Discovery behavior functionalities
            • Discovery behavior example: access an ACL protected SNMP device
          • CI deletion strategies for pattern discovery
            • Set a deletion strategy
          • Configuration file tracking
            • Modify tracking changes in configuration files
            • Compare versions of CI configuration files
            • Set the deletion strategy for tracked configuration files
          • Change the source name of Discovery results
          • Discovery API plugin
          • Running process filters
            • Out-of-the-box process filters
        • Discovery resource utilization
        • Discovery monitoring and issue resolution
          • Discovery Home page
          • Discovery Dashboard
          • Cloud Discovery home page in Cloud Discovery Workspace
          • Cloud Discovery schedules dashboard in Cloud Discovery Workspace
          • Discovery performance metrics
          • Discovery error messages
            • Find the cause of a sensor error message
            • Identify cause of No Sensor Defined error message
            • Fix the cause of a sensor error message
            • Find the cause of a "Probe not found" error
          • Resolve Cloud Discovery errors in Cloud Discovery Workspace
        • Discovery Platform Analytics Solutions
          • Kubernetes dashboard
        • Discovery reference
          • Command Validation Task form
          • Commands List for commands used for discovery
          • Discovery log details
          • Cloud Discovery service account form reference
          • Create a new discovery schedule form reference
          • Cloud Discovery reference
            • Edit settings form reference
          • Discovery CLI commands
          • Application fingerprint suggestion form
      • Service Mapping
        • Exploring Service Mapping
          • Choose the right method for discovery and mapping application services
            • Automated Service Suggestions
              • Discovery based on Predictive Intelligence
            • Pattern-based discovery in Service Mapping
            • Tag-based discovery in Service Mapping
            • Traffic-based discovery in Service Mapping
          • Discovery of application services on cloud using Service Mapping
          • Service Mapping flow
        • Configuring Service Mapping
          • Request Service Mapping
          • Install Service Mapping Plus
          • MID Server configuration for Service Mapping
            • Choose MID Server selection algorithm
            • MID Server configuration for Service Mapping in upgraded deployments
            • Configure a default MID Server for Service Mapping for upgraded deployments
          • Prerequisites for performing top-down discovery using Service Mapping
            • Credentials required for host discovery
            • Service Mapping commands requiring a privileged user
            • Service Mapping commands not requiring a privileged user
            • SNMP-based queries
          • Create a discovery behavior for Unix-based load balancers
          • Verify that Service Mapping is set up properly
          • Quick start tests for Service Mapping
          • Advanced Service Mapping configuration
            • Enable traffic-based discovery for CI types or specific CIs
            • Tag-based discovery configuration
              • Include CIs based on classes in tag-based discovery
              • Exclude CIs based on their installation status in tag-based discovery
              • Exclude preconfigured CI relationships in tag-based discovery
              • Add or edit CI relationships in tag-based discovery
              • Recalculate previously created application services
            • Fine-tune tracking changes for the change history
            • Data collection and discovery using Netflow
              • Configure onetime data import using Netflow for testing purposes
              • Configure data collection using Netflow
            • Data collection and discovery using VPC Flow Logs
              • Configure data collection using VPC Flow Logs
            • Configure Search Assistant for Windows
            • Modify display for CI attributes
            • Configure support for Windows servers with non-English OS
            • Upload the rctrlx.exe file to MID Servers
        • Using Service Mapping
          • Access the Unified Map feature from the Service Mapping Workspace
          • Map application services based on Automated Service Suggestions
          • Create an application service for unmapped servers
          • Application service mapping using classic Service Mapping
            • Map multiple application services suggested by classic Service Mapping
              • Add or remove CIs for multiple application services using connection suggestions
              • Add CIs to multiple application services using connection rules
            • Map application services using tags with classic Service Mapping
              • Prepare for mapping application services based on tags
            • Map multiple application services from a CSV file usingclassic Service Mapping
              • Prepare a CSV file for mapping your candidates
            • Map a single application service using classic Service Mapping
              • Request information about entry points for application services
              • Provide entry points for mapping an application service
              • Add or remove CIs for single application services using connection suggestions
              • Add CIs for single application services using connection rules
              • Enable traffic-based discovery for an application service
              • Mapping application services containing Citrix XenApp and Presentation Server
              • Mapping application services containing Microsoft Exchange Server
              • Tibco BusinessWorks and EMS discovery
              • Mapping application services containing Oracle GlassFish Servers
              • Mapping application services containing Oracle Tuxedo platform
            • Modify or update tag definitions for tag-based mapping
              • Remap tag-based application services to reflect tag changes
            • Fix application service errors in bulk
            • Fix errors in individual application service maps
              • Fix errors in individual application services using discovery messages
              • Skip errors to continue discovering an application service
              • Resolve pattern-related mapping errors
            • Review and approval of application service maps
              • Send application service maps for review
              • Review application service maps
            • Fine-tune application services to implement owner requests
              • Manually add CIs to an application service
              • Remove CIs not belonging to application services
              • Transfer a map segment into another application service
              • Link application services
              • Discover CIs identified as generic applications
            • Application service completion
              • Define criticality for application services
              • Group application services
              • Control user access to application services
              • Schedule a top-down discovery by Service Mapping
                • Top-down discovery schedules
              • Service definition transfer from one instance to another
            • Application service analysis and maintenance using classic Service Mapping
              • Application service maps in classic Service Mapping
              • View CI attributes in an application service map classic Service Mapping
              • View CI connection attributes in an application service map classic Service Mapping
              • View the change history of application services in classic Service Mapping
              • Compare two versions of an application service in classic Service Mapping
              • View dependent application services in classic Service Mapping
              • View contained application services in classic Service Mapping
              • Check CI dependencies
              • View the network or storage path in classic Service Mapping
              • View the list of CIs belonging to an application service
              • Convert application service maps into PDFs
              • Modify view for an application service map
          • Application service analysis and maintenance using legacy Agent Workspace
            • Application service maps in legacy Agent Workspace
            • View maps for application services in legacy Agent Workspace
            • View the change history of application services in legacy Agent Workspace
            • Modify view for an application service map in legacy Agent Workspace
        • Service Mapping reference
          • Service Mapping Workspace
          • Name suggestions for application service candidates
          • Application service readiness dashboard in configurable workspace
          • Components installed with Service Mapping Plus
          • Components installed with Service Mapping
          • Domain separation and Service Mapping
          • Service Mapping Recomputation
          • Connection Suggestions list
          • Entry point attributes
          • MID Server properties used by Service Mapping
          • Preconfigured CI relationships in tag-based discovery
          • Properties related to tag-based discovery
          • Traversal Rules for Application Services form completion
          • Keyboard shortcuts for operating Service Mapping in accessibility mode
          • Example definitions for service families in tag-based mapping
          • Traffic-based connections list
      • Discovery patterns used by ITOM Visibility
        • Available discovery patterns
          • Apache Cassandra database discovery
          • Apache Kafka and Apache Zookeeper discovery
          • Apigee Edge Enterprise edition discovery
          • Avi Vantage load balancer discovery
          • Amazon AWS application ELB Service discovery
          • Amazon AWS classic ELB Service discovery
          • Amazon AWS Cloud components discovery using patterns
            • Enable the Cloud Hardware Type class extension
            • Enable Cloud OS Image discovery
          • Amazon AWS ElastiCache discovery
          • Amazon AWS Relational Database Service discovery
          • Amazon DynamoDB discovery
            • Define a Cloud REST Query for cloud computing devices
          • Amazon Kinesis discovery
          • Amazon Keyspaces discovery
          • Amazon OpenSearch discovery
          • Amazon Redshift discovery
          • Amazon Simple Storage Service ( AWS S3) discovery
          • Amazon Web Services (AWS) Resource Inventory
          • AWS API gateway discovery
            • Test patterns for discovering AWS API Gateway and AWS Lambda
          • AWS Auto Scaling groups discovery
          • AWS Cognito discovery
          • AWS DB cluster discovery
          • Amazon ECS resource discovery
          • AWS Lambda discovery
          • AWS MemoryDB for Redis
          • AWS tag discovery
          • Cisco Switch Wireless Access Point (WAP) discovery
          • Citrix NetScaler SDX discovery
          • Citrix Xen Hyper-V Discovery
          • Cloudian Storage Discovery
          • Cohesity storage system discovery
            • Create an alias for the basic authentication credential for Cohesity storage system discovery
            • Create a serverless schedule for Cohesity storage system discovery
          • ColdFusion discovery
          • Couchbase Database discovery
          • Dell EMC Data Domain storage discovery with Patterns
          • Dell EMC XtremIO storage array discovery
          • Dell EMC Isilon discovery
          • Dell EMC PowerMax storage discovery with Patterns
          • F5 certificate discovery
          • Google Cloud Platform (GCP) asset inventory discovery
          • Google Cloud Platform (GCP) Organization discovery
          • HAProxy load balancer discovery with patterns
          • HPE BladeSystem Enclosure Discovery
          • IBM Cloud Platform discovery
          • IBM Db2 on Linux database discovery
          • IBM Db2 on Windows database discovery
          • IBM Informix Dynamic Server discovery
          • IBM PowerHA Cluster (HACMP) discovery
          • IBM WebSEAL discovery
          • IBM Virtualization and Hardware Management Console discovery
          • InfiniBox Discovery
          • Linux Pacemaker Cluster discovery
          • Microsoft Azure Cloud components discovery using patterns
          • Microsoft Azure Application Gateway discovery
          • Microsoft Azure Inventory discovery
          • Microsoft Azure Functions discovery
          • Azure DNS Zones discovery
          • Microsoft Certificate Authority (CA) certificates discovery
          • NetApp SolidFire storage system discovery
          • Next-Generation Cisco Firewall discovery
          • Next-Generation Fortinet Network Firewall discovery
          • Next-Generation Juniper Network Firewall discovery
          • Nutanix Acropolis discovery
          • OpenStack resource discovery
          • Oracle Catalog discovery
          • Oracle Database 12c discovery
          • Oracle Global License Advisory Services (GLAS) data collection
            • Download Oracle Global License Advisory Services (GLAS) data
          • Oracle GoldenGate discovery
          • Oracle Listener HD discovery
          • Oracle Solaris LDOM discovery
          • Palo Alto Networks firewall discovery
          • Pivotal Cloud Foundry discovery
          • Pure Storage FlashArray discovery
          • Pure Storage FlashBlade discovery
          • Red Hat JBoss Fuse discovery
          • Red Hat Virtualization discovery
          • Rubrik Cluster discovery
          • Veritas Cluster Server discovery
          • VMware NSX Advanced load balancer discovery
        • Configuring Pattern Designer and related applications
          • Check which plugin contains a required pattern
          • Install Discovery and Service Mapping Patterns
          • Install Visibility Content
          • Password2 encryption for patterns
        • Create CI types for Service Mapping and Discovery
        • Create entry point types for Service Mapping
        • Create or customize patterns
          • Define discovery steps
            • Enter values and variables in patterns
            • Activate pattern Debug mode
            • Make a step conditional
            • Customize pattern operations
            • Explore remote host
            • Pattern variables
            • Change credentials to non-default
            • Provide connection information
            • Merge tables
            • Find a matching URL
            • Filter a table
            • Get a process
            • Get a registry key
            • Match a condition
            • Parse command output
            • Parse a file
            • Parse a URL
            • Parse a variable
            • Define an HTTP Get Call query
            • Define an API Query for cloud computing devices
            • Create a relationship and a reference
            • Reuse a shared step library
            • Run an SSH script file
            • Set a parameter value
            • Transfer a file
            • Define an SNMP query
            • Add a column to a table
            • Change credentials to default
            • Append two tables
            • Define WMI method invocation
            • Define a WMI query
            • Parsing strategies
              • Parse text from a horizontal file
              • Parse text from a vertical file
              • Parse text using keyword, command, and positional type
              • Parse text using a regular expression
              • Parse text using delimited text
              • Customize parsing strategies
          • Define the connection section
          • Example of creating an application pattern
        • Discover related items together with the main CI
        • Enhance patterns without changing their identification sections
        • Fine-tune patterns using traffic-based discovery
        • Finalize a pattern
        • Copy patterns from one instance to another
        • Choose the pattern version
          • Compare pattern versions
      • ITOM Content Service
        • ITOM Content Service use case
        • Install ITOM Content Service using Discovery Admin Workspace
        • Share data on ITOM Content Service
        • Enable discovery with ITOM Content Service
        • Discover installed software data with ITOM Content Service
        • ITOM Content Service reference
      • Tag Governance
        • Real-time tag updates to Cloud resources
        • Domain separation and Tag Governance
        • Install Tag Governance
          • Configure Tag Governance policies to run an audit
          • Configure remediation policies on tag policy audit findings
          • Preview and remediate tag audit failures
        • Tag Health dashboard
          • Tag Policy dashboard
          • Tag Efficacy dashboard
        • Tag Governance reference
          • Tag Policies form
      • Cloud Discovery Workspace
        • Install Cloud Discovery Workspace
        • Cloud Discovery Workspace dashboard
        • Kubernetes Explorer
        • Dependency Views map
      • ITOM Visibility reference
        • Run options for discovery schedules
        • Plugins or applications installed with ITOM Visibility
    • ITOM Health
      • Event Management
        • Exploring Event Management
          • Understanding Event Management
            • Request Event Management
            • Install Event Management
            • Enhance Event Management performance
            • Event Management Platform Analytics Solutions
              • Customize Performance Analytics widgets
            • Machine learning solutions for Event Management
        • Configuring Event Management
          • Event Management setup
            • Event Management during a platform upgrade
            • MID Web Server
              • Configure the MID Web Server extension
                • Configure a secure MID Web Server extension
                • Configure key-based MID Web Server authentication
                • Configure MID Web Server API key authentication
                • MID Web Server mTLS Authentication
                  • Configure mTLS authentication for a MID Web Server
            • Event Management configuration preferences
          • Domain separation and Event Management
            • Configure Event Management domain separation
          • Event Management Integrations
            • Event Management Connectors domain personalization
              • Personalize domains for pull connector events to use in event creation
              • Personalize domains for push connector events to use in event creation
            • Configure Event Management connectors
              • Create a custom pull connector
              • Configure a pull connector
                • Configure a default MID Server for connectors
                • Configure event collection from HP OMi
                • Configure event collection from HPOM
                • Configure event collection from Hyperic
                • Configure event collection from IBM Netcool
                • Configure event collection from an Icinga2 connector
                • Configure event collection from Logicmonitor
                • Configure event collection from NNMi
                • Configure event collection from NagiosXI
                  • Create Nagios XI server credentials
                • Configure event collection from OBM
                • Configure OP5 or OP5_v2 connector
                • Configure Opsview or Opsview_v2 connector
                • Configure PRTG connector
                • Apache Kafka Consumer Connector
                  • Configure the Apache Kafka Consumer connector
                  • Map Kafka message payload attributes to alert fields
                • Configure SAP Solution Manager connector
                  • SAP configurations enabling the SAP Solution Manager connector
                    • Use the SAP Solution Manager Pull connector
                    • Use the SAP Solution Manager Push connector
                    • SAP Solution Manager setup configurations
                      • Configure RFC in SAP Solution Manager
                      • Configure SAP to forward alerts to your BADI
                      • Configure the alert inbox in SAP Solution Manager
                      • View alerts in the SAP Solution Manager inbox
                      • View and update your SAP Solution Manager certificate
                      • View the SAP interface log
                    • SAP Solution Manager transaction codes
                • Configure alert collection from SCOM
                  • Configure the SCOM connector instance
                  • Limit collected SCOM alerts to specific SCOM groups
                • Configure event collection from SolarWinds monitor
                  • Create SolarWinds monitor credentials
                • Configure event collection from vCenter
                • Configure event collection from vRealize
                  • Create vRealize credentials
                • Configure event collection from Zabbix server
                  • Create Zabbix server credentials
              • Configure a push connector
                • Configure ServiceNow Cloud Observability event collection
                • Configure a MID Server for event collection using a push operation (listener)
                • Pushing events to the MID Server using web service API
                • Pushing events to the instance using web service API
                • Configure the MID WebService Event Collector Context
                • Event collection from custom payloads
                • Integrate with push connectors
                  • Use legacy listener transform scripts
                  • Integrate AWS platform as a data source
                  • Integrate Azure Monitor as an authenticated data source
                    • Integrate Azure Monitor with OAuth authentication
                    • Integrate Azure Monitor with basic authentication
                    • Configure Azure Monitor Bi-directional connector
                  • Event collection from Microsoft Azure Monitor
                  • Event collection from BMC TrueSight and BMC TrueSight_v2
                  • Integrate Dynatrace platform events
                  • Integrate New Relic platform events
                  • Integrate Catchpoint events
                  • Integrate Datadog platform events
                  • Integrate Google Cloud Platform (GCP) events
                  • Event collection from Google Cloud Platform (GCP)
                  • Integrate Grafana events
                  • Integrate Honeycomb events
                  • Integrate Instana events
                  • Integrate ServiceNow Cloud Observability events
                  • Integrate Logicmonitor events
                  • Event collection from Logicmonitor
                  • Integrate Oracle Cloud Infrastructure alarms
                  • Integrate Prometheus events
                  • Integrate Sentry events
                  • Integrate Scout APM events
                  • Integrate Sumo Logic events
                  • Event collection from ThousandEyes
                  • Integrate Panopta as a data source
                  • Integrate Event Integration (EIF) format event connector
                    • EIF events warning severity
                • Create a push connector configuration parameter
                • Configure a push connector instance
              • Configure event collection for SNMP traps
                • Configure the SNMP traps listener to receive OEM traps
                • Configure SNMP Trap collection for high availability
                • Configure message keys to spread SNMP object identifiers
              • Configure event collection from email
            • Event forwarding
              • Set up event forwarding
              • Periodically run an event forwarding job
              • Create basic auth server credentials
          • Processing Events
            • View events
            • Event rules
              • Create or edit an event rule
              • Use event input information
              • Filter the events that an event rule applies to
              • Find events that are not matched to rules
              • View event rules
              • Configure an event rule to customize alert content
              • Set a threshold to suppress alert generation
              • Alert binding to CIs with event rules
                • Bind alerts to a host CI
                • Bind alerts to a specific host CI
                • Bind alerts to non-host CIs
                • Bind alerts to application CIs
                • Bind alerts to CIs using event field mapping
                • Trigger alert binding to a CI
              • View patterns for event group creation
              • Refresh event rules
              • Find rules that will be applied to an event
              • Simulate event processing
            • Event field mapping configuration
              • Create event field mappings
            • Event identifiers
            • Alert tags
            • Event field format for event collection
            • Custom alert fields
            • Testing and sending events
            • View event processing statistics
              • Enable processing of event process statistics
              • Configure statistics processing period
          • Manage and monitor alerts
            • Alert management
            • Alert management rules for resolving alerts
              • Create an alert management rule
              • Event Management subflows in the base system
              • Create a custom subflow
              • Alert executions information
                • View alert execution information
              • Migrate an alert action rule to an alert management rule
              • Synchronizing Alert Response with Automated Alert Grouping
              • Configure alert remediation actions
              • Invoke domain separation through subflows
            • CI Remediation
              • Create or edit CI remediation
              • View remediation tasks
            • How alerts work with CIs in maintenance
            • SLAs for application services and CIs
              • Create an SLA configuration for CIs
                • Limit the records for the SLA configuration filter
              • Create an SLA definition for a CI or application service
            • Alert lifecycle configuration
              • Configure the alert active interval
              • Configure alert flapping
            • Alert priority
            • Alert impact calculation
              • Understand Service Maps
              • View the impact tree
              • Adjust impact rules for a CI
              • View an alert impact on CIs in a service map
              • Create an infrastructure relationship for related CIs
              • View impact of child service on parent service
            • Configuring Express List views for users and user groups
              • Create a predefined Express List view for users
              • Assign users and groups to predefined Express List views
            • Probable Root Cause Analysis (RCA)
              • Customize RCA settings
            • Alert similarity
              • Find similar alerts
              • Similarity solutions
              • Create an Event Management similarity solution
              • View Event Management solution training progress
              • Review Event Management similarity examples
              • Activate Event Management solution version
            • Self-health monitors for Event Management
              • Start or stop self-health monitoring
              • Configure the Event Management - Insert Health Monitor scheduled job
              • Monitor self-health with domain separation
              • Configure a self-health monitor
              • Create a self-health monitor to use custom health monitor script
              • View the Event Management self-health application services map
            • Create maintenance rules
            • Resolve an incident related to an alert
            • Close an alert
            • Reopen an alert
            • Alert insight properties
            • Rotate event tables and alert table cleanup
              • Event table rotation
              • Purge status and alert history
                • Clean alert history and impact status tables
              • Alert table clean-out
          • Alert grouping
            • Scheduled jobs and parameters for alert grouping
              • Configure scheduled job-based alert grouping
              • Run multiple scheduled jobs for alert grouping
              • Configure alert correlation logic order
              • Configure filters for automatic alert groups
                • Apply alert group filters to aggregated groups
            • Alert grouping types
              • Log analytics alert grouping
              • Rule-based alert grouping
                • Create an alert correlation rule
              • Automated alert grouping
                • Configure pattern based alert aggregation
                • Specify and manage pattern identifier attributes for alert aggregation
                • Learned Patterns report
                • Exclude a pattern with an incorrect alert from a learned pattern
                • Restore excluded patterns
              • CMDB based alert grouping
                • Use cases for CMDB based alert grouping
                • CMDB alert grouping — properties and functionality
                • View the Dependency map for CMDB alerts
                • Add a CI relationship to CMDB Group CI Relations
                • Delete a CI relationship from CMDB Group CI Relations
              • Text-based alert grouping
                • Verify text-based clustering solution
              • Tag cluster alert grouping
                • Create alert clustering tags
                • Create an alert clustering definition
                • Create key values to cluster alerts
                • Activate a predefined alert clustering definition
                • Attach a predefined tag to a tag-based alert clustering definition
              • Manual alert grouping
                • Create alert group manually
                • Add secondary alert manually to an existing alert group
            • Remove an alert from an alert group
            • Configure work notes to capture alert grouping justifications
          • Application services in Event Management
            • Manually create an application service in Event Management
            • Convert manual services to application services
            • Convert manual services to application services using API
            • Configuring CIs in a manual service as a manual cluster
              • Configure a manual cluster
              • Modify a manual cluster
            • Create an alert query
            • Create a service group
            • Assign a role to a service group
            • Activate and configure Service Mapping for top-down discovery
            • Configure email notification on application service severity change
              • Configure contextual colors and icons
          • View Event Management license usage
        • Using Event Management
          • View alert information
            • Priority group
            • Alert execution information
            • View alerts in the flapping state
            • View all alerts by the maintenance status
            • Collaborate from within an alert
            • Create an incident or security incident from an alert
            • Place an alert into maintenance
            • Alert insight information
            • Apply a quick response in an alert
          • Monitor service health
            • View discovered service history
            • Monitor alerts for an application services
            • View monitored services
          • Use the Event Management overview dashboard
            • Event Management Insight dashboard
            • Event Management Scorecards
            • Event Management Overview dashboard
          • Launch web application from alert
          • Event Management Operator Tutorial
            • An overview of alerts for Event Management operators
            • Application services for Event Management operators
            • Event Management operator environment
            • What Event Management operators do
              • Operator phase 1: Analyze and acknowledge an alert
              • Operator phase 2: Triage an alert
                • Run a remediation workflow on an alert
                • Launch a web application from an alert
                • Associate a knowledge base article with an alert
                • Put an alert into maintenance
              • Operator phase 3: Close an alert
            • Advanced tasks for the Event Management operator
              • Customize your alert list view
              • Work with flapping alerts
              • Handle alerts while CIs are in maintenance
              • Adjust alert impact while triaging an alert
          • Mobile experience for Event Management
            • Connect to an instance using the mobile app
            • Work with Event Management alerts using the mobile app
              • Acknowledge an alert using the mobile app
              • Place an alert into maintenance using the mobile app
              • View repeated alerts using the mobile app
              • View similar alerts using the mobile app
              • View incidents related to alert CIs using the mobile app
              • View alert executions using the mobile app
              • View secondary alerts using the mobile app
              • Manage alert actions using the mobile app
              • View services impacted by alerts using the Event Management mobile app
              • Create an incident for a mobile alert
              • Close an alert using the mobile app
            • Work with Event Management services using the mobile app
              • View service alerts and details using the mobile app
              • Receive push notifications for a service using the Event Management mobile app
        • Event Management reference
          • Components installed with Event Management
          • Domain properties installed with Event Management
          • Performance Analytics Edit Widget dialog box
          • Event Management MID Web Server extension form
          • Event Management tag based alert clustering tag form
          • List of predefined alert clustering tags
          • Event Management tag based alert clustering definition form
          • List of predefined tag-based alert clustering definitions
          • Connector domain metadata
          • Push connector instance form
          • Event forwarding properties
          • Alert Query form
          • Alert correlation rule form
      • Health Log Analytics
        • Exploring Health Log Analytics
          • Understanding Health Log Analytics
          • How Health Log Analytics generates alerts
          • Health Log Analytics installation
        • Configuring Health Log Analytics
          • Health Log Analytics Setup
            • Set up data inputs using guided setup
            • Set up data inputs manually
              • Configuring data inputs manually
                • Configure data inputs (Rsyslog, Filebeat, or Winlogbeat)
                  • Rsyslog, Filebeat, or Winlogbeat data input configuration fields
                • Configure data inputs (Splunk)
                  • Splunk data input configuration fields
                • Configure data inputs (Elasticsearch)
                  • Elasticsearch data input configuration fields
                • Configure data inputs (TCP)
                  • TCP data input configuration fields
                • Configure data inputs (UDP)
                  • UDP data input configuration fields
                • Configure data inputs (GCP PubSub)
                  • GCP PubSub data input configuration fields
                • Configure data inputs (MID Server)
                  • MID Server data input configuration fields
                • Configure data inputs (Amazon CloudWatch)
                  • Amazon CloudWatch data input configuration fields
                • Configure data inputs (Amazon S3)
                  • Amazon S3 data input configuration fields
                • Configure data inputs (Microsoft Azure Log Analytics)
                  • Microsoft Azure Log Analytics data input configuration fields
                • Configure data inputs (Microsoft Azure Event Hubs)
                  • Microsoft Azure Event Hubs data input configuration fields
                • Configure data inputs (Apache Kafka)
                  • Kafka SSL credentials fields
                  • Apache Kafka data input configuration fields
                • Configure data inputs (REST API)
                  • REST API data input configuration fields
                • Configure data inputs (Glide Syslog)
                  • Glide Syslog data input configuration fields
                • Modify a data input configuration
              • Identify and resolve log streaming issues
              • Edit raw log data before processing
              • Log data auto-mapping and mapping
                • Map raw log data
                  • JavaScript function test outcome fields
                  • View the relationships between source types and log sources
                • Header properties detection
                • Stop extraction of unneeded log data
                • Ensure extraction of specific log data
              • Configure source type capabilities
              • Add source types manually
              • Source type structure adjustment
                • Refine the source type structure
              • Review the properties extracted from a source type
              • Review the patterns extracted from a source type
              • Additional data input setup tasks
                • Verify your log sources
                • Add timestamp formats
                • Delete a log source
            • Advanced data input configuration
              • Configure advanced settings for Rsyslog, Splunk, or TCP data inputs
              • Configure advanced settings for Beats data inputs
              • Configure advanced settings for Elasticsearch data inputs
              • Configure advanced settings for MID Server data inputs
              • Configure advanced settings for Amazon CloudWatch data inputs
              • Configure advanced settings for Amazon S3 data inputs
              • Configure advanced settings for Microsoft Azure Log Analytics data inputs
              • Configure advanced settings for Microsoft Azure Event Hubs data inputs
              • Configure advanced settings for Apache Kafka data inputs
            • Health Log Analytics content packs for quicker time to value
              • Activate a content pack
            • Stop or restart using a data input
          • Migrating Health Log Analytics data input configurations between instances
            • Export a data input configuration
            • Import a data input to a target instance
            • Export source types to an update set
            • Import source types to a target instance
          • Now Intelligence Solutions for Health Log Analytics
            • Activate the Now Intelligence Solution for Health Log Analytics
            • Configure the Now Intelligence Solution for Health Log Analytics
            • Health Log Analytics Overview dashboard
          • Health Log Analytics administration
            • Configure Health Log Analytics system properties for a single log source
              • Configure global Health Log Analytics system properties
            • Enable or disable Health Log Analytics system features
            • Alert notification in Slack or Microsoft Teams channels
              • Set up alert notifications in channels
              • Set up alert notifications in a Microsoft Teams channel
            • Enhancing the CMDB with host data found in logs
              • Add log-based CIs to the CMDB
              • Field descriptions for log-based CI candidates
            • Storage space for log retention in Health Log Analytics
              • Modify the log source retention period
        • Using Health Log Analytics
          • Take action on a Health Log Analytics alert from the Overview tab
          • Analyzing log lines to identify the root cause of an alert
            • Analyze log lines that surround an anomaly
          • Viewing the logs for an alert on the Log viewer
            • View log data for an alert
            • Define, save, and share a search of log data
            • Use or modify a saved search
            • Filter search results on the Log viewer
            • Customize the Log viewer table
          • Using log correlators to detect relationships in log data
            • Add a log correlator to identify relationships in logs
            • Exclude a source from a log correlator
          • Assigning higher or lower significance to an alert in Health Log Analytics
            • Mark an alert as significant
            • Mute an unimportant alert
              • View the list of muted metrics
            • Restore a muted alert or a significant alert
          • Add a KB article to a Health Log Analytics alert
          • Log anomaly detection
            • Add, edit, or delete Health Log Analytics lexical keywords
            • View the lexical keywords that generate alerts
            • Add a log correlator to identify relationships in logs
          • Reducing noise by using advanced log alert filters
            • Create advanced log alert filters
          • Adding, changing, or deleting Log Analytics alert rules
            • Add a Log Analytics alert rule
            • Modify a defined Log Analytics alert rule
            • Delete a defined Log Analytics alert rule
          • Viewing Health Log Analytics system health alerts on the service map
            • Identify Health Log Analytics system health issues on the service map
            • Health Log Analytics system health notifications and proposed actions
          • View the settings of Health Log Analytics system features
        • Health Log Analytics reference
          • Components installed with Health Log Analytics
          • Supported data inputs for Health Log Analytics
          • MID Server proxy preconditions for streaming logs to HLA
          • Health Log Analytics configuration preferences
          • Health Log Analytics system health notifications
          • Health Log Analytics language support
          • Domain separation and Health Log Analytics
          • Health Log Analytics severity mapping
          • Types of Health Log Analytics alerts
          • Types of anomalous behavior
          • Sections and cards on the alert Overview tab in Health Log Analytics
            • Information on the Overview tab for a Component-based alert
            • Information on the Overview tab for a Log Analytics group
              • View the list of Log Analytics alerts in a Log Analytics group
            • Information on the Overview tab for a Log Analytics alert
          • Information on the Alert Insight Similar Alerts tab
      • Service Operations Workspace for ITOM
        • Exploring Service Operations Workspace for ITOM
          • Service Operations Workspace for ITOM user interface
            • Service Operations Workspace for ITOM landing page
        • Configuring Service Operations Workspace for ITOM
          • Set up Service Operations Workspace for ITOM
            • Install Service Operations Workspace for ITOM Applications
          • Configure alert metrics
          • Service Operations Workspace service dashboard
            • Customize the default view in Service Operations Workspace
            • Create and use a user view in Service Operations Workspace
              • Delete a Service Operations Workspace user view
            • View service health information in Service Operations Workspace
            • View application services affected by an alert
            • View primary alerts associated with a service
            • View application service details in Service Operations Workspace
            • Service Operations Workspace properties
          • Configuring Recommendation Framework in Service Operations Workspace for ITOM
            • Configure Recommendation Framework for an alert in Service Operations Workspace for ITOM
          • Redirect to the Service Operations Workspace landing page
          • Customize the Service Operations Workspace for ITOM landing page
            • Modify the greeting text on the landing page
            • Modify the first-level cards in the Service Operations Workspace for ITOM Overview section
            • Create a copy of the Service Operations Workspace for ITOM landing page
          • Configure the inbox in Service Operations Workspace for ITOM
          • Customize lists in Service Operations Workspace for ITOM
        • Using Service Operations Workspace for ITOM
          • Alert management in Service Operations Workspace
            • Alerts in Service Operations Workspace
            • View alert information in Service Operations Workspace
            • Alert list management
            • Monitor incoming alerts
            • Alerts in Service Operations Workspace
              • Sections on the alert Overview tab
              • Place an alert in the Maintenance state
              • Place an alert in the Acknowledged state
            • View metrics for an alert
          • View a time range for an alert's metrics in Service Operations Workspace
            • View CI health in Metric Explorer
          • Run actions to resolve alert issues in Service Operations Workspace
          • Launch a web application for an alert in Service Operations Workspace
          • Identify the underlying issue of an alert in Service Operations Workspace
          • View service health information in Service Operations Workspace
            • Organize services on the Service Operations Workspace Service Dashboard
          • AIOps Experience in the Service Operations Workspace for ITOM
            • Identify health issues with the Event Management Express List in the Service Operations Workspace
              • Use an assigned Express List view
              • Add or modify Express List columns
              • Add custom fields to the Express List preview panel
              • Acknowledge viewed alerts in Express List
              • Close an alert in Express List
              • Create an incident from an alert in Express List
              • Add alerts to an incident in Express List
              • Mute a CI's alerts in Express List
              • Assign alerts in Express List
              • Remediate an alert
              • Viewing links between alerts in alert groups in Express List
                • Viewing links between alerts in tag-based alert groups
                • Viewing links between alerts in rules-based alert groups
                • Viewing links between alerts in CMDB-based alert groups
                • View links between alerts in a group in Express List
              • Exploring chronological data on the alerts in an alert group in Express List
                • View a timeline of the alerts in an alert group
              • Find alert records in Express List using free-text search
              • Filtering the alert display in the Express List pane
                • Filter the Express List display using attributes
                • Filter the Express List display by adding or removing fields
                • Categorize alerts displayed in Express List
                • Filter out or show matching alerts
                • Save a custom filter in Express List
              • Keyboard shortcuts
              • Roles used by Express List
            • Integrations launchpad
              • Filter the integrations launchpad display
              • Activate installed integrations
              • Configure a pull connector
              • Configure a push connector
              • Enable integration with a custom connector
            • AIOps dashboards in Service Operations Workspace for ITOM
              • AIOps Value Realization dashboard
              • Event and Alert Processing dashboard
              • Agent Health dashboard
              • HLA Operational dashboard
          • Using Service Operations Workspace for ITOM Log Analytics
            • Take action on a Health Log Analytics alert from the Overview tab
              • Sections and cards on the Overview tab for a Component-based alert
              • Sections and cards on the Overview tab for a Log Analytics group
                • View the list of Log Analytics alerts in a Log Analytics group
              • Information on the Overview tab for a Log Analytics alert
            • Analyzing log lines to identify the root cause of an alert
              • Analyze log lines that surround an anomaly
            • Viewing the logs for an alert on the Log viewer
              • View log data for an alert
              • Define, save, and share a search of log data
              • Use or modify a saved search
              • Filter search results on the Log viewer
              • Customize the Log viewer table
            • Adding, changing, or deleting Log Analytics alert rules
              • Add a Log Analytics alert rule
              • Modify a defined Log Analytics alert rule
              • Delete a defined Log Analytics alert rule
            • Assigning higher or lower significance to an alert in Health Log Analytics
              • Mark an alert as significant
              • Mute an unimportant alert
              • Decrease sensitivity to similar anomalies
              • Restore normal importance to an alert metric
            • Dashboards for real-time visualization of log data
              • Create log data dashboards and visualizations
            • Add a KB article to a Log Analytics alert
        • Service Operations Workspace for ITOM reference
          • Components installed with Service Operations Workspace for ITOM applications
          • Recommendation rules for an incident in Service Operations Workspace for ITOM
          • Tags in Express List Link View
      • ITOM Health reference
        • Plugins or applications installed with ITOM Health
    • Agent Client Collector
      • Agent Client Collector Framework
        • Agent Client Collector user roles
        • Agent Client Collector architecture
        • Agent Client Collector installation
          • Configure an agent registration key
          • Configure the websocket server on the MID Server
          • Configure a websocket endpoint
          • Automatic MID Server selection
            • Enable automatic MID Server selection
            • Configure Agent Client Collector capabilities for MID Servers
            • Configure the automatic MID Server selection based on the Agent Client Collector capabilities
          • Configure the frequency of updating the agent MID Server list
          • Optimize distribution of agents to MID Servers
          • Incorporating the Agent Client Collector into a custom base image for mass deployment
          • Agent Client Collector installation on a Linux OS system
            • Install Agent Client Collector on a Linux system
            • Validate Linux installation
            • Upgrade Agent Client Collector on a Linux system
            • Uninstall Agent Client Collector from a Linux system
            • Perform a single-line Agent Client Collector installation on Linux
            • Upgrade the Agent Client Collector manually on a Linux system
            • Uninstall Agent Client Collector from a Linux system using a single-line command
          • Agent Client Collector installation on a Windows machine
            • Install the Agent Client Collector on a Windows machine manually
              • Upgrade the Agent Client Collector manually on a Windows system
              • Uninstall the Agent Client Collector manually from a Windows machine
            • Install the Agent Client Collector on a Windows machine using silent installation
              • Uninstall Agent Client Collector from a Windows system using a single-line command
          • Agent Client Collector installation on macOS system
            • Perform a single-line Agent Client Collector installation on macOS
            • Manually install Agent Client Collector on macOS
            • Upgrade Agent Client Collector on macOS system using a single line command
            • Upgrade Agent Client Collector manually on macOS system
            • Uninstall the Agent Client Collector from macOS using a single-line command
            • Uninstall the Agent Client Collector from macOS machine manually
          • Upgrade an agent in an instance
          • Upgrade multiple agents in an instance
          • Enable the Agent Client Collector load balancer
          • Restart an agent manually
        • Enable Agent Client Collector monitoring on the MID Server
        • Checks and policies
          • Create and edit checks
            • Test a check definition or check instance
            • Secure Parameters in the Agent Client Collector
              • Create secure parameters for a check
          • Create a new Agent Client Collector policy
            • Create a policy hierarchy
            • Edit a published policy
            • Create a service filter for a policy
            • Export and import an Agent Client Collector policy
          • Generate an Agent Client Collector allow list
          • Agent Client Collector data collection
            • View host data collection for an agent
            • Run host data collection on demand
          • Agent Client Collector plugins
            • Create and edit plugins
            • Secure a custom plugin with a certificate
              • Manually refresh Agent Client Collector certificates
              • Enable OpenSSL secure signing for plugins
          • Use the Agent Client Collector API
            • Create a check type
            • Create a check definition
            • Enable checks from the community for Agent Client Collector
            • Create a call API to send an osquery request
            • Verify API is associated with a live agent
          • View the Agent Client Collector configuration file for an agent
          • Agent Client Collector logs
            • Configure Agent Client Collector log levels
            • View the Agent Client Collector logs
            • Enable log monitoring in a Linux environment
            • Enable log monitoring in a Windows environment
        • Pause Agent Client Collector data collection
        • Agent Client Collector configuration data files
          • Create an Agent Client Collector configuration data file
        • Use the Agent Client Collector Health Dashboard
        • Zscaler remediation
          • Check Zscaler monitoring
            • Customize the Zscaler remediation wait time
            • Customize the Zscaler monitoring check
          • Check Zscaler remediation
          • Use the Zscaler dashboard
        • View the Agent feature matrix
      • Agent Client Collector reference
        • Agent Client Collector Framework default checks
        • Agent Client Collector performance and footprint for URL monitoring
        • Agent Client Collector check definition page
          • Check definition form parameters tab
          • Test check dialog box fields
        • Agent Client Collector data collection properties
        • Agent Client Collector policy collection properties
        • Agent Client Collector framework configuration properties
        • Agent Client Collector data collection tables
        • Configuration file options
        • Synchronization properties for validating Agent Client Collector plugins
        • Agent Client Collector log levels
        • Agent Client Collector log rotation parameters
        • Agent Client Collector CPU protection thresholds
      • Agent Client Collector Monitoring
        • Agent-based data flow
        • Agent Client Collector Monitoring Footprint
        • Configure a MID Server to work with Agent Client Collector Monitoring
          • Configure multiple MID Servers to work with Agent Client Collector Monitoring
        • Enable viewing HAProxy metrics
        • Enable running of Varnish checks
        • Select the Azure policies to activate for metric collection
        • Create Azure policies for metrics collection
        • Windows event log monitoring
        • Agent Client Collector for Monitoring default checks and policies
          • Active Directory metrics
          • Apache Kafka default checks and policies
          • Apache Kafka metrics
          • AWS Health Monitoring default checks and policies
          • AWS metrics
          • Azure Health Monitoring default checks and policies
          • Azure metrics
          • Azure cloud metrics
          • Cassandra default checks and policies
          • Cassandra metrics
          • Glassfish default checks and policies
          • GlassFish metrics
          • HAProxy default checks and policies
          • HAProxy metrics
          • HTTP default checks and policies
          • HTTP entry point metrics
          • HTTP response code check
          • Internet Information Services (IIS) metrics
          • Linux default checks and policies
          • Linux metrics
          • MongoDB default checks and policies
          • MongoDB metrics
          • MS Exchange default checks and policies
          • MSSQL default checks and policies
          • MySQL default checks and policies
          • MySQL metric mappings
          • Network ping default checks and policies
          • Network ping metrics
          • Nginx default checks and policies
          • Nginx metrics
          • PostgreSQL default checks and policies
          • PostgreSQL metrics
          • RabbitMQ default checks and policies
          • RabbitMQ metrics
          • URL Monitoring default checks and policies
          • Varnish default checks and policies
          • Varnish metrics
          • vSphere default checks and policies
          • vSphere metrics
          • Windows default checks and policies
          • Windows metrics
          • Windows log monitoring default checks and policies
          • Linux log monitoring default checks and policies
        • Using proxy agents in Agent Client Collector
          • Configure an agent on a proxy server
          • Create a proxy agent cluster
          • Assign a proxy agent cluster to a policy
            • Enable load balancing between proxy agents in a cluster
        • Enable metrics collection and evaluation
          • Limit metrics collection and evaluation
        • Operating system and application monitoring using Agent Client Collector
          • Configure Agent Client Collector Apache HTTP server monitoring
          • Configure Agent Client Collector Apache Tomcat monitoring
          • Monitor HTTP points
        • Understanding the Monitoring Technology Dashboard
          • Monitoring Technology Dashboard for Linux
          • Monitoring Technology Dashboard for Windows
          • Monitoring Technology Dashboard for HTTP
          • Monitoring Technology Dashboard for AWS
          • Monitoring Technology Dashboard for GCP
          • Monitoring Technology Dashboard for VMware vSphere
          • Customize the Monitoring Technology Dashboard
        • Metric Intelligence
          • Understanding Metric Intelligence
          • Get started with Metric Intelligence
            • MID Server and MID Server distributed cluster for Metric Intelligence
              • Parameters of MID Server distributed cluster
              • Scheduled jobs included with MID Server distributed cluster
            • Automated Metric Intelligence setup
            • Manually configure a MID Server for Metric Intelligence
            • Manually configure the Metric Intelligence extension
            • Quick start tests for Metric Intelligence
            • Components installed with Metric Intelligence
          • Choose and configure metrics to monitor
          • Create metric rules
          • Metric binding
            • Metric binding to resources
            • Create an event rule to map metrics to specific CIs
            • Create an event rule to bind metric events to host CIs
          • Disable a metric for a CI
          • Disable event collection
          • Configure anomaly score thresholds
          • Metric Configuration Rules
            • Create a configuration settings rule
              • Synchronize configuration settings rules
          • Configure the action level of anomaly detection
          • Specify custom upper and lower metric bounds
          • CIs in maintenance mode
          • View metric to CI and resource binding
          • Anomaly model testing
          • View metric values in the Insights Explorer
            • Insights Explorer settings
            • Create an Insights Explorer view
            • Metric bounds sensitivity
            • Sensitivity bounds properties for Insights Explorer metrics
          • View anomaly alerts
            • Anomaly Alert Dashboard
            • Create an anomaly alert promotion rule
            • Create an anomaly alert promotion rule exclusion list
          • Advanced Promotion Engine
            • Activate the Advanced Promotion Engine
            • Verify that the definitions for the Advanced Promotion Engine are active
            • Create a definition for the Advanced Promotion Engine
            • View the promoted events
            • View the promoted anomaly alerts
          • Metric Explorer
            • View metric charts in Agent Workspace
            • Configure metric charts for Agent Workspace
          • Self-health monitoring for Metric Intelligence
            • View self-health monitoring statistics for Metric Intelligence
          • Domain separation and Metric Intelligence
            • Configure domain separation for Metric Intelligence
        • Agent Client Collector Monitoring reference
          • Azure metrics script
          • Windows event log filter parameters
          • Event severities
      • Agent Client Collector for Visibility
        • Agent Client Collector for Visibility default checks and policies
        • Using Agent Client Collector for Visibility
          • Using push-based Discovery and horizontal IP-based Discovery together
          • Using push-based Discovery and Intel Endpoint Management Assistant (EMA) together
          • Using push-based Discovery and SAM together
            • Configure Osqueryd schedule for SAM total usage metrics
            • Configure Osqueryd logs for SAM total usage metrics
          • Application patterns for the Agent Client Collector
          • Discovering DNS names using push-based discovery
          • Detecting portable applications using push-based discovery
          • Setting exclusion lists for IPs and NICs
          • Populating Assigned To attribute in Computer CI for ACC-V
          • Populating users based on type for ACC-V
          • Using Cloud Native Operations for Visibility
            • Configuring CNO for Visibility
              • Prepare for CNO for Visibility deployment
              • Install CNO for Visibility
                • Configure the memory limit of the Informer pod
                • Change the full discovery frequency in CNO for Visibility
                • Deactivate continuous discovery in CNO for Visibility
                • Display the Kubernetes cluster version in the CMDB
                • Create a cmdb_ci_linux_server CI for each Kubernetes node
                • Define include and exclude lists of Labels and Annotations
                • Add custom Labels and Annotations to Kubernetes resources
                • Upgrade CNO for Visibility Informers remotely
                • Override Informer parameters from the Instance
              • Pulling additional resources from Kubernetes clusters into the CMDB
            • CNO for Visibility Reference
              • CNO for Visibility Informer status fields
              • Data collected by CNO for Visibility
              • CNO for Visibility support matrix
              • CNO for Visibility advanced configuration options
        • Agent Client Collector for Visibility references
      • Agent Client Collector Log Analytics
        • Agent Client Collector Log Analytics setup
          • Set up Agent Client Collector Log Analytics using guided setup
          • Set up Agent Client Collector Log Analytics without using guided setup
        • Set up additional ACC data inputs
          • Configure ACC data inputs manually
            • ACC data input configuration fields
        • Agent Client Collector log policies
          • Agent Client Collector for Health Log Analytics default policies and checks
          • Create an Agent Client Collector log policy
          • Create a child log policy
          • Edit a log policy
          • Edit log path configurations
        • Identify and resolve log streaming issues
          • ACC data input streaming sources
        • View log shipper alerts
        • View log shipper events
        • CI association to a dynamic CI Group in Agent Client Collector Log Analytics
      • Agent Client Collector Security Incident Response
        • Agent Client Collector Security Incident Response capabilities
        • Perform an action on a security incident
        • Create an Agent Client Collector Security Incident Response command
        • Run an Agent Client Collector Security Incident Response command
        • Create an Agent Client Collector Security Incident Response OSQuery
        • Run an Agent Client Collector Security Incident Response OSQuery
      • View live CI data with Agent Client Collector
        • View live CI data logs
        • Assign a problematic CI to its incident to view live CI data
    • ITOM Optimization
      • Cloud Provisioning and Governance
        • Request the Cloud Provisioning and Governance application
        • Product Name Change
        • Day 1 setup guide for Amazon Web Services on Cloud Provisioning and Governance
          • Assign roles to AWS users of Cloud Provisioning and Governance
          • Set up a cloud account and service account for AWS
          • Configure a custom AWS member role
          • Create AWS GovCloud credentials for Cloud Provisioning and Governance
            • Create a service account for AWS GovCloud
          • Define the schedule for downloading AWS billing data
            • Configure the download size of AWS billing data
          • Add an AWS service account to the cloud account
        • Day 1 setup guide for Microsoft Azure Cloud on Cloud Provisioning and Governance
          • Set up Microsoft Azure Government Cloud on Cloud Provisioning and Governance
          • Assign roles to Azure users of Cloud Provisioning and Governance
          • Create a Microsoft Azure service principal
          • Store the Azure service principal credentials in the instance
          • Add an Azure service account
          • Set up a cloud account for Azure
          • Create Microsoft Azure credentials for billing download
            • Configure the download size of Microsoft Azure billing data
        • Day 1 setup guide for Cloud Provisioning and Governance: Google Cloud Connector
          • Assign roles to Google Cloud Platform users
          • Specify the credentials that Cloud Provisioning and Governance: Google Cloud Connector uses to access Google Cloud Platform data
          • Set up a cloud account and service account for Google Cloud Platform
          • (Optional) Add a Google Cloud Platform service account to the cloud account
        • Day 1 setup guide for IBM Cloud Connector
          • Assign roles to IBM Cloud Connector users
          • Create an IBM Cloud service account
          • Set up cloud accounts for IBM Cloud
        • Day 1 setup guide for VMware on Cloud Provisioning and Governance
          • Assign roles to VMware users of Cloud Provisioning and Governance
          • Create the credential and service account that will access your VMware data
          • Discover all datacenters in a service account on-demand
          • Set up cloud accounts for VMware
            • Add a datacenter to a cloud account
        • Billing and spend analytics
          • Cloud Insights Billing
            • Install Cloud Insights Billing
          • Billing and budgeting features in Cloud Provisioning and Governance
        • Additional Cloud Provisioning and Governance setup on day 2
          • Set up an additional cloud account
          • Schedule discovery of all resources in a service account
          • Discover all resources in a datacenter on-demand
          • Set capacity limits on user requests for resources
        • Cloud Provisioning and Governance administration guide
          • Domain separation and Cloud Provisioning and Governance
          • Domain separation in Cloud Provisioning and Governance - considerations for service providers
            • On-board a Company
            • Domain admin considerations
          • Cloud Provisioning and Governance Recipes
          • Cloud accounts
            • Service categories discovered in AWS
            • Service categories discovered in Azure
          • Cloud Admin Portal
            • Resource Profiles
              • Create an application profile
              • Create a compute profile
              • Create a compute security group profile
              • Create an OS profile
              • Create a schedule profile
              • Add credentials to an image template
              • Add an AWS public image to Cloud Provisioning and Governance
              • Add an Azure public image to Cloud Provisioning and Governance
            • IPAM integration
              • Register an Infoblox server
              • Create an IP pool
              • Create a cloud subnet
              • Create a relationship between a VMware network and subnet
              • Reserve IP addresses for VMware vSphere virtual machines in InfoBlox
              • Register IP addresses for AWS and Azure virtual machines in Infoblox
              • Delete a host record in Infoblox
            • Support for continuous delivery (configuration management)
              • Configure Ansible Tower user name and password
              • Create a workload provider type
              • Create an Ansible configuration management provider and run Discovery
              • Cloud Provisioning and Governance: Terraform Connector
                • Exploring Cloud Provisioning and Governance: Terraform Connector
                • Configuring Cloud Provisioning and Governance: Terraform Connector
                  • Install Cloud Provisioning and Governance: Terraform Connector
                  • Add support for minor or patch versions of the Terraform
                  • Create a Terraform Open Source config provider
                  • Create a Terraform Enterprise or Terraform Cloud config provider
                    • Create API key credentials for the Terraform account and the supported VCS account
                  • Run the IaC Discovery
                  • Domain separation and Cloud Provisioning and Governance: Terraform Connector
                  • Upgrading the Terraform environment
                • Using Cloud Provisioning and Governance: Terraform Connector
                  • Associate the Terraform input parameters with the Cloud Provisioning and Governance catalog item
                  • Populate the datacenter in Terraform-based catalog items
                  • Create a catalog item from the Terraform template
                  • Manage the Terraform template-based catalog items
                  • Map credentials between Cloud Provisioning and Governance and Terraform
                  • Associate the Terraform environment variable with the datacenter resource block
                • Cloud Provisioning and Governance: Terraform Connector reference
                  • Cloud Provisioning and Governance: Terraform Connector Create Config Provider form reference
                  • Cloud Provisioning and Governance: Terraform Connector SSH Private Key Credentials form reference
                  • Cloud Provisioning and Governance: Terraform Connector Windows Credentials form reference
                  • Cloud Provisioning and Governance: Terraform Connector API Key Credentials form reference
                  • Cloud Provisioning and Governance: Terraform Connector Terraform Catalog Item Task form reference
            • Day 2 operations using workflows
              • Credential handling
              • Use credentials with SSH workflows
              • Use SSH to shut down a VM using workflow type operation
              • Create the SSH custom activity
              • Create an SSH workflow
              • Create a response action for Cloud Provisioning and Governance
            • Create a cloud catalog item
              • Publish a blueprint as a cloud catalog item
              • Create a cloud template-based catalog item
                • Sample CloudFormation JSON to create an AWS EC2 instance
              • Create pre-provisioning operations
              • Create or update a catalog item from a Google Cloud Deployment Manager (GDM) template
              • Create post-provision operations
                • Add post-provisioning to a Cloud Formation Template-based catalog item
              • Add pre or post-provisioning operations with subflows to a template-based catalog item
              • Make catalog item visible
              • Create a variable set for Cloud Provisioning and Governance
              • Edit a variable for Cloud Provisioning and Governance
              • Manage operation attributes
            • Cloud Provisioning Blueprints
              • Build a Cloud Provisioning blueprint
                • Add a resource operation to the execution plan
                • Execute blueprint operations in parallel
                • Blueprint attributes
                • Configure a blueprint rule
              • Form configuration with blueprints
                • Add fields to a cloud catalog item order form
                • Control visibility default values for Cloud catalog items
                • Cloud catalog form configuration examples
                  • Populate the location based on the cloud account
                  • Remove a field from a cloud catalog form
                  • Populate stack name with a script
                  • Set default values for a cloud catalog form fields
            • Resource blocks in Cloud Provisioning and Governance
              • Create a custom resource block
                • Specify a host resource for a resource block
                • Specify the bindings for resource blocks
                • Configure endpoint operation mapping
              • Configure resource block input parameters
              • Add operation steps to a resource block
                • Add an operation to a resource block to use with a workflow
                • Add a resource operation step to invoke a workflow
                • Add a resource operation step to invoke a subflow
              • Extend Cloud Provisioning and Governance resource blocks with an override operation
              • Add a resource script to a resource block
              • Configure a response processor
                • Execute response processor for workflow
                • Virtual server response processor example
              • Add Terraform Orchestration interface on a resource block
              • Create a resource block for Microsoft Azure Cloud
            • Cloud scripts and cloud script templates
              • Create cloud initialization script templates and a script
              • Map a script to an OS profile
              • Example: Post-provision cloud script
            • Validate a parameter value with the AllowedPattern property
            • Cloud Governance
            • Permissions management for Cloud Governance roles
            • Policies for Cloud Provisioning
              • Cloud policy example
              • Triggers for cloud policies
              • Create a cloud policy
                • Configure a cloud policy rule
                • Using expressions in Cloud Provisioning and Governance
                • Create an action for an 'on Blueprint provision' policy
                • Create an action for an 'approval' policy
                • Create an action for an 'on Catalog item launch' policy
                • Create an action for an 'on Catalog item request start/end' policy
                • Create an action for an 'on Lease end' policy
                • Create an action for an 'on Resource operation' policy
                • Create an action for an 'on Resource operation launch' policy
                • Create an action for an 'on Resource operation request start/end' policy
                • Create an action for an 'on Resource Limit exceeded' policy
                • Create an action for an 'on Task Remediation' policy
                • Create a policy action script
                • Example policy action script that tags resources
              • Create a cloud approval policy
              • Create a cloud policy group
              • Export or import a cloud policy
            • Pools and Filters for Cloud Provisioning
              • Create a resource pool
              • Bind a parameter to a resource pool
              • Example resource pool that limits choices to cost center
            • Quotas and resource order controls
              • Create a cloud quota definition
              • Resource order controls for template-based cloud catalog items
                • Set up resource order controls
            • Use the Cloud Operations Dashboard
            • Use Cloud Root Cause Analysis reports
            • The Cloud API Trail
            • Cloud Provisioning and Governance dashboards and reports
            • Tags for cloud resources
            • Configure and perform life-cycle operations on discovered resources
            • Pattern-based targeted discovery
          • Troubleshooting tools for Cloud Provisioning and Governance
            • The Cloud Orchestration Trail
              • Open the Cloud Orchestration Trail
            • Open cloud orchestrations
          • Moving Cloud Provisioning and Governance content across environments
            • Move a blueprint from one environment to another
            • Move a resource block from one environment to the other
            • Move a cloud API from one environment to the other
        • Cloud API (CAPI)
          • Default CAPI APIs
          • CAPI classes in MID Server script includes
          • Azure VM provisioning walkthrough
          • AWS VM provisioning walkthrough
          • Add a product to an existing provider in CAPI
            • Create a CI class for a virtual cloud resource
          • Create or extend a CAPI interface
          • Create a CAPI API
        • Cloud User Portal
          • Cloud Provisioning and Governance user dashboards
          • Search the Cloud User Portal
          • Launch a stack
            • Viewing resource quota limits
            • Provisioning stacks based on quota limits
            • Track a stack request
            • Resubmit a failed stack request
          • Manage a stack
            • Manage a resource
            • Perform a life-cycle operation on a stack or resource
              • Life-cycle operations in Cloud Provisioning and Governance
            • Submit an incident for a stack
          • Using the Activities page
            • Track a change request
            • Track an incident
            • View cloud events
            • Create an SSH key
            • Download an SSH key
          • Business hour scheduling
            • Modify the lease for a stack
            • Modify business schedule operations for a stack
          • Manage personal and group resources
        • Schemas of Cloud Provisioning and Governance tables
        • Quick start tests for Cloud Provisioning and Governance
      • ITOM Optimization reference
        • Plugins activated with ITOM Optimization
    • Access to cloud environments for ITOM products
      • Install and configure MID Servers for Cloud Discovery and Cloud Provisioning and Governance
        • Proxy server configuration for MID Servers used for Cloud Discovery and Cloud Provisioning and Governance
        • Cloud Request Retry Configuration
      • Set up Oracle Cloud infrastructure (OCI) service accounts
        • Generate your Oracle Cloud Infrastructure (OCI) credentials
        • OCI access and permission using policies
      • Set up AWS service accounts
        • Access setup for AWS service accounts
        • Configure access to the AWS accounts using permanent AWS credentials
        • Configure access using temporary credentials based on trusted AWS accounts with AWS credentials
        • Configure access using temporary credentials based on trusted AWS accounts without AWS credentials
        • Configure access using temporary credentials for trusting AWS member accounts
        • Configure the MID Server for AWS IAM roles
        • Control AWS access and permissions using policies
      • Set up Google Cloud Platform service accounts
        • Configure the Google API credentials for Cloud Discovery
        • Google API Credentials Form
        • GCP access and permission using policies
HomeVancouver IT Operations ManagementIT Operations ManagementITOM VisibilityDiscovery patterns used by ITOM VisibilityDiscover related items together with the main CICurrent page
Table of Contents

Discover related items together with the main CI

  •  
    • Vancouver
    • Yokohama
    • Xanadu
    • Washington DC
  • UpdatedAug 3, 2023
  • 3 minutes to read
    • Vancouver
    • Service Mapping
The Vancouver release is no longer supported. As such, the product documentation and release notes are provided for informational purposes only, and will not be updated.

Discover related items together with the main CI

Add related items to the patterns to perform horizontal discovery of configuration items with all their related items: CIs or non-CIs, like ports or serial numbers.

Before you begin

  1. (Optional) Check if the CI is dependent: The system uses the identification rules to identify the CI independently of other CIs. Refer to Create or edit a CI identification rule.
  2. (Optional) To understand the model better, check dependent relationship rules which define the dependency structure of the CI types and the relationship types in these service definitions. For example, you can discover a Tomcat server with Tomcat WARs belonging to it. For more information, refer to Dependent relationship rules.
    Figure 1. Example of the Containment rule for Tomcat WAR

    Checking hosting rules under Metadata Editor
  3. To add a non-CI to the pattern, add it as a related item for the CI type to which the main CI belongs. For more information on adding related items for the CI type, see Configure references to other CIs or non-CIs as related items for the CI type.
Role required: pd_admin

About this task

Related items, both CIs and non-CIs, serve as a reference and provide additional information about the CI. For example, you can define a serial number, a port and an network APR table as related items for a hardware server. The system does not use these items for identification. After you configure related items for the CI type, you can use horizontal discovery for CIs of this type together with their related items.
Note: Non-CIs are items that do not extend the Configuration Item [cmdb_ci] table. Examples of non-CIs are ports, serial numbers, or Network ARP tables.

Pattern Designer displays attributes of related CI types, which you added to the pattern in the CI attributes pane. You can view and use these attributes while creating or modifying the main CI pattern.

Procedure

  1. Navigate to All > Pattern Designer > Discovery Patterns.
  2. Select the relevant pattern.
  3. On the pattern form, select the relevant identification section.
  4. Make sure that you are not in Debug mode.
  5. On the CI Attributes pane, click the Manage related CIs icon.

    Add related CIs icon.
  6. Select the relevant related CI type.
    You can use the search box to locate a specific CI type.
  7. Click the Plus icon.
    The new related CI type is added to the list.
  8. (Optional) Add other related CI types.
  9. Click OK.
    New tabs for related CI types you added appear under the tab for the main CI:

    Related CI types appear under additional tabs.

What to do next

Continue editing the pattern by adding a new step and defining its operation. To view or use attributes of a related CI type, click the relevant tab in the CI Attributes pane.

Related Content
  • Enter values and variables in patterns

    There are several ways to enter values in Pattern Designer. You can use the following types of values in patterns: strings, variables, concatenated variables, and eval() functions. Do not use GlideRecords in patterns.

  • Pattern variables

    You use variables in discovery patterns to refer to parameters or attributes of the CI that the pattern discovers.

Was this topic helpful?
YesNo

Previous

Example of creating an application pattern

Next

Enhance patterns without changing their identification sections

Previous

Example of creating an application pattern

Next

Enhance patterns without changing their identification sections

Log in to get a better experience

Log in
ServiceNow LogoThe world works with ServiceNow.™
  • Terms and conditions
  • Privacy statement
  • GDPR
  • AI Acceptable Use Policy
  • Cookie policy
  • Cookie Preferences
©2025 ServiceNow. All rights reserved.
Title
We use cookies on this site to improve your browsing experience, analyze individualized usage and website traffic, tailor content to your preferences, and make your interactions with our website more meaningful. To learn more about the cookies we use and how you can change your preferences, please read our Cookie Policy and visit our Cookie Preference Manager. By clicking “Accept and Proceed,” closing this banner or continuing to browse this site, you consent to the use of cookies.

Please let us know how to improve this content

Save as PDF

Please let us know how to improve this content