
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-28-2019 08:49 AM
Hello Community!
I need to configure Discovery for Cisco UCS Equipment, and I've read the (slightly vague) Docs article on it, and the Cisco UCS Central Authentication Guide, but I'm still having issues.
- Cisco Unified Computing System (UCS)-HD device discovery
- Cisco UCS Central Authentication Guide, Release 2.0
Here's some of the questions that I would like to have answers to:
- Does Discovery need to communicate with UCS Central or UCS Manager? UCS Central would be preferable.
- What is the input IP address for ServiceNow to discover UCS Equipment? Would it be the IP address of UCS Central/Manager?
- What is the criteria that ServiceNow needs to properly authenticate with a UCS Central/Manager SNMPv3 Credential? I followed the instructions in the Cisco UCS Central Guide under "Creating and Editing an SNMP User" as follows:
- Entered a User Name; in ServiceNow, used this format: ucs-Local\username
- Authentication Type: MD5
- AES-128 Encryption: Enabled
- Entered a password for both the Password and Privacy Password fields
- Clicked Save 🙂
- Will SNMPv3 even work, or do I need to use SNMPv2 with a Community String?
- I know that whenever you utilize SNMP, there must be an ACL to allow the MID Servers to talk to the device. I'm unsure as to whether I need to create an SNMP Trap or Inform using the instructions in the UCS Central manual under "Creating and Editing an SNMP Trap or Inform." I've tried both to no avail. Since I was trying SNMPv3, I entered the user name that we created and selected v3 for the Version. The last two configurations are where I need help: Trap or Inform? Then which V3Privilege? I would assume "Priv" as the choices are:
- Auth: Authentication but no encryption
- NoAuth: No authentication or encryption
- Priv: Authentication and encryption
I have also setup the Applicable Credential and entered that into the Credenetial table.
Once I can get the SNMP Credential to authenticate I can probably take it from there. Thanks in advance to everyone for your help!
~Michael Zgleszewski
Solved! Go to Solution.
- Labels:
-
Discovery

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-03-2020 08:09 AM
We abandoned that effort, but did end up using the Cisco Intersight ITSM Plugin that was available in the ServiceNow Store, and it works great!
You can find it here:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎01-24-2020 12:13 AM
Hi Mike,
Did you get through this, we are trying to discover UCS central with user created with MD5 and AES-128, but the credentials fail. Appreciate your guidance !

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎01-24-2020 06:24 AM
Unfortunately, we did not. We ended up abandoning that effort. 😞 Sorry!
But I am still very interested in doing this, so if anyone has any tips, please post!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-01-2020 11:47 PM
Hello,
Did you get success in running discovery for cisco-ucs. i am trying to understand the what components get from OOTB discovery and its relationship.
could you please share dependency view of cisco-ucs CI's/components. like-chassis, server, rack, port, interface, device manager, etc. And relationships info. plz.
thanks in advance.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-03-2020 08:09 AM
We abandoned that effort, but did end up using the Cisco Intersight ITSM Plugin that was available in the ServiceNow Store, and it works great!
You can find it here: