API Collections
API Collections for Cloud and SaaS Configuration Management in rConfig V8
Section titled “API Collections for Cloud and SaaS Configuration Management in rConfig V8”API Collections in rConfig V8 enable organizations to extend configuration management beyond traditional network devices to cloud-based services, SaaS platforms, and any API-driven infrastructure. This capability addresses the modern challenge of managing hybrid environments where critical configuration data exists outside conventional CLI-accessible devices.
By treating API endpoints as configuration sources, rConfig allows teams to apply the same governance, version control, change detection, and compliance capabilities to API-sourced data as they do to traditional network configurations. This unified approach provides comprehensive visibility across your entire infrastructure landscape.
Why API Collections Matter
Section titled “Why API Collections Matter”Traditional network configuration management focuses on SSH and Telnet connections to physical and virtual network devices. However, modern infrastructure increasingly relies on:
- Cloud management platforms with RESTful APIs (AWS, Azure, GCP)
- SD-WAN controllers and orchestrators
- Security platforms with centralized management APIs
- SaaS networking services (Cloudflare, Zscaler)
- Configuration management databases (CMDBs)
- Custom applications with configuration endpoints
API Collections bridge this gap, allowing rConfig to serve as a centralized configuration repository for both traditional and modern infrastructure components.
Key Capabilities
Section titled “Key Capabilities”- Multi-authentication support: Five authentication methods covering common API patterns
- Flexible endpoint management: Configure multiple endpoints per collection with different methods
- Integration with core features: Retrieved API data integrates with config diff, change detection, search, and compliance
- Scheduled retrieval: Automated data collection using command groups
- Retry logic: Configurable retry mechanisms for resilient data retrieval
- SSL flexibility: Support for both verified and self-signed certificates
Understanding API Collections Architecture
Section titled “Understanding API Collections Architecture”Collection Hierarchy
Section titled “Collection Hierarchy”API Collections use a three-tier architecture that separates concerns and promotes reusability:
-
Collection Level: Defines the base URL, vendor, categorization, and authentication type. This establishes the connection framework.
-
Credentials Level: Stores authentication details separately from endpoints, allowing credential updates without modifying endpoint configurations. A single credential set can authenticate multiple endpoints within the collection.
-
Endpoint Level: Specifies individual API resources to retrieve. Each endpoint represents a discrete configuration or data source that will be backed up and monitored.
This separation enables organizations to manage API integrations efficiently. For example, a single collection for a cloud provider can contain credentials that authenticate dozens of endpoints across different services.
Data Flow
Section titled “Data Flow”When rConfig retrieves data from an API collection, the following process occurs:
- Task Initiation: Either manual or scheduled task triggers the collection download
- Authentication: System retrieves credentials and performs authentication based on the selected type
- Endpoint Iteration: For each configured endpoint, rConfig constructs the full URL (base URL + endpoint path)
- HTTP Request: System executes the HTTP request (GET or POST) with authentication headers
- Response Processing: Retrieved data is stored with the specified filename
- Integration: Stored data becomes available for diff comparison, change detection, and search
- Retry Logic: On failure, system attempts retry based on configured count and delay
Authentication Flow Patterns
Section titled “Authentication Flow Patterns”Different authentication types follow distinct patterns:
None/Basic/Bearer/API Token: Single-request authentication where credentials are included in each API call.
Request Token: Two-phase authentication:
- Initial authentication request to token endpoint with username/password
- Token received and stored for session
- Subsequent requests use the token for authentication
Understanding these patterns helps in troubleshooting authentication issues and optimizing API collection performance.
Creating an API Collection
Section titled “Creating an API Collection”Accessing the API Collections Interface
Section titled “Accessing the API Collections Interface”Navigate to Devices > API Collections in the main menu. The API Collections dashboard displays all configured collections, their status, and quick access to management functions.
Click the Add Collection button to begin creating a new collection.
Collection Configuration
Section titled “Collection Configuration”
The collection form requires several key pieces of information. Required fields are denoted with a red asterisk and must be completed before saving.
Field Reference
Section titled “Field Reference”Field | Description | Requirements |
---|---|---|
API Collection Name | Descriptive identifier for the collection | Alphanumeric characters, underscores, and dashes allowed. Minimum 3 characters. Use meaningful names that indicate the service or platform. |
API Base URL | Root URL for all endpoints in this collection | Must include protocol (https:// or http://). Should end at the API version path (e.g., https://api.example.com/v2/ ). Do not include specific endpoint paths here. |
Authentication Type | Method used to authenticate API requests | Select from None, Basic, Bearer Token, API Token, or Request Token. This determines credential fields in the next step. |
Vendor | Platform or service provider | Used for filtering and reporting. Select existing vendor or create new. |
Command Group | Category for scheduling and organization | Assigns collection to command groups for scheduled downloads. Essential for automation. |
Tags | Organizational labels | Multiple tags can be assigned. Use tags like ‘Cloud’, ‘Security’, ‘Production’ for flexible filtering. |
Retry Count | Number of retry attempts on failure | Range: 0-10. Recommended: 3 for production APIs, 1 for testing. Higher values improve reliability but increase task duration on persistent failures. |
Retry Delay | Milliseconds between retry attempts | Range: 100-30000ms. Recommended: 1000-5000ms. Prevents overwhelming APIs with rapid retry attempts. |
Verify SSL | SSL certificate verification | Enable for production APIs with valid certificates. Disable for internal APIs with self-signed certificates or testing environments. |
Authentication Type Details
Section titled “Authentication Type Details”Selecting the appropriate authentication type is critical for successful API integration. Each type addresses different security models:
No Authentication
Used for public APIs or internal services without authentication requirements.
Use cases:
- Public data endpoints
- Internal development APIs
- Testing and validation
Considerations:
- Ensure API endpoint is genuinely public or network-restricted
- Consider security implications of unauthenticated access
- May still require API keys passed as query parameters (configure in endpoint)
HTTP Basic Authentication
Traditional username/password authentication scheme defined in RFC 7617. Credentials are base64-encoded and sent in the Authorization header.
Header format:
Authorization: Basic base64(username:password)
Use cases:
- Legacy systems requiring basic auth
- Internal APIs with simple authentication
- Services where token management is impractical
Security considerations:
- Always use HTTPS to protect credentials in transit
- Credentials are transmitted with every request
- No built-in expiration or revocation mechanism
Bearer Token Authentication
Token-based authentication where a pre-shared token is included in the Authorization header. Commonly used with OAuth 2.0 flows.
Header format:
Authorization: Bearer <token>
Use cases:
- OAuth 2.0 services
- APIs with externally-managed tokens
- Services using JWT (JSON Web Tokens)
Configuration notes:
- Token must be obtained outside rConfig (through OAuth flow or API portal)
- Configure token prefix if API requires variant (e.g., “Token” instead of “Bearer”)
- Monitor token expiration and update credentials when tokens rotate
API Key Authentication
Key-value pair authentication where API keys are sent either in headers or query strings. Provides flexibility in how credentials are transmitted.
Header format:
X-API-Key: <value>
Query string format:
https://api.example.com/endpoint?api_key=<value>
Use cases:
- SaaS platforms with API key management
- Services requiring both key and secret
- APIs with custom header requirements
Configuration options:
- API Token Key: Header name or query parameter name (e.g., “X-API-Key”, “api_key”)
- API Token Value: The actual secret/token value
- Add To: Choose Header or Query String based on API requirements
Request Token Authentication
Two-phase authentication where credentials are exchanged for a session token. The token is then used for subsequent API requests.
Authentication flow:
- POST credentials to token endpoint
- Receive authentication token in response
- Use token for subsequent API calls
Use cases:
- APIs with session-based authentication
- Services requiring login before data access
- Platforms with token refresh mechanisms
Configuration requirements:
- Request Token Endpoint: Full URL to authentication endpoint
- System automatically handles token acquisition
- Token is cached and reused across endpoints in the collection
Security benefits:
- Credentials transmitted only during initial authentication
- Token can have limited lifetime
- Supports APIs with session management
Saving the Collection
Section titled “Saving the Collection”After completing the form, click Save to create the collection. The system validates required fields and URL format before accepting the configuration.
Upon successful creation, you’ll be redirected to the collection detail view where you can proceed to configure credentials and endpoints.
Configuring Credentials
Section titled “Configuring Credentials”Credentials are configured separately from the collection definition, providing security and flexibility. A single credential set can authenticate all endpoints within a collection.
Adding Credentials to a Collection
Section titled “Adding Credentials to a Collection”From the collection detail view, click the Add Credentials button. This opens the credentials configuration form.

Credentials Form
Section titled “Credentials Form”The credentials form dynamically adjusts based on the authentication type selected in the collection configuration. This ensures you only configure relevant authentication parameters.

Credentials Field Reference
Section titled “Credentials Field Reference”Field | Authentication Type | Description |
---|---|---|
Authentication Type | All | Pre-filled from collection configuration. Can be modified if authentication type was incorrectly selected initially. |
Username | Basic, Request Token | Username for authentication. Must match credentials configured in the target API system. |
Password | Basic, Request Token | Password for authentication. Stored encrypted in rConfig database. |
API Token Key | API Token | The header name or query parameter name for the API key (e.g., “X-API-Key”, “api_key”, “apikey”). |
API Token Value | API Token | The secret API key value provided by the API service. Stored encrypted. |
Add To | API Token | Determines how the API key is transmitted: Header (included in HTTP headers) or Query String (appended to URL). |
Bearer Token | Bearer Token | The bearer token value obtained from the API provider or OAuth flow. Stored encrypted. |
Bearer Token Prefix | Bearer Token | The prefix used in the Authorization header. Default is “Bearer”. Some APIs use alternatives like “Token” or custom prefixes. |
Request Token Endpoint | Request Token | The complete URL (including base URL and path) where credentials are posted to obtain an authentication token. Example: https://api.example.com/auth/login . |
Testing Credentials
Section titled “Testing Credentials”Before configuring endpoints, validate that credentials work correctly. The credentials form includes a built-in testing capability.

Testing Process
Section titled “Testing Process”- Complete the credentials form with all required authentication information
- Enter a test endpoint URL in the test field. This should be a known-good endpoint that requires authentication
- Click the Test button to execute a test request
- Review the results:
- Success: Green indicator confirms credentials authenticate correctly
- Failure: Error message provides details about the authentication issue
Test Endpoint Selection Tips:
- Use a lightweight endpoint that returns minimal data
- Verify the endpoint requires authentication (unauthenticated endpoints will succeed regardless of credential validity)
- Choose an endpoint you’ll be configuring to confirm full path construction
- For Request Token authentication, testing validates both token acquisition and subsequent authenticated requests
Credential Security Best Practices
Section titled “Credential Security Best Practices”- Use dedicated API accounts: Create service accounts specific to rConfig rather than personal credentials
- Implement least privilege: Grant only necessary permissions to API credentials
- Rotate credentials regularly: Update API keys and tokens according to your security policy
- Monitor API usage: Review API access logs for unexpected activity
- Backup credential configuration: Document credential sources in case re-creation is needed
Configuring API Endpoints
Section titled “Configuring API Endpoints”Endpoints represent the specific API resources that rConfig will retrieve and monitor. Each endpoint corresponds to a configuration file or data source that will be backed up according to your schedule.
Accessing the Endpoints Interface
Section titled “Accessing the Endpoints Interface”From the collection detail view, navigate to the Endpoints section. This displays all configured endpoints for the current collection.
Click Add Endpoint to configure a new endpoint.

Endpoint Configuration
Section titled “Endpoint Configuration”The endpoint form focuses on defining what data to retrieve and how to store it locally.

Endpoint Field Reference
Section titled “Endpoint Field Reference”Field | Description | Best Practices |
---|---|---|
Endpoint Name | Descriptive identifier for the endpoint | Use names that clearly indicate the data being retrieved. Examples: “Firewall Rules”, “VLAN Configuration”, “Device Inventory”. |
Alternate Filename | Custom filename for stored data (optional) | Overrides default filename generation. Useful for maintaining consistent naming conventions across different API sources. Include file extension if API doesn’t provide one. |
HTTP Method | Request type: GET or POST | GET: Retrieving data (most common for configuration backup). POST: Required by some APIs for queries or when parameters exceed URL length limits. |
Endpoint URL | API path relative to base URL | Do not include the base URL configured in the collection. Use relative paths starting with / . Example: If base URL is https://api.example.com/v2/ and full endpoint is https://api.example.com/v2/devices/configs , enter /devices/configs . |
Understanding Endpoint URLs
Section titled “Understanding Endpoint URLs”Endpoint URL construction combines the collection’s base URL with the endpoint-specific path:
Full API URL = [Collection Base URL] + [Endpoint URL]
Example Configuration:
- Collection Base URL:
https://api.cloudprovider.com/v3/
- Endpoint URL:
/network/firewall/rules
- Resulting Full URL:
https://api.cloudprovider.com/v3/network/firewall/rules
This separation allows you to update the base URL (version changes, domain changes) without modifying individual endpoint configurations.
HTTP Method Selection
Section titled “HTTP Method Selection”GET Requests are appropriate for:
- Retrieving configuration data
- Querying read-only resources
- Accessing data endpoints
- Standard RESTful resource retrieval
POST Requests are required when:
- The API mandates POST for queries (non-standard but occurs in some APIs)
- Query parameters exceed URL length limitations
- The API requires request body parameters
- Performing searches or complex queries
Managing Multiple Endpoints
Section titled “Managing Multiple Endpoints”Collections can contain numerous endpoints. Organize endpoints strategically:
By Configuration Type:
- Firewall rules
- Routing tables
- Access control lists
- System settings
By Environment:
- Production endpoints
- Staging endpoints
- Development endpoints
By Update Frequency:
- Frequently-changing data (retrieved daily)
- Static configurations (retrieved weekly)
Use meaningful endpoint names and alternate filenames to maintain organization as your collection grows.
Running Downloads
Section titled “Running Downloads”Once collections, credentials, and endpoints are configured, you can retrieve data either manually or through scheduled tasks.
Manual Download Execution
Section titled “Manual Download Execution”From the collection detail view or the main API Collections dashboard:
- Select the collection containing endpoints to download
- Click the Download button or select Download Now from the actions menu
- Monitor progress in the task status indicator
- Review results showing successful downloads and any failures
The download process retrieves data from all configured endpoints in the collection sequentially.
Scheduled Downloads
Section titled “Scheduled Downloads”API Collections integrate with rConfig’s scheduling system through Command Groups. To automate data retrieval:
- Assign a Command Group to the collection during creation or via collection edit
- Configure a scheduled task in Admin > Scheduled Tasks
- Select the command group associated with your API collections
- Set the schedule (cron syntax) based on how frequently configuration data changes
Scheduling Best Practices:
- Critical infrastructure: Schedule hourly or every 4 hours
- Stable environments: Daily downloads during off-peak hours
- Static configurations: Weekly downloads sufficient
- Rate-limited APIs: Space out downloads to avoid exceeding API quotas
- Multiple collections: Stagger schedules to distribute load
Download Results and Storage
Section titled “Download Results and Storage”Retrieved data is stored in rConfig’s configuration repository at:
/var/www/html/rconfig8/current/storage/app/configs/
Files are organized by device (API collection acts as the device context) and include:
- Timestamp metadata for version tracking
- Filename based on endpoint configuration or API response
- Full content retrieved from the API endpoint
Downloaded configurations immediately become available for:
- Configuration diff: Compare current vs. previous versions
- Change detection: Identify modifications since last download
- Search: Full-text search across API-sourced data
- Compliance: Apply policy checks to API configurations
- Reporting: Include in configuration reports and audits
Integration with rConfig Features
Section titled “Integration with rConfig Features”Configuration Comparison
Section titled “Configuration Comparison”API-sourced configurations integrate seamlessly with rConfig’s diff engine. After downloading API data, you can:
- Navigate to Configs > View Configurations
- Select the API collection (displayed as a device)
- Choose two configuration versions to compare
- View side-by-side or unified diff of changes
This capability is particularly valuable for:
- Tracking changes in cloud security groups
- Monitoring modifications to SD-WAN policies
- Auditing updates to SaaS platform configurations
- Detecting unauthorized changes to API-managed resources
Change Detection
Section titled “Change Detection”When API endpoints are downloaded on a schedule, rConfig’s Change Detection system monitors for modifications:
- Change Pulse displays recent changes across all API collections
- Change Forge provides detailed analysis of what changed and when
- Alerting can notify administrators of critical configuration changes
- Change history maintains a timeline of all modifications
This provides the same change management governance for API-sourced data as traditional device configurations.
Search and Compliance
Section titled “Search and Compliance”Retrieved API data is indexed for search and compliance operations:
Search Capabilities:
- Full-text search across all API-sourced configurations
- Filter by collection, vendor, or tags
- Search within specific time ranges
- Export search results for external analysis
Compliance Checking:
- Apply compliance policies to API configurations
- Detect policy violations in cloud configurations
- Generate compliance reports including API data
- Track remediation of non-compliant settings
Reporting
Section titled “Reporting”API Collections appear in rConfig reporting alongside traditional devices:
- Device inventory reports include API collections
- Configuration age reports show last successful API download
- Compliance summary reports aggregate policy checks across all sources
- Change reports document configuration modifications from all sources
This unified reporting view provides comprehensive visibility across your entire managed infrastructure.
Advanced Configuration Techniques
Section titled “Advanced Configuration Techniques”Managing API Pagination
Section titled “Managing API Pagination”Many APIs return paginated results for large datasets. To retrieve complete configuration data:
Option 1: Multiple Endpoints
Create separate endpoints for each page:
- Endpoint 1:
/devices?page=1&limit=100
- Endpoint 2:
/devices?page=2&limit=100
- Endpoint 3:
/devices?page=3&limit=100
Option 2: Maximum Page Size
Configure the API to return maximum results:
- Use query parameters like
?limit=1000&offset=0
- Consult API documentation for maximum page size
- Balance between complete data and API performance
Option 3: External Script Integration
For complex pagination logic:
- Use Script Integration Engine (SIE) to write custom pagination handler
- Script fetches all pages and combines results
- Store combined output for rConfig processing
Dynamic Endpoint Configuration
Section titled “Dynamic Endpoint Configuration”Some scenarios require dynamic endpoint paths based on variable data:
Challenge: Backing up configurations for devices whose IDs change or aren’t known in advance.
Solution Approaches:
-
List then Retrieve Pattern:
- Endpoint 1: Get device list from
/devices
- Use SIE script to parse device list
- Script creates dynamic API calls for each device
- Store results in rConfig structure
- Endpoint 1: Get device list from
-
Wildcard Endpoints (if API supports):
- Some APIs support patterns like
/devices/*/config
- Returns all device configurations in single call
- Check API documentation for pattern support
- Some APIs support patterns like
-
Search-Based Retrieval:
- Use API search endpoints to find resources
- Filter by tags, properties, or criteria
- Retrieve matching configuration data
Handling Large Responses
Section titled “Handling Large Responses”APIs may return substantial data volumes that require special handling:
Performance Considerations:
- Memory Usage: Large responses consume system memory during processing
- Storage: Ensure adequate disk space at
/var/www/html/rconfig8/current/storage/app/configs/
- Processing Time: Large payloads increase download duration
- Diff Performance: Comparing large configuration files requires additional resources
Optimization Strategies:
- Filter at API Level: Use query parameters to retrieve only necessary data
- Split into Multiple Endpoints: Divide large data sources into logical chunks
- Adjust Timeout Settings: Increase timeout values for long-running requests
- Schedule Off-Peak: Run large downloads during maintenance windows
- Monitor System Resources: Track disk space and memory usage
Multi-Tenant API Management
Section titled “Multi-Tenant API Management”Organizations managing multiple customer environments through a single API platform:
Collection Architecture:
-
Option A: Single collection with endpoints per tenant
- Pro: Centralized credential management
- Con: All tenants use same command group schedule
-
Option B: Separate collections per tenant
- Pro: Independent scheduling and configuration
- Pro: Clearer organization in rConfig interface
- Con: More credential sets to manage
Recommendation: Use separate collections for distinct tenants, especially when:
- Different authentication credentials are required
- Download schedules differ based on tenant SLAs
- Organizational separation is important for reporting
- Different teams manage different tenants
API Rate Limiting Strategies
Section titled “API Rate Limiting Strategies”Many APIs implement rate limiting to prevent abuse. Strategies for working within limits:
Understanding Limits:
- Check API documentation for rate limits (requests per hour/day)
- Monitor usage through API provider dashboard
- Track rConfig download frequency and endpoint count
Staying Within Limits:
- Optimize Endpoint Count: Combine data retrieval where possible
- Adjust Retry Settings: Reduce retry count to minimize failed request consumption
- Space Out Collections: Schedule different collections at different times
- Increase Retry Delay: Longer delays between retries prevent rapid limit exhaustion
- Contact Provider: Some providers increase limits for enterprise customers
Handling Rate Limit Errors:
When rate limits are exceeded:
- rConfig logs the error with details
- Retry mechanism may exhaust attempts quickly
- Subsequent scheduled downloads will retry
- Consider implementing exponential backoff in retry delay
Troubleshooting
Section titled “Troubleshooting”Authentication Failures
Section titled “Authentication Failures”Symptom: Downloads fail with authentication errors (401 Unauthorized, 403 Forbidden)
Possible Causes:
-
Incorrect Credentials
- Verify username/password are correct
- Check for copy/paste errors in API tokens
- Ensure no extra whitespace in credential fields
-
Token Expiration
- Bearer tokens may have expired
- Request Token authentication may need credential refresh
- Check API provider dashboard for token status
-
Incorrect Authentication Type
- Verify authentication type matches API requirements
- Confirm header format expectations (Bearer vs. Token prefix)
- Validate API Token is configured for header vs. query string correctly
-
API Account Permissions
- Ensure API account has read access to configured endpoints
- Verify account isn’t locked or disabled
- Check for IP restrictions on API access
Resolution Steps:
- Test credentials using the built-in credential testing feature
- Review API provider documentation for authentication requirements
- Check API provider dashboard for account status and access logs
- Verify network connectivity from rConfig server to API endpoint
- Review rConfig logs at
/var/www/html/rconfig8/current/storage/logs/
for detailed error messages
Connection Timeouts
Section titled “Connection Timeouts”Symptom: Downloads fail with timeout errors or no response
Possible Causes:
-
Network Connectivity Issues
- Firewall blocking outbound connections
- DNS resolution failures
- Routing problems between rConfig and API server
-
API Performance Problems
- API server overloaded or slow to respond
- Large dataset requiring extended processing time
- API rate limiting causing delays
-
SSL Certificate Validation
- Self-signed certificates failing verification
- Certificate chain issues
- Expired SSL certificates
Resolution Steps:
-
Test Network Connectivity:
Terminal window # From rConfig servercurl -v https://api.example.com/endpoint# Check DNS resolutionnslookup api.example.com# Verify routingtraceroute api.example.com -
Adjust Timeout Settings: Contact rConfig support for timeout configuration options
-
Disable SSL Verification: For self-signed certificates, disable “Verify SSL” in collection configuration
-
Monitor API Status: Check API provider status page for service disruptions
Incorrect or Incomplete Data
Section titled “Incorrect or Incomplete Data”Symptom: Downloads complete but data is incorrect, truncated, or missing
Possible Causes:
-
Wrong Endpoint URL
- Endpoint path doesn’t match API documentation
- Base URL includes endpoint path (should be separate)
- API version mismatch
-
Missing Query Parameters
- API requires parameters not configured
- Filtering parameters excluding needed data
- Pagination not handled correctly
-
Response Format Issues
- API returning unexpected format
- Data encoding problems
- Compression not being handled
Resolution Steps:
-
Test Endpoint Directly:
Terminal window # Test with curlcurl -H "Authorization: Bearer YOUR_TOKEN" \https://api.example.com/v2/endpoint -
Review API Documentation: Verify endpoint paths, required parameters, and response format
-
Check Response Headers: Ensure content-type and encoding are compatible
-
Validate Base URL Configuration: Confirm base URL and endpoint URL combine correctly
Retry Logic Not Working
Section titled “Retry Logic Not Working”Symptom: Failed downloads don’t retry or retry attempts fail immediately
Possible Causes:
-
Retry Count Set to Zero: Retries disabled in collection configuration
-
Retry Delay Too Short: API rejecting rapid retry attempts
-
Persistent Authentication Failures: Credentials invalid, retries won’t help
-
Rate Limiting: API blocking requests due to limit violations
Resolution Steps:
- Review retry count and delay settings in collection configuration
- Increase retry delay to 3000-5000ms for better reliability
- Fix authentication issues before relying on retry mechanism
- Monitor API rate limit status
SSL Certificate Verification Errors
Section titled “SSL Certificate Verification Errors”Symptom: Downloads fail with SSL certificate validation errors
Possible Causes:
- Self-Signed Certificates: API using certificates not trusted by system
- Certificate Chain Issues: Intermediate certificates not properly configured
- Expired Certificates: API certificate has expired
- Hostname Mismatch: Certificate doesn’t match API hostname
Resolution Steps:
-
For Self-Signed Certificates: Disable “Verify SSL” in collection configuration
-
For Production APIs: Work with API provider to resolve certificate issues
-
Update Certificate Store: Ensure rConfig server has current CA certificates
Terminal window # Update CA certificates (Ubuntu/Debian)sudo update-ca-certificates# Update CA certificates (CentOS/RHEL)sudo update-ca-trust -
Verify Certificate Details:
Terminal window openssl s_client -connect api.example.com:443 -servername api.example.com
Best Practices
Section titled “Best Practices”Collection Organization
Section titled “Collection Organization”Use Descriptive Naming:
- Collection names should clearly indicate the platform or service
- Endpoint names should describe the specific data being retrieved
- Tag collections consistently across your organization
Example Naming Convention:
- Collection: “AWS-Production-Account-123”
- Endpoints: “EC2-SecurityGroups”, “VPC-RouteTables”, “IAM-Policies”
- Tags: “Cloud”, “Production”, “AWS”
Group Related Endpoints:
- Keep endpoints for a single service or platform in one collection
- Separate production and non-production environments
- Use command groups to schedule related collections together
Security Considerations
Section titled “Security Considerations”Credential Management:
- Use dedicated service accounts for API access
- Implement least-privilege access principles
- Rotate API credentials regularly
- Document credential sources and responsible teams
Network Security:
- Use HTTPS for all API connections in production
- Restrict network access using firewalls when possible
- Monitor API access logs for unauthorized activity
- Consider using VPN or private endpoints for sensitive APIs
Data Protection:
- Ensure rConfig server is properly secured
- Implement appropriate access controls within rConfig
- Include API-sourced data in backup procedures
- Consider encryption requirements for sensitive configuration data
Performance Optimization
Section titled “Performance Optimization”Scheduling:
- Schedule large downloads during off-peak hours
- Stagger collection schedules to distribute load
- Match download frequency to configuration change rate
- Avoid scheduling all collections at the same time
Endpoint Configuration:
- Request only necessary data using query parameters
- Split large datasets across multiple endpoints
- Use filtering at the API level when available
- Consider caching strategies for static data
Resource Management:
- Monitor disk space usage in
/var/www/html/rconfig8/current/storage/app/configs/
- Track memory usage during large API downloads
- Review task execution logs for performance bottlenecks
- Archive or purge old configuration versions as needed
API Efficiency:
- Minimize unnecessary API calls
- Cache frequently-accessed data when appropriate
- Use conditional requests (If-Modified-Since) if API supports
- Respect API rate limits and implement appropriate delays
Monitoring and Maintenance
Section titled “Monitoring and Maintenance”Regular Reviews:
- Verify downloads complete successfully on schedule
- Review task execution logs weekly
- Monitor API provider service status
- Check for API version updates or deprecations
Proactive Monitoring:
- Set up alerts for failed downloads
- Track credential expiration dates
- Monitor API rate limit usage
- Review configuration change patterns for anomalies
Documentation:
- Document collection purposes and data sources
- Maintain inventory of API credentials and owners
- Record API endpoint dependencies
- Keep notes on special configuration requirements
Change Management
Section titled “Change Management”Version Control:
- Treat API Collections as infrastructure-as-code
- Document changes to collection configurations
- Test endpoint changes in non-production first
- Maintain rollback procedures for credential updates
Impact Assessment:
- Understand downstream systems consuming API data
- Evaluate change impact before modifying collections
- Coordinate changes with stakeholders
- Schedule changes during maintenance windows
Testing Procedures:
- Test new endpoints before adding to production collections
- Validate credential changes using test function
- Verify data quality after configuration changes
- Monitor first several scheduled runs after changes
Use Cases and Scenarios
Section titled “Use Cases and Scenarios”Cloud Infrastructure Management
Section titled “Cloud Infrastructure Management”Scenario: Organization manages multi-cloud infrastructure across AWS, Azure, and GCP with hundreds of security groups, network policies, and access controls.
Implementation:
-
Create Collections per Cloud Provider:
- AWS-Production: Security groups, VPC configs, IAM policies
- Azure-Production: Network security groups, virtual network configs
- GCP-Production: Firewall rules, VPC settings
-
Configure Endpoints for Key Resources:
- Security groups and firewall rules
- Network routing tables
- Access control policies
- Load balancer configurations
-
Schedule Regular Downloads:
- Security-critical resources: Every 4 hours
- Network configurations: Daily
- IAM policies: Twice daily
Benefits:
- Detect unauthorized security group modifications
- Audit access control changes across cloud platforms
- Maintain configuration history for compliance
- Compare cloud configurations across environments
SD-WAN Controller Integration
Section titled “SD-WAN Controller Integration”Scenario: Enterprise SD-WAN deployment with centralized controller managing 500+ edge devices through API.
Implementation:
-
Controller API Collection:
- Collection: “SD-WAN-Controller”
- Authentication: Bearer Token from controller admin portal
- Base URL:
https://controller.sdwan.company.com/api/v3/
-
Configuration Endpoints:
/sites
- All site configurations/policies/qos
- QoS policies/policies/routing
- Routing policies/policies/security
- Security policies/templates
- Configuration templates
-
Scheduled Downloads: Every 6 hours
Benefits:
- Track policy changes across SD-WAN fabric
- Audit template modifications
- Detect configuration drift from standards
- Maintain disaster recovery configurations
SaaS Security Platform Backup
Section titled “SaaS Security Platform Backup”Scenario: Security team uses cloud-based firewall service protecting multiple applications. Need to maintain backup of all security policies.
Implementation:
-
Security Platform Collection:
- Collection: “CloudFirewall-Production”
- Authentication: API Token (key in header)
- Base URL:
https://api.cloudfirewall.com/v2/
-
Policy Endpoints:
/policies/firewall
- Firewall rules/policies/waf
- Web application firewall rules/policies/dlp
- Data loss prevention policies/policies/threat
- Threat prevention settings/applications
- Protected application configurations
-
Scheduling:
- Firewall rules: Every 2 hours (frequently modified)
- Other policies: Daily
Benefits:
- Rapid recovery after accidental policy deletion
- Audit trail for security policy changes
- Compliance documentation for security controls
- Comparison of policy versions during troubleshooting
MSP Multi-Tenant Management
Section titled “MSP Multi-Tenant Management”Scenario: Managed Service Provider supporting 50 customers, each with their own cloud management platforms.
Implementation:
-
Per-Customer Collections:
- Collection naming: “Customer-[Name]-[Platform]”
- Separate credentials per customer
- Individual command groups per customer tier
-
Standardized Endpoints Across Customers:
- Consistent endpoint naming conventions
- Same data retrieved for all customers
- Uniform tagging structure
-
Tiered Scheduling:
- Premium customers: 4-hour intervals
- Standard customers: Daily
- Basic customers: Weekly
Benefits:
- Standardized configuration management across customer base
- Scalable approach for customer growth
- Individual scheduling based on SLA requirements
- Centralized visibility across all managed environments
CMDB Integration
Section titled “CMDB Integration”Scenario: IT operations team maintains Configuration Management Database (CMDB) and needs network device data from rConfig synchronized with CMDB API.
Implementation:
-
CMDB API Collection:
- Collection: “CMDB-Integration”
- Authentication: Request Token (login to CMDB API)
- Endpoints for different CI types
-
Bidirectional Data Flow:
- rConfig retrieves device inventory from CMDB
- CMDB updated with configuration status from rConfig (via separate process)
- Regular synchronization maintains consistency
-
Scheduled Synchronization: Every 4 hours
Benefits:
- Single source of truth for device inventory
- Configuration status reflected in CMDB
- Automated reconciliation of device data
- Enhanced CMDB accuracy with configuration details
Advanced Integration Patterns
Section titled “Advanced Integration Patterns”Combining API Collections with Traditional Devices
Section titled “Combining API Collections with Traditional Devices”Organizations can create comprehensive configuration repositories by combining traditional device backups with API-sourced data:
Hybrid Collection Strategy:
- Traditional Devices: SSH/Telnet connections to network hardware
- API Collections: Cloud platforms, controllers, SaaS services
- Unified View: All configurations visible in single interface
Example Topology:
- Physical routers/switches backed up via SSH
- SD-WAN controller backed up via API
- Cloud security groups backed up via API
- Firewall management platform backed up via API
This approach provides complete configuration visibility across hybrid infrastructure.
API Collections as Data Sources for SIE
Section titled “API Collections as Data Sources for SIE”The Script Integration Engine (SIE) can process API-sourced data:
Integration Pattern:
- API Collection Downloads: Retrieve configuration data via API
- SIE Script Trigger: Executed after successful download
- Data Processing: SIE script parses API response
- Action Execution: Based on processed data, SIE performs actions
Use Cases:
- Parse API data and generate compliance reports
- Extract specific values and trigger alerts
- Transform API data format for external systems
- Aggregate data from multiple API sources
Webhook Integration for Real-Time Updates
Section titled “Webhook Integration for Real-Time Updates”Some APIs provide webhooks for event-driven updates. While rConfig doesn’t natively process webhooks, you can implement a pattern:
Architecture:
- Webhook Receiver: External service receives API webhooks
- Trigger Mechanism: Webhook receiver calls rConfig API to trigger download
- Immediate Download: Specific API collection downloads on-demand
- Change Detection: rConfig identifies and records changes
This enables near-real-time configuration tracking for critical resources.
Roadmap and Future Enhancements
Section titled “Roadmap and Future Enhancements”The API Collections feature continues to evolve based on customer feedback and emerging use cases. Planned enhancements include:
Native Pagination Support
Section titled “Native Pagination Support”Current: Manual configuration of multiple endpoints for paginated results
Planned: Automatic pagination handling
- Configure page size and offset parameters
- System automatically retrieves all pages
- Combined data stored as single configuration
Timeline: Under evaluation for future release
Additional HTTP Methods
Section titled “Additional HTTP Methods”Current: GET and POST methods supported
Planned: Support for PUT, PATCH, DELETE
- Enable configuration push to APIs (write operations)
- Update remote configurations from rConfig
- Delete outdated resources via API
Timeline: Research phase
Note: This represents a significant architectural change as API Collections currently focus on read-only operations. Write capabilities require extensive validation and error handling.
GraphQL Support
Section titled “GraphQL Support”Current: REST API support only
Planned: GraphQL query support
- Define GraphQL queries in endpoint configuration
- Retrieve specific data fields efficiently
- Reduce over-fetching of unnecessary data
Timeline: Under consideration
Enhanced Authentication Methods
Section titled “Enhanced Authentication Methods”Current: Five authentication types covering common patterns
Planned: Additional authentication support
- OAuth 2.0 flow automation
- Multi-factor authentication handling
- Certificate-based authentication
- Custom authentication handlers
Timeline: Future development
API Response Transformation
Section titled “API Response Transformation”Current: Raw API responses stored as-is
Planned: Built-in transformation capabilities
- JSON to XML conversion
- Data filtering and field extraction
- Format normalization
- Custom transformation scripts
Timeline: Research phase
Related Documentation
Section titled “Related Documentation”- Command Groups: Organize and schedule API Collections
- Scheduled Tasks: Automate API data retrieval
- Configuration Diff: Compare API configuration versions
- Change Detection: Monitor API configuration changes
- Search and Compliance: Search API-sourced data and apply policies
- Script Integration Engine: Process API data with custom scripts
- Device Management: Understand device and collection relationship
- Tags: Organize collections using tags
Quick Reference
Section titled “Quick Reference”Collection Configuration Checklist
Section titled “Collection Configuration Checklist”Credentials Configuration Checklist
Section titled “Credentials Configuration Checklist”Endpoint Configuration Checklist
Section titled “Endpoint Configuration Checklist”Troubleshooting Quick Checks
Section titled “Troubleshooting Quick Checks”Authentication Issues:
- Test credentials using built-in test function
- Verify no extra whitespace in credentials
- Check authentication type matches API requirements
- Review API provider account status
Connection Problems:
- Test network connectivity from rConfig server
- Verify DNS resolution
- Check firewall rules
- Disable SSL verification for self-signed certificates
Data Issues:
- Test endpoint URL with curl
- Verify base URL and endpoint URL combine correctly
- Check API documentation for required parameters
- Review response format and encoding
Performance Issues:
- Check retry count and delay settings
- Monitor API rate limit usage
- Schedule large downloads during off-peak hours
- Review disk space availability
Common API Authentication Patterns
Section titled “Common API Authentication Patterns”Provider Type | Authentication Method | Configuration |
---|---|---|
AWS APIs | API Token | Key: X-API-Key, Value: AWS access key, Add To: Header |
Azure APIs | Bearer Token | Token: Azure AD token, Prefix: Bearer |
GCP APIs | Bearer Token | Token: OAuth 2.0 token, Prefix: Bearer |
SD-WAN Controllers | Request Token | Login endpoint + username/password |
SaaS Platforms | API Token | Key: API-Key or custom, Value: provided key, Add To: Header |
Legacy Systems | Basic | Username/password in base64 encoding |
File Storage Locations
Section titled “File Storage Locations”Item | Path |
---|---|
Retrieved configurations | /var/www/html/rconfig8/current/storage/app/configs/ |
Task execution logs | /var/www/html/rconfig8/current/storage/logs/ |
Application configuration | /var/www/html/rconfig8/current/.env |
Recommended Retry Settings
Section titled “Recommended Retry Settings”Scenario | Retry Count | Retry Delay |
---|---|---|
Production APIs (high reliability) | 3-5 | 3000-5000ms |
Testing/Development | 1-2 | 1000ms |
Rate-limited APIs | 2-3 | 5000-10000ms |
Large downloads (slow APIs) | 2-3 | 2000-3000ms |
Critical configurations | 5 | 5000ms |
Summary
Section titled “Summary”API Collections extend rConfig’s configuration management capabilities to modern, API-driven infrastructure. By treating API endpoints as configuration sources, organizations achieve comprehensive visibility across hybrid environments combining traditional network devices with cloud platforms, SD-WAN controllers, and SaaS services.
Key Takeaways:
- Unified Management: Apply consistent governance to all configuration sources regardless of access method
- Flexible Authentication: Five authentication types support diverse API platforms
- Seamless Integration: API-sourced data integrates with diff, change detection, search, and compliance features
- Scalable Architecture: Three-tier collection structure promotes reusability and efficient management
- Automated Retrieval: Scheduled downloads ensure configuration data remains current
- Enterprise Ready: Robust error handling, retry logic, and monitoring capabilities
API Collections address the modern challenge of distributed configuration management, providing a single pane of glass for configuration visibility, change tracking, and compliance across your entire infrastructure landscape.
Organizations leveraging API Collections can maintain the same rigorous change management processes for cloud resources as they do for traditional network devices, ensuring comprehensive governance in increasingly complex, hybrid IT environments.
For advanced integration requirements or high-volume API deployments, rConfig Enterprise Support can provide architectural guidance, custom integration assistance, and optimization recommendations. Contact [email protected] for more information.