This CA Enterprise Log Manager Implementation Guide provides the instructions you need for planning, installing, and configuring CA Enterprise Log Manager to receive event logs from events sources in your network. The guide is organized so that tasks start with a description of the process and its goals. Processes are generally followed by relevant concepts, and then one or more procedures to accomplish the goal.
The CA Enterprise Log Manager Implementation Guide is designed for system administrators who have responsibility for installing, configuring and maintaining a log collection solution, creating users and assigning or defining their roles and access, and maintaining backup data.
This guide also assists any personnel who need information on how to do the following:
A summary of the contents follows:
Section |
Description |
---|---|
Planning Your Environment |
Describes planning activities for areas such as log collection, agents, federation, user and access management, subscription updates, and disaster recovery. |
Installing CA Enterprise Log Manager |
Provides work sheets for gathering required information, and detailed instructions on how to install CA Enterprise Log Manager and verify proper installation. |
Configuring Basic Users and Access |
Provides instructions for identifying a user store and creating the initial administrative user for the configuration of other user and access details. |
Configuring Services |
Provides instructions for configuring services including global and local filters, the event log store, report server, and subscription options. |
Configuring Event Collection |
Provides concepts and instructions for using or configuring the event refinement library components including the mapping and parsing files, and the CA adapters. |
Creating Federations |
Describes different types of federations and provides instructions for creating federated relationships between CA Enterprise Log Manager servers and viewing a federation graph. |
Working with the Event Refinement Library |
Provides high-level information about working with message parsing and data mapping files. |
Considerations for CA Audit Users |
Describes the interactions you can implement between CA Enterprise Log Manager and CA Audit, how to configure iRecorders and policies, and how to import data from your CA Audit Collector database. |
Considerations for CA Access Control Users |
Describes how to integrate with CA Access Control, how to modify CA Audit policies to send events to CA Enterprise Log Manager, how to configure a CA Access Control iRecorder to send events to CA Enterprise Log Manager, and how to import CA Access Control events form a CA Audit Collector database, |
CA IT PAM Considerations |
Describes the process of installing CA IT PAM such that the EEM component on the management CA Enterprise Log Manager handles authentication. |
Disaster Recovery |
Describes backup, restoration, and replacement procedures for ensuring recovery of your log management solution in case of disaster. |
CA Enterprise Log Manager and Virtualization |
Describes the process to use to create and configure a virtual machine to contain a CA Enterprise Log Manager server. |
Note: For details on operating system support or system requirements, see the Release Notes. For a basic CA Enterprise Log Manager overview and use scenario, see the Overview Guide. For details on using and maintaining the product, see the Administration Guide. For help on using any CA Enterprise Log Manager page, see the online help.
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |