Configuring Full Synchronization

The Discovery probe accumulates domain changes in real time. If the connection between the Discovery probe and a domain is lost for a period of time, the probe has no way to recover those changes. To ensure domain changes are not lost forever, set probe alerts and schedule a recurring full synchronization, for example, once a week. If a probe alert is triggered, consider running a full synchronization immediately. You should also run a full synchronization if the probe was temporarily deactivated and reactivated.

  1. Click the Discovery > Domains > Domain Watch > Schedule and Status tab.
  2. Enable full synchronization on a weekly basis.

Configuring and Generating Azure Credentials

Prerequisites

Before configuration begins, please ensure you have:

  • Active subscription to Azure
  • Azure Active Directory

Installation Steps

  1. Log into Azure and navigate to the Azure Active Directory Page.
  2. Select ‘App registrations’ on the left navigation bar.
  3. Register an entry for VSA and select the option “Accounts in any organization directory (Any Azure AD directory + Multitenant).
  4. NOTE  Name of the newly created entry will be required for later use.

  5. After registration has occurred, the page will display:
    Application (client) ID
    Directory (tenant) ID
  6. NOTE  Both of these ID will be required for later use within VSA.

  7. Navigate to ‘Certificates & secrets’ on the left navigation bar and create a 'New client secret'.
  8. Once the secret is created, it will be displayed within the Client secrets area under the ‘Value’ column. NOTE: The client secret value is irretrievable once lost. Please make sure this value is stored in a secure location as it will be required for later use.
  9. Navigate back Home and into the Subscriptions and select the applicable subscription which contains your Azure Active Directory from the bottom grid. One selected, navigate into ‘Access control (IAM) > ’Add role assignments’ and add a new role assignment using ‘Owner’ as role.
  10. Under the ‘Members’ tab, choose ‘Select members’ and search for the previously created app registration, select it and complete role assignment process.
  11. If the previous steps were completed successfully, you should have:
    Application (client) ID
    Directory (tenant) ID
    Application Secret
  12. Open your VSA instance and navigate to Discovery > Discovery Services > Credentials > Azure and complete an Azure credentials submission.

Congratulations, you’ve completed initial configuration of Azure within VSA. Shorty, your Azure devices will be Discovered and appear in both Discovered Devices and Topology.