New Relic can collect detailed information about a system's configuration per host, including system modules, configuration files, metadata, packages, services, user sessions, etc. The Inventory page provides a real-time, filterable, searchable view into each host's configuration.
Use the Inventory page to:
- Ensure a version update was applied successfully across all your hosts.
- Audit version discrepancies across your hosts.
- Quickly identify which hosts require an update to fix a security vulnerability.
To view and search your inventory data: Go to one.newrelic.com > Infrastructure > Inventory.
The infrastructure inventory is a qualified namespace (structured like a directory) that organizes inventory items into names that resemble a source path. The inventory item name is comprised of three elements:
Basic, top level type of data source, typically based on its role in the system. Common examples include config, package, kernel, user session, services, and modules.
The specific data source for the inventory item.
The name of the specific inventory item; for example, the filename, package name, or system setting name.
For detailed metadata and other information about your hosts, use tagging with New Relic One.
Use Inventory page functions to find information about a particular item on your hosts:
Inventory is collected from the infrastructure agent's built-in data collectors, Amazon Elastic Compute Cloud (EC2) integrations, agent integrations provided by New Relic, and customer-built integrations. The data appears on the Inventory page and in other places within the Infrastructure monitoring's user interface.
Inventory data is real-time. If a host stops reporting, its inventory data still displays for up to 24 hours.
If you need more help, check out these support and learning resources:
- Browse the Explorers Hub to get help from the community and join in discussions.
- Find answers on our sites and learn how to use our support portal.
- Run New Relic Diagnostics, our troubleshooting tool for Linux, Windows, and macOS.
- Review New Relic's data security and licenses documentation.