This topic provides an example of adding custom values to a keyed list that has none provided by default. You can follow this example to add values to other existing keyed lists.
You can use certain reports and queries to monitor activities by your business critical hosts. To do this, you must first identify these hosts as values in the key-value list for Critical_Assets.
Reports that use the Critical_Assets list include the following:
Similar reports for CA Access Control, CA Identity Manager, and CA SiteMinder use the Critical_Assets keyed list, for example: CA Access Control - Account Creations by Business Critical Hosts.
Queries that use the Critical_Assets list include the following:
If you create a custom query on critical assets, define the filter as follows:
Column |
Operator |
Value |
---|---|---|
dest_hostname |
Keyed |
Critical_Assets |
To define a filter for other keyed lists, replace the value with the list value you want. For example, you could set the filter value to EPHI_Database to filter for hostnames belonging to that keyed list.
To create keyed values for Critical_Assets
Reports using this keyed list that are generated by scheduled jobs begin reflecting data for the updated values.
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |