SlideShare a Scribd company logo
1 of 74
Download to read offline
Pre-Con Education: What Is CA Unified 
Infrastructure Management (formerly known as 
CA Nimsoft Monitor) and what's new in version 
8.0 
Tim O’Connor, Kurt Spence, Robert Vacante 
OCX33E #CAWorld 
CA Technologies 
UIM Product Management 
ca Opscenter
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
If you are new to CA Unified Infrastructure Management (formerly known as CA NimsoftMonitor), please join us for this introductory session to learn more about this comprehensive monitoring solution. This session will cover the “basics” of CA Unified Infrastructure Management to help you build your knowledge on the general concepts, components and features that CA UIM offers. We will also cover the major features that are now available within our recent 8.0 release, including new analytics (“time to threshold” and “time over threshold”), reporting improvements (TopNand “At A Glance” reports) and more. 
Tim O’Connor 
Kurt Spence 
Robert Vacante 
CA Technologies 
Product Management
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Agenda 
MODULE 1: DESCRIBE CA UNIFIED INFRASTRUCTURE MANAGEMENT 
MODULE 2: CONFIGURE BASIC DATA MONITORING 
MODULE 3: EXAMINE MONITORED DATA 
MODULE 4: ADVANCED CONFIGURATIONS
4 
© 2014 CA. ALL RIGHTS RESERVED. 
Class Question 
Show of hands –how do you classify your business? 
SMB 
A 
Large Enterprise 
B 
Communication provider 
C 
Managed Service Provider 
D
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Class Question 
Show of hands –who is currently using UIM for monitoring, or other tools? 
UIM 
A 
Other 
B 
None 
C
Module 1: Describe CA Unified Infrastructure Management
7 
© 2014 CA. ALL RIGHTS RESERVED. 
Module Objectives 
After completing this module, you will be able to: 
Consider monitoring governance to fulfill your monitoring requirements 
Identify the key components of CA Unified Infrastructure Management 
Perform a network discovery 
Why you need to know: 
By understanding the application of monitoring governance, you can optimally configure CA Unified Infrastructure Management to meet your specific business monitoring requirements. 
By identifying the key components, you will gain a high-level understanding of how the CA Unified Infrastructure Management logical and technical architecture is implemented, and then be enabled to quickly begin to collect performance data and events—QoSand alarms—from your environment
9 
© 2014 CA. ALL RIGHTS RESERVED. 
Monitoring Governance 
By understanding the application of monitoring governance, you can optimally configure CA Unified Infrastructure Management to meet your specific business monitoring requirements. 
What Do I Monitor? 
What Is Alarm Worthy? 
–Notification 
–Escalation 
–Remediation 
How Do I Manage All This? 
What Data do I Collect? 
–Frequency 
–Retention 
Any monitoring deployment solution presents a number of challenges.
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Monitoring Governance Approach 
Monitoring governance is a disciplined approach to what has all too often been an un-disciplined activity. 
–Start to think of monitoring as a service, whether it be for internal customers or the external customers of a service provider. 
–Stop relying on the out-of-the-box (OOTB) approach of simply turning on all thresholds and hoping to capture something meaningful. 
–Follow an intentional workshop-driven process to consider and plan the service that will be offered by monitoring. 
–The resultant monitoring should be specific, focused, and discrete. 
Prioritize customer value. 
–Align your approach with a service offering and service catalog. 
–Make it simple and easy to understand. 
Good, better, best 
Basic, advanced 
Bronze, silver, gold 
Focus on the valuethe customer gets from what you are monitoring, and not simply on what you are monitoring.
11 
© 2014 CA. ALL RIGHTS RESERVED. 
Monitoring Governance Approach Continued 
Monitoring governance specifies the: 
–Resources that need to be monitored 
–Probes to use 
–Individual checkpoints to enable, and which metrics you will collect for that checkpoint 
–Alarm thresholds 
–Alarm management rules to enforce, if any
13 
© 2014 CA. ALL RIGHTS RESERVED. 
Monitoring Best Practices 
Do not “boil the ocean” by drifting into an unnecessarily difficult approach. 
Avoid the temptation to use the full capabilities available if you do not need them. 
Instead: 
–Take an iterative product-release approach 
–Increase customer value 
–Focus on what is actionable 
–Use a baseline approach to monitoring instead of randomly-determined thresholds 
Adherence to the principles of monitoring governance will help to mitigate disastrous long-term effects, such as: 
–Large databases 
–Alarm floods 
–Users losing trust 
–Overall unmanageability of the system
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Stakeholders 
There are a number of roles with a stake in the monitoring governance framework: 
Each role benefits when you apply best practices. 
Stakeholder 
Benefits Provided 
CA UIM administrators 
–Reduced overall effort required to maintain the solution 
Service providers 
–Increased product confidence 
–Scalable service catalog-based monitoring infrastructure 
–Quicker time to market 
Infrastructure owner 
–Quality information regarding their infrastructure 
–Timely notices about issues and outages
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Logical ArchitectureHierarchy of Business Requirements and Inputs 
Application 
Commercial and Custom 
Server 
Physical and Virtual 
Database 
IT and Business 
Business Service Management 
Service Levels 
End User Response Time 
Performance and Availability 
Events 
CMDB 
Service Desk 
CA CSM 
Service-Now 
Atrium 
Microsoft Excel 
BMCHPIBMCANovell/Managed Objects 
CA CSM 
Service-Now 
HP Service Desk 
HP Service Manager 
CA Service Desk 
Remedy ARS 
Salesforce.com 
FrontRange/HEAT 
Cloud 
Public and Private 
Network 
LAN and WAN
16 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureSystem Architecture for an On-site Deployment 
The following diagram represents the implementation of the CA Unified Infrastructure Management system architecture to meet your on-site monitoring requirements.
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureProbes 
A probe is software that performs a dedicated task at the bottom of the hierarchy. 
–A probe must be deployed to a robot.
18 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureRobots 
A robot is installed on each computer you want to monitor and manages probes. 
–A robot is known in other monitoring solutions as an agent.
19 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureHubs 
A hub is a robot that has additional responsibilities, which includes managing its robots.
20 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureDomain 
The domain is a logical set into which all infrastructure components are grouped. 
–In CA Unified Infrastructure Management, there is typically only one domain.
21 
© 2014 CA. ALL RIGHTS RESERVED. 
Technical ArchitectureSystem Architecture for On-site and Remote Deployments 
The following diagram represents the implementation of the CA Unified Infrastructure Management system architecture to meet your enterprise monitoring requirements. 
UIM Message Bus
23 
© 2014 CA. ALL RIGHTS RESERVED. 
Message FlowMessage Bus 
The message bus provides a set of services to robots, hubs, database, and management consoles. 
The message flow on the bus is managed using routing and naming schemes based on request/response and publish/subscribe models: 
Request/responseis the standard way of communicating over the network. A client issues a request to a server and the server responds to the request. 
Publish/subscribeenables clients to send data—such as alerts, performance data, or messages targeted for gateway servers—without a designated receiver. It also enables clients to select messages based on subject. 
The subscribe mechanism enables probes and robots to select messages based on subject rather than on sender address. 
A client that is configured to receive messages sends a subscribe request to the hub. 
The client then receives messages matching the subscribed subjects from the hub.
24 
© 2014 CA. ALL RIGHTS RESERVED. 
Message FlowMessage Queues 
Message queues transfer messages to and from hubs. 
Permanent queues are stored in the local hub database and survive a hub restart. 
This type of queue ensures that messages are delivered even if the receiver is down when a message is generated. 
Temporary queues are used for less-critical communication paths. 
Queues are set up in two ways: 
Automatically 
Queues are often a transparent part of the infrastructure. 
Permanent queues are set up between hubs during installation while temporary queues are created as needed. 
Manually 
You can create queues with Infrastructure Manager. 
For example, if you have multiple secondary hubs, you need to create queues to send data to the primary hub.
26 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Unified Infrastructure Management Management 
Example of an Enterprise Monitoring Solution 
Domain
27 
© 2014 CA. ALL RIGHTS RESERVED. 
Key Components of CA Unified Infrastructure Management 
Interfaces 
CA Unified Infrastructure Management consists of the following interfaces: 
•Admin Console: A web-based interface to distribute and configure probes 
•Infrastructure Manager: The traditional CA Unified Infrastructure Management interface 
•UMP (Unified Management Portal): A web interface providing a variety of portlets, reports, and dashboards for consuming data, including: 
•Unified Services Manager (USM) 
•List Views and Performance Reports 
•NetFlow 
•Unified Reporter: A full-featured, embedded business intelligence (BI) tool with advanced reporting capabilities 
By identifying the key components, you will gain a high-level understanding of how the logical and technical architecture is implemented.
28 
© 2014 CA. ALL RIGHTS RESERVED. 
The Admin Console 
Primary interface for the management of your system. 
Navigation Pane 
Main Window Pane 
System Information
30 
© 2014 CA. ALL RIGHTS RESERVED. 
Unified Monitoring PortalOverview 
UMP is the web interface for displaying and viewing data in your system. The portal is customizable and presents users with the information that is appropriate for their role.
31 
© 2014 CA. ALL RIGHTS RESERVED. 
UMPAvailable Portlets 
Portletsare individual modular applications that are organized in the portal to present a custom view. 
UMP enables you to add many collaboration and monitoring portlets and other tools. 
Drag a portletfrom the Portlet list, such as List Viewer, and place it in the desired location on the UMP page.
32 
© 2014 CA. ALL RIGHTS RESERVED. 
UMPAvailable Portlets continued 
In UMP, you can configure, minimize, maximize, and remove portlets. 
These tools enable you to configure, minimize, maximize, and remove a portlet.
34 
© 2014 CA. ALL RIGHTS RESERVED. 
Benefits of Discovery 
Discovery is the primary method to reduce manual effort while maintaining an inventory of devices in your managed domain. 
–In CA Unified Infrastructure Management, you can enable device monitoring and management on these devices as required, engaging the broad array of probes that gather QoS data from the monitored devices and generate alarms in response to threshold breaches. 
–Components in the CA Unified Infrastructure Management Server automate the discovery of hosts and devices throughout your network, recording any device within a discovery range that responds to a request on any configured protocol, including SSH, WMI, SNMP, and even a simple ICMP ping. 
CA Unified Infrastructure Management enables you to quickly begin to collect performance data and events—QoS and alarms—from your environment.
37 
© 2014 CA. ALL RIGHTS RESERVED. 
Discovery WizardOverview 
Use the Discovery Wizard to set up the automated discovery of network devices.
38 
© 2014 CA. ALL RIGHTS RESERVED. 
Discovery WizardAuthentication page 
The Authentication tabs enable you to create, edit, view, and delete authentication profiles (credentials) for discovery. 
An authentication profile contains credentials necessary for the discovery_agent probe to access and gather information about computer systems and devices in your network. 
You can define authentication profiles for the following protocols by: 
–Clicking on of the protocol tabs andclicking “New Credentials” on the left 
–Defining the credentials fields 
To display online documentation about a feature or function in a particular screen, click its Help (?) icon.
39 
© 2014 CA. ALL RIGHTS RESERVED. 
Discovery WizardRanges page 
The ranges page enables you to create or edit ranges. 
A range specifies the portions of the network where you want to discover devices. 
–You can also assign credentials to a range for use in discovery. 
–Ranges can be defined for specific discovery_agentprobes.
40 
© 2014 CA. ALL RIGHTS RESERVED. 
Discovery WizardSchedule page 
The Schedule page enables you to schedule a single discovery or recurring discoveries and to perform the run immediately, in the future, or both. 
A scheduled discovery does not interrupt a discovery that is already running. 
–If at the time a discovery run is scheduled another discovery run is in progress, the scheduled discovery is ignored. 
–If you select Run discovery now and a discovery is in progress, the current discovery run is terminated and the new run is executed.
41 
© 2014 CA. ALL RIGHTS RESERVED. 
Discovery Results 
The Inventory node in the tree view of USM enables you to view computers and devices that have been discovered on your network 
The Inventory section of the tree contains discovery agents, with network ranges under each discovery agent.
42 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 1 Exercise 
In the following lab exercise, you will: 
Discover the local subnet using the Discovery Wizard See lab 1-1 Discover the Local Subnet Using the Discovery Wizard.
43 
© 2014 CA. ALL RIGHTS RESERVED. 
Automatic Robot Deployment 
As a CA Unified Infrastructure Management administrator, you can use USM to deploy robots automatically to an individual system or group of systems. 
Specifically, you can: 
–Deploy robots to all or selected members of a group 
–Deploy a robot to a specific system 
–Do a basic or advanced search for systems to deploy robots to 
–Import an XML file listing systems to deploy robots to 
After you select the systems and start a deployment job, robots are automatically installed on the selected systems.
44 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 1 Exercise 
In the following lab exercise, you will: 
Deploy a robot using the ADESee lab 1-2 Deploy a Robot Using the ADE.
45 
© 2014 CA. ALL RIGHTS RESERVED. 
Module 1 Summary 
You should now be able to: Apply monitoring governance to fulfill your monitoring requirementsIdentify the key components of CA Unified Infrastructure ManagementPerform a network discovery 
In the next module, you will: Configure basic data monitoring
Module 2: Configure Basic Data Monitoring
47 
© 2014 CA. ALL RIGHTS RESERVED. 
Module Objectives 
After completing this module, you will be able to: 
Identify the types of data to monitor 
Complete basic probe deployment and configuration tasks 
Create USM groups 
Why you need to know: 
By identifying the types of data you can monitor, you will gain a high-level understanding of the data monitoring scope of the product. 
You must deploy and configure probes to enable event and performance monitoring on robots. 
You can use groups to organize your infrastructure by location, technology, or even a service
49 
© 2014 CA. ALL RIGHTS RESERVED. 
Types of Data to Monitor 
You can monitor the following types of data with CA UIM: Performance and trend data 
•Many probes are capable of sending performance and trend data on a periodic basis in messages that are formatted and known as QoSmessages. 
•These messages normally contain data—response times, network availability, CPU usage, memory usage, bandwidth utilization, and so on—used for service-level monitoring and reporting. Events and alarms 
•An event is a known or existing issue or the result of a failure or error in the IT object or device that causes, or might cause, an interruption or a reduction of the quality of the service. 
•You can configure events to trigger an alarm. 
By identifying the types of data you can monitor, you will gain a high-level understanding of the data monitoring scope of the product.
50 
© 2014 CA. ALL RIGHTS RESERVED. 
Class Question 
A router failure has been fixed and you are now using CA UIM to track bandwidth utilization. What are you monitoring? 
Events 
A 
Alarms 
B 
Router failure 
C 
Performance and trend data 
D
51 
© 2014 CA. ALL RIGHTS RESERVED. 
Package Archive 
The Package Archive encompasses the Local Archive and the Web Archive, from which you deploy probes to robots. Local Archive 
•This archive resides on the hub, therefore the list will be the same for all robots connected to the hub. 
•There can be more than one version of a package on the local archive. Web Archive 
•Displays the list of probe packages on the CA UIM support archive. 
•You must have a valid login and password for the CA UIM support site to download any package. 
You must deploy and configure probes to enable event and performance monitoring on robots.
52 
© 2014 CA. ALL RIGHTS RESERVED. 
Local Archive 
Package Archive 
The Local Archive shows all of the probe packages that have been downloaded to the local hub archive. 
You can deploy probes to robots from the local archive.
53 
© 2014 CA. ALL RIGHTS RESERVED. 
Web Archive 
Package Archive 
The Web Archive shows all of the probe packages that can be downloaded from the CA UIM Support Site. 
If you deploy a package from the Web Archive, it is first automatically downloaded to the Local Archive before it is deployed to the robot.
54 
© 2014 CA. ALL RIGHTS RESERVED. 
Distribution Activity Tab 
Package Archive 
The Distribution Activity tab displays a log of your probe package distributions along with the status of each distribution. 
Packages can be deployed individually or in groups.
55 
© 2014 CA. ALL RIGHTS RESERVED. 
Probe Deployment 
Deploy probes by dragging the probe from the archive to a robot. The target can be an individual robot, a hub, the domain, or an Infrastructure Manager group (shown in a later module). When a probe is dropped on a hub, domain, or group, the probe is deployed to applicable subordinate robots. 
You drag a probe from the local archive…. 
and drop it onto the target.
56 
© 2014 CA. ALL RIGHTS RESERVED. 
Probe Configuration 
Once a probe has been deployed, it will need to be configured. 
When a object node is selected in the left-hand pane, you can configure thresholds, severity, and enable the Publishing of QoSdata on the right-hand pane.
57 
© 2014 CA. ALL RIGHTS RESERVED. 
USM Groups 
Administrators can create groups—lists of computer systems—to logically manage and to assign report templates to multiple computer systems. 
There are three types of groups: Container 
•Is a parent to other groupsDynamic 
•Contains the computer systems that meet a specified set of criteriaStatic 
•Contains a specified list of computer systems 
You can use groups to organize your infrastructure by location, technology, or even a service.
58 
© 2014 CA. ALL RIGHTS RESERVED. 
USM Tree View 
The USM tree view displays groups in a hierarchical tree in the navigation pane on the left. A status icon indicates the highest severity alarm for each node in the tree. The number of systems in each group is indicated in parentheses after the group name. 
Detailed information about groups, alarms, or systems is displayed in the pane on the right. 
As you mouseover a tree item, an icon appears that enables you to add, edit, or delete groups. 
For more information about how to visualize and organize your infrastructure and to configure monitoring, click the ? icon.
59 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 2 Exercises 
In the following lab exercises, you will: Deploy and Configure the CDM ProbeSee lab 2-1 Deploy and Configure the CDM Probe. Create USM groups See lab 2-2 Create USM Groups. Add a USM report templateSee lab 2-3 Add a USM Report Template.
60 
© 2014 CA. ALL RIGHTS RESERVED. 
Module 2 Summary 
This module showed you how to: Identify the types of data to monitorComplete basic probe deployment and configuration tasksCreate USM groups 
In the next module, you will: Examine monitored data
Module 3: Examine Monitored Data
62 
© 2014 CA. ALL RIGHTS RESERVED. 
Module Objectives 
After completing this module, you will be able to: View monitored data Examine monitored data in a PRD chart 
Why you need to know: By examining monitored data in the USM and Unified Dashboards, you can understand how to view information on infrastructure objects. By examining monitored data in PRD charts, you can see a visual representation of QoS data.
63 
© 2014 CA. ALL RIGHTS RESERVED. 
Viewing Monitored Data 
CA Unified Infrastructure Management offers built-in and easily customizable views to help you spot trends, optimize resource utilization, and more. 
To provide some examples of data in the UMP, you will view data in the following portlets: Device, alarm, metric, and group data in the USMServers in the Unified Dashboards 
By examining monitored data in the USM and Unified Dashboards, you can understand how to view information on infrastructure objects.
64 
© 2014 CA. ALL RIGHTS RESERVED. 
USM Devices 
Viewing Monitored Data 
When you select a device in the navigation pane, you can view a variety of QoS data. 
To view the alarm for a device, you can click the Alarms icon or the Alarms tab.
65 
© 2014 CA. ALL RIGHTS RESERVED. 
Alarms for USM Devices 
Viewing Monitored Data 
The Alarms tab enables you to view the details, history, and metrics of an alarm for a device or groups of devices. 
To view details, history, and metrics about an alarm, you click the More button. 
The Actions menu provides available alarm actions.
66 
© 2014 CA. ALL RIGHTS RESERVED. 
Alarm View 
Viewing Monitored Data 
The Alarm View The alarm view displays all current alarms, including those that are not associated with a group or a system.
67 
© 2014 CA. ALL RIGHTS RESERVED. 
Metrics and Groups for USM Devices 
Viewing Monitored Data 
You can view additional information from the Metrics and Groups tabs.
68 
© 2014 CA. ALL RIGHTS RESERVED. 
Servers in the Unified Dashboards Portlet 
Viewing Monitored Data 
The Unified Dashboards portlets displays a variety of metrics. 
To view the drilldown report for a metric, you double-click its metric. 
To view the drilldown report for a server for a particular metric, you click its name.
69 
© 2014 CA. ALL RIGHTS RESERVED. 
Drilldown Reports Generated in the Unified Dashboards Portlet 
Viewing Monitored Data 
The following screenshots are examples of drilldown reports you can generate:
70 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 3 Exercise 
In the following lab exercise, you will: Examine monitored dataSee lab 3-1 Examine Monitored Data.
71 
© 2014 CA. ALL RIGHTS RESERVED. 
PRD Chart 
With a PRD chart, you can display multiple measurements on a single chart and can view multiple charts at a time. 
To begin creating a PRD chart, you click Design Performance Reports Designer. 
By examining monitored data in PRD charts, you can see a visual representation of QoS data.
72 
© 2014 CA. ALL RIGHTS RESERVED. 
Creating a PRD Chart 
To create a PRD chart, you include the host, QoS measurement, target, and time range. 
include a metric for a particular target, you drag its target into the lower pane. 
To include a metric for a particular target, you drag its target into the lower pane.
73 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 3 Exercise 
In the following lab exercise, you will: Create a PRD chartSee lab 3-2 Create a PRD Chart.
74 
© 2014 CA. ALL RIGHTS RESERVED. 
Module 3 Summary 
This module showed you how to: View monitored data Examine monitored data in a PRD chart 
In the next module, you will: Perform advanced configurations: secondary hub
Module 4: Advanced Configurations: Secondary Hub
76 
© 2014 CA. ALL RIGHTS RESERVED. 
Module Objectives 
After completing this module, you will be able to: Plan hub-to-hub communicationsImplement hub-to-hub communications 
Why you need to know: You need to properly plan hub-to-hub communication to ensure that it fulfills the objective. To properly scale CA Unified Infrastructure Management, you need to deploy additional hubs and implement hub-to-hub communications.
77 
© 2014 CA. ALL RIGHTS RESERVED. 
Plan Hub-to-Hub Communications 
To plan hub-to-hub communications: 
1.Decide on a network communication method: 
•Basic: Broadcast, simple network connection, no problems or block 
•Minimal: Static hubs, for traversing subnet breaks 
•Advanced: Hub-to-hub tunnels, firewalls, WAN, DMZ, and so on 
2.Decide on a queue method: 
•Post: Less setup, fast and efficient, but no acknowledgment of delivery 
•Get/attach: Additional overhead, greater efficacy 
You need to properly plan hub-to-hub communication to ensure that it fulfills the objective.
78 
© 2014 CA. ALL RIGHTS RESERVED. 
Purpose of Secondary Hubs 
Secondary hubs can be used to group robots according to function, geographical location, departmental code, or other criteria. Although secondary hubs are optional, almost all deployments have them. 
To properly scale CA UIM, you need to deploy additional hubs and implementhub-to-hub communications. 
Servers with Robots 
Primary Hub 
Data Repository 
Secondary Hub 
Irvine Data Center 
Robot-to-hub Primary 
Robot-to-hub Secondary 
Hub-to-hubCommunication
79 
© 2014 CA. ALL RIGHTS RESERVED. 
Advanced deploymentAdditional Hub-to-Hub Communication Factors 
Hub limits for tunnels/subscribersWe recommended 25 to 50 for Windows-based systems and 50 to 100 for UNIX-based systems 
•Subscriber limits will depend on your combination of queues and tunnels. 
•When you mix and match, you can exceed the number of queues but you need to reduce the number of tunnels, or the reverse. 
•In practice, the limits on the tunnels are most important. 
Redundancy concernsMake sure a failover does not exceed the recommended number of subscribers. 
Queue subjects/bulk sizingMatch queue needs, whether split or combined, with subscriber limits. Leave bulk sizing at the default configuration until you are presented with a problem such as a queue that is not clearing.
81 
© 2014 CA. ALL RIGHTS RESERVED. 
Lab 4 Exercises 
In the following lab exercises, you will: Deploy a secondary hub See lab 4-1 Deploy a Secondary Hub.
85 
© 2014 CA. ALL RIGHTS RESERVED. 
Module 4 Summary 
This module showed you how to: Plan hub-to-hub communicationsImplement hub-to-hub communications
86 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about DevOps, please visit: 
http://bit.ly/1wbjjqX 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
DevOps
87 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty.Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation

More Related Content

What's hot

Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusCA Technologies
 
What's New in CA Service Management
What's New in CA Service ManagementWhat's New in CA Service Management
What's New in CA Service ManagementCA Technologies
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...CA Technologies
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10CA Technologies
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesCA Technologies
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
 
How National Australia Bank (NAB) used CA APM during performance testing to i...
How National Australia Bank (NAB) used CA APM during performance testing to i...How National Australia Bank (NAB) used CA APM during performance testing to i...
How National Australia Bank (NAB) used CA APM during performance testing to i...CA Technologies
 
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...CA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Technologies
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceCA Technologies
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)CA Technologies
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Min Fang
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)CA Technologies
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
 
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...Extra Technology
 
Con-way Case Study: Optimizing Application Integration Software Development L...
Con-way Case Study: Optimizing Application Integration Software Development L...Con-way Case Study: Optimizing Application Integration Software Development L...
Con-way Case Study: Optimizing Application Integration Software Development L...CA Technologies
 
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...CA Technologies
 
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsHands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsCA Technologies
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned WayCA Technologies
 

What's hot (20)

Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From Olympus
 
What's New in CA Service Management
What's New in CA Service ManagementWhat's New in CA Service Management
What's New in CA Service Management
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service Providers
 
How National Australia Bank (NAB) used CA APM during performance testing to i...
How National Australia Bank (NAB) used CA APM during performance testing to i...How National Australia Bank (NAB) used CA APM during performance testing to i...
How National Australia Bank (NAB) used CA APM during performance testing to i...
 
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database Experience
 
Lisa
LisaLisa
Lisa
 
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)
Maximizing Your CA IDMS™ Investment for the New Application Economy (Part 1)
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
 
Con-way Case Study: Optimizing Application Integration Software Development L...
Con-way Case Study: Optimizing Application Integration Software Development L...Con-way Case Study: Optimizing Application Integration Software Development L...
Con-way Case Study: Optimizing Application Integration Software Development L...
 
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
 
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsHands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned Way
 

Viewers also liked

Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...CA Technologies
 
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...CA Technologies
 
CA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHACA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHAATUL JHA
 
Ca uim overview
Ca uim overviewCa uim overview
Ca uim overviewBevis Chen
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...CA Technologies
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
CA Spectrum 9.4.1 Features and Enhancements
CA Spectrum 9.4.1 Features and EnhancementsCA Spectrum 9.4.1 Features and Enhancements
CA Spectrum 9.4.1 Features and Enhancementsvijay gonela
 
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)옥시즌
 
Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...CA Technologies
 
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementHands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementCA Technologies
 

Viewers also liked (11)

Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
 
CA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHACA-UIM_Certification_8_X_ATUL_JHA
CA-UIM_Certification_8_X_ATUL_JHA
 
Ca uim overview
Ca uim overviewCa uim overview
Ca uim overview
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
CA Spectrum 9.4.1 Features and Enhancements
CA Spectrum 9.4.1 Features and EnhancementsCA Spectrum 9.4.1 Features and Enhancements
CA Spectrum 9.4.1 Features and Enhancements
 
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
제품소개서 - NotiAlarmUIM (CA UIM 솔루션 연계)
 
Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...Case Study: University of California Office of the President Studies Front En...
Case Study: University of California Office of the President Studies Front En...
 
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure ManagementHands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: Integrate CA Spectrum® and CA Unified Infrastructure Management
 

Similar to Pre-Con Education: What Is CA Unified Infrastructure Management and what's new in version 8.0

Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...CA Technologies
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...CA Technologies
 
CA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksCA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksNiamh Cahill
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010ARC Advisory Group
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld
 
Hybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does ItHybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does ItRightScale
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...CA Technologies
 
ClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCMClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCMIBM Rational software
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCA Technologies
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...InfoSeption
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHewlett-Packard
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...CA Technologies
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overviewAha Lin
 
Best Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsBest Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsProlifics
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Eduardo Patrocinio
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...SolarWinds
 

Similar to Pre-Con Education: What Is CA Unified Infrastructure Management and what's new in version 8.0 (20)

Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
 
CA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksCA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex Networks
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010
ARC's Dave Woll Process Automation Systems @ ARC Industry Forum 2010
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center
 
Hybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does ItHybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does It
 
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
 
ClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCMClearCase Version Importer - a migration tool to Rational Team Concert SCM
ClearCase Version Importer - a migration tool to Rational Team Concert SCM
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShare
 
Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...Hands-On Lab: Improve large network visibility and operational efficiency wit...
Hands-On Lab: Improve large network visibility and operational efficiency wit...
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overview
 
Best Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsBest Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and Applications
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Pre-Con Education: What Is CA Unified Infrastructure Management and what's new in version 8.0

  • 1. Pre-Con Education: What Is CA Unified Infrastructure Management (formerly known as CA Nimsoft Monitor) and what's new in version 8.0 Tim O’Connor, Kurt Spence, Robert Vacante OCX33E #CAWorld CA Technologies UIM Product Management ca Opscenter
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract If you are new to CA Unified Infrastructure Management (formerly known as CA NimsoftMonitor), please join us for this introductory session to learn more about this comprehensive monitoring solution. This session will cover the “basics” of CA Unified Infrastructure Management to help you build your knowledge on the general concepts, components and features that CA UIM offers. We will also cover the major features that are now available within our recent 8.0 release, including new analytics (“time to threshold” and “time over threshold”), reporting improvements (TopNand “At A Glance” reports) and more. Tim O’Connor Kurt Spence Robert Vacante CA Technologies Product Management
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Agenda MODULE 1: DESCRIBE CA UNIFIED INFRASTRUCTURE MANAGEMENT MODULE 2: CONFIGURE BASIC DATA MONITORING MODULE 3: EXAMINE MONITORED DATA MODULE 4: ADVANCED CONFIGURATIONS
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. Class Question Show of hands –how do you classify your business? SMB A Large Enterprise B Communication provider C Managed Service Provider D
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Class Question Show of hands –who is currently using UIM for monitoring, or other tools? UIM A Other B None C
  • 6. Module 1: Describe CA Unified Infrastructure Management
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. Module Objectives After completing this module, you will be able to: Consider monitoring governance to fulfill your monitoring requirements Identify the key components of CA Unified Infrastructure Management Perform a network discovery Why you need to know: By understanding the application of monitoring governance, you can optimally configure CA Unified Infrastructure Management to meet your specific business monitoring requirements. By identifying the key components, you will gain a high-level understanding of how the CA Unified Infrastructure Management logical and technical architecture is implemented, and then be enabled to quickly begin to collect performance data and events—QoSand alarms—from your environment
  • 8. 9 © 2014 CA. ALL RIGHTS RESERVED. Monitoring Governance By understanding the application of monitoring governance, you can optimally configure CA Unified Infrastructure Management to meet your specific business monitoring requirements. What Do I Monitor? What Is Alarm Worthy? –Notification –Escalation –Remediation How Do I Manage All This? What Data do I Collect? –Frequency –Retention Any monitoring deployment solution presents a number of challenges.
  • 9. 10 © 2014 CA. ALL RIGHTS RESERVED. Monitoring Governance Approach Monitoring governance is a disciplined approach to what has all too often been an un-disciplined activity. –Start to think of monitoring as a service, whether it be for internal customers or the external customers of a service provider. –Stop relying on the out-of-the-box (OOTB) approach of simply turning on all thresholds and hoping to capture something meaningful. –Follow an intentional workshop-driven process to consider and plan the service that will be offered by monitoring. –The resultant monitoring should be specific, focused, and discrete. Prioritize customer value. –Align your approach with a service offering and service catalog. –Make it simple and easy to understand. Good, better, best Basic, advanced Bronze, silver, gold Focus on the valuethe customer gets from what you are monitoring, and not simply on what you are monitoring.
  • 10. 11 © 2014 CA. ALL RIGHTS RESERVED. Monitoring Governance Approach Continued Monitoring governance specifies the: –Resources that need to be monitored –Probes to use –Individual checkpoints to enable, and which metrics you will collect for that checkpoint –Alarm thresholds –Alarm management rules to enforce, if any
  • 11. 13 © 2014 CA. ALL RIGHTS RESERVED. Monitoring Best Practices Do not “boil the ocean” by drifting into an unnecessarily difficult approach. Avoid the temptation to use the full capabilities available if you do not need them. Instead: –Take an iterative product-release approach –Increase customer value –Focus on what is actionable –Use a baseline approach to monitoring instead of randomly-determined thresholds Adherence to the principles of monitoring governance will help to mitigate disastrous long-term effects, such as: –Large databases –Alarm floods –Users losing trust –Overall unmanageability of the system
  • 12. 14 © 2014 CA. ALL RIGHTS RESERVED. Stakeholders There are a number of roles with a stake in the monitoring governance framework: Each role benefits when you apply best practices. Stakeholder Benefits Provided CA UIM administrators –Reduced overall effort required to maintain the solution Service providers –Increased product confidence –Scalable service catalog-based monitoring infrastructure –Quicker time to market Infrastructure owner –Quality information regarding their infrastructure –Timely notices about issues and outages
  • 13. 15 © 2014 CA. ALL RIGHTS RESERVED. Logical ArchitectureHierarchy of Business Requirements and Inputs Application Commercial and Custom Server Physical and Virtual Database IT and Business Business Service Management Service Levels End User Response Time Performance and Availability Events CMDB Service Desk CA CSM Service-Now Atrium Microsoft Excel BMCHPIBMCANovell/Managed Objects CA CSM Service-Now HP Service Desk HP Service Manager CA Service Desk Remedy ARS Salesforce.com FrontRange/HEAT Cloud Public and Private Network LAN and WAN
  • 14. 16 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureSystem Architecture for an On-site Deployment The following diagram represents the implementation of the CA Unified Infrastructure Management system architecture to meet your on-site monitoring requirements.
  • 15. 17 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureProbes A probe is software that performs a dedicated task at the bottom of the hierarchy. –A probe must be deployed to a robot.
  • 16. 18 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureRobots A robot is installed on each computer you want to monitor and manages probes. –A robot is known in other monitoring solutions as an agent.
  • 17. 19 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureHubs A hub is a robot that has additional responsibilities, which includes managing its robots.
  • 18. 20 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureDomain The domain is a logical set into which all infrastructure components are grouped. –In CA Unified Infrastructure Management, there is typically only one domain.
  • 19. 21 © 2014 CA. ALL RIGHTS RESERVED. Technical ArchitectureSystem Architecture for On-site and Remote Deployments The following diagram represents the implementation of the CA Unified Infrastructure Management system architecture to meet your enterprise monitoring requirements. UIM Message Bus
  • 20. 23 © 2014 CA. ALL RIGHTS RESERVED. Message FlowMessage Bus The message bus provides a set of services to robots, hubs, database, and management consoles. The message flow on the bus is managed using routing and naming schemes based on request/response and publish/subscribe models: Request/responseis the standard way of communicating over the network. A client issues a request to a server and the server responds to the request. Publish/subscribeenables clients to send data—such as alerts, performance data, or messages targeted for gateway servers—without a designated receiver. It also enables clients to select messages based on subject. The subscribe mechanism enables probes and robots to select messages based on subject rather than on sender address. A client that is configured to receive messages sends a subscribe request to the hub. The client then receives messages matching the subscribed subjects from the hub.
  • 21. 24 © 2014 CA. ALL RIGHTS RESERVED. Message FlowMessage Queues Message queues transfer messages to and from hubs. Permanent queues are stored in the local hub database and survive a hub restart. This type of queue ensures that messages are delivered even if the receiver is down when a message is generated. Temporary queues are used for less-critical communication paths. Queues are set up in two ways: Automatically Queues are often a transparent part of the infrastructure. Permanent queues are set up between hubs during installation while temporary queues are created as needed. Manually You can create queues with Infrastructure Manager. For example, if you have multiple secondary hubs, you need to create queues to send data to the primary hub.
  • 22. 26 © 2014 CA. ALL RIGHTS RESERVED. CA Unified Infrastructure Management Management Example of an Enterprise Monitoring Solution Domain
  • 23. 27 © 2014 CA. ALL RIGHTS RESERVED. Key Components of CA Unified Infrastructure Management Interfaces CA Unified Infrastructure Management consists of the following interfaces: •Admin Console: A web-based interface to distribute and configure probes •Infrastructure Manager: The traditional CA Unified Infrastructure Management interface •UMP (Unified Management Portal): A web interface providing a variety of portlets, reports, and dashboards for consuming data, including: •Unified Services Manager (USM) •List Views and Performance Reports •NetFlow •Unified Reporter: A full-featured, embedded business intelligence (BI) tool with advanced reporting capabilities By identifying the key components, you will gain a high-level understanding of how the logical and technical architecture is implemented.
  • 24. 28 © 2014 CA. ALL RIGHTS RESERVED. The Admin Console Primary interface for the management of your system. Navigation Pane Main Window Pane System Information
  • 25. 30 © 2014 CA. ALL RIGHTS RESERVED. Unified Monitoring PortalOverview UMP is the web interface for displaying and viewing data in your system. The portal is customizable and presents users with the information that is appropriate for their role.
  • 26. 31 © 2014 CA. ALL RIGHTS RESERVED. UMPAvailable Portlets Portletsare individual modular applications that are organized in the portal to present a custom view. UMP enables you to add many collaboration and monitoring portlets and other tools. Drag a portletfrom the Portlet list, such as List Viewer, and place it in the desired location on the UMP page.
  • 27. 32 © 2014 CA. ALL RIGHTS RESERVED. UMPAvailable Portlets continued In UMP, you can configure, minimize, maximize, and remove portlets. These tools enable you to configure, minimize, maximize, and remove a portlet.
  • 28. 34 © 2014 CA. ALL RIGHTS RESERVED. Benefits of Discovery Discovery is the primary method to reduce manual effort while maintaining an inventory of devices in your managed domain. –In CA Unified Infrastructure Management, you can enable device monitoring and management on these devices as required, engaging the broad array of probes that gather QoS data from the monitored devices and generate alarms in response to threshold breaches. –Components in the CA Unified Infrastructure Management Server automate the discovery of hosts and devices throughout your network, recording any device within a discovery range that responds to a request on any configured protocol, including SSH, WMI, SNMP, and even a simple ICMP ping. CA Unified Infrastructure Management enables you to quickly begin to collect performance data and events—QoS and alarms—from your environment.
  • 29. 37 © 2014 CA. ALL RIGHTS RESERVED. Discovery WizardOverview Use the Discovery Wizard to set up the automated discovery of network devices.
  • 30. 38 © 2014 CA. ALL RIGHTS RESERVED. Discovery WizardAuthentication page The Authentication tabs enable you to create, edit, view, and delete authentication profiles (credentials) for discovery. An authentication profile contains credentials necessary for the discovery_agent probe to access and gather information about computer systems and devices in your network. You can define authentication profiles for the following protocols by: –Clicking on of the protocol tabs andclicking “New Credentials” on the left –Defining the credentials fields To display online documentation about a feature or function in a particular screen, click its Help (?) icon.
  • 31. 39 © 2014 CA. ALL RIGHTS RESERVED. Discovery WizardRanges page The ranges page enables you to create or edit ranges. A range specifies the portions of the network where you want to discover devices. –You can also assign credentials to a range for use in discovery. –Ranges can be defined for specific discovery_agentprobes.
  • 32. 40 © 2014 CA. ALL RIGHTS RESERVED. Discovery WizardSchedule page The Schedule page enables you to schedule a single discovery or recurring discoveries and to perform the run immediately, in the future, or both. A scheduled discovery does not interrupt a discovery that is already running. –If at the time a discovery run is scheduled another discovery run is in progress, the scheduled discovery is ignored. –If you select Run discovery now and a discovery is in progress, the current discovery run is terminated and the new run is executed.
  • 33. 41 © 2014 CA. ALL RIGHTS RESERVED. Discovery Results The Inventory node in the tree view of USM enables you to view computers and devices that have been discovered on your network The Inventory section of the tree contains discovery agents, with network ranges under each discovery agent.
  • 34. 42 © 2014 CA. ALL RIGHTS RESERVED. Lab 1 Exercise In the following lab exercise, you will: Discover the local subnet using the Discovery Wizard See lab 1-1 Discover the Local Subnet Using the Discovery Wizard.
  • 35. 43 © 2014 CA. ALL RIGHTS RESERVED. Automatic Robot Deployment As a CA Unified Infrastructure Management administrator, you can use USM to deploy robots automatically to an individual system or group of systems. Specifically, you can: –Deploy robots to all or selected members of a group –Deploy a robot to a specific system –Do a basic or advanced search for systems to deploy robots to –Import an XML file listing systems to deploy robots to After you select the systems and start a deployment job, robots are automatically installed on the selected systems.
  • 36. 44 © 2014 CA. ALL RIGHTS RESERVED. Lab 1 Exercise In the following lab exercise, you will: Deploy a robot using the ADESee lab 1-2 Deploy a Robot Using the ADE.
  • 37. 45 © 2014 CA. ALL RIGHTS RESERVED. Module 1 Summary You should now be able to: Apply monitoring governance to fulfill your monitoring requirementsIdentify the key components of CA Unified Infrastructure ManagementPerform a network discovery In the next module, you will: Configure basic data monitoring
  • 38. Module 2: Configure Basic Data Monitoring
  • 39. 47 © 2014 CA. ALL RIGHTS RESERVED. Module Objectives After completing this module, you will be able to: Identify the types of data to monitor Complete basic probe deployment and configuration tasks Create USM groups Why you need to know: By identifying the types of data you can monitor, you will gain a high-level understanding of the data monitoring scope of the product. You must deploy and configure probes to enable event and performance monitoring on robots. You can use groups to organize your infrastructure by location, technology, or even a service
  • 40. 49 © 2014 CA. ALL RIGHTS RESERVED. Types of Data to Monitor You can monitor the following types of data with CA UIM: Performance and trend data •Many probes are capable of sending performance and trend data on a periodic basis in messages that are formatted and known as QoSmessages. •These messages normally contain data—response times, network availability, CPU usage, memory usage, bandwidth utilization, and so on—used for service-level monitoring and reporting. Events and alarms •An event is a known or existing issue or the result of a failure or error in the IT object or device that causes, or might cause, an interruption or a reduction of the quality of the service. •You can configure events to trigger an alarm. By identifying the types of data you can monitor, you will gain a high-level understanding of the data monitoring scope of the product.
  • 41. 50 © 2014 CA. ALL RIGHTS RESERVED. Class Question A router failure has been fixed and you are now using CA UIM to track bandwidth utilization. What are you monitoring? Events A Alarms B Router failure C Performance and trend data D
  • 42. 51 © 2014 CA. ALL RIGHTS RESERVED. Package Archive The Package Archive encompasses the Local Archive and the Web Archive, from which you deploy probes to robots. Local Archive •This archive resides on the hub, therefore the list will be the same for all robots connected to the hub. •There can be more than one version of a package on the local archive. Web Archive •Displays the list of probe packages on the CA UIM support archive. •You must have a valid login and password for the CA UIM support site to download any package. You must deploy and configure probes to enable event and performance monitoring on robots.
  • 43. 52 © 2014 CA. ALL RIGHTS RESERVED. Local Archive Package Archive The Local Archive shows all of the probe packages that have been downloaded to the local hub archive. You can deploy probes to robots from the local archive.
  • 44. 53 © 2014 CA. ALL RIGHTS RESERVED. Web Archive Package Archive The Web Archive shows all of the probe packages that can be downloaded from the CA UIM Support Site. If you deploy a package from the Web Archive, it is first automatically downloaded to the Local Archive before it is deployed to the robot.
  • 45. 54 © 2014 CA. ALL RIGHTS RESERVED. Distribution Activity Tab Package Archive The Distribution Activity tab displays a log of your probe package distributions along with the status of each distribution. Packages can be deployed individually or in groups.
  • 46. 55 © 2014 CA. ALL RIGHTS RESERVED. Probe Deployment Deploy probes by dragging the probe from the archive to a robot. The target can be an individual robot, a hub, the domain, or an Infrastructure Manager group (shown in a later module). When a probe is dropped on a hub, domain, or group, the probe is deployed to applicable subordinate robots. You drag a probe from the local archive…. and drop it onto the target.
  • 47. 56 © 2014 CA. ALL RIGHTS RESERVED. Probe Configuration Once a probe has been deployed, it will need to be configured. When a object node is selected in the left-hand pane, you can configure thresholds, severity, and enable the Publishing of QoSdata on the right-hand pane.
  • 48. 57 © 2014 CA. ALL RIGHTS RESERVED. USM Groups Administrators can create groups—lists of computer systems—to logically manage and to assign report templates to multiple computer systems. There are three types of groups: Container •Is a parent to other groupsDynamic •Contains the computer systems that meet a specified set of criteriaStatic •Contains a specified list of computer systems You can use groups to organize your infrastructure by location, technology, or even a service.
  • 49. 58 © 2014 CA. ALL RIGHTS RESERVED. USM Tree View The USM tree view displays groups in a hierarchical tree in the navigation pane on the left. A status icon indicates the highest severity alarm for each node in the tree. The number of systems in each group is indicated in parentheses after the group name. Detailed information about groups, alarms, or systems is displayed in the pane on the right. As you mouseover a tree item, an icon appears that enables you to add, edit, or delete groups. For more information about how to visualize and organize your infrastructure and to configure monitoring, click the ? icon.
  • 50. 59 © 2014 CA. ALL RIGHTS RESERVED. Lab 2 Exercises In the following lab exercises, you will: Deploy and Configure the CDM ProbeSee lab 2-1 Deploy and Configure the CDM Probe. Create USM groups See lab 2-2 Create USM Groups. Add a USM report templateSee lab 2-3 Add a USM Report Template.
  • 51. 60 © 2014 CA. ALL RIGHTS RESERVED. Module 2 Summary This module showed you how to: Identify the types of data to monitorComplete basic probe deployment and configuration tasksCreate USM groups In the next module, you will: Examine monitored data
  • 52. Module 3: Examine Monitored Data
  • 53. 62 © 2014 CA. ALL RIGHTS RESERVED. Module Objectives After completing this module, you will be able to: View monitored data Examine monitored data in a PRD chart Why you need to know: By examining monitored data in the USM and Unified Dashboards, you can understand how to view information on infrastructure objects. By examining monitored data in PRD charts, you can see a visual representation of QoS data.
  • 54. 63 © 2014 CA. ALL RIGHTS RESERVED. Viewing Monitored Data CA Unified Infrastructure Management offers built-in and easily customizable views to help you spot trends, optimize resource utilization, and more. To provide some examples of data in the UMP, you will view data in the following portlets: Device, alarm, metric, and group data in the USMServers in the Unified Dashboards By examining monitored data in the USM and Unified Dashboards, you can understand how to view information on infrastructure objects.
  • 55. 64 © 2014 CA. ALL RIGHTS RESERVED. USM Devices Viewing Monitored Data When you select a device in the navigation pane, you can view a variety of QoS data. To view the alarm for a device, you can click the Alarms icon or the Alarms tab.
  • 56. 65 © 2014 CA. ALL RIGHTS RESERVED. Alarms for USM Devices Viewing Monitored Data The Alarms tab enables you to view the details, history, and metrics of an alarm for a device or groups of devices. To view details, history, and metrics about an alarm, you click the More button. The Actions menu provides available alarm actions.
  • 57. 66 © 2014 CA. ALL RIGHTS RESERVED. Alarm View Viewing Monitored Data The Alarm View The alarm view displays all current alarms, including those that are not associated with a group or a system.
  • 58. 67 © 2014 CA. ALL RIGHTS RESERVED. Metrics and Groups for USM Devices Viewing Monitored Data You can view additional information from the Metrics and Groups tabs.
  • 59. 68 © 2014 CA. ALL RIGHTS RESERVED. Servers in the Unified Dashboards Portlet Viewing Monitored Data The Unified Dashboards portlets displays a variety of metrics. To view the drilldown report for a metric, you double-click its metric. To view the drilldown report for a server for a particular metric, you click its name.
  • 60. 69 © 2014 CA. ALL RIGHTS RESERVED. Drilldown Reports Generated in the Unified Dashboards Portlet Viewing Monitored Data The following screenshots are examples of drilldown reports you can generate:
  • 61. 70 © 2014 CA. ALL RIGHTS RESERVED. Lab 3 Exercise In the following lab exercise, you will: Examine monitored dataSee lab 3-1 Examine Monitored Data.
  • 62. 71 © 2014 CA. ALL RIGHTS RESERVED. PRD Chart With a PRD chart, you can display multiple measurements on a single chart and can view multiple charts at a time. To begin creating a PRD chart, you click Design Performance Reports Designer. By examining monitored data in PRD charts, you can see a visual representation of QoS data.
  • 63. 72 © 2014 CA. ALL RIGHTS RESERVED. Creating a PRD Chart To create a PRD chart, you include the host, QoS measurement, target, and time range. include a metric for a particular target, you drag its target into the lower pane. To include a metric for a particular target, you drag its target into the lower pane.
  • 64. 73 © 2014 CA. ALL RIGHTS RESERVED. Lab 3 Exercise In the following lab exercise, you will: Create a PRD chartSee lab 3-2 Create a PRD Chart.
  • 65. 74 © 2014 CA. ALL RIGHTS RESERVED. Module 3 Summary This module showed you how to: View monitored data Examine monitored data in a PRD chart In the next module, you will: Perform advanced configurations: secondary hub
  • 66. Module 4: Advanced Configurations: Secondary Hub
  • 67. 76 © 2014 CA. ALL RIGHTS RESERVED. Module Objectives After completing this module, you will be able to: Plan hub-to-hub communicationsImplement hub-to-hub communications Why you need to know: You need to properly plan hub-to-hub communication to ensure that it fulfills the objective. To properly scale CA Unified Infrastructure Management, you need to deploy additional hubs and implement hub-to-hub communications.
  • 68. 77 © 2014 CA. ALL RIGHTS RESERVED. Plan Hub-to-Hub Communications To plan hub-to-hub communications: 1.Decide on a network communication method: •Basic: Broadcast, simple network connection, no problems or block •Minimal: Static hubs, for traversing subnet breaks •Advanced: Hub-to-hub tunnels, firewalls, WAN, DMZ, and so on 2.Decide on a queue method: •Post: Less setup, fast and efficient, but no acknowledgment of delivery •Get/attach: Additional overhead, greater efficacy You need to properly plan hub-to-hub communication to ensure that it fulfills the objective.
  • 69. 78 © 2014 CA. ALL RIGHTS RESERVED. Purpose of Secondary Hubs Secondary hubs can be used to group robots according to function, geographical location, departmental code, or other criteria. Although secondary hubs are optional, almost all deployments have them. To properly scale CA UIM, you need to deploy additional hubs and implementhub-to-hub communications. Servers with Robots Primary Hub Data Repository Secondary Hub Irvine Data Center Robot-to-hub Primary Robot-to-hub Secondary Hub-to-hubCommunication
  • 70. 79 © 2014 CA. ALL RIGHTS RESERVED. Advanced deploymentAdditional Hub-to-Hub Communication Factors Hub limits for tunnels/subscribersWe recommended 25 to 50 for Windows-based systems and 50 to 100 for UNIX-based systems •Subscriber limits will depend on your combination of queues and tunnels. •When you mix and match, you can exceed the number of queues but you need to reduce the number of tunnels, or the reverse. •In practice, the limits on the tunnels are most important. Redundancy concernsMake sure a failover does not exceed the recommended number of subscribers. Queue subjects/bulk sizingMatch queue needs, whether split or combined, with subscriber limits. Leave bulk sizing at the default configuration until you are presented with a problem such as a queue that is not clearing.
  • 71. 81 © 2014 CA. ALL RIGHTS RESERVED. Lab 4 Exercises In the following lab exercises, you will: Deploy a secondary hub See lab 4-1 Deploy a Secondary Hub.
  • 72. 85 © 2014 CA. ALL RIGHTS RESERVED. Module 4 Summary This module showed you how to: Plan hub-to-hub communicationsImplement hub-to-hub communications
  • 73. 86 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about DevOps, please visit: http://bit.ly/1wbjjqX Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page DevOps
  • 74. 87 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty.Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation