Medulla Step by Step Guide

Take control of Medulla easily. This visual guide accompanies you step by step in the daily use of the tool, whether you discover Medulla or want to go further in its use.
With clear explanations, screenshots, concrete examples and essential reminders, explore each function with confidence without unnecessary jargon, but with the effectiveness you need.

Chapter 1: Table of Contents

Chapter 1: Table of Contents

Contents

Contents

Chapter 1: Contents

First steps in Medulla

The Kiosk module

Understanding roles and users

Organize your park with groups

Manage computers

Imagining – Creating and deploying images

Deployment of packages

Newspapers, monitoring and audit

Manage updates

Backup

Background

Administration

Chapter 2: First steps in Medulla

Chapter 2: First steps in Medulla

How to connect to Medulla

To access Medulla's features, you need to log in with your credentials. This step guarantees the security of your data and personalized access. 

image.pngConnection steps

Choose your language

On the login page, select the language of your choice from the drop-down menu. By default, the language is French, but you can change it if necessary.

Enter your ID

Enter the username or e-mail address provided when creating your account.

Enter your password

In the Password field, enter your personal password. Make sure it is spelled correctly: upper and lowercases are taken into account.

Validate connection

Click the "Log In" button to access your user space.

For security reasons, avoid saving your password on shared devices.

In case of connection problems, contact your organisation's technical support

Chapter 2: First steps in Medulla

Scoreboard

tableau de bord.png

The Medulla dashboard allows you to track the real-time status of your infrastructure with customizable widgets. You can move, resize and organize widgets as you wish. Each widget also has a button to display or hide it, according to your needs.

Some widgets incorporate dynamic graphics for a better understanding of data, updating in real time.

Widgets available

Widgets are categorized by categories and allow you to view various information about your infrastructure. The following are the main categories:

General

image.png

Information provided
Customization

This widget can be moved wherever you want, and it is resizeable to display more or less information according to your needs. You can also hide it with the toggle if you do not need to see this information permanently.

Graphical representation
The general widget includes linear graph foruse of CPU and one circular chartforuse of RAM, allowing a quick and intuitive visualization of the use of system resources. The RAM chart shows the distribution of the free and used space, while the CPU load chart helps you track the server performance in real time.

image.png

Online machines

Information provided
Customization

This widget can be moved and resized as desired. The toggle allows you to display or hide it according to your preference.

Graphical representation

Circular graph to see the distribution of machines online and offline.

image.png

Inventory

Information provided
Customization

The widget is customizable and can be moved and resized. You can also hide it if you don't need it.

Graphical representation

One circular chartshows the items in the inventory, and highlights those requiring updating, thus providing an overview of the inventory status

In summary, the Dashboard is your central entry point to manage and monitor the status of your IT infrastructure. It is designed to be flexible and reactive, providing an overview of the performance of your machines and resources, while allowing you to react quickly to any necessary alerts or updates.

With this set of tools and graphical visualizations, the dashboard gives you optimal control for managing your systems effectively, while having a clear and detailed view of your entire IT environment.

Chapter 3: Kiosk

Chapter 3: Kiosk

Kiosk

image.png

When you arrive on theKiosk interface main page, you are immediately directed to the section Profile List, located at the centre of the page. This is the first thing you will see when you arrive on this page.

The Profile List Section

This section is placed at the centre of the screen and displays all user profiles that have already been created. Depending on the number of existing profiles, you can see different information:

Existing profiles

If profiles have already been created, each profile will appear in a list with information such as:

image.png

No profiles created

Don't panic, creating a profile is simple and fast. Follow the steps below to add a new profile in Kiosk. We'll do it together, step by step.

Click here to see...

Chapter 3: Kiosk

Add Profile

DgUJ8aKYPGboVAWE-image.png

To create a new profile, start with the area to the left of the page.

image.png

Profile Creation Steps

Click on "Add Profile"

You will find a link entitled Add a profile. Click on it to access the profile creation page.

Fill in the creation form

Once on the page, you will see the form to complete in the centre of the screen. This is where you will configure the profile information.

Information to be completed

  1. Profile Name
    Enter a name for the profile. This name will then appear in the profile list.
    Examples: User1, HR Profile.

  2. Profile Status
    Choose the status of the profile when creating it:

    • Assets The profile will be operational immediately.

    • Inactive : The profile will be created but will remain inactive (it will have to be activated later).

  3. Manage packages (associated applications)
    Two blocks are present to manage applications:

    • Available packages : List of applications you can add.
      Use the field "Search by name..." to search for a specific application.

    • Allowed packages : List of applications already added to the profile.
      To add an application, select here in Available packages. It will then be added in .

  4. Source of applications
    At the bottom of the form, choose the source(s) of the applications to associate:

    • Entity

    • LDAP

    • User

Finalization

Once all the information has been completed, click the button Create to validate the profile creation. The new profile will then be added to the Profile List, visible in the centre of the home page.

When adding packages to a Kiosk profile, it is essential that the profile is associated with an inventory.
Without this association, the assignment of packages cannot be carried out.

When deploying packages via Convergence, they must also be linked to an inventory.
Without this link, deployment cannot be performed.

Chapter 4: Users

Chapter 4: Users

User Management in Medulla

image.png

This section guides you in user management within Medulla. You will learn how to consult existing users, add new ones, assign them roles and organize them into groups.
Unlike the module Kiosk, which focuses on direct interaction, here the aim is to structure access and enhance security through clear permissions.

The User List section

Located in the centre of the screen, this section displays all registered users in your Medulla environment.

un utilisateur creer .png

Existing users

If users have already been created, they will appear as a table with the following information:

No registered user

If no user has been added again, the central section will remain empty. A message will show that no user has been saved.
See how to add a user

Chapter 4: Users

Add User

image.png

To create a new user in Medulla, everything happens in the left side column.

Ajouter un utilisateur.png

Accessing Creation

Click the linkAdd User to open the creation page.
The form will be displayed in the centre of the screen.

Complete the Creation Form

Here are the fields

User groups

image.png

Group organisation makes it easy to manage access rights.


Define access rights (Entity rights)

At the bottom of the form you can set user access rights through several options:

These options define the scope of actions that the user can perform in Medulla.


Finalizing the creation

Once all the fields are completed, click on .
The user will then be automatically added to the List of Users, visible in the centre of the main page

Edit an existing user

un utilisateur creer .png

At any time, you can change the information of an existing user.

Modify MMC Rights

To adjust a user's access rights in Medulla, you can change its MMC rights (also called ACLs – Access Control Lists).

Quick access to MMC rights

sinceList of users, click on the small Keyimage.png located to the right of the user line.

You will be redirected to the page .

You will see acomplete list of modules and pages de Medulla, sorted by categories Users, Groups, Computers, Logs, Imaging, etc.

If no not rights on a module (e.g. not see logs associated with this module in history, even if access to history is allowed.

Chapter 6: Groups

Chapter 6: Groups

Groups

image.png

Group management is an essential pillar of administration in Medulla.
Instead of configuring the rights and resources for each user or machine individually, the groups enable the organization to be centralized and common rules to be applied more effectively.

The groups are used to:

This approach facilitates Global pilotage, improves Security and strengthens the organisational coherence.

Unlike Kiosk, which works by individual profiles, the logic of groups in Medulla is designed for a collective and structured management of accesses and configurations.

List of Groups

On the main page of this module you have access to a full overview of existing groups in your Medulla environment.

image.png

Existing groups

When groups are already created, they are displayed as a table, with the following information:

image.png

Continue here to see how create a group

Chapter 6: Groups

Add Group

image.png

To create a new group in Medulla, follow these simple steps

image.png

Go to the creation page

In the left side menu, click onAdding to open the group creation page.

Form of creation

Once on the dedicated page, you will find a form to complete to define the group properties.

Fields to be completed


The name must start with a letter, and contain only tiny characters or numbers. This ensures consistency throughout the system.

Finalizing the creation

Once all fields are filled, click on Create.
The group will then be recorded and added automatically to the List of Groups on the main page.

Chapter 5: Computers

Chapter 5: Computers

Computers

image.png

This section is dedicated to the complete management of all IT posts in Medulla. Whether you want to monitor, organize, or interact remotely with your machines, everything is centralized in a user-friendly and intuitive interface.

Computer management in Medulla is based on a centralized interface accessible via the XMPP view. From this interface, you have access to all the features necessary to monitor machine condition, perform targeted searches, apply filters, and perform various actions on your computers, all in real time.

XMPP View of Computer Posts

The XMPP view is the heart of post management in Medulla. It allows you to track and interact with each machine in real time. This module centralizes the information and possible actions for complete control of your computer fleet

Filters and Post Selection

At the top of the page, you have three radio filters to select the positions according to their connection state:

These filters are convenient for quick and targeted machine management based on availability.

Entity Filtering

The menu All my entities allows you to filter computers according to their assignment to a particular entity. This filter is particularly useful in multi-entity environments, allowing you to segment your fleet according to services or structures.

Global research

Through the search field "Search all fields", you can search for a machine by typing a keyword. This search field applies to all fields visible in the table, such as machine name, IP address, operating system, or associated entity.

Actions Available on Post

Under each IT station in Medulla, you have several actions at your disposal for remote management and control. These actions include advanced features such as machine inventory, monitoring, remote control, and much more. For a detailed view of each function, see Admin part which addresses these options in depth.

Here is an overview of the actions available:

image.png GLPI Inventory Monitoring and managing hardware and software configurations via integration with GLPI.

monitoring.pngMonitoring Real-time monitoring of machine performance.

control.pngRemote control Direct access to machines to perform troubleshooting or maintenance actions.

backup.svg.pngUr BackupManagement of machine backups via UrBackup.

deploy.pngSoftware deployment Remote software installation or updating.

imaging (1).pngManaging Imaging Deployment and management of system images.

console.pngXMPP Console Verification of machine connectivity and real-time interaction via XMPP.

settings.pngEdit configuration files Changing remote configuration files.

All GLPI computers

image.png

This section displays only computers that have been synchronized withGLPI through automated inventory. You can view all machines registered in the GLPI system and check their status.

Features:

If no posts appear here, this means that the GLPI inventory is not yet configured or that the machines have not been synchronized

Chapter 5: Computers

All groups

Favorite groups

Once computer groups are created, you can mark some as favorites for quick access.

Favorite groups are useful for:

All groups

image.png

This section displays all groups computers available in your Medulla instance. You can manage all groups centrally and carry out large-scale actions, such as:

It also allows for a large-scale set of actions, such as software deployment, installation of updates, reboot of remote machines, or export of reports in CSV format

Add Group

Medulla offers several ways to structure and organize your computer park through a flexible group system. When creating a group, you can choose between several methods:

Creating a dynamic group

image.png

The dynamic groups allow you to automatically target machines according to predefined criteria. These groups automatically update as soon as a machine meets or no longer meets the chosen criteria.

Modules available for creating a dynamic group:

Dynamic groups are particularly useful in constantly changing environments or for automated targeted deployment

Creation of a static group

image.png


The static groups are created manually, explicitly selecting the machines to include. Unlike dynamic groups, the composition of a static group does not change automatically. You will need to add or remove machines as needed.

Operation:

Typical examples of use:

The static group is ideal for specific contexts or tracking

Creation of a static group from an import

image.png

If you already have a list of machines (in format CSV or Excel), you can easily create a group from this file.

Creation Steps:

This method is perfect if you retrieve information from an external system or a structured Excel sheet.


Chapter 5: Computers

Network clock

image.png

The Network clock (or Wake on LAN - WOL) is a convenient feature that allows you to remotely start off machines, provided they are configured to accept this command.

How does it work?

Accessible from the Medulla main menu, this feature displays a list of machines compatible with the network alarm. You will be able to take control remotely and manage the ignition of the stations without having to move physically.

Information available for each machine:

Prerequisite:

The Wake-on-LAN based on an adequate configuration of the BIOS/UEFI of the positions. Make sure this feature is enabled on the machines before you can wake them up remotely.

Typical uses:

Benefits of Wake on LAN:

This feature is based on the BIOS/UEFI settings of the stations (Wake-on-LAN must be enabled)

Typical use

Chapter 5: Computers

List of non-inventory machines

image.png

This section allows you to quickly identify machines that are not properly inventoried in Medulla. They may be machines that have never reassembled information, or machines that have been offline for too long.

Objective:

Overview:

When accessing this page, a table will appear, listing all machines with inventory anomalies. Here is the information available in this table to help you diagnose and solve these problems:

Columns in the table:

Typical use cases:

Practical tip:

If a machine appears in this list but no longer appears in "All computers", this may mean that it has been disconnected for a long time or that its XMPP/GLPI agent is misconfigured. You can then take the necessary steps to solve the problem (reinstallation of the agent, deletion of the entry, etc.).

Chapter 5: Computers

Monitoring alerts

image.png

This section centralizes all alerts generated by monitored machines in your Medulla environment. It allows you to track, in real time or delayed, hardware or software incidents detected by supervisors deployed on your machines.

Objective

Alert history

When no alert is currently active, you can view history of past events. This includes resolved alerts, thus ensuring complete traceability of incidents and interventions on your machines.

Information available in history:

If alerts are recorded, the table will show the following:

In particular: If the table is empty, this means that no alerts have yet been detected or stored in your environment.

Monitoring Configuration

image.png

In this section, you can customize the monitoring settings applied to positions via a centralized configuration file.

When you access this page, an edit area is displayed directly on the screen, allowing you to change the contents of the following configuration file

/var/lib/pulse2/xmpp_monitoring/confagent/monitoring_config.ini

All changes you make in this space are automatically recorded, no need to click on a validation button.

Recommendations

Before any modification, it is advisable to make a backup of existing file.

Apply the changes with precautionary and test them on a few machines.

Contact your system administrator if you have a doubt about a parameter.

Chapter 5: Computers

Quick Action Custom

image.png

The Custom Quick Action section allows you to create and manage automated actions that will be executed remotely on your machines. These actions may include specific scripts or commands, thus facilitating mass management and automation of administrative tasks on multiple posts simultaneously.

Overview

Once in this section you will see a list of all the custom quick actions already configured for the user root. If no action has yet been created, an empty array will appear, allowing you to add custom commands.

The table contains the following information:

Create a new custom quick action

image.png

To create a new custom quick action, just click on the button "Create a personalized quick action" at the top of the page. This will redirect you to a form where you can define the parameters of your new order.

Form for creating a custom quick action

The form is divided into several essential fields:

Once all fields are filled, you will only have to validate to record and activate the action. The action will now be available in the list of custom commands and can be executed on target machines.

Verification : Before performing an action on a large number of machines, test there on an isolated machine to make sure it works as intended.

Documentation : It is recommended that each quick action be well described so that all users can understand its usefulness and effects.

Security : Controls can have a significant impact on systems. Ensure that only authorized and necessary actions are performed.

Chapter 6: Imagining I

Chapter 6: Imagining I

Imagine

image.png
This section is dedicated to thecheck the state of the server's imaginationg, an essential step before any action to deploy a system or create a reference image.

The imagining server is a central component of Medulla: it allows to send a system image (a complete "photocopy" of a computer) to one or more stations. If this server is unavailable or failing, no imaginative operation will succeed.

It is therefore recommended that: systematically check its status before each action of this type.

Access to the Imaging Server Status

When you clicked on the tab Imagination server statusg , we immediately access the page where the pre-selected entity is neither private nor public, so we will call it general.

"General" entity with offline server

This means that the "General" entity is inactive. You will not be able to deploy image on the machines of this entity

Understanding the Information Provided

Selected entity

At the top of the page, you have to chooseentity concerned.
Entities are logical groupings, often used to separate environments (e.g. services, departments, institutions).

entityselection.png

Examples of entities:

Why is it important:


Each entity can be connected to a separate d-imag server. It is therefore crucial that control the correct server status for the entity you want to use.

Server status

For the selected entity, a visual indicator informs about the current status of the server.

Three statutes may appear:

"Private" entity with connection error

Even if the server seems accessible, communication does not work.
deployment will fail from launch, because the connection between Medulla and the server is broken.

image.png

"Public" entity with successful connection

publicentittstat.png

If there are no errors and the server is online, this means that the server is active and ready to be used, so it will display different statistics as shown with the "public" entity above.

In this case, it will display various information:

Before any operation of imagining, check that you are well positioned on the right entity and that the status of the server is indicated as "Available".
In case of status Offline or « Connection error », do not pursue and inform the administrator or support.

Chapter 6: Imagining I

Manage Masters

mastergestionpublic.png
One Master is a complete system image, created from a configured position. It serves as a model for the rapid and homogeneous deployment of an environment on other machines.

Before deployment, it is essential to know the available Masters and how to use them.

Reading displayed information

Each master is presented as a line with several elements:

Use a master for deployment

The master system will automatically be installed on the target stations without manual intervention on each machine.

Actions available for each image

For each master, you can perform several operations:

Before using a master, check that it matches the desired configuration, including operating system, version and installed software. Do not delete a master unless you are certain that it is no longer used, as this action is irreversible. In case of doubt about the image to choose from or the action to take, it is recommended to contact your technical reference for advice.

Chapter 6: Imagining I

Manage start-up services

servicegestion.png

Start-up services allow machines to launch an image from the network (e.g. via PXE).

To configure

You can

Chapter 6: Imagining I

Default Start Menu

image.png

This section lets you choose the behavior automatic or manual When machines start.

Access

Available options

You can edit each option to adjust:

Chapter 6: Imagining I

Post-imagination scripts

postimagingscript.png

Enables automated actions after the deployment of an image (such as installing software or configuring the network).

To create/modify a script

Chapter 7: Imagining II

Chapter 7: Imagining II

List of profiles

image.png

Displays all user profiles created for imagining.

Side menuList of profiles

Central area showing profiles

Chapter 7: Imagining II

Add Profile

addprofile.png

A profile includes a set of automatic actions that run after a system image is deployed to a post. These actions automate tasks such as copying files, system configuration, or installing specific elements.

Access and editing of a profile

From the management interface it is possible to:

List of available post-installation actions

Here are the actions that can be defined in the desired order.
All are disabled by default, you must select them manually if you want to apply them:

Use of the profile

This profile will then be associated with a deployment task, so that the selected steps are automatically applied after installation.

Chapter 7: Imagining II

Configuring the imaginationg

Allows to adjust the overall parameters of the Imaging environment (e.g. servers used, strategies, etc.)

imagingconfigpartI.png

imagingconfigpartII.png

Side menuConfiguring the imaginationg

Change the necessary settings

Note: this section can impact the entire environment → to be reserved for experienced administrators.

Chapter 7: Imagining II

Sysprep Response File Manager

Manages the response files used during Windows automated installation.

sysprepgestionpartI.png

sysprepgestionpartiII.png

To use it

These files contain silent installation settings (machine name, language, product key, etc.)

Chapter 7: Imagining II

Imagination groupsg

Displays all existing imagining groups.

image.png

Add a group of imagining

Create an imagining group to organize your deployments.

image.png

image.png

Steps

This group will then appear in the list of available groups.

Chapter 8: Packages

Chapter 8: Packages

List of packages available

image.png
The deployment of packages makes it possible to install, uninstall or perform specific actions on several remote stations in a centralized and automated way. It is a key feature for the management of a computer fleet, offering accurate speed, homogeneity and monitoring.

This section displays all packages ready for deployment.

Access

Side menu List of packages

Viewed Content

Each row of the list presents

Available functions

This allows rapid and organized consultation of available deployment tools.

Chapter 8: Packages

Add a new package

packageaddpartI.png

packageaddpartII.png

Creating a package consists of setting an action (installation, uninstallation, script...) that will be deployed on one or more posts. The creation form allows you to precisely configure the behavior of the package and its execution options.

From the main menu, click "Add Package" to open the creation assistant.

Then select the original files to use in the package. Four options are available:

General information to be provided

Sharing

ChooseGlobal Packages to make the package visible throughout the platform.

Name

Give an explicit name to the sample package: Install_Chrome
Special and accented characters are not allowed.

Version

Indicate an example version number:1.0.0.

Description

Briefly summarize the objective of the package.

Operating system

Select the target OS, for example:Windows.

Define the technical modalities of deployment

Method of transfer

Generally use pushrsync (recommended).

Bandwidth limitation

Optional value to limit the speed of the transfer ex 500

Choose betweenHigh priority or Normal priority, depending on the urgency of deployment.

Launcher

Specify the path to the executable file that must be started after installation (e.g.:C:\Program Files\my_app\app.exe).

If your application requires other components to work

Find and add the necessary dependencies via the available list (examples:Extract drivers, Medulla Agent).

Added dependencies will appear in the corresponding section.

Associate with inventory

Enable this option to allow the package to be tracked after installation.

You can add custom actions to the package, depending on your needs:
The package may consist of several stages depending on its life cycle
To interact with the end user
Define package behavior at the end of the process
Once all sections are configured and verified

Click Add to save the package.

It will then be accessible from the library to be used in a deployment rule or triggered manually.

Chapter 8: Packages

Packages pending deployment

This section allows you to view packages that have been created or added but have not yet been sent to the target posts. It is mainly used to organize, verify or delete pending actions before they are executed.

waitingpackage.png

Access:

Side menu → Pending packages

Section content:

Once in this page, a list of all queued packages is displayed with the following information for each entry:

Possible actions:

Note: This page does not allow directly to launch a deployment, but it helps you control the items still in queue. Deployment is usually done from another dedicated section or via an action triggered through a scenario or rule.

Chapter 8: Packages

List of deployment rules

Deployment rules allow for planning or limiting deployment according to specific criteria (time range, type of machine, group of users...).

ruleslistpartI.png

Access:

Available information:

Chapter 8: Packages

Add Custom Rule

Creating a rule allows you to define precisely when and on which machines a package will be deployed.

rulesadd.png

Steps:

  1. Side menu → Add Rule
  2. Define conditions:
    • Example: Run every Monday at 9 a.m. on Windows 11 posts in Building A
  3. Associate this rule with one or more packages
  4. Save

The rule is now activated and automatically applied when its conditions are met.

Chapter 8: Packages

Launch and track deployment

When your packages and rules are ready, you can launch deployment on the targeted machines.

Steps:

  1. Side menu → List of packages
  2. Select Package
  3. Click on Start Action or Deployment

Real-time tracking:

In case of failure:

Conclusion

With this feature, you can centralize and automate all your software installations and system actions across your fleet. You save time, ensure consistency of positions, and have accurate control over each deployment.

Section 9: Audit

Section 9: Audit

Own and collective tasks

The ability to monitor and understand each action is crucial. The management system offers several views to explore in detail past operations, monitor ongoing tasks, identify errors, and collaborate effectively among teams.

Section My Tasks allows you to visualize all the actions you have initiated, whether they are ongoing or completed.

image.png

Access:

Side menu → My Tasks

Proposed View:

Available information:

For each task:

Filters allow you to search for a task by name or user.

Task monitoring is not limited to your personal activity. Thanks to collective views, you can monitor your colleagues' operations, understand convergences, and avoid duplication.

image.png

image.png

Access:

Side menu → The tasks of my team or Tasks of all users

Available sections:

convergences.png

teamconvergences.png

image.png

This information allows you to cross-check intervention data, identify recurring or critical operations, and act coherently within your department.

Section 9: Audit

Analysis of tasks


image.png

image.png

image.png

For each task listed, it is possible to access a full detail including:

These data are essential for:

One button Refresh (with configurable interval, default 5 minutes) allows you to maintain a constantly updated view.

image.png

This facilitates Active piloting, by allowing you to:


The audit and task management interface is a real retrospective and collaborative dashboard. It allows you to understand what was done, by whom, on which machine, and with what results. This traceability is essential to enhance security, improve internal procedures, and ensure reliable and controlled administration of your IT environment.

Chapter 10: Updates

Chapter 10: Updates

Compliance of entities

The management of updates is an essential lever to ensure the security, stability and homogeneity of your IT environment. With the tools offered by the platform, you can precisely identify the entities to be updated, monitor overall compliance, and intervene in a targeted, progressive and optimized way.

Section Compliance of entities offers a clear synthesis of the update status of each set of machines. It allows you to immediately identify entities at risk or requiring action.

entityconformitychoice.png

image.png

Access:

Side menu → Compliance of entities

Table presented:
Example:
Available actions:

This view is ideal for planning updates campaigns, preparing audits or measuring the effectiveness of your security policy.

Chapter 10: Updates

Manage Update Lists

The interface allows you to precisely manage the updated lists applicable to each entity or machine.

listmajgestion.png

Features available:

With this level of customization, you keep your hands on the exact content of deployments, avoid inappropriate interruptions, and prioritize critical updates.

Chapter 10: Updates

Compliance monitoring

Compliance with updates is a health indicator of your park. The higher it is, the more protected and aligned your systems are.

Good practices:

Managing updates is not simply about correcting. It is a proactive, continuous and strategic approach. With the compliance tools offered by the platform, you can:

Chapter 11: Safeguarding

Chapter 11: Safeguarding

Enable backup

A good safeguard policy is the key to a resilient infrastructure. Hardware failure, human error or attack: With a well configured backup solution, you make sure you can quickly restore data and maintain activity without interruption.

The activation of a backup can be done by post or through shared profiles. This allows you to define precisely what needs to be protected.

image.png

Access:

Main menu > Profiles

Steps:

Once the backup is active, it automatically runs according to the set schedule, without interrupting the user.

Chapter 11: Safeguarding

Track backups

Tracking real-time backups allows you to check that all tasks have been properly executed.

image.png

Access:

Main menu > Reviews

Menu Logs → Check the technical messages and their time of occurrence for each backup task.

In case of error:

Chapter 11: Safeguarding

Overall statistics

You have key indicators to evaluate the general status of your backups.

image.png

Access:

Review > Global statistics

Setting up a backup strategy is not just about avoiding data loss: it's about ensuring the continuity of your operations. With the platform, you can:

Chapter 12: Background

Chapter 12: Background

Access to newspapers

This chapter presents the various features related to historical system via logs (logs). Each section is described step by step to facilitate consultation, analysis and operation of recorded events.

Objective : View events recorded by each component of the system.

image.png

Steps :

  1. Open the administration interface.

  2. Click on the tab Logs in the main menu.

  3. A list of modules is displayed, including:

    • logs inventory

    • logs backuppc

    • logs deployment

    • logs quickaction

    • logs download

    • logs kiosk

    • logs packaging

    • logs remote desktop

    • logs imaging

  4. Select the module you want to view from the logs.

  5. The events appear immediately in the table below the title Journal of + the log chosen.

Chapter 12: Background

Search and filter logs

To quickly extract specific events from defined criteria to increase efficiency during analysis.image.png

Steps:

  1. Define a search period

    • In the fields Start Date and End Date, indicate the desired time range.

      • Example:

        • Start Date: 2025-04-14 00:00:00

        • End Date: 2025-04-14 23:59:59

  2. Select specific criteria (optional)

    • Open the drop-down menu Criteria to refine your search.

    • The options available are:

      • inventory reception : events related to the reception of machines

      • inventory requested Inventory requested

      • inventory deployment : recording during deployments

      • inventory planned Planned operations

      • inventory quick action : Instant actions on equipment

      • inventory user : user activities

      • inventory machine : actions associated with a specific machine

      • inventory master : interventions carried out by a master account

      • inventory new machine : addition of new machines

      • no criteria selected : allows to display all events without filtering

  3. Apply filters

    • Click on the button Filter logs.

    • The table updates to display only events corresponding to your filters.

  4. Search for a free keyword

    • In the Show field, you can choose the number of entries that will be displayed.
    • In the fieldSearch (at the top right of the table), enter a free text string.

      • Example: guacamole, error, registered

  5. Adjust Display

    • In the section Show X entries, select how many lines should be visible per page.

      • Example: 20 for smooth reading.

Example of a combined filter:

To display all new machines recorded between April 13 and 14, 2025:

Chapter 12: Background

Understanding logs

In order to interpret the information contained in each line of the newspaper.

Each table entry contains the following columns: :

Example of reading :

Date : 2025-04-15 08:38:29 Utilisateur : master@pulse Qui : rspulse@pulse/mainrelay Texte : Machine registered

Council Consolidate similar logs to identify trends or sequence of operations (e.g. successive recordings, multiple deployments, etc.).

Chapter 12: Background

Export logs

To save logs for external analysis, archiving or sharing.

image.png

Steps :

  1. Apply your filters (by date, user, etc.) to isolate the desired logs.

  2. Click on the button Export (or Export logs depending on the interface).

  3. Choose the output format:

    • CSV : for processing in Excel or Google Sheets

    • PDF : for quick archiving or transmission

  4. The file is generated and downloaded automatically.

  5. Save it or transfer it according to your needs (report, audit, support...).

The historical system is a key tool for:

Regular and rigorous use of logs will ensure the long-term security and reliability of your infrastructure.

Chapter 13: Admin

Chapter 13: Admin

List of XMPP relays

TheXMPP relay are communication points between the different machines in your network.

image.png

Why is it useful:

This allows you to see all active connections and understand how machines communicate with each other.

Steps:
  1. In the menu, click List of Relays.

  2. A page opens with a relay list.

  3. For each relay, you see several informations such as:

    • The name (called JID)

    • The cluster to which it belongs

    • The Description Cluster
    • The Number of machines managed:

      • Total machinery
      • Number of machines not inventoried online
    • His classes
    • Address MAC also called physical address
    • LIP address relay

  4. A number of quick actions are also available.
Tip:

You can search a relay by typing a keyword in the search bar at the top of the list.

Chapter 13: Admin

Cluster List

Onecluster, it is a group of relays that are grouped together to organize the network more logically.

image.png

Why is it useful:

This helps you better manage your network, especially if you have different environments (e.g. testing, production, etc.).

Steps:
  1. Go to the section .

  2. You will see a list with:

    • The name of cluster

    • Its Description

    • The type (private or public)

    • The relay Associated

Example:

A cluster named Public can contain all shared public relays.

By clicking on the pencil in Actions, you can edit the Cluster by following the following steps:

  1. Choose a cluster name
  2. Select text for description
  3. Select external relays to the cluster to put in the cluster and vice versa
  4. Validate

image.png

Chapter 13: Admin

Create a cluster

Create acluster allows you to better organize your relays according to your needs (e.g. separate tests from production). This is exactly the same form as the editing form.

image.png

Steps:

  1. Click New Cluster in the menu.

  2. Press the button Add a new cluster.

  3. Fill in the fields:

    • Name of the cluster (e.g. "TestCluster")

    • Description (e.g. "Cluster for test relays")

  4. Choose the relays you want to associate with (a list displays).

  5. Click to record.

Chapter 13: Admin

Managing Rules (Rules)

Therules allow you to automate certain actions or behaviors of the network.

image.png

Why is it useful:

This can, for example, initiate automatic verification or apply specific parameters under defined conditions.

Steps:
  1. Click "Rules" in the menu.

  2. On the page you can:

    • Change order of priority existing rules by pressing the arrow that points down to decrease it or the one that points up to increase it.down.pngup.png

    • Add new rule according to your needszhCx9ga4nuPgr4B1-addfile.png

    • See detail a rule
    • display.png

When clicking on the logo plus to add a new rule, you can access the following form:

image.png

Fill the fields one by one:

  1. Choose the rule
  2. Choose your relay (Relays)
  3. Describe the subject
  4. Write the regex to check
  5. Validate

Even without being technical, you can ask an administrator what rules are recommended for your environment.

Chapter 13: Admin

Quick action

image.png

Each XMPP relay has a set ofrapid action which allow direct interaction with the machines it manages. These actions are accessible from the list of relays and are designed to simplify the day-to-day operations of administration, diagnosis or configuration, without requiring advanced technical knowledge.

Here is a detailed overview of each action, its usefulness and the procedure for using it.

1. See the list of installed packages

Objective
View software installed on machines attached to a relay.

Procedure

pkgs.png

  1. Click on the button "List of packages" to the right of the relay concerned.

  2. A window opens displaying installed software, with its name and version.

When to use

2. Reconfigure relay related machines

Objective
Automatically reapply the active configuration to the machines attached to the relay.

Procedure

reconfiguregroup.png

  1. Click "Reconfigure".

  2. Confirm the action if validation is requested.

  3. The machines are again given the current configuration.

When to use

3. Change the relay of one or more machines (Switch function)

Objective
Move one or more machines from one relay to another.

Procedure

stop.png

  1. Click Switch to the right of the original relay.

  2. Select the moving machines.

  3. Choose the destination relay.

  4. Validate to apply the change.

When to use

4. Edit Configuration Files

Objective
Manually modify the configuration files of a relay or its machines.

Procedure

settings.png

  1. Click "Edit configuration files" (first working image)

  2. An editing interface opens.

  3. Make the necessary changes.

  4. Save the changes.

When to use

Note This operation acts directly on the system. Use with caution.

5. Show current or past audits (QA)

Objective
Consult compliance, safety or quality tests performed on machines.

Procedure

details.png

  1. Click "QA launched".

  2. A window displays the list of tests performed and their status (successful or failed).

When to use

6. Access system actions (advanced diagnostic)

Objective
Use remote diagnostic or intervention tools on a machine.

Procedure

quickaction.png

  1. Click Action Next to the relay.

  2. Select one of the available options:

    • Reboot : restarting the machine.

    • Process : visualization of processes in progress.

    • Disk use : consultation of the disk space used.

    • Agent version : version of software agent installed.

    • Netstat : display of active network connections.

    • Console : opening of a command line interface.

When to use

7. Banning a machine

Objective
Temporaryly block a machine's access to the system.

Procedure

ban.png

  1. Click "Bannir" Next to the relay.

  2. Confirm the banner.

  3. The machine is isolated from the rest of the network.

When to use

8. Debanniating a machine

Objective
Lift the block applied to a previously banned machine.

Procedure

unban.png

  1. Click "Debannier".

  2. The machine regains its normal communication rights.

When to use

9. Remote control

Objective
Control a machine remotely as if you were physically in front of it.

Procedure

control.png

  1. Click "Hand-to-hand".

  2. A remote session opens, allowing you to interact with the machine's graphical interface.

When to use

10. Manage relay rules

Objective
Consult, modify or add specific operating rules to a relay.

Procedure

settings.png

  1. Click "Relay rules" (last working image)

  2. From the interface:

    • View existing rules.

    • Change or delete outdated rules.

    • Add new rules as needed.

When to use