Professional Documents
Culture Documents
Management 8.4:
System Administration Foundations
200
Lab Guide
20NMS20200
20NMS20200LG1
© 2014 CA. ALL RIGHTS RESERVED.
- PROPRIETARY AND CONFIDENTIAL INFORMATION -
These educational materials (hereinafter referred to as the “Materials”) are for the end user’s educational
purposes only and are subject to change or withdrawal by CA, Inc. (“CA”) at any time.
These Materials may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in
part, without the prior written consent of CA. These Materials are confidential and proprietary information of CA
and protected by the copyright laws of the United States and international treaties.
EXCEPT AS OTHERWISE STATED IN THE APPLICABLE AGREEMENT, TO THE EXTENT PERMITTED BY APPLICABLE
LAW, CA PROVIDES THESE MATERIALS “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT
LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR
DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THESE MATERIALS, INCLUDING WITHOUT LIMITATION, LOST
PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF SUCH LOSS
OR DAMAGE.
The use of any software or product referenced in the Materials is governed by the end user’s applicable license
agreement.
Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to
the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-
7014(b)(3), as applicable, or their successors.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Copyright © 2016 CA. All rights reserved. CA confidential and proprietary information for CA or CA Partner
Internal Use Only. No unauthorized copying or distribution permitted.
CA Unified Infrastructure Management 8.4: System Administration Foundations 200
Table of Contents
Module 2: Create USM Groups
Lab 2-1 Create USM Groups............................................................................................................................ 1
Lab 2-2 Assign MCS Profiles to a USM Group .................................................................................................. 6
Lab 2-3 Add a USM Report Template ............................................................................................................... 13
TOC-1
Module 10: Configure Reporting Capabilities Using PRD, List Views, and Custom Dashboards
Lab 10-1 Create a PRD Report with Filters .................................................................................................. 151
Lab 10-2 Customize a PRD Report through Direct Calls ............................................................................... 154
Lab 10-3 Create a Simple List ...................................................................................................................... 155
Lab 10-4 Modify the URL Response Time Unified Dashboard .................................................................... 161
Lab 10-5 Add a Specific Drill-down Report to a List .................................................................................... 167
Lab 10-6 Create a Basic Custom Dashboard ................................................................................................ 172
Note: All names used throughout this training content are fictitious and do not refer to any real company or person,
living or dead.
TOC-2
Time 5 minutes
Instructions:
Log In to the Cloud Server
Sign In to UMP
Note: To manually open the Discovery Wizard, mouse over the left pane Inventory item and
click the Discovery wizard icon.
USM groups are automatically created for Windows and UNIX devices if they exist in the CA UIM
inventory. We will now examine the Windows group definition.
8. Mouse over the Windows group and click the Edit group icon ( ).
9. Examine the properties of the Windows USM group. The Windows group is Dynamic. This
means that as new devices are discovered that match the filter criteria, they will automatically
be added to the group. If a device attribute value changes such that it no longer matches the
filter criteria, it will be removed from the group.
11. To add a new group, mouse over Groups and click the + icon that appears.
12. In the Edit Group dialog, on the Properties tab, complete the following fields:
a. In the Group Type list, select Dynamic.
b. In the Name field, type:
WebServers
c. Under Filters:
i. Select Name.
ii. Select contains.
iii. Type:
web
d. Click Apply Filters.
This group will initially contain 0 members but when WebServer1 is discovered in a later lab,
it will be dynamically added to the group..
e. Click OK.
The new group appears in the USM hierarchy.
13. To add a new group, repeat steps 11 and 12 using the following values.
This group will initially contain 0 members but when vm01linux is discovered in a later lab, it
will be dynamically added to the group.
Type Dynamic
Name VMwareGuests
Filter Name contains vm
Time 20 minutes
Instructions:
We need to modify the cdm configuration so that the attribute value assigned to source and target
in QoS metrics is equal to the device short name. We also need to modify the polling interval used
for disk monitoring.
3. In the USM left pane, expand Operating Systems and click the Windows group.
6. Click Create.
The center pane populates with MCS profile types.
7. To add a new profile, mouse over the Setup cdm profile type and click the + icon.
8. In the right pane, select the Send Short Name for QoS Source and Allow QoS Source as Target
options:
10. In the Disk Monitoring Properties section, set the Interval Value to 15.
Note: The default value will be kept for all other Setup cdm options.
12. To add a new profile, mouse over the CPU Monitor profile type and click the + icon.
13. In the right pane, complete the CPU Monitoring Configuration as follows:
15. To add a new profile, mouse over the Memory Monitor profile type and click the + icon.
16. In the right pane, complete the Memory Monitor Configuration as follows:
18. To add a new profile, mouse over the Disk(s) profile type and click the + icon.
19. In the right pane, complete the Disk(s) Monitoring Configuration as follows:
21. In the left pane, expand the Windows group and click uimserver.
23. In the center pane, expand the CPU Monitor profile type and under it, click the CPU Monitor
profile.
24. In the right pane, scroll down and in the Profile Status confirm the Profile Origin indicates the
profile was derived automatically from the group profile ‘CPU Monitor’ and Group: Windows.
25. Using the same process, confirm all profiles were successfully deployed to uimserver and
umpserver.
Scenario You will apply a report template to the VMwareGuests group you created in the
previous lab.
Time 5 minutes
Instructions:
1. Navigate to the VMwareGuests group, mouse over the group name, and click the Edit group
icon.
4. Expand the USM Dynamic Report Templates folder and select Server Basic.
5. Click Add.
6. To set it as the default, click the Default radio button next to the Server Basic report.
7. Click OK.
We will view reports using these templates in a later lab.
Lab 3-1 Discover the Local Subnet Using the Discovery Wizard
Scenario Before you can start monitoring devices, you need to populate the database with
devices to monitor. In this lab, you will perform a discovery to add devices to the
database to monitor.
Time 15 minutes
Instructions:
Perform a Discovery Using the Discovery Wizard
1. In the USM left pane, hover the mouse over Inventory and when the Discovery wizard cog icon
appears, click it.
c. Click Next.
c. Click Next.
c. Click Next.
6. On the Scopes tab, you will create a range for discovering your devices.
a. Click New range scope.
b. Complete the following fields:
Range scope name Lab
Range scope definition Range 192.168.1.1 - 51
Credentials All selected
c. Click Next.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 17
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 3: Discover Devices and Deploy Robots
7. On the Schedule tab you will run the discovery now and complete the Discovery Wizard.
a. Ensure Run discovery now is selected.
b. Click Finish.
The Discovery Wizard window closes.
c. Observe the discovery progress in the USM right pane.
After the discovery is complete, the Inventory table in the USM right pane will include all
discovered devices. We will now identify what credentials were utilized during the discovery of
some of the devices.
8. In the Inventory table, in the adserver row, mouse over the key icon in the far right column.
The tool tip that appears indicates the discovery process was able to successfully authenticate
with adserver using the wmi credential.
9. In the Inventory table, in the vm01linux row, mouse over the key icon in the far right column.
The tool tip that appears indicates the discovery process was able to successfully authenticate
with vm01linux using the shell credential.
10. In the Inventory table, in the uimserver row, mouse over the key icon in the far right column.
The tool tip that appears indicates that discovery process was able to successfully authenticate
with uimserver using the snmp and wmi credentials.
Note: For more information about discovering devices, you can open the Discovery Wizard and
click the Discovery help (?) icon. This will open the CA Wiki page that contains documentation
for CA UIM Discovery.
Scenario To apply local monitors, known as probes, you need to install a robot—
commonly known as an "agent"—on a server. The ADE enables us to perform the
installation of the robot on the server.
Time 10 minutes
Instructions:
Locate the ADE Import XML File
5. Close Notepad++.
11. After the file is imported, your Linux system will be added to the list and selected for
deployment. Click Deploy.
12. In the Robot Deployment Status dialog, monitor the deployment status of the ADE. The
following screenshot shows a successful installation.
13. After the deployment is complete, to close the Robot Deployment Status dialog, click Close.
17. In the navigation pane, select primary and confirm that vm01linux is displayed in the right pane
list of robots.
Scenario We will deploy a robot to devices that are members of a USM group. We will
then confirm the MCS profiles that were previously assigned to the USM group
are automatically deployed to the devices after the robot has been deployed.
Time 10 minutes
Instructions:
Deploy Robots to Devices in the Windows USM Group
5. Click Deploy.
6. When the Robot Deployment Status window indicates that the robot was successfully installed
on both devices, click Close.
When MCS becomes aware that a robot has been installed on a USM group member device, it will
first deploy the probes to the robot that are required by MCS profiles assigned to the USM group
and once the probes have been successfully deployed, it will then deploy the MCS profiles. We will
now confirm this occurred for the adserver and webserver1 robots.
9. Click adserver.
11. In the center pane, expand the CPU Monitor profile type and under it, click the CPU Monitor
profile.
Note: You may have to wait as much as 10 minutes for the probe and MCS profile deployments
to complete before being able to expand the profile type.
12. In the right pane, scroll down and in the Profile Status confirm the Profile Origin indicates the
profile was derived automatically from the group profile ‘CPU Monitor’.
13. Using the same process, confirm all profiles were successfully deployed to adserver and
webserver1.
Scenario The UNIXServers USM group does not have any assigned MCS profiles so probes
will not be automatically deployed. You will use the Admin Console to manually
deploy the CDM probe and then configure basic monitoring.
Time 20 minutes
Instructions:
Deploy and Configure the CDM Probe
5. On the Local Archive tab, in the right pane, select the cdm 5.71 probe package.
Note: There are two cdm probes available, one of which has a MC suffix. The probe without the
MC suffix is used when manually deploying and configuring the cdm probe. The probe with the
MC suffix is automatically deployed by MCS when needed. This is the probe that was
automatically deployed to the adserver and webserver1 robots during the previous lab.
12. In the right pane, verify the cdm 5.71 probe is present.
Note: If the cdm probe is not present, refresh the right pane list and it should appear.
13. In the right pane, click the down triangle to the left of cdm and click Configure.
14. In the Probe Configuration window, in the left pane, select the Processor node.
15. In the right pane, in the Processor Configuration Section, set Interval (minutes) to 1.
Note: A setting of 0 for Maximum System Load is unrealistic but is being set in this lab for the
purpose of guaranteeing system load alarms will occur. These alarms will be managed in later
lab activities within this course.
21. In the left pane under Disks, under the root / disk, select the Disk Usage node as follows:
22. In the right pane, in the Monitors table, click Disk Usage (%).
23. Scroll down to display the Disk Usage (%) monitor details.
24. In the Disk Usage % section, select the Publish Data option.
27. In the left pane, under Memory, select the Total Memory node.
28. In the right pane, in the Monitors table, click Memory Usage (MB).
Scenario Now that we have deployed MCS profiles to the Windows USM group and
manually configured the cdm probe on the vm01linux, QoS data is being
collected and published. We will now view dashboards that are being populated
with this data.
Time 15 minutes
Instructions:
3. Select vm01linux.
4. In the right pane, view the dashboard for the device that reflects the published QoS (Processor
Queue Length, CPU Usage %, Disk Usage %, Memory Usage %, and Memory Usage MB).
5. Click on the down arrow next to the Reports button to view the available reports.
6. To view the Server Basic report, click Reports USM Dynamic Report Templates / Server
Basic.
Note: The report may show minimal data depending on how long data collection has been
running.
7. Close the browser tab that contains the Server Basic Report.
8. Back in the USM View, click Reports USM Dynamic Report Templates / Default Report.
10. To view the alarm for the device, click the Alarms tab.
12. To view the metric for the alarm, click the Metric tab.
13. To view all alarms in USM, click the Alarm View icon.
15. Click the Actions menu and explore the available alarm actions.
18. To view the drill-down report for a metric, double-click the metric.
19. To view the drill-down report for a device, in the Host column, click the server name.
Scenario The PRD enables you to create a visual representation of QoS data. Select the
host, QoS measurement, target, and time range, and data is displayed as a chart.
You can display multiple measurements on a single chart, and can view multiple
charts at a time. You can drag charts between rows, or drag a data series from
one chart to another. You can choose the chart format (line, area, or column
chart), and the Filters tab enables you to plot only the data that matches
specified filters on the chart. You can easily change the source (host or target) of
the data by using the Choose Source menu. You can save a set of charts as a
report to print or to view later.
In this lab, you will create a PRD chart by dragging individual metrics to create an
“on-the-fly” report.
Time 10 minutes
Instructions:
2. On the QoS Selection by Host tab, perform the following steps to designate a target.
a. Follow the instruction in the QoS column (Select a host) by selecting vm01linux in the Host
column.
b. Follow the instruction that now appears in the Target column (Select a QoS) by selecting
QOS_CPU_USAGE in the QoS column.
9. In the text field at the bottom of the Save dialog, enter the following as the report name:
VM Guest CDM Report
10. In the list to the right of the text field, select public.
Scenario The emailgtw probe needs to be configured so that CA UIM can send notification
emails on alerts. In this lab, you will perform the necessary configuration,
including setting up an email profile and modifying an email template.
Time 30 minutes
Instructions:
Access the Admin Console
3. Click the Archive tab and then click the Web Archive tab.
4. Click the Internet Archive Credentials button and verify that credentials exist.
Note: Valid credentials are required to download packages.
5. To close the Credentials entry pane, click the Internet Archive Credentials button again.
9. If the emailgtw probe is still downloading, wait until the download completes before
proceeding.
16. Click the down icon to the left of the emailgtw probe and click Configure.
Note: If the emailgtw status icon indicates that it is still being deployed, wait for the green
check status icon to appear before proceeding. If the emailgtw probe does not appear in the
list, refresh the browser page.
18. Review the options on the emailgtw (top-level) node, particularly the Email Message section.
Note: The template field defines the format in which the emails are formatted. If “HTML” is
selected in the "Message Format" field, the template is "template.html" by default. If “Text” is
selected, the template is changed to the text version (template.txt).These files (.html or .txt) are
located in the Nimsoft/Probes/gateways/emailgtw directory.
20. In the Mail Server Configuration section, in the Primary Mail Server field, type the following:
127.0.0.1
33. To the right of the Profiles node, click Options icon and then click Add Profile.
35. To save the profile and close the Add Profile dialog, click Submit, then click Reload.
36. To finish the configuration, close the emailgtw v2.81: Configuration browser tab.
This profile will be used in a subsequent lab exercise.
Time 5 minutes
Instructions:
Activate the AO
Enable AO Logging
9. To save the updated configuration and close the nas probe GUI, click OK.
Scenario Alarms can be acknowledged automatically. This occurs when a clear alarm is
received that matches an existing alarm. In this lab, you will use the alarm test
mechanism to verify this auto-acknowledgment process.
Time 5 minutes
Instructions:
Scenario In this lab, you will use the AO to send an email on an alarm. Because you cannot
send and receive emails in the lab, you will simulate this by using a program
called Papercut that will permit you to view the sent email.
Time 10 minutes
Instructions:
1. In the nas probe GUI, click the Auto-Operator tab and then click the Profiles subtab.
3. In the Profile dialog, configure the profile using the following settings. Leave the default for all
other settings.
Action type EMAIL
Recipient(s) MyProfile
Action mode On overdue age 10s
Severity Level Minor (yellow)
Message Visibility ignore
Message Counter Equals to 1
4. Click OK.
The Enter new profile name dialog appears.
6. Click OK.
7. In the profiles list, verify that the Email on First Alarm profile is selected.
12. Right-click the minor alarm for vm01linux Processor Queue Length and click Acknowledge.
13. Wait for the alarm to fire and the email to be sent.
“New Message Received” will appear momentarily in the system tray.
14. In Papercut, in the left pane, click the email represented by its date and time.
15. In the right pane, click the HTML View tab and view the email. Note the origin field on the right
hand side of the message header.
Scenario In this lab, you will define an ad hoc maintenance schedule for the vm01linux
robot.
Time 10 minutes
Instructions:
2. On the Home page, in the left pane, expand the VMware Guests group and click the vm01linux
robot.
3. In the right pane, on the Details tab, click the Start maintenance icon.
5. Click Save.
11. Wait approximately 10 minutes (5 minute delay + 5 minute duration) and confirm the alarm
was suppressed during the ad hoc maintenance period.
Scenario Previously we added MCS profiles to the Windows USM group. Scenario: we
have now received a request from the database support team to monitor the
availability and health of MS SQL Server on database servers. We will create a
new DBServers USM group and assign a MCS SQL Server monitoring profile to the
group to accomplish this requirement.
Time 20 minutes
Instructions:
3. Click the down icon to the left of the controller probe and click Configure.
4. In the right plane, in the General Configuration section, enter the following in the Identification
property User Tag 1 field:
sqlserver
5. Click Save.
You need to first refresh the Admin Console connection with the service_host component.
8. To refresh the Admin Console connection, click the browser refresh button.
The Admin Console sign on dialog will appear.
11. In the right pane, to view all robot properties, click Show more.
The expanded properties view includes the User Tag 1: sqlserver entry.
12. To promulgate the user tag value to other components, restart the webserver1 robot.
We will now switch to the UMP. Do not close the Admin Console as we will be using it later in this
lab.
14. To add a new group, mouse over Groups and click the + icon that appears.
15. In the Edit Group dialog, on the Properties tab, complete the following fields:
a. In the Group Type list, select Dynamic.
b. In the Name field, type:
SQLServers
c. Under Filters:
i. Select User Tag 1.
ii. Select is.
iii. Type:
sqlserver
20. In the right pane in the Device Type list, select webserver1.
Note: If the right pane is blank, mouse over Device Type in the center pane, click the + icon, and
then complete this step.
22. To locate the SQL Server profile type in the center pane, click the scroll bar.
Notice that the SQL Server profile type exists but is not available for selection. This is due to the
fact that the sqlserver probe does not exist in the local probe archive. We need to download
the probe from the web archive.
30. Scroll down and confirm the sqlserver package exists in the Local Archive.
32. In the center pane, scroll down to locate the SQL Server profile type.
33. To add a new profile, mouse over the SQL Server profile type and click the + icon.
Note: You may have to refresh the UMP for the SQL Server profile type to be available
34. In the right pane, complete the SQL Server Monitoring Configuration as follows:
36. In the left pane, expand the SQLServers group and click webserver1.
38. In the center pane, expand the SQL Server profile type and under it, click the SQL Server profile.
Note: You may have to wait as much as 10 minutes for the probe and MCS profile deployments
to complete before being able to expand the profile type.
39. In the right pane, scroll down and in the Profile Status confirm the profile was derived
automatically from Group: SQLServers.
Scenario The Net Connect probe monitors network connectivity through ICMP and Telnet
to specific ports. In this lab, you will set up a profile to ping local servers.
Time 15 minutes
Instructions:
6. Click Deploy.
8. On the Infrastructure tab, expand uim and primary and select uimserver.
9. In the right pane, click the down triangle to the left of net_connect and click Configure.
10. Observe the layout of the page and the default service definitions.
11. Click the Option icon to the right of the net_connect node, and then click Add New Host.
12. In the Add New Host window, complete the fields as follows:
Hostname uimserver
IP Address 192.168.1.20
14. In the left pane of the net connect configuration browser tab, select the uimserver node.
16. Select the Packet Loss node and select Publish Data for all monitors.
18. In the left pane, expand uimserver and under Profile, click Services.
19. Click the NimBUS_HUB, NimBUS_Robot, NimBUS_Spooler, and mssql-server services to the
move them to the Selected column as shown in the following screenshot:
Note: Clicking an arrow moves all services to the column the arrow points to.
Scenario The URL Response probe monitors various metrics regarding accessing URLs. In
this lab, you will configure the probe to monitor the CA Technologies home page.
Time 15 minutes
Instructions:
Deploy and Configure the url_response Probe from the Admin Console
3. Click the Archive tab and then click the Web Archive tab.
4. Deploy the url_response probe from the archive to the uimserver robot.
6. Click the Infrastructure tab, and then select the uimserver robot.
7. In the right pane, click the down icon to the left of the url_response probe and click Configure.
Note: If the url_response probe in not present, click the right pane refresh icon.
8. To the right of url_response, click the Options icon and then click New Profile.
14. Expand the Ca Technologies Home Page node and select the Metric folder.
15. In the right pane, select Publish Data for the following metrics:
Note: Publish Data is selected by default for several of these metrics.
Page Load Time
Time to First Byte
TCP Connect Time
DNS Resolution Time
Download Time
17. To close the Success dialog and the Probe Configuration window, click Close.
Scenario In this lab, you will use a Configuration Only package to make a simple update to
the controller probe.
Time 15 minutes
Instructions:
4. To create a robot_update package, drag the controller probe from the uimserver robot to your
probe archive.
8. Click OK.
9. With the primary archive selected, in the right pane, double-click the robot_update_2 package.
10. In the Package: robot_update_2 window, and on the Files tab, locate the robot.cfx file.
12. Remove all text except for the following section and keys you want to set:
<controller> overwrite
first_probe_port = 48000
</controller>
16. To observe the current controller probe configuration on the vm01linux robot:
a. On the vm01linux robot, double-click the controller probe.
b. Click the Advanced tab.
Observe the current configuration.
17. To deploy the new package, drag the robot_update_2 package from the archive to the
vm01linux robot.
The distribution will fail.
18. Click Close Dialog to close the View Distribution Process dialog.
Note: This value does not currently exist in the OS list. It must be typed to create a new
entry.
d. Right-click the win32 section name and click Rename current section.
e. In the Section name dialog, type the following and click OK:
Linux
Scenario In this lab, you will use a package to update the processes probe and create
watchers for CA UIM processes. Because this package only updates the
configuration, you need to deploy the probe package first.
Time 10 minutes
Instructions:
Deploy the Processes Probe
4. In the upper right pane, right-click the processes probe and click Download.
6. Drag the processes probe from the right pane to the uimserver robot.
9. To create a profile example in a new custom package, drag the processes probe from the
uimserver robot to the primary package archive in the left pane.
10. Rename the package to processes_update and verify that Configuration Only is selected.
11. Double-click the processes_update package in the archive, right-click the processes.cfx file, and
click Edit file.
12. To make the text edit pane active, left-click the white space.
14. Add watcher profiles to reflect the two processes you need to track. Set up one profile for
hub.exe and another profile for nas.exe, using the following text:
<watchers> overwrite
<hub.exe> overwrite
active = yes
description = Tracking the Hub
process = hub.exe
qos_process_cpu = yes
qos_process_memory = yes
</hub.exe>
<nas.exe> overwrite
active = yes
description = Tracking the NAS
process = nas.exe
qos_process_cpu = yes
qos_process_memory = yes
</nas.exe>
</watchers>
18. When distribution is completed, close the View Distribution Progress dialog.
Scenario In this lab, you will use a SuperPackage to make updates to several probes at
once. First, you will need to deploy appropriate probes and then you will drag
the package to the robot. This package has the secondary benefit of configuring
probes for use in later labs.
Time 10 minutes
Instructions:
2. Locate the SuperPackage_1.1.zip file and drag it to the archive in Infrastructure Manager.
5. Examine the archive and locate each of the six dependent probes. You will discover the status
of the sql_response probe is Not in archive.
Important: Dependent probes that are not in the archive must be downloaded prior to
deploying the super package. You will do this in a later step.
Before deploying the SuperPackage, we will examine the current url_response probe configuration
to identify what monitoring profiles exist. Afterwards, we will re-examine the configuration to
verify it was updated by the SuperPackage deployment.
11. In the url_response configuration window, on the Profiles tab, expand Group: default.
14. Drag the SuperPackage from your archive to the uimserver robot.
15. When distribution is completed, close the View Distribution Progress dialog.
17. In the right pane, scroll down and verify the sql_response is included in the list. This confirms
this probe was deployed to the uimserver robot during the deployment of the superpackage.
19. In the url_response configuration window, on the Profiles tab, expand Group: default.
Note: QoS metrics will now exist in the database for the CB Technologies Home Page profile
with the typo that was deleted and the new, correct CA Technologies Home Page profile. In a
later lab, we will merge this data so that it is reported on collectively.
Scenario In this lab, you will deploy a secondary hub probe to a Windows host. There are
three ways hubs can communicate with each other: broadcast, static hubs, and
tunnels. While hubs can communicate through broadcast, you will be initially be
demonstrating the use of static hubs. In a subsequent lab, you will disable the
static hub and set up hub-to-hub communication through an SSL tunnel.
You will also identify and satisfy the requirement to deploy additional probe
packages to the secondary hub to support Admin Console probe configuration of
probes that fall under the secondary hub in the Infrastructure hierarchy.
Time 15 minutes
Instructions:
Install a Windows Secondary Hub on uimhub2
7. Click the arrow beside the Save button and then click Save as.
8. In the Save As dialog left pane, select Desktop and then click Save.
10. On the desktop, right click the Nimbus Infrastructure.exe shortcut and click Run as
administrator.
16. At the Setup Type, select Custom install and click Next.
17. At the Select Components page, retain the default selection of Hub and Probe Runtime
libraries, select Hub, and click Next.
19. Replace the default hub name of uimhub2 with the following:
secondary
32. Expand the Infrastructure hierarchy and observe the presence of the primary and secondary
hubs and the robots that appear under each.
33. In the Admin Console, in the Infrastructure tab left pane under the secondary hub, select the
uimhub2 robot.
34. In the right pane, click the down triangle to the left of hub and click Configure.
An error message appears indicating that Admin Console is unable to read the configuration.
To correct this error, additional probe packages need to be deployed to the secondary hub.
38. Deploy the java_jre and ppm packages from the Local Archive to the uimhub2 robot.
39. Click the Distribution Activity tab and monitor the installation of these packages.
40. Proceed to the next step when the package installation is complete.
43. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.
Scenario Multi-tenancy is central to CA UIM and is based on the origin of a particular QoS
metric or alarm message. The origin is set by default at the hub level, but can be
overridden at the robot level by manually setting the origin of the robot in the
controller probe configuration. In this lab, you will change the origin of the new
hub to something more meaningful than the robot name.
Time 5 minutes
Instructions:
1. In the Admin Console, in the left pane, select the uimhub2 robot.
2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.
5. Click Save.
6. To close the Success dialog and the hub configuration window, click Close.
For instructional purposes so that all components of the CA UIM learning environment become
aware of the origin update, we need to restart the primary hub.
8. In the Admin Console left pane, mouse over uimserver and click the Options icon.
9. Click Restart.
Time 20 minutes
Instructions:
1. In the Admin Console, in the Infrastructure tab left pane, select the uimhub2 robot.
2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser tab opens.
7. To close the Success dialog and the hub configuration window, click Close.
100 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration
9. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.
10. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.
12. In the right pane, under Queue List Configuration, click New.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 101
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration
15. To close the Success dialog and the hub configuration window, click Close.
102 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration
Scenario In this lab, you will disable the static hub and create a hub-to-hub tunnel. In a
typical situation, a proxy hub would be established and act as the tunnel server.
Since this is not possible in our classroom lab environment, we will configure our
secondary hub as the tunnel server and the primary hub as our tunnel client.
Time 20 minutes
Instructions:
Configure the Tunnel Server on uimhub2
1. In the Admin Console, in the Infrastructure tab left pane, select the uimhub2 robot.
2. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.
5. Click Save.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 103
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration
11. In the right pane, in the Certificate Authority Initialization section, in the Password field, type
the following:
uim123
104 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration
14. In the right pane under Server Settings, in the Security Setting field, select
LOW - cipher: LOW:!ADH.
15. In the right pane, in the Client Certificate Configuration section, enter the following values:
Common Name *
Password uim123
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 105
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration
18. In the right pane, in the Client Certificate List section, right-click the Certificate field and click
Select all.
20. In the right pane Server Settings section, to start the tunnel server, click Actions
Start Tunnel.
106 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration
23. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.
24. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration browser window opens.
26. In the right pane, select Tunnel Active and click Save.
29. In the right pane, in the Client Certificate Configuration section, click New.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 107
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Adv anced Hub and Robot Configuration
31. To paste the previously copied certificate, right-click the Certificate field and click Paste.
33. To acknowledge the Success message and close the hub configuration window, click Close.
35. In the Infrastructure Manager thick client, select the uimserver robot and open the hub probe.
36. Click the Status tab and then click the Tunnel Status subtab.
108 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 7: Advanced Hub and Robot Configuration
37. View the connection status icon and look for idle traffic being passed as in the following
screenshot:
Note: If the tunnel status list is empty, restart the uimserver robot and close and reopen
Infrastructure Manager.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 109
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario In this lab, you will create an AO profile to create a new alarm. In this case, you
are escalating an alarm that has come in more than a certain number of times
over a particular period. This is useful, given alarm suppression, so that truly
critical situations can be called out.
Time 10 minutes
Instructions:
1. In the Infrastructure Manager thick client, select the uimserver robot, and then double-click the
nas probe.
2. Click the Auto-Operator tab and then click the Profiles subtab.
110 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
6. In the Profile Name field, type the following and click OK:
SustainedSystemLoad
8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.
The status indicator changes to a green triangle.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 111
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Acknowledge the Existing Alarm and Wait for the New Alarm to Be Created
10. Right-click the Processor Queue Length alarm for vm01linux and click Acknowledge.
11. Wait a few minutes and click Refresh on the Status tab to verify that the new alarm
appears.
112 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario This exercise will use out-of-the-box functionality to add the operating system
type of a device to the Custom 4 field in an alarm. Alarm enrichment enables us
to get more granular with alarm messages. For example, if a switch has multiple
tenants, you can use alarm enrichment to update the origin field of the message
to correspond to the tenant or customer to whom those switch ports are
assigned.
Time 15 minutes
Instructions:
Note: The alarm_enrichment probe is configured from within the nas probe.
1. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.
2. In the right pane, click the down triangle to the left of nas and click Raw Configure.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 113
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
3. In the Raw Configure dialog, in the left pane, expand enrichment-rules and select
1.
Notice the default settings in the right pane, in particular the match_alarm_regexp value which
dictates that only alarms originating from the cdm, controller, or hub probes will be enriched.
114 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
9. In the right pane, click the down triangle to the left of alarm_enrichment and click View Log.
10. Check the Log Viewer to verify that the probe restarted and did not generate a database
connection error.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 115
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
14. In Alarm View, click Actions Select All and then click Actions Acknowledge.
15. When a fresh instance of a processor queue length alarm appears, click MORE.
Notice that Custom 4 shows the operating system.
116 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario Triggers enable administrators to sort alarm messages based on properties set
for the trigger. This means that alarms matching the criteria defined for the
trigger will not be handled by an AO. You can define triggers using matching
criteria (such as message text, severity, and host name) and time restrictions
(defining the periods when the filter should be active).
A trigger is a component mechanism for alarm correlation that can be used in
Lua scripts. For example, say you have three critical websites. If one of the
websites is down, you know you have two backups. If two websites are down,
you are still in decent shape. However, if all three websites are down (all triggers
are true), you want to generate an alarm that sends a 911 SMS message to the
appropriate parties.
Time 10 minutes
Instructions:
1. In Infrastructure Manager, to open the probe configuration GUI, on the uimserver robot,
double-click the nas probe.
2. In the nas probe window, click the Auto-Operator tab and then click the Triggers subtab.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 117
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.
9. In the Admin Console, on the uimserver robot, access the url_response probe configuration.
118 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
10. Modify the URL for the CA Technologies Home Page profile as shown in the following
screenshot so that it fails to respond.
13. Return to the nas probe GUI opened in Infrastructure Manager and check for the trigger to
become True after the alarm is recognized.
14. Click the Status tab and acknowledge the URL response alarm.
15. Return to the Auto-Operator tab and the Triggers subtab, and verify that the trigger status
becomes False.
16. To end the test and stop the URL response errors from occurring:
a. Access the url_response probe configuration from the Admin Console.
b. Reset the URL value for the CA Technologies Home Page profile to the following value:
http://www.ca.com
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 119
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario A pre-processing rule consists of a filter and a set of rules determining how the
NAS will handle alarm messages matching the filter (exclude, set invisible,
custom, and so on). This is useful if you want to filter specific alarm messages to
be treated a specific way or want specific alarm messages to be excluded and not
managed by the NAS.
In this lab, you will set an ntservice alarm to invisible.
Time 15 minutes
Instructions:
1. In the Infrastructure Manager nas probe window, click the Auto-Operator tab and then click
the Pre-processing Rules subtab.
120 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
5. In the Enter new filter name dialog that appears, type the following:
Make ntservices alarms invisible
8. To restart the alarm server (nas) so that it reloads the configuration, click Yes.
9. In the Admin Console, deploy the ntservices probe from the Web Archive to uimserver.
10. Click on the Infrastructure tab and select the uimserver robot.
11. In the right pane, open the configuration browser tab for the ntservices probe.
If the ntservices probe is not showing in the probe list for uimserver, refresh the Probes tab.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 121
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
12. In the left pane of the ntservices configuration browser tab, expand Profiles and select the
Windows Time profile.
21. Close the Windows Time Properties and the Services windows.
122 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
22. In the Infrastructure Manager nas probe window, on the Status tab, refresh the alarms.
23. Verify that the alarm has fired and is showing as invisible (light gray font).
Note: It may take up to 5 minutes for the alarm to appear based upon the default polling
interval for the ntservices probe.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 123
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario Schedules are used to administer the running properties for AO profiles and pre-
processing rules. The scheduler profiles can activate or deactivate AO profiles or
pre-processing rules for defined time periods.
In this lab, you will create a pre-processing rule to set alarms invisible for a
specified period. This is helpful when you perform scheduled maintenance.
Time 15 minutes
Instructions:
Create the Pre-processing Rule
1. In the Infrastructure Manager nas probe window, click the Auto-Operator tab and then click
the Pre-processing Rules subtab.
3. To make all alarms invisible, set the Filter type to invisible and leave all other fields blank.
124 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
8. Click Apply.
10. Click the Auto-Operator tab and then click the Scheduler subtab.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 125
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
12. Configure the profile as shown to activate the myMaintenancePPR pre-processing rule in three
minutes from the current time and lasting 10 minutes:
126 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
17. To restart the probe and enable the changes, click Yes.
Note: Leave the nas probe window open.
19. Wait until the Start time specified in step 12 occurs and verify that the myMaintenancePPR rule
activates.
22. Refresh the alarm list several times and verify that any new alarms are set to invisible (light gray
font).
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 127
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
Scenario When a single web site is unresponsive, the problem may not be network
related. As additional web sites become unresponsive, the more likely it is that a
network issue is the cause. You need to establish a correlating profile, trigger,
and script combination that recognizes when multiple web sites are
unresponsive and generates the appropriate alarm.
Time 20 minutes
Instructions:
Create a Trigger
You will first create a trigger for alarms generated by the url_response probe.
1. In the nas probe window, click the Auto-Operator tab and then click the Triggers subtab.
3. Configure the trigger to become True if there are any alarms originating from the url_response
probe, as shown in the following screenshot:
128 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
6. Click Apply.
9. In the nas probe window, click the Auto-Operator tab and then click the Scripts subtab.
11. To paste the previously copied script into the upper pane white space, click the white space and
then press Ctrl-V.
The script stores a count of alarms for the trigger and prints the count to the nas log file (tested
with log level 2). It then checks the count and will issue an alert based on the count value. The
last line sends a clear alarm and closes the message if the trigger count drops to zero. It could
also check of the trigger state instead of the trigger count.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 129
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
17. In the nas probe window, click the Auto-Operator tab and then click the Profiles subtab.
19. Configure the profile using the following values to respond to any alarm with the string
Correlation Test in the message and choose to execute the script in response:
Action type script
Script alarm_correlation_script
Action mode On trigger
Triggers
Use boolean 'AND' Selected
Activate when state changes Selected
Activate on change in trigger alarmlist Selected
Selected triggers url_response_trigger
130 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
21. In the Enter new profile name dialog, type the following:
Internet Health
24. To restart the probe and enable the changes, click Yes.
You will now force failures on multiple url_response profiles and monitor the resulting alarms.
25. Access the url_response probe configuration from the Admin Console.
27. In the right pane, change the URL setting to the following:
http://www.bingbadurl.com
30. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 131
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
31. Verify that one alarm indicates that the URL response for 'Bing' failed and a second minor alarm
generated by the alarm_correlation_script indicates that one web site is down.
Note: In this and the following screenshots, alarms that are unrelated to this lab have been
acknowledged so that only the relevant alarms appear. You will see additional alarms in your
Status window.
32. Using steps 26 thru 28 as a guide, force the Google profile on the url_response probe to fail.
33. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.
34. Verify that one alarm is present for 'Bing', a second alarm is present for 'Google', and a third
major alarm generated by the alarm_correlation_script indicates that two web sites are down.
132 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 8: Advanced Alarm Configuration
35. Using steps 26 thru 28 as a guide, force the Yahoo profile on the url_response probe to fail.
36. Return to the nas probe GUI in the Infrastructure Manager thick client and click the Status tab.
37. Verify that one alarm is present for 'Bing', a second alarm is present for 'Google', a third alarm
is present for 'Yahoo', and a fourth critical alarm generated by the alarm_correlation_script
indicates that the internet (three web sites) is down.
38. Correct the bad URL settings on the url_response probe profiles one at a time and view the
result on the Status tab of the nas probe GUI.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 133
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
Scenario Users can define their own calculation profiles. These calculation profiles can be
selected when defining the calculation properties for SLOs and QoS constraints.
In this lab, you will create a QoS calculation profile for 95th percentile.
Time 15 minutes
Instructions:
4. In the text field, enter the following for the page name and click the green checkmark button:
SLM
134 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 135
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
7. In the Navigator pane, expand Calculation Profiles and select QoS Calculations.
Note: You might need to scroll down the window because the Calculation Profiles item is
located at the bottom of the navigator.
9. When the down icon appears, click it and then click New.
136 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
11. To configure the Percentile variable, mouse over the name and when the down icon appears,
click it.
13. Drag the pointer along the number bar until the tool tip displays 95.
16. To save the calculation profile, at the top of the page, click Save .
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 137
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
Time 25 minutes
Instructions:
Create a New SLA Definition
138 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
Note: To set the compliance period, click the button to the right of the Compliance Period
field.
b. Click Save .
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 139
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
6. In the Navigator pane, expand Quality of Service (this selection may be at the bottom of the
navigation pane) and then expand QOS_APPLICATION.
140 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 141
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
12. Repeat steps 9 through 11 to add the Brewers and Packers sites.
14. To close the Service Level Objective window, in the upper-right corner, click .
16. In the Name field, type the following and click Save :
Website Availability
142 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
17. In the Navigator pane, expand QOS_NETWORK, refresh QOS_NET_CONNECT, and then refresh
uimserver.
25. In the Name field, type the following and click Save :
Critical Database
144 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
28. For the QOS_SQLSERVER_CHECK_DBALIVE object, under Expect Quality of Service to be, select
Not equal to and set the Value field to 0.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 145
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
32. For the QOS_SQLSERVER_DATABASE_SIZE object, under Expect Quality of Service to be, select
Less than or equal to 300 MB.
146 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
Scenario You can clone instances of an SLA to use as a template for other SLAs. In this lab,
you will clone a day-based SLA and configure it to be a week-based SLA.
Time 5 minutes
Instructions:
4. In the new Critical Services SLA (Copy 1) context menu, click View.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 147
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
148 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
Time 5 minutes
Instructions:
Recalculate Your SLA
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 149
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 9: Perform SLM Tasks
5. In the SLA navigation pane, note the updated compliance percentage value reflected for the
Critical Services SLA.
150 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario On the Filters tab, you can create filters to narrow the data to be charted. After
you have entered your filter options, you can check the results using the Check
Filters button to make sure the results are not too broad and then drag the drag
to chart bars to a chart. Charts are updated dynamically at regular intervals to
reflect changes in the search results.
Using filters enables a single report to be used by multiple tenants without
modification.
Time 5 minutes
Instructions:
Configure the Report
1. Sign in to UMP.
4. Configure the filter using the following settings and click Apply:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 151
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
152 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
c. Click Save.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 153
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario You can use URLs with parameters to define reports from a browser without
being logged in to UMP. You can do this if you want to share reports with people
who do not have UMP accounts or to link to reports from a third-party
application.
You can view reports as defined, and you can change parameters such as the
source, QoS, target, or time period by specifying a source in the URL. For
example, if you have a report named CPU that displays a series of CPU
measurements, you can view the same measurements for a different computer
system by specifying a different source in the URL.
You can define one or more data series for each chart, and you can have multiple
charts in a row and multiple rows.
Time 5 minutes
Instructions:
Call a PRD Report Referencing a Target
1. On the UIMServer, open a web browser and enter the following URL:
http://umpserver:8084/qoschart/jsp/standalone.jsp?user=administrator&password=uim123
&name=USM%20Dynamic%20Report%20Templates/Server%20Performance&source=uimser
ver
154 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario The List Designer enables administrators to design lists to be displayed in the List
Viewer. The List Viewer displays information in a table format. The information
can be in the form of text, numbers, gauges, alarms, or line graphs.
In this lab, you will create a list detailing website performance.
Time 15 minutes
Instructions:
Create the Report
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 155
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Note: In a later lab, we will merge the incorrectly named CB Technologies Home Page with the
correctly named CA Technologies Home Page. Once that is done, only one entry for the web
page data will appear in reports.
c. Click Save.
156 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
8. To sort the QoS metrics in ascending sequence, click the QoS column header so that it is sorted
in descending sequence and appear as follows:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 157
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
158 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
19. In the upper right of the portlet, click the Open view icon.
20. In the Open dialog, click MyURLs List Report and click Open.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 159
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
160 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario The UMP comes with predefined views called Unified Dashboards.
Unified Dashboards are useful not only for viewing valuable data about your
environment; they can also be used as a starting point for building new lists.
In this lab, you will modify a Unified Dashboard and view it on the Unified
Dashboards > Datacenter page.
Important: Any changes to Unified Dashboards will be overwritten at the next
restart of the wasp probe. It is recommended to save any modifications to
Unified Dashboard lists as a different file name, outside of the Unified
Dashboards folder.
Time 10 minutes
Instructions:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 161
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
c. Click Open.
162 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 163
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
9. To save the view with a different name, click the Save view as icon.
c. Click Save.
164 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
15. In the right pane, click the down triangle to the left of wasp and click Deactivate.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 165
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
17. When the wasp probe status indicates it is Deactivated, click the down triangle to the left of
wasp and click Activate.
18. Proceed to the next step when the Port column is populated with a value which indicates the
wasp probe activation is complete.
166 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario A drill-down report or template specifies the item to display when you click the
name of a group or host in the List Viewer to drill down for more information.
A list is displayed when you click the name of a group. The drill-down report can
be any list, but it typically contains data for the individual systems that make up
the group. This field name changes to Drilldown Template if the list has more
than one group. The specified list is used as a template, displaying data for the
members of whichever group is drilled down from.
A PRD chart is displayed when you click the name of a host or source. If no PRD
chart is designated, the stand-alone USM is launched instead.
In this lab, you will associate a PRD chart with a list.
Time 15 minutes
Instructions:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 167
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
3. Click Apply.
The following screenshot shows the result
b. In the dialog:
i. Expand USM Dynamic Report Templates.
ii. Click Server Performance.
168 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
c. Click Apply.
c. Click Apply.
c. Click Save.
10. Click the Open view icon and open the MyDrillList report.
11. To launch a new tab or page with the report, click a row anchor.
170 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 171
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Scenario Dashboard Designer enables you to monitor computer systems on your network
for QoS data and alarms using various template widgets, such as alarm objects,
meter objects, charts, and tables.
Alarm objects can be filtered to reflect the state of the items you want to
see.
Meter objects can be connected to data sources such as QoS or the result
of a SQL query.
Panels can be used to build dashboards with several levels in a tree
structure.
Table objects can be used if you want to present the output from a query
to the NIS as a table in a dashboard.
One way to use a custom dashboard without incurring too much maintenance
overhead is to use a background with pertinent information representing a
network and place alarm filter widgets over the images that represent network
devices.
Time 20 minutes
Instructions:
172 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Add a Background
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 173
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
5. Expand Background and in the Background Image field, click Choose Image.
174 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
8. In the image selection dialog, select the uploaded Sample-network-diagram.png and click
Select.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 175
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
b. Click Save.
A success message will appear.
176 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 177
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
16. Expand Label and in the Label field, type the following:
CPU, Disk, and Memory
178 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
18. Expand Data Source and in the Type field, select Alarm.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 179
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
180 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
Note: Refer back to Lab 9-1 for the steps to add a page if needed.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 181
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 10: Configure Reporting Capabilities
32. In the Open Dashboard dialog, select MyCustomDashboard and click Open.
182 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Time 20 minutes
Instructions:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 183
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
2. On the adserver VM, to view the Active Directory users and groups, click
Start Administrative Tools Active Directory Users and Computers.
3. In the Active Directory Users and Computers window, locate the UMP ClientA Contacts group
and the clienta.user user. We will specify this group name when we define a new UMP ACL
later in this lab. User clienta.user is a member of this group. We will log in with this user to test
the new ACL.
184 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 185
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
19. To close the hub probe GUI and save the LDAP configuration settings, click OK.
20. To restart the probe and enable the changes, click Yes.
186 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 187
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
29. In the ACL Name field, type the following and click the LDAP tab:
ClientAOperator
188 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
31. In the now active LDAP Group field, enter the following:
UMP ClientA Contacts
Note: An error message will appear when you start typing but will disappear once the full
Active Directory group name has been entered. This is the Active Directory group whose
existence we previously confirmed using the Active Directory Users and Computers utility.
You will now sign in to the UMP with clienta.user whose existence we previously confirmed using
the Active Directory Users and Computers utility. Signing is and examining the access the user has
will confirm that the Account and ACL we created are both working correctly. When a UMP account
contact first signs in, a corresponding Liferay user is automatically created. We will see this Liferay
user during lab 11-2.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 189
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
37. Verify the LDAP user is limited to seeing devices from the ClientA origin.
190 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Scenario Liferay sites serve as ways to assign pages to multiple users and groups of users.
In this lab, you will create a site, add a user, and import pages.
Time 15 minutes
Instructions:
Create a Site
3. On the Control Panel, in the left pane Portal section, click Sites.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 191
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
5. In the New Site panel, in the Name field, type the following:
ClientA
7. Click Save.
8. Click Back.
9. On the Sites panel, click the Actions button for ClientA and then click Manage Memberships.
192 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 193
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
15. In the right pane Sites panel, click the Actions button for ClientA and then click Manage Pages.
194 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 195
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
21. To refresh the ClientA panel, click the web browser refresh button.
Note: Be sure to refresh the browser that is open on the UIMServer VM and not the local
browser hosting the UIMServer VM session.
196 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
22. In the right pane hierarchy, under Private Pages, click NewView.
24. To save the updated imported page to the site, click Save.
25. Sign out of UMP and sign back in using the following credentials:
Username clienta.user
Password ldap123
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 197
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
198 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Scenario There are several ways in which CA UIM can be customized and skinned to suit
different deployments. The simplest of these methods involves changing the
default UMP logo.
Time 5 minutes
Instructions:
Change the Logo
3. On the Control Panel, in the left pane Portal section, click Portal Settings.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 199
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
200 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Note: You can revert to the default logo by returning to Display Settings and clicking Delete.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 201
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Scenario When setting up portal views for users, you will likely want to specify the reports
or views that the end user can access. Many UMP portlets act differently if they
have a report specified in the portlet preferences, accessed by clicking the
wrench icon on the portlet title bar.
In this lab, you will assign a default report for the SLAReport portlet.
Time 5 minutes
Instructions:
Access the SLA Report
202 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Selecting a specific report in the portlet preferences dialog results in that report automatically
opening when the portlet opens.
5. After refreshing the page, in the SLAReports portlet that appears, click the Options icon and
then click Preferences.
7. Click Save.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 203
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Scenario When setting up portal views for users, you will likely want to specify the reports
or views that the end user can access. Many UMP portlets act differently if they
have a report specified in the portlet preferences, accessed by clicking the
wrench icon on the portlet title bar.
In this lab, you set the report for the PerformanceReportsDesigner portlet.
Time 10 minutes
Instructions:
Create the New Page
6. Click Save.
Note: You need to drag the portlet to the right hand column.
204 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
9. To display a custom report, set the preferences for the left column.
13. If the report is not populated with data, click the Rebuild from template icon located in the
bottom right corner of the left column portlet.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 205
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
14. Repeat steps 9 thru 13 to assign the VM Guest CDM Report to the right column portlet.
206 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Scenario Now that you have specified reports for individual portlets, you are ready to put
these portlets together onto a dashboard page that is similar to the following:
Time 15 minutes
Instructions:
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 207
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Add Portlets
5. Drag the SLAReports portlet to the lower-left area of the page and from there, while keeping
the mouse button depressed, drag it up toward the page title. When the blue column separator
line for the lower-left column appears, drop the portlet onto the page.
Note: If you are unable to get the blue column separator line to appear on your initial attempt,
you will have to drop the portlet in one of the other two column areas, delete it, and add it
again.
208 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
9. In the List Viewer portlet, click the Options icon (wrench) and then click Preferences.
12. When complete, to go back to the main page, click Return to Full Page.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 209
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
13. In the SLA Reports portlet, click the Options icon (wrench) and then click Preferences.
16. When complete, to go back to the main page, click Return to Full Page.
17. Click the Options icon (wrench) and then click Preferences.
18. In the Report list, select MyURLs Performance Report, and in the Period, select Last Hour.
210 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
20. When complete, to go back to the main page, click Return to Full Page.
Note: You might need to click Rebuilt from template on the portlet to see the chart render
for the first time.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 211
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
Time 10 minutes
Instructions:
1. In the UMP, click the Home tab.
3. In the New map name field, type the following and click OK:
Mexico
4. Expand Geo View and on the Mexico entry, click the Edit geo view icon.
5. In the right pane, click the Upload new geo view image icon.
212 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
7. In the right pane, drag the Add drilldown view icon and drop it on top of Mexico City.
8. In the New map name field, type the following and click OK:
Mexico City
10. In the left pane, expand Mexico and on the Mexico City entry, click the Edit geo view icon.
Note: If this populates the right pane with the contents of the Windows USM group, re-select
the Mexico City entry.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 213
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 11: UMP and Portal Views
214 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
Scenario The sysloggtw probe acts as a gateway from the syslog "world" into CA UIM.
Most network devices, such as routers, switches, and bridges, report events
using SNMP and the well-known syslog format. The sysloggtw is also capable of
receiving UIM alarm messages from the NAS AO. These messages will be
converted to a syslog message and passed to remote syslog daemons.
In this lab, you will configure the sysloggtw probe to send messages to a syslog
queue, configure logmon to read a log file, and install and run a syslog generator
to generate log messages.
Time 30 minutes
Instructions:
2. Deploy the sysloggtw package from the web archive to the uimserver robot.
4. Click the Infrastructure tab, and then select the uimserver robot.
5. Click the down icon to the left of the sysloggtw probe and click Configure.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 215
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
7. Click Save.
8. To close the Success dialog and the probe configuration window, click Close.
10. In the Admin Console, in the Infrastructure tab left pane, select the uimserver robot.
11. In the right pane, click the down triangle to the left of hub and click Configure.
The hub configuration window opens.
13. In the right pane, under Queue List Entry, in the Subject To Add field, type the following:
SYSLOG-IN
16. In the right pane, under Queue List Configuration, click New.
216 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
19. To close the Success message and the hub configuration window, click Close.
21. Deploy the logmon package from the web archive to the uimserver robot.
23. Click the Infrastructure tab, and then select the uimserver robot.
24. In the left pane, click the down icon to the left of logmon and click Configure.
25. In the logmon configuration window, click the Options icon for uimserver and then click Add
Queue Profile.
218 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 219
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
220 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
c. Click Save.
d. To close the Success message, click OK.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 221
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
c. Click Save.
d. To close the Success message, click OK.
34. To close the Success message and the logmon configuration window, click Close.
222 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
b. Click Send several times. The Kiwi UI status bar will indicate how many messages have been
sent.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 223
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
Note: The messages queue up and are then removed. If the queue is empty when you view
the Status tab, keeping the hub probe GUI open, send additional messages using the Kiwi
Syslog Message Generator. Immediately return to the Status tab in the hub probe GUI, click
Refresh, and observe the messages being queued.
224 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
Time 15 minutes
Instructions:
1. Open UMP and log in as administrator.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 225
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
5. Locate and select a table row that contains QOS_URL_RESPONSE in the Quality of Service
column.
6. Mouseover the selected row and when the down arrow appears, click it and then click
Filter by QoS.
7. In the Database Status portlet, on the Active Objects tab, select the two rows that contain CB
Technologies Home Page and CA Technologies Home Page in the Target column.
8. Mouseover one of the selected rows and when the down arrow appears, click it and then
click Merge Objects.
226 CA Unified Infrastructure Management 8.4: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Module 12: Perform Advanced Probe Configurations and Troubleshooting
9. Verify the merge direction is from QoS Target CB Technologies Home Page to QoS Target
CA Technologies Home Page.
Click the arrow to toggle its direction if it is not pointing in the correct direction.
10. Select Delete the 'source' QoS after the merge operation.
CA Technologies CA Unified Infrastructure Management 8.4: System Administration Foundations 200 227
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
Instructions:
The CA Technologies virtual lab is a fully functional learning environment with CA Technologies
software available for hands-on real-world lab exercises. Use CA Technologies virtual labs during CA
Technologies virtual learning courses or take advantage of the labs to sharpen your skills in a risk-
free, non-production environment. This web-based, fully functional learning environment with CA
Technologies software is available in one-business week (Monday-Friday) increments, where
applicable. If your course has a compatible virtual lab, we invite you to expand on your knowledge
learned in this dynamic learning environment.
1. In Internet Explorer, open the region appropriate CA Technologies virtual labs URL:
America https://caeducationlabs-na.ca.com
Europe https://caeducationlabs-eu.ca.com
Australia https://caeducationlabs-au.ca.com
India https://caeducationlabs-in.ca.com
Other locations https://caeducationlabs-na.ca.com
228 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
2. Before you log on, we advise a browser test. On the CA Technologies Virtual Labs page, above
the Log On button, click Is Your Browser Ready?.
The Virtual Labs Browser Check page appears.
CA Technologies CA Unified Infrastructure Management 8.3: System Administration Foundations 200 229
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
3. In the Username and Password fields, type the user name and password you received from
your instructor or from a CA Technologies Education email and click Log On.
The Student Session Details page appears, which displays your student number in the blue title
bar and lists the classes you are registered for.
230 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
On this page, you can edit your account information. You can also change your password by
clicking Edit to the right of the Confirm Password field. To record your changes, in the
upper-right corner, click Save.
7. To return to the Student Session Details page, click the course link.
The Servers table contains a row for each server assigned to the student. Each available server has
an associated remote access link in the Remote Access column. Clicking this link displays a drop-
down menu from which one of the available access methods, RDP or Full Screen RDP, can be
selected.
CA Technologies CA Unified Infrastructure Management 8.3: System Administration Foundations 200 231
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
8. To connect to your virtual machine, on the row that contains the resource name indicated by
the instructor, click the Remote Access link and then click RDP or Full Screen RDP.
The Virtual Labs connection screen appears for a few moments and then connects to the virtual
environment.
9. In the Log On to Windows dialog, complete the following fields and click OK:
User name Administrator
Password caeducation (or whatever the instructor indicates)
Log on to: RBC (or whatever the instructor indicates)
232 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED
Appendix A: Access the CA Technologies Virtual Labs
10. You are now ready to work within the CA Technologies virtual labs environment.
Note: In some virtual environments, class files are located in c:\temp\classfiles rather than
D:\ClassFiles as noted in the courseware. Ask your instructor about file locations for your course
images and then follow the instructions in your Student Guide.
234 CA Unified Infrastructure Management 8.3: System Administration Foundations 200 CA Technologies
COMPANY CONFIDENTIAL AND PROPRIETARY INFORMATION—DUPLICATION IS PROHIBITED