GLPI is integrated into NetEye and provides powerful asset management solutions.
Usually GLPI agents are deployed on servers and clients: this way an up-to-date asset inventory is kept within NetEye.
The GLPI package also provides a tool able to perform network SNMP scans, detecting for example network printers, switches, and routers, as well as a tool aimed at inventorying VMware vCenter and/or ESXi.
These tools can be scheduled to run on any server, but the best place to run them is on a NetEye satellite, because it already has its firewall configuration ready for SNMP discovery, which is used also by the Icinga 2 monitoring part.
Data Collected
The GLPI net SNMP discovery is able to collect a lot of useful information from the printers: for example, the complete hardware configuration, toner status, and so on.
Here’s an example of the data retrieved for a printer:
And here’s an example of a network switch:
with its related interface status:
The GLPI ESX inventory is mainly used against a VMware vCenter: it’s able to collect the entire VMware farm configuration, ESXi hypervisors connected to the vCenter, and the configured VMs.
For example here’s an ESXi status:
with all the VMs running on this ESXi:
The inventoried VM is automatically linked to a computer GLPI object if there has already been an inventory performed through a local installed agent (see the links in the Machine column on the far right side).
How to Set Up the GLPI Network Inventory
The GLPI network discovery process requires several Perl modules.
On a NetEye satellite, the following modules must be installed:
This will produce several XML files under /tmp/netinventory folder, one for each device. There’s a similar command for a vCenter or ESXi GLPI inventory:
My name is Alessandro and I joined Würth-Phoenix early in 2013. I have over 20 years of experience in the IT sector: For a long time I've worked for a big Italian bank in a very complex environment, managing the software provisioning for all the branch offices. Then I've worked as a system administrator for an international IT provider supporting several big companies in their infrastructures, providing high availability solutions and disaster recovery implementations. I've joined the VMware virtual infrastructure in early stage, since version 2: it was one of the first productive Server Farms in Italy. I always like to study and compare different technologies: I work with Linux, MAC OSX, Windows and VMWare. Since I joined Würth Phoenix, I could also expand my experience on Firewalls, Storage Area Networks, Local Area Networks, designing and implementing complete solutions for our customers. Primarily, I'm a system administrator and solution designer, certified as VMware VCP6 DCV, Microsoft MCP for Windows Server, Hyper-V and System Center Virtual Machine Manager, SQL Server, SharePoint. Besides computers, I also like photography, sport and trekking in the mountains.
Author
Alessandro Romboli
My name is Alessandro and I joined Würth-Phoenix early in 2013. I have over 20 years of experience in the IT sector: For a long time I've worked for a big Italian bank in a very complex environment, managing the software provisioning for all the branch offices. Then I've worked as a system administrator for an international IT provider supporting several big companies in their infrastructures, providing high availability solutions and disaster recovery implementations. I've joined the VMware virtual infrastructure in early stage, since version 2: it was one of the first productive Server Farms in Italy. I always like to study and compare different technologies: I work with Linux, MAC OSX, Windows and VMWare. Since I joined Würth Phoenix, I could also expand my experience on Firewalls, Storage Area Networks, Local Area Networks, designing and implementing complete solutions for our customers. Primarily, I'm a system administrator and solution designer, certified as VMware VCP6 DCV, Microsoft MCP for Windows Server, Hyper-V and System Center Virtual Machine Manager, SQL Server, SharePoint. Besides computers, I also like photography, sport and trekking in the mountains.
Alerts are critical signals that demand immediate attention to minimize disruptions and maintain smooth operations. Proactively managing alerts throughout their lifecycle is key to effective event-driven workflows, incident response, and business continuity. By leveraging alerting tools within Jira Service Management Read More
Synopsis Important: Icinga2 security update Type/Severity Security Advisory: Critical Topic An update for the package icinga2 is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More
Synopsis Important: GLPI security update Type/Severity Security Advisory: Critical Topic An update for the package glpi is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More
Hello everyone! As you may remember, a topic I like to discuss a lot on this blog is the Proof of Concept (POC) about how we could enhance search within our online NetEye User Guide. Well, we're happy to share Read More
In the ever-evolving landscape of IT monitoring and management, the ability to efficiently handle multi-dimensional namespaces is crucial. Within NetEye, Log-SIEM (Elastic), provides a comprehensive solution for managing the single namespace dimension with the namespace of a data_stream. This blog Read More