VMware vCenter Configuration Manager Connector
This section of the documentation contains technical information on the ASM Core to VMware vCenter Configuration Manager Connector.
Including:
The name of the .NET assembly file
The connection methodology
The resource and link types that can be discovered
The events that are generated
The actions that can be called under workflow control
For compatibility and version support details, refer to the ASM Connector Matrix.
You should familiarize yourself with the information in Installing Connectors before installing any connectors, and read the Integration topics for more information on how to configure them.
Functionality
The VMware vCenter Configuration Manager connector allows organizations to enhance the following processes:
Incident Management. Automatically discover machine resources into the ASM Core Federated CMDB for the purposes of incident classification, reporting, and routing.
Asset Management. Automatically discover installed software into the ASM Core Federated CMDB for the purposes of comparing the actual deployments of software with software license assignments.
Change Management. Automatically enforce the initiation of a formal Change Management process in ASM Core whenever a server administrator attempts to roll out changes (eg: Windows service packs or security bulletins) using VMware vCenter Configuration Manager.
Connector Details
Information fields | Description |
Connector | VMware vCenter Configuration Manager <-> ASM Core |
ASM Core | v10 and above |
Third-party application | VMware vCenter Configuration Manager |
Assembly | Infra.Connector.vCM.dll |
Configuration file | Infra.Connector.vCM.icnf |
Connection methodology | Database |
Connector Installation
The steps below detail how to install the connector.
Download the connector zip package, save it in a temporary directory then unzip it.
The unzip folder should contain 4 sub-folders: Bin, Config, Doc, and vCM Scripts.
Prepare the vCM Database. See vCM Database Preparation.
Prepare the ASM Core Server. See ASM Core Server Preparation.
Configure a Connection Source. See Connection Source Creation.
vCM Database Preparation
A number of operations must be performed against the vCM database server as part of the connector installation. These operations must be performed by an account that is a database owner of the target database catalog such that any objects created in these steps should be created in the “dbo” schema.
Some of these operations are performed by shipped database script files (*.sql). Others should be performed by the SQL Server administration interface.
The connector connects solely to the main vCM database catalog. By default this will be called “VCM”; in some upgraded environments this may be “SCM” or “ECM”.
vCM utilizes additional database catalogs with suffixed names e.g.“VCM_Unix” and “VCM_Coll”. The database account used by the connector requires some access to one of these, the “Unix” database. However, the connector will never connect to this database directly.
Copy the contents of the vCM Scripts directory to your vCM database server.
Login to the SQL Server administration interface as an administrator.
Create a dedicated database login for the ASM connector.
On the main database catalog:
Run the provided SQL script Create_vSM_Connector_Objects.sql. (This creates the stored procedure used by the connector.)
Run the provided SQL script Grant_vSM_Connector_Access_Main.sql. (This creates the vSM_Connector database role and assigns it permissions.)
Add the dedicated login as a user to the catalog
Add the user as a member to the database role vSM_Connector.
Run the provided SQL script Enable_vCM_Integration.sql. (This enables vCM to create RFC events.)
On the “Unix” database catalog:
Run the provided SQL script Grant_vSM_Connector_Access_Unix.sql.
Run the provided SQL script Grant_vSM_Connector_Access_Unix.sql. (This creates the vSM_Connector database role and assigns it permissions.)
Add the dedicated login as a user to the catalog
Add the user as a member to the database role vSM_Connector.
Maintenance
If required at a later date, RFC events can be disabled by running the database script Disable_vCM_Integration.sql.
ASM Core Server Preparation
Copy the contents of the bin and config directories to the following locations on the ASM Core server:
File Name | Target Location(s) |
---|---|
bin / Infra.Connector.vCM.dll | < ASM Root> <Target System>/bin |
config / Infra.Connector.vCM.icnf | <Target System>/config |
config / Infra.Connector.vCM.Install.scp |
2. In the ASM Core Server Console, execute the SQL script Infra.Connector.vCM.Install.scp against the target system.
Restart the following Windows services:
The World Wide Web Publishing Service
The ASM Connector Service
Connection Source Creation
When creating a new VMware vCenter Configuration Manager source from the Source option of the Integration Platform, some specific parameters have to be entered as follows:
DB Connection String | Identifies the database server and catalog using an ADO.NET Native SQL Server Client connection string, minus explicit credentials. E.g. Server=server-host-name-instance-name;Database=vCM |
DB User ID | The login id of the database user assigned to ASM Core. |
DB Password | The password of the database user. |
Two modes of authentication against the database are supported:
SQL Server Authentication
Integrated Windows Authentication
SQL Server Authentication
In SQL Server Authentication the connector uses the credentials of a user created within the database. In this scenario, the credentials of that user are specified within the “DB User ID” and “DB Password” parameters.
Integrated Windows Authentication
In Integrated Windows Authentication the connector is authenticated using the credentials of a Windows account granted permission to the database. When this method is used the “DB User ID” and “DB Password” parameters are ignored and should be left blank. Instead, connector is authenticated using the account of the executing process. To use this mode of authentication:
The “DB Connection String” parameter requires an addition suffix, “
;Integrated Security=SSPI
”. E.g. Server=server-name;Database=main;Integrated Security=SSPI Where main is the name of the main database (see previous explanations about main vCM database).The following processes must be configured to execute using a Windows account with the prerequisite database permissions.
The IIS Application Pool used by the ASM Core virtual directory (directories)
The various ASM Core Windows services
A common mistake users make when configuring Integrated Windows Authentication is to only configure the account for one of the required processes. If the IIS Application Pool is configured with the correct account but the ASM Core Windows services are not, users may be confused as the connection will succeed within main application but background tasks such as scheduled FCMDB scans will fail.
Incident Management
The VMware vCenter Configuration Manager connector allows you to populate your Federated CMDB with machines (ie: physical servers, virtual servers, desktops, and laptops) for the purposes of incident classification, reporting, and routing.
Resource Types
Machine
A resource that represents a single computer.
Field | Data Type |
---|---|
Machine ID | Int |
Machine Name | String |
Domain Name | String |
Manufacturer | String |
Model | String |
Primary User | String |
Primary User NT Domain | String |
Primary User NT Login | String |
Last Rebooted | date/time |
Is Managed by vCM | Boolean |
Is VM | Boolean |
OS Name | string |
OS Vendor | string |
OS Version | string |
Time Zone | string |
Machine Type | string |
Recommended Configuration
Resources
We recommend that you:
Create a Machine CMDB Item Type and design a screen for it.
Create a Machine Template Eg:\
Set up a resource mapping in the Integration Platform to map vCM Machine resources and attributes onto ASM Core Machine CIs. The key fields to consider mapping are:
ASM Core Machine CI Attribute | Possible sources from the vCM Machine Resource |
Ref | Machine ID |
Title | Machine Name |
User | The connector dissects the “Primary User” field published by vCM into NT Domain and User ID components. These are provided to enable you to derive the “User” field of an imported Configuration Item using a Resolution Rule. If the ASM System is also integrated with Active Directory, these dissected fields can be matched to the “NT Domain Name” and “NT User ID” of an imported User. The criteria for such a resolution rule should be defined as follows: {Person:NT Account Name} = {Resource:Primary User NT User Login} AND {Person:NT Domain Name} = {Resource:Primary User NT Domain Name} The “Primary User” presented by vCM may not necessarily correspond to the “User”, or may not be populated at all. If this is a concern, use discrepancy reporting on this field to monitor changes to this value. |
You may also consider mapping other attributes such as Manufacturer, Model, OS Vendor, OS Name, and OS Version which can be useful for incident diagnosis, routing, and reporting purposes.
Software License Management
The VMware vCenter Configuration Manager connector allows you to populate your Federated CMDB with the software actually installed on each machine. This is intended to be used in conjunction with the Asset Management capabilities of ASM Core, which are used to maintain your inventory of software licenses and their current assignments. By comparing the software actually installed on machines with the current license assignments, you can determine whether you are under or over licensed.
Resource Types
Windows Software
A resource that represents a specific minor version of a Windows software product that is installed on one or more machines.
Field | Data Type |
Product Key | String |
Product Name | String |
Product Version | String |
Major Version | String |
Minor Version | String |
Publisher | string |
Unix Software
A resource that represents a specific minor version of a UNIX software product that is installed on one or more machines.
Field | Data Type |
Product Key | string |
Product Name | string |
Product Version | string |
Major Version | string |
Minor Version | string |
Long Name | string |
Description | String |
Category | String |
Link Types
Windows Software Installed On
A relationship between a Machine resource and a Windows Software resource indicating that the software is installed on that machine.
Resource Type A | Machine |
---|---|
Resource Type B | Windows Software |
Field | Data Type |
---|---|
Date Installed | date/time |
Date Collected | date/time |
Date Last Used | date/time |
Frequency | string |
Install Source | string |
Unix Software Installed On
A relationship between a Machine resource and a UNIX Software resource indicating that the software is installed on that machine.
Resource Type A | Machine |
---|---|
Resource Type B | Unix Software |
Field | Data Type |
---|---|
Date Installed | date/time |
Date Collected | date/time |
Date Last Used | date/time |
Recommended Configuration
Resources
It is recommended to either:
Store both Windows and UNIX software in the in-built Software Product CMDB Item type.
Create separate descendent CMDB Item Types for Windows Software and UNIX Software.
It is recommended to map the VCM Resource attribute Product Name to the ASM Core Configuration Item attribute Title.
There are three possible ways to manage versions of software products in the CMDB as follows:
Each software product is stored as a single Configuration Item. To support this scenario, set up a Matching Rule based on:
Product Name
Each major version of a software product is stored as a single Configuration Item. To support this scenario, add a Major Version attribute to your CMDB Item and set up a Matching Rule based on:
Product Name
Major Version
Each minor version of a Software Product is stored as a single Configuration Item. To support this scenario, add Major Version and Minor Version attributes to your CMDB Item and set up a Matching Rule based on:
Product Name
Major Version
Minor Version
The appropriate approach should be determined based on the granularity of tracking desired. By setting up Criteria in combination with Matching Rules it is possible to track different Software Products at different levels. As per any kind of matching configuration in ASM Core, users are advised to regulate ambiguous and non-matching resources to ensure flawed data is handled sensibly.
Links
It is recommended that the Installed On links be imported using a special link type such as:
Category should be set to Summary. A single machine may have a large number of software products installed; similarly, a single software product may be installed on a very large number of machines. Therefore, rendering software installations in a CMDB linking can greatly reduce the readability of the CMDB Linking diagram and obfuscate those relationships that should be clearly visible in the diagram. This configuration is used to hide software installations on the diagram allowing more significant impact relationships to be more clearly presented.
Principal should be set to the CMDB Item Type of the machine CMDB Items imported from vCM, or a common ancestor thereof. This could be as simple as Configuration Item. Optionally, it can be helpful to specify a descriptive role name for Principal such as Installed On.
Summarized should be set to Software Product or whatever descendent type is being assigned to your software product CMDB Items imported from vCM. Optionally, it can be helpful to specify a descriptive role name for Summarized such as Installed Software.\
Change Management
The VMware vCenter Configuration Manager connector allows you to automatically enforce the initiation of a formal Change Management process in ASM Core whenever a server administrator attempts to roll out changes (eg: Windows service packs or security bulletins) using VMware vCenter Configuration Manager.
Event Types
RFC Event
An RFC Event represents a notification that a job has been created within vCM to affect some change in the environment that needs to be approved in order to proceed.
The event type exposes the following fields:
Field | Data Type | Description |
---|---|---|
RFC Event GUID | String | The unique identifier of the job with VCM. |
Notes | String | Any notes the VCM administrator has entered to describe the change. |
Type | String | The type of job as characterized by VCM. |
Run Now | Boolean | A flag indicating whether the VCM administrator plans to run the job immediately or not. |
Run Time | date/time | The date/time at which the VCM administrator plans to run the job. |
Machine CIs | Reference to zero or more Machine resources | The list of machines that will be impacted by the job, for impact analysis purposes. |
Machine CI Ids | String | A textual representation of above. |
Event ID | String | The ASM Core request/call ID (will be automatically updated by the connector). |
RFC No | String | The ASM Core RFC number (will be automatically updated by the connector). |
RFC Status | String | The status of the job. Will initially be “Pending” when the event is received. |
Outbound Actions
The two Outbound Actions published by the connector are:
Approve Change. This action allows a change (as identified by a previous event) to proceed.
Deny Change. This action stops a change (as identified by a previous event) from proceeding.
Both actions have the same parameters as follows:
Input Parameters
Field | Data Type |
---|---|
RFC Event GUID | string |
RFC No | string |
RFC Status | String |
RFC Notes | String |
Output Parameters
The same fields exposed during receipt of the initial event are available as parameters from actions.
Error Handling
All outbound actions in the connector are attempted synchronously, with one of the following three outcomes possible:
Success | Outbound Action tasks that are created and complete successfully will activate the Completion branch of the workflow. |
Failure to Create | Outbound Action tasks that cannot be created due to a soft error (for example, if they cannot connect to the VCM database), will remain active and open. Such tasks will be subject to the retry and email notification parameters as defined in the connection source. |
Failure to Complete | Outbound Action tasks that cannot be completed due to a hard error (for example, if the GUID field is not mapped), will cause the Not Completed branch of the workflow. Possible completion errors are:
|
Recommended Configuration
At a high level, the steps involved in setting up Change Management are as follows:
Configure vCM Service Desk Integration. See the vCM documentation for details.
Model your Change Management process using the ASM Core Workflow Template Administration.
Map RFC Events through to your process using the ASM Core Integration Platform.
Add Outbound Actions tasks to your process to Approve / Deny changes in vCM.
Modeling your Change Management Process
Your Change Management process should be modeled using the ASM Core Workflow Template Administration. A simple Change Management process can be seen below:
Create a Screen Set for your change process, and add the following extension fields to it. Display these fields as read only fields in your Request Details screen within that Screen Set.
Field | Data Type |
---|---|
VCM GUID | Text |
VCM Notes | Text Area |
VCM Type | Text |
VCM Run Now | Checkbox |
VCM Run Date Time | Date |
Mapping RFC Events
The ASM Core Integration Platform should be used to map the receipt of vCM RFC Events onto the initiation of a request:
All other Incoming Transactions should be configured to Take No Action as follows:
It is recommended to set up the following incoming field mappings:
ASM Core Request Attribute | VCM Event Source | Update |
---|---|---|
VCM GUID | RFC Event GUID | Always |
VCM Notes | Notes | Always |
VCM Type | Type | Always |
VCM Run Now | Run Now | Always |
VCM Run Date Time | Run Time | Always |
Request CIs | Machine CIs | Always |
The mapping of the GUID is important as this is needed to approve or deny the change. The mapping of the Machine CIs is important as it allows impact analysis to be performed.
Approving / Denying Changes
At appropriate points in your ASM Core Change Management process, you should insert Outbound Action tasks that approve or deny changes. The only important field to map is the RFC Event GUID as follows:
The RFC No field will be automatically populated with the ASM Core request number (eg: Request#123). It is possible to overwrite this default format by providing an alternative mapping for this field (eg: RFC352).
The RFC Notes field can also optionally be mapped to pass additional information back to vCM.
Last updated