guides:reference:compliance:cmpl_signalling
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
guides:reference:compliance:cmpl_signalling [2021/11/02 10:34] – [Email] [email protected] | guides:reference:compliance:cmpl_signalling [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{indexmenu_n> | ||
+ | |||
+ | ====== Compliance signalling ====== | ||
+ | |||
+ | ===== Signalling ===== | ||
+ | |||
+ | A compliance check can have one of the following results: | ||
+ | * A compliant node becomes non compliant | ||
+ | * A non-compliant node becomes compliant | ||
+ | * A non-compliant node stays non-compliant | ||
+ | * A compliant node stays compliant | ||
+ | |||
+ | Whether an action should be undertaken after a policy check is stored in the policy' | ||
+ | * Bit 1: compliant to non-compliant | ||
+ | * Bit 2: non-compliant to compliant | ||
+ | * Bit 4: non-compliant to non-compliant | ||
+ | * Bit 8: compliant to compliant | ||
+ | |||
+ | This setting is available in the front-end when editing a policy using four separate check-boxes | ||
+ | |||
+ | There are four ways we can send signals, which is stored in the policy' | ||
+ | * Bit 1: A trap message | ||
+ | * Bit 2: A syslog message | ||
+ | * Bit 3: An email message | ||
+ | * Bit 4: A REST API ' | ||
+ | |||
+ | This setting is available in the front-end when editing a policy using four separate check-boxes allowing for multiple signal types for the same event. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | These signal messages need setting-up for the environment and mostly requires the definition of the remote targets and priority. Configure these in the file '' | ||
+ | |||
+ | It contains a simple perl struct, containing a section for each of the four different signal types. | ||
+ | |||
+ | |||
+ | ===== Traps ===== | ||
+ | |||
+ | An SNMP (v2) trap has the following parameters that can be configured: | ||
+ | |||
+ | * **enterprise: | ||
+ | * **specific: | ||
+ | * **varoid:** the trap's varoid | ||
+ | * **community** the trap community string | ||
+ | * **tmsg:** the compliance-event will create its own trap-message. Include your own message to override it. The compliance-event message will still be included in the trap. | ||
+ | * **no_spoof: | ||
+ | * **nmsaddr: | ||
+ | |||
+ | The compliance-event message formats: | ||
+ | < | ||
+ | when compliant: | ||
+ | [CMPL] Node < | ||
+ | |||
+ | when not-compliant: | ||
+ | [CMPL] Node < | ||
+ | </ | ||
+ | |||
+ | The relevant entries in the '' | ||
+ | |||
+ | < | ||
+ | # Available values: | ||
+ | # - trap | ||
+ | # - enterprise | ||
+ | # - specific | ||
+ | # - varoid | ||
+ | # - community | ||
+ | # - tmsg # optional trap-message override. use undef to use default cmpl messages | ||
+ | # - messages (array) | ||
+ | # - nmsaddr (array) | ||
+ | |||
+ | our $cmpl_signals = { | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | " | ||
+ | " | ||
+ | ], | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ], | ||
+ | }, | ||
+ | # | ||
+ | # ... other signal-type definitions | ||
+ | # | ||
+ | }; | ||
+ | </ | ||
+ | |||
+ | The trap will also include additional compliance variables associated with the event: | ||
+ | * Hostname | ||
+ | * Vendor_type | ||
+ | * Node_fqdn | ||
+ | * Node_ipv4_addr | ||
+ | * Node_ipv6_addr | ||
+ | * Policy_id | ||
+ | * Policy_name | ||
+ | * Nccm_id | ||
+ | * Cmpl_node_id | ||
+ | * Severity | ||
+ | * Status | ||
+ | * Server | ||
+ | * Report | ||
+ | The values for these variables include the variable name in the "< | ||
+ | |||
+ | By default the SNMP Trap messages (udp) are ' | ||
+ | of the source ip-address of the Trap message by replacing the server address with the node address. | ||
+ | |||
+ | The SNMP Trap will use the node ip-address instead of the NetYCE server as the source if the | ||
+ | node-fqdn can be resolved using the DNS in an ipv4 address. Otherwise the NetYCE server will | ||
+ | be used as the source address: | ||
+ | |||
+ | * The node name must exist in YCE or CMDB and have an Node_fqdn defined | ||
+ | * If the Node_fqdn is an ipv4, use that address as the (spoofed) agent-address | ||
+ | * If the Node_fqdn can be resolved in an ipv4, use that address as the (spoofed) agent-address | ||
+ | * Otherwise the NetYCE server' | ||
+ | |||
+ | To disable trap spoofing add "' | ||
+ | |||
+ | ===== Syslog ===== | ||
+ | |||
+ | The compliance-event can send a syslog message to one or more remote syslog receivers using a configurable syslog facility and priority. | ||
+ | |||
+ | The syslog message format: | ||
+ | < | ||
+ | when compliant: | ||
+ | [CMPL] Node < | ||
+ | when not-compliant: | ||
+ | [CMPL] Node < | ||
+ | </ | ||
+ | |||
+ | All syslog messages are assigned a ' | ||
+ | < | ||
+ | Valid ' | ||
+ | kern user mail daemon auth syslog lpr news uucp cron authpriv ftp | ||
+ | local0 local1 local2 local3 local4 local5 local6 local7 | ||
+ | |||
+ | Valid ' | ||
+ | emerg alert crit err warning notice info debug | ||
+ | </ | ||
+ | |||
+ | The relevant entries in the '' | ||
+ | |||
+ | < | ||
+ | # - syslog | ||
+ | # - facility | ||
+ | # # one of: kern|user|mail|daemon|auth|syslog|lpr|news|uucp|cron|authpriv|ftp| | ||
+ | # # local0|local1|local2|local3|local4|local5|local6|local7 | ||
+ | # - priority | ||
+ | # # one of: emerg|alert|crit|err|warning|notice|info|debug | ||
+ | # - priority_map | ||
+ | # - nmsaddr (array) | ||
+ | |||
+ | our $cmpl_signals = { | ||
+ | ' | ||
+ | ' | ||
+ | # translate the event severity to the desired priority | ||
+ | ' | ||
+ | # ' | ||
+ | # ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | # ' | ||
+ | # ' | ||
+ | }, | ||
+ | # the default priority | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ], | ||
+ | }, | ||
+ | # | ||
+ | # ... the other signal-types | ||
+ | # | ||
+ | }; | ||
+ | </ | ||
+ | |||
+ | The ' | ||
+ | |||
+ | The default set of ' | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | The sample configuration shows that these are mapped to an appropriate syslog ' | ||
+ | |||
+ | ===== Email ===== | ||
+ | |||
+ | The compliance-event can send an email message to one or more email-addresses. | ||
+ | |||
+ | > Note: Sending email messages as notifications doesn’t scale well. There is significant processing overhead involved in sending emails compared to traps or syslog which will make sending hundreds or even thousands of mail messages undesirable at least. Not to speak of a mailbox being bombed that way. **This signalling type should be reserved for special cases or during development of new policies only.** | ||
+ | |||
+ | |||
+ | The relevant entries in the '' | ||
+ | |||
+ | < | ||
+ | |||
+ | # - subject | ||
+ | # - mail_to | ||
+ | # # | ||
+ | # - mail_from | ||
+ | #. - attach_report_body # if set to 1, it will attach the report text to the email body, truncated to 500 lines | ||
+ | # - messages (array) | ||
+ | # | ||
+ | |||
+ | our $cmpl_signals = { | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ], | ||
+ | ' | ||
+ | # optinal lines included in the email trailer | ||
+ | ' | ||
+ | " | ||
+ | " | ||
+ | ], | ||
+ | }, | ||
+ | # | ||
+ | # ... other signal-types | ||
+ | # | ||
+ | }; | ||
+ | </ | ||
+ | |||
+ | The '' | ||
+ | |||
+ | The '' | ||
+ | |||
+ | The '' | ||
+ | |||
+ | < | ||
+ | when compliant: | ||
+ | < | ||
+ | |||
+ | when not-compliant: | ||
+ | < | ||
+ | </ | ||
+ | |||
+ | The mail body will also include additional compliance variables associated with the event: | ||
+ | |||
+ | * Hostname | ||
+ | * Vendor_type | ||
+ | * Policy_id | ||
+ | * Policy_name | ||
+ | * Nccm_id | ||
+ | * Cmpl_node_id | ||
+ | * Severity | ||
+ | * Status | ||
+ | * Server | ||
+ | * Report | ||
+ | The values for these variables include the variable name in the “< | ||
+ | |||
+ | The mail body uses the format: | ||
+ | |||
+ | < | ||
+ | This is an automatically generated notification | ||
+ | message, please do not reply | ||
+ | ---------------------------------------- | ||
+ | |||
+ | < | ||
+ | :: | ||
+ | :: ... list of compliance variables | ||
+ | :: | ||
+ | You can view the policy details at: | ||
+ | < | ||
+ | |||
+ | ---------------------------------------- | ||
+ | :: | ||
+ | :: ... optional report body (set it with the attach_report_body setting) | ||
+ | :: | ||
+ | |||
+ | |||
+ | |||
+ | :: | ||
+ | :: ... optional trailing messages | ||
+ | :: | ||
+ | |||
+ | Issued by < | ||
+ | </ | ||
+ | |||
+ | The resulting mail is sent as plain text to each of the addresses in the mail_to list. | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | ===== REST-API ===== | ||
+ | |||
+ | > Note: The configuration of the ' | ||
+ | |||
+ | The REST API call is a POST transaction in JSON format to a single remote host at a specific url. | ||
+ | |||
+ | Apart of a couple of mandatory attributes, the REST POST message can be customized to fair degree. The mandatory attributes pertain to the definition of the targeted host/url and its authorization. All other attributes in the JSON message must be specified and assigned a value. To create values (strings only) the configuration will use the provided strings as templates where < | ||
+ | |||
+ | The default rest-api configuration demonstrates the use of all available < | ||
+ | If the current (default) configuration of the rest-api section does not match the section below, cut and paste it from here or copy it from the '' | ||
+ | |||
+ | The REST call has the following mandatory parameters that can be set: | ||
+ | * host: The host ip or fqdn to post too. Has to include the transfer protocol (" | ||
+ | * url: The URL path of the REST API to post too. Must have a leading ''/'' | ||
+ | * webtoken: Optional bearer AUTH's webtoken | ||
+ | * username and password: optional; basic authentication username and password | ||
+ | |||
+ | < | ||
+ | # - rest-api | ||
+ | # - host # host web address eg: ' | ||
+ | # - url # Rest-api url part of address: '/ | ||
+ | # - username | ||
+ | # - password | ||
+ | # - webtoken | ||
+ | # - attibutes | ||
+ | # to create their values. Variables: | ||
+ | # < | ||
+ | # < | ||
+ | # < | ||
+ | # | ||
+ | |||
+ | our $cmpl_signals = { | ||
+ | ' | ||
+ | # mandatory host/url to Rest-post to using Json | ||
+ | ' | ||
+ | ' | ||
+ | |||
+ | # Rest authorization as required | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | |||
+ | # customizable attributes (create desired attributes and values using < | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | |||
+ | # more attributes can be structured as fitting | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | }, | ||
+ | } | ||
+ | }; | ||
+ | </ | ||
+ | |||
+ | The example above also shows that attributes can be grouped forming a data structure. | ||
+ | |||
+ | |||
+ | ==== Previous format ==== | ||
+ | |||
+ | >> below this point the older configuration method of the ' | ||
+ | |||
+ | The REST API call is a POST transaction in JSON format to a single remote host at a specific url. The REST call has the following parameters that can be set: | ||
+ | * host: The host ip or fqdn to post to. Has to include the transfer protocol (" | ||
+ | * url: The URL path of the REST API to post to. Must have a leading ''/'' | ||
+ | * webtoken: Optional bearer AUTH's webtoken | ||
+ | * username and password: optional; basic authentication username and password | ||
+ | |||
+ | The relevant entries in the '' | ||
+ | |||
+ | < | ||
+ | # - rest-api | ||
+ | # - host # host web address eg: ' | ||
+ | # - url # Rest-api url part of address: '/ | ||
+ | # - username | ||
+ | # - password | ||
+ | # - webtoken | ||
+ | # - parameters | ||
+ | # | ||
+ | |||
+ | our $cmpl_signals = { | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | ' | ||
+ | # optional struct of data | ||
+ | ' | ||
+ | }, | ||
+ | # | ||
+ | # ... other signal-types | ||
+ | # | ||
+ | }; | ||
+ | </ | ||
+ | |||
+ | The optional '' | ||
+ | |||
+ | The submitted JSON structure will have various attributes. The attribute '' | ||
+ | |||
+ | The format of this message: | ||
+ | < | ||
+ | when compliant: | ||
+ | [CMPL] Node < | ||
+ | when not-compliant: | ||
+ | [CMPL] Node < | ||
+ | </ | ||
+ | |||
+ | The JSON will also include additional compliance variables associated with the event: | ||
+ | * Hostname | ||
+ | * Vendor_type | ||
+ | * Node_fqdn | ||
+ | * Node_ipv4_addr | ||
+ | * Node_ipv6_addr | ||
+ | * Policy_id | ||
+ | * Policy_name | ||
+ | * Nccm_id | ||
+ | * Cmpl_node_id | ||
+ | * Severity | ||
+ | * Status | ||
+ | * Server | ||
+ | * Report | ||
+ | The '' | ||
+ | |||
+ | |||