guides:reference:compliance:cmpl_fields
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
guides:reference:compliance:cmpl_fields [2020/06/22 08:42] – [Rules] pgels | guides:reference:compliance:cmpl_fields [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{indexmenu_n> | ||
+ | |||
+ | ===== Policies, rules & conditions ===== | ||
+ | |||
+ | ==== Policies ==== | ||
+ | |||
+ | A policy is coupled to a number of node groups. Whenever a node is checked for compliance, we therefore first check its node groups, and then all policies coupled to those node groups, and all those policies get validated on this node. A policy has the following attributes: | ||
+ | |||
+ | * **Policy_id: | ||
+ | * **Policy_name: | ||
+ | * **Policy_description: | ||
+ | * **Policy_status: | ||
+ | * Bit 1: Is the policy enabled? If not, then the policy won't be run | ||
+ | * Bit 2: Will the policy be run on config change? | ||
+ | * **Signal_trigger: | ||
+ | * Bit 1: When a node switches from compliant to non-compliant | ||
+ | * Bit 2: When a node switches from non-compliant to compliant | ||
+ | * Bit 4: When a node switches from non-compliant to non-compliant | ||
+ | * Bit 8: When a node switches from compliant to compliant | ||
+ | * **Signal_type: | ||
+ | * Bit 1: A trap message | ||
+ | * Bit 2: A syslog message | ||
+ | * Bit 4: An email | ||
+ | * Bit 8: A JSON call | ||
+ | |||
+ | |||
+ | ==== Rules ==== | ||
+ | |||
+ | A policy contains one or more rules. A rule applies to a specific vendor type and either the entire config of a node, or a specific block inside the node's config. Rules contain these attributes | ||
+ | * **Policy_id: | ||
+ | * **Rule_id: | ||
+ | * **Rule_name: | ||
+ | * **Rule_description: | ||
+ | * **Rule_type: | ||
+ | * 0: Configuration: | ||
+ | * 1: Command: The rule applies to the results of a command, performed on the node. This is not yet supported. | ||
+ | * 3: Multiconfig: | ||
+ | * **Rule_scope: | ||
+ | * 0: Search for the lines between and including the lines that match Rule_start and Rule_end | ||
+ | * 1: Split the config up into blocks and match the blocks starting with Rule_start. Also works hierarchical and sub-blocks can be found by the first lines of their parents. | ||
+ | * **Enabled: | ||
+ | * 0: The rule is not enabled and will be ignored when evaluating compliance | ||
+ | * 1: The rule is enabled. Default. | ||
+ | * **Rule_severity: | ||
+ | * **Vendor_type: | ||
+ | * **Rule_start: | ||
+ | * **Rule_end: | ||
+ | * **Command: | ||
+ | * **Template: | ||
+ | |||
+ | |||
+ | ==== Conditions ==== | ||
+ | |||
+ | A rule can have a number of conditions. There are two types of conditions: validation and logic conditions. A rule's conditions are in sequence. Together they form a condition logic that needs to comply with the rule's config block in its entirety for the rule to be compliant. A condition has the following attributes: | ||
+ | * **Rule_id: | ||
+ | * **Condition_id: | ||
+ | * **Condition_seq: | ||
+ | * **Condition_name: | ||
+ | * **Condition_type: | ||
+ | * A logic condition can have type If, Then, Else, And, Or, ( or ) | ||
+ | * A validation condition in a Configuration rule can have type ConfigBlock, | ||
+ | * **Condition_logic: | ||
+ | * 0: This is a validation condition | ||
+ | * 1: This is a logic condition | ||
+ | * **Condition_lines: | ||
+ | * **Condition_lines_exclude: | ||
+ | * **Condition_include: | ||
+ | * 0: The block must contain lines that contain Condition_lines, | ||
+ | * 1: The block must not contain Condition_lines | ||
+ | * 2: The block must contain exact matches of the lines of Condition_lines | ||
+ | * 3: The block must in exact matches of the lines of Condition_lines, | ||
+ | * **Condition_order: | ||
+ | * 0: The condition lines can match in any order | ||
+ | * 1: The condition lines should match in exact order | ||
+ | * **Condition_regex: | ||
+ | * 0: The condition lines is just plain text | ||
+ | * 1: The condition lines can contain regex | ||
+ | * **Leading_spaces: | ||
+ | * 0: The condition lines will ignore any leading spaces when parsing | ||
+ | * 1: The condition lines will parse the exact amount of leading spaces. Config lines that don't have the exact amount of leading spaces are non-compliant. | ||
+ | * **Random_word_order: | ||
+ | * 0: The condition lines will only match if the words are in exact order | ||
+ | * 1: The condition lines will match any line as long as they contain all of the line's words; order doesn' | ||
+ | ==== Compliance nodes ==== | ||
+ | Policy checks are stored in as a compliance node. Each combination of node to policy is stored separately. The nccmd daemon uses it to check when it should check for compliance and its results are bundled to create reports. A compliance node has the following attributes: | ||
+ | |||
+ | * **Policy_id: | ||
+ | * **Policy_schedule_id: | ||
+ | * **Hostname: | ||
+ | * **Vendor_type** The node's vendor type | ||
+ | * **Status:** The result of the compliance node's compliance check: | ||
+ | * 0: Non-compliant | ||
+ | * 1: Compliant | ||
+ | * **Severity: | ||
+ | * **Node_scope: | ||
+ | * 0: This is an yce node | ||
+ | * 1: This is a cmdb node | ||
+ | * **Schedule_time: | ||
+ | * **Report_id: | ||
+ | * **Report_summary: | ||
+ | * **Last_change_date: | ||
+ | * **Last_check_date: | ||
+ | * **Server:** The server currently checking the policy on this node for compliance. This makes sure that if a server is currently busy with this record, another server cannot also claim it. If it's empty then this compliance node is not currently active and can be claimed by the first server who wants to claim it. | ||
+ | * **Schedule_servers: | ||
+ | * **Policy_group_ids: | ||
+ | * **Nccm_id: | ||
+ | |||
+ | |||
+ | A few notes: This table does not maintain history. If a compliance check for a policy is performed on a node, it will overwrite the currently existing values. If a node group is removed from a policy, all its nodes also removed from this table, unless they happen to be present in a different node group. The nccmd daemon will do this, so the deletion won't be instantaneously, | ||
+ | |||
+ | In the same way, if you update a policy, its nodes area also automatically re-evaluated for compliance to see if they are still compliant to the policy' | ||
+ | |||
+ | ==== Policy Schedules ==== | ||
+ | Policy schedules are used to schedule a compliance check for a certain time, controlled by the user. Policy schedules will be available in Compliance Phase 2. A policy schedule has the following attributes: | ||
+ | |||
+ | * **Policy_schedule_id: | ||
+ | * **Policy_id: | ||
+ | * **Status:** The schedule' | ||
+ | * 0: Disabled (it will not be used when scheduling new policies) | ||
+ | * 1: Enabled | ||
+ | * **Time_interval: | ||
+ | * **Hour of day**: This schedule will be for every day, at certain hours of the day. You can specify multiple hours (separated by a comma, for example 16,20), and even ranges of hours (separated by a dash, for example 4-6). The first and last checkbox are shortcuts for 0:00 and 23:00 respectively. | ||
+ | * **Every x days**: This schedule will take place every x days. Only one number is allowed, and you can set the schedule time for up to the whole hour. | ||
+ | * **Day of week**: This will schedule based on the day of the week, denoted by its two-letter abbreviation: | ||
+ | * **Day of month**: This will schedule based on the day of the month, from 1 to 31, where non-existing days like February 30th will be ignored. Commas to denote multiple days and dashes to denote ranges are also supported. First is a shortcut for the first day of the month, and last for the last, depending on what month it is. You can also set the schedule time for up to the whole hour. | ||
+ | * **Repeating: | ||
+ | * 1: Repeating | ||
+ | * 0: Non-repeating (It will be disabled after being scheduled) | ||
+ | |||
+ | ==== Command replies ==== | ||
+ | |||
+ | Command replies store the result of a command, defined as a command rule. There is no history in this table. Here are its attributes: | ||
+ | |||
+ | * **Cmd_reply_id: | ||
+ | * **Hostname: | ||
+ | * **Policy_id: | ||
+ | * **Rule_id: | ||
+ | * **Response_text: | ||
+ | * **Variables: | ||
+ | * **Parse_error: | ||
+ | * 1: There was an error. Rules that use this reply will automatically be non-compliant. | ||
+ | * 0: Everything is okay. | ||