Add mulitple sources and discover hosts running on your entire network, or cloud infrastructure. To gain insights into discovered hosts, add host credentials.

Important: Source authentication credentials are encrypted and stored securely in the vault.
CAUTION: Adding duplicate authentication credentials per source results in duplicated host instances being discovered. This significantly increases the amount of discovered units, and could result in exceeding your licensed limit of discovered units.
  1. On the menu bar, select Menu > Add sources, and then click a source:
    • Amazon Web Services

    • Google Cloud Platform

    • Microsoft Azure

    • OpenStack

    • VMware vSphere

    • IP addresses

  2. Enter your authentication credentials for the source (see below for details).
  3. Click Discover.

    The Add your source page appears, and your source is listed in the Your Sources cart.

    Tip: Before you continue to view the dashboard, additional sources can be added.

The Discovery dashboard appears.

Amazon Web Services

Add the Amazon Web Services authentication credentials to discover the host instances running on each of your AWS accounts.

ParameterDescription
NameA unique and descriptive name to identify this source.
Access keyThe access key ID that you generated in the AWS Management Console.
Important: The access key ID and the secret access key ID are located in the .csv file you saved when generating the credentials in the AWS Management Console.
Secret keyThe secret access key that corresponds to your access key ID.
Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see Amazon Web Services.

Google Cloud Platform

Add the Google Cloud Platform authentication credentials to discover the host instances running on each of your accounts. The client email, the private key, the private key ID, and the project ID values are located in the service account key file (.json) you saved after generating your GCP credentials in the GCP console.

ParameterDescription
NameA unique and descriptive name to identify this source.
Client emailThe service account email associated with your GCP account. For more information, see managing service accounts.
Private keyThe private key you generated in the GCP console. For more information, see managing account keys.
Private key IDThe private ID that corresponds to your private key.
Project IDThe GCP project that corresponds to your service account.
Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see Google Cloud Platform.

Microsoft Azure

Add the Microsoft Azure authentication credentials to discover the host instances on each of your Microsoft Azure accounts. Make sure to log into the Azure portal and register your application. Name it PuppetDiscovery and select the Web app / API application type. You must also assign the Reader permission to the application.

ParameterDescription
NameA unique and descriptive name to identify this source.
Subscription IDThe subscription ID that identifies your Azure services subscription.
Tip: To retrieve your Azure subscription ID, open a terminal with access to your Azure account and run the az account show command.
Tenant IDThe AAD tenant ID (also known as the directory ID). For more information, see tenant ID.
Tip: To retrieve your Azure tenant ID, open a terminal with access to your Azure account and run az account show command.
Application IDThe Azure application ID (also known as the client ID). For more information, see application ID and authentication key.
Important: To retrieve your application ID, log into the Azure portal. On the App registrations page, search for PuppetDiscovery, and then select the application to view it's properties.
Client keyThe client key (also known as the authentication key) generated for your application within the AAD. For more information, see application ID and authentication key.
Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see Microsoft Azure.

OpenStack

Add the OpenStack authentication credentials to discover the host instances running on each of your OpenStack accounts.

ParameterDescription
NameA unique and descriptive name to identify this source.
EndpointThe authentication URL for the identity (Keystone) service
UsernameYour OpenStack username to authenticate with.
PasswordYour OpenStack password to authenticate with.
Domain nameThe authentication domain name used to connect to OpenStack.
Tenant IDThe tenant ID, also known as the project ID, used for OpenStack.
Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see OpenStack.

VMware vSphere

Add the VMware vSphere authentication credentials to discover the host instances running on each of your vSphere accounts.

ParameterDescription
NameA unique and descriptive name to identify this source.
vCenter serverThe FQDN of the vCenter server.
vSphere usernameThe vSphere username used to authenticate to the vCenter server.
vSphere passwordThe vSphere password required to authenticate to the vCenter server.
Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see VMware vSphere.

Network hosts

Discover network hosts by specifying an IP address range, a CIDR block, or by uploading a comma-separated IP address list. The maximum number of discovered IP addresses is 65,536 for the specified IP range, and 65,536 for the CIDR.

ParameterDescription
NameA unique and descriptive name to identify this source.
TypeThe IP address input type:
  • IP range: Using the From and To fields, enter the IP address range.

  • CIDR: Enter the base IP address and the subnet mask to determine the network portion of the address.

  • CSV: Upload a comma-separated list of:
    • IP addresses.

    • Hyphen-separated IP ranges.

    • CIDR notations.

Important: To discover resources running on each host, add SSH and WinRM credentials. For information on what data can be discovered, see network hosts.
Back to top