SlideShare a Scribd company logo
Introduction to Patterns How the Intelligence Works
Outline  Pattern Basics What is  a pattern? Where do I get new patterns? Pattern Controls Demystifying Patterns Pattern components Patterns and the Model Patterns and Provenance Simple Pattern Configuration
Pattern Basics
What Is a Pattern? A way to customise Atrium Discovery so it can infer things in the datastore based upon data collected Patterns are event driven Written in The Pattern Language (TPL) Common software types can recognised by built-in TKU (updated monthly) Some organisations need their own custom written patterns Extend discovery information collected Uncommon or custom software components Business Applications which are specific to the organization
What Can Patterns Do?   Triggered during the discovery process A certain OS version is found A certain process is running Can take the initial information collected and use it to collect new data Pattern matching details within the process arguments May go back to the host and run other commands Collect configuration files Collect inventory information from databases Use very specific commands to discover version Pattern management under the discovery tab Discovery -> Pattern Management
Where Do I Get New Patterns? The Knowledge Update (TKU) service Regular releases of a TKU A TKU can contain New Patterns Updates to existing Patterns Updates to End of Life Data Updates to Hardware Reference Data Updated every month, with new/updated patterns TKU-CORE-2009-06-1.zip Core patterns for detecting Software Instances TKU-DBDETAILS-2009-06-1.zip Deep database discovery TKU-SUPPORTDETAILS-2009-06-1.zip Last dates for software support
Upload and Activate Patterns Upload a single pattern TPL files (.tpl) Forms a single Pattern Package Upload batches of patterns  In zip files The zip file is the Pattern Package
Controlling Patterns Patterns are grouped into packages, which are grouped into modules Activate or deactivate patterns to change the behavior of discovery
Deactivate and Delete If a package or pattern is deactivated, it does not execute during Discovery  Can reactivate to include in the next discovery run Deleting a pattern or package of patterns: all data which was inferred based upon patterns in that package is also deleted
Demystifying Patterns
Example Pattern Each pattern must have a trigger If matched successfully this become the Primary Inference for the SI or BAI Triggers are matched at the point of discovery Triggered on DDD node Finds a host node in the datastore Infers a Software Instance node
Triggers Every pattern has a trigger Contained within the “triggers” declaration When a pattern “fires” the trigger declaration has been met Example: the host has a certain process running Example: An SI has been created or modified
Trigger Example
Data Model Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
Data Model – Provenance Provenance is the source of all inferred information and  is automatically tracked Stored with Inference relationships Referred to by the role of the evidence node The three core roles:  Primary Contributor Associate Superseded relationships – marked destroyed
Data Model – Maintainer and Request Maintainer and Request inference relationships are a specific type of provenance Every node created or update by a pattern is linked back to the pattern that is responsible for it’s maintenance: Every pattern based discovery request, successful or not, is linked back to the pattern that requested it Business Application Pattern Maintainer Discovery Result Pattern Request
Data Model – Current Live Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
Data Model – Old Superseded Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
Data Model – Maintainer Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
SI Provenance Example
Host Provenance Example Use the “Show Provenance” button to show Provenance is defined as: The records or documents authenticating such an object or the history of its ownership.
SI Version Provenance How we know the full version of java? Click through the provenance link to the DiscoveredCommandResult node
SI Version Provenance Results Answer: The java version was determined as the result of running the java command with the “-fullversion” flag
Maintaining Pattern
Pattern Configuration
Why Have Configurations? Allows changes to behaviour using the UI Without pattern editing, or reactivation Typical uses Turn pattern options on/off Update paths to find files or commands Any other parameters
Where Does it Appear? (1) If configuration blocks are defined in the pattern
Where Does It Appear? (2) On the “All pattern module configurations” page Discovery > Pattern Management > View Configuration of all Patterns
How Changes Are Applied User must have correct permission to edit: reasoning/pattern/config Otherwise can view readonly Changes take place  immediately Be careful if discovery is running Warning shown if this is the case
Online Documentation: http://www.tideway.com/confluence/display/81/Pattern+Management http://www.tideway.com/confluence/display/Configipedia/Schedule+and+Roadmap Further Resources

More Related Content

PPT
Addmi 16.5-discovery troubleshooting
PPT
Addmi 15-discovery scripts
PPT
Addmi 16-discovery monitoring
PPT
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
PPT
Addmi 13-discovery overview
PPT
Addmi 09-analysis ui-reporting
PPT
Software Testing - Tool support for testing (CAST) - Mazenet Solution
PPTX
Back-2-Basics: Exception & Event Instrumentation in .NET
Addmi 16.5-discovery troubleshooting
Addmi 15-discovery scripts
Addmi 16-discovery monitoring
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 13-discovery overview
Addmi 09-analysis ui-reporting
Software Testing - Tool support for testing (CAST) - Mazenet Solution
Back-2-Basics: Exception & Event Instrumentation in .NET

What's hot (16)

PDF
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
PPTX
Analytics tools and Instruments
PPT
PPT
Oracle 10g Forms Lesson 13
PPT
PDF
Practical Malware Analysis: Ch 15: Anti-Disassembly
PPT
Paper Ps
PPT
alka ppt upload no code change
PPT
alkatest7
PPT
Paper Ps
PPT
Justin Presentation PPT Upload
PPT
justin presentation upload PPT june 25 ADVANCED
PPT
justin presentation upload PPT june 19
PPT
upload ppt by browse button
PPT
Paper Ps
PPT
Paper CS
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
Analytics tools and Instruments
Oracle 10g Forms Lesson 13
Practical Malware Analysis: Ch 15: Anti-Disassembly
Paper Ps
alka ppt upload no code change
alkatest7
Paper Ps
Justin Presentation PPT Upload
justin presentation upload PPT june 25 ADVANCED
justin presentation upload PPT june 19
upload ppt by browse button
Paper Ps
Paper CS
Ad

Viewers also liked (18)

PPT
Addmi 17-snapshot
PPT
Addmi 08-dashboards
PPT
Addmi 18-appliance baseline
PPT
58466507 event-management-best-practices-1-488
PPTX
Knowledge Management in BMC Remedy 9.1
PPTX
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
PDF
Power of the Platform: Andy Walker, BMC Software
PDF
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
PPT
Addmi 04-va installation
PPT
Addmi 09.5-analysis ui-host-grouping
PPT
Addmi 07-taxonomy
PPT
Addmi 06-security mgmt
PPT
Addmi 02-addm overview
PPT
Addmi 12-basic scan
PPT
Addmi 14-discovery credentials
PDF
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
PPT
Addmi 10-query builder
PPTX
Sanofi’s Journey to Service Resolution
Addmi 17-snapshot
Addmi 08-dashboards
Addmi 18-appliance baseline
58466507 event-management-best-practices-1-488
Knowledge Management in BMC Remedy 9.1
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Power of the Platform: Andy Walker, BMC Software
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Addmi 04-va installation
Addmi 09.5-analysis ui-host-grouping
Addmi 07-taxonomy
Addmi 06-security mgmt
Addmi 02-addm overview
Addmi 12-basic scan
Addmi 14-discovery credentials
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
Addmi 10-query builder
Sanofi’s Journey to Service Resolution
Ad

Similar to Addmi 11-intro to-patterns (20)

ODP
PPTX
Generative AI in CSharp with Semantic Kernel.pptx
PPTX
Enterprise DevOps: Scaling Build, Deploy, Test, Release
ODP
Best practice adoption (and lack there of)
PPTX
Living in a MultiOrg World
PPTX
Dev ops developer (session 3)
PDF
Test automation
PDF
Tuning the Untunable - Insights on Deep Learning Optimization
PPTX
#DOAW16 - DevOps@work Roma 2016 - Testing your databases
PPTX
A Sampling of Tools
PPS
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
PDF
Managing the Machine Learning Lifecycle with MLflow
PPTX
Testing frameworks
PPT
Getting Unstuck: Working with Legacy Code and Data
PPTX
Reverse Engineering: Protecting and Breaking the Software
PPSX
PPT
CASE tools and their effects on software quality
PDF
Different Methodologies For Testing Web Application Testing
PDF
OutSystems User Group November 2024
PPT
SA Chapter 13
Generative AI in CSharp with Semantic Kernel.pptx
Enterprise DevOps: Scaling Build, Deploy, Test, Release
Best practice adoption (and lack there of)
Living in a MultiOrg World
Dev ops developer (session 3)
Test automation
Tuning the Untunable - Insights on Deep Learning Optimization
#DOAW16 - DevOps@work Roma 2016 - Testing your databases
A Sampling of Tools
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Managing the Machine Learning Lifecycle with MLflow
Testing frameworks
Getting Unstuck: Working with Legacy Code and Data
Reverse Engineering: Protecting and Breaking the Software
CASE tools and their effects on software quality
Different Methodologies For Testing Web Application Testing
OutSystems User Group November 2024
SA Chapter 13

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Addmi 11-intro to-patterns

  • 1. Introduction to Patterns How the Intelligence Works
  • 2. Outline Pattern Basics What is a pattern? Where do I get new patterns? Pattern Controls Demystifying Patterns Pattern components Patterns and the Model Patterns and Provenance Simple Pattern Configuration
  • 4. What Is a Pattern? A way to customise Atrium Discovery so it can infer things in the datastore based upon data collected Patterns are event driven Written in The Pattern Language (TPL) Common software types can recognised by built-in TKU (updated monthly) Some organisations need their own custom written patterns Extend discovery information collected Uncommon or custom software components Business Applications which are specific to the organization
  • 5. What Can Patterns Do? Triggered during the discovery process A certain OS version is found A certain process is running Can take the initial information collected and use it to collect new data Pattern matching details within the process arguments May go back to the host and run other commands Collect configuration files Collect inventory information from databases Use very specific commands to discover version Pattern management under the discovery tab Discovery -> Pattern Management
  • 6. Where Do I Get New Patterns? The Knowledge Update (TKU) service Regular releases of a TKU A TKU can contain New Patterns Updates to existing Patterns Updates to End of Life Data Updates to Hardware Reference Data Updated every month, with new/updated patterns TKU-CORE-2009-06-1.zip Core patterns for detecting Software Instances TKU-DBDETAILS-2009-06-1.zip Deep database discovery TKU-SUPPORTDETAILS-2009-06-1.zip Last dates for software support
  • 7. Upload and Activate Patterns Upload a single pattern TPL files (.tpl) Forms a single Pattern Package Upload batches of patterns In zip files The zip file is the Pattern Package
  • 8. Controlling Patterns Patterns are grouped into packages, which are grouped into modules Activate or deactivate patterns to change the behavior of discovery
  • 9. Deactivate and Delete If a package or pattern is deactivated, it does not execute during Discovery Can reactivate to include in the next discovery run Deleting a pattern or package of patterns: all data which was inferred based upon patterns in that package is also deleted
  • 11. Example Pattern Each pattern must have a trigger If matched successfully this become the Primary Inference for the SI or BAI Triggers are matched at the point of discovery Triggered on DDD node Finds a host node in the datastore Infers a Software Instance node
  • 12. Triggers Every pattern has a trigger Contained within the “triggers” declaration When a pattern “fires” the trigger declaration has been met Example: the host has a certain process running Example: An SI has been created or modified
  • 14. Data Model Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
  • 15. Data Model – Provenance Provenance is the source of all inferred information and is automatically tracked Stored with Inference relationships Referred to by the role of the evidence node The three core roles: Primary Contributor Associate Superseded relationships – marked destroyed
  • 16. Data Model – Maintainer and Request Maintainer and Request inference relationships are a specific type of provenance Every node created or update by a pattern is linked back to the pattern that is responsible for it’s maintenance: Every pattern based discovery request, successful or not, is linked back to the pattern that requested it Business Application Pattern Maintainer Discovery Result Pattern Request
  • 17. Data Model – Current Live Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
  • 18. Data Model – Old Superseded Provenance Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
  • 19. Data Model – Maintainer Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Discovery Result Discovery Run Discovery Access Discovery Result Discovery Result Discovery Result Discovery Access Discovery Result Discovery Result Host Host Host Software Instance Software Instance Software Instance Software Instance Software Instance Business Application Business Application Pattern
  • 21. Host Provenance Example Use the “Show Provenance” button to show Provenance is defined as: The records or documents authenticating such an object or the history of its ownership.
  • 22. SI Version Provenance How we know the full version of java? Click through the provenance link to the DiscoveredCommandResult node
  • 23. SI Version Provenance Results Answer: The java version was determined as the result of running the java command with the “-fullversion” flag
  • 26. Why Have Configurations? Allows changes to behaviour using the UI Without pattern editing, or reactivation Typical uses Turn pattern options on/off Update paths to find files or commands Any other parameters
  • 27. Where Does it Appear? (1) If configuration blocks are defined in the pattern
  • 28. Where Does It Appear? (2) On the “All pattern module configurations” page Discovery > Pattern Management > View Configuration of all Patterns
  • 29. How Changes Are Applied User must have correct permission to edit: reasoning/pattern/config Otherwise can view readonly Changes take place immediately Be careful if discovery is running Warning shown if this is the case
  • 30. Online Documentation: http://www.tideway.com/confluence/display/81/Pattern+Management http://www.tideway.com/confluence/display/Configipedia/Schedule+and+Roadmap Further Resources

Editor's Notes

  • #8: There must be no structure in the ZIP file!