Skip to content

API Collections

API Collections for Cloud and SaaS Configuration Management in rConfig V8

Section titled “API Collections for Cloud and SaaS Configuration Management in rConfig V8”

API Collections in rConfig V8 enable organizations to extend configuration management beyond traditional network devices to cloud-based services, SaaS platforms, and any API-driven infrastructure. This capability addresses the modern challenge of managing hybrid environments where critical configuration data exists outside conventional CLI-accessible devices.

By treating API endpoints as configuration sources, rConfig allows teams to apply the same governance, version control, change detection, and compliance capabilities to API-sourced data as they do to traditional network configurations. This unified approach provides comprehensive visibility across your entire infrastructure landscape.

Traditional network configuration management focuses on SSH and Telnet connections to physical and virtual network devices. However, modern infrastructure increasingly relies on:

  • Cloud management platforms with RESTful APIs (AWS, Azure, GCP)
  • SD-WAN controllers and orchestrators
  • Security platforms with centralized management APIs
  • SaaS networking services (Cloudflare, Zscaler)
  • Configuration management databases (CMDBs)
  • Custom applications with configuration endpoints

API Collections bridge this gap, allowing rConfig to serve as a centralized configuration repository for both traditional and modern infrastructure components.

  • Multi-authentication support: Five authentication methods covering common API patterns
  • Flexible endpoint management: Configure multiple endpoints per collection with different methods
  • Integration with core features: Retrieved API data integrates with config diff, change detection, search, and compliance
  • Scheduled retrieval: Automated data collection using command groups
  • Retry logic: Configurable retry mechanisms for resilient data retrieval
  • SSL flexibility: Support for both verified and self-signed certificates

Understanding API Collections Architecture

Section titled “Understanding API Collections Architecture”

API Collections use a three-tier architecture that separates concerns and promotes reusability:

  1. Collection Level: Defines the base URL, vendor, categorization, and authentication type. This establishes the connection framework.

  2. Credentials Level: Stores authentication details separately from endpoints, allowing credential updates without modifying endpoint configurations. A single credential set can authenticate multiple endpoints within the collection.

  3. Endpoint Level: Specifies individual API resources to retrieve. Each endpoint represents a discrete configuration or data source that will be backed up and monitored.

This separation enables organizations to manage API integrations efficiently. For example, a single collection for a cloud provider can contain credentials that authenticate dozens of endpoints across different services.

When rConfig retrieves data from an API collection, the following process occurs:

  1. Task Initiation: Either manual or scheduled task triggers the collection download
  2. Authentication: System retrieves credentials and performs authentication based on the selected type
  3. Endpoint Iteration: For each configured endpoint, rConfig constructs the full URL (base URL + endpoint path)
  4. HTTP Request: System executes the HTTP request (GET or POST) with authentication headers
  5. Response Processing: Retrieved data is stored with the specified filename
  6. Integration: Stored data becomes available for diff comparison, change detection, and search
  7. Retry Logic: On failure, system attempts retry based on configured count and delay

Different authentication types follow distinct patterns:

None/Basic/Bearer/API Token: Single-request authentication where credentials are included in each API call.

Request Token: Two-phase authentication:

  1. Initial authentication request to token endpoint with username/password
  2. Token received and stored for session
  3. Subsequent requests use the token for authentication

Understanding these patterns helps in troubleshooting authentication issues and optimizing API collection performance.

Navigate to Devices > API Collections in the main menu. The API Collections dashboard displays all configured collections, their status, and quick access to management functions.

Click the Add Collection button to begin creating a new collection.

rConfig V8 API Collection configuration form showing fields for collection name, base URL, authentication type, vendor selection, and queue management settings API Collection Form

The collection form requires several key pieces of information. Required fields are denoted with a red asterisk and must be completed before saving.

FieldDescriptionRequirements
API Collection NameDescriptive identifier for the collectionAlphanumeric characters, underscores, and dashes allowed. Minimum 3 characters. Use meaningful names that indicate the service or platform.
API Base URLRoot URL for all endpoints in this collectionMust include protocol (https:// or http://). Should end at the API version path (e.g., https://api.example.com/v2/). Do not include specific endpoint paths here.
Authentication TypeMethod used to authenticate API requestsSelect from None, Basic, Bearer Token, API Token, or Request Token. This determines credential fields in the next step.
VendorPlatform or service providerUsed for filtering and reporting. Select existing vendor or create new.
Command GroupCategory for scheduling and organizationAssigns collection to command groups for scheduled downloads. Essential for automation.
TagsOrganizational labelsMultiple tags can be assigned. Use tags like ‘Cloud’, ‘Security’, ‘Production’ for flexible filtering.
Retry CountNumber of retry attempts on failureRange: 0-10. Recommended: 3 for production APIs, 1 for testing. Higher values improve reliability but increase task duration on persistent failures.
Retry DelayMilliseconds between retry attemptsRange: 100-30000ms. Recommended: 1000-5000ms. Prevents overwhelming APIs with rapid retry attempts.
Verify SSLSSL certificate verificationEnable for production APIs with valid certificates. Disable for internal APIs with self-signed certificates or testing environments.

Selecting the appropriate authentication type is critical for successful API integration. Each type addresses different security models:

No Authentication

Used for public APIs or internal services without authentication requirements.

Use cases:

  • Public data endpoints
  • Internal development APIs
  • Testing and validation

Considerations:

  • Ensure API endpoint is genuinely public or network-restricted
  • Consider security implications of unauthenticated access
  • May still require API keys passed as query parameters (configure in endpoint)

After completing the form, click Save to create the collection. The system validates required fields and URL format before accepting the configuration.

Upon successful creation, you’ll be redirected to the collection detail view where you can proceed to configure credentials and endpoints.

Credentials are configured separately from the collection definition, providing security and flexibility. A single credential set can authenticate all endpoints within a collection.

From the collection detail view, click the Add Credentials button. This opens the credentials configuration form.

Add Credentials button in rConfig V8 API Collections interface for configuring authentication settings API Add Credentials Button

The credentials form dynamically adjusts based on the authentication type selected in the collection configuration. This ensures you only configure relevant authentication parameters.

rConfig V8 API credentials configuration form showing authentication fields for SNMPv3, Bearer tokens, API keys, and basic authentication options API Credentials Form - Fields vary by authentication type
FieldAuthentication TypeDescription
Authentication TypeAllPre-filled from collection configuration. Can be modified if authentication type was incorrectly selected initially.
UsernameBasic, Request TokenUsername for authentication. Must match credentials configured in the target API system.
PasswordBasic, Request TokenPassword for authentication. Stored encrypted in rConfig database.
API Token KeyAPI TokenThe header name or query parameter name for the API key (e.g., “X-API-Key”, “api_key”, “apikey”).
API Token ValueAPI TokenThe secret API key value provided by the API service. Stored encrypted.
Add ToAPI TokenDetermines how the API key is transmitted: Header (included in HTTP headers) or Query String (appended to URL).
Bearer TokenBearer TokenThe bearer token value obtained from the API provider or OAuth flow. Stored encrypted.
Bearer Token PrefixBearer TokenThe prefix used in the Authorization header. Default is “Bearer”. Some APIs use alternatives like “Token” or custom prefixes.
Request Token EndpointRequest TokenThe complete URL (including base URL and path) where credentials are posted to obtain an authentication token. Example: https://api.example.com/auth/login.

Before configuring endpoints, validate that credentials work correctly. The credentials form includes a built-in testing capability.

API Credentials Test Interface
  1. Complete the credentials form with all required authentication information
  2. Enter a test endpoint URL in the test field. This should be a known-good endpoint that requires authentication
  3. Click the Test button to execute a test request
  4. Review the results:
    • Success: Green indicator confirms credentials authenticate correctly
    • Failure: Error message provides details about the authentication issue

Test Endpoint Selection Tips:

  • Use a lightweight endpoint that returns minimal data
  • Verify the endpoint requires authentication (unauthenticated endpoints will succeed regardless of credential validity)
  • Choose an endpoint you’ll be configuring to confirm full path construction
  • For Request Token authentication, testing validates both token acquisition and subsequent authenticated requests
  • Use dedicated API accounts: Create service accounts specific to rConfig rather than personal credentials
  • Implement least privilege: Grant only necessary permissions to API credentials
  • Rotate credentials regularly: Update API keys and tokens according to your security policy
  • Monitor API usage: Review API access logs for unexpected activity
  • Backup credential configuration: Document credential sources in case re-creation is needed

Endpoints represent the specific API resources that rConfig will retrieve and monitor. Each endpoint corresponds to a configuration file or data source that will be backed up according to your schedule.

From the collection detail view, navigate to the Endpoints section. This displays all configured endpoints for the current collection.

Click Add Endpoint to configure a new endpoint.

API Create Endpoint Button

The endpoint form focuses on defining what data to retrieve and how to store it locally.

API Endpoint Configuration Form
FieldDescriptionBest Practices
Endpoint NameDescriptive identifier for the endpointUse names that clearly indicate the data being retrieved. Examples: “Firewall Rules”, “VLAN Configuration”, “Device Inventory”.
Alternate FilenameCustom filename for stored data (optional)Overrides default filename generation. Useful for maintaining consistent naming conventions across different API sources. Include file extension if API doesn’t provide one.
HTTP MethodRequest type: GET or POSTGET: Retrieving data (most common for configuration backup). POST: Required by some APIs for queries or when parameters exceed URL length limits.
Endpoint URLAPI path relative to base URLDo not include the base URL configured in the collection. Use relative paths starting with /. Example: If base URL is https://api.example.com/v2/ and full endpoint is https://api.example.com/v2/devices/configs, enter /devices/configs.

Endpoint URL construction combines the collection’s base URL with the endpoint-specific path:

Full API URL = [Collection Base URL] + [Endpoint URL]

Example Configuration:

  • Collection Base URL: https://api.cloudprovider.com/v3/
  • Endpoint URL: /network/firewall/rules
  • Resulting Full URL: https://api.cloudprovider.com/v3/network/firewall/rules

This separation allows you to update the base URL (version changes, domain changes) without modifying individual endpoint configurations.

GET Requests are appropriate for:

  • Retrieving configuration data
  • Querying read-only resources
  • Accessing data endpoints
  • Standard RESTful resource retrieval

POST Requests are required when:

  • The API mandates POST for queries (non-standard but occurs in some APIs)
  • Query parameters exceed URL length limitations
  • The API requires request body parameters
  • Performing searches or complex queries

Collections can contain numerous endpoints. Organize endpoints strategically:

By Configuration Type:

  • Firewall rules
  • Routing tables
  • Access control lists
  • System settings

By Environment:

  • Production endpoints
  • Staging endpoints
  • Development endpoints

By Update Frequency:

  • Frequently-changing data (retrieved daily)
  • Static configurations (retrieved weekly)

Use meaningful endpoint names and alternate filenames to maintain organization as your collection grows.

Once collections, credentials, and endpoints are configured, you can retrieve data either manually or through scheduled tasks.

From the collection detail view or the main API Collections dashboard:

  1. Select the collection containing endpoints to download
  2. Click the Download button or select Download Now from the actions menu
  3. Monitor progress in the task status indicator
  4. Review results showing successful downloads and any failures

The download process retrieves data from all configured endpoints in the collection sequentially.

API Collections integrate with rConfig’s scheduling system through Command Groups. To automate data retrieval:

  1. Assign a Command Group to the collection during creation or via collection edit
  2. Configure a scheduled task in Admin > Scheduled Tasks
  3. Select the command group associated with your API collections
  4. Set the schedule (cron syntax) based on how frequently configuration data changes

Scheduling Best Practices:

  • Critical infrastructure: Schedule hourly or every 4 hours
  • Stable environments: Daily downloads during off-peak hours
  • Static configurations: Weekly downloads sufficient
  • Rate-limited APIs: Space out downloads to avoid exceeding API quotas
  • Multiple collections: Stagger schedules to distribute load

Retrieved data is stored in rConfig’s configuration repository at:

/var/www/html/rconfig8/current/storage/app/configs/

Files are organized by device (API collection acts as the device context) and include:

  • Timestamp metadata for version tracking
  • Filename based on endpoint configuration or API response
  • Full content retrieved from the API endpoint

Downloaded configurations immediately become available for:

  • Configuration diff: Compare current vs. previous versions
  • Change detection: Identify modifications since last download
  • Search: Full-text search across API-sourced data
  • Compliance: Apply policy checks to API configurations
  • Reporting: Include in configuration reports and audits

API-sourced configurations integrate seamlessly with rConfig’s diff engine. After downloading API data, you can:

  1. Navigate to Configs > View Configurations
  2. Select the API collection (displayed as a device)
  3. Choose two configuration versions to compare
  4. View side-by-side or unified diff of changes

This capability is particularly valuable for:

  • Tracking changes in cloud security groups
  • Monitoring modifications to SD-WAN policies
  • Auditing updates to SaaS platform configurations
  • Detecting unauthorized changes to API-managed resources

When API endpoints are downloaded on a schedule, rConfig’s Change Detection system monitors for modifications:

  • Change Pulse displays recent changes across all API collections
  • Change Forge provides detailed analysis of what changed and when
  • Alerting can notify administrators of critical configuration changes
  • Change history maintains a timeline of all modifications

This provides the same change management governance for API-sourced data as traditional device configurations.

Retrieved API data is indexed for search and compliance operations:

Search Capabilities:

  • Full-text search across all API-sourced configurations
  • Filter by collection, vendor, or tags
  • Search within specific time ranges
  • Export search results for external analysis

Compliance Checking:

  • Apply compliance policies to API configurations
  • Detect policy violations in cloud configurations
  • Generate compliance reports including API data
  • Track remediation of non-compliant settings

API Collections appear in rConfig reporting alongside traditional devices:

  • Device inventory reports include API collections
  • Configuration age reports show last successful API download
  • Compliance summary reports aggregate policy checks across all sources
  • Change reports document configuration modifications from all sources

This unified reporting view provides comprehensive visibility across your entire managed infrastructure.

Many APIs return paginated results for large datasets. To retrieve complete configuration data:

Option 1: Multiple Endpoints

Create separate endpoints for each page:

  • Endpoint 1: /devices?page=1&limit=100
  • Endpoint 2: /devices?page=2&limit=100
  • Endpoint 3: /devices?page=3&limit=100

Option 2: Maximum Page Size

Configure the API to return maximum results:

  • Use query parameters like ?limit=1000&offset=0
  • Consult API documentation for maximum page size
  • Balance between complete data and API performance

Option 3: External Script Integration

For complex pagination logic:

  • Use Script Integration Engine (SIE) to write custom pagination handler
  • Script fetches all pages and combines results
  • Store combined output for rConfig processing

Some scenarios require dynamic endpoint paths based on variable data:

Challenge: Backing up configurations for devices whose IDs change or aren’t known in advance.

Solution Approaches:

  1. List then Retrieve Pattern:

    • Endpoint 1: Get device list from /devices
    • Use SIE script to parse device list
    • Script creates dynamic API calls for each device
    • Store results in rConfig structure
  2. Wildcard Endpoints (if API supports):

    • Some APIs support patterns like /devices/*/config
    • Returns all device configurations in single call
    • Check API documentation for pattern support
  3. Search-Based Retrieval:

    • Use API search endpoints to find resources
    • Filter by tags, properties, or criteria
    • Retrieve matching configuration data

APIs may return substantial data volumes that require special handling:

Performance Considerations:

  • Memory Usage: Large responses consume system memory during processing
  • Storage: Ensure adequate disk space at /var/www/html/rconfig8/current/storage/app/configs/
  • Processing Time: Large payloads increase download duration
  • Diff Performance: Comparing large configuration files requires additional resources

Optimization Strategies:

  1. Filter at API Level: Use query parameters to retrieve only necessary data
  2. Split into Multiple Endpoints: Divide large data sources into logical chunks
  3. Adjust Timeout Settings: Increase timeout values for long-running requests
  4. Schedule Off-Peak: Run large downloads during maintenance windows
  5. Monitor System Resources: Track disk space and memory usage

Organizations managing multiple customer environments through a single API platform:

Collection Architecture:

  • Option A: Single collection with endpoints per tenant

    • Pro: Centralized credential management
    • Con: All tenants use same command group schedule
  • Option B: Separate collections per tenant

    • Pro: Independent scheduling and configuration
    • Pro: Clearer organization in rConfig interface
    • Con: More credential sets to manage

Recommendation: Use separate collections for distinct tenants, especially when:

  • Different authentication credentials are required
  • Download schedules differ based on tenant SLAs
  • Organizational separation is important for reporting
  • Different teams manage different tenants

Many APIs implement rate limiting to prevent abuse. Strategies for working within limits:

Understanding Limits:

  • Check API documentation for rate limits (requests per hour/day)
  • Monitor usage through API provider dashboard
  • Track rConfig download frequency and endpoint count

Staying Within Limits:

  1. Optimize Endpoint Count: Combine data retrieval where possible
  2. Adjust Retry Settings: Reduce retry count to minimize failed request consumption
  3. Space Out Collections: Schedule different collections at different times
  4. Increase Retry Delay: Longer delays between retries prevent rapid limit exhaustion
  5. Contact Provider: Some providers increase limits for enterprise customers

Handling Rate Limit Errors:

When rate limits are exceeded:

  • rConfig logs the error with details
  • Retry mechanism may exhaust attempts quickly
  • Subsequent scheduled downloads will retry
  • Consider implementing exponential backoff in retry delay

Symptom: Downloads fail with authentication errors (401 Unauthorized, 403 Forbidden)

Possible Causes:

  1. Incorrect Credentials

    • Verify username/password are correct
    • Check for copy/paste errors in API tokens
    • Ensure no extra whitespace in credential fields
  2. Token Expiration

    • Bearer tokens may have expired
    • Request Token authentication may need credential refresh
    • Check API provider dashboard for token status
  3. Incorrect Authentication Type

    • Verify authentication type matches API requirements
    • Confirm header format expectations (Bearer vs. Token prefix)
    • Validate API Token is configured for header vs. query string correctly
  4. API Account Permissions

    • Ensure API account has read access to configured endpoints
    • Verify account isn’t locked or disabled
    • Check for IP restrictions on API access

Resolution Steps:

  1. Test credentials using the built-in credential testing feature
  2. Review API provider documentation for authentication requirements
  3. Check API provider dashboard for account status and access logs
  4. Verify network connectivity from rConfig server to API endpoint
  5. Review rConfig logs at /var/www/html/rconfig8/current/storage/logs/ for detailed error messages

Symptom: Downloads fail with timeout errors or no response

Possible Causes:

  1. Network Connectivity Issues

    • Firewall blocking outbound connections
    • DNS resolution failures
    • Routing problems between rConfig and API server
  2. API Performance Problems

    • API server overloaded or slow to respond
    • Large dataset requiring extended processing time
    • API rate limiting causing delays
  3. SSL Certificate Validation

    • Self-signed certificates failing verification
    • Certificate chain issues
    • Expired SSL certificates

Resolution Steps:

  1. Test Network Connectivity:

    Terminal window
    # From rConfig server
    curl -v https://api.example.com/endpoint
    # Check DNS resolution
    nslookup api.example.com
    # Verify routing
    traceroute api.example.com
  2. Adjust Timeout Settings: Contact rConfig support for timeout configuration options

  3. Disable SSL Verification: For self-signed certificates, disable “Verify SSL” in collection configuration

  4. Monitor API Status: Check API provider status page for service disruptions

Symptom: Downloads complete but data is incorrect, truncated, or missing

Possible Causes:

  1. Wrong Endpoint URL

    • Endpoint path doesn’t match API documentation
    • Base URL includes endpoint path (should be separate)
    • API version mismatch
  2. Missing Query Parameters

    • API requires parameters not configured
    • Filtering parameters excluding needed data
    • Pagination not handled correctly
  3. Response Format Issues

    • API returning unexpected format
    • Data encoding problems
    • Compression not being handled

Resolution Steps:

  1. Test Endpoint Directly:

    Terminal window
    # Test with curl
    curl -H "Authorization: Bearer YOUR_TOKEN" \
    https://api.example.com/v2/endpoint
  2. Review API Documentation: Verify endpoint paths, required parameters, and response format

  3. Check Response Headers: Ensure content-type and encoding are compatible

  4. Validate Base URL Configuration: Confirm base URL and endpoint URL combine correctly

Symptom: Failed downloads don’t retry or retry attempts fail immediately

Possible Causes:

  1. Retry Count Set to Zero: Retries disabled in collection configuration

  2. Retry Delay Too Short: API rejecting rapid retry attempts

  3. Persistent Authentication Failures: Credentials invalid, retries won’t help

  4. Rate Limiting: API blocking requests due to limit violations

Resolution Steps:

  1. Review retry count and delay settings in collection configuration
  2. Increase retry delay to 3000-5000ms for better reliability
  3. Fix authentication issues before relying on retry mechanism
  4. Monitor API rate limit status

Symptom: Downloads fail with SSL certificate validation errors

Possible Causes:

  1. Self-Signed Certificates: API using certificates not trusted by system
  2. Certificate Chain Issues: Intermediate certificates not properly configured
  3. Expired Certificates: API certificate has expired
  4. Hostname Mismatch: Certificate doesn’t match API hostname

Resolution Steps:

  1. For Self-Signed Certificates: Disable “Verify SSL” in collection configuration

  2. For Production APIs: Work with API provider to resolve certificate issues

  3. Update Certificate Store: Ensure rConfig server has current CA certificates

    Terminal window
    # Update CA certificates (Ubuntu/Debian)
    sudo update-ca-certificates
    # Update CA certificates (CentOS/RHEL)
    sudo update-ca-trust
  4. Verify Certificate Details:

    Terminal window
    openssl s_client -connect api.example.com:443 -servername api.example.com

Use Descriptive Naming:

  • Collection names should clearly indicate the platform or service
  • Endpoint names should describe the specific data being retrieved
  • Tag collections consistently across your organization

Example Naming Convention:

  • Collection: “AWS-Production-Account-123”
  • Endpoints: “EC2-SecurityGroups”, “VPC-RouteTables”, “IAM-Policies”
  • Tags: “Cloud”, “Production”, “AWS”

Group Related Endpoints:

  • Keep endpoints for a single service or platform in one collection
  • Separate production and non-production environments
  • Use command groups to schedule related collections together

Credential Management:

  • Use dedicated service accounts for API access
  • Implement least-privilege access principles
  • Rotate API credentials regularly
  • Document credential sources and responsible teams

Network Security:

  • Use HTTPS for all API connections in production
  • Restrict network access using firewalls when possible
  • Monitor API access logs for unauthorized activity
  • Consider using VPN or private endpoints for sensitive APIs

Data Protection:

  • Ensure rConfig server is properly secured
  • Implement appropriate access controls within rConfig
  • Include API-sourced data in backup procedures
  • Consider encryption requirements for sensitive configuration data

Scheduling:

  • Schedule large downloads during off-peak hours
  • Stagger collection schedules to distribute load
  • Match download frequency to configuration change rate
  • Avoid scheduling all collections at the same time

Endpoint Configuration:

  • Request only necessary data using query parameters
  • Split large datasets across multiple endpoints
  • Use filtering at the API level when available
  • Consider caching strategies for static data

Resource Management:

  • Monitor disk space usage in /var/www/html/rconfig8/current/storage/app/configs/
  • Track memory usage during large API downloads
  • Review task execution logs for performance bottlenecks
  • Archive or purge old configuration versions as needed

API Efficiency:

  • Minimize unnecessary API calls
  • Cache frequently-accessed data when appropriate
  • Use conditional requests (If-Modified-Since) if API supports
  • Respect API rate limits and implement appropriate delays

Regular Reviews:

  • Verify downloads complete successfully on schedule
  • Review task execution logs weekly
  • Monitor API provider service status
  • Check for API version updates or deprecations

Proactive Monitoring:

  • Set up alerts for failed downloads
  • Track credential expiration dates
  • Monitor API rate limit usage
  • Review configuration change patterns for anomalies

Documentation:

  • Document collection purposes and data sources
  • Maintain inventory of API credentials and owners
  • Record API endpoint dependencies
  • Keep notes on special configuration requirements

Version Control:

  • Treat API Collections as infrastructure-as-code
  • Document changes to collection configurations
  • Test endpoint changes in non-production first
  • Maintain rollback procedures for credential updates

Impact Assessment:

  • Understand downstream systems consuming API data
  • Evaluate change impact before modifying collections
  • Coordinate changes with stakeholders
  • Schedule changes during maintenance windows

Testing Procedures:

  • Test new endpoints before adding to production collections
  • Validate credential changes using test function
  • Verify data quality after configuration changes
  • Monitor first several scheduled runs after changes

Scenario: Organization manages multi-cloud infrastructure across AWS, Azure, and GCP with hundreds of security groups, network policies, and access controls.

Implementation:

  1. Create Collections per Cloud Provider:

    • AWS-Production: Security groups, VPC configs, IAM policies
    • Azure-Production: Network security groups, virtual network configs
    • GCP-Production: Firewall rules, VPC settings
  2. Configure Endpoints for Key Resources:

    • Security groups and firewall rules
    • Network routing tables
    • Access control policies
    • Load balancer configurations
  3. Schedule Regular Downloads:

    • Security-critical resources: Every 4 hours
    • Network configurations: Daily
    • IAM policies: Twice daily

Benefits:

  • Detect unauthorized security group modifications
  • Audit access control changes across cloud platforms
  • Maintain configuration history for compliance
  • Compare cloud configurations across environments

Scenario: Enterprise SD-WAN deployment with centralized controller managing 500+ edge devices through API.

Implementation:

  1. Controller API Collection:

    • Collection: “SD-WAN-Controller”
    • Authentication: Bearer Token from controller admin portal
    • Base URL: https://controller.sdwan.company.com/api/v3/
  2. Configuration Endpoints:

    • /sites - All site configurations
    • /policies/qos - QoS policies
    • /policies/routing - Routing policies
    • /policies/security - Security policies
    • /templates - Configuration templates
  3. Scheduled Downloads: Every 6 hours

Benefits:

  • Track policy changes across SD-WAN fabric
  • Audit template modifications
  • Detect configuration drift from standards
  • Maintain disaster recovery configurations

Scenario: Security team uses cloud-based firewall service protecting multiple applications. Need to maintain backup of all security policies.

Implementation:

  1. Security Platform Collection:

    • Collection: “CloudFirewall-Production”
    • Authentication: API Token (key in header)
    • Base URL: https://api.cloudfirewall.com/v2/
  2. Policy Endpoints:

    • /policies/firewall - Firewall rules
    • /policies/waf - Web application firewall rules
    • /policies/dlp - Data loss prevention policies
    • /policies/threat - Threat prevention settings
    • /applications - Protected application configurations
  3. Scheduling:

    • Firewall rules: Every 2 hours (frequently modified)
    • Other policies: Daily

Benefits:

  • Rapid recovery after accidental policy deletion
  • Audit trail for security policy changes
  • Compliance documentation for security controls
  • Comparison of policy versions during troubleshooting

Scenario: Managed Service Provider supporting 50 customers, each with their own cloud management platforms.

Implementation:

  1. Per-Customer Collections:

    • Collection naming: “Customer-[Name]-[Platform]”
    • Separate credentials per customer
    • Individual command groups per customer tier
  2. Standardized Endpoints Across Customers:

    • Consistent endpoint naming conventions
    • Same data retrieved for all customers
    • Uniform tagging structure
  3. Tiered Scheduling:

    • Premium customers: 4-hour intervals
    • Standard customers: Daily
    • Basic customers: Weekly

Benefits:

  • Standardized configuration management across customer base
  • Scalable approach for customer growth
  • Individual scheduling based on SLA requirements
  • Centralized visibility across all managed environments

Scenario: IT operations team maintains Configuration Management Database (CMDB) and needs network device data from rConfig synchronized with CMDB API.

Implementation:

  1. CMDB API Collection:

    • Collection: “CMDB-Integration”
    • Authentication: Request Token (login to CMDB API)
    • Endpoints for different CI types
  2. Bidirectional Data Flow:

    • rConfig retrieves device inventory from CMDB
    • CMDB updated with configuration status from rConfig (via separate process)
    • Regular synchronization maintains consistency
  3. Scheduled Synchronization: Every 4 hours

Benefits:

  • Single source of truth for device inventory
  • Configuration status reflected in CMDB
  • Automated reconciliation of device data
  • Enhanced CMDB accuracy with configuration details

Combining API Collections with Traditional Devices

Section titled “Combining API Collections with Traditional Devices”

Organizations can create comprehensive configuration repositories by combining traditional device backups with API-sourced data:

Hybrid Collection Strategy:

  1. Traditional Devices: SSH/Telnet connections to network hardware
  2. API Collections: Cloud platforms, controllers, SaaS services
  3. Unified View: All configurations visible in single interface

Example Topology:

  • Physical routers/switches backed up via SSH
  • SD-WAN controller backed up via API
  • Cloud security groups backed up via API
  • Firewall management platform backed up via API

This approach provides complete configuration visibility across hybrid infrastructure.

The Script Integration Engine (SIE) can process API-sourced data:

Integration Pattern:

  1. API Collection Downloads: Retrieve configuration data via API
  2. SIE Script Trigger: Executed after successful download
  3. Data Processing: SIE script parses API response
  4. Action Execution: Based on processed data, SIE performs actions

Use Cases:

  • Parse API data and generate compliance reports
  • Extract specific values and trigger alerts
  • Transform API data format for external systems
  • Aggregate data from multiple API sources

Some APIs provide webhooks for event-driven updates. While rConfig doesn’t natively process webhooks, you can implement a pattern:

Architecture:

  1. Webhook Receiver: External service receives API webhooks
  2. Trigger Mechanism: Webhook receiver calls rConfig API to trigger download
  3. Immediate Download: Specific API collection downloads on-demand
  4. Change Detection: rConfig identifies and records changes

This enables near-real-time configuration tracking for critical resources.

The API Collections feature continues to evolve based on customer feedback and emerging use cases. Planned enhancements include:

Current: Manual configuration of multiple endpoints for paginated results

Planned: Automatic pagination handling

  • Configure page size and offset parameters
  • System automatically retrieves all pages
  • Combined data stored as single configuration

Timeline: Under evaluation for future release

Current: GET and POST methods supported

Planned: Support for PUT, PATCH, DELETE

  • Enable configuration push to APIs (write operations)
  • Update remote configurations from rConfig
  • Delete outdated resources via API

Timeline: Research phase

Note: This represents a significant architectural change as API Collections currently focus on read-only operations. Write capabilities require extensive validation and error handling.

Current: REST API support only

Planned: GraphQL query support

  • Define GraphQL queries in endpoint configuration
  • Retrieve specific data fields efficiently
  • Reduce over-fetching of unnecessary data

Timeline: Under consideration

Current: Five authentication types covering common patterns

Planned: Additional authentication support

  • OAuth 2.0 flow automation
  • Multi-factor authentication handling
  • Certificate-based authentication
  • Custom authentication handlers

Timeline: Future development

Current: Raw API responses stored as-is

Planned: Built-in transformation capabilities

  • JSON to XML conversion
  • Data filtering and field extraction
  • Format normalization
  • Custom transformation scripts

Timeline: Research phase

Authentication Issues:

  1. Test credentials using built-in test function
  2. Verify no extra whitespace in credentials
  3. Check authentication type matches API requirements
  4. Review API provider account status

Connection Problems:

  1. Test network connectivity from rConfig server
  2. Verify DNS resolution
  3. Check firewall rules
  4. Disable SSL verification for self-signed certificates

Data Issues:

  1. Test endpoint URL with curl
  2. Verify base URL and endpoint URL combine correctly
  3. Check API documentation for required parameters
  4. Review response format and encoding

Performance Issues:

  1. Check retry count and delay settings
  2. Monitor API rate limit usage
  3. Schedule large downloads during off-peak hours
  4. Review disk space availability
Provider TypeAuthentication MethodConfiguration
AWS APIsAPI TokenKey: X-API-Key, Value: AWS access key, Add To: Header
Azure APIsBearer TokenToken: Azure AD token, Prefix: Bearer
GCP APIsBearer TokenToken: OAuth 2.0 token, Prefix: Bearer
SD-WAN ControllersRequest TokenLogin endpoint + username/password
SaaS PlatformsAPI TokenKey: API-Key or custom, Value: provided key, Add To: Header
Legacy SystemsBasicUsername/password in base64 encoding
ItemPath
Retrieved configurations/var/www/html/rconfig8/current/storage/app/configs/
Task execution logs/var/www/html/rconfig8/current/storage/logs/
Application configuration/var/www/html/rconfig8/current/.env
ScenarioRetry CountRetry Delay
Production APIs (high reliability)3-53000-5000ms
Testing/Development1-21000ms
Rate-limited APIs2-35000-10000ms
Large downloads (slow APIs)2-32000-3000ms
Critical configurations55000ms

API Collections extend rConfig’s configuration management capabilities to modern, API-driven infrastructure. By treating API endpoints as configuration sources, organizations achieve comprehensive visibility across hybrid environments combining traditional network devices with cloud platforms, SD-WAN controllers, and SaaS services.

Key Takeaways:

  • Unified Management: Apply consistent governance to all configuration sources regardless of access method
  • Flexible Authentication: Five authentication types support diverse API platforms
  • Seamless Integration: API-sourced data integrates with diff, change detection, search, and compliance features
  • Scalable Architecture: Three-tier collection structure promotes reusability and efficient management
  • Automated Retrieval: Scheduled downloads ensure configuration data remains current
  • Enterprise Ready: Robust error handling, retry logic, and monitoring capabilities

API Collections address the modern challenge of distributed configuration management, providing a single pane of glass for configuration visibility, change tracking, and compliance across your entire infrastructure landscape.

Organizations leveraging API Collections can maintain the same rigorous change management processes for cloud resources as they do for traditional network devices, ensuring comprehensive governance in increasingly complex, hybrid IT environments.

For advanced integration requirements or high-volume API deployments, rConfig Enterprise Support can provide architectural guidance, custom integration assistance, and optimization recommendations. Contact [email protected] for more information.