Configuring IRE Rules

Configuring IRE Rules

Under SummitAI Discovery application, you can create IRE rules and set priority to discover the assets in a target platform. 

Note

To enable IRE, we have to add Keys to both Proxy and DC.

To configure the IRE Rules, perform the following steps:

  1. Navigate to Admin > Discovery Monitoring > IRE rule.

  2. Click ADD NEW on the ACTION PANEL to configure new IRE RULE. The IRE RULES page is displayed as shown below.

    Figure:  IRE RULES Page

  3. Enter the details for configuring the IRE Rules. For example: You can define the Rule Name as RED HAT Linux, Rule Type as Hardware (system configured), Target Platform as Linux, Device Type as ESXi or SUSE or Select All, System Type as Computer, and select the Vendor type as HP from the list.

    Note

    Target platform and Device type are not mandatory for configuring IRE Rules.

  4. Select the Sync Rule as Now to process the rule immediately.

    Figure:  Configuring IRE Rule
    For more information about fields on the IRE Rules, see Field Description.

     Field Description

    Field

    Description

    DETAILS

    Tenant

    Select the name of the Tenant.

    Rule Name

    Type in the name of IRE Rule.

    Rule Type

    Select the type of rule (Hardware or Software).

    Target Platform

    Select the name of device class from the list.

    Device Type

    Select the type of device from the list.

    System Type

    Select the type of system from the list.

    Vendor

    Select the type of Vendor from the list.

    Sync Rule

    Select the option Now or Later to apply the rule.

    Active

    Select this check box to enable the IRE rule.

    Refer here for the screenshot of field data.

     Screenshot

    Figure:  Defining Rule Name

  5. Click the edit icon under the Action column to modify Source and Priority in the default configuration template. 


    A pop-up is displayed under Source and Priority with Priority, Source and Action.


  6. You can also edit the Priority and Source from the list and set the preference to get best data from the discovery sources. By default, Agent is selected as Priority 1 as it returns maximum data from the different sources.

  7. Click the add icon to add new rule to the list.

    Note

    Source and Priority mapping must be unique.

  8. Click the copy icon  to copy configuration to all the attributes.


     Figure: Source and Priority pop-up window

    The list of configured Source and Priority is displayed under the Source and Priority table as shown below:

    Figure: Configuration of Source and Priority table

  9. Navigate to the edit icon under the Action for a specific Column Name column to modify Source and Priority in the default configuration template. 

    In addition to the default configuration rule, users can create rules in four different ways using the following icons under the Action column: Copy One Below, Copy All Below, Copy One Above, Copy All Above

    For example: Click the Delete icon under the Actions column to remove the Priority 3 and 4 from the Priority and Source. (The figure below displays the SOURCE & PRIORITY pop-up for COLUMN: SYSTEM NAME)

    Figure: Source and Priority for COLUMN: SYSTEM NAME

    You can perform following actions from the Actions column (Copy One Below, Copy All Below, Copy One Above, Copy All Above) under Source and Priority table of the IRE RULE page.

     Actions

    Icons

    Description

    Copy One Below


    Click first icon     to apply the same configuration to the attribute just below the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:


    Copy All Below

    Click second icon    to apply the same configuration to the attribute below the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:

       Copy One Above

    Click third icon  to apply the same configuration to the attribute just above the COLUMN: SYSTEM NAME. Based on the configuration, the following fields are displayed for the Tenant:


    Copy All Above

    Click the fourth icon to apply the configuration to all attributes. You can apply same configuration to all source attributes above the configured of the Incident Management module for a Tenant. Based on the configuration, the following fields are displayed for the Tenant:


  10. Select Override to override the existing value for the null or empty value.


  11. Click to apply or   to cancel the IRE RULE.

Viewing the IRE RULE list

To view the configured IRE RULE list, perform the following steps to display the IRE RULE List:

  1. Navigate to ACTIONS Panel and click SHOWLIST

    Figure: SHOW LIST tab on the ACTION Panel

    Info

    • Tenant which is mapped with proxy will be displayed only in Tenant dropdown list.
    • Check Active to include all active source attributes.

    The list of IRE RULES is displayed in the SHOWLIST page.



  2. Click on any of these Rule Name to view the details of rule configuration. 


    For example: If IRE RULE is selected under Rule Name, then a new page is displayed for IRE RULE as shown in the screenshot below:

      Screenshot

  3. Click the FILTER icon on the ACTIONS under the IRE RULE page to filter the IRE Rule records based on the desired criteria. A FILTERS pop-up window is displayed.

     Figure: FILTERS

  4. Enter the field details and on the FILTERS pop-up window, click SUBMIT.

     Figure: Sample field details in FILTERS window

    The filtered list of IRE RULE records page is displayed as below:



    Note

    Select to include all inactive source attributes.