You are on page 1of 237

CA Unified Infrastructure

Management 8.4:
System Administration Foundations
200

Lab Guide

20NMS20200

20NMS20200LG1
© 2014 CA. ALL RIGHTS RESERVED.
- PROPRIETARY AND CONFIDENTIAL INFORMATION -

These educational materials (hereinafter referred to as the “Materials”) are for the end user’s educational
purposes only and are subject to change or withdrawal by CA, Inc. (“CA”) at any time.

These Materials may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in
part, without the prior written consent of CA. These Materials are confidential and proprietary information of CA
and protected by the copyright laws of the United States and international treaties.

EXCEPT AS OTHERWISE STATED IN THE APPLICABLE AGREEMENT, TO THE EXTENT PERMITTED BY APPLICABLE
LAW, CA PROVIDES THESE MATERIALS “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT
LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR
DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THESE MATERIALS, INCLUDING WITHOUT LIMITATION, LOST
PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF SUCH LOSS
OR DAMAGE.
The use of any software or product referenced in the Materials is governed by the end user’s applicable license
agreement.

The manufacturer of these Materials is CA.

Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to
the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-
7014(b)(3), as applicable, or their successors.

All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Copyright © 2016 CA. All rights reserved. CA confidential and proprietary information for CA or CA Partner
Internal Use Only. No unauthorized copying or distribution permitted.
CA Unified Infrastructure Management 8.4: System Administration Foundations 200

Table of Contents
Module 2: Create USM Groups
Lab 2-1 Create USM Groups............................................................................................................................ 1
Lab 2-2 Assign MCS Profiles to a USM Group .................................................................................................. 6
Lab 2-3 Add a USM Report Template ............................................................................................................... 13

Module 3: Discovery Devices and Deploy Robots


Lab 3-1 Discover the Local Subnet Using the Discovery Wizard .................................................................. 15
Lab 3-2 Deploy a Robot Using ADE..................................................................................................... ........... 21
Lab 3-3 Deploy a Robot Using USM .............................................................................................................. 25
Lab 3-4 Deploy and Configure the CDM probe ............................................................................................ 27

Module 4: Examine Monitored Data


Lab 4-1 Examine Monitored Data ................................................................................................................ 34
Lab 4-2 Create a PRD Chart .......................................................................................................................... 41

Module 5: Basic Alarm Notifications


Lab 5-1 Configure the emailgtw Probe ....................................................................................................... 46
Lab 5-2 Activate AO Logging .................................................................................................................. 54
Lab 5-3 Verify Auto-Acknowledgment ................................................................................................... 56
Lab 5-4 Build an AO Profile to Send Emails on Alarms ............................................................................... 58
Lab 5-5 Define an Ad Hoc Maintenance Schedule ................................................................................. 62

Module 6: Advanced Monitoring Administration


Lab 6-1 Define an MCS Monitoring Profile for MS SQL Server ..................................................................... 65
Lab 6-2 Deploy and Configure the Net Connect Probe ................................................................................ 72
Lab 6-3 Deploy and Configure the URL Response Probe .............................................................................. 77
Lab 6-4 Create a Simple Update Package ..................................................................................................... 80
Lab 6-5 Create a Profile Addition Package ................................................................................................... 85
Lab 6-6 Deploy a SuperPackage ................................................................................................................... 88

Module 7: Perform Advanced Robot Configurations


Lab 7-1 Deploy a Secondary Hub .................................................................................................................. 92
Lab 7-2 Set Up Multi-Tenancy ....................................................................................................................... 97
Lab 7-3 Configure Message Queues .............................................................................................................. 99
Lab 7-4 Create a Hub-to-Hub Tunnel .......................................................................................................... 103

Module 8: Perform Advanced Alarm Activities


Lab 8-1 Build an AO Profile to Create a New Alarm .................................................................................... 110
Lab 8-2 Create a Simple Alarm Enrichment ................................................................................................ 113
Lab 8-3 Build an AO Trigger ......................................................................................................................... 117
Lab 8-4 Create an AO Pre-processing Rule .................................................................................................. 120
Lab 8-5 Create a Schedule-Activated Pre-processing Rule .......................................................................... 124
Lab 8-6 Create a Correlating Profile, Trigger, and Script Combination ....................................................... 128

Module 9: Perform SLM Tasks


Lab 9-1 Create a QoS Calculation Profile ..................................................................................................... 134
Lab 9-2 Create an SLA and SLOs .................................................................................................................. 138
Lab 9-3 Manually Clone an SLA ................................................................................................................... 147
Lab 9-4 Manually Recalculate an SLA .......................................................................................................... 149

TOC-1

© 2016 CA. All rights reserved.


CA Unified Infrastructure Management 8.4: System Administration Foundations 200

Module 10: Configure Reporting Capabilities Using PRD, List Views, and Custom Dashboards
Lab 10-1 Create a PRD Report with Filters .................................................................................................. 151
Lab 10-2 Customize a PRD Report through Direct Calls ............................................................................... 154
Lab 10-3 Create a Simple List ...................................................................................................................... 155
Lab 10-4 Modify the URL Response Time Unified Dashboard .................................................................... 161
Lab 10-5 Add a Specific Drill-down Report to a List .................................................................................... 167
Lab 10-6 Create a Basic Custom Dashboard ................................................................................................ 172

Module 11: Configure the UMP and Portal Views


Lab 11-1 Create a New Account and ACL ................................................................................................... 183
Lab 11-2 Create a Site .................................................................................................................................. 191
Lab 11-3 Change the UMP Default Logo ..................................................................................................... 199
Lab 11-4 Set an SLA Report as the Portlet Default ...................................................................................... 202
Lab 11-5 Create a PRD Report Page ............................................................................................................ 204
Lab 11-6 Create a Dashboard Page ............................................................................................................. 207
Lab 11-7 Define a Geo View ........................................................................................................................ 212

Module 12: Perform Advanced Probe Configurations and Troubleshooting


Lab 12-1 Configure the Syslog Checking Probe ........................................................................................... 215
Lab 12-2 Merge QoS Data ........................................................................................................................... 225

Appendix A: Access the CA Technologies Virtual Labs


Access the CA Technologies Virtual Labs .................................................................................................................. 228

Note: All names used throughout this training content are fictitious and do not refer to any real company or person,
living or dead.

TOC-2

© 2016 CA. All rights reserved.


Module 2: Create USM Groups

Lab 2-1 Create USM Groups

Goals Create USM groups.

Scenario Creating groups in USM enables you to:


 Logically organize your devices by using filters
 Associate MCS profiles based upon group membership
 Associate report templates based on group membership

Time 5 minutes

Instructions:
Log In to the Cloud Server

1. Open the UIMServer VM.

2. If necessary, log in using the following credentials:


Username administrator
Password caeducation

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 1


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Sign In to UMP

3. On the desktop, double-click the UMP shortcut.


Note: This shortcut opens Internet Explorer and connects to the URL for the UMP, which is:
http://umpserver:8084

4. Sign in to UMP using the following credentials:


User administrator
Password uim123

5. To exit the Discovery Wizard, click Close.


Note: The Discovery Wizard automatically opens the first time a user opens a UMP session. If it
is closed without running a discovery, the user is asked if it should be automatically opened the
next time UMP is opened.

6. Click No to launch the Discovery Wizard in future sessions.

Note: To manually open the Discovery Wizard, mouse over the left pane Inventory item and
click the Discovery wizard icon.

2 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Examine Windows Group in USM

USM groups are automatically created for Windows and UNIX devices if they exist in the CA UIM
inventory. We will now examine the Windows group definition.

7. In the USM left pane, expand Operating Systems.

8. Mouse over the Windows group and click the Edit group icon ( ).

9. Examine the properties of the Windows USM group. The Windows group is Dynamic. This
means that as new devices are discovered that match the filter criteria, they will automatically
be added to the group. If a device attribute value changes such that it no longer matches the
filter criteria, it will be removed from the group.

10. Click Cancel.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 3


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Create WinServers Group in USM

11. To add a new group, mouse over Groups and click the + icon that appears.

12. In the Edit Group dialog, on the Properties tab, complete the following fields:
a. In the Group Type list, select Dynamic.
b. In the Name field, type:
WebServers

c. Under Filters:
i. Select Name.
ii. Select contains.
iii. Type:
web
d. Click Apply Filters.
This group will initially contain 0 members but when WebServer1 is discovered in a later lab,
it will be dynamically added to the group..

e. Click OK.
The new group appears in the USM hierarchy.

4 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Create a VMwareGuests Group in USM

13. To add a new group, repeat steps 11 and 12 using the following values.
This group will initially contain 0 members but when vm01linux is discovered in a later lab, it
will be dynamically added to the group.
Type Dynamic
Name VMwareGuests
Filter Name contains vm

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 5


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Lab 2-2 Assign MCS Profiles to a USM Group

Goals Assign MCS profiles to a USM Group.


Assigning an MCS profile to a group results in the profile configuration being
Scenario
deployed to all devices which are group members and have a deployed robot. It
will also result in the probes associated with the profile configuration being
deployed to each device if the local archive contains the probe and a license for
the probe.

Time 20 minutes

Instructions:

Assign a Setup cdm MCS Profile to the Windows Group

We need to modify the cdm configuration so that the attribute value assigned to source and target
in QoS metrics is equal to the device short name. We also need to modify the polling interval used
for disk monitoring.

1. Open the UMP.

2. Click the Home tab.

3. In the USM left pane, expand Operating Systems and click the Windows group.

4. In the right pane, click the Monitoring tab.

5. In the right pane in the Device Model list, select uimserver.

6. Click Create.
The center pane populates with MCS profile types.

6 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

7. To add a new profile, mouse over the Setup cdm profile type and click the + icon.

8. In the right pane, select the Send Short Name for QoS Source and Allow QoS Source as Target
options:

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 7


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

9. To review the polling intervals, in the right pane, scroll down.

10. In the Disk Monitoring Properties section, set the Interval Value to 15.

Note: The default value will be kept for all other Setup cdm options.

11. Click Create.

Assign a CPU Monitor MCS Profile to the Windows Group

12. To add a new profile, mouse over the CPU Monitor profile type and click the + icon.

8 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

13. In the right pane, complete the CPU Monitoring Configuration as follows:

14. Click Create.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 9


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Assign a Memory Monitor MCS Profile to the Windows Group

15. To add a new profile, mouse over the Memory Monitor profile type and click the + icon.

16. In the right pane, complete the Memory Monitor Configuration as follows:

17. Click Create.

10 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Assign a Disk Monitor MCS Profile to the Windows Group

18. To add a new profile, mouse over the Disk(s) profile type and click the + icon.

19. In the right pane, complete the Disk(s) Monitoring Configuration as follows:

20. Click Create.

Confirm the MCS Profile Deployment

21. In the left pane, expand the Windows group and click uimserver.

22. In the right pane, click the Monitoring tab.

23. In the center pane, expand the CPU Monitor profile type and under it, click the CPU Monitor
profile.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 11


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

24. In the right pane, scroll down and in the Profile Status confirm the Profile Origin indicates the
profile was derived automatically from the group profile ‘CPU Monitor’ and Group: Windows.

25. Using the same process, confirm all profiles were successfully deployed to uimserver and
umpserver.

12 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

Lab 2-3 Add a USM Report Template

Goals Add a USM report template.

Scenario You will apply a report template to the VMwareGuests group you created in the
previous lab.

Time 5 minutes

Instructions:

Add a Report Template to the VMwareGuests Group

1. Navigate to the VMwareGuests group, mouse over the group name, and click the Edit group
icon.

2. Click the Report Templates tab.

3. Click the Add Template button

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 13


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 2: Create USM Groups

4. Expand the USM Dynamic Report Templates folder and select Server Basic.

5. Click Add.

6. To set it as the default, click the Default radio button next to the Server Basic report.

7. Click OK.
We will view reports using these templates in a later lab.

14 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Lab 3-1 Discover the Local Subnet Using the Discovery Wizard

Goals Discover the local subnet using the Discovery Wizard.

Scenario Before you can start monitoring devices, you need to populate the database with
devices to monitor. In this lab, you will perform a discovery to add devices to the
database to monitor.

Time 15 minutes

Instructions:
Perform a Discovery Using the Discovery Wizard

1. In the USM left pane, hover the mouse over Inventory and when the Discovery wizard cog icon
appears, click it.

2. When the Discovery Wizard opens, click Next.

3. On the WMI tab, you will add a WMI authentication profile.


a. Click New Credentials.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 15
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

b. Complete the following fields:


Credential name Lab
User administrator
Password caeducation

c. Click Next.

4. On the Linux/Unix Tab:


a. Click New Credentials.
b. Complete the following fields:
Credential name Lab
User root
Password caeducation
SSH/Telnet SSH

c. Click Next.

16 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

5. On the SNMP Tab:


a. Click New Credentials.
b. Complete the following fields:
Credential name Lab
Version 1
Community String uimread
Port 161

c. Click Next.

6. On the Scopes tab, you will create a range for discovering your devices.
a. Click New range scope.
b. Complete the following fields:
Range scope name Lab
Range scope definition Range 192.168.1.1 - 51
Credentials All selected

c. Click Next.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 17
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

7. On the Schedule tab you will run the discovery now and complete the Discovery Wizard.
a. Ensure Run discovery now is selected.

b. Click Finish.
The Discovery Wizard window closes.
c. Observe the discovery progress in the USM right pane.

View the Discovered Items

After the discovery is complete, the Inventory table in the USM right pane will include all
discovered devices. We will now identify what credentials were utilized during the discovery of
some of the devices.

8. In the Inventory table, in the adserver row, mouse over the key icon in the far right column.
The tool tip that appears indicates the discovery process was able to successfully authenticate
with adserver using the wmi credential.

18 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

9. In the Inventory table, in the vm01linux row, mouse over the key icon in the far right column.
The tool tip that appears indicates the discovery process was able to successfully authenticate
with vm01linux using the shell credential.

10. In the Inventory table, in the uimserver row, mouse over the key icon in the far right column.
The tool tip that appears indicates that discovery process was able to successfully authenticate
with uimserver using the snmp and wmi credentials.

Note: For more information about discovering devices, you can open the Discovery Wizard and
click the Discovery help (?) icon. This will open the CA Wiki page that contains documentation
for CA UIM Discovery.

Verify the Discovered Devices Were Dynamically Added to USM Groups

11. In the left pane, click the VMwareGuests group.


The Details tab in the right pane displays the group members consisting of the recently
discovered vm01linux device.
Note: There may be a small delay between the time the discovery is run and the time the
device appears in the USM group.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 19


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

12. In the left pane, click the WebServers group.


The Details tab in the right pane displays the group members consisting of the recently
discovered webserver1 device.

20 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Lab 3-2 Deploy a Robot Using the ADE

Goals Deploy a robot using the ADE.

Scenario To apply local monitors, known as probes, you need to install a robot—
commonly known as an "agent"—on a server. The ADE enables us to perform the
installation of the robot on the server.

Time 10 minutes

Instructions:
Locate the ADE Import XML File

1. On the desktop, double-click the CourseFiles folder shortcut.

2. Navigate to the UIM_Admin folder.

3. Right-click ade.xml and click Edit with Notepad++.

4. Review the file content:


<hosts>
<host>
<profile>centos</profile>
<arch>64</arch>
<hostname>192.168.1.40</hostname>
<username>root</username>
<password>caeducation</password>
<domain>uim</domain>
<hubip>192.168.1.20</hubip>
<hub>primary</hub>
<hubrobotname>uimserver</hubrobotname>
<hubport>48002</hubport>
<robotip>192.168.1.40</robotip>
</host>
</hosts>

5. Close Notepad++.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 21


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Access the ADE Using the UMP

6. On the desktop, double-click the UMP shortcut.

7. Sign in to UMP using the following credentials:


User administrator
Password uim123

8. On the UMP Home page, click the Administration ( ) button.

9. On the Administration page, click the Deploy Robots tab.

10. Click Import.


a. Navigate to the c:\CourseFiles\UIM_Admin folder.
b. Select the ade.xml file.
c. Click Open.

22 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

11. After the file is imported, your Linux system will be added to the list and selected for
deployment. Click Deploy.

12. In the Robot Deployment Status dialog, monitor the deployment status of the ADE. The
following screenshot shows a successful installation.

13. After the deployment is complete, to close the Robot Deployment Status dialog, click Close.

14. To close the Administration dialog, click Close.

Confirm the Successful Deployment Using the Admin Console

15. On the desktop, double-click the Admin Console shortcut.


Note: This shortcut opens Internet Explorer and connects to the URL for the Admin Console,
which is: http://uimserver:8080/adminconsole

16. Sign in to Admin Console using the following credentials:


Username administrator
Password uim123

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 23


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

17. In the navigation pane, select primary and confirm that vm01linux is displayed in the right pane
list of robots.

24 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Lab 3-3 Deploy a Robot Using USM

Goals Deploy a robot using USM.

Scenario We will deploy a robot to devices that are members of a USM group. We will
then confirm the MCS profiles that were previously assigned to the USM group
are automatically deployed to the devices after the robot has been deployed.

Time 10 minutes

Instructions:
Deploy Robots to Devices in the Windows USM Group

1. In UMP, select the Windows group.

2. Click Actions  Deploy Robots.

3. Select the adserver and webserver1 devices.

4. In the Hub dropdown list, select primary.

5. Click Deploy.

6. When the Robot Deployment Status window indicates that the robot was successfully installed
on both devices, click Close.

7. To close the Administration window, click Close.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 25
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Confirm MCS Profiles are Automatically Deployed to the New Robots

When MCS becomes aware that a robot has been installed on a USM group member device, it will
first deploy the probes to the robot that are required by MCS profiles assigned to the USM group
and once the probes have been successfully deployed, it will then deploy the MCS profiles. We will
now confirm this occurred for the adserver and webserver1 robots.

8. In UMP, expand the Windows group.

9. Click adserver.

10. In the right pane, click the Monitoring tab.

11. In the center pane, expand the CPU Monitor profile type and under it, click the CPU Monitor
profile.

Note: You may have to wait as much as 10 minutes for the probe and MCS profile deployments
to complete before being able to expand the profile type.

12. In the right pane, scroll down and in the Profile Status confirm the Profile Origin indicates the
profile was derived automatically from the group profile ‘CPU Monitor’.

13. Using the same process, confirm all profiles were successfully deployed to adserver and
webserver1.

26 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

Lab 3-4 Deploy and Configure the CDM Probe

Goals Deploy and configure the CDM probe.

Scenario The UNIXServers USM group does not have any assigned MCS profiles so probes
will not be automatically deployed. You will use the Admin Console to manually
deploy the CDM probe and then configure basic monitoring.

Time 20 minutes

Instructions:
Deploy and Configure the CDM Probe

1. Open the Admin Console.

2. Sign in to the Admin Console using the following credentials:


Username administrator
Password uim123

3. Expand the primary node to view the current list of robots.

4. Click on the Archive tab.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 27


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

5. On the Local Archive tab, in the right pane, select the cdm 5.71 probe package.
Note: There are two cdm probes available, one of which has a MC suffix. The probe without the
MC suffix is used when manually deploying and configuring the cdm probe. The probe with the
MC suffix is automatically deployed by MCS when needed. This is the probe that was
automatically deployed to the adserver and webserver1 robots during the previous lab.

6. In the left pane, select the vm01linux robot.

7. To deploy the cdm probe to the robot, click Deploy.

8. To confirm the deployment to the robot, click Yes.

9. Click on the Distribution Activity tab to view the probe deployment.


You should see a green check mark next to the deployment instance when the deployment is
complete.

28 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

10. Click on the Infrastructure tab.

11. In the left pane, click vm01linux.

12. In the right pane, verify the cdm 5.71 probe is present.
Note: If the cdm probe is not present, refresh the right pane list and it should appear.

Configure the CDM Probe on vm01linux

13. In the right pane, click the down triangle to the left of cdm and click Configure.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 29


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

14. In the Probe Configuration window, in the left pane, select the Processor node.

15. In the right pane, in the Processor Configuration Section, set Interval (minutes) to 1.

16. In the Monitors table, click System Load.

17. Scroll down to display the System Load monitor details.

18. In the System Load section, set Maximum System Load to 0.

Note: A setting of 0 for Maximum System Load is unrealistic but is being set in this lab for the
purpose of guaranteeing system load alarms will occur. These alarms will be managed in later
lab activities within this course.

30 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

19. In the left pane, select Disks.

20. In the right pane, set Interval (minutes) to 1.

21. In the left pane under Disks, under the root / disk, select the Disk Usage node as follows:

22. In the right pane, in the Monitors table, click Disk Usage (%).

23. Scroll down to display the Disk Usage (%) monitor details.

24. In the Disk Usage % section, select the Publish Data option.

25. In the left pane, select Memory.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 31


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

26. In the right pane, set Interval (minutes) to 1.

27. In the left pane, under Memory, select the Total Memory node.

28. In the right pane, in the Monitors table, click Memory Usage (MB).

29. In the Memory Usage (MB) section, select Publish Data.

30. Click Save.

32 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots

31. Click Close.

35. Click Yes to close the tab.

The CDM probe is now configured.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 33


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

Lab 4-1 Examine Monitored Data

Goals Examine monitored data.

Scenario Now that we have deployed MCS profiles to the Windows USM group and
manually configured the cdm probe on the vm01linux, QoS data is being
collected and published. We will now view dashboards that are being populated
with this data.

Time 15 minutes

Instructions:

Display USM Device Views

1. Open the UMP.

2. In the USM tree, expand VMwareGuests.

3. Select vm01linux.

34 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

4. In the right pane, view the dashboard for the device that reflects the published QoS (Processor
Queue Length, CPU Usage %, Disk Usage %, Memory Usage %, and Memory Usage MB).

View USM Report Template

5. Click on the down arrow next to the Reports button to view the available reports.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 35


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

6. To view the Server Basic report, click Reports  USM Dynamic Report Templates / Server
Basic.

Note: The report may show minimal data depending on how long data collection has been
running.

7. Close the browser tab that contains the Server Basic Report.

36 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

8. Back in the USM View, click Reports  USM Dynamic Report Templates / Default Report.

9. Close the browser tab to return to the USM view.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 37


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

View Alarms in USM

10. To view the alarm for the device, click the Alarms tab.

11. To view the alarm details, click the More button.

12. To view the metric for the alarm, click the Metric tab.

13. To view all alarms in USM, click the Alarm View icon.

14. Select an alarm.

38 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

15. Click the Actions menu and explore the available alarm actions.

View the server Unified Dashboard

16. In UMP, click Unified Dashboards  Application and Server  Server.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 39


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

17. View the data in the list views.


Note: The umpserver device appears in the lists with both the short name and fully qualified
name. Initially, the fully qualified name was used for QoS source for the umpserver device. This
is the default. In lab 2-2 we defined a Setup cdm MCS profile in which the Send Short Name for
QoS Source option is selected. Once the Setup cdm MCS profile was deployed, the short name
was used for QoS source for the umpserver device. In a later lab, we will merge the two sets of
QoS data so that reports will only include a single umpserver device entry.

18. To view the drill-down report for a metric, double-click the metric.

19. To view the drill-down report for a device, in the Host column, click the server name.

40 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

Lab 4-2 Create a PRD Chart

Goals Create a Performance Report Designer (PRD) chart.

Scenario The PRD enables you to create a visual representation of QoS data. Select the
host, QoS measurement, target, and time range, and data is displayed as a chart.
You can display multiple measurements on a single chart, and can view multiple
charts at a time. You can drag charts between rows, or drag a data series from
one chart to another. You can choose the chart format (line, area, or column
chart), and the Filters tab enables you to plot only the data that matches
specified filters on the chart. You can easily change the source (host or target) of
the data by using the Choose Source menu. You can save a set of charts as a
report to print or to view later.
In this lab, you will create a PRD chart by dragging individual metrics to create an
“on-the-fly” report.

Time 10 minutes

Instructions:

Create a CPU/Disk/Memory Report

1. In UMP, to open the PRD, click Design  Performance Reports Designer.

2. On the QoS Selection by Host tab, perform the following steps to designate a target.
a. Follow the instruction in the QoS column (Select a host) by selecting vm01linux in the Host
column.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 41


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

b. Follow the instruction that now appears in the Target column (Select a QoS) by selecting
QOS_CPU_USAGE in the QoS column.

3. Drag the vm01linux target to the report:

42 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

4. You will now see the metric on the chart

5. Using the following values, drag additional targets to the report.


Host QoS Target
vm01linux QOS_DISK_USAGE_PERC /
vm01linux QOS_MEMORY_PERC_USAGE vm01linux

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 43


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

6. To set the Axis maximum to 100:


a. At the upper left of the chart, click the up icon.
b. In the field under the host list, type the following and press Enter:
100

7. To change the report title:


a. To select the title, double-click Title.
b. Replace the current text with the following:
VM Guest Report
c. To accept the change, press Enter.

The report appears similar to the following screenshot:

Save the Report

8. In the lower right corner, click Save view .

9. In the text field at the bottom of the Save dialog, enter the following as the report name:
VM Guest CDM Report

10. In the list to the right of the text field, select public.

44 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 4: Examine Monitored Data

11. Click Save.

12. Close the UMP.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 45


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Lab 5-1 Configure the emailgtw Probe

Goals Configure the emailgtw probe.

Scenario The emailgtw probe needs to be configured so that CA UIM can send notification
emails on alerts. In this lab, you will perform the necessary configuration,
including setting up an email profile and modifying an email template.

Time 30 minutes

Instructions:
Access the Admin Console

1. Open the Admin Console.

2. Sign in to the Admin Console using the following credentials:


Username administrator
Password uim123

Download the emailgtw Probe

3. Click the Archive tab and then click the Web Archive tab.

4. Click the Internet Archive Credentials button and verify that credentials exist.
Note: Valid credentials are required to download packages.

5. To close the Credentials entry pane, click the Internet Archive Credentials button again.

46 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

6. Locate the emailgtw package, select it, and click Download.

7. In the Download Packages verification dialog, click Yes.

8. Click the Local Archive tab.

9. If the emailgtw probe is still downloading, wait until the download completes before
proceeding.

10. In the left pane, expand primary and select uimserver.

11. In the right pane, select the emailgtw probe.

12. Click Deploy.

13. In the Confirm dialog, click Yes.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 47


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Open the emailgtw Probe

14. Click the Infrastructure tab.

15. Select the uimserver robot.

16. Click the down icon to the left of the emailgtw probe and click Configure.
Note: If the emailgtw status icon indicates that it is still being deployed, wait for the green
check status icon to appear before proceeding. If the emailgtw probe does not appear in the
list, refresh the browser page.

48 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

17. The emailgtw probe configuration GUI opens.

18. Review the options on the emailgtw (top-level) node, particularly the Email Message section.

Note: The template field defines the format in which the emails are formatted. If “HTML” is
selected in the "Message Format" field, the template is "template.html" by default. If “Text” is
selected, the template is changed to the text version (template.txt).These files (.html or .txt) are
located in the Nimsoft/Probes/gateways/emailgtw directory.

Configure SMTP Settings

19. Select the Mail Server node.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 49


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

20. In the Mail Server Configuration section, in the Primary Mail Server field, type the following:
127.0.0.1

21. Click Save.

22. Click OK to refresh the configuration.

50 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Create a Custom HTML Template

23. On the desktop, double-click the Windows Explorer shortcut.

24. Navigate to the C:\Nimsoft\probes\gateway\emailgtw folder.

25. Right-click template.html and click Edit with Notepad++.

26. Click File  Save As.

27. In the File name field, type the following:


customtemplate.html

28. Click Save.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 51


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Modify the Custom HTML Template

29. Add a blank line after:


<td width="25%"><b><font color="#FFFFFF">Probe: $prid</font></b></td>

30. To add the origin field to the custom template, type:


<td width="25%"><b><font color="#FFFFFF">Origin: $origin</font></b></td>

31. Save the custom HTML template and close Notepad++.

Configure a New Profile

32. Return to the Admin console emailgtw configuration window.

33. To the right of the Profiles node, click Options icon and then click Add Profile.

52 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

34. Configure the profile using the following settings:


Name MyProfile
Email admin@voonair.com
Subject MyCustom Subject from $robot
Template customtemplate.html

35. To save the profile and close the Add Profile dialog, click Submit, then click Reload.

36. To finish the configuration, close the emailgtw v2.81: Configuration browser tab.
This profile will be used in a subsequent lab exercise.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 53


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Lab 5-2 Activate AO Logging

Goals Activate AO logging.

Scenario To audit AO events, you need to activate AO logging.

Time 5 minutes

Instructions:

Activate the AO

1. To access the AO subsystem in the nas probe configuration GUI:


a. On the desktop, double-click the Infrastructure Manager shortcut.

b. Sign in with the following credentials:


Username administrator
Password uim123
c. Click on the uimserver robot
d. Double-click the nas probe.
e. Click the Auto-Operator tab.

2. On the Properties subtab, verify Activate Auto-Operator is selected.


Note: The AO must be active for AO logging to be enabled. If it is not active, select Activate
Auto-Operator, click Apply, and when prompted, restart the probe to enable the change.

3. Set the Auto-Operator interval to 1min.


Note: You will have to type this value in.

54 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Enable AO Logging

4. Click the Status tab.

5. Click the Show Activity Log button .

6. Click the Preferences button .

7. In the Activity Log Preferences dialog:


a. Select Enable Activity Log and then select all logging options.

b. To save your changes, click OK.

8. Close the Activity Log - All window.

9. To save the updated configuration and close the nas probe GUI, click OK.

10. To restart the probe and enable changes, click Yes.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 55


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Lab 5-3 Verify Auto-Acknowledgment

Goals Verify auto-acknowledgment.

Scenario Alarms can be acknowledged automatically. This occurs when a clear alarm is
received that matches an existing alarm. In this lab, you will use the alarm test
mechanism to verify this auto-acknowledgment process.

Time 5 minutes

Instructions:

Access the nas Test Alarm

1. Launch Infrastructure Manager and login if prompted.

2. Click the uimserver robot and double-click the nas probe.

3. Click the Status tab.

4. Click the Send Test Alarm button.

Send Minor and Critical Alarms

5. Set the Severity level to minor and click Send.

6. Click the Refresh Alarm List button.


The minor alarm appears in the window.

7. Click the Send Test Alarm button.

8. Set the Severity level to critical and click Send.

9. Click the Refresh Alarm List button.


The critical alarm appears in the window replacing the previous minor alarm.

56 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Send a Clear Alarm

10. Click the Send Test Alarm button.

11. Set the Severity to clear and click Send.

12. Click the Refresh Alarm List button.


The critical alarm has been removed from the window.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 57


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Lab 5-4 Build an AO Profile to Send Emails on Alarms

Goals Build an AO profile to send emails on alarms.

Scenario In this lab, you will use the AO to send an email on an alarm. Because you cannot
send and receive emails in the lab, you will simulate this by using a program
called Papercut that will permit you to view the sent email.

Time 10 minutes

Instructions:

Set Up the AO Profile

1. In the nas probe GUI, click the Auto-Operator tab and then click the Profiles subtab.

2. Right-click in the white space and click New.

3. In the Profile dialog, configure the profile using the following settings. Leave the default for all
other settings.
Action type EMAIL
Recipient(s) MyProfile
Action mode On overdue age 10s
Severity Level Minor (yellow)
Message Visibility ignore
Message Counter Equals to 1

58 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

4. Click OK.
The Enter new profile name dialog appears.

5. In the Profile Name field, type:


Email on First Alarm

6. Click OK.

7. In the profiles list, verify that the Email on First Alarm profile is selected.

8. To save the updated configuration click Apply.

9. To restart the nas probe, click Yes.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 59


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Open the Papercut SMTP Server

10. On the desktop, double-click the Papercut shortcut.


Leave Papercut open. This is where you will view the incoming email. No configuration is
necessary.

Clear the Processor Queue Alarm for vm01linux robot

11. In the nas probe GUI, click the Status tab.

12. Right-click the minor alarm for vm01linux Processor Queue Length and click Acknowledge.

60 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

View the Email

13. Wait for the alarm to fire and the email to be sent.
“New Message Received” will appear momentarily in the system tray.

14. In Papercut, in the left pane, click the email represented by its date and time.

15. In the right pane, click the HTML View tab and view the email. Note the origin field on the right
hand side of the message header.

16. To close Papercut, click Exit.

17. To close the nas probe GUI, click Cancel.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 61


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

Lab 5-5 Define an Ad Hoc Maintenance Schedule

Goals Define an ad hoc maintenance schedule.

Scenario In this lab, you will define an ad hoc maintenance schedule for the vm01linux
robot.

Time 10 minutes

Instructions:

Define the Ad Hoc Maintenance Schedule

1. Open the UMP.

2. On the Home page, in the left pane, expand the VMware Guests group and click the vm01linux
robot.

3. In the right pane, on the Details tab, click the Start maintenance icon.

4. Configure the Maintenance Schedule as follows:


Scheduling Once Only default value
Starting Today's date default value
At 5 minutes in the future default value
For 0 hours 5 minutes
With time zone Eastern Time default value

62 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

5. Click Save.

6. In the left pane, click the VMware Guests group.

7. In the right pane, click the Maintenance tab.


The new ad hoc schedule is listed.

8. In the right pane, click the Alarms tab.

9. For the system load alarm, click More.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 63


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 5: Basic Alarm Notifications

10. Click History.

11. Wait approximately 10 minutes (5 minute delay + 5 minute duration) and confirm the alarm
was suppressed during the ad hoc maintenance period.

64 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-1 Define an MCS Monitoring Profile for MS SQL Server

Goals Define an MCS monitoring profile for MS SQL Server.

Scenario Previously we added MCS profiles to the Windows USM group. Scenario: we
have now received a request from the database support team to monitor the
availability and health of MS SQL Server on database servers. We will create a
new DBServers USM group and assign a MCS SQL Server monitoring profile to the
group to accomplish this requirement.

Time 20 minutes

Instructions:

Assign a User Tag Value to uimserver

1. Open the Admin Console and log in as administrator.

2. In the left pane, expand primary and click webserver1.

3. Click the down icon to the left of the controller probe and click Configure.

4. In the right plane, in the General Configuration section, enter the following in the Identification
property User Tag 1 field:
sqlserver

5. Click Save.

6. To close the configuration window, click Close.

7. To acknowledge the confirmation dialog, click Yes.

Verify User Tag Assignment

You need to first refresh the Admin Console connection with the service_host component.

8. To refresh the Admin Console connection, click the browser refresh button.
The Admin Console sign on dialog will appear.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 65


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

9. Sign in to the Admin Console as administrator.

10. In the left pane, expand primary and click webserver1.

11. In the right pane, to view all robot properties, click Show more.

The expanded properties view includes the User Tag 1: sqlserver entry.

12. To promulgate the user tag value to other components, restart the webserver1 robot.

Create the SQLServers USM Group

We will now switch to the UMP. Do not close the Admin Console as we will be using it later in this
lab.

13. Open the UMP and log in as administrator.

14. To add a new group, mouse over Groups and click the + icon that appears.

66 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

15. In the Edit Group dialog, on the Properties tab, complete the following fields:
a. In the Group Type list, select Dynamic.
b. In the Name field, type:
SQLServers
c. Under Filters:
i. Select User Tag 1.
ii. Select is.
iii. Type:
sqlserver

16. Click Apply Filters.

17. To create the group, click OK.

Add a SQL Server MCS Profile to the SQLServers Group

18. In the left pane, click the SQLServers group.

19. In the right pane, click the Monitoring tab.

20. In the right pane in the Device Type list, select webserver1.
Note: If the right pane is blank, mouse over Device Type in the center pane, click the + icon, and
then complete this step.

21. Click Create.


The center pane populates with MCS profile types.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 67


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

22. To locate the SQL Server profile type in the center pane, click the scroll bar.
Notice that the SQL Server profile type exists but is not available for selection. This is due to the
fact that the sqlserver probe does not exist in the local probe archive. We need to download
the probe from the web archive.

68 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Download the sqlserver Probe to the Local Archive

23. Return to the Admin Console.

24. Click Archive.

25. Click Web Archive.

26. Scroll down and select the sqlserver package.

27. Click Download.

28. To answer the confirmation dialog, click Yes.

29. When the download completes, click Local Archive.

30. Scroll down and confirm the sqlserver package exists in the Local Archive.

Continue Adding a SQL Server MCS Profile to the SQLServers Group

31. Return to the UMP.

32. In the center pane, scroll down to locate the SQL Server profile type.

33. To add a new profile, mouse over the SQL Server profile type and click the + icon.
Note: You may have to refresh the UMP for the SQL Server profile type to be available

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 69


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

34. In the right pane, complete the SQL Server Monitoring Configuration as follows:

35. Click Create.


70 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Confirm the MCS Profile Deployment

36. In the left pane, expand the SQLServers group and click webserver1.

37. In the right pane, click the Monitoring tab.

38. In the center pane, expand the SQL Server profile type and under it, click the SQL Server profile.
Note: You may have to wait as much as 10 minutes for the probe and MCS profile deployments
to complete before being able to expand the profile type.

39. In the right pane, scroll down and in the Profile Status confirm the profile was derived
automatically from Group: SQLServers.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 71


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-2 Deploy and Configure the Net Connect Probe

Goals Deploy and configure the Net Connect probe.

Scenario The Net Connect probe monitors network connectivity through ICMP and Telnet
to specific ports. In this lab, you will set up a profile to ping local servers.

Time 15 minutes

Instructions:

Deploy the Net Connect Probe from the Admin Console

1. Open the Admin Console.

2. Sign in to the Admin Console using the following credentials:


Username administrator
Password uim123

3. Click the Archive tab.

4. In the left pane, select uimserver.

5. In the right pane, select the net_connect probe.


Note: Ensure this is the only package selected. If more than one package is selected, deselect
the additional package(s).

6. Click Deploy.

7. In the confirmation message, click Yes.

72 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

View the Default Service Definitions

8. On the Infrastructure tab, expand uim and primary and select uimserver.

9. In the right pane, click the down triangle to the left of net_connect and click Configure.

10. Observe the layout of the page and the default service definitions.

Create a New Profile and Test Connectivity

11. Click the Option icon to the right of the net_connect node, and then click Add New Host.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 73


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

12. In the Add New Host window, complete the fields as follows:
Hostname uimserver
IP Address 192.168.1.20

13. Click Submit, then click Reload.

14. In the left pane of the net connect configuration browser tab, select the uimserver node.

Click Actions  Ping.

15. On the success window, click Close.

74 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Configure the new Profile

16. Select the Packet Loss node and select Publish Data for all monitors.

17. Click Save and then click OK to refresh the configuration.

18. In the left pane, expand uimserver and under Profile, click Services.

19. Click the NimBUS_HUB, NimBUS_Robot, NimBUS_Spooler, and mssql-server services to the
move them to the Selected column as shown in the following screenshot:
Note: Clicking an arrow moves all services to the column the arrow points to.

20. Click Actions  Create Service Profile.

21. Click Reload.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 75
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

22. Expand uimserver and select the mssql-server Service node.

23. Click Actions  Test Connect.

24. To acknowledge the Success message, click Close.

25. Close the net_connect configuration browser tab.

76 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-3 Deploy and Configure the URL Response Probe

Goals Deploy and configure the URL Response probe.

Scenario The URL Response probe monitors various metrics regarding accessing URLs. In
this lab, you will configure the probe to monitor the CA Technologies home page.

Time 15 minutes

Instructions:

Deploy and Configure the url_response Probe from the Admin Console

1. Open the Admin Console.

2. Sign in to the Admin Console using the following credentials:


Username administrator
Password uim123

3. Click the Archive tab and then click the Web Archive tab.

4. Deploy the url_response probe from the archive to the uimserver robot.

5. In the confirmation message, click Yes.


The probe package will first be downloaded to the Local Archive and then deployed to the
uimserver robot.

6. Click the Infrastructure tab, and then select the uimserver robot.

7. In the right pane, click the down icon to the left of the url_response probe and click Configure.
Note: If the url_response probe in not present, click the right pane refresh icon.

Create a New Profile

8. To the right of url_response, click the Options icon and then click New Profile.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 77


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

9. Configure the new profile with the following settings:


Note: We are purposely introducing a typo by specifying CB rather than CA. This will be
corrected in a later lab.
Active Selected
Profile Name CB Technologies Home Page
URL http://www.ca.com

10. Click Submit, then click Reload.

Test and Configure the Profile Settings

11. Select the CB Technologies Home Page node.

12. Click Actions  Test URL.

78 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

13. To close the Response dialog, click Close.

Configure the QoS Settings

14. Expand the Ca Technologies Home Page node and select the Metric folder.

15. In the right pane, select Publish Data for the following metrics:
Note: Publish Data is selected by default for several of these metrics.
 Page Load Time
 Time to First Byte
 TCP Connect Time
 DNS Resolution Time
 Download Time

16. Click Save.

17. To close the Success dialog and the Probe Configuration window, click Close.

18. To acknowledge the confirmation dialog, click Yes.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 79
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-4 Create a Simple Update Package

Goals Create a simple update package.

Scenario In this lab, you will use a Configuration Only package to make a simple update to
the controller probe.

Time 15 minutes

Instructions:

Create the Package in Infrastructure Manager

1. To open Infrastructure Manager, double-click the available desktop shortcut.

2. Sign in using the following credentials:


Username administrator
Password uim123

3. In the left pane, select uimserver.

4. To create a robot_update package, drag the controller probe from the uimserver robot to your
probe archive.

5. In the Update Packages dialog, click Rename.

80 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

6. Change the package name to the following:


robot_update_2

7. Verify that Configuration Only is selected.

8. Click OK.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 81


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Modify the CFX File

9. With the primary archive selected, in the right pane, double-click the robot_update_2 package.

10. In the Package: robot_update_2 window, and on the Files tab, locate the robot.cfx file.

11. Right-click the robot.cfx file and click Edit file.

12. Remove all text except for the following section and keys you want to set:
<controller> overwrite
first_probe_port = 48000
</controller>

13. Add the following key after the first_probe_port key:


config_locking = yes

14. To save the CFX file, click OK.

15. To save the package, click OK.

82 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Deploy the Package to vm01linux

16. To observe the current controller probe configuration on the vm01linux robot:
a. On the vm01linux robot, double-click the controller probe.
b. Click the Advanced tab.
Observe the current configuration.

c. To close the controller probe configuration, click Cancel.

17. To deploy the new package, drag the robot_update_2 package from the archive to the
vm01linux robot.
The distribution will fail.

18. Click Close Dialog to close the View Distribution Process dialog.

19. To fix the package:


a. Double-click the robot_update_2 package.
b. On the win32 tab, in the OStype list, select unix.
c. In the OS field, type the following:
Linux

Note: This value does not currently exist in the OS list. It must be typed to create a new
entry.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 83


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

d. Right-click the win32 section name and click Rename current section.

e. In the Section name dialog, type the following and click OK:
Linux

f. To save the updated package, click OK.

20. To re-deploy the package:


a. Drag the robot_update_2 package from the archive to the vm01linux robot.
b. When distribution is completed, close the View Distribution Progress dialog.

Verify Configuration Changes

21. On the vm01linux robot, double-click the controller probe.

22. Click the Advanced tab and observe the changes.

23. To close the configuration GUI, click Cancel.

84 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-5 Create a Profile Addition Package

Goals Create a profile addition package.

Scenario In this lab, you will use a package to update the processes probe and create
watchers for CA UIM processes. Because this package only updates the
configuration, you need to deploy the probe package first.

Time 10 minutes

Instructions:
Deploy the Processes Probe

1. Open the Infrastructure Manager thick client.

2. Sign in using the following credentials:


Username administrator
Password uim123

3. In the left pane, expand Archive and click primary.

4. In the upper right pane, right-click the processes probe and click Download.

5. Close the View Download Progress dialog.

6. Drag the processes probe from the right pane to the uimserver robot.

7. When distribution is completed, close the View Distribution Progress dialog.

Create the Package

8. In the left pane, click the uimserver probe.

9. To create a profile example in a new custom package, drag the processes probe from the
uimserver robot to the primary package archive in the left pane.

10. Rename the package to processes_update and verify that Configuration Only is selected.

You will now modify the CFX file.

11. Double-click the processes_update package in the archive, right-click the processes.cfx file, and
click Edit file.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 85


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

12. To make the text edit pane active, left-click the white space.

13. To select all text, press ctrl-A.

14. Add watcher profiles to reflect the two processes you need to track. Set up one profile for
hub.exe and another profile for nas.exe, using the following text:

Note: The following text can be copied from C:\CourseFiles\UIM_Admin\processes_update.txt.

<watchers> overwrite
<hub.exe> overwrite
active = yes
description = Tracking the Hub
process = hub.exe
qos_process_cpu = yes
qos_process_memory = yes
</hub.exe>
<nas.exe> overwrite
active = yes
description = Tracking the NAS
process = nas.exe
qos_process_cpu = yes
qos_process_memory = yes
</nas.exe>
</watchers>

15. To save the CFX file, click OK.

16. To save the package, click OK.

Deploy the Package

17. Drag the processes_update package from the archive to uimserver.

18. When distribution is completed, close the View Distribution Progress dialog.

Verify the Distribution Success

19. In the left pane, click the uimserver robot.

20. In the right pane, double-click the processes probe.

86 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

21. Click the Profiles tab.


Observe the presence of the hub.exe and nas.exe profiles.

22. To close the processes probe configuration window, click Cancel.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 87


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Lab 6-6 Deploy a SuperPackage

Goals Deploy a SuperPackage.

Scenario In this lab, you will use a SuperPackage to make updates to several probes at
once. First, you will need to deploy appropriate probes and then you will drag
the package to the robot. This package has the secondary benefit of configuring
probes for use in later labs.

Time 10 minutes

Instructions:

Obtain the SuperPackage and Supplemental Packages

1. In Windows Explorer, navigate to C:\CourseFiles\UIM_Admin.

2. Locate the SuperPackage_1.1.zip file and drag it to the archive in Infrastructure Manager.

88 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Inspect the Package

3. To open the package, double-click SuperPackage in the package archive.

4. Examine the OS section.


a. To view the OS section, click the win32 tab.
b. Click the Dependencies tab and notice the six probes that are listed.

5. Examine the archive and locate each of the six dependent probes. You will discover the status
of the sql_response probe is Not in archive.

Important: Dependent probes that are not in the archive must be downloaded prior to
deploying the super package. You will do this in a later step.

6. Examine the configuration sections.


a. To view the configuration sections, click the tab that corresponds to the probe the
configuration section relates to.
The following screenshot shows the configuration section for the processes probe.

7. To close the SuperPackage configuration dialog, click Cancel.

Satisfy Probe Dependencies

8. In the archive, right-click sql_response and click Download.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 89


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

Examine the Current url_response Probe Configuration

Before deploying the SuperPackage, we will examine the current url_response probe configuration
to identify what monitoring profiles exist. Afterwards, we will re-examine the configuration to
verify it was updated by the SuperPackage deployment.

9. In the left pane, click the uimserver robot.

10. In the right pane, double-click the url_response probe.

11. In the url_response configuration window, on the Profiles tab, expand Group: default.

12. Examine the profiles listed.


Notice that two profiles currently exist and only the CB Technologies Home Page profile is
active.

Deploy the Package

13. In the left pane, under Archive, click primary.

14. Drag the SuperPackage from your archive to the uimserver robot.

15. When distribution is completed, close the View Distribution Progress dialog.

Verify the SuperPackage is Deployed.

16. In the left pane, click the uimserver robot.

17. In the right pane, scroll down and verify the sql_response is included in the list. This confirms
this probe was deployed to the uimserver robot during the deployment of the superpackage.

Confirm the url_response Probe Configuration is Deployed

18. In the right pane, double-click the url_response probe.

19. In the url_response configuration window, on the Profiles tab, expand Group: default.

20. Examine the profiles listed.


Notice seven new profiles were added by the url_response probe configuration contained in
the SuperPackage. Notice also that two profiles exist for the http://www.ca.com website, the
profile we created in the earlier lab and a duplicate profile added by the SuperPackage that
does not include the typo. We will now delete the profile that contains the error.

Correct the url_response Probe Configuration

21. Select the CB Technologies Home Page profile.

22. Right-click the selected profile and click Delete.


90 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 6: Advanced Monitoring Administration

23. In the Delete profile dialog, click Yes.

24. To save the updated profile, click OK.

25. In the Restart probe dialog, click Yes.

Note: QoS metrics will now exist in the database for the CB Technologies Home Page profile
with the typo that was deleted and the new, correct CA Technologies Home Page profile. In a
later lab, we will merge this data so that it is reported on collectively.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 91


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

Lab 7-1 Deploy a Secondary Hub

Goals Deploy a secondary hub.

Scenario In this lab, you will deploy a secondary hub probe to a Windows host. There are
three ways hubs can communicate with each other: broadcast, static hubs, and
tunnels. While hubs can communicate through broadcast, you will be initially be
demonstrating the use of static hubs. In a subsequent lab, you will disable the
static hub and set up hub-to-hub communication through an SSL tunnel.
You will also identify and satisfy the requirement to deploy additional probe
packages to the secondary hub to support Admin Console probe configuration of
probes that fall under the secondary hub in the Infrastructure hierarchy.

Time 15 minutes

Instructions:
Install a Windows Secondary Hub on uimhub2

1. Open the UIMHub2 VM.

2. In necessary, log in using the following credentials:


Username administrator
Password caeducation

3. On uimhub2, open an Internet Explorer window.

4. Open address http://uimserver:8080.

5. On the UIM Server home page, click the Installers link.

6. On the Installers page, click Windows Robot, Hub, Distribution Server.

7. Click the arrow beside the Save button and then click Save as.

92 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

8. In the Save As dialog left pane, select Desktop and then click Save.

9. Close the Internet Explorer window.

10. On the desktop, right click the Nimbus Infrastructure.exe shortcut and click Run as
administrator.

11. At the Welcome dialog, click Next.

12. To accept the License Agreement, click Yes.

13. To specify the destination folder, click Browse.

14. Update the destination folder to C:\Nimsoft and click OK.

15. To proceed using the updated destination folder, click Next.

16. At the Setup Type, select Custom install and click Next.

17. At the Select Components page, retain the default selection of Hub and Probe Runtime
libraries, select Hub, and click Next.

18. To accept the uim domain, click Next.

19. Replace the default hub name of uimhub2 with the following:
secondary

20. Click Next.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 93
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

21. To accept the automatically generated license, click Next.

22. On the First Probe Port page, enter the following:


48000

23. Click Next.

24. To start the installation, click Next.

25. On the Nimsoft Security page, click Next.

26. In the Intial User dialog, enter the following:


Enter Password uim123
Retype Password uim123

27. Click OK.


Note: If the following error message appears, click OK to continue and Yes to complete the
installation without setting the initial user. That error happens when there is a problem with
the new secondary hub communicating back to the primary to sync the security.sds file. The
security files on the primary and secondary hub will synch up when the secondary hub starts.

28. When the installation completes, click Finish.

94 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

Confirm the Hub Appears in the Infrastructure Hierarchy

29. Switch to the UIMServer VM.

30. In necessary, log in using the following credentials:


Username administrator
Password caeducation

31. Open and log in to the Admin Console.

32. Expand the Infrastructure hierarchy and observe the presence of the primary and secondary
hubs and the robots that appear under each.

Configure the New Hub to Support the Admin Console

33. In the Admin Console, in the Infrastructure tab left pane under the secondary hub, select the
uimhub2 robot.

34. In the right pane, click the down triangle to the left of hub and click Configure.
An error message appears indicating that Admin Console is unable to read the configuration.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 95


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

To correct this error, additional probe packages need to be deployed to the secondary hub.

35. To close the error message dialog, click Close.

36. In the confirmation dialog, click Yes.

37. Click the Archive tab.

38. Deploy the java_jre and ppm packages from the Local Archive to the uimhub2 robot.

39. Click the Distribution Activity tab and monitor the installation of these packages.

40. Proceed to the next step when the package installation is complete.

Test the Admin Console Support

41. Click the Infrastructure tab.

42. In the left pane, select the uimhub2 robot.

43. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.

44. Close the hub configuration window.

96 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

Lab 7-2 Set Up Multi-Tenancy

Goals Set up multi-tenancy.

Scenario Multi-tenancy is central to CA UIM and is based on the origin of a particular QoS
metric or alarm message. The origin is set by default at the hub level, but can be
overridden at the robot level by manually setting the origin of the robot in the
controller probe configuration. In this lab, you will change the origin of the new
hub to something more meaningful than the robot name.

Time 5 minutes

Instructions:

Set the Origin of the New Hub

1. In the Admin Console, in the left pane, select the uimhub2 robot.

2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.

3. In the configuration window left pane, select Advanced.

4. In the right pane, in the Origin field, type the following:


ClientA

5. Click Save.

6. To close the Success dialog and the hub configuration window, click Close.

7. In the confirmation dialog, click Yes.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 97


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

Restart the Primary Hub

For instructional purposes so that all components of the CA UIM learning environment become
aware of the origin update, we need to restart the primary hub.

8. In the Admin Console left pane, mouse over uimserver and click the Options icon.

9. Click Restart.

10. In the confirmation dialog, click Yes.

11. Close the Admin Console.


Note: When the primary hub is restarted, the service_host probe is restarted. The Admin
Console connects to UIM Server via that Apache Tomcat server that is part of the service_host
probe. If the service_host probe is restarted, the Admin Console connection to UIM Server is
lost and it needs to be closed and reopened.

98 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

Lab 7-3 Configure Message Queues

Goals Configure Message Queues.

Scenario When hub-to-hub communication has been established, queues must be


established on the primary and secondary hubs so that QoS data from robots
under the secondary hub can flow to the primary hub. If a post queue is created
on the secondary hub, messages will be sent with no acknowledgment. If an
attach queue is created on the secondary hub (recommended), a get queue must
be created on the primary hub.

Time 20 minutes

Instructions:

Create an Attach Queue on the secondary Hub

1. In the Admin Console, in the Infrastructure tab left pane, select the uimhub2 robot.

2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser tab opens.

3. In the left pane, select Queue List.

4. In the right pane, under Queue List Configuration, click New.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 99


COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

5. Configure the queue entry fields as follows:


Name toPrimary
Type attach
Subject *

6. To save the hub configuration, click Save.

7. To close the Success dialog and the hub configuration window, click Close.

8. Click Yes in the confirmation dialog.

100 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

Create a Get Queue on uimserver

9. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.

10. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.

11. In the left pane, select Queue List.

12. In the right pane, under Queue List Configuration, click New.

13. Configure the queue entry fields as follows:


Queue Name fromClientA
Active selected
Type get
Hub Address /uim/secondary/uimhub2/hub
Subject *
Remote Queue Name blank
Remote Queue List toPrimary
Bulk Size <default>

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 101
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

14. To save the new queue, click Save.

15. To close the Success dialog and the hub configuration window, click Close.

16. Click Yes in the confirmation dialog.

View the Status of the Queues

17. In Infrastructure Manager, open the hub probe on uimhub2.

18. To view the toPrimary queue, click the Status tab.

19. To close the hub probe on uimhub2, click Cancel.

20. Open the hub probe on uimserver.

21. To view the fromClientA queue, click the Status tab.

22. To close the hub probe on uimserver, click Cancel.

102 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

Lab 7-4 Create a Hub-to-Hub Tunnel

Goals Create a hub-to-hub tunnel.

Scenario In this lab, you will disable the static hub and create a hub-to-hub tunnel. In a
typical situation, a proxy hub would be established and act as the tunnel server.
Since this is not possible in our classroom lab environment, we will configure our
secondary hub as the tunnel server and the primary hub as our tunnel client.

Time 20 minutes

Instructions:
Configure the Tunnel Server on uimhub2

1. In the Admin Console, in the Infrastructure tab left pane, select the uimhub2 robot.

2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.

3. In the left pane, select Advanced.

4. In the right pane, select Disable IP Validation.

5. Click Save.

6. In the Success dialog, to refresh the display, click OK.

7. In the left pane, select Tunnel.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 103
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

8. In the right pane, select Tunnel Active and click Save.

9. In the Success dialog, to refresh the display, click OK.

10. In the left pane, select 1 - Tunnel Server.

11. In the right pane, in the Certificate Authority Initialization section, in the Password field, type
the following:
uim123

12. Click Actions  Perform Certificate Authority Initialization.

13. To close the Success dialog, click Reload.

104 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

14. In the right pane under Server Settings, in the Security Setting field, select
LOW - cipher: LOW:!ADH.

15. In the right pane, in the Client Certificate Configuration section, enter the following values:

Common Name *
Password uim123

16. Click Actions  Create Client Certificate.

17. To close the Success dialog, click Reload.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 105
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

18. In the right pane, in the Client Certificate List section, right-click the Certificate field and click
Select all.

19. Right-click the selected Certificate text and click Copy.


You will need this certificate when you create the Tunnel Client on the uimserver hub.
Note: You may want to open a text editor window such as Notepad and paste the copied key
into it and save it as a text file on the desktop so that you know for sure it will be available
when it comes time to paste it into Tunnel Client configuration window.

20. In the right pane Server Settings section, to start the tunnel server, click Actions 
Start Tunnel.

106 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

21. To close the Success dialog, click Reload.


The Server Status changes to Running.

22. Close the hub configuration window.

Configure the Tunnel Client on uimserver

23. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.

24. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.

25. In the left pane, select Tunnel.

26. In the right pane, select Tunnel Active and click Save.

27. In the Success dialog, to refresh the display, click OK.

28. In the left pane, select 2 - Tunnel Client.

29. In the right pane, in the Client Certificate Configuration section, click New.

30. Enter the following values:


Server 192.168.1.60
Description Classroom Tunnel
Password uim123

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 107
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration

31. To paste the previously copied certificate, right-click the Certificate field and click Paste.

32. To save the Tunnel Client configuration, click Save.

33. To acknowledge the Success message and close the hub configuration window, click Close.

34. Click Yes in the confirmation dialog.

Verify the Success of the Hub-to-Hub Connection

35. In the Infrastructure Manager thick client, select the uimserver robot and open the hub probe.

36. Click the Status tab and then click the Tunnel Status subtab.

108 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration

37. View the connection status icon and look for idle traffic being passed as in the following
screenshot:

Note: If the tunnel status list is empty, restart the uimserver robot and close and reopen
Infrastructure Manager.

38. To close the hub probe GUI, click OK.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 109
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-1 Build an AO Profile to Create a New Alarm

Goals Build an AO profile to create a new alarm.

Scenario In this lab, you will create an AO profile to create a new alarm. In this case, you
are escalating an alarm that has come in more than a certain number of times
over a particular period. This is useful, given alarm suppression, so that truly
critical situations can be called out.

Time 10 minutes

Instructions:

Set Up the AO Profile

1. In the Infrastructure Manager thick client, select the uimserver robot, and then double-click the
nas probe.

2. Click the Auto-Operator tab and then click the Profiles subtab.

3. Right-click in the white space and click New.

4. Configure the new profile using the following settings:


Action type new_alarm
Message Sustained System Load Alarm
Severity major
Action mode On message arrival
Severity Level Yellow (Minor)
Message Visibility visible
Message Counter Greater than or equal to 3
NMS Probe Name cdm
Message string *system load*

110 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

5. To save the new profile, click OK.


The Enter new profile name dialog appears.

6. In the Profile Name field, type the following and click OK:
SustainedSystemLoad

7. To activate the new profile, click Apply.

8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.
The status indicator changes to a green triangle.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 111
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Acknowledge the Existing Alarm and Wait for the New Alarm to Be Created

9. In the nas probe window, click the Status tab.

10. Right-click the Processor Queue Length alarm for vm01linux and click Acknowledge.

11. Wait a few minutes and click Refresh on the Status tab to verify that the new alarm
appears.

12. To close the nas probe GUI, click OK.

112 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-2 Create a Simple Alarm Enrichment

Goals Create a simple alarm enrichment.

Scenario This exercise will use out-of-the-box functionality to add the operating system
type of a device to the Custom 4 field in an alarm. Alarm enrichment enables us
to get more granular with alarm messages. For example, if a switch has multiple
tenants, you can use alarm enrichment to update the origin field of the message
to correspond to the tenant or customer to whom those switch ports are
assigned.

Time 15 minutes

Instructions:

Configure the alarm_enrichment Probe

Note: The alarm_enrichment probe is configured from within the nas probe.

1. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.

2. In the right pane, click the down triangle to the left of nas and click Raw Configure.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 113
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

3. In the Raw Configure dialog, in the left pane, expand enrichment-rules and select
1.
Notice the default settings in the right pane, in particular the match_alarm_regexp value which
dictates that only alarms originating from the cdm, controller, or hub probes will be enriched.

4. Expand enrichment-rules\1 and select


overwrite-rules. Notice the default setting in the right pane. This setting dictates that the
custom_4 value used for the alarm record will be assigned to os_type value.

5. In the left pane, expand enrichment-source\cmdbs, and select os_enricher.

114 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

6. In the right pane, modify the following key values:


active true
connection_url jdbc:sqlserver://192.168.1.20:1433;DatabaseName=CA_UIM;
password uim123
user sa

7. To apply the changes, click Apply.

8. In the confirmation prompt, click Yes.

9. In the right pane, click the down triangle to the left of alarm_enrichment and click View Log.

10. Check the Log Viewer to verify that the probe restarted and did not generate a database
connection error.

11. Close the Log Viewer.

Check the Alarm in USM

12. Sign in to UMP and navigate to USM.

13. In USM, click the Alarm View icon .

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 115
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

14. In Alarm View, click Actions  Select All and then click Actions  Acknowledge.

15. When a fresh instance of a processor queue length alarm appears, click MORE.
Notice that Custom 4 shows the operating system.

116 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-3 Build an AO Trigger

Goals Build an AO trigger.

Scenario Triggers enable administrators to sort alarm messages based on properties set
for the trigger. This means that alarms matching the criteria defined for the
trigger will not be handled by an AO. You can define triggers using matching
criteria (such as message text, severity, and host name) and time restrictions
(defining the periods when the filter should be active).
A trigger is a component mechanism for alarm correlation that can be used in
Lua scripts. For example, say you have three critical websites. If one of the
websites is down, you know you have two backups. If two websites are down,
you are still in decent shape. However, if all three websites are down (all triggers
are true), you want to generate an alarm that sends a 911 SMS message to the
appropriate parties.

Time 10 minutes

Instructions:

Create the Trigger

1. In Infrastructure Manager, to open the probe configuration GUI, on the uimserver robot,
double-click the nas probe.

2. In the nas probe window, click the Auto-Operator tab and then click the Triggers subtab.

3. Right-click in the white space and click New.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 117
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

4. In the Trigger dialog, configure the following trigger settings:


Severity Level Major (orange)
Message Visibility visible
NMS Probe Name url_response
Message string *failed*

5. To save the new profile, click OK.


The new trigger appears on the Triggers tab with a generic name.

6. Replace the generic trigger name with the following:


url_fail

7. To activate the new profile, click Apply.

8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.

Test the Trigger

You will now force a failure on a url_response profile.

9. In the Admin Console, on the uimserver robot, access the url_response probe configuration.

118 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

10. Modify the URL for the CA Technologies Home Page profile as shown in the following
screenshot so that it fails to respond.

11. Click Save.

12. In the Success dialog that appears, click OK.

13. Return to the nas probe GUI opened in Infrastructure Manager and check for the trigger to
become True after the alarm is recognized.

14. Click the Status tab and acknowledge the URL response alarm.

15. Return to the Auto-Operator tab and the Triggers subtab, and verify that the trigger status
becomes False.

16. To end the test and stop the URL response errors from occurring:
a. Access the url_response probe configuration from the Admin Console.
b. Reset the URL value for the CA Technologies Home Page profile to the following value:
http://www.ca.com

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 119
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-4 Create an AO Pre-processing Rule

Goals Create an AO pre-processing rule.

Scenario A pre-processing rule consists of a filter and a set of rules determining how the
NAS will handle alarm messages matching the filter (exclude, set invisible,
custom, and so on). This is useful if you want to filter specific alarm messages to
be treated a specific way or want specific alarm messages to be excluded and not
managed by the NAS.
In this lab, you will set an ntservice alarm to invisible.

Time 15 minutes

Instructions:

Create the Pre-processing Rule

1. In the Infrastructure Manager nas probe window, click the Auto-Operator tab and then click
the Pre-processing Rules subtab.

2. Right-click in the white space and click New.

3. Configure the pre-processing rule with the following settings:


Filter type invisible
NMS Probe Name ntservices

120 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

4. To save the rule, click OK.

5. In the Enter new filter name dialog that appears, type the following:
Make ntservices alarms invisible

6. To save the rule name, click OK.

7. To activate the new rule, click Apply.

8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.

Deploy the ntservices Probe and Create a Profile

9. In the Admin Console, deploy the ntservices probe from the Web Archive to uimserver.

10. Click on the Infrastructure tab and select the uimserver robot.

11. In the right pane, open the configuration browser tab for the ntservices probe.
If the ntservices probe is not showing in the probe list for uimserver, refresh the Probes tab.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 121
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

12. In the left pane of the ntservices configuration browser tab, expand Profiles and select the
Windows Time profile.

13. In the right pane, select Active.

14. Verify that Expected running state is set to stopped.

15. Click Save, and then click Close.

16. In the confirmation dialog, click Yes.

Enable the Windows Time Service

17. On uimserver desktop, double-click the Services shortcut.

18. Right-click the Windows Time service and select Properties.

19. Set the Startup type to Manual and click Apply.

20. Start the Windows Time service by clicking Start.

21. Close the Windows Time Properties and the Services windows.

122 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Verify the Results

22. In the Infrastructure Manager nas probe window, on the Status tab, refresh the alarms.

23. Verify that the alarm has fired and is showing as invisible (light gray font).

Note: It may take up to 5 minutes for the alarm to appear based upon the default polling
interval for the ntservices probe.

24. View the same alarm in USM.


Notice that the visible icon is set to invisible.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 123
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-5 Create a Schedule-Activated Pre-processing Rule

Goals Create a scheduled-activated pre-processing rule.

Scenario Schedules are used to administer the running properties for AO profiles and pre-
processing rules. The scheduler profiles can activate or deactivate AO profiles or
pre-processing rules for defined time periods.
In this lab, you will create a pre-processing rule to set alarms invisible for a
specified period. This is helpful when you perform scheduled maintenance.

Time 15 minutes

Instructions:
Create the Pre-processing Rule

1. In the Infrastructure Manager nas probe window, click the Auto-Operator tab and then click
the Pre-processing Rules subtab.

2. Right-click in the white space and click New.

3. To make all alarms invisible, set the Filter type to invisible and leave all other fields blank.

4. To save the rule, click OK.

124 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

5. Change the rule name to the following:


myMaintenancePPR

6. To save the rule name, click OK

7. To deactivate the rule, clear myMaintenancePPR.


Note: You can also deactivate the pre-processing rule by right-clicking the rule name and
clicking Deactivate.

8. Click Apply.

9. To restart the probe and enable the changes, click Yes.


Note: Leave the nas probe window open.

Create the Schedule Profile

10. Click the Auto-Operator tab and then click the Scheduler subtab.

11. Right-click in the white space and click New.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 125
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

12. Configure the profile as shown to activate the myMaintenancePPR pre-processing rule in three
minutes from the current time and lasting 10 minutes:

13. To save the schedule, click OK.

126 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

14. Change the profile name to the following:


MySchedule

15. Right-click MySchedule and click Activate.

16. Click Apply.

17. To restart the probe and enable the changes, click Yes.
Note: Leave the nas probe window open.

Observe and Test the Rules

18. Click the Pre-processing Rules subtab.

19. Wait until the Start time specified in step 12 occurs and verify that the myMaintenancePPR rule
activates.

20. Click the Status tab.

21. Acknowledge all existing alarms.


To do so easily, you can first select all alarms and then right-click the selected alarms and click
Acknowledge.

22. Refresh the alarm list several times and verify that any new alarms are set to invisible (light gray
font).

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 127
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

Lab 8-6 Create a Correlating Profile, Trigger, and Script


Combination

Goals Create a correlating profile, trigger, and script combination.

Scenario When a single web site is unresponsive, the problem may not be network
related. As additional web sites become unresponsive, the more likely it is that a
network issue is the cause. You need to establish a correlating profile, trigger,
and script combination that recognizes when multiple web sites are
unresponsive and generates the appropriate alarm.

Time 20 minutes

Instructions:

Create a Trigger

You will first create a trigger for alarms generated by the url_response probe.

1. In the nas probe window, click the Auto-Operator tab and then click the Triggers subtab.

2. Right-click in the white space and click New.

3. Configure the trigger to become True if there are any alarms originating from the url_response
probe, as shown in the following screenshot:

4. To save the trigger, click OK.

128 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

5. Change the trigger name to the following:


url_response_trigger

6. Click Apply.

7. To restart the probe and enable the changes, click Yes.

Note: Leave the nas probe window open.

Create the Script

8. Copy the script contained in file C:\CourseFiles\UIM_Admin\alarm_correlation_script.txt.

9. In the nas probe window, click the Auto-Operator tab and then click the Scripts subtab.

10. Right-click in the white space and click New  Script.

11. To paste the previously copied script into the upper pane white space, click the white space and
then press Ctrl-V.
The script stores a count of alarms for the trigger and prints the count to the nas log file (tested
with log level 2). It then checks the count and will issue an alert based on the count value. The
last line sends a clear alarm and closes the message if the trigger count drops to zero. It could
also check of the trigger state instead of the trigger count.

12. To save the script, click Save .

13. In the Save Script As dialog, type the following:


alarm_correlation_script

14. To save the script name, click OK.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 129
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

15. To exit the Script editor, click X.

16. If prompted to save the script again, click Yes.

Create the AO Profile

17. In the nas probe window, click the Auto-Operator tab and then click the Profiles subtab.

18. Right-click in the white space and click New.

19. Configure the profile using the following values to respond to any alarm with the string
Correlation Test in the message and choose to execute the script in response:
Action type script
Script alarm_correlation_script
Action mode On trigger
Triggers
Use boolean 'AND' Selected
Activate when state changes Selected
Activate on change in trigger alarmlist Selected
Selected triggers url_response_trigger

130 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

20. To save the profile, click OK.

21. In the Enter new profile name dialog, type the following:
Internet Health

22. To save the profile name, click OK.

23. Click Apply.

24. To restart the probe and enable the changes, click Yes.

Note: Leave the nas probe window open

Test the Configuration

You will now force failures on multiple url_response profiles and monitor the resulting alarms.

25. Access the url_response probe configuration from the Admin Console.

26. In the left pane, select Bing.

27. In the right pane, change the URL setting to the following:
http://www.bingbadurl.com

28. Click Save.


This will force the profile to fail and the url_response probe to create an alarm.

29. In the Success dialog that appears, click OK.

30. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 131
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

31. Verify that one alarm indicates that the URL response for 'Bing' failed and a second minor alarm
generated by the alarm_correlation_script indicates that one web site is down.
Note: In this and the following screenshots, alarms that are unrelated to this lab have been
acknowledged so that only the relevant alarms appear. You will see additional alarms in your
Status window.

32. Using steps 26 thru 28 as a guide, force the Google profile on the url_response probe to fail.

33. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.

34. Verify that one alarm is present for 'Bing', a second alarm is present for 'Google', and a third
major alarm generated by the alarm_correlation_script indicates that two web sites are down.

132 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration

35. Using steps 26 thru 28 as a guide, force the Yahoo profile on the url_response probe to fail.

36. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.

37. Verify that one alarm is present for 'Bing', a second alarm is present for 'Google', a third alarm
is present for 'Yahoo', and a fourth critical alarm generated by the alarm_correlation_script
indicates that the internet (three web sites) is down.

38. Correct the bad URL settings on the url_response probe profiles one at a time and view the
result on the Status tab of the nas probe GUI.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 133
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Lab 9-1 Create a QoS Calculation Profile

Goals Create a QoS calculation profile.

Scenario Users can define their own calculation profiles. These calculation profiles can be
selected when defining the calculation properties for SLOs and QoS constraints.
In this lab, you will create a QoS calculation profile for 95th percentile.

Time 15 minutes

Instructions:

Access the UMP

1. On the UIMServer desktop, double-click the UMP shortcut.

2. Sign in to the UMP server using the following credentials:


Username administrator
Password uim123

Add a New Page to the UMP

3. On the title bar, click Add  Page.

4. In the text field, enter the following for the page name and click the green checkmark button:
SLM

134 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Define the Page Format and Contents

5. Click the newly created SLM page.

6. To add the SLM portlet:


a. On the title bar, click Add  Portlet.

b. Expand Monitoring and to the right of SLM, click Add.

c. To display the SLM portlet, refresh the web browser.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 135
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

d. After refreshing , you see the following screen:

Create a New QoS Calculation Profile

7. In the Navigator pane, expand Calculation Profiles and select QoS Calculations.
Note: You might need to scroll down the window because the Calculation Profiles item is
located at the bottom of the navigator.

8. Mouse over the QoS Calculations folder.

9. When the down icon appears, click it and then click New.

10. Configure the calculation profile using the following settings:


Name 95th Percentile
Description Calculate based on the 95th percentile
Plug-in Description Calculate availability from the N'th percentile of all
samples.

136 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

11. To configure the Percentile variable, mouse over the name and when the down icon appears,
click it.

12. In the context menu that appears, click Edit Parameter.


Note: From this point on, lab steps will assume the student understands how to access the
context menu for an item.

13. Drag the pointer along the number bar until the tool tip displays 95.

14. To save the setting, click Ok.

15. Using steps 11 through 14 as a guide, set Breach value to 0.

16. To save the calculation profile, at the top of the page, click Save .

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 137
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Lab 9-2 Create an SLA and SLOs

Goals Create an SLA and SLOs.

Scenario The process of creating SLAs consists of the following tasks:


 Create a new SLA and define the:
o Compliance requirement
o Compliance period
o Calculation method
o Excluded periods
o (Optional) SLA account to attach to
 Create SLOs and define the:
o Calculation method
o Excluded periods
 Define QoS constraints with:
o QoS object and source
o Expected QoS value
o Operating period
o Calculation method
In this lab, you will use this process to create an SLA for Critical Services,
including Website Performance and Availability, and Database Metrics.

Time 25 minutes

Instructions:
Create a New SLA Definition

1. Above the Navigator pane, click New  Service Level Agreement.

138 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

2. Configure the SLA using the following settings:


Name Critical Services SLA
Description SLA for Critical Web and DB Performance and Availability
Calculation Methods Average
Compliance Period 1 Day
Percentage 98

Note: To set the compliance period, click the button to the right of the Compliance Period
field.

3. To save the new SLA, at the top right, click Save .

Add SLO for Website Performance

4. On the Objectives (SLO) tab, click New.

5. In the Service Level Objective [New SLA/New SLO] dialog:


a. In the Name field, type the following:
Website Performance

b. Click Save .

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 139
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Add QoS Constraints to the SLO

6. In the Navigator pane, expand Quality of Service (this selection may be at the bottom of the
navigation pane) and then expand QOS_APPLICATION.

7. To refresh its contents, in the QOS_URL_RESPONSE context menu, click Refresh.

8. Refresh the contents of uimserver.

140 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

9. Drag the Cubs QoS object to the SLO.


Important: You must SINGLE-click the object and leave the left mouse button pressed for
approximately two seconds before dragging so that the application recognizes this as a drag
activity.

10. Configure the constraint using the following settings:


Expect Quality of Service to be Less than or equal to 1000 ms
Calculation Method Default

11. To save the QoS constraint, click Ok.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 141
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

12. Repeat steps 9 through 11 to add the Brewers and Packers sites.

13. When finished, click Save .


Your SLO should look like the following:

14. To close the Service Level Objective window, in the upper-right corner, click .

Add SLO and Constraints for Website Availability

15. To create a new SLO, click New.

16. In the Name field, type the following and click Save :
Website Availability

142 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

17. In the Navigator pane, expand QOS_NETWORK, refresh QOS_NET_CONNECT, and then refresh
uimserver.

18. Drag the www.brewers.com:ping QoS object to the SLO.

19. Configure the new constraint using the following settings:

20. To save the new constraint, click Ok.

21. Repeat step 18 through 20 to add a constraint for www.cubs.com:http and


www.packers.com:http.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 143
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

22. Click Save .


Your SLO should look like the following:

23. Close the Service Level Objective window.

Add an SLO for Database Metrics

24. To create a new SLO, click New.

25. In the Name field, type the following and click Save :
Critical Database

26. In the Navigator pane, expand QOS_SQLSERVER, refresh QOS_SQLSERVER_CHECK_DBALIVE,


and then refresh uimserver.

27. Drag the CA_UIM object to the SLO.

144 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

28. For the QOS_SQLSERVER_CHECK_DBALIVE object, under Expect Quality of Service to be, select
Not equal to and set the Value field to 0.

29. To save the new constraint, click Ok.

30. In the Navigator pane, expand QOS_SQLSERVER, refresh QOS_SQLSERVER_DATABASE_SIZE,


and then refresh uimserver.

31. Drag the CA_UIM\CA_UIM object to the SLO.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 145
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

32. For the QOS_SQLSERVER_DATABASE_SIZE object, under Expect Quality of Service to be, select
Less than or equal to 300 MB.

33. To save the new constraint, click Ok.

34. Click Save .


Your SLO should look like the following:

35. Close the SLO.

36. Close the SLA.

37. Sign Out of UMP

146 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Lab 9-3 Manually Clone an SLA

Goals Manually clone an SLA.

Scenario You can clone instances of an SLA to use as a template for other SLAs. In this lab,
you will clone a day-based SLA and configure it to be a week-based SLA.

Time 5 minutes

Instructions:

Create a One-Week Version of the SLA

1. Sign in to UMP and navigate to the SLM page.

2. In the Navigator pane, expand Service Level Agreement.

3. On the Critical Services SLA context menu, click New Clone.

4. In the new Critical Services SLA (Copy 1) context menu, click View.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 147
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

5. Configure the cloned SLA using the following settings:


Name Critical Services SLA - Week
Compliance Period 1 Week(s)

6. To save the new SLA, click Save .

7. Sign Out of UMP.

148 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

Lab 9-4 Manually Recalculate an SLA

Goals Manually recalculate an SLA.

Scenario A compliance calculation is automatically performed on schedules as specified in


the sla_engine. However, you can use the Calculations tab to recalculate
compliance for specific jobs.

Time 5 minutes

Instructions:
Recalculate Your SLA

1. Sign in to UMP and navigate to the SLM page.

2. In the Navigator pane, expand Service Level Agreement.

3. In the Critical Services SLA context menu, click Recalculate.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 149
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks

4. In the Job Properties dialog:


a. Select the first two periods.
b. Select Create historic data.
c. Click Ok.

5. In the SLA navigation pane, note the updated compliance percentage value reflected for the
Critical Services SLA.

6. Sign Out of UMP.

150 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-1 Create a PRD Report with Filters

Goals Create a PRD report with filters.

Scenario On the Filters tab, you can create filters to narrow the data to be charted. After
you have entered your filter options, you can check the results using the Check
Filters button to make sure the results are not too broad and then drag the drag
to chart bars to a chart. Charts are updated dynamically at regular intervals to
reflect changes in the search results.
Using filters enables a single report to be used by multiple tenants without
modification.

Time 5 minutes

Instructions:
Configure the Report

1. Sign in to UMP.

2. Navigate to Design  Performance Reports Designer.

3. Click the Filters tab.

4. Configure the filter using the following settings and click Apply:

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 151
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

5. Drag Drag to chart to your report.

6. To assign a value, double-click the title and type the following:


URL Report

7. To save the title, press Enter.

Save the Report

8. At the lower right of the page, click Save view .

152 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

9. In the Save dialog:


a. In the name field, type the following:
MyURLs Performance Report
b. To the right of the name field, click public.

c. Click Save.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 153
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-2 Customize a PRD Report Through Direct Calls

Goals Customize a PRD report through direct calls.

Scenario You can use URLs with parameters to define reports from a browser without
being logged in to UMP. You can do this if you want to share reports with people
who do not have UMP accounts or to link to reports from a third-party
application.
You can view reports as defined, and you can change parameters such as the
source, QoS, target, or time period by specifying a source in the URL. For
example, if you have a report named CPU that displays a series of CPU
measurements, you can view the same measurements for a different computer
system by specifying a different source in the URL.
You can define one or more data series for each chart, and you can have multiple
charts in a row and multiple rows.

Time 5 minutes

Instructions:
Call a PRD Report Referencing a Target

1. On the UIMServer, open a web browser and enter the following URL:
http://umpserver:8084/qoschart/jsp/standalone.jsp?user=administrator&password=uim123
&name=USM%20Dynamic%20Report%20Templates/Server%20Performance&source=uimser
ver

Note: This url can be copied from C:\CourseFiles\UIM_Admin\url.txt.

The following report appears:

2. Close the web browser.

154 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-3 Create a Simple List

Goals Create a simple list.

Scenario The List Designer enables administrators to design lists to be displayed in the List
Viewer. The List Viewer displays information in a table format. The information
can be in the form of text, numbers, gauges, alarms, or line graphs.
In this lab, you will create a list detailing website performance.

Time 15 minutes

Instructions:
Create the Report

1. In UMP, click Design  List Designer.

2. Click the New View icon.


This presents you with the "anchor column", where the main list filter is defined, along with
other report attributes.

3. Configure the anchor column using the following settings:


Column Header Websites
Row Source Targets
Filter QoS contains url_response

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 155
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

4. To view the column configuration result, click Apply.


The following screenshot shows the result of your configuration:

Note: In a later lab, we will merge the incorrectly named CB Technologies Home Page with the
correctly named CA Technologies Home Page. Once that is done, only one entry for the web
page data will appear in reports.

5. To save the view, click the Save view icon.

6. In the Save dialog:


a. In the name field, type the following:
MyURLs List Report
b. To the right of the name field, click public.

c. Click Save.

156 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Configure the First Data Column

7. Click Add Column.

8. To sort the QoS metrics in ascending sequence, click the QoS column header so that it is sorted
in descending sequence and appear as follows:

9. Select the QOS_URL_RESPONSE metric.

10. Configure the metric using the following settings:


Display as Numeric
Column Header Avg Performance - last hr
Aggregation Avg
Time Period 1 Hour

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 157
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

11. To view the configuration result, click Apply.


The page populates as in the following screenshot:

12. To save the view, click the Save view icon.

Configure the Second Data Column.

13. Click Add Column.

14. Select the QOS_URL_RESPONSE metric.

15. Configure the metric using the following settings:


Display as Spark
Column Header 1 Day Avg
Graphic Style Column
Time Period 1 Days

158 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

16. To view the configuration result, click Apply.


The page populates as in the following screenshot:

17. To save the view, click the Save view icon.


You can configure additional columns if you want to.

View the Report

18. Click Reports  List Reports.

19. In the upper right of the portlet, click the Open view icon.

20. In the Open dialog, click MyURLs List Report and click Open.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 159
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

The following report appears:

160 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-4 Modify the URL Response Time Unified Dashboard

Goals Modify the URL Response Time Unified Dashboard.

Scenario The UMP comes with predefined views called Unified Dashboards.
Unified Dashboards are useful not only for viewing valuable data about your
environment; they can also be used as a starting point for building new lists.
In this lab, you will modify a Unified Dashboard and view it on the Unified
Dashboards > Datacenter page.
Important: Any changes to Unified Dashboards will be overwritten at the next
restart of the wasp probe. It is recommended to save any modifications to
Unified Dashboard lists as a different file name, outside of the Unified
Dashboards folder.

Time 10 minutes

Instructions:

Open the URL Response Time Unified Dashboard

1. Click Design  List Designer.

2. Click the Open view icon.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 161
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

3. In the Open dialog:


a. Expand Unified Dashboards and Datacenter.
b. Click URL Response Time.

c. Click Open.

Modify the Unified Dashboard

4. Click Add Column.

5. Select the QOS_URL_RESPONSE metric.

6. Configure the metric using the following settings and thresholds:


Display as Time Slice
Column Header Avg Response 24 hr
Time Period 24 Hours
Slice Period 1 Hours
Slice Aggregation Average
Thresholds See screenshot

162 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

7. To view the configuration result, click Apply.


The page populates as in the following screenshot:
Note: If the new Avg Response 24 hr does not populate with data after clicking the Apply
button, check to see if the QOS_URL_RESPONSE metric became unselected as you configured
the new column. If it did, select the metric again and click the Apply button to populate the
column with data.

8. To overwrite the current view, click the Save view icon.


Note: This view will be overwritten at the next WASP restart.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 163
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Save a Custom Version of the URL Response Time List Report


We will now save a separate version of the modified list report which will be available for inclusion
in dashboards and remain unchanged across wasp probe restarts.

9. To save the view with a different name, click the Save view as icon.

10. In the Save dialog:


a. In the name field, type the following:
Unified Dashboards/URL Response
b. In the list to the right of the name field, select public.

c. Click Save.

164 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

View the Modified Dashboard

11. Click Unified Dashboards  Application and Server  Datacenter.

Notice the changes to the dashboard with the added column.

12. Sign out of UMP.

Observe Loss of Customization on a Restart of the wasp Probe

13. Open the Admin Console.

14. In the left pane, select the umpserver robot.

15. In the right pane, click the down triangle to the left of wasp and click Deactivate.

16. In the confirmation dialog, click Yes.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 165
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

17. When the wasp probe status indicates it is Deactivated, click the down triangle to the left of
wasp and click Activate.

18. Proceed to the next step when the Port column is populated with a value which indicates the
wasp probe activation is complete.

19. Close the Admin Console.

20. Sign back in to UMP.

21. Click Unified Dashboards  Application and Server  Datacenter.


Notice that the URL Response Time report is restored to its out of the box format that does not
include the Avg Response 24 hr column we added previously.

22. Sign out of UMP.

166 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-5 Add a Specific Drill-down Report to a List

Goals Add a specified drill-down report to a list.

Scenario A drill-down report or template specifies the item to display when you click the
name of a group or host in the List Viewer to drill down for more information.
A list is displayed when you click the name of a group. The drill-down report can
be any list, but it typically contains data for the individual systems that make up
the group. This field name changes to Drilldown Template if the list has more
than one group. The specified list is used as a template, displaying data for the
members of whichever group is drilled down from.
A PRD chart is displayed when you click the name of a host or source. If no PRD
chart is designated, the stand-alone USM is launched instead.
In this lab, you will associate a PRD chart with a list.

Time 15 minutes

Instructions:

Create the Report

1. Sign in to UMP and navigate to Design  List Designer.


The ListDesigner portlet opens ready to design a new view.
Note: If an existing view is open in the ListDesigner portlet, click the New view icon.

2. Configure the filter as Robot starts with.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 167
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

3. Click Apply.
The following screenshot shows the result

4. To modify the default drill-down report template:


a. To the right of the Drilldown Report field, click the Browse icon.

b. In the dialog:
i. Expand USM Dynamic Report Templates.
ii. Click Server Performance.

iii. Click Open.


c. Click Apply.

168 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

5. To add a column that displays CPU usage as Spark:


a. Click Add Column.
b. Configure the column as follows:

c. Click Apply.

6. To add a column that displays memory percentage usage as Spark:


a. Click Add Column.
b. Configure the column as follows:

c. Click Apply.

7. Click the Save view icon.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 169
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

8. In the Save View dialog:


a. In the name field, type the following:
MyDrillList
b. In the list to the right of the name field, select public.

c. Click Save.

View the Report

9. Click Reports  List Reports.

10. Click the Open view icon and open the MyDrillList report.

11. To launch a new tab or page with the report, click a row anchor.

170 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

The Server Performance report opens for the clicked host:

12. Close the Server Performance report.

13. Sign out of UMP.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 171
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

Lab 10-6 Create a Basic Custom Dashboard

Goals Create a basic custom dashboard.

Scenario Dashboard Designer enables you to monitor computer systems on your network
for QoS data and alarms using various template widgets, such as alarm objects,
meter objects, charts, and tables.
 Alarm objects can be filtered to reflect the state of the items you want to
see.
 Meter objects can be connected to data sources such as QoS or the result
of a SQL query.
 Panels can be used to build dashboards with several levels in a tree
structure.
 Table objects can be used if you want to present the output from a query
to the NIS as a table in a dashboard.
One way to use a custom dashboard without incurring too much maintenance
overhead is to use a background with pertinent information representing a
network and place alarm filter widgets over the images that represent network
devices.

Time 20 minutes

Instructions:

Open a New Dashboard

1. Sign in to UMP and navigate to Design  Dashboard Designer.

172 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

2. In the Dashboard panel, click New.

Add a Background

3. In the right pane, click the Canvas Properties icon.

4. Expand Size if necessary and set the values as follows:


Note: These values match the size of the background that will be imported in the following
steps.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 173
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

5. Expand Background and in the Background Image field, click Choose Image.

6. In the image selection dialog that opens, click Upload Image.

7. In the Choose File to Upload dialog, navigate to c:\CourseFiles\UIM_Admin, select Sample-


network-diagram.png and click Open.

174 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

8. In the image selection dialog, select the uploaded Sample-network-diagram.png and click
Select.

9. The dashboard background image will appear as follows:

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 175
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

10. Click Dashboard  Save.

11. In the Save Dashboard As dialog:


a. In the Path field, type the following:
MyCustomDashboard.

b. Click Save.
A success message will appear.

Add a Circle Widget

12. Click the Widgets icon.

176 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

13. Drag the Circle widget to the dashboard.


When the Circle widget is dropped on the dashboard, its color changes to green.

14. To select it, click the Circle widget.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 177
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

15. Click the Widget Properties icon.

16. Expand Label and in the Label field, type the following:
CPU, Disk, and Memory

17. Set the Font Size to 10.

178 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

18. Expand Data Source and in the Type field, select Alarm.

19. To add a new data source, click the + icon.

20. In the Name field, type CPU, Disk, and Memory.

21. To add an alarm filter, click the + icon.

22. Configure the alarm filter as follows:

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 179
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

23. To validate the alarm filter, click Test.


The Alarm filter results is populated with current alarms that satisfy the filter.

24. Click Create.

25. Click Dashboard  Save.

Publish the Dashboard

26. Click Dashboard  Publish.

180 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

27. In the Visibility drop down, select Public.

28. Click Publish.


A success message appears.

View the Published Dashboard

29. Add a page to the UMP with the following name:


Dashboards

Note: Refer back to Lab 9-1 for the steps to add a page if needed.

30. Switch to the new Dashboards page.

31. Add the Dashboard portlet.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 181
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities

32. In the Open Dashboard dialog, select MyCustomDashboard and click Open.

The dashboard opens.


The CPU, Disk, and Memory widget color identifies the highest severity alarm that is returned
by the associated alarm filter.

33. Sign out of UMP.

182 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-1 Create a New Account and ACL

Goals Implement LDAP integration.

Scenario There are three different types of users in CA UIM:


 CA UIM users
 LDAP users
 Account contacts
You can set permissions for these user types based on the ACL, but the
functionality and procedure is different for each type.
For CA UIM users, you create a user and assign an ACL that defines the
permissions.
For LDAP users, the users must first be included in a specific LDAP group that you
define in your LDAP system. You can then assign an ACL to the LDAP group.
For account contacts, you define permissions by assigning an ACL to each
contact.
In this activity, you will review the current Active directory environment and then
create a new Account and ACL in order to implement LDAP integration.
Note: By default, some permissions in an ACL will not be applicable for account
contacts.

Time 20 minutes

Instructions:

Review the Active Directory Environment

1. In the virtual lab environment interface, switch to the ADServer VM.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 183
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

2. On the adserver VM, to view the Active Directory users and groups, click
Start  Administrative Tools  Active Directory Users and Computers.

3. In the Active Directory Users and Computers window, locate the UMP ClientA Contacts group
and the clienta.user user. We will specify this group name when we define a new UMP ACL
later in this lab. User clienta.user is a member of this group. We will log in with this user to test
the new ACL.

4. Close the Active Directory and Computers window.

Configure LDAP Settings

5. In the virtual lab environment interface, switch to the UIMServer VM.

184 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

6. Sign in to Infrastructure Manager using the following credentials:


Username administrator
Password uim123

7. In the left pane, select the uimserver robot.

8. In the right pane double-click the hub probe.

9. On the General tab, in the lower right corner, click Settings.

10. Click the LDAP tab.

11. Select Direct LDAP and LDAP Authentication.

12. Enter values as indicated in the following fields:


Server Name adserver
Server Type Active Directory

13. Clear the SSL selection.

14. Click Lookup.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 185
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

15. Enter values as indicated in the following fields:


User administrator
Password caeducation

16. Click Test.

17. To close the success message, click OK.

18. To close the Hub Advanced Settings window, click OK.

19. To close the hub probe GUI and save the LDAP configuration settings, click OK.

20. To restart the probe and enable the changes, click Yes.

21. Close Infrastructure Manager.

Create a New Account and Contact

22. Sign in to UMP using the following credentials:


Username administrator
Password uim123

186 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

23. Navigate to Configuration  Accounts.

24. Click Create an account.

25. In the New Account dialog, use the following settings:


Account Name ClientA
Ownership (origin) ClientA

26. To create the new account, click CREATE.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 187
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Create a New ACL

27. Click the ACLs & LDAP tab.

28. On the Operator row, click the Copy ACL icon.

29. In the ACL Name field, type the following and click the LDAP tab:
ClientAOperator

30. On the LDAP tab, click in the LDAP Group field.

188 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

31. In the now active LDAP Group field, enter the following:
UMP ClientA Contacts

Note: An error message will appear when you start typing but will disappear once the full
Active Directory group name has been entered. This is the Active Directory group whose
existence we previously confirmed using the Active Directory Users and Computers utility.

32. In the Account Link field, select ClientA.

33. To create the new ACL, click CREATE.

34. Sign out of UMP.

Sign In to UMP as a Contact

You will now sign in to the UMP with clienta.user whose existence we previously confirmed using
the Active Directory Users and Computers utility. Signing is and examining the access the user has
will confirm that the Account and ACL we created are both working correctly. When a UMP account
contact first signs in, a corresponding Liferay user is automatically created. We will see this Liferay
user during lab 11-2.

35. Sign in to UMP using the following LDAP user credentials:


Username clienta.user
Password ldap123

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 189
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

36. In USM, click Inventory.

37. Verify the LDAP user is limited to seeing devices from the ClientA origin.

38. Sign out of UMP.

190 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-2 Create a Site

Goals Create a Site.

Scenario Liferay sites serve as ways to assign pages to multiple users and groups of users.
In this lab, you will create a site, add a user, and import pages.

Time 15 minutes

Instructions:

Create a Site

1. Sign in to UMP using the following credentials:


Username administrator
Password uim123

2. Click Go To  Control Panel.

3. On the Control Panel, in the left pane Portal section, click Sites.

4. In the right pane Sites panel, click Add  Blank Site.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 191
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

5. In the New Site panel, in the Name field, type the following:
ClientA

6. In the Membership Type list, select Private.

7. Click Save.

8. Click Back.

Assign Users to the Site

9. On the Sites panel, click the Actions button for ClientA and then click Manage Memberships.

192 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

10. On the Site Memberships panel, click Add Members  User.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 193
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

11. Select clienta.user.


Note: This is the Liferay user that was automatically created when we signed in to UMP with
clienta.user earlier.

12. Click Save.

13. To return to the Site Memberships main panel, click Back.

14. To return to the Sites main panel, click Back.

Assign a Portal View to the Site

15. In the right pane Sites panel, click the Actions button for ClientA and then click Manage Pages.

194 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

16. Click Private Pages.

17. Click Import.

18. In the Import dialog, click Browse.

19. In the Choose File to Upload dialog, navigate to C:\CourseFiles\UIM_Admin, select


NewView.lar, and click Open.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 195
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

20. Click Import.

21. To refresh the ClientA panel, click the web browser refresh button.
Note: Be sure to refresh the browser that is open on the UIMServer VM and not the local
browser hosting the UIMServer VM session.

196 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

22. In the right pane hierarchy, under Private Pages, click NewView.

23. Update the Name (Required) field with the following:


ClientA

24. To save the updated imported page to the site, click Save.

Test the Changes

25. Sign out of UMP and sign back in using the following credentials:
Username clienta.user
Password ldap123

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 197
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

26. Click Go to  ClientA.

27. The newly imported set of pages called ClientA appears.

28. Sign out of UMP.

198 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-3 Change the UMP Default Logo

Goals Change the UMP default logo.

Scenario There are several ways in which CA UIM can be customized and skinned to suit
different deployments. The simplest of these methods involves changing the
default UMP logo.

Time 5 minutes

Instructions:
Change the Logo

1. Sign in to UMP using the following credentials:


Username administrator
Password uim123

2. Click Go To  Control Panel.

3. On the Control Panel, in the left pane Portal section, click Portal Settings.

4. In the right pane Portal Settings panel, click Display Settings.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 199
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

5. Click the Change link.

6. In the window that opens, click Browse.

7. In the Choose File to Upload dialog, browse to C:\CourseFiles\UIM_Admin, click the


voonair-logo.png file, and then click Open.

8. To save the file selection, click Save.

9. To save the updated settings, click Save.

200 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

View the Changes

10. To view the change, click Go to  My Private Pages.


The following screenshot shows the result:

Note: You can revert to the default logo by returning to Display Settings and clicking Delete.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 201
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-4 Set an SLA Report as the Portlet Default

Goals Set an SLA report as the portlet default.

Scenario When setting up portal views for users, you will likely want to specify the reports
or views that the end user can access. Many UMP portlets act differently if they
have a report specified in the portlet preferences, accessed by clicking the
wrench icon on the portlet title bar.
In this lab, you will assign a default report for the SLAReport portlet.

Time 5 minutes

Instructions:
Access the SLA Report

1. In the UMP, click Add  Page.

2. Give the page the following name:


SLA Reports

3. Select the newly created page.

4. Add the SLAReports portlet to the page.

202 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Configure the Default Report Properties for the Portlet

Selecting a specific report in the portlet preferences dialog results in that report automatically
opening when the portlet opens.

5. After refreshing the page, in the SLAReports portlet that appears, click the Options icon and
then click Preferences.

6. In the SLA Name list, select Critical Services SLA.

7. Click Save.

8. When complete, click Return to Full Page.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 203
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-5 Create a PRD Report Page

Goals Create a PRD report page.

Scenario When setting up portal views for users, you will likely want to specify the reports
or views that the end user can access. Many UMP portlets act differently if they
have a report specified in the portlet preferences, accessed by clicking the
wrench icon on the portlet title bar.
In this lab, you set the report for the PerformanceReportsDesigner portlet.

Time 10 minutes

Instructions:
Create the New Page

1. Add a new page to UMP.

2. Give the page the following name:


My PRD Page

3. Select the newly created page.

4. Click Manage  Page Layout.

5. Select the 2 Columns (50/50) layout.

6. Click Save.

7. Close the Manage Page dialog.

8. Add a PerformanceReportsDesigner portlet to each column.

Note: You need to drag the portlet to the right hand column.

204 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Configure the Default Report Properties for the Portlet

9. To display a custom report, set the preferences for the left column.

10. In the Report list, select MyURLs Performance Report.

11. Click Save.

12. Click Return to Full Page.

13. If the report is not populated with data, click the Rebuild from template icon located in the
bottom right corner of the left column portlet.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 205
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

14. Repeat steps 9 thru 13 to assign the VM Guest CDM Report to the right column portlet.

206 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-6 Create a Dashboard Page

Goals Create a dashboard page.

Scenario Now that you have specified reports for individual portlets, you are ready to put
these portlets together onto a dashboard page that is similar to the following:

Time 15 minutes

Instructions:

Prepare the Page

1. Add a new page to UMP.

2. Give the page the following name:


MyCustomPage

3. Select the newly created page.

4. Set the layout to 1-2 Columns (30/70).

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 207
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Add Portlets

5. Drag the SLAReports portlet to the lower-left area of the page and from there, while keeping
the mouse button depressed, drag it up toward the page title. When the blue column separator
line for the lower-left column appears, drop the portlet onto the page.
Note: If you are unable to get the blue column separator line to appear on your initial attempt,
you will have to drop the portlet in one of the other two column areas, delete it, and add it
again.

6. Drag the PerformanceReportsDesigner portlet to the lower-right section of the page.

208 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

7. Drag the ListViewer portlet to the upper section of the page.

8. Refresh the browser.

Configure the Default Report for the Portlet

9. In the List Viewer portlet, click the Options icon (wrench) and then click Preferences.

10. In the List list, select MyURLs List Report.

11. Click Save.

12. When complete, to go back to the main page, click Return to Full Page.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 209
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Configure the Default SLA Portlet

13. In the SLA Reports portlet, click the Options icon (wrench) and then click Preferences.

14. In the SLA Name list, select Critical Services SLA.

15. Click Save.

16. When complete, to go back to the main page, click Return to Full Page.

Configure the Default PRD Portlet

17. Click the Options icon (wrench) and then click Preferences.

18. In the Report list, select MyURLs Performance Report, and in the Period, select Last Hour.

210 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

19. Click Save.

20. When complete, to go back to the main page, click Return to Full Page.

Note: You might need to click Rebuilt from template on the portlet to see the chart render
for the first time.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 211
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

Lab 11-7 Define a Geo View

Goals Define a Geo View.

Time 10 minutes

Instructions:
1. In the UMP, click the Home tab.

2. In the UnifiedServiceManager portlet, click the Add geo view icon.

3. In the New map name field, type the following and click OK:
Mexico

4. Expand Geo View and on the Mexico entry, click the Edit geo view icon.

5. In the right pane, click the Upload new geo view image icon.

6. Browse to C:\CourseFiles\UIM_Admin, click the mexico-map.gif file, and click Open.

212 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

7. In the right pane, drag the Add drilldown view icon and drop it on top of Mexico City.

8. In the New map name field, type the following and click OK:
Mexico City

9. Click the Save icon.

10. In the left pane, expand Mexico and on the Mexico City entry, click the Edit geo view icon.

11. In the left pane, expand Groups\Operating Systems\Windows.

Note: If this populates the right pane with the contents of the Windows USM group, re-select
the Mexico City entry.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 213
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views

12. Drag uimserver and drop it in the right pane.

13. Drag umpserver and drop it in the right pane.

14. Click the Save icon.


In the left pane, notice the Mexico status color changes to match the highest severity status of
the objects that it contains.

214 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

Lab 12-1 Configure the Syslog Checking Probe

Goals Configure the syslog checking probe.

Scenario The sysloggtw probe acts as a gateway from the syslog "world" into CA UIM.
Most network devices, such as routers, switches, and bridges, report events
using SNMP and the well-known syslog format. The sysloggtw is also capable of
receiving UIM alarm messages from the NAS AO. These messages will be
converted to a syslog message and passed to remote syslog daemons.
In this lab, you will configure the sysloggtw probe to send messages to a syslog
queue, configure logmon to read a log file, and install and run a syslog generator
to generate log messages.

Time 30 minutes

Instructions:

Deploy and Configure sysloggtw

1. Sign in to Admin Console using the following credentials:


Username administrator
Password uim123

2. Deploy the sysloggtw package from the web archive to the uimserver robot.

3. In the confirmation message, click Yes.

4. Click the Infrastructure tab, and then select the uimserver robot.

5. Click the down icon to the left of the sysloggtw probe and click Configure.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 215
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

6. In the sysloggtw configuration window, clear Generate Alarm.

7. Click Save.

8. To close the Success dialog and the probe configuration window, click Close.

9. To acknowledge the confirmation dialog, click Yes.

Configure an Attach Queue

10. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.

11. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.

12. In the left pane, select Queue List.

13. In the right pane, under Queue List Entry, in the Subject To Add field, type the following:
SYSLOG-IN

14. Click Actions  Add Subject to List.

15. To close the Success message, click Reload.

16. In the right pane, under Queue List Configuration, click New.
216 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

17. Configure the queue entry fields as follows:


Queue Name SYSLOG-QUEUE
Type attach
Subject SYSLOG-IN

18. To save the new queue, click Save.

19. To close the Success message and the hub configuration window, click Close.

20. To acknowledge the confirmation dialog, click Yes.

Deploy and Configure logmon with Profiles

21. Deploy the logmon package from the web archive to the uimserver robot.

22. In the confirmation message, click Yes.


CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 217
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

23. Click the Infrastructure tab, and then select the uimserver robot.

24. In the left pane, click the down icon to the left of logmon and click Configure.

25. In the logmon configuration window, click the Options icon for uimserver and then click Add
Queue Profile.

26. Configure the profile using the following settings:


Profile Name MySyslogCheck
Mode queue
Queue SYSLOG-QUEUE
Check Interval 1
Units Minutes
Generate Quality of Service selected
Generate Alarm selected

218 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

27. To save the new profile, click Submit.

28. To create a new watcher rule:


a. Under MySyslogCheck, click the Options icon for the Watcher Rules item and then click Add
New Watcher.

b. Configure the profile using the following settings:


Watcher Name MySyslogWatcher
Active selected
c. Click Submit.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 219
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

29. To create a variable to hold the syslog message:


a. In the right pane, under Variables, click New.

220 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

b. Configure the variable using the following settings:


Name MSG
Source From Position Column
From Character Position 1
Source To Position To End of Line

c. Click Save.
d. To close the Success message, click OK.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 221
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

30. To configure the Watcher Monitor:


a. In the left pane, expand MySyslogCheck\Watcher Rules\MySyslogWatcher and select
Watcher Monitors.
b. Configure the Watcher Monitor using the following settings:
Publish Alarms Selected
Match Expression /.*danger.*/
Message to Send on Match Syslog Message received: ${MSG}
Message Severity major

c. Click Save.
d. To close the Success message, click OK.

31. In the left pane, select the new MySyslogCheck profile.

32. In the right pane, under Profile Status, select Active.

33. Click Save.

34. To close the Success message and the logmon configuration window, click Close.

35. To acknowledge the confirmation dialog, click Yes.

222 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

Test the Mechanism and Validate Alarms

36. On the desktop, double-click the Kiwi SyslogGen shortcut.

37. To send test syslog messages:


a. In the Kiwi Syslog Message Generator dialog, use the following settings:
Target IP address 192.168.1.20
Message text to send This is a test danger message generated by Kiwi SyslogGen

b. Click Send several times. The Kiwi UI status bar will indicate how many messages have been
sent.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 223
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

38. Open Infrastructure Manager.

39. In the left pane, select the uimserver robot.

40. To validate the attach queue:


a. In the right pane, double-click the hub probe.
b. Click the Status tab.
c. View your queue and verify that messages are queuing up.

Note: The messages queue up and are then removed. If the queue is empty when you view
the Status tab, keeping the hub probe GUI open, send additional messages using the Kiwi
Syslog Message Generator. Immediately return to the Status tab in the hub probe GUI, click
Refresh, and observe the messages being queued.

41. To validate the alarm:


a. Open the nas probe and click the Status tab.
b. Verify that syslog alarms appear in the list.

42. Close the Kiwi Syslog Message Generator.

224 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

Lab 12-2 Merge QoS Data

Goals Merge QoS data.

Scenario Previously, we introduced a typo when we initially defined the url_response


monitoring profile for the CA Technologies home page. We later corrected this
error and now QoS data exists for the incorrect and correct profiles. We will now
merge this data so that it can be reported on collectively.

Time 15 minutes

Instructions:
1. Open UMP and log in as administrator.

2. Open the SLM page.

3. Click Tools  Database Status.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 225
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

4. Click the Quality of Service column until it is sorted in descending sequence.

5. Locate and select a table row that contains QOS_URL_RESPONSE in the Quality of Service
column.

6. Mouseover the selected row and when the down arrow appears, click it and then click
Filter by QoS.

7. In the Database Status portlet, on the Active Objects tab, select the two rows that contain CB
Technologies Home Page and CA Technologies Home Page in the Target column.

8. Mouseover one of the selected rows and when the down arrow appears, click it and then
click Merge Objects.

226 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting

9. Verify the merge direction is from QoS Target CB Technologies Home Page to QoS Target
CA Technologies Home Page.
Click the arrow to toggle its direction if it is not pointing in the correct direction.

10. Select Delete the 'source' QoS after the merge operation.

11. Click Merge.


The data is merged and CB Technologies Home Page no longer appears in the Database Status
list.

CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 227
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

Access the CA Technologies Virtual Labs

Goal Access the CA Technologies virtual labs.

Instructions:
The CA Technologies virtual lab is a fully functional learning environment with CA Technologies
software available for hands-on real-world lab exercises. Use CA Technologies virtual labs during CA
Technologies virtual learning courses or take advantage of the labs to sharpen your skills in a risk-
free, non-production environment. This web-based, fully functional learning environment with CA
Technologies software is available in one-business week (Monday-Friday) increments, where
applicable. If your course has a compatible virtual lab, we invite you to expand on your knowledge
learned in this dynamic learning environment.

Sign On to the CA Technologies Virtual Labs Web Page

1. In Internet Explorer, open the region appropriate CA Technologies virtual labs URL:
America https://caeducationlabs-na.ca.com
Europe https://caeducationlabs-eu.ca.com
Australia https://caeducationlabs-au.ca.com
India https://caeducationlabs-in.ca.com
Other locations https://caeducationlabs-na.ca.com

228 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

2. Before you log on, we advise a browser test. On the CA Technologies Virtual Labs page, above
the Log On button, click Is Your Browser Ready?.
The Virtual Labs Browser Check page appears.

A series of system compatibility and configuration tests are listed.


 If a Warning - Security message appears, to close it, click Yes.
 If a Windows firewall blocking message appears, to close it, click Allow.
You are automatically returned to the CA Technologies Virtual Labs page.

CA Technologies CA Unified Infrastructure Management 8.3: System Administration Foundations 200 229
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

3. In the Username and Password fields, type the user name and password you received from
your instructor or from a CA Technologies Education email and click Log On.
The Student Session Details page appears, which displays your student number in the blue title
bar and lists the classes you are registered for.

Update Your Account Details

4. On the title bar, click your student number.


The Details page appears.

230 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

5. In the upper-right corner, click Edit.


The Edit User page appears.

On this page, you can edit your account information. You can also change your password by
clicking Edit to the right of the Confirm Password field. To record your changes, in the
upper-right corner, click Save.

6. To return to the main page, in the upper-left corner, click Workbench.

7. To return to the Student Session Details page, click the course link.

Connect to Your Virtual Lab Machine

The Servers table contains a row for each server assigned to the student. Each available server has
an associated remote access link in the Remote Access column. Clicking this link displays a drop-
down menu from which one of the available access methods, RDP or Full Screen RDP, can be
selected.

CA Technologies CA Unified Infrastructure Management 8.3: System Administration Foundations 200 231
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

8. To connect to your virtual machine, on the row that contains the resource name indicated by
the instructor, click the Remote Access link and then click RDP or Full Screen RDP.
The Virtual Labs connection screen appears for a few moments and then connects to the virtual
environment.

9. In the Log On to Windows dialog, complete the following fields and click OK:
User name Administrator
Password caeducation (or whatever the instructor indicates)
Log on to: RBC (or whatever the instructor indicates)

232 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs

10. You are now ready to work within the CA Technologies virtual labs environment.

Note: In some virtual environments, class files are located in c:\temp\classfiles rather than
D:\ClassFiles as noted in the courseware. Ask your instructor about file locations for your course
images and then follow the instructions in your Student Guide.

234 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED

You might also like