Admin
Access the Policy Admin Page
About This Task
Procedure
Configure Execution History Retention Settings
About This Task
The Policy execution log can grow quickly and significantly impact the size of the APM database. You can control the size of the execution log by minimizing the time that the execution history is retained in the APM system and also by selecting an appropriate execution history setting for each policy.
- The Policy Execution History records are retained for one month, after which the records are deleted automatically.
- The automated job is scheduled to run every day.
- These settings are applicable to all types of Policies and Policy Execution History records: Errors, Warnings (Action Taken), Warnings (No Action Taken), Success (Action Taken), and Success (No Action Taken).
- The most recent execution history of each instance associated with a Policy is retained even if it exceeds the specified retention duration.
- The node-level execution results, that is, the details that are displayed in the design canvas when you select a record in the Execution History pane, are retained for the configured retention period. However, if indefinite retention is specified, the node-level execution results are retained for six months.
- Depending on the number of old Policy Execution History records that exist when the retention settings are configured, it may take multiple iterations of the automated job to delete all the old execution history records.
Procedure
About API Node Credential Records
API Node Credential records are used to store the user names, authentication types, and display names for user accounts that will be used by the system when executing API nodes in Policy Designer.
- UAA authentication is valid for user accounts that will be used to access APIs in the following modules:
- APM Health: Alerts, Alert Templates, Analysis, Assets.
- APM Reliability: Analytics, Cases, Case Templates.
- Tools: CBA Dashboard, Advanced Visualization.
When you create or update an API Node Credential using UAA authentication, you must enter the API user’s current password. The password is stored securely in AWS Secrets Manager. If the API user’s password is changed, you must update the stored password through the Policy Admin page
As an alternative to setting up API Node Credentials for API users with UAA authentication, you can select the Policy Integration User option in the API node in Policy Designer, provided that the relevant permissions are enabled for the integration user.
- APM authentication is valid for user accounts that will be used to access APIs in the following modules:
- APM Health: 360 View, Asset Health Manager, Calibration Management, eLog, Rounds Designer, Rounds Data Collection, Rounds Pro Manager.
- APM Reliability: Generation Availability Analysis, Generation Availability Analysis Wind, Production Loss Analysis, Reliability Analytics, Root Cause Analysis.
- APM Strategy: All modules.
- APM Integrity: All modules.
- Tools: Advanced Search, Catalog, Data Loaders, Datasets, Errors, General Dashboards, Graphs, Maps, Metrics and Scorecards, Policy Designer, Queries, R Scripts, Reports, Teams.
- Admin: Configuration Manager, Operations Manager, Application Settings for the modules which use APM authentication.
When you create or update an API Node Credential using APM authentication, you must enter the user’s current password. The password not stored; it is only used to authorize permission to use that user account as an API Node Credential. If the API user’s password is changed you do not need to re-enter it through the Policy Admin page
The user accounts that you specify in API Node Credential records must have the appropriate permissions to execute the APIs that you want to use in the API node. For information on supported APIs, see the API Node documentation.
Each API Node Credential must contain a unique value for display name. This is the name that will be displayed to Policy Designer users and should be descriptive to enable them to identify the correct user for the API they want to use. Policy Designer users will only see the display name and authentication type; they will not have access to the username or password.
You can set up any number of API Node Credentials as required. For example, you might want to set up different API Node Credentials for access to different APIs.