Oracle® Enterprise Manager Ops Center

Discovering and Managing Operating Systems Guide

12c Release 1 (


June 2012

This guide provides an end-to-end example for how to use Oracle Enterprise Manager Ops Center.


Oracle Enterprise Manager Ops Center provides comprehensive lifecycle management for Oracle Solaris, Oracle Linux, SUSE Linux, Red Hat Linux, and Microsoft Windows operating systems in your data center.

The discovery feature makes adding operating systems and other assets quick and easy. You can discover operating systems using a discovery profile, which specifies the discovery targets and the protocols and credentials for accessing and managing them. You can also run a discovery to find all assets equipped with Service Tags, and then supply credentials to manage them. Operating systems and virtualization software can be managed using an Agent Controller installed on the system or using agentless management using a set of credentials.

Two management modes are available, agent managed and agentlessly managed. An agent-managed operating system has an Agent Controller installed to gather information for the Enterprise Controller and is required for some OS-specific features such as software patching or update and virtualization management. When you do not want an Agent Controller installed, you can agentlessly manage your operating systems. To gather information on an agentlessly-managed operating system, the Proxy Controller uses SSH to perform certain tasks and periodically check on the operating system.

When you discover a system with Oracle Solaris 11 OS, the zone features are identified in the system. When you discover a global zone, all of its local zones are discovered as well.

In this document, you learn how an Oracle Solaris 11 OS is discovered using a discovery profile and managed with an Agent Controller. The Enterprise Controller must be on Oracle Solaris 11 in order to perform management functions.

See Related Articles and Resources for links to related information and articles about discovering and managing other assets.

What You Will Need

You will need the following:

  • A configured Enterprise Controller

  • An Oracle Solaris 11 Operating System and the credentials to access it

  • Access to Oracle Enterprise Manager Ops Center using Ops Center Admin role (to create assets) and Ops Center Security Admin role (to create credentials)

  • IP address of the Service Processor

  • Host name or IP address of the Oracle Solaris 11 Operating System

Discover the Operating System Using a Discovery Profile

A discovery profile is a combination of an asset type, a set of host names or IP addresses, and a set of credentials. You can use discovery profiles to locate specific systems and to specify how the discovered assets should be managed – with or without an Agent Controller.

The tasks that are covered in this section are as follows:

Create Credentials

Assets are managed using a set of credentials. You can create or use existing credentials to discover and connect with assets.

When creating a credential, if your target OS supports root login, enter a root user (or other privileged user) and leave the Privileged Role field blank. If the target OS does not support root login, then enter a non-root user that can login to the OS and also specify a root/privileged user in the Privileged Role field.

Description of create_credentials.gif follows
Description of the illustration create_credentials.gif

  1. In the Name field, enter a name for the credential.

  2. In the Description field, enter a description.

  3. In the Login User field, enter a user name to login.

  4. In the Password field, type a password. Retype the same password in the Confirm Password field.


    If a non-privileged user logs in, Oracle Enterprise Manager Ops Center runs the "su" command to elevate the user to a root/privileged user.
  5. Enter the SSH port number. The SSH port number is populated by default.

  6. Click Create. The user credential is created.

Create a Discovery Profile

You can create a discovery profile and then run a discovery using the profile. You can provide some discovery information, such as the targeted IP addresses and the discovery credentials during profile creation or when the profile is run.

A Tag is a set of information attached to an asset. Each tag consists of a tag name, which is drawn from a list of values appropriate for each asset, and a tag value, which can be any text string. You can also create your own tag name. For example, an asset could have a tag with a tag name of and a value of 12 June. Tags can be used to associate information with assets, and to group assets based on tags or tag values. You can add tags to assets during or after discovery.

  1. Click Plan Management in the Navigation pane.

  2. Under Profiles and Policies, click Discovery.

  3. Click Create Profile in the Actions pane.

  4. Enter a name and description for the discovery profile.

    Description of identity_profile.gif follows
    Description of the illustration identity_profile.gif

  5. In the Asset Type, under Operating Systems, select Solaris, Linux OS. Click Next.

  6. Click the Add icon (highlighted in red in the following figure) to add tags to the discovered operating system. Select a tag name and enter a value for the tag. Click Next.

    Description of tags.gif follows
    Description of the illustration tags.gif

  7. Enter the IP Ranges. Click the Add icon (highlighted in red in the following figure) to add IP Ranges.

    Description of ip_wiz.gif follows
    Description of the illustration ip_wiz.gif

  8. Enter values in the respective fields and click Add, then click Next.

    Description of ip_ranges.gif follows
    Description of the illustration ip_ranges.gif

    • Name - A name for the IP range.

    • Description - A description for the IP range, so that it can be identified and reused.

    • Network - The managed network with which the host names or IP addresses are associated. This is used to route the discovery to the correct Proxy Controller. When a Proxy Controller cannot reach the assets' network, the discovery will fail. Select Automatic to route the job to the most appropriate Proxy Controller.

    • IP Ranges - The IP range to be targeted.

  9. In the Discovery Credentials wizard, click Select to choose an SSH protocol. Under Management, select Deploy Agent Controller option, then click Next.

    Description of discovery_credintials.gif follows
    Description of the illustration discovery_credintials.gif

  10. Review the summary information, then click Finish to create a Discovery Profile.

Add the Operating System Using the Discovery Profile

After you have created a discovery profile, you can run it to discover and manage assets.

This procedure assumes that you have already created a discovery profile with an IP range, a specified network, and discovery and management information.

  1. Click All Assets in the Assets section of the Navigation pane.

  2. Click Add Assets in the Actions pane.

  3. Select Add and Manage Various Types of Assets via Discovery Probes, then click Next.

    Description of add_assets.gif follows
    Description of the illustration add_assets.gif

  4. Select the newly-created discovery profile.

    Description of sel_disc_profile.gif follows
    Description of the illustration sel_disc_profile.gif

  5. An IP address or host name is required to discover the asset. To route the discovery to the appropriate Proxy Controller, associate the targets with a managed network or use automatic routing.

    • Discovery - Click Select to select the existing set of credentials.

    • Management - Select Deploy Agent Controller to automatically install Agent Controllers on the discovered operating system.

    Description of host_names.gif follows
    Description of the illustration host_names.gif

  6. Click Add Now to launch the discovery. The discovery job is launched.

What Next?

When the discovery job completes successfully, your OS is visible in the All Assets section of the user interface as shown in the following figure. You can begin using the monitoring, analytics, OS provisioning, and update features to gather information and perform tasks.

Description of os.gif follows
Description of the illustration os.gif

Related Articles and Resources

The following chapters in the Oracle Enterprise Manager Ops Center Features Guide contain more information:

Documentation Accessibility

For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit or visit if you are hearing impaired.

Oracle Enterprise Manager Ops Center Discovering and Managing Operating Systems Guide, 12c Release 1 (


Copyright © 2007, 2012, Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:

U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.