SlideShare a Scribd company logo
1 of 48
Download to read offline
Hands-On Labs: Introduction to CA Unified
Infrastructure Management
Robert Vacante
DevOps: API Management and Application Development
CA Technologies
Principal Product Manager
DO5X218L
@TwitterHandle
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
This session will cover the “basics” of CA Unified
Infrastructure Management (CA UIM)to help
you build your knowledge on the general
concepts, components and features that CA
UIM offers. We will also cover the major
features that are now available within our CA
UIM 8.35 release.
Robert
Vacante
CA Technologies
Principal Product
Manager
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
THE CA UNIFIED INFRASTRUCTURE MANAGEMENT SOLUTION
HOW CA UIM WORKS
VISUALIZING YOUR DATA
DISCOVERING YOUR NETWORK
DEPLOYING A ROBOT
DEPLOYING AND CONFIGURING A PROBE TO GATHER DATA
1
2
3
4
5
6
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Key Drivers—Mandates for the Solution
Lightweight footprint that
delivers enterprise scalability
and multi-tenancy
A single, comprehensive
and unified IT
monitoring solution
As easy as adding
apps to a smartphone
Deploys “robots” to 100
servers in less than three
minutes
Simple
PowerfulFast
Unified
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Unified Infrastructure Management Benefits:
 Eliminate complexity.
 Increase worker
productivity.
 Better utilize technology.
 Make your job easier.
 Put customer needs first.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Power & Payback of Unified Monitoring
Rapid Time to Value & Demonstrable ROI
*Source: IDC White Paper, sponsored by CA Technologies, “Unified Infrastructure Monitoring and Management Increases Availability, MTTR and IT Staff Productivity“, #243957, October
2013 ** Source: Tech Validate Survey
4X IT Staff
Productivity
Improvements
Doubles
Productivity &
Saves $250,000
Replaced Five
Monitoring Tools,
Improved MTTR
Global Hotel Chain**Regional Bank* US Data Center
Provider*
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Key Capabilities
Multi-Tenant Customizable
Dashboards &
Reports
Highly Scalable
Plug & Play
Architecture
Unified Trending
& Root Cause
Analysis
Powerful
Visualization Tools
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Monitoring best practices:
 Avoid the temptation to use the full capabilities
– Take an iterative product-release approach.
– Increase customer value.
– Focus on what is actionable.
– Baseline approach.
 Adherence to the principles of monitoring governance avoids:
– Large databases
– Alarm floods
– Users losing trust
– Overall unmanageability of the system
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What you need:
Methods to identify
trends to help in longer
term planning
Tools to help you understand and
visualize how your infrastructure is
performing now and in the past
Information to
troubleshoot and
pinpoint problems so
they can be quickly
resolved
Alerts to inform you of situations
requiring attention…Both problems
now and warnings of potential
situations in the future
Troubleshoot
PlanAlert
Visualize
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What you want:
Something Important in your
Infrastructure
UIM
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
140+ Probes
 Servers
 Storage
 Virtualization
 Networks
 Email
 End-to-End Response
 SDKs
 Applications
 Cloud/SaaS
 Databases
 iSeries/as400
 Gateways
 HA/Clusters
 Marketplace
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
UIM
Something Important in your
Infrastructure
HUB
ROBOT
ROBOT
PROBE
REPORTING
DASHBOARDS
ALARMS
PROBES
PROBE: Collects data from devices,
services or applications.
ROBOT: Provides connectivity for probe
to connect to UIM.
HUB: Central point of connectivity.
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Technical Architecture
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Domain
Domain
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Exercises:
 Discover the network.
 Deploy a robot.
 Deploy the CDM probe.
 Configure the CDM probe.
 Visualize the monitoring
data.
UIM
HUB
ROBOT
REPORTING
DASHBOARDS
ALARMS
PROBES
Something Important in your
Infrastructure
ROBOT
PROBE
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Discovery
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Discovery Wizard
Use the Discovery Wizard to set up the automated discovery of network devices.
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Authentication Tabs
 Contains credentials for the discovery_agent probe to access
and gather necessary information
 Click “New Credentials” and define appropriate fields
… enable the creation, editing, viewing and deletion of authentication profiles.
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Ranges Page
 You can assign credentials to a range.
 Ranges can be defined for specific discovery_agent probes.
…specifies the portions of the network to discover:
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Schedule Page
 Scheduled discovery does not interrupt a running discovery
– But that scheduled discovery is ignored
 “Run discovery” stops currently running discovery
…schedules single or recurring discoveries.
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You try it!
 Exercise 1: Discover devices in your network.
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Robot Deployment
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Automatic Robot Deployment
 Deploy robots to all or selected members of a group.
 Deploy robot to specific system.
 Basic or advanced search for systems to deploy robots.
 Import XML list of systems.
Use USM to deploy automatically to one or more systems
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You try it!
 Exercise 2: Deploy a robot to a server to be monitored.
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Probe Deployment
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Package Archive
 Local Archive
– This archive resides on the hub, therefore the list will be the same for
all robots connected to the hub.
– There can be more than one version of a package on the local archive.
 Web Archive
– Displays the list of probe packages on the CA UIM support archive.
– You must have a valid login and password for the CA UIM support site
to download any package.
…encompasses the local archive and Web archive.
You must deploy and configure probes to enable event and performance monitoring on robots.
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Local Archive
…shows all downloaded probe packages.
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Web Archive
…includes all probe packages available to be downloaded from the CA UIM support site.
If you deploy a package from the Web Archive, it is first automatically
downloaded to the Local Archive before it is deployed to the robot.
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Distribution Activity
… is a log of probe package distributions along with the status of each distribution.
Packages can be deployed individually or in groups.
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Probe Deployment
…drags probes from the Archive to the Target.
When a probe is dropped on a hub, domain or group, the probe is
deployed to applicable subordinate robots.
You drag a probe from
the local archive….
and drop it onto
the target.
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You try it!
 Exercise 3: Deploy the CDM probe to the server.
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Probe Configuration
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Probe Configuration
…configures thresholds, severity and publishing of QoS data.
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You try it!
 Exercise 4: Configure the CDM probe.
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Visualization
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Viewing Monitored Data:
 Built-in, easily customizable views to spot trends, optimize
resources, etc.
 You will view the following portlets:
– Device, alarm, metric and group data in the USM
– Servers in the Unified Dashboards
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
View Monitored Data
Select Device in the Navigation Pane, View QoS Data
To view the alarm for
a device, you can
click the Alarms icon
or the Alarms tab.
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Alarms Tab
View details, history and metrics of an alarm.
To view details, history
and metrics about an
alarm, you click the
More button.
The Actions
menu provides
available alarm
actions.
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Alarm View
…displays all current alarms including those not associated with a group or system.
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Metrics and Groups Tabs
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Unified Dashboard Portlets
To view the drilldown
report for a metric,
you double-click its
metric.
To view the drilldown report
for a server for a particular
metric, you click its name.
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Viewing Monitored Data
The following screenshots are examples of drilldown reports you can generate:
Drilldown Reports Generated in the Unified Dashboards Portlet
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Drilldown Reports
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Viewing Monitored Data in a Report
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You try it!
 Exercise 5: View the data being collected.
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Extra Credit:
PRD Dashboards
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Android's Multimedia Framework
Android's Multimedia FrameworkAndroid's Multimedia Framework
Android's Multimedia FrameworkOpersys inc.
 
FreeBSD and Drivers
FreeBSD and DriversFreeBSD and Drivers
FreeBSD and DriversKernel TLV
 
Tree(Directed and undirected tree)
Tree(Directed and undirected tree)Tree(Directed and undirected tree)
Tree(Directed and undirected tree)Mahmoud Hikmet
 
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...CODE BLUE
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 
Android sensors
Android sensorsAndroid sensors
Android sensorsdatta_jini
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1Mr SMAK
 
Kiosk-mode browser using Chromium Embedded Framework (CEF)
Kiosk-mode browser using Chromium Embedded Framework (CEF)Kiosk-mode browser using Chromium Embedded Framework (CEF)
Kiosk-mode browser using Chromium Embedded Framework (CEF)Igalia
 
Comment fonctionner le linker gateway 3 ds
Comment  fonctionner le linker gateway 3 dsComment  fonctionner le linker gateway 3 ds
Comment fonctionner le linker gateway 3 dsNicolas Alexandre
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5Sanjeev Kumar
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecturevenkateswarlu G
 
AWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWSAWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWSSplunk
 
[232] 성능어디까지쥐어짜봤니 송태웅
[232] 성능어디까지쥐어짜봤니 송태웅[232] 성능어디까지쥐어짜봤니 송태웅
[232] 성능어디까지쥐어짜봤니 송태웅NAVER D2
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architecturesGokuldhev mony
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...The Linux Foundation
 
Introducing Xen Server
Introducing Xen ServerIntroducing Xen Server
Introducing Xen ServerStephenRice86
 
Operating system support in distributed system
Operating system support in distributed systemOperating system support in distributed system
Operating system support in distributed systemishapadhy
 
Gioi thieu-chung-ao-hoa
Gioi thieu-chung-ao-hoaGioi thieu-chung-ao-hoa
Gioi thieu-chung-ao-hoaanhhaibi
 

What's hot (20)

Android's Multimedia Framework
Android's Multimedia FrameworkAndroid's Multimedia Framework
Android's Multimedia Framework
 
FreeBSD and Drivers
FreeBSD and DriversFreeBSD and Drivers
FreeBSD and Drivers
 
Tree(Directed and undirected tree)
Tree(Directed and undirected tree)Tree(Directed and undirected tree)
Tree(Directed and undirected tree)
 
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
Android sensors
Android sensorsAndroid sensors
Android sensors
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Kiosk-mode browser using Chromium Embedded Framework (CEF)
Kiosk-mode browser using Chromium Embedded Framework (CEF)Kiosk-mode browser using Chromium Embedded Framework (CEF)
Kiosk-mode browser using Chromium Embedded Framework (CEF)
 
Comment fonctionner le linker gateway 3 ds
Comment  fonctionner le linker gateway 3 dsComment  fonctionner le linker gateway 3 ds
Comment fonctionner le linker gateway 3 ds
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
AWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWSAWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWS
 
Load balancing
Load balancingLoad balancing
Load balancing
 
[232] 성능어디까지쥐어짜봤니 송태웅
[232] 성능어디까지쥐어짜봤니 송태웅[232] 성능어디까지쥐어짜봤니 송태웅
[232] 성능어디까지쥐어짜봤니 송태웅
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architectures
 
Linux Internals - Interview essentials 4.0
Linux Internals - Interview essentials 4.0Linux Internals - Interview essentials 4.0
Linux Internals - Interview essentials 4.0
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
 
Introducing Xen Server
Introducing Xen ServerIntroducing Xen Server
Introducing Xen Server
 
Operating system support in distributed system
Operating system support in distributed systemOperating system support in distributed system
Operating system support in distributed system
 
Gioi thieu-chung-ao-hoa
Gioi thieu-chung-ao-hoaGioi thieu-chung-ao-hoa
Gioi thieu-chung-ao-hoa
 

Similar to Hands-On Labs: Introduction to CA Unified Infrastructure Management

Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...CA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...CA Technologies
 
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...CA Technologies
 
Hands-On Lab: Take CA Release Automation for a Test Drive
Hands-On Lab: Take CA Release Automation for a Test DriveHands-On Lab: Take CA Release Automation for a Test Drive
Hands-On Lab: Take CA Release Automation for a Test DriveCA Technologies
 
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...CA Technologies
 

Similar to Hands-On Labs: Introduction to CA Unified Infrastructure Management (20)

Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...
Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Manage...
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application Development
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
Pre-Con Education: Building ITSM Reports and Dashboards with CA Business In...
 
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
 
Hands-On Lab: Take CA Release Automation for a Test Drive
Hands-On Lab: Take CA Release Automation for a Test DriveHands-On Lab: Take CA Release Automation for a Test Drive
Hands-On Lab: Take CA Release Automation for a Test Drive
 
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Hands-On Labs: Introduction to CA Unified Infrastructure Management

  • 1. Hands-On Labs: Introduction to CA Unified Infrastructure Management Robert Vacante DevOps: API Management and Application Development CA Technologies Principal Product Manager DO5X218L @TwitterHandle #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract This session will cover the “basics” of CA Unified Infrastructure Management (CA UIM)to help you build your knowledge on the general concepts, components and features that CA UIM offers. We will also cover the major features that are now available within our CA UIM 8.35 release. Robert Vacante CA Technologies Principal Product Manager
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda THE CA UNIFIED INFRASTRUCTURE MANAGEMENT SOLUTION HOW CA UIM WORKS VISUALIZING YOUR DATA DISCOVERING YOUR NETWORK DEPLOYING A ROBOT DEPLOYING AND CONFIGURING A PROBE TO GATHER DATA 1 2 3 4 5 6
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Drivers—Mandates for the Solution Lightweight footprint that delivers enterprise scalability and multi-tenancy A single, comprehensive and unified IT monitoring solution As easy as adding apps to a smartphone Deploys “robots” to 100 servers in less than three minutes Simple PowerfulFast Unified
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Unified Infrastructure Management Benefits:  Eliminate complexity.  Increase worker productivity.  Better utilize technology.  Make your job easier.  Put customer needs first.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Power & Payback of Unified Monitoring Rapid Time to Value & Demonstrable ROI *Source: IDC White Paper, sponsored by CA Technologies, “Unified Infrastructure Monitoring and Management Increases Availability, MTTR and IT Staff Productivity“, #243957, October 2013 ** Source: Tech Validate Survey 4X IT Staff Productivity Improvements Doubles Productivity & Saves $250,000 Replaced Five Monitoring Tools, Improved MTTR Global Hotel Chain**Regional Bank* US Data Center Provider*
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Capabilities Multi-Tenant Customizable Dashboards & Reports Highly Scalable Plug & Play Architecture Unified Trending & Root Cause Analysis Powerful Visualization Tools
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Monitoring best practices:  Avoid the temptation to use the full capabilities – Take an iterative product-release approach. – Increase customer value. – Focus on what is actionable. – Baseline approach.  Adherence to the principles of monitoring governance avoids: – Large databases – Alarm floods – Users losing trust – Overall unmanageability of the system
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What you need: Methods to identify trends to help in longer term planning Tools to help you understand and visualize how your infrastructure is performing now and in the past Information to troubleshoot and pinpoint problems so they can be quickly resolved Alerts to inform you of situations requiring attention…Both problems now and warnings of potential situations in the future Troubleshoot PlanAlert Visualize
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What you want: Something Important in your Infrastructure UIM
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD 140+ Probes  Servers  Storage  Virtualization  Networks  Email  End-to-End Response  SDKs  Applications  Cloud/SaaS  Databases  iSeries/as400  Gateways  HA/Clusters  Marketplace
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD UIM Something Important in your Infrastructure HUB ROBOT ROBOT PROBE REPORTING DASHBOARDS ALARMS PROBES PROBE: Collects data from devices, services or applications. ROBOT: Provides connectivity for probe to connect to UIM. HUB: Central point of connectivity.
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Technical Architecture
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Domain Domain
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Exercises:  Discover the network.  Deploy a robot.  Deploy the CDM probe.  Configure the CDM probe.  Visualize the monitoring data. UIM HUB ROBOT REPORTING DASHBOARDS ALARMS PROBES Something Important in your Infrastructure ROBOT PROBE
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Discovery
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Discovery Wizard Use the Discovery Wizard to set up the automated discovery of network devices.
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Authentication Tabs  Contains credentials for the discovery_agent probe to access and gather necessary information  Click “New Credentials” and define appropriate fields … enable the creation, editing, viewing and deletion of authentication profiles.
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Ranges Page  You can assign credentials to a range.  Ranges can be defined for specific discovery_agent probes. …specifies the portions of the network to discover:
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Schedule Page  Scheduled discovery does not interrupt a running discovery – But that scheduled discovery is ignored  “Run discovery” stops currently running discovery …schedules single or recurring discoveries.
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You try it!  Exercise 1: Discover devices in your network.
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Robot Deployment
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Automatic Robot Deployment  Deploy robots to all or selected members of a group.  Deploy robot to specific system.  Basic or advanced search for systems to deploy robots.  Import XML list of systems. Use USM to deploy automatically to one or more systems
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You try it!  Exercise 2: Deploy a robot to a server to be monitored.
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Probe Deployment
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Package Archive  Local Archive – This archive resides on the hub, therefore the list will be the same for all robots connected to the hub. – There can be more than one version of a package on the local archive.  Web Archive – Displays the list of probe packages on the CA UIM support archive. – You must have a valid login and password for the CA UIM support site to download any package. …encompasses the local archive and Web archive. You must deploy and configure probes to enable event and performance monitoring on robots.
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Local Archive …shows all downloaded probe packages.
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Web Archive …includes all probe packages available to be downloaded from the CA UIM support site. If you deploy a package from the Web Archive, it is first automatically downloaded to the Local Archive before it is deployed to the robot.
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Distribution Activity … is a log of probe package distributions along with the status of each distribution. Packages can be deployed individually or in groups.
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Probe Deployment …drags probes from the Archive to the Target. When a probe is dropped on a hub, domain or group, the probe is deployed to applicable subordinate robots. You drag a probe from the local archive…. and drop it onto the target.
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You try it!  Exercise 3: Deploy the CDM probe to the server.
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Probe Configuration
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Probe Configuration …configures thresholds, severity and publishing of QoS data.
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You try it!  Exercise 4: Configure the CDM probe.
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Visualization
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Viewing Monitored Data:  Built-in, easily customizable views to spot trends, optimize resources, etc.  You will view the following portlets: – Device, alarm, metric and group data in the USM – Servers in the Unified Dashboards
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD View Monitored Data Select Device in the Navigation Pane, View QoS Data To view the alarm for a device, you can click the Alarms icon or the Alarms tab.
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Alarms Tab View details, history and metrics of an alarm. To view details, history and metrics about an alarm, you click the More button. The Actions menu provides available alarm actions.
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Alarm View …displays all current alarms including those not associated with a group or system.
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Metrics and Groups Tabs
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Unified Dashboard Portlets To view the drilldown report for a metric, you double-click its metric. To view the drilldown report for a server for a particular metric, you click its name.
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Viewing Monitored Data The following screenshots are examples of drilldown reports you can generate: Drilldown Reports Generated in the Unified Dashboards Portlet
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Drilldown Reports
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Viewing Monitored Data in a Report
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You try it!  Exercise 5: View the data being collected.
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Extra Credit: PRD Dashboards
  • 48. 48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15