This topic contains recommendations for deploying The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found..
Initial configurations
This section describes the initial configurations available in The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found..
Configuring database backups
The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. includes a database backup script when using the embedded PostgreSQL database. This makes database management more convenient. See Maintaining-the-database for location and usage instructions.
Configuring remote device agents
The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. remote device agents are useful when network devices have overlapping IP addresses or are located in a secure location that is not accessible from the The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. application server. Remote device agents are installed on Linux or Microsoft Windows host computers. See Installing-the-remote-device-agent-on-Windows and Installing-the-remote-device-agent-on-Linux for information about configuring them.
Configuring syslog
The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. has a built-in syslog receiver. Syslog messages that are received can be used to trigger a snapshot of a network device, be included in change summary reports, and can be correlated with other events to trigger a job.The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. can also be configured to receive syslog events from a relay instead of directly from the network device. This comes in handy if the customer has an existing syslog server that they want to continue using or if another layer of filtering of syslog messages is required before forwarding to The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found..
For information about configuring syslog, see Configuring-existing-syslog-servers-to-forward-events.
Configuring device import
The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. does not have an embedded means of discovering new devices on the network. The primary means of getting devices into The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. is through device import. The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. has a number of out-of-the-box device import adapters that enable importing from common discovery tools like BMC Discovery, Entuity Network Analytics, HP Network Node Manager, and CSV. See Device-import-formats and Managing-device-import-tasks.
Security considerations
This section describes security considerations for The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found..
Role-based access control
See Managing-access.
Subjecting jobs to approval
Select the Enable Job Approval for Actions system parameter and then all actions that must require network operations and/or BMC Remedy Action Request (AR) System approvals. For more information, see Approving-jobs.
You also must define the Job Approval Types, including BMC Remedy AR System approval, under Admin > Network Admin > Job Approval Types. For more information, see Job-approval-types.