-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify discovery method #48
base: develop
Are you sure you want to change the base?
Conversation
Currently, network_discovery uses icmp, as can be seen (here)[https://github.com/netboxlabs/orb-discovery/blob/develop/network-discovery/policy/runner.go#L71]
@IamLunchbox we are currently working on leveraging additional discovery capabilities of Nmap, including TCP port scanning, that will make this change inaccurate. Is that something that would interest you? Do you have thoughts on how such discovery should be configured and controlled? (for example, only scan a pre-defined set of ports or have the ability to configure what ports to scan?) |
I think that would be a very nice addition to improve the IPAM and observability possibilities of netbox! If orb would automatically populate service facts of a given IP-adress, this knowledge could, for example, be used to audit for documentation and configuration errors. In that regards i'd like to add, that it would be nice if more IPAM fields could be populated by orb. For example, I would like to tag and PTR the scanned IP-adresses as well. But currently, PTR would require a custom script and all tagging / comments would currently apply for ALL findings, since several policy entries are heavily deduplicated. I suppose at least the following customizations to a scan could be interesting for many users:
|
Another thing, but it might not be scoped for orb agent: It would be nice, if ip-addresses, which disappear, would be removed from netbox again. In dynamic infrastructures ips might appear and disappear again while the ip-adress prefix in netbox only seemingly fills up. |
Currently working on these as improvements to network discovery. Do you use Nmap directly? Do you have your "favourite" set of Nmap command options you use? |
I would recommend sticking to sane defaults for service discovery:
But i did not built anything in netbox regarding portscans, I usually use portscans adhoc to find something in my network. |
Currently, network_discovery uses icmp, as can be seen here