SlideShare ist ein Scribd-Unternehmen logo
1 von 74
Downloaden Sie, um offline zu lesen
Pre-Con Education: CA Unified
Infrastructure Management Network
Performance Management Capabilities
Martin Kowalewski, Daniel Okine
DevOps: Agile Ops
CA Technologies
CA UIM Product Management
DO5X84E
@CA_IM
@okined
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Please join us for a detailed education session on the new application-aware
network performance management capabilities within CA Unified Infrastructure
Management. We will explore how CA Unified Infrastructure Management
continues to deliver on our vision of agile, unified monitoring that is easy to set
up, administer and use. This session will teach you how to install and configure
the newest network monitoring functionality, specifically focused around the
unification of traffic analysis (with CA Network Flow Analysis), network device
performance (with the SNMP collector probe), and application delivery
performance (with CA Application Delivery Analysis). These advanced capabilities
will help you proactively resolve network issues across your applications and
services before user experience suffers. We will also show how you can rapidly
add and configure new network devices for monitoring. Using the SNMP collector
probe self-certification, you’ll learn how to quickly produce the metrics you need
without waiting for vendors to add support for these. In short, this will be a dive
into the newest, most advanced network capabilities of CA Unified Infrastructure
Management and how they can enable your business to be successful in the
application economy.
Martin
Kowalewski
Daniel Okine
CA Technologies
CA UIM Product
Management
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
MODULE 1 – DESCRIBE CA APPLICATION DELIVERY ANALYSIS (CA ADA)
MODULE 2 – CONFIGURE CA UIM/CA ADA INTEGRATION
MODULE 3 – DESCRIBE CA NETWORK FLOW ANALYSIS (CA NFA)
MODULE 4 – CONFIGURE CA UIM/CA NFA INTEGRATION
MODULE 5 – SELF-CERTIFICATION WITH SNMPCOLLECTOR
1
2
3
4
5
Module 1 –
Describe CA Application Delivery Analysis
(CA ADA)
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Time Wasted
Why is it so slow?
It’s probably the
network!!
I’m not sure if the
problem is the
server, network
or application. I’m
going to escalate
it to all the teams.
It’s probably
the network!!
What problem?
All the devices are
up and running.
Not today!
Today is launch day.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Quickly Identify the Fault-Domain
 Network?
 Server?
 Application?
Data Center
Remote Site
WAN
Response Times Between the Server Switch and the Client
Response Times
Between the Server
Switch and Server
Combined Network and Server Response Times That Reflect the End User Experience
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA ADA Overview: Architecture
Network Type
Network Type
Network Type
Network Type
LA
NYC
SEA
CHI
HOU
40 Mbps
30 Mbps
20 Mbps
12 Mbps
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
Use
r
Infrastructure Server
TCP(80) SYN
Web Transaction
CA ADA Monitor
Server Connection
Setup Time
Network Connection
Setup Time
TCP(80) ACK
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
Use
r
Infrastructure Server
TCP(80) SYN
Web Transaction
HTTP GET index.html (Data Request A)
Data Response A1
ACK Response A1
Data Response A2
ACK Response A2
CA ADA Monitor
TCP(80) ACK
Server Response Time
Network Round Trip Time
HTTP GET index.html (Data Request B)
Data Transfer Time
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
Use
r
Infrastructure Server
TCP(80) SYN
Web Transaction
HTTP GET index.html (Data Request A)
Data Response A1
ACK Response A1
Data Response A2
ACK Response A2
CA ADA Monitor
TCP(80) ACK
Server Response Time
Network Round Trip Time
HTTP GET index.html (Data Request B)
Data Transfer Time
Data Response B1
Data Response B1
Data Response B1No
Response
No
Response
ACK Response B1
Retransmission Delay
ACK Response B2
Data Response B2
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Response Time Insight
Server Response Time
Amount of time it takes for the server to begin responding to a
request.
Data Transfer Time
Amount of time for the server to send, and the network to
deliver, the requested data
Retransmission Time
Time spent resending packets due to packet loss
Network Round Trip Time
Amount of time it takes for a packet to traverse the network in
both directionsAverage time for a TCP request to be fulfilled
Server Response
+
Data Xfer
+
Retrans. Delay
+
Network RTT
=
Total Transaction Time Gray line represents observed transactions over given time interval
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Value of End-to-End Monitoring
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Does With Data
 Baselines normal performance
 Automatically computes thresholds to define
degraded & excessive performance
 Classifies relative performance for all monitored
networks, servers, & applications
 Launches appropriate, automated investigations
when performance degrades
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Classifying Relative Performance
 Requires accurate definition of “normal” performance
 Requires significant statistical sampling
 Requires understanding how performance relates
to application interaction by users
Degraded
Excessive
Available/Normal
Unavailable
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 1 Summary
 You should now be able to:
– Understand how and where CA ADA fits
in the network
– Identify the key metrics that are calculated
by CA ADA
– Understand the value end to end
monitoring provides
 In the next module, you will:
– Configure CA ADA/CA UIM integration
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
 Where should CA ADA collectors be installed in the network?
Branch NetworkA
In the CloudB
Data CenterC
All of the aboveD
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
 What metric identifies the time that it takes for a server to
respond to a request for data?
Network Response TimeA
Server Connection TimeB
Server Response TimeC
Data TimeD
Module 2 –
Configure CA UIM/CA ADA Integration
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Integration IS:
 Shows the evolution of the CA UIM unification strategy
 Shows application delivery metrics inside of USM
 Support for an operational workflow
– Drill to Server – View System metrics, App Probe metrics, and/or App
Delivery metrics from CA ADA
 Drill-out capability from each CA ADA chart in context
 Support for n CA ADA consoles on a single inventory probe
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Integration IS NOT:
 Provides support for dashboards of Top-N CA ADA KPIs for
the entire enterprise
 Automatically syncs CA ADA incidents as alarms in CA UIM
(Behavior that exists with CAPC/NPC)
– SNMP trap integration is the current supported path to get CA ADA
incidents to show up as alarms inside of CA UIM.
 Provides support for Single Sign-On between CA UIM and CA
ADA
 Multi-tenant aware
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
USM
Bus
Discovery NMS/UDM
ADAConsole
MetricsAPI
CA ADA
Inventory
Probe
DataWS
InvWS
UI ctd
High-Level Technical Architecture
CA ADA-
based views
Drill-out
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
 CA ADA 10.4 Install
– Master Console with Collection - Install of CA ADA Master Console on a
single vm or physical server, with a 2nd nic available for collection.
– Distributed Deployment - Multi-box with CA ADA console and CA ADA
collectors in the environment. All current collectors supported. (Single
Port, MTP, Gigastor, etc.)
 ADA_Inventory Probe
– Local or Remote Probe used to send CA ADA inventory to UDM
 CA UIM 8.35(CR) – GA 8.4
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
 Install and configure CA ADA 10.4
 Install and configure CA UIM 8.35 (CR)
 Download and deploy ADA_Inventory probe to either CA ADA
Master Console or other robot
 Configuration in Admin Console
– Add New ADA Console
– Enter name of console and hostname or IP address of CA ADA Master
Console
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps (cont’d)
 Configure in Admin Console
– Add New ADA Console
– Enter name of console and hostname or IP address of CA ADA Master
Console
– Choose whether to include only servers with User Defined Apps
– Click Submit, then click Save
 Open USM
– Select server from inventory that is being monitored by CA ADA
– Click the Advanced tab to see the CA ADA “goodness”
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
 It is recommended to only export servers for “user-defined”
apps.
 To further value, ensure server and app probes are deployed
to servers that are also being monitored by CA ADA.
 To simplify deployment use a single ADA_Inventory probe for
CA ADA deployments with multiple consoles.
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 2 Exercise
 In the following lab exercise, you will:
– Validate data in CA ADA
– Install and configure ADA_Inventory Probe
– Execute Operational Workflow using
application delivery data inside of USM
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Lab Environment
CA NFA
Standalone
CA ADA
Standalone
Florida - Infrastructure
Arizona - Infrastructure
Data Center Infrastructure
TIXCHANGE-WEB
Netflow
SNMP Polling
CA UIM
with
SNMPC
R R CA UIM Robot
Switch Router
WAN
Packet Data (SPAN)
R
R
TIXCHANGE-APP
TIXCHANGE-DB
R Michigan - Infrastructure
R
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 2 Summary
 You should now be able to:
– Understand CA UIM/CA ADA integration
architecture and deployment requirements
– Identify if CA ADA is successful collecting data
– Install and configure ADA_Inventory probe
– Execute USM workflow using CA ADA metric data
 In the next module, you will:
– Describe CA Network Flow Analysis
Module 3 –
Describe CA Network Flow Analysis (CA NFA)
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
NetFlow, IPFIX
CA Network Flow Analysis
100% visibility into network traffic and behavior
• Visibility into how the network is being used –
users, destinations, prioritization
• Single, data center-based collection point
• Accurate historical, real-time and projective
capacity account
• Cisco IVT certified for AVC (Application Visibility
and Control) enabled devices for rich accounting,
classification and reporting of applications
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Network Flow Analysis – Benefits
Reduce WAN Costs
• Visibility into utilization levels in order to optimize network capacity
• Make sure bandwidth is not the root cause for performance issues before investing in costly
upgrades
Detect, isolate and resolve
network problems faster
• Reduces false positives and wasted efforts through patented anomaly detection that
dynamically adapts the network profile to ensure detection accuracy.
• Gain an enterprise-wide view of infrastructure availability and performance, and, when
needed, drill down to flow components for detailed analysis and guided workflows that
enable faster problem remediation.
Understand, predict and
meet changing network
capacity demands
• Reality-based capacity planning with access to 13 months of enterprise-wide historical data.
• Intelligent, fact-based decisions regarding capacity investments and resource optimization to
address and anticipate evolving technical and business requirements.
Align to business priorities
• Cisco NBAR2 support enables rich application accounting, classification and reporting to
enhance visibility into applications running on the network.
• With enhanced visibility - Intelligently prioritize, control, route, load-balance and optimize
application traffic to maximize user experience, optimize bandwidth and reduce costs.
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IP-Flow Technology Support
 Flexible NetFlow
 Sflow
 Jflow
 Cflowd
 NetFlow v5
 NetFlow v9
 IPFIX
 NetStream
34
Application Awareness
Cisco Application Visibility and Control (AVC)
Pervasive App Visibility Business Policy-based Rules Comprehensive Reporting
• No additional hardware
• Rich data collection using
NetFlow v9/IPFIX
• Easy to integrate into many
reporting tools
• No need for complex IP and
port ACLs
• See inside HTTP flows to identify
specific Cloud applications
• Better use of costly bandwidth
• Per-branch and per-application level
reporting
VISIBILITY TO 1000+ APPS SMART CAPACITY PLANNINGNO PROBES
Private
Cloud
Branch DC/Headquarters
WAN
NetFlow v9
Enterprise Edge
AVC
AVC
CSR
Proliferation
of Devices
Users/
Machines
60% of IT Professionals Cite Performance as Key Challenge for Cloud
ISR
ASR
AVC
AVC
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
AVC Operation – Performance Collection and Exporting
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Cisco AVC
 With Cisco AVC, customers can…
– Discover network traffic with application-level insight with deep
packet visibility into web traffic
– Analyze and report on application usage
– Classify and manage application sessions (including web browsing,
multimedia streaming, and peer-to-peer applications)
– Build reporting for capacity planning and compliance
– Enforce quality-of-service (QoS) policies and service guarantees
for latency-sensitive applications (such as voice over IP [VoIP]
and interactive gaming)
– Implement fair-use policies and manage network congestion
by optimizing application-level traffic
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture 2-Tier
Router
config
enables
NetFlow NetFlow Datagrams:
1 Minute
• Records Raw flows in Harvester Archive
• Creates 1 minute data files containing top
protocols/hosts/Conversations/ToS per interface
• New devices are Polled for SNMP information
• Pulls data from the Harvester as needed
• Web GUI for reporting and Administration
Long term storage of 15 minute bucket:
•Protocol data for the past 13 months
•Interface summary data for the past 13 months
•ToS summary data for the past 13 months
•Top protocols for the top ToS values for the past 13 months
•Host and conversation data for the past two months
•Top hosts and conversations for the top ToS values for the past 2 months
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture 3-Tier
Router
config
enables
NetFlow NetFlow Datagrams:
1 Minute
• Collects up to 9 Million flows per minute
• Records Raw flows in Harvester Archive
• Creates 1 minute data files containing top
protocols/hosts/Conversations/ToS per interface
• New devices are Polled for SNMP information
• Pulls data from the Harvester every 15 minutes
• Web GUI for reporting and Administration
• Manages interfaces stored on the DSA
Long term storage of 15 minute bucket:
•Protocol data for the past 13 months
•Interface summary data for the past 13 months
•ToS summary data for the past 13 months
•Top protocols for the top ToS values for the past 13 months
•Host and conversation data for the past two months
•Top hosts and conversations for the top ToS values for the past 2 months
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture – Multi-Platform Harvester
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Stacked Protocol Trend
Applications
broken out by
NBAR2
Classification….
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Network Congestion
We see a large amount of
Windows Media
saturating the interface
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
QoS Validation
This also corresponds
to a large amount of
“Real Time” queued
traffic
Which is comprised
of Windows Media
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Root Cause: Non-Business Critical Traffic
Which is caused by
streaming games
from NBA.com
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deeper Network Flow Details When Needed
 Drill-down to raw data with flow forensics
Delay between
router and client
Server Response
Client Experience
• Report on all of the flow data that is collected in your environment & analyze every
protocol, host, and conversation on your network
• Browse raw flow data & drill down to jump to detailed information about any of the fields
in a data packet for any monitored interface
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Patented Anomaly Detection
 Visibility into network use – users,
destinations, prioritization
 Single collection point
 Accurate historical, real-time and
projective capacity account
 Cisco IVT certified for AVC
(Application Visibility and Control)
enabled devices
Proactively detect security risks that impact performance
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 3 Summary
 You should now be able to:
– Understand the benefits of CA Network Flow
Analysis
– Understand the technologies supported by CA
Network Flow Analysis
– Understand the deployment architecture of CA
Network Flow Analysis
 In the next module, you will:
– Configure NFA/UIM Integration
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
 What are the key benefits of CA Network Flow Analysis?
Reduce WAN CostsA
Detect, isolate and resolve network problems fasterB
Align to business prioritiesC
All of the AboveD
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
 What Flow Technology is NOT supported by CA NFA?
IPFIXA
Cisco NetflowB
Cisco AVCC
TraceflowD
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
 What is the recommend deployment architecture for new
installs?
Two-TierA
One-TierB
Three-TierC
Three-BeerD
Module 4 –
Configure CA UIM/CA NFA Integration
51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA NFA Integration IS:
 Unified view of SNMP and Netflow data inside of CA UIM
– Interface Details – SNMP Interface Rate, Errors, Discards with NFA
Stacked Protocol, Top Hosts and Conversions
– Advanced Tab – SNMP Interface Rate, CBQoS Volume, CBQoS Drops,
NFA Stacked ToS, Tops Hosts per ToS, Top Conversions per ToS
 Upgrade path for existing CA UIM Flow Probe users to
leverage the features of the current full CA NFA solution
 Single sign-on drill-out capability from each CA NFA chart in
context to CA NFA Console for additional diagnostic detail
 Multi-tenant aware
52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA NFA Integration IS NOT:
 Provides support for dashboards of Top-N NFA KPIs for the
entire enterprise
 Sync’s CA NFA events as alarms in CA UIM (similar to current
functionality of CAPC/NPC)
– SNMP trap integration is the current supported path to get CA NFA
events/analysis traps to show up as alarms inside of CA UIM
53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
USM
Bus
Discovery NMS/UDM
NFAW
MetricsAPI
SNMP_collect
NFA
Inventory
Probe
DataWS
InvWS
UI ctd ctd
Technical Architecture
snmp_c-
based views
Nfa-based
views
**Drill-out
SNMP Profile
transfer agent
Pulls
from
UDM
54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
CA NFA Install
• Standalone - Single box with both harvester and console installed on a single vm or physical server
(Windows 2012 R2 Only)
• Distributed - Multi-box with harvester(s) and console installed on separate VMs or physical servers
• Windows 2012 R2 For Console
• Windows 2012 R2 or Redhat 6.7 for Harvester
NFA_Inventory Probe • Local or Remote Probe used to send NFA inventory to UDM for reconciliation with SNMPCollector
NQ_Services Probe • If Multi-tenancy is required
CA UIM 8.2+ with SNMP
Collector 2.1+
• Recommended CA UIM 8.4 with SNMPCollector 3.2
55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
 Install and configure CA NFA 9.3.3
 Install and configure CA UIM 8.35 (CR)
 Download and deploy NFA_Inventory probe to either CA NFA
Console or any other robot
 Download and deploy SNMPCollector
 Download and deploy NQ_Services probe to same hub with
UGS (if multi-tenancy is required)
56 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps (cont’d)
 Configure in Admin Console
– Click Add New NFA Console
– Enter name of console and hostname or IP address of NFA Console
– Click Submit
– Click Save
 Open USM
– Select router from inventory
– Click Interface Details
– Select interface to see the CA NFA “goodness”
57 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
 Ensure that SNMPCollector is monitoring the same network
devices sending flow data
 Leverage SNMPCollector for utilization alarms and use CA NFA
to understand what is driving the utilization
 NFA Export IP address (configured on the Router) and SNMPC
Polled IP should be the same. It is recommended to be the
loopback interface or management IP of the device.
 Collocate NFA_Inventory probe with the CA NFA Console
58 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 4 Exercise
 In the following lab exercise, you will:
– Validate data in CA NFA
– Install and configure NFA_Inventory probe
– Install and configure SNMPCollector probe
– Execute Operational Workflow using CA
Network Flow Analysis data inside of USM
59 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Lab Environment
CA NFA
Standalone
CA ADA
Standalone
Florida - Infrastructure
Arizona - Infrastructure
Data Center Infrastructure
TIXCHANGE-WEB
Netflow
SNMP Polling
CA UIM
with
SNMPC
R R CA UIM Robot
Switch Router
WAN
Packet Data (SPAN)
R
R
TIXCHANGE-APP
TIXCHANGE-DB
R Michigan - Infrastructure
R
60 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 4 Summary
 You should now be able to:
– Understand CA UIM/CA NFA integration architecture
and deployment requirements
– Identify if CA NFA is successful collecting data
– Install and configure NFA_Inventory probe
– Install and configure SNMPCollector probe
– Execute USM operational workflow using CA
NFA/SNMPC Data
 In the next module, you will:
– Leverage Self Certification with SNMPCollector
Module 5 –
Self-Certification With SNMPCollector
62 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What SNMPC Self Certification IS:
 Create new vendor certification for new device support
– Associate SNMP OIDs with existing metric in an existing metric family
 Create new custom monitors
– Associate SNMP OIDs with existing metric in an existing metric family
 Create and modify custom vendor certifications
 Create Expressions for custom vendor certifications
 Modify existing expressions in custom vendor certifications
63 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What SNMPC Self Certification IS NOT:
 Redefine an existing metric in an existing Metric Family
 Add new metric to and existing Metric Family
 Define and create a new Metric Family
 Automatically deploy a new custom vendor cert to multiple
SNMPCollector probe instances
64 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
High Level Architecture for Self Certification
65 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
 CA UIM 8.2+ installed
 UMP 8.2+ installed
 At least one installed instance of SNMP Collector 2.1+
– SNMPCollector must be on a secondary hub
– SNMPCollector must be within the same domain as UMP
66 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
 Install and configure CA UIM 8.2 or later.
 Download and deploy SNMPCollector per documentation, if not
already deployed
 Download and deploy Self Cert portlet to the UMP hub
 Configure
– Create a Self Certification portlet page
– Add the Self Certification portlet to the created page
67 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
 Names attribute must always be assigned for all custom
vendor certification
 Description should be assigned
 Expressions must be validated using test
 Tabular OIDs must be added from a single table to maintain
integrity of indexing
68 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Product (cont’d)
 Scalar OIDs can be picked from multiple MIBs
 New custom vendor certs should be saved to running SNMPC
instance
69 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 5 Exercise
 In the following lab exercise, you will:
– Add a new MIB File into MIB repository
– Load MIB file into MIB Browser
– Use Search feature to find a specific OID
– Browse and select OIDs to monitor
– Manually enter OID to monitor
– Create a vendor cert for an existing MF
– Deploy and validate a vendor cert
70 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 5 Summary
 You should now be able to:
– Load and manage MIB files in MIB repository
– Create custom vendor certification
– Deploy and start using custom vendor cert
71 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
72 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO5T26T
Tech Talk: Self-Certify New Devices with the CA Unified
Infrastructure Management SNMP Collector
11/18/2015 at 3:00 pm
DO5X127S
Vision and Roadmap: Application-Aware Network
Monitoring Solutions for UIM
11/18/2015 at 4:30 pm
DO5T25T
Tech Talk: Leverage the Combined Power of CA Unified
Infrastructure Management, CA Network Flow Analysis
and CA Application Delivery Analysis
11/19/2015 at 12:15 pm
73 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
CA UIM and
CA APM
Integration
Area #5
ANPM
Area #5
CA UIM for
MSPs
Area #5
CA UIM for
Networking
Area #5
74 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

Weitere ähnliche Inhalte

Was ist angesagt?

Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...CA Technologies
 
Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerCA Technologies
 
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)CA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementPre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementCA Technologies
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...CA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...CA Technologies
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersCA Technologies
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...CA Technologies
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...CA Technologies
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceCA Technologies
 
Linux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
Linux & Open Source Panel: Driving New Innovation and Value on Your MainframeLinux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
Linux & Open Source Panel: Driving New Innovation and Value on Your MainframeCA Technologies
 
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...CA Technologies
 
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...CA Technologies
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...CA Technologies
 

Was ist angesagt? (20)

Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
 
Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset Manager
 
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
Hands-On Lab: Quickly Identify the Fault Domain – Is It the Network, the Se...
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service ManagementPre-Con Education: Building Advanced ITSM Workflows in CA Service Management
Pre-Con Education: Building Advanced ITSM Workflows in CA Service Management
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...Pre-Con Education: Effective Change/Configuration Management With CA Service...
Pre-Con Education: Effective Change/Configuration Management With CA Service...
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
Hands-On Lab: Complement CA Release Automation with a New Continuous Delivery...
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database Experience
 
Linux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
Linux & Open Source Panel: Driving New Innovation and Value on Your MainframeLinux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
Linux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
 
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
Migrate from Terma Software Jaws to CA Workload Automation iDash for Enhanced...
 
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...
Technology Primer: The Importance of ITSM Upgrades: People, Process and Tec...
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
 

Andere mochten auch

Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...CA Technologies
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...CA Technologies
 
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...CA Technologies
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...CA Technologies
 
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...CA Technologies
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparisonWouter Hermans
 

Andere mochten auch (7)

Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
 
Hehehe
HeheheHehehe
Hehehe
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
 
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
 
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
Pre-Con Ed: Implement a Modern, Advanced Network Monitoring Solution by Integ...
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparison
 

Ähnlich wie CA Unified Infrastructure Management Network Performance Management Capabilities

Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...CA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsCA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10CA Technologies
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...CA Technologies
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Technologies
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsCA Technologies
 
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...CA Technologies
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12CA Technologies
 
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...CA Technologies
 
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...CA Technologies
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderCA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 

Ähnlich wie CA Unified Infrastructure Management Network Performance Management Capabilities (20)

Case Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 DaysCase Study: Implementing CA Strong Authentication in 30 Days
Case Study: Implementing CA Strong Authentication in 30 Days
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration Topics
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and Better
 
Blazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast AppsBlazing Fast Testing for Blazing Fast Apps
Blazing Fast Testing for Blazing Fast Apps
 
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
 
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
Hands-On Lab: Managing and Monitoring Node.js Made Easy with CA Application P...
 
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

CA Unified Infrastructure Management Network Performance Management Capabilities

  • 1. Pre-Con Education: CA Unified Infrastructure Management Network Performance Management Capabilities Martin Kowalewski, Daniel Okine DevOps: Agile Ops CA Technologies CA UIM Product Management DO5X84E @CA_IM @okined #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Please join us for a detailed education session on the new application-aware network performance management capabilities within CA Unified Infrastructure Management. We will explore how CA Unified Infrastructure Management continues to deliver on our vision of agile, unified monitoring that is easy to set up, administer and use. This session will teach you how to install and configure the newest network monitoring functionality, specifically focused around the unification of traffic analysis (with CA Network Flow Analysis), network device performance (with the SNMP collector probe), and application delivery performance (with CA Application Delivery Analysis). These advanced capabilities will help you proactively resolve network issues across your applications and services before user experience suffers. We will also show how you can rapidly add and configure new network devices for monitoring. Using the SNMP collector probe self-certification, you’ll learn how to quickly produce the metrics you need without waiting for vendors to add support for these. In short, this will be a dive into the newest, most advanced network capabilities of CA Unified Infrastructure Management and how they can enable your business to be successful in the application economy. Martin Kowalewski Daniel Okine CA Technologies CA UIM Product Management
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda MODULE 1 – DESCRIBE CA APPLICATION DELIVERY ANALYSIS (CA ADA) MODULE 2 – CONFIGURE CA UIM/CA ADA INTEGRATION MODULE 3 – DESCRIBE CA NETWORK FLOW ANALYSIS (CA NFA) MODULE 4 – CONFIGURE CA UIM/CA NFA INTEGRATION MODULE 5 – SELF-CERTIFICATION WITH SNMPCOLLECTOR 1 2 3 4 5
  • 5. Module 1 – Describe CA Application Delivery Analysis (CA ADA)
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Time Wasted Why is it so slow? It’s probably the network!! I’m not sure if the problem is the server, network or application. I’m going to escalate it to all the teams. It’s probably the network!! What problem? All the devices are up and running. Not today! Today is launch day.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Quickly Identify the Fault-Domain  Network?  Server?  Application? Data Center Remote Site WAN Response Times Between the Server Switch and the Client Response Times Between the Server Switch and Server Combined Network and Server Response Times That Reflect the End User Experience
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA ADA Overview: Architecture Network Type Network Type Network Type Network Type LA NYC SEA CHI HOU 40 Mbps 30 Mbps 20 Mbps 12 Mbps
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD TCP(80) SYN ACK Use r Infrastructure Server TCP(80) SYN Web Transaction CA ADA Monitor Server Connection Setup Time Network Connection Setup Time TCP(80) ACK
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD TCP(80) SYN ACK Use r Infrastructure Server TCP(80) SYN Web Transaction HTTP GET index.html (Data Request A) Data Response A1 ACK Response A1 Data Response A2 ACK Response A2 CA ADA Monitor TCP(80) ACK Server Response Time Network Round Trip Time HTTP GET index.html (Data Request B) Data Transfer Time
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD TCP(80) SYN ACK Use r Infrastructure Server TCP(80) SYN Web Transaction HTTP GET index.html (Data Request A) Data Response A1 ACK Response A1 Data Response A2 ACK Response A2 CA ADA Monitor TCP(80) ACK Server Response Time Network Round Trip Time HTTP GET index.html (Data Request B) Data Transfer Time Data Response B1 Data Response B1 Data Response B1No Response No Response ACK Response B1 Retransmission Delay ACK Response B2 Data Response B2
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Response Time Insight Server Response Time Amount of time it takes for the server to begin responding to a request. Data Transfer Time Amount of time for the server to send, and the network to deliver, the requested data Retransmission Time Time spent resending packets due to packet loss Network Round Trip Time Amount of time it takes for a packet to traverse the network in both directionsAverage time for a TCP request to be fulfilled Server Response + Data Xfer + Retrans. Delay + Network RTT = Total Transaction Time Gray line represents observed transactions over given time interval
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Value of End-to-End Monitoring
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What CA ADA Does With Data  Baselines normal performance  Automatically computes thresholds to define degraded & excessive performance  Classifies relative performance for all monitored networks, servers, & applications  Launches appropriate, automated investigations when performance degrades
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Classifying Relative Performance  Requires accurate definition of “normal” performance  Requires significant statistical sampling  Requires understanding how performance relates to application interaction by users Degraded Excessive Available/Normal Unavailable
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 1 Summary  You should now be able to: – Understand how and where CA ADA fits in the network – Identify the key metrics that are calculated by CA ADA – Understand the value end to end monitoring provides  In the next module, you will: – Configure CA ADA/CA UIM integration
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Class Question  Where should CA ADA collectors be installed in the network? Branch NetworkA In the CloudB Data CenterC All of the aboveD
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Class Question  What metric identifies the time that it takes for a server to respond to a request for data? Network Response TimeA Server Connection TimeB Server Response TimeC Data TimeD
  • 19. Module 2 – Configure CA UIM/CA ADA Integration
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What CA ADA Integration IS:  Shows the evolution of the CA UIM unification strategy  Shows application delivery metrics inside of USM  Support for an operational workflow – Drill to Server – View System metrics, App Probe metrics, and/or App Delivery metrics from CA ADA  Drill-out capability from each CA ADA chart in context  Support for n CA ADA consoles on a single inventory probe
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What CA ADA Integration IS NOT:  Provides support for dashboards of Top-N CA ADA KPIs for the entire enterprise  Automatically syncs CA ADA incidents as alarms in CA UIM (Behavior that exists with CAPC/NPC) – SNMP trap integration is the current supported path to get CA ADA incidents to show up as alarms inside of CA UIM.  Provides support for Single Sign-On between CA UIM and CA ADA  Multi-tenant aware
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD USM Bus Discovery NMS/UDM ADAConsole MetricsAPI CA ADA Inventory Probe DataWS InvWS UI ctd High-Level Technical Architecture CA ADA- based views Drill-out
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Requirements  CA ADA 10.4 Install – Master Console with Collection - Install of CA ADA Master Console on a single vm or physical server, with a 2nd nic available for collection. – Distributed Deployment - Multi-box with CA ADA console and CA ADA collectors in the environment. All current collectors supported. (Single Port, MTP, Gigastor, etc.)  ADA_Inventory Probe – Local or Remote Probe used to send CA ADA inventory to UDM  CA UIM 8.35(CR) – GA 8.4
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Steps  Install and configure CA ADA 10.4  Install and configure CA UIM 8.35 (CR)  Download and deploy ADA_Inventory probe to either CA ADA Master Console or other robot  Configuration in Admin Console – Add New ADA Console – Enter name of console and hostname or IP address of CA ADA Master Console
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Steps (cont’d)  Configure in Admin Console – Add New ADA Console – Enter name of console and hostname or IP address of CA ADA Master Console – Choose whether to include only servers with User Defined Apps – Click Submit, then click Save  Open USM – Select server from inventory that is being monitored by CA ADA – Click the Advanced tab to see the CA ADA “goodness”
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices for Production  It is recommended to only export servers for “user-defined” apps.  To further value, ensure server and app probes are deployed to servers that are also being monitored by CA ADA.  To simplify deployment use a single ADA_Inventory probe for CA ADA deployments with multiple consoles.
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 2 Exercise  In the following lab exercise, you will: – Validate data in CA ADA – Install and configure ADA_Inventory Probe – Execute Operational Workflow using application delivery data inside of USM
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Lab Environment CA NFA Standalone CA ADA Standalone Florida - Infrastructure Arizona - Infrastructure Data Center Infrastructure TIXCHANGE-WEB Netflow SNMP Polling CA UIM with SNMPC R R CA UIM Robot Switch Router WAN Packet Data (SPAN) R R TIXCHANGE-APP TIXCHANGE-DB R Michigan - Infrastructure R
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 2 Summary  You should now be able to: – Understand CA UIM/CA ADA integration architecture and deployment requirements – Identify if CA ADA is successful collecting data – Install and configure ADA_Inventory probe – Execute USM workflow using CA ADA metric data  In the next module, you will: – Describe CA Network Flow Analysis
  • 30. Module 3 – Describe CA Network Flow Analysis (CA NFA)
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD NetFlow, IPFIX CA Network Flow Analysis 100% visibility into network traffic and behavior • Visibility into how the network is being used – users, destinations, prioritization • Single, data center-based collection point • Accurate historical, real-time and projective capacity account • Cisco IVT certified for AVC (Application Visibility and Control) enabled devices for rich accounting, classification and reporting of applications
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Network Flow Analysis – Benefits Reduce WAN Costs • Visibility into utilization levels in order to optimize network capacity • Make sure bandwidth is not the root cause for performance issues before investing in costly upgrades Detect, isolate and resolve network problems faster • Reduces false positives and wasted efforts through patented anomaly detection that dynamically adapts the network profile to ensure detection accuracy. • Gain an enterprise-wide view of infrastructure availability and performance, and, when needed, drill down to flow components for detailed analysis and guided workflows that enable faster problem remediation. Understand, predict and meet changing network capacity demands • Reality-based capacity planning with access to 13 months of enterprise-wide historical data. • Intelligent, fact-based decisions regarding capacity investments and resource optimization to address and anticipate evolving technical and business requirements. Align to business priorities • Cisco NBAR2 support enables rich application accounting, classification and reporting to enhance visibility into applications running on the network. • With enhanced visibility - Intelligently prioritize, control, route, load-balance and optimize application traffic to maximize user experience, optimize bandwidth and reduce costs.
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IP-Flow Technology Support  Flexible NetFlow  Sflow  Jflow  Cflowd  NetFlow v5  NetFlow v9  IPFIX  NetStream
  • 34. 34 Application Awareness Cisco Application Visibility and Control (AVC) Pervasive App Visibility Business Policy-based Rules Comprehensive Reporting • No additional hardware • Rich data collection using NetFlow v9/IPFIX • Easy to integrate into many reporting tools • No need for complex IP and port ACLs • See inside HTTP flows to identify specific Cloud applications • Better use of costly bandwidth • Per-branch and per-application level reporting VISIBILITY TO 1000+ APPS SMART CAPACITY PLANNINGNO PROBES Private Cloud Branch DC/Headquarters WAN NetFlow v9 Enterprise Edge AVC AVC CSR Proliferation of Devices Users/ Machines 60% of IT Professionals Cite Performance as Key Challenge for Cloud ISR ASR AVC AVC
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD AVC Operation – Performance Collection and Exporting
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Cisco AVC  With Cisco AVC, customers can… – Discover network traffic with application-level insight with deep packet visibility into web traffic – Analyze and report on application usage – Classify and manage application sessions (including web browsing, multimedia streaming, and peer-to-peer applications) – Build reporting for capacity planning and compliance – Enforce quality-of-service (QoS) policies and service guarantees for latency-sensitive applications (such as voice over IP [VoIP] and interactive gaming) – Implement fair-use policies and manage network congestion by optimizing application-level traffic
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Architecture 2-Tier Router config enables NetFlow NetFlow Datagrams: 1 Minute • Records Raw flows in Harvester Archive • Creates 1 minute data files containing top protocols/hosts/Conversations/ToS per interface • New devices are Polled for SNMP information • Pulls data from the Harvester as needed • Web GUI for reporting and Administration Long term storage of 15 minute bucket: •Protocol data for the past 13 months •Interface summary data for the past 13 months •ToS summary data for the past 13 months •Top protocols for the top ToS values for the past 13 months •Host and conversation data for the past two months •Top hosts and conversations for the top ToS values for the past 2 months
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Architecture 3-Tier Router config enables NetFlow NetFlow Datagrams: 1 Minute • Collects up to 9 Million flows per minute • Records Raw flows in Harvester Archive • Creates 1 minute data files containing top protocols/hosts/Conversations/ToS per interface • New devices are Polled for SNMP information • Pulls data from the Harvester every 15 minutes • Web GUI for reporting and Administration • Manages interfaces stored on the DSA Long term storage of 15 minute bucket: •Protocol data for the past 13 months •Interface summary data for the past 13 months •ToS summary data for the past 13 months •Top protocols for the top ToS values for the past 13 months •Host and conversation data for the past two months •Top hosts and conversations for the top ToS values for the past 2 months
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Architecture – Multi-Platform Harvester
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stacked Protocol Trend Applications broken out by NBAR2 Classification….
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Network Congestion We see a large amount of Windows Media saturating the interface
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD QoS Validation This also corresponds to a large amount of “Real Time” queued traffic Which is comprised of Windows Media
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Root Cause: Non-Business Critical Traffic Which is caused by streaming games from NBA.com
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deeper Network Flow Details When Needed  Drill-down to raw data with flow forensics Delay between router and client Server Response Client Experience • Report on all of the flow data that is collected in your environment & analyze every protocol, host, and conversation on your network • Browse raw flow data & drill down to jump to detailed information about any of the fields in a data packet for any monitored interface
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Patented Anomaly Detection  Visibility into network use – users, destinations, prioritization  Single collection point  Accurate historical, real-time and projective capacity account  Cisco IVT certified for AVC (Application Visibility and Control) enabled devices Proactively detect security risks that impact performance
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 3 Summary  You should now be able to: – Understand the benefits of CA Network Flow Analysis – Understand the technologies supported by CA Network Flow Analysis – Understand the deployment architecture of CA Network Flow Analysis  In the next module, you will: – Configure NFA/UIM Integration
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Class Question  What are the key benefits of CA Network Flow Analysis? Reduce WAN CostsA Detect, isolate and resolve network problems fasterB Align to business prioritiesC All of the AboveD
  • 48. 48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Class Question  What Flow Technology is NOT supported by CA NFA? IPFIXA Cisco NetflowB Cisco AVCC TraceflowD
  • 49. 49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Class Question  What is the recommend deployment architecture for new installs? Two-TierA One-TierB Three-TierC Three-BeerD
  • 50. Module 4 – Configure CA UIM/CA NFA Integration
  • 51. 51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What CA NFA Integration IS:  Unified view of SNMP and Netflow data inside of CA UIM – Interface Details – SNMP Interface Rate, Errors, Discards with NFA Stacked Protocol, Top Hosts and Conversions – Advanced Tab – SNMP Interface Rate, CBQoS Volume, CBQoS Drops, NFA Stacked ToS, Tops Hosts per ToS, Top Conversions per ToS  Upgrade path for existing CA UIM Flow Probe users to leverage the features of the current full CA NFA solution  Single sign-on drill-out capability from each CA NFA chart in context to CA NFA Console for additional diagnostic detail  Multi-tenant aware
  • 52. 52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What CA NFA Integration IS NOT:  Provides support for dashboards of Top-N NFA KPIs for the entire enterprise  Sync’s CA NFA events as alarms in CA UIM (similar to current functionality of CAPC/NPC) – SNMP trap integration is the current supported path to get CA NFA events/analysis traps to show up as alarms inside of CA UIM
  • 53. 53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD USM Bus Discovery NMS/UDM NFAW MetricsAPI SNMP_collect NFA Inventory Probe DataWS InvWS UI ctd ctd Technical Architecture snmp_c- based views Nfa-based views **Drill-out SNMP Profile transfer agent Pulls from UDM
  • 54. 54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Requirements CA NFA Install • Standalone - Single box with both harvester and console installed on a single vm or physical server (Windows 2012 R2 Only) • Distributed - Multi-box with harvester(s) and console installed on separate VMs or physical servers • Windows 2012 R2 For Console • Windows 2012 R2 or Redhat 6.7 for Harvester NFA_Inventory Probe • Local or Remote Probe used to send NFA inventory to UDM for reconciliation with SNMPCollector NQ_Services Probe • If Multi-tenancy is required CA UIM 8.2+ with SNMP Collector 2.1+ • Recommended CA UIM 8.4 with SNMPCollector 3.2
  • 55. 55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Steps  Install and configure CA NFA 9.3.3  Install and configure CA UIM 8.35 (CR)  Download and deploy NFA_Inventory probe to either CA NFA Console or any other robot  Download and deploy SNMPCollector  Download and deploy NQ_Services probe to same hub with UGS (if multi-tenancy is required)
  • 56. 56 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Steps (cont’d)  Configure in Admin Console – Click Add New NFA Console – Enter name of console and hostname or IP address of NFA Console – Click Submit – Click Save  Open USM – Select router from inventory – Click Interface Details – Select interface to see the CA NFA “goodness”
  • 57. 57 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices for Production  Ensure that SNMPCollector is monitoring the same network devices sending flow data  Leverage SNMPCollector for utilization alarms and use CA NFA to understand what is driving the utilization  NFA Export IP address (configured on the Router) and SNMPC Polled IP should be the same. It is recommended to be the loopback interface or management IP of the device.  Collocate NFA_Inventory probe with the CA NFA Console
  • 58. 58 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 4 Exercise  In the following lab exercise, you will: – Validate data in CA NFA – Install and configure NFA_Inventory probe – Install and configure SNMPCollector probe – Execute Operational Workflow using CA Network Flow Analysis data inside of USM
  • 59. 59 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Lab Environment CA NFA Standalone CA ADA Standalone Florida - Infrastructure Arizona - Infrastructure Data Center Infrastructure TIXCHANGE-WEB Netflow SNMP Polling CA UIM with SNMPC R R CA UIM Robot Switch Router WAN Packet Data (SPAN) R R TIXCHANGE-APP TIXCHANGE-DB R Michigan - Infrastructure R
  • 60. 60 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 4 Summary  You should now be able to: – Understand CA UIM/CA NFA integration architecture and deployment requirements – Identify if CA NFA is successful collecting data – Install and configure NFA_Inventory probe – Install and configure SNMPCollector probe – Execute USM operational workflow using CA NFA/SNMPC Data  In the next module, you will: – Leverage Self Certification with SNMPCollector
  • 61. Module 5 – Self-Certification With SNMPCollector
  • 62. 62 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What SNMPC Self Certification IS:  Create new vendor certification for new device support – Associate SNMP OIDs with existing metric in an existing metric family  Create new custom monitors – Associate SNMP OIDs with existing metric in an existing metric family  Create and modify custom vendor certifications  Create Expressions for custom vendor certifications  Modify existing expressions in custom vendor certifications
  • 63. 63 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What SNMPC Self Certification IS NOT:  Redefine an existing metric in an existing Metric Family  Add new metric to and existing Metric Family  Define and create a new Metric Family  Automatically deploy a new custom vendor cert to multiple SNMPCollector probe instances
  • 64. 64 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD High Level Architecture for Self Certification
  • 65. 65 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Requirements  CA UIM 8.2+ installed  UMP 8.2+ installed  At least one installed instance of SNMP Collector 2.1+ – SNMPCollector must be on a secondary hub – SNMPCollector must be within the same domain as UMP
  • 66. 66 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Steps  Install and configure CA UIM 8.2 or later.  Download and deploy SNMPCollector per documentation, if not already deployed  Download and deploy Self Cert portlet to the UMP hub  Configure – Create a Self Certification portlet page – Add the Self Certification portlet to the created page
  • 67. 67 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices for Production  Names attribute must always be assigned for all custom vendor certification  Description should be assigned  Expressions must be validated using test  Tabular OIDs must be added from a single table to maintain integrity of indexing
  • 68. 68 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices for Product (cont’d)  Scalar OIDs can be picked from multiple MIBs  New custom vendor certs should be saved to running SNMPC instance
  • 69. 69 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 5 Exercise  In the following lab exercise, you will: – Add a new MIB File into MIB repository – Load MIB file into MIB Browser – Use Search feature to find a specific OID – Browse and select OIDs to monitor – Manually enter OID to monitor – Create a vendor cert for an existing MF – Deploy and validate a vendor cert
  • 70. 70 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Module 5 Summary  You should now be able to: – Load and manage MIB files in MIB repository – Create custom vendor certification – Deploy and start using custom vendor cert
  • 71. 71 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 72. 72 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO5T26T Tech Talk: Self-Certify New Devices with the CA Unified Infrastructure Management SNMP Collector 11/18/2015 at 3:00 pm DO5X127S Vision and Roadmap: Application-Aware Network Monitoring Solutions for UIM 11/18/2015 at 4:30 pm DO5T25T Tech Talk: Leverage the Combined Power of CA Unified Infrastructure Management, CA Network Flow Analysis and CA Application Delivery Analysis 11/19/2015 at 12:15 pm
  • 73. 73 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos CA UIM and CA APM Integration Area #5 ANPM Area #5 CA UIM for MSPs Area #5 CA UIM for Networking Area #5
  • 74. 74 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15