Previous Topic: Introduction

Next Topic: Planning Your Environment

About This Guide

This CA Enterprise Log Manager Implementation Guide provides the instructions you need for planning, installing, and configuring CA Enterprise Log Manager to receive event logs from events sources in your network. The guide is organized so that tasks start with a description of the process and its goals. Processes are generally followed by relevant concepts, and then one or more procedures to accomplish the goal.

The CA Enterprise Log Manager Implementation Guide is designed for system administrators who have responsibility for installing, configuring and maintaining a log collection solution, creating users and assigning or defining their roles and access, and maintaining backup data.

This guide also assists any personnel who need information on how to do the following:

A summary of the contents follows:

Section

Description

Planning Your Environment

Describes planning activities for areas such as log collection, agents, federation, user and access management, subscription updates, and disaster recovery.

Installing CA Enterprise Log Manager

Provides work sheets for gathering required information, and detailed instructions on how to install CA Enterprise Log Manager and verify proper installation.

Configuring Basic Users and Access

Provides instructions for identifying a user store and creating the initial administrative user for the configuration of other user and access details.

Configuring Services

Provides instructions for configuring services including global and local filters, the event log store, report server, and subscription options.

Configuring Event Collection

Provides concepts and instructions for using or configuring the event refinement library components including the mapping and parsing files, and the CA adapters.

Creating Federations

Describes different types of federations and provides instructions for creating federated relationships between CA Enterprise Log Manager servers and viewing a federation graph.

Working with the Event Refinement Library

Provides high-level information about working with message parsing and data mapping files.

Considerations for CA Audit Users

Describes the interactions you can implement between CA Enterprise Log Manager and CA Audit, how to configure iRecorders and policies, and how to import data from your CA Audit Collector database.

Considerations for CA Access Control Users

Describes how to integrate with CA Access Control, how to modify CA Audit policies to send events to CA Enterprise Log Manager, how to configure a CA Access Control iRecorder to send events to CA Enterprise Log Manager, and how to import CA Access Control events form a CA Audit Collector database,

CA IT PAM Considerations

Describes the process of installing CA IT PAM such that the EEM component on the management CA Enterprise Log Manager handles authentication.

Disaster Recovery

Describes backup, restoration, and replacement procedures for ensuring recovery of your log management solution in case of disaster.

CA Enterprise Log Manager and Virtualization

Describes the process to use to create and configure a virtual machine to contain a CA Enterprise Log Manager server.

Note: For details on operating system support or system requirements, see the Release Notes. For a basic CA Enterprise Log Manager overview and use scenario, see the Overview Guide. For details on using and maintaining the product, see the Administration Guide. For help on using any CA Enterprise Log Manager page, see the online help.