GConf

Within the WOCU-Monitoring suite of products, you will find the GConf.It is a complementary tool, useful for the comprehensive, unified and/or independent management of the configurations of the network equipment administered and monitored in the application.

This technology allows us to have version control on the hosts of your choice, storing backups of the configurations whenever necessary.

Once this module is enabled in the application, the user will have access from Configuration > GConf.

../../_images/4_135_import-tool_gconf_tab_0-58.png

Inventory Elements

First of all, it is necessary to know how to include in this inventorythe different devices that we are going to have control over.

. Add or edit a new Host in Active Assets.

. In the registration form or edit of the host in question, select the Enable checkbox located in the Gconf block.

Therefore, the Inventory Elements section is a detailed list of elements registered (previously) and with which it is possible interact with and perform a set of desired operations.

../../_images/4_136_import-tool_gconf_inventory_elements_table_0-60.png

The different fields/columns of the table are described below:

✓ Name

Formal name of the Host.

✓ IP

IP Address of the Host.

✓ Tecnology

Details the type of technology or protocol used by such a Host for communication and data transfer.

✓ Group

Details the group(s) to which the Device belongs. These logical groupings make it easier to perform and manage backups of the set.

✓ Credentials

Registers the Credentials with which attempt to access the Host.

✓ CMD

Details the unique identifier associated with a specific command or request command or request sent to the Host.

✓ Scene

The Scenes applied to the Host are detailed.

✓ Autodiscover

Indicates whether the Host is enabled to be auto-discoverable.

Actions

The possible actions applicable to each entry in the table are described below:

../../_images/4_136b_import-tool_gconf_inventory_elements_actions_0-58.png

Autodiscover

With this action the system tries to discover the typology of an equipment, that is, its make and model in order to be able to interact correctly with itself.

Attention

In order to be able to execute the Autodiscover action, it is necessary that the equipment must have the Credentials configured.

../../_images/4_136c_import-tool_gconf_inventory_elements_actions_autodiscover_0-58.png

The action is confirmed by the Apply button.

This is followed by the implementation of the task of self-discovery task. Once completed, the Device along with its new attributes will be displayed in the Inventory Elements.

Configurations

With this action, the system consults the different configuration files available for the equipment in question. From this space it is possible to know the configuration in detail and download it.

../../_images/4_136d_import-tool_gconf_inventory_elements_actions_configurations_0-58.png

For each of the entries the following information is recorded:

Config Name: name of the registered configuration. The format is the following: YYYYYYYYMMDDHHMM___name___IP, where YYYYY is the four digits for the year, MM for the month, DD for the day, HH for the hour, and MM for the for the minutes. The separator character (_) is followed by the name of the monitored component (router, port, etc.) and finally the associated IP address.

Date: date and exact time of the execution of the backup.

Size: indicates the size of the backup in kilobytes (KB).

Actions: first of all there is the option to download the backup of the indicated equipment, for later use in case of loss, corruption, damage of the original data, etc. It is also possible to definitive deletion of configurations.

../../_images/4_136g_import-tool_gconf_inventory_elements_actions_configurations_delete_0-58.png

When you click on a particular configuration, the system reveals the full configuration of the selected item. It is presented in raw for easy reading and comprehension.

../../_images/4_136e_import-tool_gconf_inventory_elements_actions_configurations_detail_0-58.png
Diff selected configs

Selecting the Diff selected configs checkbox enables the ability to compare the differences or discrepancies between two versions of stored configurations.

On the right margin of the view, the values that have been deleted with a red background colour and new values with a yellow yellow.

../../_images/4_136f_import-tool_gconf_inventory_elements_actions_configurations_diff_0-58.png

This function is valuable for understanding and tracking changes in thconfiguration over time, facilitating the detection of potential problems, resolving conflicts and effectively managing the evolution of the monitored Hosts’s configuration.

Run Backup

As the name suggests, this action will attempt to perform a backup of the Host, capturing the current state and configuration and creating a snapshot for later use in case of failures, errors or unwanted changes. This practice is essential for proactive configuration management, enabling efficient versions over time.

Attention

In order to execute the action, the equipment must have configuredthe Credentials.

../../_images/4_136h_import-tool_gconf_inventory_elements_actions_configurations_run_0-58.png

The action is confirmed by the Apply button.

Logs

In this section (purely informative) you will find a paginated list with entries referring to the history of actions performed on the Host in question.

Each log contains detailed information about relevant events, operations and relevant states of the Host, allowing the user to track and analyse performance, identify potential problems and track tracking of critical activities.

../../_images/4_136i_import-tool_gconf_inventory_elements_actions_configurations_log_0-58.png

The different fields/columns of the table are described below:

✓ Date created

Refers to the exact date and time at which a particular activity was recorded. This data allows the user to track when specific events occurred in the system”

✓ Logs

Displays specific details about the events, operations or status recorded.These logs may include error messages, warnings, configuration changes, connections or disconnections, among other relevant events.

Run Backup

Through this action, the system allows for the creation of backups to a pre-selected group of devices collectively. Instead of performing individual backups for each device, with this option, system administrators carry out backups for multiple elements, thus simplifying the backup and recovery process.

It will be necessary to confirm the action in the following dialog box:

../../_images/4_136%C3%B1_import-tool_gconf_inventory_elements_actions_run-backup-form_0-59.png

Run Autodiscovery

Through this action, the system initiates a self-discovery process for the previously selected set of devices. With this action, the system attempts to identify the type of a device, including its brand and model, in order to interact correctly with it.

It will be necessary to confirm the action in the following dialog box:

../../_images/4_136j_import-tool_gconf_inventory_elements_actions_run-autodiscovery-form_0-59.png

Assing credentials

Through this action, credentials can be assigned to a specific group. To carry out this process, one must choose the credentials that are intended to be assigned to the previously selected devices.

Note

The credentials are generated in advance from the section: Inventory Credentials.

../../_images/4_136o_import-tool_gconf_inventory_elements_actions_assing_credentials_0-59.png

Detailed asset information

By clicking on the name of a particular item, its corresponding detail view will pop up with the configuration values of the different attributes of the item registered in the configurations system.

../../_images/4_136a_import-tool_gconf_inventory_elements_host_info_view_0-58.png

The following is a description of the different attributes:

✓ Active

Indicates whether the Device is active, i.e. is being monitoring in the system.

✓ Autodisc

Indicates whether the Host is enabled to be auto-discoverable.

✓ Cmdid

Details the unique identifier associated with a specific command or request command or request sent to the Host.

✓ Credid

Registers the Credentials with which attempt to access the Host.

✓ Date Autodiscover

Records the exact time (date and time) at which the Hosts was self-discovered.

✓ Date created

Records the exact time (date and time) when the Host was created.

✓ Date modified

Records the exact time (date and time) at which the last modification of the Host was made.

✓ Extra

Include additional information of interest on the Host in issue: specific model, software, whether it has been discovered by SSH, duration of states, etc.

✓ Group

Details the group(s) to which the Device belongs. These logical groupings make it easier to perform and manage backups of the set.

✓ Hostname

Formal name of the Device in question.

✓ IP

Contains the IP address of the Host.

✓ Method

Refers to the base connection method used to establish secure communication with that Host.

✓ Model

Technical model of the Host.

✓ Port ssh

Refers to the port number used to establish SSH connections to that Host.

✓ Port Telnet

Refers to the port number used for Telnet connections to that Host.

✓ Realm

Realm to which the Device belongs. This is a unique identifier”Self-generated”

✓ Sceneid

The Scenes applied to the Host are detailed.

✓ Tags

Records the internal descriptive tags associated with the Host.

✓ Tecno

Details the type of technology or protocol used by such a Host for communication and data transfer.

The system also allows changes to the configuration of the element from the information modal itself. Through the button Edit button, you can access the editable form with the configuration parameters of the original element, for free modification and update.

../../_images/4_136b_import-tool_gconf_inventory_elements_host_edit_view_0-58.png

Filtering and export options

../../_images/4_136l_import-tool_gconf_inventory_elements_filters_0-60.png

Filter by Model

Useful filtering option to display only assets that belong to a specific model. To do this, it will be necessary to select or enter the name of a specific model in the dropdown menu, and the table will automatically be restricted to show only the relevant assets.

The action is confirmed by the Filter button. The action is toggled using the Clear Filter button.

Filter by Technology

Useful filtering option to display only assets according to the technology or type of technology they use. In other words, this filter allows users to categorize and specifically visualize assets related to a particular technology.

To do this, it will be necessary to select or enter the name of a specific technology in the dropdown menu, and the table will automatically be narrowed down to display only the relevant assets.

The action is confirmed by the Filter button. The action is toggled using the Clear Filter button.

Filter by group

The tool uses groups to facilitate the creation and management of backups for the set. Therefore, by expanding this filtering option, all managed groups will be listed. By selecting one or more of them, the table will be automatically narrowed down to display only the elements belonging to the chosen groups.

The action is confirmed by the Filter button. The action is toggled using the Clear Filter button.

Autodiscovery

Through the Autodiscover action, the system attempts to identify the type of a device, including its brand and model, in order to interact correctly with it.

Therefore, this filter is useful to display only the assets that have undergone the autodiscovery action for data extraction and logging.

../../_images/4_136m_import-tool_gconf_inventory_elements_filters_0-59.png
Selection and Configuration Options

Icon

Value

Descripción

Off

The filter is not enabled. The table displays all items by default.

True

Filter enabled. The table is updated to display items that meet the filter condition.

False

Filter enabled. The table is updated to hide items that meet the filter condition.

Multiple Selection of Elements

By clicking on this dropdown menu, all possible options for element selection will be displayed. Upon choosing one of them, the table will immediately reflect the changes.

The available options are:

../../_images/4_062a_import-tool_active_assets-action-delete-massive_0-52.jpg
  • Select All: selects the entire list.

  • Select Current Page: selects only the page currently being viewed.

  • Select none: does not mark any items. It is useful for disabling the previous options.

The selected records will always appear highlighted with a green background.

Important

Manual selection of items is also possible by clicking on each of them. For marking multiple items, hold down the CTRL key while selecting the other options you wish to choose.

Export of the list of Items

Although WOCU-Monitoring offers a multitude of functions for data administration, metrics, graphics, etc., at some point, the use of other external tools may be required to handle such information. Therefore, the export function is integrated, which facilitates downloading inventory data into a file onto the hard disk for processing or later use.

Following the action Massive configure monitoring packs, there are two options available for downloading files in CSV and JSON formats.

../../_images/4_143_import-tool_gconf_exports_button_0-60.png

Clicking on any of the buttons initiates the download of files in the following formats:

CSV (Comma Separated Value)

Clicking on the CSV button will open a new modal for selecting and marking parameters to export according to the user’s criteria. The available options are:

../../_images/4_143a_import-tool_gconf_export-CSV_0-60.png
  • Active

  • Autodisc

  • Date Autodiscover

  • Date created

  • Date modified

  • Extra

  • Group

  • Hostname (Mandatory)

  • Ip

  • Method

  • Model

  • Port ssh

  • Port Telnet

  • Software version

  • Tags

  • Tecno

Once the selection is confirmed, the download of a CSV file begins. This format is simple, separating columns by a delimiter (semicolon “;”) and rows by a newline.

Note

Use the Select all button to select all available fields/boxes and perform a complete export. You can undo this action using the Deselect all button.

JSON (JavaScript Object Notation)

This other option follows the same procedure as the previous case but initiates the download of a JSON (JavaScript Object Notation) file, a lightweight data interchange format capable of being read by any programming language, and thus used for exchanging information between different technologies.

In both options, the system will offer the choice to select the directory where to download and store the generated inventory file, and assign an alternative name to it. By default, the system assigns the following name:

gconf_[nombre del reino]__00h-00min_dd-mm-aaaa y la extensión ``.csv`` o ``.json`` según la opción escogida.

Inventory Commands

The Inventory Commands section is a detailed list of all the access commands to be executed in order to query and collect data to Hosts.

../../_images/4_137_import-tool_gconf_inventory_commands_tab_0-58.png

The different fields/columns of the table are described below:

✓ Name

Formal name of the command in question.

✓ Description

Refers to a text field that provides a detailed detailed description or an explanation of the functionality or purpose of the command in question. This attribute is used to document and clearly communicate the nature and intended use of the command.

✓ Tecno

Details the type of technology or protocol used by the command.

Actions

The possible actions applicable to each entry in the table are described below:

../../_images/4_137b_import-tool_gconf_inventory_commands_actions_0-58.png

Delete

With this action, the command is permanently deleted. To consolidate the deletion, it will be necessary to confirm the action in the following dialog box:

../../_images/4_137c_import-tool_gconf_inventory_commands_actions_delete_0-58.png

Detailed command information

Clicking on the name of a particular command will bring up its corresponding corresponding detail view will pop up with the configuration values of the various attributes of the element registered in the configurations.

../../_images/4_137a_import-tool_gconf_inventory_commands_info_0-58.png

The following is a description of the different attributes:

✓ Description

Refers to a text field that provides a detailed detailed description or an explanation of the functionality or purpose of the command in question. This attribute is used to document and clearly communicate the nature and intended use of the command.

✓ Name

Formal name of the command in question.

✓ Path

Refers to the name of the file hosting the command.

✓ Tecno

Details the type of technology or protocol used by the command.

Inventory Credentials

La sección Inventory Credentials es una lista detallada de todas las credenciales o información de autenticación necesarias para acceder y recopilar datos a dispositivos, por lo que es importante correlacionarlas correctamente a cada elemento presente en el Inventory Elements.

From this space, it is possible to create, edit, delete and view the different managed credentials.

../../_images/4_138_import-tool_gconf_inventory_credentials_tab_0-58.png

The different fields/columns of the table are described below:

✓ Name

Formal name identifying the credential.

✓ Admin Username

Name of the administrator user in case you need to access the equipment as such.

✓ Access Username

Name of the user accessing the equipment.

Actions

The possible actions applicable to each entry in the table are described below:

../../_images/4_137b_import-tool_gconf_inventory_commands_actions_0-58.png

Delete

With this action, the credential is definitively erased.

In order to consolidate the deregistration, it will be necessary to confirm the action in the following dialogue box:

../../_images/4_137c_import-tool_gconf_inventory_commands_actions_delete_0-58.png

Detailed information on the credential

Clicking on the name of a particular credential will bring up its corresponding detail view with the configuration values of the different attributes registered in the configuration system.

../../_images/4_138a_import-tool_gconf_inventory_credentials_info_view_0-58.png

The following is a description of the different attributes:

✓ Name

Formal name of the credential.

✓ Access Username

User with standard privileges.

✓ Access Password

Access password for the user with standard privileges.

✓ Admin Username

User with Administrator privileges, in case there is a need to escalate privileges within the team.

✓ Admin Password

Password relating to the Administrator user.

✓ Community

Refers to the SNMP community. A text string used as a password to access the discovered devices and retrieve information to be imported into WOCU-Monitoring.

✓ Security Name

Security name or username. Applicable only for SNMP protocol version 3.

✓ Auth Protocol

Authentication type. It can be MD5 or SHA v3. Applicable only for SNMP protocol version 3.

✓ Priv Protocol

Authorization type. It can be AES or DES v3. Applicable only for SNMP protocol version 3.

✓ Auth Key

Authentication key. Only applicable for SNMP protocol version 3.

✓ Priv Key

Authorization key. Only applicable for SNMP protocol version 3.

✓ Security Level

It can be used with no authentication or authorization (noAuthNoPriv); only authentication (authNoPriv); or authentication and authorization (authPriv). Applicable only for SNMP protocol version 3.

✓ Context

SNMP context name. Only applicable for SNMP protocol version 3.

✓ SNMP Version

Specific version of the SNMP protocol that has been used.

The system also allows for changes to be made to the configuration of the credential from the information modal itself. Through the button Edit button, you can access the editable form with the configuration of the original element, for free modification and update.

../../_images/4_138b_import-tool_gconf_inventory_credentials_edit_view_0-58.png

Registration of new credentials

New credentials will be initiated from the button + Create Credential.

../../_images/4_138e_import-tool_gconf_inventory_credentials_create_credential_button_0-58.png

The following form must then be completed:

../../_images/4_138d_import-tool_gconf_inventory_credentials_create_credential_0-58.png

Note

These attributes match those described in: Detailed information on the credential.

Inventory Scenes

A Scene is a set of reproducible instructions that cover a specific scenario for successful access to a given piece of equipment, moments prior to connection (e.g. jump machines).

Therefore, the Inventory Scenes section shows a detailed list of the different scenes defined. It is of paramount importance to link scenes with those teams where it is necessary.

../../_images/4_139_import-tool_gconf_inventory_scenes_tab_0-58.png

The different fields/columns of the table are described below:

✓ Name

Formal name of the scene.

✓ Description

Brief description of the scene.

✓ Path

Name of the file containing the scene configuration.

Detailed scene information

By clicking on the name of a particular scene, its corresponding detail view with the configuration values of the different attributes registered in the configuration system.

../../_images/4_139a_import-tool_gconf_inventory_scenes_info_view_0-58.png

Note

These attributes are in line with those described in the previous point.

Scheduler

The Scheduler section is a space for the scheduling of tasks for the execution of backups. In other words, this section is used to set the frequency, timing and repetition of backup operations in an automated manner.

../../_images/4_140_import-tool_gconf_sheduler_tab_0-58.png

The different fields/columns of the table are described below:

✓ Name

Name assigned to the scheduled task.

✓ Cron

Logs the frequency and exact time at which the backup is to be executed automatically. This is expressed in Crontab format.

✓ Enabled

Indicates whether or not programming is active for execution.

✓ Last run

Indicates the date and time of the last time the scheduled scheduled. Provides information on the most recent time that the backup operation was successfully completed.

Actions

The possible actions applicable to each entry in the table are described below:

../../_images/4_137b_import-tool_gconf_inventory_commands_actions_0-58.png

Delete

With this action, the credential is definitively erased.

In order to consolidate the deregistration, it will be necessary to confirm the action in the following dialogue box:

../../_images/4_137d_import-tool_gconf_sheduler_delete_0-58.png

Detailed information on a programme.

By clicking on the name of a particular item, its corresponding detail view will pop up with the configuration values of the different attributes of the item registered in the configurations system.

../../_images/4_140c_import-tool_gconf_sheduler_info_0-58.png

The following is a description of the different attributes:

✓ Name

Identifying name of the programme.

✓ Type

✓ Enabled

Indicates whether or not programming is active for execution.

✓ Cron

Logs the frequency and exact time at which the backup is to be executed automatically. This is expressed in Crontab format.

✓ Hostgroups

Register the group of devices to be backup to.

✓ Nodes

Register the individual teams to be backup.

The system also allows changes to the configuration of the element from the information modal itself. Through the button Edit button, you can access the editable form with the configuration parameters of the original element, for free modification and update.

../../_images/4_140d_import-tool_gconf_sheduler_edit_0-58.png

Registration of new programmes

The creation of new schedules shall be started from the button Create Schedule.

../../_images/4_140a_import-tool_gconf_sheduler_add_button_0-58.png

The following describes the corresponding fields to be configured in the following form:

../../_images/4_140b_import-tool_gconf_sheduler_form_0-58.png
✓ Schedule Name

Unique identifier of the newly scheduled task.

✓ Select group

Search engine for the selection of groups of teams to be backup.

✓ Select nodes

Search engine for the selection of individual teams to be backup.

Finalise the new configuration via the Create button. The new schedule will already be visible in the inventory Scheduler.