Adaptive Communication Environment (ACE) 5.5.10

Total Page:16

File Type:pdf, Size:1020Kb

Adaptive Communication Environment (ACE) 5.5.10 CA Enterprise Log Manager Release Notes r12.0 SP3 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only and are subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be used or disclosed by you except as may be permitted in a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. The use of any software product referenced in the Documentation is governed by the applicable license agreement and is not modified in any way by the terms of this notice. The manufacturer of this Documentation is CA. Provided with "Restricted Rights." Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. Copyright © 2009 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. CA Product References This document references the following CA products: ■ CA Access Control ■ CA ACF2™ ■ CA Audit ■ CA Directory ■ CA Embedded Entitlements Manager (CA EEM) ■ CA Enterprise Log Manager ■ CA Identity Manager ■ CA Security Command Center (CA SCC) ■ CA SiteMinder® ■ CA Top Secret® Contact CA Contact Technical Support For your convenience, CA provides one site where you can access the information you need for your Home Office, Small Business, and Enterprise CA products. At http://ca.com/support, you can access the following: ■ Online and telephone contact information for technical assistance and customer services ■ Information about user communities and forums ■ Product and documentation downloads ■ CA Support policies and guidelines ■ Other helpful resources appropriate for your product Provide Feedback If you have comments or questions about CA product documentation, you can send a message to [email protected]. If you would like to provide feedback about CA product documentation, complete our short customer survey, which is also available on the CA Support website, found at http://ca.com/docs. Contents Chapter 1: Welcome 9 Upgrading through Subscription .................................................................. 9 Chapter 2: Operating Environment 11 Hardware and Software Environments ........................................................... 11 Monitor Resolution .............................................................................. 11 Chapter 3: Features 13 Log Collection ................................................................................... 13 Log Storage .................................................................................... 15 Standardized Presentation of Logs ............................................................... 16 Compliance Reporting ........................................................................... 17 Policy Violation Alerting ......................................................................... 18 Role-Based Access .............................................................................. 19 Subscription Management ....................................................................... 20 Support for IPv6 IP Addresses ................................................................... 21 Chapter 4: Enhancements in r12.0 SP2 23 Virtualization ................................................................................... 23 Improved Response Time for Repetitive Queries .................................................. 23 Hub and Spoke Architecture ..................................................................... 24 Profiles ......................................................................................... 24 Dynamic Parsing ................................................................................ 25 Chapter 5: Known Issues 27 Agents and CA Adapters ......................................................................... 27 Agent Installation Dependency on Red Hat Linux 4 ........................................... 27 DVD Mount Name Cannot Contain Spaces .................................................... 28 Limitation on Port Configuration ............................................................. 28 ODBC Event Collection Requires a Remote Agent ............................................. 28 Removing Server from Federation Does Not Remove Default Agent ........................... 29 Reports with Data Collected from the CA SAPI Collector Are Not Displaying Events Properly .... 29 syslog Services on UNIX Conflict ............................................................. 30 Appliance (non-UI) .............................................................................. 30 calm4audit Displays Unclear Error During Installation ......................................... 30 Contents 5 Change in CA EEM Server System Time Creates Certificate Mismatch Error .................... 31 Cannot Log into CA Enterprise Log Manager Server Using EiamAdmin User Name .............. 33 Login Fails with AuthorityLoginCert Error ..................................................... 33 LMSeosimport Utility Issues False Confirmation on Solaris .................................... 34 Improving Query Performance on Large Systems ............................................. 34 Event Refinement ............................................................................... 35 Block Mapping String and Numeric Values Require Different Operators ........................ 35 Queries and Reports ............................................................................ 35 Events from Same Host May Display with Different Destination Hostnames .................... 36 Limitation on PDF Report Specifications ...................................................... 36 PDF Bar Chart Reports Display Log Axis Improperly ........................................... 36 Status of Scheduled Job Not Displayed after Upgrade ......................................... 37 Query Fails with "Non-responding Databases" Error........................................... 37 Subscription .................................................................................... 38 Auto Restart after OS Update during SP Upgrade ............................................. 38 Out of Memory Error on Machines with Low Memory .......................................... 38 Self-Monitoring Event to Restart Appears Only Once .......................................... 39 User and Access Management ................................................................... 39 Access Limitations from a Browser on Windows Vista ......................................... 39 Limitation on Calendar Use with Access Policies .............................................. 40 Miscellaneous ................................................................................... 40 CA Enterprise Log Manager Is Sometimes Non-Responsive .................................... 40 Cloning of Virtual CA Enterprise Log Manager Servers Not Supported .......................... 41 High Contrast Settings for Monitor ........................................................... 42 iGateway Continuously Stopping and Restarting .............................................. 42 Max Disk Space for Virtual CA Enterprise Log Manager Is Too Small ........................... 43 Proxy Credential Change Causes Domain Account Lockout .................................... 43 Refreshing Browser Logs User Out of CA Enterprise Log Manager .............................. 44 Require Upgrade to Remote CA EEM Server .................................................. 45 Non-Responding Database Error ............................................................. 45 Chapter 6: Fixed Issues 47 Issue List ....................................................................................... 47 Chapter 7: Documentation 49 Bookshelf ....................................................................................... 49 How to Use the Bookshelf
Recommended publications
  • Oracle Utilities Network Management System Quick Install Guide Release 1.9.0.3
    Oracle Utilities Network Management System Quick Install Guide Release 1.9.0.3 September 2011 Oracle Utilities Network Management System Quick Install Guide, Release 1.9.0.3 Copyright © 1991, 2011 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Oracle Utilities Network Management System Quick Install Guide Release 1.11.0.4 E36986-01
    Oracle Utilities Network Management System Quick Install Guide Release 1.11.0.4 E36986-01 March 2013 Oracle Utilities Network Management System Quick Install Guide, Release 1.11.0.4 E36986-01 Copyright © 1991, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Download CORBA Programmers Guide
    CORBA Programmers Guide Remedy IT Expertise BV Table of Contents Preface. 1 Contact information . 2 1. Remedy IT Support . 3 2. Training. 4 2.1. Using the ACE C++ Framework . 4 2.2. Introduction to CORBA . 5 2.3. CORBA Programming with C++ . 6 2.4. CORBA Programming with C++11 . 7 2.5. Advanced CORBA Programming with TAO . 9 2.6. Component Based Development using AXCIOMA. 10 3. Obtain your CORBA implementation . 12 3.1. TAOX11. 12 3.2. R2CORBA . 12 3.3. TAO. 12 3.4. JacORB . 12 4. TAOX11 . 13 4.1. Introduction. 13 4.2. Define your application IDL. 13 4.3. Implement the server . 13 4.4. Implement the client . 16 4.5. Compile client and server . 18 4.6. Run your application. 19 5. TAO . 20 5.1. Introduction. 20 5.2. Define your application IDL. 20 5.3. Implement the server . 20 5.4. Implement the client . 23 5.5. Compile client and server . 25 5.6. Run your application. 26 6. R2CORBA . 27 6.1. Introduction. 27 6.2. Ruby CORBA mapping. 27 6.3. Download R2CORBA . 27 6.4. Define your IDL. 27 6.5. Implement a client . 27 6.6. Implement a server. 28 7. TAO IDL Compiler . 30 7.1. Generated Files . 30 7.2. Environment Variables . 30 7.3. Operation Demuxing Strategies . 31 7.4. Collocation Strategies. 32 7.5. Output File options . 32 7.6. Controlling code generation . 33 7.7. Backend options . 35 7.8. Other options . 37 8. TAO libraries. 39 9. Compression . 44 9.1.
    [Show full text]
  • TAO Programmers Guide
    TAO Programmers Guide Remedy IT version: 0.28 Table of Contents Abbreviations 5 1 Preface 7 2 Contact information 9 3 Remedy IT Support conditions for 2009 11 4 Training 13 4.1 Using the ACE C++ Framework 13 4.2 Introduction to CORBA 14 4.3 CORBA Programming with C++ 15 4.4 Advanced CORBA Programming with TAO (for Real-Time) 16 5 How to obtain ACE/TAO/CIAO 19 5.1 Major release 19 5.2 Minor release 19 5.3 Bug fix only release 19 5.4 Micro release 19 6 Getting started, hello world 21 6.1 Define your application IDL 21 6.2 Implement the server 22 6.3 Implement the client 25 6.4 Compile client and server 26 6.5 Run your application 28 7 IDL Compiler 29 7.1 Generated Files 29 7.2 Environment Variables 29 7.3 Operation Demuxing Strategies 30 7.4 Collocation Strategies 31 7.5 Output File options 32 7.6 Controlling code generation 32 7.7 Backend options 35 7.8 Other options 37 TAO Programmers Guide 1 8 TAO libraries 39 9 Compression 49 9.1 Using compression 49 9.2 Implementing your own compressor 51 10 Using the TAO::Transport::Current Feature 55 10.1 Scope and Context 55 10.2 Programmer’s Reference 55 10.3 User’s Guide 57 10.4 Configuration, Bootstrap, Initialization and Operation 58 10.5 Implementation and Required Changes 59 10.6 Structural and Footprint Impact 60 10.7 Performance Impact 61 10.8 Example Code 61 11 Security 63 11.1 Using SSLIOP 63 11.2 SSLIOP Options 63 11.3 Environment variables 64 11.4 Using the SSLIOP::Current Object 65 12 Real Time CORBA 69 12.1 Protocol Policies 69 13 Ruby2CORBA 75 13.1 Introduction 75 13.2 Ruby CORBA mapping
    [Show full text]
  • Study of Concurrency Message Bus Based on Adaptive Communication Environment Framework
    International Journal of Grid Distribution Computing Vol. 8, No.6, (2015), pp.193-202 http://dx.doi.org/10.14257/ijgdc.2015.8.6.19 Study of Concurrency Message Bus based on Adaptive Communication Environment Framework Feng Ruan1, Tao Li1, Zhiyong Fan1 and Jin Wang2 1School of Information & Control, Nanjing University of Information Science & Technology, Nanjing 210044, China 2College of Information Engineering, Yangzhou University, Yangzhou, China Abstract Message middleware is an important branch of middleware, it provides the development of distributed application system with an asynchronous, pine for programming architecture, the consistent thought and the development trend of modern software technology, which is widely used in industry in the enterprise application integration and distributed computing. Message bus message middleware is a kind of simple implementation, but with its unique advantages for a wide variety of distributed applications development injected with strong power, greatly promote the development of application system integration. This paper is mainly focusing on the key issues involved in the middleware, message bus, and concurrency model for further research. Keywords: Adaptive communication environment, message bus, concurrency 1. Introduction Since the 1990s, the computing technology gradually came into the network which centered in the new period, the user was eager to build more abundant in the network distributed client/server applications. Not only realize data sharing, knowledge sharing and support and all kinds of computing resources sharing; it can realize at all levels, including the entire enterprise work together. In order to adapt to the demand, the distributed software system is rapidly becoming the concerned focus of researchers and users technology, and becoming a mainstream direction of the development of the computing technology.
    [Show full text]
  • Oracle Utilities Network Management System Quick Install Guide Release 1.12.0 E41144-01
    Oracle Utilities Network Management System Quick Install Guide Release 1.12.0 E41144-01 December 2013 Oracle Utilities Network Management System Quick Install Guide, Release 1.12.0 E41144-01 Copyright © 1991, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/ or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]