menu:cmpl:policies
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
menu:cmpl:policies [2022/04/12 07:22] – [Conditions] pgels | menu:cmpl:policies [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{indexmenu_n> | ||
+ | |||
+ | ===== Policies ===== | ||
+ | |||
+ | In this form you can create, test and manage compliance policies, rules and conditions. A policy is tested on a node, to return either compliant or non compliant. A policy contains various vendor type specific rules, each of these rules contains a string of conditions that together form a logic the rule tests at. Only if all rules for the node's vendor type are compliant, is the policy compliant for this node. | ||
+ | |||
+ | ==== Policies ==== | ||
+ | |||
+ | The policy grid: | ||
+ | |||
+ | {{menu: | ||
+ | |||
+ | You can create a new policy, edit an existing one and you can duplicate it. The copy will contain all of the policy' | ||
+ | |||
+ | A few caveats about importing from HPNA: | ||
+ | * a rule with a vendor type not supported by NetYCE will not work, a list of supported vendors can be found [[guides: | ||
+ | * diagnostics rules are not supported. NetYCE' | ||
+ | |||
+ | The grid on the right contains all node groups linked to this policy. All nodes belonging to these node groups will be validated on compliance, unless the policy in question is disabled (you can see this on the status-column of the policy grid). The scope can be either ' | ||
+ | |||
+ | === Edit Policy === | ||
+ | |||
+ | {{ menu: | ||
+ | |||
+ | The options (Trap, Syslog, Email and REST API) presented under Signal type represent the available actions to be undertaken upon the compliance result. This can be triggered in four different ways: | ||
+ | |||
+ | * From compliant to non-compliant | ||
+ | * From non-compliant to compliant | ||
+ | * From non-compliant to non-compliant | ||
+ | * From compliant to compliant | ||
+ | |||
+ | The most important option is whenever a node changes from compliant to non-compliant. | ||
+ | |||
+ | You can enable or disable a policy here with its checkbox // | ||
+ | |||
+ | === Test Policy === | ||
+ | |||
+ | {{ menu: | ||
+ | |||
+ | Policies can get quite complex, and testing them is difficult when you're working with live nodes and a daemon that only runs periodically. This form is meant to give you a quick option to test whether your policies do what they' | ||
+ | |||
+ | An important caveat is this: the form checks the policy on the config of the node that's saved in the NCCM, it will not poll the node whatsoever. This means that for this to work, you do need to have an NCCM config for the node in the database, otherwise this function will not work. | ||
+ | |||
+ | ==== Rules ==== | ||
+ | |||
+ | {{menu: | ||
+ | |||
+ | Rules are vendor type bound: only for nodes with that vendor type will they be evaluated. There are three types of rules: Configuration, | ||
+ | * Configuration rules take a config or a part of the config (as signified by Rule_start and Rule_end) and runs a number of conditions on it. | ||
+ | * Command rules take the output of a command on the node, and compares it to a number of conditions. Future plans are also to parse these into variables using command parsing. This feature is not yet available and will be in future netYCE releases. | ||
+ | * Multi-config rules compare the config to the config of one to three other nodes, to see if they are equal. For more information, | ||
+ | |||
+ | You can create, edit, duplicate and delete rules and search through them. A rule's conditions combine together with a ' | ||
+ | |||
+ | === Edit Rule === | ||
+ | |||
+ | {{ menu: | ||
+ | |||
+ | In the rule edit form you define the part of the config you will check against. There are two ways to do this: **Search based on lines** and **Search based on config blocks**. | ||
+ | |||
+ | When you search configs based on lines, the compliance will look for lines in the config that match Rule start. When it finds one, it will mark the block starting with this line, until it encounters either a line that matches Rule end or the end of the config. If multiple blocks are found this way they will all be checked for compliance. Regular expressions are also supported. | ||
+ | |||
+ | Sometimes though, it is hard to know for sure how a block will end. Or in cases like Juniper, where blocks within blocks all contain the same characters. For this there is also the option to search based on blocks. To explain config blocks: a config consists out of a number of text blocks. Think of a block as follows: | ||
+ | |||
+ | < | ||
+ | block head | ||
+ | block body | ||
+ | block body | ||
+ | block body | ||
+ | ! | ||
+ | </ | ||
+ | |||
+ | Or: | ||
+ | |||
+ | < | ||
+ | block a | ||
+ | block b | ||
+ | block c | ||
+ | block d | ||
+ | </ | ||
+ | |||
+ | Or even hierarchical: | ||
+ | |||
+ | < | ||
+ | block head | ||
+ | block body | ||
+ | block body | ||
+ | block body | ||
+ | | ||
+ | subblock body | ||
+ | subblock body | ||
+ | subblock body | ||
+ | block body | ||
+ | ! | ||
+ | </ | ||
+ | |||
+ | **Rule start** looks at these block heads, and returns all blocks where they match. | ||
+ | |||
+ | Some vendors, Juniper for instance, have complex hierarchical trees within their blocks. If you want to match sub blocks, you can put down the first lines all the parent blocks, followed by the first line of the sub block you want to match. For example a **Rule start** of: | ||
+ | |||
+ | < | ||
+ | block head | ||
+ | subblock head | ||
+ | </ | ||
+ | |||
+ | For each parent block, you need one line. They need to be in order, and can also contain regular expressions. | ||
+ | |||
+ | Do note that if no Rule start is provided, the whole config is taken. This goes both for when you search based on blocks or on lines. | ||
+ | |||
+ | Also note that some vendors do not support splitting up the config in blocks. These will be searched by lines by default. | ||
+ | |||
+ | |||
+ | === Create Logic === | ||
+ | |||
+ | Sometimes, you want to create complex rules that consist out of a lot of conditions, it might be annoying to keep creating new conditions one at a time. The form create logic is a bit of a shortcut for this use case: you can type in a valid string of condition logic and it will automatically create those conditions for you when you submit. For more information on how condition logic works, refer to this [[guides: | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | ==== Command Rules ==== | ||
+ | |||
+ | Command rules allow you to check the result of a command for compliance. The form is nearly identical for normal rules, with the addition of a Command-field: | ||
+ | |||
+ | {{ menu: | ||
+ | |||
+ | This is the command that will be run on the server. | ||
+ | |||
+ | Like all rules, these are limited per vendor type, so in this example, this rule will only be checked for HP C7 nodes. | ||
+ | |||
+ | **Rule start** and **Rule end** can be used to parse part of the reply. Since commands are easier to parse than entire config, these values can be plain text, or contain regular expressions. When using both a rule start and rule end, multiple blocks of text can be matched. Compliance will then be run on all blocks separately, like with configuration rules. | ||
+ | |||
+ | When you finish editing a command rule, the nodes that are linked to it are automatically scheduled for an nccm poll, following a compliance check. It will take the nccmd daemon a few minutes to get to it, but its update process is automated. | ||
+ | |||
+ | |||
+ | ==== Conditions ==== | ||
+ | |||
+ | {{menu: | ||
+ | |||
+ | There are two types of conditions: Conditions that test a config block, and logic conditions that tie everything together. Logic conditions can be either ' | ||
+ | |||
+ | === Edit condition === | ||
+ | |||
+ | {{: | ||
+ | |||
+ | You can switch between condition types using the "This is a logical condition" | ||
+ | |||
+ | You can select different condition types, and this determines what text will be used for the condition: | ||
+ | * **ConfigBlock: | ||
+ | * **ConfigText: | ||
+ | * **NodeModel: | ||
+ | * **SoftwareVersion: | ||
+ | * **Hostname: | ||
+ | |||
+ | This string of text will be compared to the condition' | ||
+ | * **Must contain:** For each condition line, the text needs to contain a line that matches it. Lines don't have to match exactly, as long as the condition' | ||
+ | * **Must not contain:** There should be no instance of any condition line in the text. | ||
+ | * **Must contain lines:** For each condition line, there needs to be a line in the text that matches it exactly | ||
+ | * **Must contain exactly:** The text should match each condition line, and there should be no other lines present | ||
+ | |||
+ | Additionally you can specify if the lines should contain regex or not. If the field "Must not contain any additional lines containing" | ||
+ | |||
+ | Conditions will by default be parsed without leading spaces on each line. If you want to be exact in the amount of leading spaces that are required, you can check the " | ||
+ | |||
+ | Sometimes, you encounter lines in a config like this: | ||
+ | |||
+ | < | ||
+ | ip-addresses { 192.168.0.1 192.168.0.8 172.0.0.1 194.175.16.22 111.24.35.128 192.168.0.2 } | ||
+ | </ | ||
+ | |||
+ | Where the ip addresses don't have a set order. F5 is an example of a vendor that can do this. For those cases, you can check the "Words can be in arbitrary order" | ||
+ | |||
+ | You can also parse relations and variables. For example, a line: | ||
+ | < | ||
+ | hostname < | ||
+ | </ | ||
+ | |||
+ | Will parse < | ||
+ | |||
+ | === Test condition === | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | In order to help you test whether your condition is valid, there is the test form. You can access it by the " | ||
+ | |||
+ | The test form validates your condition against a config block that you provide, so it doesn' | ||
+ | |||
+ | If the debug-checkbox is checked, the output will be a bit more detailed. | ||