Inventory
Last updated
Was this helpful?
Last updated
Was this helpful?
You can manage, through the assets :
Computers,
Monitors,
Software,
Network devices,
Devices,
Printers,
Cartridges,
Consumables,
Phones,
Racks,
Enclosures,
PDUs,
Passive devices,
Unmanaged devices (linked to inventory feedback)
Cables,
Simcards.
400 Bad Request, Protocol not supported
error but the inventory is running correctly?The 400 Bad Request, Protocol not supported
error is a normal error because it occurs for the Collect and Deploy tasks. These tasks are active by default when the agent is installed on windows but can only be operated if you use the GlpiInventory plugin.Hence the error in the absence of the plugin. You can therefore ignore these errors as it is the machine inventory that interests us here.
GLPI of course allows you to upload your workstations directly into your instance. You need to install the GLPI agent on the workstations concerned. You can download it here link and enter the address of your instance when installing it. You will find all the necessary documentation here
Since GLPI10, Fusion Inventory is no longer supported by GLPI. Inventory is now native. However, certain tasks (network discovery, collection, application deployment) are handled by the GLPI Inventory plugin available in the marketplace. It is also possible that following a server change, the IP is no longer the same. In this case, the DNS cache may be at fault. If the DNS modifications have been carried out correctly, the agents should gradually return to the new instance.
Computer groups facilitate management in task vectors. There are two types of computer group:
Static groups: a set of computers whose members are added manually. This makes it possible to control the deployment of a particular piece of software.
dynamic groups: these are the result of a search engine query. The machines in the group are calculated and the list varies over time.
The Assets allows you to manage your computer racks (front and rear). A wide range of information can be entered, like location, model, manufacturer, etc. You can adjust the number of units, height, wattage, identify where it is located in the server room, etc. When hardware is added to the rack, its position in the rack will also be visible from the hardware itself.
This can be done using blacklists. Simply add a new entry formatted in IPv6 ( Setup
> Dropdowns
> Blacklists
):
Check that the URL of your instance is correctly configured on the workstations concerned.
Check that the workstations have Internet access (or access to the company's internal network)
Check that the inventory is enabled (administration
> inventory
> Enable Inventory
)
deploy
, collect
and ESX inventory
tasks no longer work after a migration (9.x to 10.x)?If in the agent logs you see 2 requests with 2 different URLs, it is possible that the problem comes from a configuration from the entities:
From administration
> entities
assets
tab, it is possible to define the URL of another GLPI server in the Agent base URL
field. The agent will then retrieve the configuration of the task concerned from the server indicated. If a URL is entered in this field, delete it and run a new test.
URL Base for agent
field in entity administration?This field is used if you have multiple GLPI servers. When this field is set, (administration
> entities
, parc
tab Agent base URL
field) the agent will be able to retrieve the configuration of the deploy
, collect
and ESX inventory
tasks from the specified server. This avoids web server redirects if you don't want to use them.
You can get more information by consulting the logs.
The network discovery task doesn't get enough information to do an import in the Computer section of the assets. You should see your PCs in the unmanaged equipment
section or in the rejected equipment history
section. If it is an ESX, you just need to create an ESX task to inventory this machine.
It allows you to prioritise the elements of your network in order to visualise dependency relationships.
Example: Router --> Switch --> Rack --> Servers
Yes, you need to use the ESX task with GlpiInventory for VMWare inventories. For the others, you need to install the GLPI agent directly on the virtual machine. As soon as the agent is supported by the OS, the inventory will be possible.
GLPI's native inventory is able to reconcile the Alternate username
with the user
if a match is found.
Example
The user is "johndoe@AzureAD". GLPI then tries to find a user with an identifier corresponding to "johndoe" (the domain part is cleaned up).
If, in GLPI, the user does not have the same ID (john.doe for example), the match will not be made. This could be explained by the fact that the Windows session was opened using the UPN Entra and that in GLPI, the user was synchronised via the email address.
There are several solutions:
Create users manually with the UPN as identifier
Synchronize users from Entra by specifying in the configuration that the UPN is used as GLPI identifier (Configuration
> Authentication
> LDAP directory
> Login field
= UserPrincipalName
)
Yes, from Administration
> GLPI Inventory
> Deploy
> Mirror servers
you can add a mirror server to deploy your packages. A procedure is available to assist you.
Availability: Ensures that deployments can continue even if the main server fails.
Performance: Improves response times and deployment speed by spreading the load.
Security: Reduces the risk of data loss and ensures that applications are always available for deployment.
Yes, you can use the location to force an agent to retrieve a packet from a server with an identical location. For example, a computer whose location is set to Paris will retrieve packets from the mirror server located in Paris. If the server is not available, the agent will retrieve the packet from the main server (or another mirror server located in Paris, if another exists).
Example
Our example will rely on the computer's TPM module to know if it is activated and its version
From Administration
> GLPI Inventory
> Computer Information
, click on Add
Indicate a name
,
Select WMI
type
Click on Save
From the collect configuration
tab, enter the necessary information:
Name: informative data
Moniker: winmgmts://./Root/CIMV2/Security/MicrosoftTpm
Class: Win32_Tpm
Properties: IsActivated_InitialValue,SpecVersion
See the Official Microsoft WMI Documentation
The blacklist identifies the information that will not be retrieved when a PC is inventoried or when users are synchronised.
It is possible to prohibit a certain amount of information, such as IP addresses in 0.0.0.0 or a user with an @yopmail.com email address.
You can blacklist the following items:
IP
MAC
Serial number
UUID
Email (for users)
Model
Manufacturer
Manufacturer
Go to Setup
> Dropdowns
> Blacklists
In the first part of the screenshot, the fields
insert shows the locks on the computer fields and also on the connected elements.
If the type of computer or the type of monitor connected to this computer is changed, the changed field will be locked and displayed in this area.
The second part displays the locked connected items. For example, if a network port is deleted, it will disappear from the ‘Network’ tab and appear in this box.
This automatic action does not remove older versions of applications installed from the Microsoft store. In fact, the store leaves older versions still installed for other users of the machine. Windows only updates software from the store for logged-in users.
It's important to understand that these 2 tasks are linked. Network discovery will bring up all the equipment discovered on the network according to its type (computer, printer, switch, etc.) and the business rules established. The SNMP inventory will inject the data authorised by the manufacturer via the SNMP protocol (serial number, OS, cartridges, etc.). A procedure is available here to help you configure these steps. A guide is also available directly from GLPI (Administration > GLPI Inventory > Guide
) A procedure is available
Cartridge management is subject to the SNMP protocol. It is possible that the printer manufacturer does not allow this type of item. Please check with the manufacturer that SNMP is supported by your hardware. If possible, we recommend SNMP v3 to encrypt exchanges between GLPI and your hardware. If the settings are correct and the printer supports SNMP, you will then be able to view cartridge ink levels in GLPI and manage cartridge stocks. Please refer to the procedure
The impact analysis is created from the menu of the same name from any object in the inventory. A is available to help you set up an impact analysis.
A is available to help you collect data. Specifically for WMI, a special configuration is required.