What I meant about auto updating the document is that it will query specific OIDs on the devices, and validate lldp/cdp information. It will also retrieve VLAN configuration information from L2 devices, specific L3 information (OSPF, p2p subnets, interface IPs), and interfaces that are used for uplinks/downlinks, p2p links, aggregate IDs etc etc. It will also validate hostname against IP address, and IP address to hostname. There are many other things that it does, but I won't get into all that since I could probably write a 10-page document on my template document. Point is that the document is capable of maintaining it's own accuracy with minimal effort from the user.
It retrieves about 95% of that information via SNMP polling, and the tool polls very specific OIDs instead of trying to do large bulk gets or walks. It parses out all the junk and only grabs the portions of the value fields that are relevant for the document; in other words, it grabs the portion of the OID value that a human would understand.
However, the user of the document must initiate the report. When the report completes it will report the difference between what the diagram/document shows and what is actually configured on the device. The report has two buttons that the user can click; one is labeled "Apply Updates".... which will update the document with the findings from the report, and the other is "Cancel" so that the user can back out if necessary.
Aledlund is correct in that we both share the exact same concerns. I understand, and support, the need for an engineer to be able to do some of these traffic generating tasks. However, at the same time I must mitigate the network traffic that it generates... and more importantly I must mitigate the risk as much as possible.
Most users don't understand that there is an impact to the network with things such as this; especially when you build the tool so well that it appears to be like "magic" to them. All that they know is that the tool helps them accomplish the goal of their task. So to help discourage against abuse of the tool I've added a few minor manual steps in the process, and have also added an authentication and logging portion to it as well. The server on the back end that runs all this helps me to further control things from a centralized point.
When you work in a global company, with over 300,000 employees and countless more contract workers, you know that any given document will be opened multiple times a day. If each document did all of this automatically upon open, then this would be a flood of unnecessary traffic on the network. This increase in bandwidth may escalate to the point of needing to increase the size of an MPLS circuit, or might even require a change in the access type provided (i.e. OC3,OC12, GigE, etc).
There is a lot of forward thinking that must happen before you build and publish a network tool that will have wide spread use. Otherwise the impact it will have on the network will be far too great to be of any actual benefit.
I hope what I've stated here makes sense.