Configuration Auditing 101
If it were possible, we would have our special Level-40 Night Elf Druid use his inscription skills to create the “Dark Tome of Configuration Auditing” for you, but this being the real world, we will attempt to provide a brief but good foundation for configuration auditing in support of high availability. As with everything about the network, configuration audits require planning before you can implement them successfully. The key to any good configuration audit is to understand that consistency across network device configurations is one of the best and easiest-to-use techniques you can employ to guarantee high availability.
Organizing the Audit
The key to good configuration auditing is to develop rules and a template that create the most useful information, while still being efficient. JUNOScope provides the ability to monitor changes made to each and every configuration on networking equipment in detail, but the information can be unwieldy for an overall view of the network and its high availability stance. Through careful planning of what configuration pieces are most important for continuous systems and the use of audit templates designed for functional areas of the network, not for individual devices, you can more accurately get a snapshot of the overall network condition.
Configuration modules
Dividing the initial templates for audit configurations into the functional areas within the configuration allows you to mix and match modules to build very granular ...
Get JUNOS High Availability now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.