OCT 19, 2015 UPDATE using API
DEC 3, 2014 UPDATE using URLs
With the release of the Scrutinizer v7.3.1 updates, we have made available the ability to link back to devices in Scrutinizer from 3rd party applications such as Zenoss, WhatsUp Gold, and InterMapper, among others.
For example, in WhatsUp Gold v12, in the \Program Files\Ipswitch\WhatsUp\HTML\NmConsole\CoreNm\Tools\Public.inc file that we include in the WhatsUp Gold v12 integration package, the following lines:
return "http://xxx.xxx.xxx.xxx/index.cgi?el=" + sNetworkAddress + "&user=USER&pass=PASSWORD";
would be replaced with:
return "http://xxx.xxx.xxx.xxx/search.html?el=" + sNetworkAddress + "&user=USER&pass=PASSWORD";
for Scrutinizer v7.
ie. Replacing index.cgi with search.html. Makes it pretty simple to upgrade any current 3rd party integration back to Scrutinizer v7.
The url that is passed to Scrutinizer:
requires the Scrutinizer server’s ip address or hostname be entered in place of xxx.xxx.xxx.xxx, the IPADDRESS field be replaced by the variable name for the application you are integrating with, and the user credentials (replace USER and PASSWORD) for the level of access this integration is allowed.
On that note, in version 7 of Scrutinizer, users’ permissions are based on group membership. Permissions are set at the group level, then users are added as members to the groups appropriate to their access level.
So if you did not want to give open access to Scrutinizer for anyone using WhatsUp Gold, the user credentials that you would enter in the url would probably not be from the Admin group, but rather the Guest group, or another group without admin level permissions.
Using the 3rd Party Integration link:
By clicking on the Scrutinizer icon in the Device Toolbar in WhatsUp Gold:
the following Search page is opened:
In this case, we have one instance of the host ip 184.108.40.206 found, as source address. Clicking on source in this screen will then bring up the Conversations WKP (Well Known Port) report for this host ip.
Why would you want to integrate Scrutinizer with your other applications (e.g. Nimsoft, Solarwinds Orion, etc.)?
Say you get an alert from Zenoss that a specific interface on a router has exceeded the utilization threshold. By clicking on the Scrutinizer integration icon for that device, you can drill right down to the actual flow data and see who is causing the high utilization, what applications they’re using and who they are talking to.
No longer do you just see that there is a problem on your network, but now you can see who and what is causing that problem and resolve it, by integrating NetFlow management with your existing network management application.