SlideShare a Scribd company logo
1 of 55
Download to read offline
Pre-Con Education: Best Practices
with CA Workload Automation
AutoSys Edition (AE)
Michael Woods
DevOps: Continuous Delivery
CA Technologies
Principal Engineering Services Architect
DO4X110E
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
In this session we will cover the CA Technologies
recommended configuration and architectures
for CA Workload Automation AutoSys (AE) ,
including the scheduling engine, agents,
security and graphical user interface (GUI).
These best practices are designed to help
maximize performance and minimize
maintenance and issues.
Michael
Woods
CA Technologies
Principal Engineering
Services Architect
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHAT ARE BEST PRACTICES?
WORKLOAD AUTOMATION AE BEST PRACTICES
WORKLOAD CONTROL CENTER BEST PRACTICES
1
2
3
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What are Best Practices?
Normally reduces issues
 Not the same as taking the defaults
 Has a greater usage in client base
 Less chance for issues going forward
Not always best for you
 You may have unique requirements
 One size does not always fit all
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
VIRTUAL MACHINES
BOX JOBS
SUMMARY
START TIMES
PERFORMANCE TUNING
GLOBAL VARIABLES
Agenda
CA Workload Automation AutoSys Edition
SCHEDULER
APPLICATION SERVER
SECURITY
SYSTEM AGENTS
1
2
3
4
5
6
7
8
9
10
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Test Environment
If at all possible:
 Have a sandbox to do any engineering work like testing
– New releases
– Patches
– Different configuration settings
– Try out new procedures
 ALWAYS have a test system that can be used before applying to production
 DR should match production
 Create and execute a test plan
 Test architecture should mimic production
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scheduler
When the scheduler contacts an agent, it will cache or store the IP address in
memory for future use
– Decreases system network calls to increase performance
– Gathered again if a communication error occurs to agent
 Enabled by default
– Good for static environments
 Setting EnableIPCaching =0|1
– Located in $AUTOUSER/config.$AUTOSERV file
 When to turn it off
– IP addresses may change frequently
– Data Centers may move dynamically
– Not using VIP for clusters
Configuration Options
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Application Server
 Instance Wide Encryption:
– The encryption key used to communicate to the application server
– This key is used by all AE SDK clients, which includes command-line utilities like
sendevent, autorep,… and WCC
– If you write any SDK programs, you must specify the encryption type
– Without the encryption key, communication will fail
 For example, trying to force start a job from the development instance should not work if you
pointed it to the UAT instance
 Set to NONE when R11 agents are used
– If encryption is required, use the CSAM SSL encryption
 Set by UseEncryption setting
– We recommend using a unique key for each tier of service
 Sandbox should not be using the same key as production
– Use a different one per instance??
Configuration Options
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Global Variables
 Use application name as prefix to prevent using the same name
 Use EEM to secure
 Limit where changes are made from to reduce race conditions
– Day of week, date, on/off switch….
 Could Resources be a better fit?
– Managed by scheduler
– Also securable
– Easier to track and maintain
Naming Conventions
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Calendars
 Use application name as prefix to prevent different groups from modifying
each others calendars
 Use EEM to secure
 Create corporate standard calendars for most commonly used:
– First working day of month, last working day of month, third Tuesday…
– Use extended calendars when it makes sense, reduce work going forward
– Convert existing calendars to extended calendars, when sensible or convenient
 Use Extended Calendars when applicable:
– Define once and do not need to update again
– Generates a year in advance, keeps updating to keep a years worth of data
– Limitation: Can not be used as Holiday calendars
Naming Conventions
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Boxes
 Avoid having different start times inside box, delays the completion
of the box
 Avoid having different start dates inside the box, introduces further delay
 Reduce the depth of nesting to get better performance
 Not every job needs to be in a box
– Boxes decrease performance when overused, ties up threads until
box is complete
 Consider using group and application fields to logically group jobs
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Start Times
Try to stagger jobs as much as possible to get a smoother job
submission curve:
 Will actually submit faster than large number of starts at one time
 Use the forecast command or the API to see how many are being started
at same time
 Typically, 0, 15, 30, 45 are the most commonly used start times
 Use diverse start times in your schedule
 Try to prevent jobs running every minute when possible
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
System Agent
 Use a consistent agentparm.txt to simplify installs, maintenance and
troubleshooting efforts
 Keep enough log data for trouble shooting
 Some job types like ftp have additional information in spool file, so
automatic cleanup at success may not be advantageous
 Do not add managers that are not needed to agents, may cause additional
overhead
– Do not have duplicate manager names specified, can cause
communication errors
 Use a common communication protocol (plain recommended)
 Reduce agent sleep period for managers that do not respond
– 2 minutes default, can delay failovers
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Machine Definition
 Use opsys field
– On Windows – required for domain users
– Useful to self document
 Description field
– Again, self documenting, make it count
 Geography, Business line, …
 Use fully qualified domain names on node_name attribute
 Use different encryption keys per environment
– Recommended not to use the DEFAULT key in production
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security
Two security models available:
 External: Uses Embedded Entitlements Manager (EEM)
– Allows more granular security
– Works well with multiple operating systems
 Native: “UNIX” style security, owner, group, world
– Can be hard to enforce security when owners/end users require
multiple groups
 External is best practice
Internal or External
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security
 Keep it as simple as possible
– Think of maintenance going forward
 Use Group membership, not individual user IDs
– People move on, groups normally do not
 If not using LDAP, use Global groups in EEM to
lessen maintenance
EEM Policy
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
EEM User Store
 Use company user store and groups when possible
– Cleanup is automatic when user record deleted
– Security is owned by security group
 Dynamic User Group:
– Mapping LDAP group to naming convention
– Too many can cause performance issues (1000’s)
 Limited Use of Regular expressions in Resource Name:
– Backtracking specifically (ABC|XYZ)
– Keep to minimum
– Impacts performance
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
EEM Security Administration
 Do not use EiamAdmin – makes audit less accurate
 Create Security administrators using scoping policy
– Check AdministerObjects default policy for sample or add users to it
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Client Installations
 Only install when required
– Reduce maintenance effort
– Reduce manual intervention for audit and control
– Use the scheduler as a scheduler
– Smaller footprint
– Run from Scheduler machine?
– More secure
– Turn on autotrack to have an audit of who did what and when and
from where
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
 AE
– SCHED_SCALE
– DB_CONNECTIONS
– Use statistics aggregation to collect performance data
– Run stat reports on a regular basis to start spotting trends
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Lifecycle
 Have a strict change control process in place
– Sending emails is not a process
 Customers should not be moving untested jobs
into production
– Customer should validate jobs runs to success in Test/UAT
 Have a Dev instance for developing code, not production
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Data Retention
Keep your DB as small as possible to improve performance
 How many days event and job run data to retain?
– What are your user requirements?
– How many job runs per day?
 How many days of archived jobs?
– Best practice is 1 day. Cannot be retrieved, so why keep?
 How many days of audit information?
– Do you action alarms or use a external monitor?
– If not using alarms directly, keep only 1 day worth of data
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Data Retention Continued
DBMaint:
 Should use internal or external method?
– Config setting at 3:30 am each day
– Create jobs that run commands
 For example, should archive events run more often than archive jobs?
 How many times a day to run?
– Shops that have a large run per day or keep a high number of days of
data may want to run more than once a day
– Want to keep processed event table small as possible
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Health Monitoring
 Automate monitoring of failures:
– SNMP traps to your favorite tool
– Email
– CCS Event Management
– iDash for monitoring of SLA
 WA AE health:
– Alarms self-generated
– Monitor processes with your
corporate standard tool
Component Process Name
Scheduler event_demon
Application Server as_server
EEM igateway
CA Directory dxadmin
System Agent cybAgent
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scripts and Programs
Document exit codes:
 If not a simple 0|1, they should have meaning to speed debugging or used
to decide what job runs next
 Think about recovery:
– What needs to be rerun?
– Document runbook steps.
– Should it be broken up into multiple jobs?
 Can any checks be made to help jobs succeed?
– Job types can check process/services are running
– Check CPU/disk space
– Check any external machine dependencies
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scripts and Programs Continued
 Use fully qualified commands on job definition
 Use fully qualified commands and file names in scripts
 Use supplied variable when dealing with AE environment
– $AUTOSYS/bin/autorep –j test
– $AUTOSERV for instance name
 Use an env or set command to write out environment
variables, ensure you have what is expected
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Password Expiration
Service Accounts
 If permissible, use un-expiring passwords
 When not, use autosys_secure in batch mode to update
passwords
– autosys_secure –c fred@ca.com –o oldpass –p newpass
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
Workload Control Center
WCC
CREATE THE ENVIRONMENT
CONFIGURATION
MONITORING VIEWS
ALERTS
PERFORMANCE TUNING
SUMMARY
1
3
4
5
6
7
2
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Define the roles you need:
 Admin
 Operations
 Scheduler
 Application developer
 Line or business user
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users Continued
 Define what tabs (applications) each role should have
 What servers should they have access to?
– Development
– UAT
– Production
 What tabs per server?
– Edit for dev, but not for prod?
– Send event / monitoring in prod, but no edit
 What views should they have?
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
One security mode available:
 Security is used to determine what will be displayed
– Remove unused tabs
– Reduce questions/issues on features not used or wanted
 Use security to protect what needs protection and also to
reduce the noise
– Show what they are interested in
Using Security
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
There are 50+ job types.
 How many are required?
 Do you have Oracle E Business?
 Do you have SAP?
 Do you have PeopleSoft?
 Do you have z/OS?
 Do you allow FTP?
Configuration Options
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
 General notes for running commands for job types:
– User_name: EEM user, local user with access
– Password: Users EEM password
– Application_name: qedit or appedit
 Command must be run with a userid able to update log files
 Use the userid designated at install as the run as user
 The default is root
Batch Interfaces
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Creating a list of desired job types:
 List available job types to see what is currently available and
not available:
filter_jobtypes -u user_name -p password -t application_name -l
 Remove job types from being displayed:
filter_jobtypes -u user_name -p password -t application_name –r
all|jobtype1[,jobtype2,…,jobtypex]
 Add job types to available list:
filter_jobtypes -u user_name -p password -t application_name -a
all|jobtype1[,jobtype2,…,jobtypex]
Batch Interfaces Continued
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Creating views in batch:
 Create a list of applications required to have a view
 Create a sample view based on your requirements
 Export the view
– wcc_monitor -u user_name -p password –x export_file –view sampleView
 Edit exported view to replace job name to ‘XXXX’
 Create script to ‘sed’ template and replace ‘XXXX’ with your application
prefix using your naming convention
 Import views:
– wcc_monitor -u user_name -p password –i input_file
Batch Interfaces Continued
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates CLI
 Creates job templates to be used both in Quick Edit and
Application Editor
 Global template for all users, templates only for specific uses
 Syntax:
job_template -u,--user <user>
-p,--password <password>
<-g,--global |
-f,--for-user <user> >
< -l,--list | -r,--remove <template-name> |
-i,--import <template-name> <file-name> |
-export <template-name> <file-name> >
[-o,--overwrite]
[-?,--help]
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
1. Use autorep to prepare JIL definitions
2. Modify JIL file to prepare it for import as a template
3. Create a global template for all users
4. Create a template for ejmcommander user only
5. List the global templates available
6. List the templates available for ejmcommander user only
7. Log in to Quick Editor as ejmcommander and use the
new templates
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Use autorep output to create a JIL file:
autorep –q –j JOBNAME > filename.jil
Prepare JIL Definitions
Note 1: After JIL files are
ready, copy them to a
computer running WCC.
Note 2: It is possible to
have only 1 job
definition for 1 file to
import as template.
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Delete insert_job: JOBNAME
 In case you want to use job name as a part of template:
– rename insert_job: JOBNAME to job_name: JOBNAME
– put job_type: TYPE on a new line
 Repeat the same for both JIL files
Prepare JIL Definitions Continued
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Import global template:
job_template.bat -u ejmcommander -p ejmcommander -g -i
globalTemplate c:tempglobal_template.jil
Import as a Global Template
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Import user template:
job_template.bat -u ejmcommander -p ejmcommander –f
ejmcommander -i userTemplate c:tempuser_template.jil
Import as a User Template
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 List the global templates available:
job_template.bat -u ejmcommander -p ejmcommander –l –g
 List the user templates available:
job_template.bat -u ejmcommander -p ejmcommander –l -f
List the Templates
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
Open the Quick Editor
Create Object dialog and
check for templates:
Use the Templates
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices
 Log on again after adding add/modify a template using
job_template CLI
 Log on again after modifying filter job types filter using
filter_jobtypes CLI
 Log on again to apply new or updated EEM policies
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC
 Limit who can create views
– Duplicate or wildcard for ALL can hurt performance
 If 11.3 or higher, go to 11.4 for new features and better
performance
– Requires EEM 12.51
 If 11.3.6 AE and using EEM, use a global ECLI user and restrict
access to the Credentials tab
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC Continued
 An external DB when HA is required
– Derby does not support HA
 Use an external DB for better performance when one or more apply
– Monitoring and configuration DB:
 Over 50k defined jobs
 Over 50k job runs
 70 concurrent users
 Over 200 views
 Over 500 alerts defined
 Over 5 AE servers defined
– Reporting DB:
 Over 1 Million job runs in reporting DB
 Can be switched after install
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC Continued
 Let users have self-service in production to relieve Operations
from getting overwhelmed and potentially less error prone
– Must be auditable
– Must be secured
 EEM can audit this activity, your policy secures it
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
WCC
 Check tuning guide for specific instructions
– Java.Maxmemory is major one
– Two tomcats
– 32 bit – should not exceed 1G
– 64 bit – can be set larger, check what is available on your system
 Linux
install_dir/tomcat/conf/wrapper.conf
# Uncomment this line if the entropy of the UNIX machine is low to
speed up encryption
# The dot between /dev and /urandom is not a mistake
wrapper.java.additional.101=-Djava.security.egd=file:/dev/./urandom
50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
DB Maintenance
 Alarms and Alerts
– Turn off if not using AE Alarms
– Keep only required days of data
 Reporting data
– Keep only required amount of data
EEM Event Policy
 Disable or update policy for Authenticate With Artifact
51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO4T07S Vision and Roadmap: CA Workload Automation
Thursday at 12:15 pm (DevOps
Continuous Delivery Theatre 4)
DO4X177S
Vision and Roadmap: CA Workload Automation AE
(AutoSys)
Wednesday at 4:30 pm (Lagoon D)
DO4X180S
Case Study: CenterPoint Energy Achieves .0003 abends
with CA Workload Automation AE (AutoSys®)
Thursday at 3:45 pm (Lagoon D)
DO4X177S
Case Study: Large Fuel Company Reduces the Cost and
Complexity of Managing Mission Critical SAP and non-SAP
Jobs
Thursday at 1:00 pm (Lagoon D)
53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Maximize SLA
Management and
Extend Workloads
to SAP®
DevOps Continuous
Delivery Theatre 4
Reduce the Cost
and Complexities
of Managing
Hadoop
Workloads
DevOps Continuous
Delivery Theatre 4
54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow Conversations At…
CA Workload Automation
Mainframe Theatre
CA Workload Automation iDash
DevOps Continuous Delivery Theatre
Thursday 1:00PM
55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...ShapeBlue
 
WebLogic Scripting Tool Overview
WebLogic Scripting Tool OverviewWebLogic Scripting Tool Overview
WebLogic Scripting Tool OverviewJames Bayer
 
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링OpenStack Korea Community
 
JAVA GUI PART I
JAVA GUI PART IJAVA GUI PART I
JAVA GUI PART IOXUS 20
 
Event Driven Systems with Spring Boot, Spring Cloud Streams and Kafka
Event Driven Systems with Spring Boot, Spring Cloud Streams and KafkaEvent Driven Systems with Spring Boot, Spring Cloud Streams and Kafka
Event Driven Systems with Spring Boot, Spring Cloud Streams and KafkaVMware Tanzu
 
Spring Boot Actuator
Spring Boot ActuatorSpring Boot Actuator
Spring Boot ActuatorRowell Belen
 
오픈소스를 활용한 Batch_처리_플랫폼_공유
오픈소스를 활용한 Batch_처리_플랫폼_공유오픈소스를 활용한 Batch_처리_플랫폼_공유
오픈소스를 활용한 Batch_처리_플랫폼_공유knight1128
 
Service mesh(istio) monitoring
Service mesh(istio) monitoringService mesh(istio) monitoring
Service mesh(istio) monitoringJeong-Ho Na
 
Design principles - SOLID
Design principles - SOLIDDesign principles - SOLID
Design principles - SOLIDPranalee Rokde
 
Oracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsOracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsJames Bayer
 
Introduction to ansible
Introduction to ansibleIntroduction to ansible
Introduction to ansibleOmid Vahdaty
 
Web Applications and Deployment
Web Applications and DeploymentWeb Applications and Deployment
Web Applications and DeploymentBG Java EE Course
 
Async-await best practices in 10 minutes
Async-await best practices in 10 minutesAsync-await best practices in 10 minutes
Async-await best practices in 10 minutesPaulo Morgado
 

What's hot (20)

KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
 
Flyweight Pattern
Flyweight PatternFlyweight Pattern
Flyweight Pattern
 
WebLogic Scripting Tool Overview
WebLogic Scripting Tool OverviewWebLogic Scripting Tool Overview
WebLogic Scripting Tool Overview
 
Spring Boot
Spring BootSpring Boot
Spring Boot
 
Design Patterns (Examples in .NET)
Design Patterns (Examples in .NET)Design Patterns (Examples in .NET)
Design Patterns (Examples in .NET)
 
Tomcat server
 Tomcat server Tomcat server
Tomcat server
 
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
 
Introduction to spring boot
Introduction to spring bootIntroduction to spring boot
Introduction to spring boot
 
JAVA GUI PART I
JAVA GUI PART IJAVA GUI PART I
JAVA GUI PART I
 
Event Driven Systems with Spring Boot, Spring Cloud Streams and Kafka
Event Driven Systems with Spring Boot, Spring Cloud Streams and KafkaEvent Driven Systems with Spring Boot, Spring Cloud Streams and Kafka
Event Driven Systems with Spring Boot, Spring Cloud Streams and Kafka
 
Spring Boot Actuator
Spring Boot ActuatorSpring Boot Actuator
Spring Boot Actuator
 
오픈소스를 활용한 Batch_처리_플랫폼_공유
오픈소스를 활용한 Batch_처리_플랫폼_공유오픈소스를 활용한 Batch_처리_플랫폼_공유
오픈소스를 활용한 Batch_처리_플랫폼_공유
 
Clases abstractas e interfaces en java
Clases abstractas e interfaces en javaClases abstractas e interfaces en java
Clases abstractas e interfaces en java
 
Service mesh(istio) monitoring
Service mesh(istio) monitoringService mesh(istio) monitoring
Service mesh(istio) monitoring
 
Design principles - SOLID
Design principles - SOLIDDesign principles - SOLID
Design principles - SOLID
 
Oracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsOracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic Concepts
 
Introduction to ansible
Introduction to ansibleIntroduction to ansible
Introduction to ansible
 
Spring mvc
Spring mvcSpring mvc
Spring mvc
 
Web Applications and Deployment
Web Applications and DeploymentWeb Applications and Deployment
Web Applications and Deployment
 
Async-await best practices in 10 minutes
Async-await best practices in 10 minutesAsync-await best practices in 10 minutes
Async-await best practices in 10 minutes
 

Viewers also liked

Autosys Complete Guide
Autosys Complete GuideAutosys Complete Guide
Autosys Complete Guidekarunakar81987
 
Unicenter Autosys Job Management
Unicenter Autosys Job ManagementUnicenter Autosys Job Management
Unicenter Autosys Job ManagementVenkata Duvvuri
 
How to Configure the CA Workload Automation System Agent agentparm.txt File
How to Configure the CA Workload Automation System Agent agentparm.txt FileHow to Configure the CA Workload Automation System Agent agentparm.txt File
How to Configure the CA Workload Automation System Agent agentparm.txt FileCA Technologies
 
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...CA Technologies
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...CA Technologies
 
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...CA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
 
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...Extra Technology
 
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...CA Technologies
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...CA Technologies
 
Real World Best Practices with CA Workload Automation AE 11.3.6
Real World Best Practices with CA Workload Automation AE 11.3.6Real World Best Practices with CA Workload Automation AE 11.3.6
Real World Best Practices with CA Workload Automation AE 11.3.6CA Technologies
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksCA Technologies
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionCA Technologies
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCA Technologies
 
ThruPut Manager AE+: Automation for Production Control and Capacity Management
ThruPut Manager AE+: Automation for Production Control and Capacity ManagementThruPut Manager AE+: Automation for Production Control and Capacity Management
ThruPut Manager AE+: Automation for Production Control and Capacity ManagementCA Technologies
 
Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS Amazon Web Services
 
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...CA Technologies
 
Oracle architecture ppt
Oracle architecture pptOracle architecture ppt
Oracle architecture pptDeepak Shetty
 

Viewers also liked (20)

Autosys Complete Guide
Autosys Complete GuideAutosys Complete Guide
Autosys Complete Guide
 
Unicenter Autosys Job Management
Unicenter Autosys Job ManagementUnicenter Autosys Job Management
Unicenter Autosys Job Management
 
How to Configure the CA Workload Automation System Agent agentparm.txt File
How to Configure the CA Workload Automation System Agent agentparm.txt FileHow to Configure the CA Workload Automation System Agent agentparm.txt File
How to Configure the CA Workload Automation System Agent agentparm.txt File
 
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
 
Autosys
AutosysAutosys
Autosys
 
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
 
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
 
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
 
Real World Best Practices with CA Workload Automation AE 11.3.6
Real World Best Practices with CA Workload Automation AE 11.3.6Real World Best Practices with CA Workload Automation AE 11.3.6
Real World Best Practices with CA Workload Automation AE 11.3.6
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP EditionPre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
 
Critical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDashCritical Path Forecasting with CA Workload Automation iDash
Critical Path Forecasting with CA Workload Automation iDash
 
ThruPut Manager AE+: Automation for Production Control and Capacity Management
ThruPut Manager AE+: Automation for Production Control and Capacity ManagementThruPut Manager AE+: Automation for Production Control and Capacity Management
ThruPut Manager AE+: Automation for Production Control and Capacity Management
 
Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS Pre-launch Checklist for Going Production on AWS
Pre-launch Checklist for Going Production on AWS
 
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
 
Oracle architecture ppt
Oracle architecture pptOracle architecture ppt
Oracle architecture ppt
 

Similar to Best Practices with CA Workload Automation AutoSys (AE)

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...CA Technologies
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019Ieva Navickaite
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsImperva
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceCA Technologies
 
Migrating from Oracle to Postgres
Migrating from Oracle to PostgresMigrating from Oracle to Postgres
Migrating from Oracle to PostgresEDB
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
 
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...Reduce Software Release Cycles by 4-5x with Application Release Automation fo...
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
Accelerate Application Migration - August 5, 2020
Accelerate Application Migration - August 5, 2020Accelerate Application Migration - August 5, 2020
Accelerate Application Migration - August 5, 2020VMware Tanzu
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...CA Technologies
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10CA Technologies
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksAppDynamics
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...CA Technologies
 
Tim's Top Ten tips for Cloud
Tim's Top Ten tips for CloudTim's Top Ten tips for Cloud
Tim's Top Ten tips for CloudTim Burns
 
5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based TestingTurnKey Solutions
 
Harman deepak v - agile on steriod - dev ops led transformation
Harman  deepak v - agile on steriod - dev ops led transformationHarman  deepak v - agile on steriod - dev ops led transformation
Harman deepak v - agile on steriod - dev ops led transformationXebia India
 
Automic Service Orchestration - Self Service Desk Automation
Automic Service Orchestration - Self Service Desk AutomationAutomic Service Orchestration - Self Service Desk Automation
Automic Service Orchestration - Self Service Desk AutomationCA | Automic Software
 

Similar to Best Practices with CA Workload Automation AutoSys (AE) (20)

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database Experience
 
Migrating from Oracle to Postgres
Migrating from Oracle to PostgresMigrating from Oracle to Postgres
Migrating from Oracle to Postgres
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...Reduce Software Release Cycles by 4-5x with Application Release Automation fo...
Reduce Software Release Cycles by 4-5x with Application Release Automation fo...
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
IBM Automation Control for z/OS
IBM Automation Control for z/OS IBM Automation Control for z/OS
IBM Automation Control for z/OS
 
Accelerate Application Migration - August 5, 2020
Accelerate Application Migration - August 5, 2020Accelerate Application Migration - August 5, 2020
Accelerate Application Migration - August 5, 2020
 
Developer want change Ops want control - devops
Developer want change Ops want control - devopsDeveloper want change Ops want control - devops
Developer want change Ops want control - devops
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
 
Tim's Top Ten tips for Cloud
Tim's Top Ten tips for CloudTim's Top Ten tips for Cloud
Tim's Top Ten tips for Cloud
 
5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing
 
Harman deepak v - agile on steriod - dev ops led transformation
Harman  deepak v - agile on steriod - dev ops led transformationHarman  deepak v - agile on steriod - dev ops led transformation
Harman deepak v - agile on steriod - dev ops led transformation
 
Automic Service Orchestration - Self Service Desk Automation
Automic Service Orchestration - Self Service Desk AutomationAutomic Service Orchestration - Self Service Desk Automation
Automic Service Orchestration - Self Service Desk Automation
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Best Practices with CA Workload Automation AutoSys (AE)

  • 1. Pre-Con Education: Best Practices with CA Workload Automation AutoSys Edition (AE) Michael Woods DevOps: Continuous Delivery CA Technologies Principal Engineering Services Architect DO4X110E
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract In this session we will cover the CA Technologies recommended configuration and architectures for CA Workload Automation AutoSys (AE) , including the scheduling engine, agents, security and graphical user interface (GUI). These best practices are designed to help maximize performance and minimize maintenance and issues. Michael Woods CA Technologies Principal Engineering Services Architect
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT ARE BEST PRACTICES? WORKLOAD AUTOMATION AE BEST PRACTICES WORKLOAD CONTROL CENTER BEST PRACTICES 1 2 3
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What are Best Practices? Normally reduces issues  Not the same as taking the defaults  Has a greater usage in client base  Less chance for issues going forward Not always best for you  You may have unique requirements  One size does not always fit all
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD VIRTUAL MACHINES BOX JOBS SUMMARY START TIMES PERFORMANCE TUNING GLOBAL VARIABLES Agenda CA Workload Automation AutoSys Edition SCHEDULER APPLICATION SERVER SECURITY SYSTEM AGENTS 1 2 3 4 5 6 7 8 9 10
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Test Environment If at all possible:  Have a sandbox to do any engineering work like testing – New releases – Patches – Different configuration settings – Try out new procedures  ALWAYS have a test system that can be used before applying to production  DR should match production  Create and execute a test plan  Test architecture should mimic production
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scheduler When the scheduler contacts an agent, it will cache or store the IP address in memory for future use – Decreases system network calls to increase performance – Gathered again if a communication error occurs to agent  Enabled by default – Good for static environments  Setting EnableIPCaching =0|1 – Located in $AUTOUSER/config.$AUTOSERV file  When to turn it off – IP addresses may change frequently – Data Centers may move dynamically – Not using VIP for clusters Configuration Options
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Application Server  Instance Wide Encryption: – The encryption key used to communicate to the application server – This key is used by all AE SDK clients, which includes command-line utilities like sendevent, autorep,… and WCC – If you write any SDK programs, you must specify the encryption type – Without the encryption key, communication will fail  For example, trying to force start a job from the development instance should not work if you pointed it to the UAT instance  Set to NONE when R11 agents are used – If encryption is required, use the CSAM SSL encryption  Set by UseEncryption setting – We recommend using a unique key for each tier of service  Sandbox should not be using the same key as production – Use a different one per instance?? Configuration Options
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Global Variables  Use application name as prefix to prevent using the same name  Use EEM to secure  Limit where changes are made from to reduce race conditions – Day of week, date, on/off switch….  Could Resources be a better fit? – Managed by scheduler – Also securable – Easier to track and maintain Naming Conventions
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Calendars  Use application name as prefix to prevent different groups from modifying each others calendars  Use EEM to secure  Create corporate standard calendars for most commonly used: – First working day of month, last working day of month, third Tuesday… – Use extended calendars when it makes sense, reduce work going forward – Convert existing calendars to extended calendars, when sensible or convenient  Use Extended Calendars when applicable: – Define once and do not need to update again – Generates a year in advance, keeps updating to keep a years worth of data – Limitation: Can not be used as Holiday calendars Naming Conventions
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Boxes  Avoid having different start times inside box, delays the completion of the box  Avoid having different start dates inside the box, introduces further delay  Reduce the depth of nesting to get better performance  Not every job needs to be in a box – Boxes decrease performance when overused, ties up threads until box is complete  Consider using group and application fields to logically group jobs
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Start Times Try to stagger jobs as much as possible to get a smoother job submission curve:  Will actually submit faster than large number of starts at one time  Use the forecast command or the API to see how many are being started at same time  Typically, 0, 15, 30, 45 are the most commonly used start times  Use diverse start times in your schedule  Try to prevent jobs running every minute when possible
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD System Agent  Use a consistent agentparm.txt to simplify installs, maintenance and troubleshooting efforts  Keep enough log data for trouble shooting  Some job types like ftp have additional information in spool file, so automatic cleanup at success may not be advantageous  Do not add managers that are not needed to agents, may cause additional overhead – Do not have duplicate manager names specified, can cause communication errors  Use a common communication protocol (plain recommended)  Reduce agent sleep period for managers that do not respond – 2 minutes default, can delay failovers
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Machine Definition  Use opsys field – On Windows – required for domain users – Useful to self document  Description field – Again, self documenting, make it count  Geography, Business line, …  Use fully qualified domain names on node_name attribute  Use different encryption keys per environment – Recommended not to use the DEFAULT key in production
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security Two security models available:  External: Uses Embedded Entitlements Manager (EEM) – Allows more granular security – Works well with multiple operating systems  Native: “UNIX” style security, owner, group, world – Can be hard to enforce security when owners/end users require multiple groups  External is best practice Internal or External
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security  Keep it as simple as possible – Think of maintenance going forward  Use Group membership, not individual user IDs – People move on, groups normally do not  If not using LDAP, use Global groups in EEM to lessen maintenance EEM Policy
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD EEM User Store  Use company user store and groups when possible – Cleanup is automatic when user record deleted – Security is owned by security group  Dynamic User Group: – Mapping LDAP group to naming convention – Too many can cause performance issues (1000’s)  Limited Use of Regular expressions in Resource Name: – Backtracking specifically (ABC|XYZ) – Keep to minimum – Impacts performance
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD EEM Security Administration  Do not use EiamAdmin – makes audit less accurate  Create Security administrators using scoping policy – Check AdministerObjects default policy for sample or add users to it
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Client Installations  Only install when required – Reduce maintenance effort – Reduce manual intervention for audit and control – Use the scheduler as a scheduler – Smaller footprint – Run from Scheduler machine? – More secure – Turn on autotrack to have an audit of who did what and when and from where
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning  AE – SCHED_SCALE – DB_CONNECTIONS – Use statistics aggregation to collect performance data – Run stat reports on a regular basis to start spotting trends
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Lifecycle  Have a strict change control process in place – Sending emails is not a process  Customers should not be moving untested jobs into production – Customer should validate jobs runs to success in Test/UAT  Have a Dev instance for developing code, not production
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Retention Keep your DB as small as possible to improve performance  How many days event and job run data to retain? – What are your user requirements? – How many job runs per day?  How many days of archived jobs? – Best practice is 1 day. Cannot be retrieved, so why keep?  How many days of audit information? – Do you action alarms or use a external monitor? – If not using alarms directly, keep only 1 day worth of data
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Retention Continued DBMaint:  Should use internal or external method? – Config setting at 3:30 am each day – Create jobs that run commands  For example, should archive events run more often than archive jobs?  How many times a day to run? – Shops that have a large run per day or keep a high number of days of data may want to run more than once a day – Want to keep processed event table small as possible
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Health Monitoring  Automate monitoring of failures: – SNMP traps to your favorite tool – Email – CCS Event Management – iDash for monitoring of SLA  WA AE health: – Alarms self-generated – Monitor processes with your corporate standard tool Component Process Name Scheduler event_demon Application Server as_server EEM igateway CA Directory dxadmin System Agent cybAgent
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scripts and Programs Document exit codes:  If not a simple 0|1, they should have meaning to speed debugging or used to decide what job runs next  Think about recovery: – What needs to be rerun? – Document runbook steps. – Should it be broken up into multiple jobs?  Can any checks be made to help jobs succeed? – Job types can check process/services are running – Check CPU/disk space – Check any external machine dependencies
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scripts and Programs Continued  Use fully qualified commands on job definition  Use fully qualified commands and file names in scripts  Use supplied variable when dealing with AE environment – $AUTOSYS/bin/autorep –j test – $AUTOSERV for instance name  Use an env or set command to write out environment variables, ensure you have what is expected
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Password Expiration Service Accounts  If permissible, use un-expiring passwords  When not, use autosys_secure in batch mode to update passwords – autosys_secure –c fred@ca.com –o oldpass –p newpass
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda Workload Control Center WCC CREATE THE ENVIRONMENT CONFIGURATION MONITORING VIEWS ALERTS PERFORMANCE TUNING SUMMARY 1 3 4 5 6 7 2
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Define the roles you need:  Admin  Operations  Scheduler  Application developer  Line or business user
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Continued  Define what tabs (applications) each role should have  What servers should they have access to? – Development – UAT – Production  What tabs per server? – Edit for dev, but not for prod? – Send event / monitoring in prod, but no edit  What views should they have?
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users One security mode available:  Security is used to determine what will be displayed – Remove unused tabs – Reduce questions/issues on features not used or wanted  Use security to protect what needs protection and also to reduce the noise – Show what they are interested in Using Security
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users There are 50+ job types.  How many are required?  Do you have Oracle E Business?  Do you have SAP?  Do you have PeopleSoft?  Do you have z/OS?  Do you allow FTP? Configuration Options
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users  General notes for running commands for job types: – User_name: EEM user, local user with access – Password: Users EEM password – Application_name: qedit or appedit  Command must be run with a userid able to update log files  Use the userid designated at install as the run as user  The default is root Batch Interfaces
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Creating a list of desired job types:  List available job types to see what is currently available and not available: filter_jobtypes -u user_name -p password -t application_name -l  Remove job types from being displayed: filter_jobtypes -u user_name -p password -t application_name –r all|jobtype1[,jobtype2,…,jobtypex]  Add job types to available list: filter_jobtypes -u user_name -p password -t application_name -a all|jobtype1[,jobtype2,…,jobtypex] Batch Interfaces Continued
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Creating views in batch:  Create a list of applications required to have a view  Create a sample view based on your requirements  Export the view – wcc_monitor -u user_name -p password –x export_file –view sampleView  Edit exported view to replace job name to ‘XXXX’  Create script to ‘sed’ template and replace ‘XXXX’ with your application prefix using your naming convention  Import views: – wcc_monitor -u user_name -p password –i input_file Batch Interfaces Continued
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates CLI  Creates job templates to be used both in Quick Edit and Application Editor  Global template for all users, templates only for specific uses  Syntax: job_template -u,--user <user> -p,--password <password> <-g,--global | -f,--for-user <user> > < -l,--list | -r,--remove <template-name> | -i,--import <template-name> <file-name> | -export <template-name> <file-name> > [-o,--overwrite] [-?,--help]
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case 1. Use autorep to prepare JIL definitions 2. Modify JIL file to prepare it for import as a template 3. Create a global template for all users 4. Create a template for ejmcommander user only 5. List the global templates available 6. List the templates available for ejmcommander user only 7. Log in to Quick Editor as ejmcommander and use the new templates
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Use autorep output to create a JIL file: autorep –q –j JOBNAME > filename.jil Prepare JIL Definitions Note 1: After JIL files are ready, copy them to a computer running WCC. Note 2: It is possible to have only 1 job definition for 1 file to import as template.
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Delete insert_job: JOBNAME  In case you want to use job name as a part of template: – rename insert_job: JOBNAME to job_name: JOBNAME – put job_type: TYPE on a new line  Repeat the same for both JIL files Prepare JIL Definitions Continued
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Import global template: job_template.bat -u ejmcommander -p ejmcommander -g -i globalTemplate c:tempglobal_template.jil Import as a Global Template
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Import user template: job_template.bat -u ejmcommander -p ejmcommander –f ejmcommander -i userTemplate c:tempuser_template.jil Import as a User Template
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  List the global templates available: job_template.bat -u ejmcommander -p ejmcommander –l –g  List the user templates available: job_template.bat -u ejmcommander -p ejmcommander –l -f List the Templates
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case Open the Quick Editor Create Object dialog and check for templates: Use the Templates
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices  Log on again after adding add/modify a template using job_template CLI  Log on again after modifying filter job types filter using filter_jobtypes CLI  Log on again to apply new or updated EEM policies
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC  Limit who can create views – Duplicate or wildcard for ALL can hurt performance  If 11.3 or higher, go to 11.4 for new features and better performance – Requires EEM 12.51  If 11.3.6 AE and using EEM, use a global ECLI user and restrict access to the Credentials tab
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC Continued  An external DB when HA is required – Derby does not support HA  Use an external DB for better performance when one or more apply – Monitoring and configuration DB:  Over 50k defined jobs  Over 50k job runs  70 concurrent users  Over 200 views  Over 500 alerts defined  Over 5 AE servers defined – Reporting DB:  Over 1 Million job runs in reporting DB  Can be switched after install
  • 48. 48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC Continued  Let users have self-service in production to relieve Operations from getting overwhelmed and potentially less error prone – Must be auditable – Must be secured  EEM can audit this activity, your policy secures it
  • 49. 49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning WCC  Check tuning guide for specific instructions – Java.Maxmemory is major one – Two tomcats – 32 bit – should not exceed 1G – 64 bit – can be set larger, check what is available on your system  Linux install_dir/tomcat/conf/wrapper.conf # Uncomment this line if the entropy of the UNIX machine is low to speed up encryption # The dot between /dev and /urandom is not a mistake wrapper.java.additional.101=-Djava.security.egd=file:/dev/./urandom
  • 50. 50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning DB Maintenance  Alarms and Alerts – Turn off if not using AE Alarms – Keep only required days of data  Reporting data – Keep only required amount of data EEM Event Policy  Disable or update policy for Authenticate With Artifact
  • 51. 51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 52. 52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO4T07S Vision and Roadmap: CA Workload Automation Thursday at 12:15 pm (DevOps Continuous Delivery Theatre 4) DO4X177S Vision and Roadmap: CA Workload Automation AE (AutoSys) Wednesday at 4:30 pm (Lagoon D) DO4X180S Case Study: CenterPoint Energy Achieves .0003 abends with CA Workload Automation AE (AutoSys®) Thursday at 3:45 pm (Lagoon D) DO4X177S Case Study: Large Fuel Company Reduces the Cost and Complexity of Managing Mission Critical SAP and non-SAP Jobs Thursday at 1:00 pm (Lagoon D)
  • 53. 53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Maximize SLA Management and Extend Workloads to SAP® DevOps Continuous Delivery Theatre 4 Reduce the Cost and Complexities of Managing Hadoop Workloads DevOps Continuous Delivery Theatre 4
  • 54. 54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow Conversations At… CA Workload Automation Mainframe Theatre CA Workload Automation iDash DevOps Continuous Delivery Theatre Thursday 1:00PM
  • 55. 55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15