Users will gain an understanding of the important key concepts, as well as gain competency in both the navigation and functionality of the Operations Orchestration (OO) application.
Who should attend
Users of the Operations Orchestration application.
What you will learn
Upon completion of this course, you should be able to:
- Run and manage automated workflows using HP Operations Orchestration (OO).
- Perform a wide range of system administration, monitoring, and management tasks using OO Central.
- Author, maintain, document, and deploy new automated workflows using OO Studio.
- Design a flow for integrating a web service provider using OO.
What’s included
- Introduction to Operations Orchestration
- Objectives
- Key Benefits of OO
- HPE OO Functional Architecture
- Role-based Architecture
- Components of Functional Architecture
- Features of OO
- Summary
- Assessment
- Introduction
- Objectives
- Open the OO Studio and Access Help*
- Identifying Projects Panel Buttons
- Identifying Dependencies Panel Buttons
- Identifying Flow Authoring Toolbar Buttons
- Identifying OO Studio Window Vertical Tabs
- Identifying OO Studio Window Sub Tabs
- Identifying OO Studio Window Horizontal Tabs
- Work with Content Packs and Projects
- Import a Content Pack*
- Create a Project*
- Flow Overview
- Create a Display Message Flow*
- Display the Output of a Shell Command*
- Create a Content Pack*
- Modify a Flow
- Import the Operating Systems Content Pack*
- Copy the Flow*
- Add and Replace Content*
- Modify the Ping Target System Step*
- Rename the Notification Result*
- Replace the Notify Step*
- Toggle All Steps to a Single Response*
- Configure Flow Inputs*
- Test the Modified Flow*
- Summary
- Assessment
- Introduction
- Objectives
- Start Operations Orchestration Central*
- Import Content Packs into the Library*
- Import Projects into the Library*
- Working With OO Central
- Exploring the Central User Interface*
- Running the Flows*
- View the Dashboard and Reports*
- Enable Authentication and Add Local Users **
- Setting up the Security Banner*
- Setting up Flow Permissions*
- Summary
- Assessment
- Introduction
- Objectives
- Author a Flow to Prompt a User for Input*
- Modify a Flow to Set a Constant Value*
- Assign a Value from a Flow Variable*
- Author a Flow to Add and Remove Inputs
- Modify a Flow to Use the Previous Step's Result*
- Author a Flow Using a System Property*
- Modify a Flow to Use Flow Variable Notation*
- Use Credentials as Input*
- Use a System Account as Input*
- Use a Selection List as Input*
- Author a Flow to Validate an Input*
- Author a Flow to Work with Flow Inputs*
- Summary
- Assessment
- Introduction
- Objectives
- Author a Ping and Traceroute Flow*
- Generate a Report Using Results*
- Use Assignment Actions*
- Working with Filters
- Author a Flow to Display an IP Address*
- Authoring a Flow Using a Regular Expression*
- Use Flow Variable Visualization*
- Summary
- Assessment
- Introduction
- Objectives
- Working with Operations
- Create a Ping Operation and Use it in a Flow*
- Test the Created Flow*
- Responses
- Response Rules
- Response Rule Filters
- Create a Rule with a Filter*
- Transitions
- Configure a Transition with Handover*
- Working with Subflows
- Create the Get Available Memory Subflow
- Create the Average Disks Read-Write Subflow*
- Create the Get System Report Flow*
- Summary
- Assessment
- Introduction
- Objectives
- Key Points of Looping and Iteration Operations
- Generate Random Numbers Using Looping*
- Working with Lists
- Compile a List Using a Counter*
- Create a Flow with a Selection List*
- Summary
- Assessment