Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Troubleshooting Red Hat Discovery
Chapter 1. About Red Hat Discovery Link kopierenLink in die Zwischenablage kopiert!
Red Hat Discovery is designed to help users collect data about their usage of specific Red Hat software. By using Discovery, users can reduce the amount of time and effort that is required to calculate and report usage of those Red Hat products.
Learn more
To learn more about the purpose, benefits, and characteristics of Discovery, see the following information:
To learn more about the products and product versions that Discovery can find and inspect, see the following information:
To evaluate whether Discovery is a correct solution for you, see the following information:
1.1. What is Red Hat Discovery? Link kopierenLink in die Zwischenablage kopiert!
Red Hat Discovery is an inspection and reporting tool. It is designed to find, identify, and report environment data, or facts, such as the number of physical and virtual systems on a network, their operating systems, and other configuration data. In addition, it is designed to find, identify, and report more detailed facts for some versions of key Red Hat packages and products for the IT resources in that network.
The ability to inspect the software and systems that are running on your network improves your ability to understand and report on your subscription usage. Ultimately, this inspection and reporting process is part of the larger system administration task of managing your inventories.
Red Hat Discovery requires the configuration of two basic structures to access IT resources and run the inspection process. A credential contains user access data, such as the username and password or SSH key of a user with sufficient authority to run the inspection process on a particular source or some of the assets on that source. A source contains data about a single asset or multiple assets that are to be inspected. These assets can be physical machines, virtual machines, or containers, identified as hostnames, IP addresses, IP ranges, or subnets. These assets can also be a systems management solution such as vCenter Server or Red Hat Satellite Server, or can be clusters deployed on Red Hat OpenShift Container Platform.
Currently, the only virtualized deployment that discovery can scan with a specialized source for virtualization infrastructure is VMware vCenter. No other virtualization infrastructure that is supported by Red Hat can be scanned with a specialized scan. General scans of your network might still find these assets, without the precise metadata returned by a specialized scan.
You can save multiple credentials and sources to use with Discovery in various combinations as you run inspection processes, or scans. When you have completed a scan, you can access these facts in the output as a collection of formatted data, or report, to review the results.
By default, the credentials and sources that are created during the use of Red Hat Discovery are encrypted in a database. The values are encrypted with AES-256 encryption. They are decrypted when the Red Hat Discovery server runs a scan with the use of a vault password to access the encrypted values that are stored in the database.
Red Hat Discovery is an agentless inspection tool, so there is no need to install the tool on every source that is to be inspected. However, the system that Discovery is installed on must have access to the systems to be discovered and inspected.
1.2. What products does Red Hat Discovery find? Link kopierenLink in die Zwischenablage kopiert!
Red Hat Discovery finds the following Red Hat products. For each version or release, the earliest version is listed, with later releases indicated as applicable.
If a product has changed names recently so that you might be more familiar with the current name for that product, that name is provided as additional information. No later version is implied by the inclusion of a newer product name unless specific versions of that product are also listed.
Red Hat Enterprise Linux
- Red Hat Enterprise Linux version 5 and later
- Red Hat Enterprise Linux version 6 and later
- Red Hat Enterprise Linux version 7 and later
- Red Hat Enterprise Linux version 8 and later
- Red Hat Enterprise Linux version 9 and later
- Red Hat Enterprise Linux version 10 and later
Red Hat Application Services products (formerly Red Hat Middleware)
- JBoss Enterprise Web Server version 1 and later; Red Hat JBoss Web Server 3.0.1 and later
- Red Hat JBoss Enterprise Application Platform version 4.2 and later, version 4.3 and later, version 5 and later, version 6 and later, version 7 and later
- Red Hat Fuse version 6.0 and later
Red Hat Ansible Automation Platform
- Ansible Automation Platform version 2 and later
Red Hat OpenShift Container Platform
- Red Hat OpenShift Container Platform version 4 and later
Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes version 4 and later
Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes version 2 and later
1.3. Is Red Hat Discovery right for me? Link kopierenLink in die Zwischenablage kopiert!
Red Hat Discovery is intended to help you find and understand your Red Hat product inventory, including unknown product usage across complex networks. The reports generated by Discovery are best understood through your partnership with a Red Hat Solution Architect (SA) or Technical Account Manager (TAM) or through the analysis and assistance supplied by the Subscription Education and Awareness Program (SEAP).
Although you can install and use Discovery independently and then generate and view report data, the Discovery documentation does not provide any information to help you interpret report results. In addition, although Red Hat Support can provide some basic assistance related to installation and usage of Discovery, the support team does not provide any assistance to help you understand the reports.
The Discovery tool does not automatically share data directly with Red Hat. Instead, you choose whether to prepare and send report data to Red Hat for ingestion by Red Hat tools and services. You can use the Discovery tool locally to scan your network for the Red Hat products that Discovery currently supports and then use the generated reports for your own internal purposes.
Chapter 2. Troubleshooting Red Hat Discovery Link kopierenLink in die Zwischenablage kopiert!
2.1. Determining the version of the Red Hat Discovery server Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- You must be logged in to the command line interface as the Discovery server administrator.
Procedure
To determine the version of the Discovery server, use the following steps:
Enter the
dsc server status
command. The expected output provides the version of the server that you are using:"server_address": "127.0.0.1:9443", "server_id": "45a8ea20-2ec4-4113-b459-234fed505b0d", "server_version": "1.0.0.3e15fa8786a974c9eafe6376ff31ae0211972c36"
"server_address": "127.0.0.1:9443", "server_id": "45a8ea20-2ec4-4113-b459-234fed505b0d", "server_version": "1.0.0.3e15fa8786a974c9eafe6376ff31ae0211972c36"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you cannot get the server status command to run, or you cannot log in to the server, use the following Podman images command:
podman images --filter 'reference=registry.redhat.io/discovery/discovery-server-rhel9' --format '{{.Labels.url}}'
podman images --filter 'reference=registry.redhat.io/discovery/discovery-server-rhel9' --format '{{.Labels.url}}'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.2. Uninstalling Discovery Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- You must be logged in to the system that is running Red Hat Discovery.
-
You will need sudo access to perform certain functions in
dnf
.
Procedure
To uninstall Red Hat Discovery server, use the following steps:
Run the uninstall command.
discovery-installer uninstall
discovery-installer uninstall
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Uninstall the installer package.
sudo dnf remove discovery-installer
sudo dnf remove discovery-installer
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Uninstall the command line interface, if installed.
sudo dnf remove discovery-cli
sudo dnf remove discovery-cli
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.3. Getting help with the command line interface Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- You must be logged in to the command line interface as the Discovery server administrator.
Procedure
- For help on general topics, see the man page information.
For help on a specific subcommand, use the
-h
option. For example:dsc cred -h dsc source -h dsc scan -h
dsc cred -h dsc source -h dsc scan -h
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.4. SSH credential configuration Link kopierenLink in die Zwischenablage kopiert!
If you receive an error message that includes text similar to not a valid file on the filesystem
, that message might indicate an issue with the mount point on the file system that enables access to the SSH keyfiles.
2.5. Log file locations Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- You must be logged in to the system that is running Red Hat Discovery.
-
You will need sudo access to perform certain functions in
dnf
.
Procedure
Log files for the Discovery server that are on the local file system are located in the following path: "{HOME}"/.local/share/discovery/log
.
Log data is also copied to stdout
and can be accessed through Podman logs. To follow the log output, include the -f
option as shown in the following command:
podman logs -f discovery-server podman logs -f discovery-celery-worker
podman logs -f discovery-server
podman logs -f discovery-celery-worker
2.6. Backing up or restoring the server encryption key Link kopierenLink in die Zwischenablage kopiert!
Passwords are not stored as plain text. They are encrypted and decrypted by using the content of the secret.txt
file as a secret key. If you need to back up and restore the secret.txt
file, use these steps.
Prerequisites
- You must be logged in to the system that is running Red Hat Discovery.
-
You will need sudo access to perform certain functions in
dnf
.
Procedure
-
To back up the encrypted SSH credentials, navigate to
"${HOME}"/.local/share/discovery/data
directory and copy thesecret.txt
file. To restore the
secret.txt
file, enter the following command, where path_to_backup is the path where thesecret.txt
file is backed up:cp -p __path_to_backup__/secret.txt "${HOME}"/.local/share/discovery/data/
cp -p __path_to_backup__/secret.txt "${HOME}"/.local/share/discovery/data/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.7. Restarting the Discovery server after a reboot Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- You must be logged in to the system that is running Red Hat Discovery.
-
You will need sudo access to perform certain functions in
dnf
.
If you installed Discovery using the standard process, the system should start automatically after a reboot. If it does not automatically restart, use the following procedure:
Procedure
- To restart the Discovery application after a reboot, use the following command:
systemctl --user restart discovery-app
systemctl --user restart discovery-app
Providing feedback on Red Hat documentation Link kopierenLink in die Zwischenablage kopiert!
We appreciate your feedback on our documentation. To provide feedback, open a Jira issue that describes your concerns. Provide as much detail as possible so that your request can be addressed quickly.
Prerequisites
- You have a Red Hat Customer Portal account. This account enables you to log in to the Red Hat Jira Software instance. If you do not have an account, you will be prompted to create one.
Procedure
To provide your feedback, perform the following steps:
- Click the following link: Create Issue.
- In the Summary text box, enter a brief description of the issue.
- In the Description text box, provide more details about the issue. Include the URL where you found the issue.
- Provide information for any other required fields. Allow all fields that contain default information to remain at the defaults.
- Click Create to create the Jira issue for the documentation team.
A documentation issue will be created and routed to the appropriate documentation team. Thank you for taking the time to provide feedback.