Setting up the SSH for the network gear discovery

AR385010
Tera Contributor

Hi All,

 

My problem statement are mentioned below:

Actually I want to use the SSH credentials for the network gear discovery. My SSH credentials is validated successfully.

But when I tried to run the quick discovery for the target device I am unable to perform discovery and getting "Active, couldn't classify". 

 

But I checked "SSH(22) Port is open

 

Thanks,

Ashish Kumar Rai

8 REPLIES 8

Aneesh-D
Tera Guru
Tera Guru

Dear @AR385010 Ashish - if you credentials are successfully validated, then the likely reason could be missing classification definition. Can you give more details on what is your CI?

 

If its a credential issue: Then you will find a warning in discovery log like below:

AneeshD_0-1723130806057.png

Assuming you dont have any such warning, I strongly doubt your issue could be missing Classifier. 

So to get further help, please share details on what is the type of CI that you are trying to discover and check if you have a classifier defined the list of UNIX Classifications.

 

Hi Aneesh,

Thank you for your response, I am trying to discover the "RSM Devices".

 

Appli
Mega Sage
Mega Sage

Hi, based on the information provided, most probably you do need to create a custom classifier.

Hope it helps

Aneesh-D
Tera Guru
Tera Guru

Dear @AR385010 Ashish -

 

SSH based discovery classification basically starts off with "uname -a" (which prints the system information) command. 

AneeshD_1-1723556198065.png

 

The result is used further to determine how to classify and what probes to run for identification and exploration.

Since there are different variants of Linux, the first word in the response is used to classify which variant it is and then further process is determined. You can review the out of the box classifier available in servicenow from Discovery Definition>CI Classification>UNIX

AneeshD_2-1723556608072.png

then you can open a sample and look at the matching criteria:

AneeshD_4-1723556743981.png

AneeshD_5-1723556815982.png

Then you can look at the probes associated:

AneeshD_6-1723556895154.png

 

So for your troubleshooting purpose: As you already have a working ssh credential, you can run 'uname -a' from a terminal or putty and look at the response. then add a classifier for that Linux variant.

 

Please let me know if further assistance required.

 

Thanks,

Aneesh Damodaran.

Please click the thumps up if my reply was helpful and if you think it resolved your concern, please click Accept as Solution.

 

AneeshD_7-1723557684541.png