Skip to main content

Discovery Overview

Tripl-i Discovery automatically finds and maps your entire IT infrastructure, creating a real-time, accurate view of all hardware, software, and their relationships. Using multiple discovery methods and AI-powered analysis, it eliminates manual inventory processes and ensures your CMDB stays current.

What is Discovery?

Discovery is the automated process of:

  • Finding devices and applications on your network
  • Collecting detailed configuration and state information
  • Mapping relationships and dependencies
  • Analyzing patterns and anomalies with AI
  • Updating the CMDB with current data

Discovery Architecture

Discovery Methods

Agent-Based Discovery

Advantages:

  • Deep system information
  • Real-time updates
  • Behind firewall access
  • Minimal network impact

Supported Platforms:

  • Windows (PowerShell agent)
  • Linux (Python agent)
  • Unix (Shell agent)
  • Container environments

Agentless Discovery

Network Scanning:

  • SNMP v1/v2c/v3
  • WMI (Windows)
  • SSH (Linux/Unix)
  • ICMP ping sweep

API-Based:

  • VMware vSphere
  • AWS EC2
  • Azure Resource Manager
  • Google Cloud Platform
  • Kubernetes API

Hybrid Discovery

Combines agent and agentless methods for:

  • Complete coverage
  • Minimal blind spots
  • Optimized performance
  • Flexible deployment

Discovery Process

1. Initial discovery

Discovery proceeds in three phases:

Phase 1 -- Network Sweep

  • IP range scanning
  • Port identification
  • Basic device classification
  • Initial inventory

Phase 2 -- Deep Discovery

  • Credential-based access
  • Detailed configuration collection
  • Software inventory
  • Process analysis

Phase 3 -- Relationship Mapping

  • Network connections
  • Application dependencies
  • Service mapping
  • Data flow analysis

2. Continuous discovery

After the initial scan, agents report changes on a recurring basis. The Discovery Engine forwards those changes to the AI Engine for classification and then updates the CMDB -- keeping your configuration data fresh without any manual effort.

AI-Powered Discovery Features

Intelligent device classification

When a new device is discovered, the AI Engine automatically classifies it based on the information collected during scanning. For example, a device with open web and database ports and an Apache banner may be classified as follows:

AttributeValue
TypeWeb Server
Operating SystemUbuntu Linux
RoleApplication Server
Detected ServicesApache Web Server, MySQL Database
Confidence94%

This automatic classification removes the need for manual categorization and ensures every asset in the CMDB has accurate metadata from the moment it is discovered.

Pattern recognition

  • Identifies standard deployment patterns
  • Detects application stacks
  • Recognizes clustering configurations
  • Maps load-balanced services

Anomaly detection

Tripl-i flags unexpected discoveries so you can investigate quickly. A typical anomaly alert includes:

DetailExample
TypeNew Device
IP Address10.1.5.200
ClassificationUnknown Web Server
Risk LevelMedium
RecommendationsVerify authorization, check security compliance, update firewall rules

Discovery Credentials

Credential management

Tripl-i stores discovery credentials in a secure vault. You can configure different credential types scoped to specific parts of your network:

Credential TypeScope ExamplePrivileges
Active Directory*.corp.localRead-only
SSH KeyProduction SubnetLimited sudo for discovery commands
SNMP v3Network InfrastructureauthPriv security level

Security best practices

  • Use read-only credentials wherever possible
  • Implement credential rotation on a regular schedule
  • Limit the scope of each credential to the minimum required IP range
  • Monitor credential usage for unauthorized access
  • Encrypt credentials at rest

Discovery Scheduling

Schedule types

Full Discovery

  • Complete infrastructure scan
  • All attributes collected
  • Relationship rebuild
  • Recommended schedule: Weekly

Incremental Discovery

  • Changes only
  • New and modified devices
  • Quick updates
  • Recommended schedule: Every 4 hours

Real-time Discovery

  • Agent-based changes
  • Immediate updates
  • Critical systems only
  • Runs continuously

Smart scheduling

Smart Scheduling lets you assign the right discovery method and frequency for each asset category. The table below shows a typical configuration:

Asset CategoryDiscovery MethodFrequency
Production ServersAgentReal-time
Development ServersAgentlessDaily
Network DevicesSNMPEvery 4 hours
WorkstationsAgentOn login

Tailoring the schedule by asset category ensures critical infrastructure is always up to date while minimizing load on less critical systems.

CI Matching and Reconciliation

Overview

The CI matching and reconciliation mechanism prevents duplicate Configuration Items during discovery. It uses a hierarchical lookup strategy to find existing CIs before creating new ones, ensuring data integrity and avoiding duplication.

Matching hierarchy

The system uses a priority-based matching approach to identify existing CIs. Identifiers are checked in the following order, from highest to lowest confidence:

PriorityIdentifierConfidenceNotes
1Serial Number + MAC AddressHighestUnique hardware combination
2Serial Number onlyHighUsually unique per device
3MAC Address onlyMediumCan change if NIC is replaced
4HostnameLowCan be duplicated across environments
5IP AddressLowestDynamic and reusable

Tenant isolation

All CI lookups include tenant filtering to ensure proper data isolation. This means that two different tenants can each have devices with the same IP address or hostname without causing conflicts. Tenant filtering is enforced at every step of the matching process.

Matching algorithm

How matching works in practice

Hardware identifier priority. When hardware identifiers (serial number or MAC address) are available, the system skips IP-based matching entirely. This prevents overwriting a different physical device that happens to share the same IP address.

Conflict detection. If a lookup finds an existing CI at the same IP address but with different hardware identifiers (different serial number or MAC address), the system recognizes this as a different physical device and creates a new CI rather than overwriting the existing one.

Virtual machine handling. Virtual machines require special handling because cloned VMs may share serial numbers and MAC addresses can be regenerated. The system detects VM-specific serial number formats (such as those starting with "VMware-") and shifts to MAC address or VM UUID as the primary identifier.

Common matching scenarios

Scenario 1: Hardware Refresh A new physical device replaces an old one and is assigned the same IP address. Because the serial number and MAC address are different, the system creates a new CI. The old CI remains in the CMDB as a historical record.

Scenario 2: Network Change A server is moved to a different subnet and receives a new IP address. Because the serial number and MAC address have not changed, the system updates the existing CI with the new IP information.

Scenario 3: NIC Replacement A network interface card is replaced, changing the MAC address. Because the serial number still matches, the system updates the existing CI with the new MAC address.

Duplicate prevention

Duplicates can occur in the following situations:

  1. Missing tenant filter -- Lookups that do not include the tenant field may match CIs belonging to another organization
  2. Timing issues -- Concurrent scans of the same device before the first scan completes
  3. Identifier changes -- Hardware changes between consecutive scans
  4. Data quality -- Missing or invalid identifiers in scan data

Prevention strategies:

  • Tenant filtering is enforced on every CI lookup
  • Atomic operations ensure that concurrent scans do not create duplicates
  • Retry logic handles transient conflicts gracefully

Troubleshooting duplicates

If you suspect duplicate CIs exist in your CMDB, follow these steps:

  1. Identify -- Use the CMDB search to look for devices with the same serial number, MAC address, or hostname
  2. Compare -- Check the "Last Scanned" timestamp on each CI to determine which record is most recent
  3. Merge -- Transfer any unique custom fields and relationships from the older CI to the newer one
  4. Update references -- Ensure that any related CIs, events, or reports point to the correct (surviving) CI
  5. Delete -- Remove the older duplicate CI
  6. Verify -- Confirm that no orphaned relationships remain

Best practices for CI matching

  1. Always include tenant context -- Every CI lookup must respect tenant boundaries
  2. Prioritize hardware identifiers -- Serial numbers and MAC addresses are more reliable than IP addresses
  3. Handle conflicts proactively -- Log and investigate identifier mismatches rather than ignoring them
  4. Monitor for duplicates -- Run regular audits to catch duplicates early
  5. Test edge cases -- Verify matching logic with scenarios like VM cloning, NIC replacement, and IP reuse

Discovery Data Processing

Data flow pipeline

Data quality controls

Validation Rules:

  • Required field checks
  • Format validation
  • Range verification
  • Consistency checks

Deduplication Logic:

  • Serial number matching
  • MAC address correlation
  • Hostname resolution
  • UUID comparison

Performance and Scalability

Discovery metrics

MetricTarget
Devices per Hour10,000
Concurrent Scans500
Data Processing1M attributes/min
CMDB Updates50,000/min

Scaling strategies

Horizontal Scaling:

  • Multiple discovery engines
  • Distributed processing
  • Load balancing
  • Regional collectors

Optimization Techniques:

  • Parallel scanning
  • Batch processing
  • Caching mechanisms
  • Smart scheduling

Discovery Reporting

Discovery dashboard

The Discovery Dashboard gives you a real-time summary of your discovery activity, including:

MetricDescription
Total DevicesTotal number of discovered assets in your CMDB
Discovered TodayNew or updated devices found in the current day
Failed DiscoveriesDevices that could not be scanned (with reasons)
Success RatePercentage of successful scans
Coverage by CategoryBreakdown of coverage for servers, workstations, network devices, and cloud resources

Key reports

  1. Discovery Coverage

    • Discovered versus expected device counts
    • Blind spots analysis
    • Credential failures
    • Network unreachable summaries
  2. Discovery Performance

    • Scan duration trends
    • Success and failure rates
    • Resource utilization
    • Queue statistics
  3. New Device Report

    • Newly discovered items
    • Unauthorized devices
    • Shadow IT detection
    • Compliance gaps

Troubleshooting

Duplicate CIs created

DetailInformation
SymptomMultiple CIs appear for the same physical device
Common CausesMissing tenant filter in lookups, concurrent scan processing, changed hardware identifiers, IP address reuse
ResolutionRun a duplicate detection search, merge duplicate CIs carefully, verify tenant filtering
PreventionAlways include tenant in queries, use hardware IDs for matching, monitor for duplicates regularly

Discovery failures

DetailInformation
SymptomExpected devices are not discovered
Common CausesNetwork connectivity issues, firewall blocking required ports, invalid credentials, discovery service disabled on target
ResolutionVerify port access from the discovery engine, check and rotate credentials, review firewall logs, enable required services on targets

Performance issues

DetailInformation
SymptomDiscovery scans run slowly or time out
Common CausesNetwork congestion, overloaded target devices, excessively large scan ranges, insufficient discovery engine resources
ResolutionAdjust scheduling to off-peak hours, limit concurrent scan count, increase engine resources, break large ranges into smaller segments

CI matching failures

DetailInformation
SymptomExisting CIs are not updated; new CIs are created instead
Common CausesMissing serial numbers in scan data, changed MAC addresses, dynamic IP assignment, tenant mismatch
ResolutionVerify that hardware identifiers are present in scan results, check tenant assignment, review the matching hierarchy, investigate identifier changes

Best Practices

1. Planning

  • Map your network topology before starting discovery
  • Identify critical systems that need real-time monitoring
  • Plan discovery in phases -- start small and expand
  • Set realistic schedules based on network size and complexity

2. Implementation

  • Begin with a small pilot covering one subnet or department
  • Validate discovered data against known inventories
  • Tune discovery patterns based on initial results
  • Monitor performance and adjust concurrency limits

3. Optimization

  • Review schedules regularly and adjust as your environment changes
  • Maintain credentials and rotate them on a defined cadence
  • Tune scan parameters for optimal performance
  • Analyze coverage reports to identify and close gaps

4. Governance

  • Establish a discovery approval process for new scan ranges
  • Set up change notifications so stakeholders are informed of new discoveries
  • Validate compliance requirements are met by discovered data
  • Conduct regular audits of CMDB accuracy against discovery results

Next Steps