Error from Performance Management App View set to the Baseline Deviation App

book

Article ID: 140282

calendar_today

Updated On:

Products

CA Infrastructure Management CA Performance Management - Usage and Administration CA Performance Management - Data Polling

Issue/Introduction

The Performance Management Baseline Deviation App fails to render the View. When the View is rendered instead of the expected chart, an error referencing "Uncaught XMLHttpRequest" is seen. This App is a Github provided App for Performance Management. More information can be found in the Community thread where it was first provided in CA PC App: Baseline Deviations.

Cause

The Data Aggregator, by default, only allows the out of the box install admin user to this Views RIB Query.

Environment

All supported Performance Management releases

Resolution

    1. Go to the following URL: http://PC_ADDRESS:8181/pc/center/admin/debug
    2. Ensure the PC_Address is replaced with the hostname of your Performance Center installation. Also set the correct port if configured for HTTPS.
    3. Log in as an administrative user, one assigned with the Administrator Role.
    4. Select Global Attributes. 
    5. Add the users to be provided access to these Views to the daProxyValidUsers attribute. Ensure each user is separated by a comma. If adding three users the entry might look like: user1,user2,user3
    6. Select the Update button at the top or bottom of the page.
    7. Refresh the page and ensure the correct users are listed

    Additional Information

    Support for App related problems is obtained through the Community site.

    Alternative solution using mysql commands. This could be used to set up a script to run a cron job weekly that adds new users to the config to allow them access to the Views.

    Use sql command to update the netqosportal PC database in the general table. Update the daProxyValidUsers attribute value with a comma separated list of user names. This allows the users access to the query run to allow the View to function properly.

    Provide Access to Limited Users 

    This command will generate a comma separated list of user names created in the system:

    • select GROUP_CONCAT(Name) from user_definitions;

    Lab example with just two users shows:

    mysql> select GROUP_CONCAT(Name) from user_definitions;

    +--------------------+

    | GROUP_CONCAT(Name) |

    +--------------------+

    | admin,user |

    +--------------------+

    1 row in set (0.00 sec)

    Take the resulting comma separated list and remove any users that should not be permitted access to this View and it's data. Take the resulting list and insert it into this command to add the users to the daProxyValidUsers attribute value. Command with reference for where the comma separated list goes:

    • replace into netqosportal.general values('daProxyValidUsers','<commaSeparatedUserList');

    Add All Users At Once

    To add all users at one time with a single command without control over access run the following command:

    • replace into general values ('daProxyValidUsers', (select group_concat(name) from user_definitions));

    Add Users Individually

    Basic command example to add 2 users by hand. Add more users as needed separating each with a comma:

    • replace into netqosportal.general values('daProxyValidUsers','user1,user2');

    In a lab with just two users to add them the command is:

    • replace into netqosportal.general values('daProxyValidUsers','admin,user');

    Sample output adding two users. We'll only ever see 1 row affected as the value is a single entry for a single field, thus one single row affected.


    mysql> replace into netqosportal.general values('daProxyValidUsers','admin,user');

    Query OK, 1 row affected (0.00 sec)

    Remove Users

    To remove users we re-issue the replace command with the full permitted user list, minus the users targeted for access removal.

    1. Use the command below to list current users.
    2. Take the comma separated user list from the returned value and remove the user names for users whose access is being taken away.
    3. Place the resulting comma separated list in the replace command and run it again.
    4. Run the command to list current assigned users and confirm the target user is no longer present.

    Listing User Currently Set

    What users are currently set? The command to list out which users are currently assigned:

    • select * from general where attribute='daProxyValidUsers';

    Sample output listing users currently set:

    mysql> select * from general where attribute='daProxyValidUsers';

    +-------------------+------------+

    | Attribute         | Value      |

    +-------------------+------------+

    | daProxyValidUsers | admin,user |

    +-------------------+------------+

    1 row in set (0.00 sec)