Process and system for comprehensive IT discovery without credentials
First Claim
1. A method for discovering dependencies, configurations and utilizations among IT resources comprising:
- preparing at least one prediscovery script, the at least one prediscovery script associated with the discovering the dependencies, the configurations and the utilizations among the IT resources;
obfuscating the prepared prediscovery script;
sending the obfuscated prediscovery script to at least one user who has a privilege on at least one target server to run the obfuscated prediscovery script in the at least one target server;
running the obfuscated prediscovery script on said at least one target server on a list to configure said at least one target server to discover the dependencies, the configurations and the utilizations among the IT resources and further to configure the at least one target server to prevent accessing files or directories that include financial information;
discovering, based on the dependencies of the at least one target server, at least one outside server which is not on the list;
running the obfuscated prediscovery script on the discovered outside server;
providing to an analysis system at least one result of the running of the obfuscated prediscovery script on the at least one target server and the at least one outside server to parse and analyze the at least one result to generate data;
providing the generated data to a user, the generated data representing the dependencies, the configurations and the utilizations among the IT resources and the at least one outside server, the generated data excluding the files or the directories that include the financial information,determining from the generated data whether the obfuscated prediscovery script needs to be re-executed on a specific target server under a different parameter representing a different level of privilege, wherein the at least one user can adjust a level of privilege when re-executing the obfuscated prediscovery script in the at least one target server based on the at least one result of the run prediscovery script, the level of privilege including;
a normal user privilege and a root user privilege; and
determining from the generated data an optimization of the IT resources, said optimization including a reconstructing of an IT environment of said IT resources for operational efficiency, said reconstructing of an IT environment comprising;
moving of an application from one server to another server, and eliminating an unused software application and/or stale data in the IT resources, wherein the eliminating of the unused software application or stale data comprises respectively;
deleting an software application of the IT resources that has not been accessed for a ore-determined amount of time, or deleting data that has not been accessed for a pre-determined amount of time, wherein the generated data is utilized in a virtualization of the IT resources, mapping a logical storage device to one or more physical storage devices, andwherein the analysis system does not require user privileges, does not directly communicate with the at least one target server except receiving the at least one result of the run prediscovery script from the at least one target server, and the dependencies, the configurations and the utilizations among the IT resources, including discovering dependent applications of a first application on said at least one target server and dependencies among a number of target servers and their related applications, are discovered without requiring user privileges, wherein the discovering dependencies include discovering which application programs communicate with each other.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server.
62 Citations
18 Claims
-
1. A method for discovering dependencies, configurations and utilizations among IT resources comprising:
-
preparing at least one prediscovery script, the at least one prediscovery script associated with the discovering the dependencies, the configurations and the utilizations among the IT resources; obfuscating the prepared prediscovery script; sending the obfuscated prediscovery script to at least one user who has a privilege on at least one target server to run the obfuscated prediscovery script in the at least one target server; running the obfuscated prediscovery script on said at least one target server on a list to configure said at least one target server to discover the dependencies, the configurations and the utilizations among the IT resources and further to configure the at least one target server to prevent accessing files or directories that include financial information; discovering, based on the dependencies of the at least one target server, at least one outside server which is not on the list; running the obfuscated prediscovery script on the discovered outside server; providing to an analysis system at least one result of the running of the obfuscated prediscovery script on the at least one target server and the at least one outside server to parse and analyze the at least one result to generate data; providing the generated data to a user, the generated data representing the dependencies, the configurations and the utilizations among the IT resources and the at least one outside server, the generated data excluding the files or the directories that include the financial information, determining from the generated data whether the obfuscated prediscovery script needs to be re-executed on a specific target server under a different parameter representing a different level of privilege, wherein the at least one user can adjust a level of privilege when re-executing the obfuscated prediscovery script in the at least one target server based on the at least one result of the run prediscovery script, the level of privilege including;
a normal user privilege and a root user privilege; anddetermining from the generated data an optimization of the IT resources, said optimization including a reconstructing of an IT environment of said IT resources for operational efficiency, said reconstructing of an IT environment comprising;
moving of an application from one server to another server, and eliminating an unused software application and/or stale data in the IT resources, wherein the eliminating of the unused software application or stale data comprises respectively;
deleting an software application of the IT resources that has not been accessed for a ore-determined amount of time, or deleting data that has not been accessed for a pre-determined amount of time, wherein the generated data is utilized in a virtualization of the IT resources, mapping a logical storage device to one or more physical storage devices, andwherein the analysis system does not require user privileges, does not directly communicate with the at least one target server except receiving the at least one result of the run prediscovery script from the at least one target server, and the dependencies, the configurations and the utilizations among the IT resources, including discovering dependent applications of a first application on said at least one target server and dependencies among a number of target servers and their related applications, are discovered without requiring user privileges, wherein the discovering dependencies include discovering which application programs communicate with each other. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 18)
-
-
12. A system for discovering dependencies, configurations and utilizations among IT resources comprising:
-
a computing system being used by a user for preparing at least one prediscovery script, the at least one prediscovery script associated with the discovering the dependencies, the configurations and the utilizations among the IT resources; the computing system obfuscating the prepared prediscovery script;
wherein the user preparing the prediscovery script sends the obfuscated prediscovery script to at least one user who has a privilege on at least one target server to run the obfuscated prediscovery script in the at least one target server;the at least one target server running obfuscated prediscovery script for discovering one or more of;
the dependencies, the configurations and the utilizations among the IT resources while preventing the at least one target server from accessing files or directories that include financial information and discovering, based on the dependencies of the at least one target server, at least one outside server which is not on the list;the discovered outside server running the obfuscated prediscovery script;
an analysis system for receiving at least one result of the running of the obfuscated prediscovery script on the at least one target server and the at least one outside server;the analysis system for parsing and analyzing the at least one result to generate data, said analysis system providing the generated data to a user, the generated data representing one or more of;
the dependencies, the configurations and the utilizations among the IT resources and the at least one outside server, the generated data excluding the files or the directories that include the financial information, anddetermining from the generated data whether the obfuscated prediscovery script needs to be re-executed on a specific target server under a different parameter representing a different level of privilege, wherein the at least one user can adjust a level of privilege when re-running the prediscovery script in the target server based on the result of the run prediscovery script, the level of privilege including;
a normal user privilege and a root user privilege; anddetermining from the generated data an optimization of the IT resources, said optimization including a reconstructing of an IT environment of said IT resources for operational efficiency, said reconstructing of an IT environment comprising;
moving of an application from one server to another server, and eliminating an unused software application and/or stale data in the IT resources, wherein the eliminating of the unused software application or stale data comprises respectively;
deleting an software application of the IT resources that has not been accessed for a pre-determined amount of time, or deleting data that has not been accessed for a pre-determined amount of time, wherein the generated data is utilized in a virtualization of the IT resources, mapping a logical storage device to one or more physical storage devices, andwherein the analysis system does not require user privileges, does not directly communicate with the at least one target server except receiving the at least one result of the run prediscovery script from the at least one target server, and the dependencies, the configurations and the utilizations among the IT resources, including discovering dependent applications of a first application on said at least one target server and dependencies among a number of target servers and their related applications, are discovered without requiring user privileges, wherein the discovering dependencies include discovering which application programs communicate with each other. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification