Welcome to Community Week 2025! Join us to learn, connect, and be recognized as we celebrate the spirit of Community and the power of AI. Get the details  

ITOM forum
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Forum Posts

Managing Errors in Discovery

We have about 3,000 discovery errors and 4 developers only. I want to know the best practice that you are implementing within your organization in handling and clearing these errors out to as close to zero errors. There are too many errors to fix in ...

hanaphouse_0-1664898283731.png hanaphouse_1-1664898320562.png
hanaphouse by Tera Guru
  • 1441 Views
  • 4 replies
  • 6 helpfuls

How to validate User is member of the group

Hello, I'm trying to validate if the user is a member of the group or not. Previously there was an action created on flow designer to verify the same, but recently a client asked to verify it on form level if the requested for is a member of specific...

JRY by Mega Guru
  • 1590 Views
  • 2 replies
  • 0 helpfuls

Missing events from SolarWinds

Hi, Im using Solarwinds connector to get the Events for alert creation. My stakeholder says that some specific events are not found in ServiceNow . Especially a set of events where NETOBJTYPE starts with UND. Ideally the connector is supposed to pull...

Discovery of Active Directory Domain Controllers

For Discovery of Active Directory Domain Controllers, what level of access does the credential have? Does this have to be a domain Admin access? What happens if the security does not allow providing the Admin Access to SNOW?

Doanna by Giga Contributor
  • 3615 Views
  • 3 replies
  • 7 helpfuls

How to parse the result to a variable using pattern

I got the required result by the below stepThis information needs to be stored in the switch port table. I have created a field, Alias on the switch port table. Now whatever is coming in eth4 should be stored in ethernet 4 on the switch port table.  ...

pratiksha5_0-1665467579061.png Screenshot 2022-10-11 at 1.50.36 PM.png
pratiksha5 by Mega Sage
  • 683 Views
  • 2 replies
  • 0 helpfuls

CMDB Security

Does anybody have any thoughts, recommendations or experiences on restricting access to the CMDB? Because out-of-box, access is very open, our Information Security group has concerns that if a bad actor compromises a company account with access to Se...

Tag based service mapping

I have successfully created tag based application service with key value pairs created and even the map is showing it correctly. But now I have more CI assigned with same key value pair but after recalculating the CI's are linked to service.Steps tak...

Firewall table and Virtual Firewalls

Which table should be used for Firewall Cis (cmdb_ci_ip_firewall or cmdb_ci_firewall_network) ?How to model virtual Firewall in CMDB -> using exiting field: device type = Virtual Firewall  or adding 'Is Virtual' = True to Firewall table?   

jnipala by Tera Contributor
  • 1564 Views
  • 1 replies
  • 2 helpfuls

Impact and steps for MID Server IP address change

Dear Community Members, Our infrastructure team needs to move MID Server to other IP address. I need orientation regarding of the impact, cares and steps I need to follow for this change. The mid server that will have the IP changed has three service...

aoop_pfeital by Kilo Contributor
  • 1486 Views
  • 4 replies
  • 10 helpfuls