Resource discovery¶
Feature: Resource discovery¶
The system will discover resources from cloud providers and store normalised information about those resources. In order to discover resources from a cloud provider the account details for the API must be provided.
If configuration of the cloud changes over time those changes are captured, logged and reflected back to the system.
The following outlines the information that is synced.
In order that we can sync information, the provider has to supply it via their API. Therefore we cannot guarantee that all the data below is synchronised for every provider.
Features |
Detail |
Servers | Both physical and virtual servers are supported. Each provider models data in a different way so the system normalises as much of this as possible to give a consistent view across all resources.
The following fields are common for all servers:
|
Networks | Networks within clouds are discovered, information at L2 and L3 is collected where possible.
If the network connected to either block storage or a server, the system shows the relationship between them.
|
Block Storage | Block storage devices (e.g. Enterprise Cloud 1.0 Virtual Disk or AWS EBS) are discovered.
The following fields are common for all servers:
|
Network Appliances | Information about networking appliances such as firewalls, load balancers and gateways are captured and stored in the system.
|
Resource Pools | Some cloud providers sell resources based on resource pools (pools of CPU, Memory etc) - the system can track these for visibility purposes.
The following fields are common for all block network resource pools:
|
Feature: Extra attributes¶
When synchronising data from cloud providers certain extra attributes are added by the system. These extra attributes are designed to make searching and filtering resources easier.
Attribute type |
Examples |
Detail |
Geographic | Data Center: AWS EU West 1
City: Dublin
State: Leinster
Country: Ireland
Region: EU
|
The systems maintains a mapping of where cloud providers data centers are, this can then be used to enrich the basic data from the provider.
One use is to enable simple filtering for example to see which data sovereignty domains resources are in.
|
Operating System | Type: Linux
Distribution: Ubuntu
Version: 14.04
Architecture: x86_64
|
Where it’s possible to look up the operating system from the image name several additional attributes are added.
This can be used to identify machines that may be effected by a security bug in a known version of an OS or are approaching end of life.
|