SlideShare a Scribd company logo
Pre-Con Education: Best Practices
with CA Workload Automation
AutoSys Edition (AE)
Michael Woods
DevOps: Continuous Delivery
CA Technologies
Principal Engineering Services Architect
DO4X110E
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
In this session we will cover the CA Technologies
recommended configuration and architectures
for CA Workload Automation AutoSys (AE) ,
including the scheduling engine, agents,
security and graphical user interface (GUI).
These best practices are designed to help
maximize performance and minimize
maintenance and issues.
Michael
Woods
CA Technologies
Principal Engineering
Services Architect
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHAT ARE BEST PRACTICES?
WORKLOAD AUTOMATION AE BEST PRACTICES
WORKLOAD CONTROL CENTER BEST PRACTICES
1
2
3
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What are Best Practices?
Normally reduces issues
 Not the same as taking the defaults
 Has a greater usage in client base
 Less chance for issues going forward
Not always best for you
 You may have unique requirements
 One size does not always fit all
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
VIRTUAL MACHINES
BOX JOBS
SUMMARY
START TIMES
PERFORMANCE TUNING
GLOBAL VARIABLES
Agenda
CA Workload Automation AutoSys Edition
SCHEDULER
APPLICATION SERVER
SECURITY
SYSTEM AGENTS
1
2
3
4
5
6
7
8
9
10
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Test Environment
If at all possible:
 Have a sandbox to do any engineering work like testing
– New releases
– Patches
– Different configuration settings
– Try out new procedures
 ALWAYS have a test system that can be used before applying to production
 DR should match production
 Create and execute a test plan
 Test architecture should mimic production
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scheduler
When the scheduler contacts an agent, it will cache or store the IP address in
memory for future use
– Decreases system network calls to increase performance
– Gathered again if a communication error occurs to agent
 Enabled by default
– Good for static environments
 Setting EnableIPCaching =0|1
– Located in $AUTOUSER/config.$AUTOSERV file
 When to turn it off
– IP addresses may change frequently
– Data Centers may move dynamically
– Not using VIP for clusters
Configuration Options
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Application Server
 Instance Wide Encryption:
– The encryption key used to communicate to the application server
– This key is used by all AE SDK clients, which includes command-line utilities like
sendevent, autorep,… and WCC
– If you write any SDK programs, you must specify the encryption type
– Without the encryption key, communication will fail
 For example, trying to force start a job from the development instance should not work if you
pointed it to the UAT instance
 Set to NONE when R11 agents are used
– If encryption is required, use the CSAM SSL encryption
 Set by UseEncryption setting
– We recommend using a unique key for each tier of service
 Sandbox should not be using the same key as production
– Use a different one per instance??
Configuration Options
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Global Variables
 Use application name as prefix to prevent using the same name
 Use EEM to secure
 Limit where changes are made from to reduce race conditions
– Day of week, date, on/off switch….
 Could Resources be a better fit?
– Managed by scheduler
– Also securable
– Easier to track and maintain
Naming Conventions
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Calendars
 Use application name as prefix to prevent different groups from modifying
each others calendars
 Use EEM to secure
 Create corporate standard calendars for most commonly used:
– First working day of month, last working day of month, third Tuesday…
– Use extended calendars when it makes sense, reduce work going forward
– Convert existing calendars to extended calendars, when sensible or convenient
 Use Extended Calendars when applicable:
– Define once and do not need to update again
– Generates a year in advance, keeps updating to keep a years worth of data
– Limitation: Can not be used as Holiday calendars
Naming Conventions
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Boxes
 Avoid having different start times inside box, delays the completion
of the box
 Avoid having different start dates inside the box, introduces further delay
 Reduce the depth of nesting to get better performance
 Not every job needs to be in a box
– Boxes decrease performance when overused, ties up threads until
box is complete
 Consider using group and application fields to logically group jobs
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Start Times
Try to stagger jobs as much as possible to get a smoother job
submission curve:
 Will actually submit faster than large number of starts at one time
 Use the forecast command or the API to see how many are being started
at same time
 Typically, 0, 15, 30, 45 are the most commonly used start times
 Use diverse start times in your schedule
 Try to prevent jobs running every minute when possible
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
System Agent
 Use a consistent agentparm.txt to simplify installs, maintenance and
troubleshooting efforts
 Keep enough log data for trouble shooting
 Some job types like ftp have additional information in spool file, so
automatic cleanup at success may not be advantageous
 Do not add managers that are not needed to agents, may cause additional
overhead
– Do not have duplicate manager names specified, can cause
communication errors
 Use a common communication protocol (plain recommended)
 Reduce agent sleep period for managers that do not respond
– 2 minutes default, can delay failovers
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Machine Definition
 Use opsys field
– On Windows – required for domain users
– Useful to self document
 Description field
– Again, self documenting, make it count
 Geography, Business line, …
 Use fully qualified domain names on node_name attribute
 Use different encryption keys per environment
– Recommended not to use the DEFAULT key in production
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security
Two security models available:
 External: Uses Embedded Entitlements Manager (EEM)
– Allows more granular security
– Works well with multiple operating systems
 Native: “UNIX” style security, owner, group, world
– Can be hard to enforce security when owners/end users require
multiple groups
 External is best practice
Internal or External
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security
 Keep it as simple as possible
– Think of maintenance going forward
 Use Group membership, not individual user IDs
– People move on, groups normally do not
 If not using LDAP, use Global groups in EEM to
lessen maintenance
EEM Policy
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
EEM User Store
 Use company user store and groups when possible
– Cleanup is automatic when user record deleted
– Security is owned by security group
 Dynamic User Group:
– Mapping LDAP group to naming convention
– Too many can cause performance issues (1000’s)
 Limited Use of Regular expressions in Resource Name:
– Backtracking specifically (ABC|XYZ)
– Keep to minimum
– Impacts performance
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
EEM Security Administration
 Do not use EiamAdmin – makes audit less accurate
 Create Security administrators using scoping policy
– Check AdministerObjects default policy for sample or add users to it
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Client Installations
 Only install when required
– Reduce maintenance effort
– Reduce manual intervention for audit and control
– Use the scheduler as a scheduler
– Smaller footprint
– Run from Scheduler machine?
– More secure
– Turn on autotrack to have an audit of who did what and when and
from where
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
 AE
– SCHED_SCALE
– DB_CONNECTIONS
– Use statistics aggregation to collect performance data
– Run stat reports on a regular basis to start spotting trends
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Lifecycle
 Have a strict change control process in place
– Sending emails is not a process
 Customers should not be moving untested jobs
into production
– Customer should validate jobs runs to success in Test/UAT
 Have a Dev instance for developing code, not production
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Data Retention
Keep your DB as small as possible to improve performance
 How many days event and job run data to retain?
– What are your user requirements?
– How many job runs per day?
 How many days of archived jobs?
– Best practice is 1 day. Cannot be retrieved, so why keep?
 How many days of audit information?
– Do you action alarms or use a external monitor?
– If not using alarms directly, keep only 1 day worth of data
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Data Retention Continued
DBMaint:
 Should use internal or external method?
– Config setting at 3:30 am each day
– Create jobs that run commands
 For example, should archive events run more often than archive jobs?
 How many times a day to run?
– Shops that have a large run per day or keep a high number of days of
data may want to run more than once a day
– Want to keep processed event table small as possible
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Health Monitoring
 Automate monitoring of failures:
– SNMP traps to your favorite tool
– Email
– CCS Event Management
– iDash for monitoring of SLA
 WA AE health:
– Alarms self-generated
– Monitor processes with your
corporate standard tool
Component Process Name
Scheduler event_demon
Application Server as_server
EEM igateway
CA Directory dxadmin
System Agent cybAgent
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scripts and Programs
Document exit codes:
 If not a simple 0|1, they should have meaning to speed debugging or used
to decide what job runs next
 Think about recovery:
– What needs to be rerun?
– Document runbook steps.
– Should it be broken up into multiple jobs?
 Can any checks be made to help jobs succeed?
– Job types can check process/services are running
– Check CPU/disk space
– Check any external machine dependencies
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Scripts and Programs Continued
 Use fully qualified commands on job definition
 Use fully qualified commands and file names in scripts
 Use supplied variable when dealing with AE environment
– $AUTOSYS/bin/autorep –j test
– $AUTOSERV for instance name
 Use an env or set command to write out environment
variables, ensure you have what is expected
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Password Expiration
Service Accounts
 If permissible, use un-expiring passwords
 When not, use autosys_secure in batch mode to update
passwords
– autosys_secure –c fred@ca.com –o oldpass –p newpass
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
Workload Control Center
WCC
CREATE THE ENVIRONMENT
CONFIGURATION
MONITORING VIEWS
ALERTS
PERFORMANCE TUNING
SUMMARY
1
3
4
5
6
7
2
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Define the roles you need:
 Admin
 Operations
 Scheduler
 Application developer
 Line or business user
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users Continued
 Define what tabs (applications) each role should have
 What servers should they have access to?
– Development
– UAT
– Production
 What tabs per server?
– Edit for dev, but not for prod?
– Send event / monitoring in prod, but no edit
 What views should they have?
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
One security mode available:
 Security is used to determine what will be displayed
– Remove unused tabs
– Reduce questions/issues on features not used or wanted
 Use security to protect what needs protection and also to
reduce the noise
– Show what they are interested in
Using Security
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
There are 50+ job types.
 How many are required?
 Do you have Oracle E Business?
 Do you have SAP?
 Do you have PeopleSoft?
 Do you have z/OS?
 Do you allow FTP?
Configuration Options
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
 General notes for running commands for job types:
– User_name: EEM user, local user with access
– Password: Users EEM password
– Application_name: qedit or appedit
 Command must be run with a userid able to update log files
 Use the userid designated at install as the run as user
 The default is root
Batch Interfaces
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Creating a list of desired job types:
 List available job types to see what is currently available and
not available:
filter_jobtypes -u user_name -p password -t application_name -l
 Remove job types from being displayed:
filter_jobtypes -u user_name -p password -t application_name –r
all|jobtype1[,jobtype2,…,jobtypex]
 Add job types to available list:
filter_jobtypes -u user_name -p password -t application_name -a
all|jobtype1[,jobtype2,…,jobtypex]
Batch Interfaces Continued
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Creating the Environment for Users
Creating views in batch:
 Create a list of applications required to have a view
 Create a sample view based on your requirements
 Export the view
– wcc_monitor -u user_name -p password –x export_file –view sampleView
 Edit exported view to replace job name to ‘XXXX’
 Create script to ‘sed’ template and replace ‘XXXX’ with your application
prefix using your naming convention
 Import views:
– wcc_monitor -u user_name -p password –i input_file
Batch Interfaces Continued
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates CLI
 Creates job templates to be used both in Quick Edit and
Application Editor
 Global template for all users, templates only for specific uses
 Syntax:
job_template -u,--user <user>
-p,--password <password>
<-g,--global |
-f,--for-user <user> >
< -l,--list | -r,--remove <template-name> |
-i,--import <template-name> <file-name> |
-export <template-name> <file-name> >
[-o,--overwrite]
[-?,--help]
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
1. Use autorep to prepare JIL definitions
2. Modify JIL file to prepare it for import as a template
3. Create a global template for all users
4. Create a template for ejmcommander user only
5. List the global templates available
6. List the templates available for ejmcommander user only
7. Log in to Quick Editor as ejmcommander and use the
new templates
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Use autorep output to create a JIL file:
autorep –q –j JOBNAME > filename.jil
Prepare JIL Definitions
Note 1: After JIL files are
ready, copy them to a
computer running WCC.
Note 2: It is possible to
have only 1 job
definition for 1 file to
import as template.
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Delete insert_job: JOBNAME
 In case you want to use job name as a part of template:
– rename insert_job: JOBNAME to job_name: JOBNAME
– put job_type: TYPE on a new line
 Repeat the same for both JIL files
Prepare JIL Definitions Continued
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Import global template:
job_template.bat -u ejmcommander -p ejmcommander -g -i
globalTemplate c:tempglobal_template.jil
Import as a Global Template
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 Import user template:
job_template.bat -u ejmcommander -p ejmcommander –f
ejmcommander -i userTemplate c:tempuser_template.jil
Import as a User Template
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
 List the global templates available:
job_template.bat -u ejmcommander -p ejmcommander –l –g
 List the user templates available:
job_template.bat -u ejmcommander -p ejmcommander –l -f
List the Templates
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Job Templates – Use Case
Open the Quick Editor
Create Object dialog and
check for templates:
Use the Templates
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices
 Log on again after adding add/modify a template using
job_template CLI
 Log on again after modifying filter job types filter using
filter_jobtypes CLI
 Log on again to apply new or updated EEM policies
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC
 Limit who can create views
– Duplicate or wildcard for ALL can hurt performance
 If 11.3 or higher, go to 11.4 for new features and better
performance
– Requires EEM 12.51
 If 11.3.6 AE and using EEM, use a global ECLI user and restrict
access to the Credentials tab
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC Continued
 An external DB when HA is required
– Derby does not support HA
 Use an external DB for better performance when one or more apply
– Monitoring and configuration DB:
 Over 50k defined jobs
 Over 50k job runs
 70 concurrent users
 Over 200 views
 Over 500 alerts defined
 Over 5 AE servers defined
– Reporting DB:
 Over 1 Million job runs in reporting DB
 Can be switched after install
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
WCC Continued
 Let users have self-service in production to relieve Operations
from getting overwhelmed and potentially less error prone
– Must be auditable
– Must be secured
 EEM can audit this activity, your policy secures it
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
WCC
 Check tuning guide for specific instructions
– Java.Maxmemory is major one
– Two tomcats
– 32 bit – should not exceed 1G
– 64 bit – can be set larger, check what is available on your system
 Linux
install_dir/tomcat/conf/wrapper.conf
# Uncomment this line if the entropy of the UNIX machine is low to
speed up encryption
# The dot between /dev and /urandom is not a mistake
wrapper.java.additional.101=-Djava.security.egd=file:/dev/./urandom
50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Performance Tuning
DB Maintenance
 Alarms and Alerts
– Turn off if not using AE Alarms
– Keep only required days of data
 Reporting data
– Keep only required amount of data
EEM Event Policy
 Disable or update policy for Authenticate With Artifact
51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO4T07S Vision and Roadmap: CA Workload Automation
Thursday at 12:15 pm (DevOps
Continuous Delivery Theatre 4)
DO4X177S
Vision and Roadmap: CA Workload Automation AE
(AutoSys)
Wednesday at 4:30 pm (Lagoon D)
DO4X180S
Case Study: CenterPoint Energy Achieves .0003 abends
with CA Workload Automation AE (AutoSys®)
Thursday at 3:45 pm (Lagoon D)
DO4X177S
Case Study: Large Fuel Company Reduces the Cost and
Complexity of Managing Mission Critical SAP and non-SAP
Jobs
Thursday at 1:00 pm (Lagoon D)
53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Maximize SLA
Management and
Extend Workloads
to SAP®
DevOps Continuous
Delivery Theatre 4
Reduce the Cost
and Complexities
of Managing
Hadoop
Workloads
DevOps Continuous
Delivery Theatre 4
54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow Conversations At…
CA Workload Automation
Mainframe Theatre
CA Workload Automation iDash
DevOps Continuous Delivery Theatre
Thursday 1:00PM
55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot (20)

PPT
WebSphere application server 8.5.5 - quick overview
Chris Sparshott
 
PPT
Oracle Apps - Forms
Bhaskara Reddy Sannapureddy
 
PPT
Oracle Payable Complete Business flows
Adil Arshad
 
PPT
Graphical User Interface in JAVA
suraj pandey
 
PPTX
Apache tomcat
Shashwat Shriparv
 
PDF
Spring Boot
Jaydeep Kale
 
PDF
MQ Guide France - IBM MQ and Containers
Robert Parker
 
PDF
12753028 scot-configuration-troubleshooting
kratos1979
 
PPTX
Oracle receivables
Suresh Mishra
 
PPTX
Spring beans
Roman Dovgan
 
PPSX
Spring - Part 1 - IoC, Di and Beans
Hitesh-Java
 
DOCX
How to create planner from inventory setups (Oracle- Inventory)
FAHAD ULLAH
 
PDF
Oracle Financials R12 - GL STEP 1 - Chart Of Accounts
Mohammed Raouf
 
DOC
Oracle ERP Personalization for control master items list
Ahmed Elshayeb
 
PDF
zOSMF SDSF_ShareLab_V2R5.pdf
Marna Walle
 
PDF
Oracle Fixed assets ivas
Ali Ibrahim
 
PPTX
Workshop spring session 2 - La persistance au sein des applications Java
Antoine Rey
 
PDF
Spring Data JPA
Cheng Ta Yeh
 
PPTX
Oracle EBS R12.2 - Deployment and System Administration
Mozammel Hoque
 
PPSX
Unicenter Autosys Job Management
Venkata Duvvuri
 
WebSphere application server 8.5.5 - quick overview
Chris Sparshott
 
Oracle Apps - Forms
Bhaskara Reddy Sannapureddy
 
Oracle Payable Complete Business flows
Adil Arshad
 
Graphical User Interface in JAVA
suraj pandey
 
Apache tomcat
Shashwat Shriparv
 
Spring Boot
Jaydeep Kale
 
MQ Guide France - IBM MQ and Containers
Robert Parker
 
12753028 scot-configuration-troubleshooting
kratos1979
 
Oracle receivables
Suresh Mishra
 
Spring beans
Roman Dovgan
 
Spring - Part 1 - IoC, Di and Beans
Hitesh-Java
 
How to create planner from inventory setups (Oracle- Inventory)
FAHAD ULLAH
 
Oracle Financials R12 - GL STEP 1 - Chart Of Accounts
Mohammed Raouf
 
Oracle ERP Personalization for control master items list
Ahmed Elshayeb
 
zOSMF SDSF_ShareLab_V2R5.pdf
Marna Walle
 
Oracle Fixed assets ivas
Ali Ibrahim
 
Workshop spring session 2 - La persistance au sein des applications Java
Antoine Rey
 
Spring Data JPA
Cheng Ta Yeh
 
Oracle EBS R12.2 - Deployment and System Administration
Mozammel Hoque
 
Unicenter Autosys Job Management
Venkata Duvvuri
 

Viewers also liked (20)

PPTX
Autosys Complete Guide
karunakar81987
 
PDF
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
CA Technologies
 
PDF
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
CA Technologies
 
PPTX
Autosys
Gagandeep Singh
 
PDF
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Technologies
 
PDF
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
CA Technologies
 
PPTX
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
Extra Technology
 
PDF
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
CA Technologies
 
PDF
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
CA Technologies
 
PDF
Real World Best Practices with CA Workload Automation AE 11.3.6
CA Technologies
 
PDF
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
CA Technologies
 
PDF
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
CA Technologies
 
PDF
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
CA Technologies
 
PDF
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
 
PDF
ThruPut Manager AE+: Automation for Production Control and Capacity Management
CA Technologies
 
PDF
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
CA Technologies
 
PPTX
Oracle architecture ppt
Deepak Shetty
 
PDF
Hype vs. Reality: The AI Explainer
Luminary Labs
 
PDF
Visual Design with Data
Seth Familian
 
PDF
TEDx Manchester: AI & The Future of Work
Volker Hirsch
 
Autosys Complete Guide
karunakar81987
 
Upgrade and Unleash the Power of CA Workload Automation AutoSys (AE) and CA W...
CA Technologies
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
CA Technologies
 
CA Workload Automation ESP: Tips and Tricks for Getting the Most Out of Your...
CA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
CA Technologies
 
CA Workload Automation Product Roadmap - CA Workload Automation Technology Su...
Extra Technology
 
Pre-Con Ed: Best Practices: Enabling CA Workload Automation DE Artifacts to M...
CA Technologies
 
Pre-Con Ed: CA Workload Automation DE and ESP Edition: Some Novel Uses for th...
CA Technologies
 
Real World Best Practices with CA Workload Automation AE 11.3.6
CA Technologies
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
CA Technologies
 
Pre-Con Ed: Wobtrigs and File triggers with CA Workload Automation ESP Edition
CA Technologies
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
CA Technologies
 
Critical Path Forecasting with CA Workload Automation iDash
CA Technologies
 
ThruPut Manager AE+: Automation for Production Control and Capacity Management
CA Technologies
 
Case Study: Verizon - CA Workload Automation ESP Edition: Best Practice’s, De...
CA Technologies
 
Oracle architecture ppt
Deepak Shetty
 
Hype vs. Reality: The AI Explainer
Luminary Labs
 
Visual Design with Data
Seth Familian
 
TEDx Manchester: AI & The Future of Work
Volker Hirsch
 
Ad

Similar to Best Practices with CA Workload Automation AutoSys (AE) (20)

PDF
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
CA Technologies
 
PDF
Service desk release_enu
gauravneo_007
 
PDF
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
CA Technologies
 
PDF
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
Extra Technology
 
PDF
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
PDF
CA Gen Exploration – What's New and Cool in Application Development
CA Technologies
 
PDF
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
PDF
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
CA Technologies
 
PDF
Ten Things You Should not Forget in Mainframe Security
CA Technologies
 
PDF
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
CA Technologies
 
PDF
Leveraging CA Technologies Application Development Solutions to Rapidly Deliv...
CA Technologies
 
DOCX
Autosys Trainer CV
DS gupta
 
PDF
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
CA Technologies
 
PDF
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
CA Technologies
 
PDF
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
CA Technologies
 
PPTX
Pre-Con Ed: Upgrading to CA Service Management
CA Technologies
 
PDF
Technology Primer: Building Applications the New-Fashioned Way
CA Technologies
 
PDF
CA 7 Workload Agent Diagnostics - CA Workload Automation Technology Summit (W...
Extra Technology
 
PDF
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
CA Technologies
 
PPTX
Pre-Con Ed: What's New in CA Service Management
CA Technologies
 
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
CA Technologies
 
Service desk release_enu
gauravneo_007
 
Pre-Con Ed: Configuring CA Workload Automation AE for optimal results
CA Technologies
 
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
Extra Technology
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
CA Gen Exploration – What's New and Cool in Application Development
CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
CA Technologies
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
CA Technologies
 
Leveraging CA Technologies Application Development Solutions to Rapidly Deliv...
CA Technologies
 
Autosys Trainer CV
DS gupta
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
CA Technologies
 
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
CA Technologies
 
Reducing Cost and Complexity Managing Mission-Critical SAP® and Non-SAP Jobs
CA Technologies
 
Pre-Con Ed: Upgrading to CA Service Management
CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
CA Technologies
 
CA 7 Workload Agent Diagnostics - CA Workload Automation Technology Summit (W...
Extra Technology
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
CA Technologies
 
Pre-Con Ed: What's New in CA Service Management
CA Technologies
 
Ad

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
CA Technologies
 
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
PDF
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
PDF
Case Study: Privileged Access in a World on Time
CA Technologies
 
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
PDF
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
PDF
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
PDF
Keynote: Making Security a Competitive Advantage
CA Technologies
 
PDF
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

Recently uploaded (20)

PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
July Patch Tuesday
Ivanti
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
July Patch Tuesday
Ivanti
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 

Best Practices with CA Workload Automation AutoSys (AE)

  • 1. Pre-Con Education: Best Practices with CA Workload Automation AutoSys Edition (AE) Michael Woods DevOps: Continuous Delivery CA Technologies Principal Engineering Services Architect DO4X110E
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract In this session we will cover the CA Technologies recommended configuration and architectures for CA Workload Automation AutoSys (AE) , including the scheduling engine, agents, security and graphical user interface (GUI). These best practices are designed to help maximize performance and minimize maintenance and issues. Michael Woods CA Technologies Principal Engineering Services Architect
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT ARE BEST PRACTICES? WORKLOAD AUTOMATION AE BEST PRACTICES WORKLOAD CONTROL CENTER BEST PRACTICES 1 2 3
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What are Best Practices? Normally reduces issues  Not the same as taking the defaults  Has a greater usage in client base  Less chance for issues going forward Not always best for you  You may have unique requirements  One size does not always fit all
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD VIRTUAL MACHINES BOX JOBS SUMMARY START TIMES PERFORMANCE TUNING GLOBAL VARIABLES Agenda CA Workload Automation AutoSys Edition SCHEDULER APPLICATION SERVER SECURITY SYSTEM AGENTS 1 2 3 4 5 6 7 8 9 10
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Test Environment If at all possible:  Have a sandbox to do any engineering work like testing – New releases – Patches – Different configuration settings – Try out new procedures  ALWAYS have a test system that can be used before applying to production  DR should match production  Create and execute a test plan  Test architecture should mimic production
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scheduler When the scheduler contacts an agent, it will cache or store the IP address in memory for future use – Decreases system network calls to increase performance – Gathered again if a communication error occurs to agent  Enabled by default – Good for static environments  Setting EnableIPCaching =0|1 – Located in $AUTOUSER/config.$AUTOSERV file  When to turn it off – IP addresses may change frequently – Data Centers may move dynamically – Not using VIP for clusters Configuration Options
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Application Server  Instance Wide Encryption: – The encryption key used to communicate to the application server – This key is used by all AE SDK clients, which includes command-line utilities like sendevent, autorep,… and WCC – If you write any SDK programs, you must specify the encryption type – Without the encryption key, communication will fail  For example, trying to force start a job from the development instance should not work if you pointed it to the UAT instance  Set to NONE when R11 agents are used – If encryption is required, use the CSAM SSL encryption  Set by UseEncryption setting – We recommend using a unique key for each tier of service  Sandbox should not be using the same key as production – Use a different one per instance?? Configuration Options
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Global Variables  Use application name as prefix to prevent using the same name  Use EEM to secure  Limit where changes are made from to reduce race conditions – Day of week, date, on/off switch….  Could Resources be a better fit? – Managed by scheduler – Also securable – Easier to track and maintain Naming Conventions
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Calendars  Use application name as prefix to prevent different groups from modifying each others calendars  Use EEM to secure  Create corporate standard calendars for most commonly used: – First working day of month, last working day of month, third Tuesday… – Use extended calendars when it makes sense, reduce work going forward – Convert existing calendars to extended calendars, when sensible or convenient  Use Extended Calendars when applicable: – Define once and do not need to update again – Generates a year in advance, keeps updating to keep a years worth of data – Limitation: Can not be used as Holiday calendars Naming Conventions
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Boxes  Avoid having different start times inside box, delays the completion of the box  Avoid having different start dates inside the box, introduces further delay  Reduce the depth of nesting to get better performance  Not every job needs to be in a box – Boxes decrease performance when overused, ties up threads until box is complete  Consider using group and application fields to logically group jobs
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Start Times Try to stagger jobs as much as possible to get a smoother job submission curve:  Will actually submit faster than large number of starts at one time  Use the forecast command or the API to see how many are being started at same time  Typically, 0, 15, 30, 45 are the most commonly used start times  Use diverse start times in your schedule  Try to prevent jobs running every minute when possible
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD System Agent  Use a consistent agentparm.txt to simplify installs, maintenance and troubleshooting efforts  Keep enough log data for trouble shooting  Some job types like ftp have additional information in spool file, so automatic cleanup at success may not be advantageous  Do not add managers that are not needed to agents, may cause additional overhead – Do not have duplicate manager names specified, can cause communication errors  Use a common communication protocol (plain recommended)  Reduce agent sleep period for managers that do not respond – 2 minutes default, can delay failovers
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Machine Definition  Use opsys field – On Windows – required for domain users – Useful to self document  Description field – Again, self documenting, make it count  Geography, Business line, …  Use fully qualified domain names on node_name attribute  Use different encryption keys per environment – Recommended not to use the DEFAULT key in production
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security Two security models available:  External: Uses Embedded Entitlements Manager (EEM) – Allows more granular security – Works well with multiple operating systems  Native: “UNIX” style security, owner, group, world – Can be hard to enforce security when owners/end users require multiple groups  External is best practice Internal or External
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security  Keep it as simple as possible – Think of maintenance going forward  Use Group membership, not individual user IDs – People move on, groups normally do not  If not using LDAP, use Global groups in EEM to lessen maintenance EEM Policy
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD EEM User Store  Use company user store and groups when possible – Cleanup is automatic when user record deleted – Security is owned by security group  Dynamic User Group: – Mapping LDAP group to naming convention – Too many can cause performance issues (1000’s)  Limited Use of Regular expressions in Resource Name: – Backtracking specifically (ABC|XYZ) – Keep to minimum – Impacts performance
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD EEM Security Administration  Do not use EiamAdmin – makes audit less accurate  Create Security administrators using scoping policy – Check AdministerObjects default policy for sample or add users to it
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Client Installations  Only install when required – Reduce maintenance effort – Reduce manual intervention for audit and control – Use the scheduler as a scheduler – Smaller footprint – Run from Scheduler machine? – More secure – Turn on autotrack to have an audit of who did what and when and from where
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning  AE – SCHED_SCALE – DB_CONNECTIONS – Use statistics aggregation to collect performance data – Run stat reports on a regular basis to start spotting trends
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Lifecycle  Have a strict change control process in place – Sending emails is not a process  Customers should not be moving untested jobs into production – Customer should validate jobs runs to success in Test/UAT  Have a Dev instance for developing code, not production
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Retention Keep your DB as small as possible to improve performance  How many days event and job run data to retain? – What are your user requirements? – How many job runs per day?  How many days of archived jobs? – Best practice is 1 day. Cannot be retrieved, so why keep?  How many days of audit information? – Do you action alarms or use a external monitor? – If not using alarms directly, keep only 1 day worth of data
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Retention Continued DBMaint:  Should use internal or external method? – Config setting at 3:30 am each day – Create jobs that run commands  For example, should archive events run more often than archive jobs?  How many times a day to run? – Shops that have a large run per day or keep a high number of days of data may want to run more than once a day – Want to keep processed event table small as possible
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Health Monitoring  Automate monitoring of failures: – SNMP traps to your favorite tool – Email – CCS Event Management – iDash for monitoring of SLA  WA AE health: – Alarms self-generated – Monitor processes with your corporate standard tool Component Process Name Scheduler event_demon Application Server as_server EEM igateway CA Directory dxadmin System Agent cybAgent
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scripts and Programs Document exit codes:  If not a simple 0|1, they should have meaning to speed debugging or used to decide what job runs next  Think about recovery: – What needs to be rerun? – Document runbook steps. – Should it be broken up into multiple jobs?  Can any checks be made to help jobs succeed? – Job types can check process/services are running – Check CPU/disk space – Check any external machine dependencies
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Scripts and Programs Continued  Use fully qualified commands on job definition  Use fully qualified commands and file names in scripts  Use supplied variable when dealing with AE environment – $AUTOSYS/bin/autorep –j test – $AUTOSERV for instance name  Use an env or set command to write out environment variables, ensure you have what is expected
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Password Expiration Service Accounts  If permissible, use un-expiring passwords  When not, use autosys_secure in batch mode to update passwords – autosys_secure –c [email protected] –o oldpass –p newpass
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda Workload Control Center WCC CREATE THE ENVIRONMENT CONFIGURATION MONITORING VIEWS ALERTS PERFORMANCE TUNING SUMMARY 1 3 4 5 6 7 2
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Define the roles you need:  Admin  Operations  Scheduler  Application developer  Line or business user
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Continued  Define what tabs (applications) each role should have  What servers should they have access to? – Development – UAT – Production  What tabs per server? – Edit for dev, but not for prod? – Send event / monitoring in prod, but no edit  What views should they have?
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users One security mode available:  Security is used to determine what will be displayed – Remove unused tabs – Reduce questions/issues on features not used or wanted  Use security to protect what needs protection and also to reduce the noise – Show what they are interested in Using Security
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users There are 50+ job types.  How many are required?  Do you have Oracle E Business?  Do you have SAP?  Do you have PeopleSoft?  Do you have z/OS?  Do you allow FTP? Configuration Options
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users  General notes for running commands for job types: – User_name: EEM user, local user with access – Password: Users EEM password – Application_name: qedit or appedit  Command must be run with a userid able to update log files  Use the userid designated at install as the run as user  The default is root Batch Interfaces
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Creating a list of desired job types:  List available job types to see what is currently available and not available: filter_jobtypes -u user_name -p password -t application_name -l  Remove job types from being displayed: filter_jobtypes -u user_name -p password -t application_name –r all|jobtype1[,jobtype2,…,jobtypex]  Add job types to available list: filter_jobtypes -u user_name -p password -t application_name -a all|jobtype1[,jobtype2,…,jobtypex] Batch Interfaces Continued
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Creating the Environment for Users Creating views in batch:  Create a list of applications required to have a view  Create a sample view based on your requirements  Export the view – wcc_monitor -u user_name -p password –x export_file –view sampleView  Edit exported view to replace job name to ‘XXXX’  Create script to ‘sed’ template and replace ‘XXXX’ with your application prefix using your naming convention  Import views: – wcc_monitor -u user_name -p password –i input_file Batch Interfaces Continued
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates CLI  Creates job templates to be used both in Quick Edit and Application Editor  Global template for all users, templates only for specific uses  Syntax: job_template -u,--user <user> -p,--password <password> <-g,--global | -f,--for-user <user> > < -l,--list | -r,--remove <template-name> | -i,--import <template-name> <file-name> | -export <template-name> <file-name> > [-o,--overwrite] [-?,--help]
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case 1. Use autorep to prepare JIL definitions 2. Modify JIL file to prepare it for import as a template 3. Create a global template for all users 4. Create a template for ejmcommander user only 5. List the global templates available 6. List the templates available for ejmcommander user only 7. Log in to Quick Editor as ejmcommander and use the new templates
  • 39. 39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Use autorep output to create a JIL file: autorep –q –j JOBNAME > filename.jil Prepare JIL Definitions Note 1: After JIL files are ready, copy them to a computer running WCC. Note 2: It is possible to have only 1 job definition for 1 file to import as template.
  • 40. 40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Delete insert_job: JOBNAME  In case you want to use job name as a part of template: – rename insert_job: JOBNAME to job_name: JOBNAME – put job_type: TYPE on a new line  Repeat the same for both JIL files Prepare JIL Definitions Continued
  • 41. 41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Import global template: job_template.bat -u ejmcommander -p ejmcommander -g -i globalTemplate c:tempglobal_template.jil Import as a Global Template
  • 42. 42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  Import user template: job_template.bat -u ejmcommander -p ejmcommander –f ejmcommander -i userTemplate c:tempuser_template.jil Import as a User Template
  • 43. 43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case  List the global templates available: job_template.bat -u ejmcommander -p ejmcommander –l –g  List the user templates available: job_template.bat -u ejmcommander -p ejmcommander –l -f List the Templates
  • 44. 44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Job Templates – Use Case Open the Quick Editor Create Object dialog and check for templates: Use the Templates
  • 45. 45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Best Practices  Log on again after adding add/modify a template using job_template CLI  Log on again after modifying filter job types filter using filter_jobtypes CLI  Log on again to apply new or updated EEM policies
  • 46. 46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC  Limit who can create views – Duplicate or wildcard for ALL can hurt performance  If 11.3 or higher, go to 11.4 for new features and better performance – Requires EEM 12.51  If 11.3.6 AE and using EEM, use a global ECLI user and restrict access to the Credentials tab
  • 47. 47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC Continued  An external DB when HA is required – Derby does not support HA  Use an external DB for better performance when one or more apply – Monitoring and configuration DB:  Over 50k defined jobs  Over 50k job runs  70 concurrent users  Over 200 views  Over 500 alerts defined  Over 5 AE servers defined – Reporting DB:  Over 1 Million job runs in reporting DB  Can be switched after install
  • 48. 48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD WCC Continued  Let users have self-service in production to relieve Operations from getting overwhelmed and potentially less error prone – Must be auditable – Must be secured  EEM can audit this activity, your policy secures it
  • 49. 49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning WCC  Check tuning guide for specific instructions – Java.Maxmemory is major one – Two tomcats – 32 bit – should not exceed 1G – 64 bit – can be set larger, check what is available on your system  Linux install_dir/tomcat/conf/wrapper.conf # Uncomment this line if the entropy of the UNIX machine is low to speed up encryption # The dot between /dev and /urandom is not a mistake wrapper.java.additional.101=-Djava.security.egd=file:/dev/./urandom
  • 50. 50 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Performance Tuning DB Maintenance  Alarms and Alerts – Turn off if not using AE Alarms – Keep only required days of data  Reporting data – Keep only required amount of data EEM Event Policy  Disable or update policy for Authenticate With Artifact
  • 51. 51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 52. 52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO4T07S Vision and Roadmap: CA Workload Automation Thursday at 12:15 pm (DevOps Continuous Delivery Theatre 4) DO4X177S Vision and Roadmap: CA Workload Automation AE (AutoSys) Wednesday at 4:30 pm (Lagoon D) DO4X180S Case Study: CenterPoint Energy Achieves .0003 abends with CA Workload Automation AE (AutoSys®) Thursday at 3:45 pm (Lagoon D) DO4X177S Case Study: Large Fuel Company Reduces the Cost and Complexity of Managing Mission Critical SAP and non-SAP Jobs Thursday at 1:00 pm (Lagoon D)
  • 53. 53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Maximize SLA Management and Extend Workloads to SAP® DevOps Continuous Delivery Theatre 4 Reduce the Cost and Complexities of Managing Hadoop Workloads DevOps Continuous Delivery Theatre 4
  • 54. 54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow Conversations At… CA Workload Automation Mainframe Theatre CA Workload Automation iDash DevOps Continuous Delivery Theatre Thursday 1:00PM
  • 55. 55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15