Pattern Designer- Identification Section
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-05-2024 07:25 AM
I am trying to understand building building an Identification section in a Pattern I created. What are the basic steps needed to identify an application Service. I'm not sure what to add.
I've read through the ServiceNow documentation for creating custom patterns and I couldn't get pass step 13 because my command Line was empty. not sure if that is normal or if a value should be present.
Overall, what's are some basic steps I could create to help service map any particular application service?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-05-2024 11:12 PM
Hi @Khill I recommend you to go through the OOB patterns.
We have Application and Infrastructre patterns. open the application pattern.
In service map pattern it consist three sections Identification , Extension, Connection section. Identification is baseline section if you want's add more functionality or retrive more values you have to create a extension section.
Operations
Structure
Contains shared libraries of step and match operation used to match a condition and stop running
the pattern if a condition is not met.
Query
These operations gather information from the target. This can be a predefined query like getting
process or registry information, or it can be customized using query methods such as WMI, SNMP,
or LDAP. The raw information can then populate pattern variables.
Parse
Operations in this category search through data to find specific information either from the target or
in pattern variables. Some common parsing strategies are regex and delimited text but there are
multiple other options.
Table operations
These category choices are specific to operations that interact with table functions, such as adding
computed columns to an existing table, merge two tables, append two tables that share the same
format, and more.
Others
The rest of the operations handle putting files on a target, or use operating system credentials
instead of the default administrative credentials, or break down a URL into its components
Mark it Helpfull !! If this helps you to understand .