Important

   

This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Navigating the interface

The TrueSight Network Automation GUI has five tabs that are available from the main dashboard.

    The Home tab contains the following options:

    • Dashboard: View change discrepancies and compliance violations, rollback to a previous configuration, fix compliance violations, and display various change reports.
    • Events: Display the event log for viewing, filtering, exporting, and printing.
    • Change Password: For local authentication, change your login password.

    The Dashboard identifies a set of potential service-impacting events, including:

    • The Running configuration is different from the Startup configuration. If the device restarts, the Running configuration is overwritten.
    • The current configuration (Running or Startup) is different from the assigned trusted Running or Startup. Indicates that someone has made a temporary, unauthorized or emergency change.
    • An OS image discrepancy is detected if the current Running and Trusted Running configuration files are tagged with different OS versions.
    • The current configuration (Running or Startup) is non-compliant based on assigned and enabled rule sets (that is, configuration standards).
    • Trails containing binary files and trails other than Startup and Running display compliance violations in a Dashboard column labeled Other Compliance Violations.

    From the Dashboard, the user can identify who made the changes, view the changes in detail, and non-disruptively roll back to any prior configuration, and enforce compliance to standards.

    After a successful change, an authorized user can Mark as Trusted all current configurations. Therefore, the Dashboard during a change window is the accumulation of all changes.

    When the changes are verified, submit a Mark as Trusted action to accept changes as the new baseline. During non-change windows, the Dashboard provides visibility into emergency or unplanned changes.

    You can manage the following elements from the Network tab:

    • Spans
      • Devices: Manage the device inventory.
      • Groups: Manage groups.
      • Combo groups: Manage groups that are a logical AND/OR/NOT of static and auto groups.
      • Realms: Manage realms to logically group devices for multi-tenancy and security purposes (for example, by customers, by IT groups, by device type)
    • Actions
      • Jobs: Manage jobs that include one or more span actions such as Snapshot, Deploy to Active, Custom Action, Deploy to Stored, and Deploy OS Image.
      • Predefined jobs: Enable users to create, edit, and execute named sets of common and repeatable tasks.
      • Remedy inbox: Display Change Request Tasks created in the BMC Remedy ITSM server that require action to be taken by a TrueSight Network Automation user. You can select a task from the Inbox and initiate a job.
      • Telnet/SSH Session: Launch a Telnet/SSH session for a device.
    • Scripts
      • Templates: Manage templates used for provisioning devices and implementing configuration changes.
      • Rule sets and Rules: Group and manage rules used for making configuration changes and/or auditing and enforcing compliance to configuration standards.
    • Import/Export
      • Configuration Import/Export: Import or export device configuration files.
      • Rule Import/Export: Import or export rules to exchange between TrueSight Network Automation application servers.

    The TrueSight Network Automation provides a comprehensive set of change reports for all levels of the organization.

    Change reports include the following features:

    • Tracking the who/what/where/when of all changes
    • Auditing compliance to best practices
    • Reporting on change discrepancies (for example, Running versus Startup)
    • Searching configuration files and transcripts
    • Analyzing device inventory and attributes
    • Analyzing changes associated with change requests (that is, Jobs)
    • Comparing any two configurations on a single device or different devices

    TrueSight Network Automation reports can be generated on-demand; some are available through scheduled jobs and policies. Reports can be exported and emailed in PDF, CSV (when applicable), HTML, and RTF formats. The following reports are available:

    • Priority reports
      • Compliance Summary: Display device compliance status based on assigned or selected rules.
      • Discrepancy Summary: Display device configuration discrepancies (for example, differences between Running configurations and Startup configurations).
    • Status reports
      • Configuration Comparison: Compares, side-by-side, the differences between any two configurations or templates.
      • Device Inventory: Shows inventory data, change history, discrepancy status and compliance status for a specified network span.
      • Job Conflicts: Used to find devices that are in multiple pending jobs so potential conflicts can be resolved.
      • Quarantine: Displays the details of quarantined endpoints.
      • Transcript Comparison: Compares the device interaction transcripts side-by-side.
    • Activity reports
      • Change Summary: Shows device configuration changes over a period of time.
      • Job Summary: Shows the Job Details and Summary reports.
      • OS Image History: Shows a device's OS image software history.
    • Search reports
      • ACL Search: Search one or more device configurations for defined access control lists (ACL) and their associated uses (for example, interface).
      • Configuration Search: Search one or more device configurations for a matching line or pattern.
      • Transcript Search: Search a set of job transcripts for a specified line or pattern seen when interacting with a selected set of devices when performing a selected span action (such as Deploy to Active or telnet/SSH session).
    • Support reports
      • Device Adapter Capabilities: Provides information about enabled device type and custom action adapters. You can use this report to determine what sorts of features are supported by the adapters and to help understand job behavior and error messages.
      • License Usage: Allows the administrator to view the software release version, server IP address and total number of managed devices. The report enables administrators to reconcile actual and licensed number of managed devices.
      • System Diagnostics: Allows the administrator to retrieve diagnostics like memory usage, operating system information, system configuration files, system parameters, component counts, and thread stack traces.

    You can manage the following elements from the Policies tab:

    • Policies: Manage time and event-based policies.
    • Conditions: Define conditions monitored by policies.
    • Keywords: Defines keywords used by conditions.

    You can manage the following elements from the Admin tab:

    • Network Admin
      • Device Adapters: Manage supported vendors, device types, configuration trails, custom actions and external scripts (collectively known as device adapters) from the user interface without requiring restart of the TrueSight Network Automation application server.
      • Device Agents: Ability to manage devices through a TrueSight Network Automation remote device agent by using single SSL session.
      • Device Import: Manage importing devices from external data sources.
      • Device Security Profiles: Manage the device access credentials used by TrueSight Network Automation to perform snapshots and policies.
      • Email Lists: Defines email lists for distribution of change notifications and reports.
      • External Events: Define which external events are logged and forwarded to policies for condition matching.
      • External Links: Defines external links enabling users to launch associated external applications from the device info pop-up page.
      • Job Approval Types: Define who is required to approve jobs based on the job types.
      • OS Images: Manage the OS Image library.
      • Remote File Servers: Manage definition of remote file servers. A remote file server can be used to store OS image files externally, and may be located physically closer to certain devices. You may choose to store OS image snapshots to a remote file server; or you may choose to deploy an OS image from a remote file server.
      • Security Vulnerabilities: Manage the equipment vendor security advisories or bulletins, and create or associate compliance rules for detecting and reporting vulnerable device operating systems.
      • Security Vulnerability Importers: Manage the mechanism for importing security advisories or bulletins from various vendors.
      • SNMP Managers: Defines SNMP Manager Stations that can receive change notifications.rportingVulnerability Importers:
    • System Admin
      • Dynamic Fields: Define site-specific fields to be included in various database components (for example device inventory, jobs, policies) to customize TrueSight Network Automation to your operations.
      • Global Substitution Parameters: Nanage global parameters referenced by templates and rules.
      • Logging: Manage server logging parameters to enable debugging or troubleshooting messages emitted to the server's log files. You may enable or disable debugging, or revert to the default shipped with the system. Edit logging as directed by BMC support personnel.
      • System Parameters: Administer system parameters (for example user security, jobs, data purging).
    • User Admin
      • Logged In Users: View active user and Web Services API sessions. Authorized users can terminate active sessions.
      • Roles: Manage user roles that grant/deny rights based on user's responsibilities.
      • Users: Manage user accounts.

    Was this page helpful? Yes No Submitting... Thank you

    Comments