Sensors

TADDM provides a variety of specialized sensors for discovery of almost all components in the typical data center, across the application software, host, and network tiers. You can also develop custom sensors for unique components. Sensors reside on the TADDM server and collect configuration attributes and dependencies.

Sensors are nonintrusive, meaning that they run on the TADDM server rather than on the client workstation. Therefore, by using TADDM, you can gather discovery-related information without incurring the costs of local installation and maintenance of an agent on each client workstation that you want to discover.

Because sensors use secure network connections, encrypted access credentials, and host-native utilities, they are secure, and they provide the same level of data acquisition that you have when you use software that is located on the client workstation.

A sensor has the following three configurable aspects:
Scope
The discovery scope is typically a valid IP range, a subnet, or a specific address. It sets the boundary for the discovery.
Access list
The access list is a collection of the credentials, such as the user names, passwords, and Simple Network Management Protocol (SNMP) community strings, that the sensor uses when accessing the configuration items in the application infrastructure. You must configure the access list for the configuration items that you want to discover.
Schedule
Discovery can be run on demand, run on a schedule, or driven by externally triggered events. The schedule identifies whether sensors are run on demand or on a schedule.