5.8.5

Table Of Contents
Configuring Applications 5
An application is a type of container resource that defines an interdependent set of hardware and software
components that delivers a specific capability that supports your business. A vCenter Operations Manager
administrator builds application topologies to determine how applications are affected when one or more of
the resources that they contain experience problems.
After you configure an application, you can view real-time analysis for any or all of the affected resources in
the application, understand where in the application problems arise, and determine how problems spread to
other resources.
This chapter includes the following topics:
n
“Understanding Applications,” on page 59
n
“Add an Application,” on page 60
n
“Creating and Assigning Application Tags,” on page 61
n
“Use a Tag to Find an Application,” on page 62
n
“Modifying Applications,” on page 63
n
“Modifying Application Tags,” on page 64
Understanding Applications
In vCenter Operations Manager, applications are three-level hierarchies. Each application contains one or
more tiers, and each tier contains one or more resources.
A tier is a group of resources that performs a specific task in an application. For example, you can group all
of your database servers together in a tier. The resources that make up a tier can also contain other
resources, but they do not have to.
When you define application hierarchies for your resources, vCenter Operations Manager can calculate and
store fingerprints for your applications. When a KPI for an application or tier violates a threshold,
vCenter Operations Manager examines the events that preceded the violation. If it finds enough related
information, such as other anomalies, it captures the set of events that preceded the violation. This captured
series of events is called a fingerprint.
With fingerprints, vCenter Operations Manager can monitor events in the future and, if it finds a similar
series of events, issue a predictive alert to warn you that a KPI violation is likely to occur. The information
that vCenter Operations Manager obtains after it generates the fingerprint assists you in correcting the
problem.
VMware, Inc.
59