Sync your Statseeker inventory. Back up every config. Prove it to your auditor.

rConfig V8.2.0 reads your Statseeker host list directly over the REST API, backs up the running configuration of every one of those devices on the schedule you choose, tracks every change line by line, and generates the NIS2 or DORA evidence your compliance team needs, without CSV exports, without custom scripts, without a second inventory to keep alive.

Group-scoped sync200+ vendorsNIS2 and DORA reporting

01 · The gap

Statseeker answers whether the network is up. It never answered what’s on it.

If you run Statseeker, you already know what it’s good for. Sixty-second polling. Long-memory historical data. Root-cause investigations that actually finish. It’s why it sits on the NOC’s primary screen.

Now try asking Statseeker three awkward questions. What was on that core switch the day before it failed. Who added the inbound ACL at 02:14 last Tuesday. Can we push the last known-good firewall config back in under two minutes if this morning’s change turns out to be the reason the VPN is dead.

None of those are monitoring questions. They’re configuration management questions, and they’ve been living in a gap between Statseeker and whatever scripts, spreadsheets or open-source tools your team has bolted on to fill it.

  • Device running-configs aren't in Statseeker. They never were.
  • Home-grown scripts using SNMP writes and TFTP break the week you need them most.
  • Oxidized works until the engineer who maintained it leaves.
  • Auditors don't care that your ACL was reachable. They care what it looked like every Friday for the last twelve months.

rConfig V8.2.0 closes that gap, and it does it without asking you to rip out a single thing.

StatseekerPartner baseline
02 · What Statseeker does best

Network intelligence means answers, not excuses.

Before we talk about configuration, credit where it is due. This is why Statseeker sits where it sits, and why rConfig is the complement, not a competitor. Read the full picture on the official Statseeker site.

  • Detect faster

    60-second polling at scale. Proactive fault detection across the whole estate. Short-lived issues that averaged data would hide, surfaced while they are still happening.

  • Prove root cause

    Granular historical data, kept at full resolution. The ability to ask what the network actually looked like at 02:14 last Tuesday, and get an answer, not an estimate.

  • Prevent recurrence

    Predictable patterns, predictable alerting, predictable capacity signals. A platform engineers trust enough to sit on the NOC's primary screen.

DETECTPROVEPREVENTS

Detect · Prove · Prevent

Built for how NetOps teams actually work

The capabilities Statseeker teams pick it for, lifted from the product page so you can recognise the shape of your own environment.

  • High-scale polling engine

    Monitor up to 50,000 devices on a single server, every 60 seconds, without the performance penalty most monitoring stacks ship with.

  • Dashboards that lead to answers

    Operator-friendly views wired straight to the underlying data, built for engineers under pressure.

  • Actionable alerting

    Thresholds and anomaly rules engineered to cut through noise. Fewer pages, higher signal.

  • Traffic and flow visibility

    NetFlow and sFlow context next to the interface graph. Who is using the link, not just whether it is saturated.

  • Accurate inventory and MAC / IP history

    A fleet list that stays current. MAC and IP history you can trust when the question gets asked six weeks later.

Single-host scale50,000devices per server
Every device, every minute60sfull polling cycle
No averaging, no drift100%full-resolution history

Powerful monitoring on a single server. Works on day one. Remains reliable for years. That is the Statseeker promise, and rConfig is built to stand beside it, not replace it.

03 · Configuration intelligence

Configuration intelligence, in three moves.

Three capabilities that turn a monitored estate into an audit-ready one. Every Statseeker device, captured, diffable, and defensible.

  • Sync

    Statseeker hosts become rConfig devices automatically, scoped by Statseeker group. Add a device upstream, it lands in rConfig on the next schedule.
  • Capture

    Every running-config, every startup-config, every change, stored and diffable. 200+ vendors out of the box. No Jinja. No Python. No vendor plugin to maintain.
  • Prove

    Compliance policies run against every Statseeker-managed device. NIS2, DORA, PCI-DSS, CIS benchmarks and anything your security team writes. Evidence exports in minutes.

Statseeker watches. rConfig remembers. Together, they’re the answer to every awkward question your auditor has ever asked.

04 · How it works · 4 steps

How rConfig syncs with Statseeker, step by step

Four screens. Ten minutes for a test group. Group-based mapping that scales cleanly from a pilot to the whole estate.

  1. 01Step 1: Authorise
    Drop a Statseeker REST API token and URL into rConfig's Integrations screen. The Test Connection and Test Credentials buttons confirm reachability in seconds.
  2. 02Step 2: Scope
    Pick which Statseeker hosts to bring across. Scope the sync by Statseeker group. Most teams start with a test group of five to ten devices and widen from there.
  3. 03Step 3: Map
    Translate each Statseeker group into rConfig vendors, templates and credentials using group-based mapping. Set it up once, rConfig applies it on every sync thereafter.
  4. 04Step 4: Sync
    Run it now, schedule it (hourly, daily, weekly), or trigger it from the CLI with php artisan rconfig:integration-statseeker. Idempotent: re-runs produce identical state, failures resume cleanly on the next cycle.

Once the sync lands, rConfig takes over. Daily backups against your multi-vendor estate. Diffs that filter out timestamps and AAA session noise. Policy-driven compliance reports. One-click restore. Nothing else to wire up.

05 · Capabilities · 6 core jobs

Built for how Statseeker teams actually work

The jobs the NOC, the security team and the auditor each need from configuration management. Nothing bolted on for show.

  • Multi-vendor configuration backup

    Cisco, Juniper, Arista, Fortinet, Palo Alto, Huawei, Nokia, MikroTik, HPE, Aruba and 200 more. Hourly, daily or on demand.
  • Change detection with a readable diff

    See exactly what changed, line by line, since the last known-good version. Filter out noise like timestamps and session identifiers.
  • NIS2, DORA and CIS compliance reporting

    Write policies once, run them against every Statseeker-managed device. Export evidence your auditor can actually read.
  • One-click configuration restore

    Push a known-good configuration back to any device in under 90 seconds, with approvals and a full audit trail.
  • Bulk configuration deployment

    Apply the same template across every Statseeker host that matches a filter, in a single job with preview and rollback.
  • Full audit trail, exportable on demand

    Who changed what, when, from where. The report your auditor asks for takes minutes, not days.
06 · Deployment · Stays in its lane

Deploys alongside Statseeker. Stays in its lane.

rConfig doesn’t replace Statseeker. It doesn’t try to. It doesn’t poll interfaces, it doesn’t graph throughput, it doesn’t do anomaly detection on link errors. That’s Statseeker’s job, and Statseeker does it better than anything else in the category.

What rConfig does is the thing Statseeker was never built for: capturing configuration, tracking how it changes, and proving what it looked like when an auditor asks. Self-hosted if you need it, VM or bare metal, on-prem or in your private cloud. Vendor-agnostic. Multi-tenant capable. Your ops team is running it inside 30 minutes on V8 Pro or Vector.

Your monitoring.Your configuration.Your audit trail.

07 · In production · Incident walkthrough

From Statseeker alert to restored configuration, in under ten minutes.

A regional service provider runs Statseeker across roughly 6,000 devices spread between core sites in Dublin, Manchester and Frankfurt. At 03:12 on a Tuesday, Statseeker pages the on-call engineer about a core switch in Frankfurt. By the time the engineer has joined the bridge and pulled the last six hours of interface data from Statseeker, rConfig has already surfaced the configuration change that caused it (a misapplied QoS template pushed by a contractor two days earlier) and offered the engineer a one-click rollback to the known-good version from the previous Friday. Restoration completes at 03:22. The post-incident report writes itself.

That’s the difference between telling the board the switch was down for an hour and showing them it was back in ten minutes.

08 · NIS2, DORA, compliance evidence

NIS2 and DORA evidence, sourced from the network you’re already monitoring.

If you’re in scope for NIS2 or DORA, the regulators want two different things. They want to know the network was available, and they want to know it was configured correctly. Statseeker is excellent evidence for the first half. rConfig is the evidence for the second.

Run both and your compliance team stops asking the NOC for screenshots at 4pm on a Friday. Policy checks run automatically, every day, against every device Statseeker knows about. When the auditor asks, the report is already waiting.

09 · Comparison · Oxidized, RANCID, home-grown

rConfig compared to Oxidized, RANCID or a home-grown config backup script

Oxidized and RANCID are fine tools for teams with a dedicated automation engineer, a tolerance for YAML and Git debugging, and a small enough estate that maintenance isn’t a full-time job. They’re free. Free is often the point.

What they don’t give you: a web UI your NOC can operate on day one, pre-built multi-vendor compliance policies, commercial support with SLAs, RBAC, SAML SSO, approval workflows, and NIS2 or DORA reporting that doesn’t need a Python developer to generate.

Most teams move to rConfig after they outgrow the operational cost of the open-source path. If your audit exposure has caught up with you, or if you’re one departure away from losing the only engineer who understood how the Oxidized stack was held together, that’s usually the tipping point. The Statseeker integration in V8.2.0 removes the last reason to delay. Other source-of-truth integrations like the Zabbix connector follow the same pattern if your stack extends further.

10 · Technical specifications

The Statseeker integration, at a glance

Everything your architecture review will ask about. Share this page with your security team before the demo.

rConfig version
8.2.0 or later (V8 Pro, Enterprise or Vector)
Statseeker versions
v5.6.0 and all v25.x releases
Authentication
Statseeker REST API token
Transport
HTTPS, with optional support for internally-signed certificates
Sync triggers
Manual, scheduled, or CLI
CLI command
php artisan rconfig:integration-statseeker
Single-device CLI
php artisan rconfig:integration-statseeker-single-device {host_id}
Data flow
One-way, Statseeker to rConfig
Idempotency
Yes, re-runs produce identical state
Logging
Every sync logged with user, timestamp, host count, errors
Deployment
On-prem, VM, or your private cloud
High Availability
Supported (point rConfig at the Statseeker HA virtual IP)

Questions Statseeker users ask about network configuration management

Ten common questions from engineers evaluating the Statseeker integration. If yours isn't here, drop it in the demo form and we'll answer it during the call.

See the sync running against your own Statseeker inventory.

Book 30 minutes with an rConfig engineer. We’ll point the integration at a slice of your real Statseeker estate, back up a handful of your own devices, and run a compliance report against a policy that matters to your team. No generic demo. No slide deck. No sales gate.

No slide deck. No generic demo. No waiting for the second sales call to see the product.

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.

By clicking "Accept", you agree to our use of cookies.

Learn more