Application Dependency

Important:The product name for this user guide has changed from Foundation and Cloudscape to Business Service Discovery and Migration Planning. Previous UI pages known as Foundation have changed to Business Service Discovery. Previous UI pages known as CloudScape have changed to Migration Planning.

On the Application Dependency page, you can view and export your environment’s application dependency (connectivity) data. You can view and interact with connectivity on a stack level, up to 100,000 rows, and you can download the entire connectivity data set, either as a monolith or per-stack. In the Firewall Rules tab, you can explore listening ports within an application stack as well as details about the activity on those ports.

Note:This page shares some functionality with the Detailed Application Dependency Data (DADD) report, which can be found under the Additional Reports page. The DADD report will be retired in 2023.

The Application Dependency page’s features are described in the following sections:

Bulk Actions
Results by Application Stack
Firewall Rules
Dependency Collection and Classification

Bulk Actions

You may generate and download both the All Stacks Export connectivity report and the Whole Environment Export. Use the generate options before attempting to download the reports, and re-generate in order to include newer data if it has been some time since the reports were last generated.

Note:For larger assessments, it may take hours to generate an entire data set.

All Stacks Export

The All Stacks export is a zipped directory containing one .csv file per application stack. All observed connections into, out of, and within an application stack are included in each stack’s file.

Whole Environment Export

The Whole Environment export consists of a single .csv containing the entirety of the connectivity data collected for the assessment, as well as a .csv containing the backing data for the firewall report.

Results by Application Stack

You can view and interact with the connectivity to/from an individual application stack, up to a limit of 100,000 rows. The filter controls can be used to further narrow down the subset of connectivity records displayed. After changing filter or application stack selections, click refresh data to fetch the new dataset. For further discussion of how this data is collected and classified, see Dependency Collection and Classification.

Filtering

Data filtering can be applied based on location, protocol, criticality (see Criticality Criteria), and stack/device tags. Filter controls are collapsed by default. Further sorting/filtering of the result set is available in the table, but note that table filtering may be unreliable for very large (>100,000) result sets.

Tip:A list of all protocols present in your environment can be found in the Protocol Report, on the Additional Reports page.

Firewall Rules

The firewall report displays information about ports that were observed in the LISTENING state during netstat collection. Individual records may be expanded to display details about the application as well as data about its observed dependencies.

Dependency Collection and Classification

For details on how we collect netstat data, view the Netstat and Linux/UNIX collection (see SSH Collection Module Command Reference) documentation.

Netstat data is processed and translated into network graph data. Edges (connections between servers) are enriched with data about the process and application which own each side of the connection, where available.

Criticality Criteria

Each distinct connection record is flagged as either “critical” or “non-critical” using the criteria in the following table. Criticality is mostly used in the automatic dependency-based generation of business services, but it is also visible on this page as well in other parts of the platform. Non-critical connectivity is generally traffic relating to network maintenance, monitoring, software updates, and other functionality that is not specific to an application’s business purpose, and which may generally be ignored in many contexts. We maintain a library of such criteria, and we welcome suggested inputs/improvements to this list via the Flexera Community Ideas Board. You need a Flexera Community sign in and password to access the Ideas Board.

Connections are considered critical unless we positively identify them otherwise using the following criteria:

Criticality Criteria

Condition

Non-Critical Traffic Type

Unknown application context for flows between Windows devices

Windows registry data is sufficiently reliable that unknown context can be disregarded

App context matches “Windows System”

Windows system traffic

Process name or app context matches “backup”

Network backup processes

Process name matches “healthservice.exe”

Microsoft System Center Operations Manager

App context matches Exchange Server

Microsoft Exchange Server

App context is “Microsoft System Center Configuration Manager” or “System Center Configuration Manager”

Microsoft System Center Configuration Manager

App context is “Private Branch Exchange”

VOIP traffic

App context is “Citrix”

Citrix

Process name is “ovbbccb.exe”

HP OpenView Communication Broker

Protocol name is “hp-alarm-mgr”

HP Data Alarm Manager

Protocol name is “tcp-10123”

SCCM Client->Server Notification

Protocol name is “tcp-2512”

Citrix port

Protocol name is “smtp”

Mail Service

Protocol name is “IBM Lotus Notes RPC”

IBM Lotus Notes

Protocol name is “Symantec NetBackup”

Symantec NetBackup

Process name is “Ssms.exe”

Microsoft SQL Management Studio

Process name matches “SSH”

Secure Shell network management

Protocol name is “ldap”

LDAP is normally a shared service

Process name matches “rsyslogd”

SYSLOG

Protocol name is “XMPP”

XMPP messaging

Process name matches “AeXNSAgent.exe”

Altiris Agent for Symantec

Process name matches “klnagent.exe”

Kaspersky Agent

App context matches “splunk”

Splunk

App context matches “taniumclient”

Tanium (peer-to-peer)

App context matches “kaseya”

Kaseya Monitoring and Endpoint Management