In-Depth Notes on Inventory Jobs and Scanner Process

Overview of Inventory Jobs
  • Objective: Understanding the key components and steps involved in the inventory scanning process, specifically the six jobs related to the full scan execution.

Overview of the Six Jobs
  • Essential to performing successful inventory checks.
  • Detailed examination of each job aids in identifying and resolving potential issues during execution.

Job 1: Remove Local Scan Log File
  • Action: Delete the latest scan log on the local machine.
  • Importance: Ensures that the scan begins with a clean slate, avoiding discrepancies in log data.

Job 2: Scanner Connection
  • Action: Establish a connection with the scanner.
  • Result: Confirms the scanner's operational status before proceeding to the next job.

Job 3: Engine to Java Mode Check
  • Purpose: Verify if the scanner is running in ADID mode.
  • Parameters:
    • Parameter 1: User med DB
    • Parameter 2: AI option as a file on the target machine.
  • Outcome: Confirms readiness for scanning if in the correct mode.

Job 4: Log Scan the Node
  • Action: Check if the target machine is logged.
  • Importance: Reports an error log if the machine is logged; otherwise, logs the machine for scanning.

Job 5: Check UUID Consistency
  • Key Step: Validate the UUID of the target machine against the stored UUID.
  • Result: Confirms that the machine is properly registered and can be scanned.

Job 6: Acceptance Check
  • Condition: Dependence on the parameter set to 2 for execution.
  • Flowchart Reference: Additional details provided in the flowchart.

Additional Steps in Job Execution
  • Upgrade the Scanner: Uploads the scanner and modifies file permissions for security. Requires SSH account permission.
  • Launch Scanner: Converts user DB parameters into scanner commands; checks for successful scan completion.
  • Download Scan File: Downloading the scan log based on the log level settings (debug or chest).
  • Delete Results: Determines whether to delete previous scan results on the target machine.

XML in Virtual Processing
  • Purpose: SCAD file processing.
  • Procedure: Retrieve the processed scan file and verify that it’s prepared for analysis using XML in virtual.

Final Steps
  • Data Passing: Writing data into user med DB and generating CIC (Continuous Integration) outputs.
  • Lock Management: Understanding lock acquisition and release timing relevant to the scanning process.

Common Query: Lock Handling
  • Question: How and when does the lock release occur?
  • Response: Lock releases after the scaffold download is complete. Ability to terminate the process manually via the target machine is available.

Considerations for Optimization
  • Timeout Settings: Adjustment of timeout configurations in the SCANA configuration file could enhance efficiency.
  • Resource Allocation: Additional CPU resources may be required for optimal scanner performance on the target machine.

Conclusion
  • Documentation: More detailed instructions available in related documents.
  • Contact: Availability for further questions via Teams.