5.20 Introduction to Configuration Management

 

Configuration Management deals with configuring devices in the network to achieve a defined functionality. WebNMS provides you a customizable framework with rich set of APIs, which is used to develop user applications that can maintain network resources and network configuration changes. This section is divided into the following parts:

 

An Overview - This section provides you with an overview of WebNMS Configuration Management architecture. It explains the functional capabilities of Configuration Server in detail.

 

Configuration Server Startup Parameters - This section details the startup options that can be set while starting the Configuration Server. Some of the options set before starting the server cannot be modified at run time. Hence, it is necessary to have a look into this section before proceeding to other documents.

 

The Database Schema - This section gives information about the database tables used by the Configuration Server. This will provide you an overview about how the details are stored in the database after processing.

 

Talking with Configuration Server - For performing any operation that involves a request from the application, the instance of ConfigClient has to be got. This section explains you how to get the ConfigClient instance that enables the application to talk to the Configuration Server.

 

Handling the Responses from the Server - Once the application places a request to the Configuration Server, the responses about the submitted task will be sent by the server. The application should interpret these responses to know the status of the request. This section explains how to handle such responses.

 

Configuring Devices - This section explains to you how to configure devices by creating a Task. The various information that must be provided while configuring a device are explained here. Once all the concepts are explained, an overall picture of the task is provided.

 

Configuring Multiple Devices - This section deals with the methodology of configuring multiple devices with a single configuration task. This section gives you information on grouping the devices to form a device array, associating the device array with the task, etc.

 

Executing Combined Tasks - A set of subtasks are grouped together to form a combined task. The concept of combined task will be useful in cases a particular operation needs to be done by setting two or three parameters. In this case, each individual operation can be formed as subtasks out of which the combined task is created and executed.

 

Reusable Tasks - Reusable tasks are also called as template tasks that use a datasource to provide values to the variables. The templates get the values from the datasource and do the configuration at run time, that enables you to reuse the template, once it gets defined. This section also explains how a datasource has to be created that forms the repository of input data to the template.

 

Configuration Upload and Download - This option enables you to fetch the configuration details from one device and apply it over other similar devices. This functionality will be of great use in configuring complex devices such as routers, switches, etc.

 

Task DTD - This section explains the format with which the configuration task is defined. Care has to be taken to ensure that the configuration task complies with this format.

 

Synchronizing Managed Object Database - This section details the procedure through which the Managed Object database can be synchronized with the latest configuration details of the device.

 

Customizing Client Requests - This section details how to handle the user-defined request that is handled between the server and the client.

 

Plugging in Protocols - If there is a need for you to use a proprietary protocol for configuring the devices, this section leads you plugging in the protocol, so that the Configuration Server uses that for configuration.

 

Plugging in User Authentications - This section explains how to integrate a user-defined authentication mechanism to authorize the users configuring the system.

 

Authorizing Configuration Operations - This section explains how the Configuration Management is made secure, thereby restricting the operations performed by the users. It explains how user-defined authorization mechanism can be plugged in the Configuration module.

 

Developer Tips - This sections lists out the frequently asked questions and the troubleshooting tips pertaining to the Configuration module. Some of the problems that have workaround solutions are also provided here.

 


Copyright © 2013, ZOHO Corp. All Rights Reserved.