Management::EM::discover_devices¶
Introduced : BIG-IP_v11.2.0
Initiate a device discovery.
Prototype¶
String discover_devices(
in String [] addresses,
in String [] usernames,
in String [] passwords
);
Parameters¶
Parameter | Type | Description |
addresses | String [] | the IP addresses or hostnames of the devices to be discovered |
usernames | String [] | username credentials of devices to be discovered |
passwords | String [] |
Exceptions¶
Exception | Description |
Common::AccessDenied | Raised if the client credentials are not valid. |
Common::InvalidArgument | Raised if one of the arguments is invalid. |
Common::OperationFailed | Raised if an operation error occurs. |
See Also¶
iControl ::
Warning
The links to the sample code below are remnants of the old DevCentral wiki and will result in a 404 error. For best results, please copy the link text and search the codeshare directly on DevCentral.
Sample Code¶
- Discover Device (C# code sample) - This C# client code sample uses Enterprise Manager’s device inventory to discover a list of devices managed by the referenced Enterprise Manager.
- Discovering BIG-IP devices - Using iControl proxy to discover devices
- EM discover devices - Discover Devices API
- Discover Device (Java code sample) - This Java client code sample uses Enterprise Manager’s device inventory to discover a list of devices managed by the referenced Enterprise Manager.
- Discover Device (Perl code sample) - This Perl client code sample uses Enterprise Manager’s device inventory to discover a list of devices managed by the referenced Enterprise Manager.
- Discover Device (Python code sample) - This Python client code sample uses Enterprise Manager’s device inventory to discover a list of devices managed by the referenced Enterprise Manager.
The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.