The Configuration Monitor Settings form allows you to edit the manner in which the selected device is monitored by Entuity.
This functionality requires the Configuration Monitor tool permission. Please see this article for further help and information on tool permissions in Entuity.
Configuration Monitor Settings form
This form is accessible from a number of places:
- via the right-click Context Menu on a device.
- from the Configuration Monitoring dashboard:
- from the Configuration Monitor Settings dashlet:
The form will then open. It contains three sections: Credential, Retrieval, and Policies.
In this section, you can specify the config management access credentials. Click the field to open the Credential form, from where you can either search from a list of shared credential sets, or create a local Config Management credential. Please see this section for further help and information on credentials.
In this section you can see or specify the following:
- Retrieval Task - specify from the dropdown field the retrieval task that you want to look at.
- Transfer Method - specify from the dropdown field the transfer method to used for the task, from the following:
- Nightly Retrieval - switch on or off to specify the nightly retrieval of configurations.
- Max Number of Archives - specify how many versions of the device configuration files are to be kept in the Archive folder. The default is 20, the maximum is 200.
- Max Number of Favorites - specify the number of favorites, which will not be deleted. The default is 10, the maximum is 100. Please see this section for help on specifying configuration favorites.
- Change Based Retrieval - switch on or off to specify if Entuity is allowed to check for changes in either the startup or running configuration files time.
In this section, you can specify the rule files. From Entuity v20.0 upwards, you can select these from the dropdown list rather than entering the exact file name.
- In the Policy Rules field, enter the policy rule file. Please see this article for further help and information on policy violation rules.
- In the Excludes Files field, enter the file that identifies configuration patterns that can be safely ignored when non-trivial configuration changes are found. Please see this article for further help and information on exclusion files.