Bench 7
Bench 7
Bench 7
For quick overview, please refer to the attached Discovery Process Flow: -
========================================================
Updated 03/11/2020
Collect preliminary data such as Application & its groups, Server, Networking, etc. Compile the
data in Skymap upload .csv template after discovery scan phase
Explain the tentative questionnaire and involvement of App owners during the Data
Enhancement phase of the project.
Inputs
Request for POCs (Point of Contacts) and Contact details of Customer’s Project manager,
Technical Lead, DBA Lead, System Admins, Application infrastructure owners, etc. and
set up Communication channel such as Teams, Chime, slack, etc.
Output
Inputs
Output
RISC tool deployed and configured. Credentials applied. Ready to start the scan.
1. Prerequisites
Review/complete the Deployment Requirements. We are not having access to these
Deployment requirements
In addition to our quick start guide below, find more information on professional services please
contact info@riscnetworks.com
If you do not have a subscription or if you have a subscription and need to purchase node
licenses, please contact your account manager or contact help@riscnetworks.com.
2. Create an Assessment
The first step to using the RISC Networks Platform is to create an assessment. Follow the
instructions below to get started.
3. Enter your subscription code in the field. If you do not have a subscription code, please
reach out to your account manager or to info@riscnetworks.com
4. Fill in the company information fields in the +Add an Assessment window, company
name will be the name of the assessment.
5. To invite other users, click the Invite button. You will be taken to the User Access
screen, where invitations can be sent via email. Users can also be invited later on. Click
Dashboard to return to the main screen.
6. Upon completion, you should see a pane with your new assessment.
2. Click the Download RN150 button in the section titled: Step 1 - Download Virtual
Appliance.
3. While waiting on your download to complete, copy the code provided in the section Step
2 - Bootstrap Virtual Appliance with the Code in the Appliance Status page, and save
it where you can retrieve it at a later time.
5. Follow VMware documented procedures for Deploying OVF Templates in your specific
version of VMware.
o Deploy OVF Template (Using Web Client in vSphere 5.5) vSphere 5.5
6. Once the machine is deployed and powered on, you should see the RISC Networks Logo
and briefly see a white screen before being redirected to a log in screen.
4. RISC Configuration
Log in to the RN150
After powering on the RN150, you can log in and accept the RISC Networks End User License
Agreement. In the top right corner of the page is the IP address of the appliance which can then
be navigated to via a web browser. We recommend accessing the RN150 through your web
browser as copy/paste may not be available through the hypervisor console. Open your browser
of choice and navigate to the IP address. Once the site has loaded, you can close the
hypervisor console. Follow the instructions below to log in.
3. Go to the box on the right to read the eula. Scroll to the botton.
6. Click Login.
Add subnets which the RISC appliance RN150 needs to scan (EQ)
Check the deployment requirements: that the ports and protocols allow the RISC
installation on VMware on the customer's network (EQ)
Install RISC on VMware on the network. In the case of different environments, install
different appliances (EQ and Client)
Inputs:
Output:
Customer’s Obligation:
Dedicate 1 or 2 vCPUs in network for RISC installation, 8GB RAM, 50 GB Hard Drive
(thin Provisioned)
Required internet access, port and protocols for RISC network, WMI, SSH, SNMP
VMware credentials
Give Preliminary list of Assets (hostnames and application) to EQ. This is optional;
however it will be useful to match the RISC output with expectation.
Now it is time to enter the assessment key we copied in "Deploy the RN150" above. Again, we
recommend using the RN150 in a browser window because copy/paste may not be available in a
hypervisor console.
2. You will be prompted to choose whether or not you are using FlexDeploy. If you are
unsure, click no.
3. If you are using Flex Deploy, enter the network address of the FlexDeploy appliance you
have previously set up
Now it is time to enter Subnet information. We can’t go any further without entering at least one
subnet. There are three options for entering subnet information. You can enter a subnet
individually, populate from a routing table, or populate from a .csv file.
1. To enter subnets individually, enter a network address >> select Subnet Mask from the
dropdown >> Click Add
2. To populate from a routing table, click Populate from routing table >> at the prompt,
select the version of SNMP you are using >> enter your credentials
3. To enter subnets using a .csv file, click Populate from CSV >> click Choose File and
browse to your subnets.csv file >> select the file and click Open, and click Upload
1. The file must be under 1MB and formatted as either network address/CIDR
prefix, or network address/CIDR prefix new line. (ex.
63.146.167.192/26,65.125.73.180/30)
4. In the table below, make sure to select all of the subnets you wish to scan.
After you have confirmed that you have selected all subnets for which you want information,
click the Dashboard button.
Be sure to enable netstat application socket collection in order to collect and view workload
dependencies. Refer to the Windows Collection Module for more information.
5. We recommend you select Enable >> confirm your choice >> click Next >> Select
whether you want to enable this feature on workstations.
6. Click Add
7. Click Test to verify your credential. We recommend testing all credentials. This helps
ensure we collect information on all relevant devices and prevents problems later on.
8. After receiving confirmation that your credential is correct, click ok and either add more
credentials, or click the Dashboard button to go back to the main page.
We recommend testing all credentials prior to starting a scan. This ensures information is
collected on all relevant devices the first time, and that the complete set of analytics is available.
3. Confirm you are hitting the right port. The default is port 443.
4. Enter a username and password
5. Click Add
7. After receiving confirmation that your credential is correct, click ok and either add more
credentials, or click the Dashboard button.
3. From the drop-down list entitled Credential Type, select the type of authentication
desired.
2. If Public Key is selected, a text input field will be presented. The full text
contents of the private key associated with the credential should be pasted here.
4. Click Add.
6. After receiving confirmation that your credential is correct, click ok and either add more
credentials, or click the Dashboard button.
Additional Credentials
The RN150 supports additional credentials under the sections Cisco CallManager, Cisco
Discovery Services, and Additional Credentials. The Additional Credentials sections can
contain Database Credentials if that is enabled, and CLI for Cisco Devices. If you have these
credential types or if they are relevant to your desired analysis then please enter them, otherwise
proceed to the next section.
2. You will be prompted to confirm your settings. Confirm that all of the credentials you
entered are accounted for in this pop up.
3. Click Start.
4. You are done for now. You will receive an email when the discovery process is complete.
You have now completed the RN150 setup. You will receive an email when the discovery
process is complete.
Discovery Scan
Run Discovery scan on selected ports, match credentials with devices
Check for expected server counts. In case of difference, repeat the scan a few times. Trouble
shoot for accessibility or protocol issues, if any.
Inputs
RISC Readiness
Output
Check for expected server counts. In case of difference from preliminary data, repeat the
scan a few times. Trouble shoot for accessibility or protocol issues, if any.
Customer’s Obligation:
The output will be showing isolated devices too such as printers, network devices,
standalone PC, etc.
Customer needs to define the assets under the scope for further Performance Scan
Discovery: How to
We recommend reviewing the page above before proceeding so you understand the resources
available.
4. If needed, go back to the RISC Networks RN150 appliance and add missing credentials
and click the Request Rescan button as needed.
Now it is time to license devices in your network to start data collection. You may or may not
want to license everything. For instance, you may want to license Windows Servers only or,
devices in a certain ip range. You can do this by filtering the list of devices in the licensing page.
Generally, it is recommended that all devices whose device type contains "server" should be
licensed. These are devices that we are collecting both performance and dependency data on as
we have OS level access.
3. On the Core Licensing tab, filter to the devices you would like to license (you can apply
filters by clicking the down arrow in a column header and enter a filter value).
4. Depending on your subscription you may need to select the Start 30 Day Burst button to
make your licensing available (this activates a clock which makes the burst licensing
available for 30 days)
6. Devices will start collecting as soon as they are checked. Uncheck the device to remove it
from collecting.
Next Steps
You have completed the quick start. After you have collected a sufficient amount of performance
and dependency data it will be time to proceed to the Application Review Process.
3. Discovery Scan Output
Export Performance Scan Output. The data may consist following details:
Inputs
Discovery output. Defined assets under the scope for further performance scan.
Output
Connectivity
Build the application stack and collect ongoing dependency and performance data
Review or Check for expected Application Stack details. In case of unexpected results,
rebuild stacks a few times. Continue until assessment is ended
Inputs:
Customer’s Obligation:
Review the Performance Scan output and match with the preliminary asset file.
In case of unexpected app stacks, trouble shoot
Performance via
Performance Performance Performance Performance
SNMP & SSH
(windows) (network) (Vmware) (Databse)
(Linux/Unix)
CPU Utilization
Statistical
CPU Performance CPU Performance (wait time, Connectivity
Information
ready time, etc)
Process specific
Memory Memory
Performance
Performance (bytes Utilization Table Names
metrics (CPU,
used / % used ) (usage MB, etc)
Swap, etc)
Memory Interface Disk Utilization
Performance (bytes Physical Disk I/O Utilization and (I/O / sec,
used / % used) Error Statistics bytes/sec, etc)
Disk (Logical and
CPU and
Physical) Network
Memory
performance (I/O Running Processes Utilization
Utilization
per sec, I/O bytes, (bytes in/out)
Statistics
latency, etc)
Socket Connectivity
Windows Network
Information (uses
Interface Cisco MQC
TCP-MIB via
Utilization (I/O Statistics
SNMP / prefers
bytes, etc)
RFC 4022 version)
Windows Process Network Interface IP SLA Statistics
Information Utilization (TrafficSim)
Windows Netstat
Netflow flow
Connectivity
information
Information (opt-in
(TrafficWatch)
only)
DNS A records and
C names where
applicable
Inputs
Output
Output
A spreadsheet having detailed server data with the corresponding application name
Skymap readiness & Data Enhancement on
Skymap
Once the Risk network tool is done with all the discovery we will get the Risk output and
populate the skymap csv file template which is available on skymap . we will get information
from the risk network discovery output and from the customers CMDB and populate the required
skymap csv template once we are done with this we will upload that template on skymap and
after that we will .Work with customer to update the required details on server and application
page. If necessary, interviews with application infrastructure owners. We can get the skymap
template from skymap as shown in the image below
Inputs
Spreadsheet from RISC after application review and app stack grouping exercise.
Output
Updated data on Skymap - Application and server page. With environment (stack)
mapping
1. Data population on Skymap
Application & Server Data upload on Skymap
First step Define the criterion those are decisive for Application migration planning. Some
information might not be derived from RISC output. This information will need to be fulfilled by
Application owners, Server Admins, DBA lead and/or Project Manager from customer side.
Create those fields on Skymap under custom fields.
Data
Asset Type Field Name
Type
Server Location string
Server Manufacturer string
Application Database Size >5 TB (Y/N) yes/no
Application Acceptable Downtime (in hours) string
Application Publicly Accessible Application? (Y/N) yes/no
Application DBA Lead string
Application DBA Lead Email string
Application Owning Organization string
Application University Service string
Application Blackout Dates string
Application Application Dependencies string
Application External Integrations (0, 1-3, 3+) string
Application Highly Visible Application? (Y/N) yes/no
Application Business Owner string
Application Business Owner Email string
Application Using Shared Storage (Y/N) ? yes/no
Application Load Balanced Application (Y/N)? yes/no
Application Preferred Migration Days/Times string
Application Replicated For DR ? (Y/N) yes/no
High Utilization Window/ Application Utilization
Application string
Requirements ?
Application Multi-Tenancy Or Dedicated Host string
Application Database Interoperability Requirements string
Application Provide Logging Requirement string
Application Stateful Vs Stateless string
Application Application Constraints string
Server Inbound Ports string
Server Inbound Connections string
Server Outbound Connections string
Inputs
Spreadsheet having RN150 output, application names, and app owner details
Customer’s Obligation:
In case Application Owner requires, more reviewers can be added to review or edit the
Application on Skymap. Reviewers may have ‘read only’ OR ‘read & write’ privileges as
specified by the client.
Application Reviewer will be able to review or update only the assigned applications.
Technical owner or DBA lead can be added as reviewer as well if required by App
Owners.
Reference attachment here consists of similar file for NYU (Please don't share the file prepared
for NYU to other parties. Prepare a similar one for that customer)
Step 2: After Step 1 all the App owners will be sent ‘Skymap User Invites’ from Skymap
console.
4. Notification for Application Update to App Owners
Once majority of the App owners accept the invite from Skymap, an additional email should be
sent from EQ prompting them to review, edit and update the information for the application
assigned to them on Skymap. This email can either be auto sent from Skymap or manual having
name and url link of the application owned by the corresponding app owner.
If App owner needs, he can invite other reviewer on his application. This can be technical owner,
DBA lead, Technical owner or anyone else. but this reviewer also needs to have login access
(user invite) on Skymap. EQ co-coordinator shall provide that access email to reviewers.
5. Application Data Enrichment Review and Validation
Review the data enhancement on Skymap. If any App owner has not updated his application,
follow up with him or bring into knowledge of their Project Manager and get it done.
Application Prioritization
EQ Technical lead and team will define the criterion for migration wave planning and respective
weight for each criterion. Accordingly following prioritization steps will be followed.
Inputs
Output
Prioritization Score and Rank for each application, based on it the wave planning will be
done
1. Review of Criterion Weight and Scoring Strategy
Review and validation of prioritization criterion weight and scoring strategy with customer
before starting scoring and ranking
2. Define Criterion for Prioritization
Step 1: Define criterion for prioritization based on Application questionnaire/criterion decided by
EQ Technical lead
Modify or enter values in any of the criterion that has no mapping link to application page fields.
You can manually drag and drop the cards to change the auto -assigned wave.
Once the wave plan is finalized, get it reviewed by the customer. Do necessary alteration and
then assign them to the wave. Once you hit the assign servers button, then you lose the wave
planning board. You will see a new task board with assigned servers on unscheduled column
(getting ready for migration) Wave List will show the list of the servers per wave. To change the
wave for particular server, go to server page and change the assigned wave there.
Inputs
Output
1. Create a project
Create a project on Wave planning page of Skymap. Define start date, end date, wavelength,
number of servers per wave, etc. This can be edited if required later.
Auto Wave Assign will plan waves based on logic- Dev>QA(TEST)>Stage>Prod. That means
initial waves will have servers with Dev environments whilst Prod environment will go in last
few waves.
Manual drag and drop will help to change the wave assignment.
Discovery Result
Once the wave planning is done. Work out on Migration strategy for the in-scope servers. Define
the servers for Replatform, Retire, etc. Find out Run rate cost for the servers under ‘Rehost'.
Share the Discovery result with customer and do necessary changes as per customer’s feedback
Inputs
Output
Final Result.
An example of Discovery Result is attached for reference. The final worksheet comprises of
Summary, Application-server mapping, Wave plan, Connectivity, Migration strategy, EC2 right
size mapping, R strategy, and cost per server/ Application, etc. The output can be slightly
different for various customers.
Migration Patterns
3. EC2 Right Size Mapping & Cost Calculation Using AWS MPA
Use cost calculation tool such as AWS MPA. Enter the RISC output and it will give you cost for
servers under the scope.
Detailed portfolio assessment (server right-sizing, pricing, TCO comparisons, migration cost
analysis) as well as migration planning (application data analysis and data collection, application
grouping, migration prioritization, and wave planning) can be done online using Migration
Portfolio Assessment. The service is available free of charge to all AWS consultants and APN
Partner consultants. Configuration management database (CMDB) and application portfolio data
in varied formats can be imported into MPA with a web-based data ingestion process. MPA
offers extensive configurability and enables experienced consultants to model customers’
scenarios and generate data for business case analysis and migration planning.
Currently, the MPA application helps to create a consolidated view of a customer's on-premises
IT (server) assets, recommend migration strategy, estimate AWS usage cost for equivalent AWS
services, prioritize applications, group applications and create a migration plan.
OS Name, CPU (Processors), Cores (Per Processor), Ram, Peak CPU Utilization, Peak
Ram Utilization, Server Usage %, Physical/Virtual, Server Usage (Uptime), Storage
Total Disk Size, and Storage Utilization are highly recommended for TCO analysis.
Whenever these fields are not provided, TCO will use industry standard values.
Map Physical/Virtual attribute if your portfolio consist of physical and virtual servers.
'Physical' is the default value for the server. For Physical server, map Number or CPU
and Number of CPU for accurate TCO, in case you don't have processor information,
map total CPU to Number of Processor. For Virtual Server, CPU count can be in Number
of CPU or Cores Per Processor.
Select correct Unit of Measurement (TB, GB, MB, KB, or Byte) for Storage and Memory
attributes, and (Ratio, Percentage) for utilization attributes. UofM should be available in
the input file or check with customer.
What is the EC2 target right size mapping (AWS Server Recommendation)?
MPA takes server utilization data and maps the source server to a reasonably sized EC2 instance.
The tool assumes all processors are equal - comparisons are not based on performance
benchmarks; but does take into account how much of the provisioned resource is in use (average
or peak).
MPA calculate EC2 price for all payment types and recommend the cheapest the option
1. On-Demand - EC2 Rate Per Hour * 365 * 24 * TCO Duration (Years) * Server Usage %
3. 1 Year Partial Upfront - Upfront Cost * TCO Duration (Years) + Monthly Cost * 12 *
TCO Duration (Years)
5. 3 Year All Upfront - Upfront Cost * Roundup (TCO Duration (Years)/3) * TCO Duration
(Years) / 3*Roundup (TCO Duration (Years)/3)
6. 3 Year Partial Upfront - (Upfront Cost * Roundup (TCO Duration (Years)/3) * TCO
Duration (Years) / 3*Roundup (TCO Duration(Years)/3)) + Monthly Cost * 12 * TCO
Duration(Years)
An example of Discovery Result is attached for reference. The final worksheet comprises of
Summary, Application-server mapping, Wave plan, Connectivity, Migration strategy, EC2 right
size mapping, R strategy, and cost per server/ Application, etc. The output can be slightly
different for various customers.