- Post History
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
â04-23-2025 04:27 AM - edited â04-24-2025 02:47 AM
Hello ServiceNow Family, this is Ravi and I am back with great article of 2025 related to ServiceNow ITOM
Are you preparing for a ServiceNow ITOM (Discovery/CMDB) interview? Understanding how Discovery and the Configuration Management Database (CMDB) work is key to managing IT infrastructure efficiently. Below are the most frequently asked questions from real-world interviews, curated with clear and updated answers.
đ Note: These answers are framed based on personal knowledge and real-time interview experiences over the past year. The wording may vary depending on individual understanding.
â Q1: What is Discovery? What are the types of Discovery in ServiceNow?
Answer:
Discovery is the process of identifying IT assets (servers, applications, network devices, etc.) and populating them into the CMDB.
Types:
-
Horizontal Discovery: Identifies infrastructure components like servers, routers, switches.
-
Top-Down Discovery (Service Mapping): Maps business services and the relationships between their components.
â Q2: Explain the phases of Discovery.
Answer:
-
Scanning â Detects live IP addresses and open ports.
-
Classification â Determines the type of device (Linux, Windows, etc.).
-
Identification â Checks if a CI already exists or creates a new one.
-
Exploration â Gathers detailed info about the device.
-
Dependency Mapping â Identifies relationships between CIs.
â Q3: What is Scheduled Discovery?
Answer:
Scheduled Discovery allows Discovery jobs to run automatically at defined intervals, ensuring the CMDB remains updated consistently.
â Q4: What are the types of Horizontal Discovery?
Answer:
-
Infrastructure Discovery: Identifies physical/virtual servers, storage, network hardware.
-
Application Discovery: Discovers applications and software services running on the devices.
â Q5: Explain MID Server configuration.
Answer:
MID (Management, Instrumentation, and Discovery) Server is a lightweight Java application installed behind the firewall to facilitate communication between ServiceNow and target systems.
Configuration includes:
-
Installing on a Windows/Linux server.
-
Registering with instance.
-
Assigning capabilities (Discovery, Orchestration, etc.).
-
Defining IP ranges and credentials.
â Q6: What if there's an issue in the scanning phase?
Answer:
-
Check MID Server logs.
-
Validate IP ranges and credentials.
-
Ensure firewall is not blocking required ports.
â Q7: Where do you troubleshoot Discovery issues?
Answer:
-
ECC Queue: For communication errors.
-
MID Server logs: To analyze command execution.
-
Discovery Log: Review Discovery status and phase failures.
â Q8: How do you check the MID Server status?
Answer:
Navigate to: MID Server > Servers
Look for statuses like Up, Down, Validated, or Validating.
â Q9: What are probes, sensors, and patterns?
Answer:
-
Probes: Scripts that collect data.
-
Sensors: Process probe results and populate CMDB.
-
Patterns: Declarative models for Discovery and Service Mapping without needing scripts.
â Q10: What is âHelp the Help Deskâ?
Answer:
A feature that gives IT support teams quick access to relevant CI details for faster incident resolution.
â Q11: How is communication done between MID Server and Discovery?
Answer:
Through the ECC Queue.
-
ServiceNow sends instructions (input) â MID Server
-
MID executes probes and returns results (output) â ServiceNow
â Q12: What does the ECC Queue contain?
Answer:
-
Input: Tasks sent to MID Server.
-
Output: Results returned from MID Server.
â Q13: What credentials are used for devices?
Answer:
-
Windows: WMI
-
Linux/Unix: SSH
-
Network devices: SNMP
â Q14: How to discover network devices using Network Configuration Manager?
Answer:
-
Add devices to Discovery Schedule.
-
Assign SNMP credentials.
-
Run Discovery job to fetch config via SNMP.
â Q15: What is Knowledge Discovery?
Answer:
It refers to the process of generating insights from data in CMDBâlike relationships, usage, trends.
â Q16: What ports must be open for SSH and WMI Discovery?
Answer:
-
SSH: Port 22
-
WMI (Windows): Ports 135, 445, and dynamic ports (1024â65535)
â Q17: What are Discovery behaviors?
Answer:
Behaviors define how Discovery interacts with devices using protocols like SSH, SNMP, WMI, etc.
â Q18: If a device supports both SSH and SNMP, which is used?
Answer:
Depends on Discovery behavior configuration. Typically:
-
SNMP: For network devices.
-
SSH: For Linux/Unix servers.
â Q19: Can a Windows MID Server discover Linux machines?
Answer:
Yes. It can use SSH to discover Linux/Unix machines.
â Q20: What is MID Server Clustering?
Answer:
A group of MID Servers acting together for load balancing and failover support.
â Q21: Difference between Discovery and Service Mapping?
Answer:
-
Discovery: Finds infrastructure and populates CMDB.
-
Service Mapping: Identifies application dependencies and maps complete services.
â Q22: What are the various phases in Discovery?
Answer:
-
Scanning
-
Classification
-
Identification
-
Exploration
â Q23: Difference between TCP and UDP?
Answer:
-
TCP: Reliable, error-checked, slower.
-
UDP: Faster, but no guarantee of delivery.
â Q24: How to find IP address on UNIX?
Answer:
-
ifconfig(Unix) -
ip aorhostname -I(Linux)
đĄ Other Common CMDB Questions
â What are the base CMDB tables?
-
cmdb: Core CMDB table -
cmdb_ci: Base CI table -
cmdb_rel_ci: Stores CI relationships
â
Tables that extend cmdb_ci_server?
Examples:
-
cmdb_ci_linux_server -
cmdb_ci_win_server -
cmdb_ci_virtualization_server -
cmdb_ci_mainframe,cmdb_ci_osx_server, etc.
â Where is data center info stored?
Answer:
In table: cmdb_ci_datacenter
â How to test CMDB health?
Use CMDB Dashboard and configure KPIs:
-
Completeness
-
Correctness
-
Compliance
â What are Identification Rules?
Rules used to determine if a CI is unique and already exists in the CMDB using:
-
Unique attributes (e.g., serial number)
-
Required attributes (e.g., name, company)
â What are Reconciliation Rules?
Define which data source can update CMDB records and attribute precedence when multiple sources exist.
â What roles are required to manage CMDB?
| Role | Description |
|---|---|
sn_cmdb_admin |
Full CMDB admin rights |
sn_cmdb_editor |
Edit access |
sn_cmdb_user |
Read-only |
cmdb_import_api_admin |
Import set REST access |
cmdb_query_builder |
Build CMDB queries |
â Have you implemented Discovery?
Tip: Share:
-
MID installation/config steps
-
Issues faced and resolved
-
Tools integrated (e.g., SCCM, Tanium, TADDM)
-
Volume and scale (e.g., number of CIs discovered)
â Best Practices for CMDB Implementation
-
Use OOB CI Classes
-
Avoid heavy customizations
-
Leverage CMDB Health Dashboard
-
Use Identification & Reconciliation rules
-
Assign CI ownership
-
Automate population using Discovery & Integrations
- 28,510 Views
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Thanks @Everyone for Liking this Article. Many more to come
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Good
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Very helpful. Thanks Ravi
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Thanks Ravi
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Very helpful Thank you so much
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Very helpful! Thanks Ravi
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Excellent thank you for sharing and prepapring these questions
- Mark as Read
- Mark as New
- Bookmark
- Permalink
- Report Inappropriate Content
Thanks for sharing, It's very helpful!
