Deployment recommendations
This topic contains recommendations for deploying TrueSight Network Automation.
Initial configurations
This section describes the initial configurations available in Network Automation.
Configuring database backups
Network Automation includes a database backup script when using the embedded PostgreSQL database. This makes database management more convenient. See Maintaining-the-database for location and usage instructions.
Configuring remote device agents
Network Automation remote device agents are useful when network devices have overlapping IP addresses or are located in a secure location that is not accessible from the Network Automation application server. Remote device agents are installed on Linux or Microsoft Windows host computers. See Installing-the-remote-device-agent-on-Windows and Installing-the-remote-device-agent-on-Linux for information about configuring them.
Configuring syslog
Network Automation has a built-in syslog receiver. Syslog messages that are received can be used to trigger a snapshot of a network device, be included in change summary reports, and can be correlated with other events to trigger a job.Network Automation can also be configured to receive syslog events from a relay instead of directly from the network device. This comes in handy if the customer has an existing syslog server that they want to continue using or if another layer of filtering of syslog messages is required before forwarding to Network Automation.
For information about configuring syslog, see Configuring-existing-syslog-servers-to-forward-events.
Configuring device import
Network Automation does not have an embedded means of discovering new devices on the network. The primary means of getting devices into Network Automation is through device import. Network Automation has a number of out-of-the-box device import adapters that enable importing from common discovery tools like BMC Discovery, Entuity Network Analytics, HP Network Node Manager, and CSV. See Device-import-formats and Managing-device-import-tasks.
Security considerations
This section describes security considerations for Network Automation.
Role-based access control
See Managing-access.
Subjecting jobs to approval
Select the Enable Job Approval for Actions system parameter and then all actions that must require network operations and/or BMC Remedy Action Request (AR) System approvals. For more information, see Approving-jobs.
You also must define the Job Approval Types, including BMC Remedy AR System approval, under Admin > Network Admin > Job Approval Types. For more information, see Job-approval-types.