SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
1 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
October 2015
© 2015 CA. All rights reserved.
CA Workload Automation
Agent Monitor r12 Overview
Bill Sherwin
Senior Principal Consultant
EMEA Workload Automation Team
2 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
CA Workload Automation Agent Monitor is designed to provide a focal point for real-
time information on all CA Workload Agents defined to any and all of the CA Workload
Automation solutions in use.
Key benefits include:
 Designed to improve application availability with simplified monitoring of WA Agent status
 Dashboard alerts and drill-down detail help minimise job delays and business disruption
 WA Agent Log download improves the efficiency of identifying failures and their cause
 Automatic discovery and population of WA Agent database simplifies implementation
 This First Release is available at no extra charge to any CA Workload Automation customer
CA Workload Automation Agent Monitor
3 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
 View and export details of configured agents
 View WA Agent Log Files
 Supported schedulers and their associated agents and plug-ins
– AutoSys 11.3.6 and above
– CA7 11.3, 12 and above
– dSeries 11.3 and above
– ESP 11.4 and above
 Supports EEM and LDAP authentication
 Agent Monitor web service
CA WLA Agent Monitor r12 – First Release
Server:
Windows 2012 Suse Linux 11
RHEL Linux V5 Suse Linux 12
RHEL Linux V6
RHEL Linux V7
Browser:
IE 10.0 and higher
Firefox 34 and higher
Chrome 38 and higher
4 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
CA WA Agent Monitor Architecture
CA7
ESP
dSeries
AutoSys
Agent Monitor
Agents
Scheduler’s agents and agent’s status
Log, system info
5 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Agent Monitor Dashboard
6 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Dashboard – Select Agents for Drill Down
7 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Filtered Active Agents View
8 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Filtered Inactive Agents View
9 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Customise Agent Filtered View
10 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Select Agent Entry for Actions
11 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Agents View – Action Export All
12 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Agent Export All Data
13 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Dashboard – Select Schedulers for Drill Down
14 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Filtered Active Schedulers View – Autosys
15 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Filtered Active Schedulers View – CA 7
16 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Customise Schedulers Filtered View
17 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Select Scheduler Entry for Actions
18 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Edit Scheduler Instance Definition – Autosys
19 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Edit Scheduler Instance Definition – CA 7
20 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
CA WLA Agent Management
Under Consideration
 Control – TBD
– Start and stop an agent
– Correlate with workload data
 last time job submitted, number jobs executed, etc
– Integration with other workload interfaces
 WCC, CA7 Web client
21 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
CA WLA Agent Management
Under Consideration
 Deploy - TBD
– Centralized management of agent and plug-in configuration data
 Create/Read/Update/Delete
– Automated and manual installation and removal of agents and plug-
ins
– Automated and manual upgrade and updates of agents and plug-ins
22 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
CA WLA Agent Management
Under Consideration
 Analytics - TBD
– Historical, trends
– Predictive, planning
 Automation - TBD
– Rules
23 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
 Not a product so currently must be requested via form
CA WA Agent Monitor Download Request
CA Support Product Home Page
24 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
 Helps reduce the cost and
complexity of managing WA Agents
running mission critical workloads
 Improves application availability
and WA Agent visibility for all CA
WA solutions
 Reduces risk of business disruption
with real-time monitoring and drill-
down details
CA Workload Automation Agent Monitor
Summary of Benefits
25 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
EMEA Workload Automation Team Contacts
– Bill Sherwin
EMEA Workload Automation
Bill.Sherwin@ca.com
– Chris Elvin
EMEA MSC for WA
Chris.Elvin@ca.com
– Pascal Champenois
EMEA Workload Automation
Pascal.Champenois@ca.com
– Simon Pearson
EMEA MSC for WA
Simon.Pearson@ca.com
26 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.
Any Further Questions?

Contenu connexe

Tendances

Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...CA Technologies
 
Unicenter Autosys Job Management
Unicenter Autosys Job ManagementUnicenter Autosys Job Management
Unicenter Autosys Job ManagementVenkata Duvvuri
 
CA Workload Automation for IBM i
CA Workload Automation for IBM iCA Workload Automation for IBM i
CA Workload Automation for IBM iADC Austin Tech
 
CA Workload Automation r12 Test Drive
CA Workload Automation r12 Test DriveCA Workload Automation r12 Test Drive
CA Workload Automation r12 Test DriveCA Technologies
 
Automating Workload AE and DE; Agent Deployment and Configuration
Automating Workload AE and DE; Agent Deployment and ConfigurationAutomating Workload AE and DE; Agent Deployment and Configuration
Automating Workload AE and DE; Agent Deployment and ConfigurationCA Technologies
 
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!CA Technologies
 
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!CA Technologies
 
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...Extra Technology
 
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...Extra Technology
 
What's New in CA Service Management
What's New in CA Service ManagementWhat's New in CA Service Management
What's New in CA Service ManagementCA Technologies
 
Maintenance and Management Best Practices from Support
Maintenance and Management Best Practices from SupportMaintenance and Management Best Practices from Support
Maintenance and Management Best Practices from SupportCA | Automic Software
 
EBS 12.1 and 12.2 strategy-roadmap-given
EBS 12.1 and 12.2 strategy-roadmap-givenEBS 12.1 and 12.2 strategy-roadmap-given
EBS 12.1 and 12.2 strategy-roadmap-givenBerry Clemens
 
Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusCA Technologies
 
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
"Zero-Touch" Authentication: Consumer Trends That will Transform the EnterpriseCA Technologies
 
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2vasuballa
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep DiveCA Technologies
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Min Fang
 

Tendances (20)

Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
Practical Reporting for Effective Analytical Data Intelligence with CA Worklo...
 
Unicenter Autosys Job Management
Unicenter Autosys Job ManagementUnicenter Autosys Job Management
Unicenter Autosys Job Management
 
CA Workload Automation for IBM i
CA Workload Automation for IBM iCA Workload Automation for IBM i
CA Workload Automation for IBM i
 
CA Workload Automation r12 Test Drive
CA Workload Automation r12 Test DriveCA Workload Automation r12 Test Drive
CA Workload Automation r12 Test Drive
 
Automating Workload AE and DE; Agent Deployment and Configuration
Automating Workload AE and DE; Agent Deployment and ConfigurationAutomating Workload AE and DE; Agent Deployment and Configuration
Automating Workload AE and DE; Agent Deployment and Configuration
 
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!
Customer Case Study: CenterPoint Energy - How to achieve .0003 abends!
 
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
Goodbye Crontab, Hello CA Workload Automation DE - Verizon Style!
 
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...
The New Features and Enhancements in CA Workload Control Center (WCC) r11.4 S...
 
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...
WA CA 7 Edition r12 Database Conversion - CA Workload Automation Technology S...
 
What's New in CA Service Management
What's New in CA Service ManagementWhat's New in CA Service Management
What's New in CA Service Management
 
Automic Support Tips and Tricks
Automic Support Tips and TricksAutomic Support Tips and Tricks
Automic Support Tips and Tricks
 
Maintenance and Management Best Practices from Support
Maintenance and Management Best Practices from SupportMaintenance and Management Best Practices from Support
Maintenance and Management Best Practices from Support
 
EBS 12.1 and 12.2 strategy-roadmap-given
EBS 12.1 and 12.2 strategy-roadmap-givenEBS 12.1 and 12.2 strategy-roadmap-given
EBS 12.1 and 12.2 strategy-roadmap-given
 
Learn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From OlympusLearn the Secrets of Endpoint Management Proficiency From Olympus
Learn the Secrets of Endpoint Management Proficiency From Olympus
 
Lisa
LisaLisa
Lisa
 
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
"Zero-Touch" Authentication: Consumer Trends That will Transform the Enterprise
 
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2
OOW15 - Migrating and Managing Customizations for Oracle E-Business Suite 12.2
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep Dive
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013
 
Service Virtualization
Service VirtualizationService Virtualization
Service Virtualization
 

En vedette

En vedette (8)

Diksmuide infogids13
Diksmuide infogids13Diksmuide infogids13
Diksmuide infogids13
 
Question 4
Question 4Question 4
Question 4
 
Creating Management Summaries Using CA 7 Reports - CA Workload Automation Tec...
Creating Management Summaries Using CA 7 Reports - CA Workload Automation Tec...Creating Management Summaries Using CA 7 Reports - CA Workload Automation Tec...
Creating Management Summaries Using CA 7 Reports - CA Workload Automation Tec...
 
3rd general draft standard for bottled flavoured water ihwf chennai
3rd general draft standard for bottled flavoured water ihwf chennai3rd general draft standard for bottled flavoured water ihwf chennai
3rd general draft standard for bottled flavoured water ihwf chennai
 
Onderteken niet om_het_even_wat
Onderteken niet om_het_even_watOnderteken niet om_het_even_wat
Onderteken niet om_het_even_wat
 
Berr Industrial Construction
Berr Industrial ConstructionBerr Industrial Construction
Berr Industrial Construction
 
Abdul rahman cv
Abdul rahman cvAbdul rahman cv
Abdul rahman cv
 
Wegwijs gent informatiegids2014
Wegwijs gent informatiegids2014Wegwijs gent informatiegids2014
Wegwijs gent informatiegids2014
 

Similaire à CA Workload Automation Agent Monitor Overview - CA Workload Automation Technology Summit (WATS) 2015

Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...CA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashCA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made EasierCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...CA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital EconomyCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Technologies
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...CA Technologies
 

Similaire à CA Workload Automation Agent Monitor Overview - CA Workload Automation Technology Summit (WATS) 2015 (20)

Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
CA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Gen Exploration – What's New and Cool in Application Development
CA Gen Exploration – What's New and Cool in Application Development
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...
 

Dernier

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 

Dernier (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

CA Workload Automation Agent Monitor Overview - CA Workload Automation Technology Summit (WATS) 2015

  • 1. 1 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. October 2015 © 2015 CA. All rights reserved. CA Workload Automation Agent Monitor r12 Overview Bill Sherwin Senior Principal Consultant EMEA Workload Automation Team
  • 2. 2 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. CA Workload Automation Agent Monitor is designed to provide a focal point for real- time information on all CA Workload Agents defined to any and all of the CA Workload Automation solutions in use. Key benefits include:  Designed to improve application availability with simplified monitoring of WA Agent status  Dashboard alerts and drill-down detail help minimise job delays and business disruption  WA Agent Log download improves the efficiency of identifying failures and their cause  Automatic discovery and population of WA Agent database simplifies implementation  This First Release is available at no extra charge to any CA Workload Automation customer CA Workload Automation Agent Monitor
  • 3. 3 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.  View and export details of configured agents  View WA Agent Log Files  Supported schedulers and their associated agents and plug-ins – AutoSys 11.3.6 and above – CA7 11.3, 12 and above – dSeries 11.3 and above – ESP 11.4 and above  Supports EEM and LDAP authentication  Agent Monitor web service CA WLA Agent Monitor r12 – First Release Server: Windows 2012 Suse Linux 11 RHEL Linux V5 Suse Linux 12 RHEL Linux V6 RHEL Linux V7 Browser: IE 10.0 and higher Firefox 34 and higher Chrome 38 and higher
  • 4. 4 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. CA WA Agent Monitor Architecture CA7 ESP dSeries AutoSys Agent Monitor Agents Scheduler’s agents and agent’s status Log, system info
  • 5. 5 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Agent Monitor Dashboard
  • 6. 6 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Dashboard – Select Agents for Drill Down
  • 7. 7 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Filtered Active Agents View
  • 8. 8 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Filtered Inactive Agents View
  • 9. 9 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Customise Agent Filtered View
  • 10. 10 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Select Agent Entry for Actions
  • 11. 11 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Agents View – Action Export All
  • 12. 12 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Agent Export All Data
  • 13. 13 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Dashboard – Select Schedulers for Drill Down
  • 14. 14 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Filtered Active Schedulers View – Autosys
  • 15. 15 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Filtered Active Schedulers View – CA 7
  • 16. 16 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Customise Schedulers Filtered View
  • 17. 17 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Select Scheduler Entry for Actions
  • 18. 18 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Edit Scheduler Instance Definition – Autosys
  • 19. 19 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Edit Scheduler Instance Definition – CA 7
  • 20. 20 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. CA WLA Agent Management Under Consideration  Control – TBD – Start and stop an agent – Correlate with workload data  last time job submitted, number jobs executed, etc – Integration with other workload interfaces  WCC, CA7 Web client
  • 21. 21 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. CA WLA Agent Management Under Consideration  Deploy - TBD – Centralized management of agent and plug-in configuration data  Create/Read/Update/Delete – Automated and manual installation and removal of agents and plug- ins – Automated and manual upgrade and updates of agents and plug-ins
  • 22. 22 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. CA WLA Agent Management Under Consideration  Analytics - TBD – Historical, trends – Predictive, planning  Automation - TBD – Rules
  • 23. 23 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.  Not a product so currently must be requested via form CA WA Agent Monitor Download Request CA Support Product Home Page
  • 24. 24 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution.  Helps reduce the cost and complexity of managing WA Agents running mission critical workloads  Improves application availability and WA Agent visibility for all CA WA solutions  Reduces risk of business disruption with real-time monitoring and drill- down details CA Workload Automation Agent Monitor Summary of Benefits
  • 25. 25 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. EMEA Workload Automation Team Contacts – Bill Sherwin EMEA Workload Automation Bill.Sherwin@ca.com – Chris Elvin EMEA MSC for WA Chris.Elvin@ca.com – Pascal Champenois EMEA Workload Automation Pascal.Champenois@ca.com – Simon Pearson EMEA MSC for WA Simon.Pearson@ca.com
  • 26. 26 © 2015 CA. All rights reserved. CA confidential and proprietary information. No unauthorized use, copying or distribution. Any Further Questions?