Danny Fleer
BMC Discovery uses self signed certificates to encrypt communication between system components (appliances, windows proxies). I don't refer to certificates used to encrypt the communication between…
Bernard Stern
Hello Community   We have this piece of software running but it is not yet discovered by ADDM. Do I have to open a support case as for SNMP devices? Or do I have to write a custom module?   We are… (Show more)
in Discovery
Benny wu
my discovery version is 11.3.04,i want to know the ipaddress cann't be discoveried
in Discovery
Ryan Nicosia
I know this isn't a configuration option but we can't figure out what is causing it.   1. Login to BMC Discovery 2. Run a generic query 3. Leave the query results up and do nothing with it 4.… (Show more)
in Discovery
Christiane Menezes
Hello all   Is possible Discovery tool  getting the server name from the first alias on the line in /etc/hosts for the server IP ? Is possible the Discovery tool  get the host name from the output… (Show more)
in Discovery
Ferry Groot
Hello discoverers,   we have a BMC Discovery-Cluster Version 11.3.0.5. We connect with the cluster through a loadbalancer. When we stop one of the appliances, there is still a website available,… (Show more)
in Discovery
Danny Fleer
BMC Discovery supports discovering datasources of Java Application Servers, like Apache Tomcat and WildFly or Red Hat JBoss.   I've seen many setups where datasources are configured as "XA"…
Peter Bauer
Hi ADDM-Users!   In our installation of ADDM 10.2, we suffer from problems in discovery, especially for Solaris 11 Machines. In many cases, we get an error message saying "tw_report: not found" (if… (Show more)
in Discovery
Danny Fleer
The restricted paths feature is very helpful. However, the list of restricted paths quickly becomes confusing with more and more entries (Especially if a customer uses the feature as a whitelist with…
Danny Fleer
After doing some research in the community I found the following Idea: To have an option to control which discovered Node data a user can view when granting an access to ADDM appliance.  …
Gokul Donthi
With the increased focus on Information Security, there is a need to send log files to analytical tools like 'Splunk'. 'Splunk' requires 'Syslog' forwarding as the mechanism to receive the log files.…
Load more items