Automation

Over a year ago now I did a post on integrating Aegis and Sentinel (available here) using Sentinel WebServices and out of the box Aegis Activities. As integration methods go, webservices are great but you do need to be able to manipulate the results so that they are usable using out of box manipulation activities…

+ read more

Martin Cotter
Dec 4, 2015
11:43 am
Reads:
636
Score:
Unrated

Aegis Adapters provide the most integrated method of interacting with a remote system. They can provide Resource Management, Activities, Connection Management, Events, Namespace Access, Stored Credentials etc. Their main drawback is simply the time required to develop an adapter compared to a set of standalone activities, a scripted or command line solution (in decreasing order…

+ read more

Martin Cotter
Nov 30, 2015
9:01 am
Reads:
407
Score:
Unrated

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
1,474
Score:
Unrated

Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…

+ read more

Martin Cotter
Mar 18, 2015
12:23 pm
Reads:
1,611
Score:
Unrated

The String Replace Map activity takes an input string, and replaces all occurrences of characters/strings based on a map table. In Europe we are normally more concerned with preserving non English Language characters in pieces of text than removing them, so when i got asked about this it was an interesting reversal of a problem I…

+ read more

Martin Cotter
Mar 2, 2015
12:13 pm
Reads:
1,703
Score:
5

Welcome to Part 4 of Hyper-V Integration Activities for NetIQ Aegis. This is a 4 part cool tool Activity Library which will introduce and extend the functionality with new activities in each part bringing the power of Aegis Automation to Hyper-V environments.

Martin Cotter
Feb 25, 2015
11:23 am
Reads:
1,541
Score:
Unrated

But the fire is so delightful. And since we have no place to go, Let it snow, Let it snow, Let it snow! (props to Sammy Cahn and Jule Styne). It’s true, I love a good snow storm, dustings are a joke, 4 inches of snow is decent, 1 foot or more of snow is…

+ read more

Tobin Isenberg
Jan 27, 2015
11:19 am
Reads:
1,757
Score:
5

“The only constant in life is change.” Certainly a cliché, but very characteristic for Data Center IT, in 2015 more than ever. Business inevitably requires change, but with that change comes the opportunity for improvement, consolidation and increased efficiency. So nothing to be afraid of. Right? Well… if you have the right tools. And, if…

+ read more

jdebaer
By: jdebaer
Jan 13, 2015
9:55 am
Reads:
1,317
Score:
Unrated

Joe Rogers article Yeah, there’s a module for that showed how easy it is to create your own module with the Module Builder.   If like me you don’t want to be trawling through loads of alerts and doing root cause analysis, you’ll probably want to have an automation layer between you and the monitoring software filtering…

+ read more

Martin Cotter
Nov 18, 2014
11:33 am
Reads:
1,829
Score:
Unrated

The “Aegis Automation Workflows in 5 Minutes” cool-tool blog series shows examples of Aegis workflows which deliver value in as little as 5 minutes development time – all using out of the box activities! Aegis workflows can be forever evolving, and while these workflows fulfill a purpose, you may for example want to extend a…

+ read more

Martin Cotter
Sep 22, 2014
2:37 pm
Reads:
2,112
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow