MS Scorch 2012 Document
MS Scorch 2012 Document
Documentation
Microsoft Corporation
Published: November 1, 2013
Authors
Curtis Love and Brian Wren
Applies To
System Center 2012 - Orchestrator
Orchestrator in System Center 2012 SP1
System Center 2012 R2 Orchestrator
Feedback
Send suggestions and comments about this document to sc2012docs@microsoft.com.
Copyright
This document is provided "as-is". Information and views expressed in this document, including
URL and other Internet website references, may change without notice.
Some examples depicted herein are provided for illustration only and are fictitious. No real
association or connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
You may modify this document for your internal, reference purposes.
© 2013 Microsoft Corporation. All rights reserved.
Microsoft, Access, Active Directory, ActiveSync, ActiveX, Authenticode, Bing, BitLocker, Excel,
Forefront, Hyper-V, Internet Explorer, JScript, Microsoft Press, MSDN, Outlook, SharePoint,
Silverlight, SoftGrid, SQL Server, Visio, Visual Basic, Visual C++, Visual Studio, Win32, Windows,
Windows Intune, Windows Mobile, Windows PowerShell, Windows Server,
Windows Server System, and Windows Vista are trademarks of the Microsoft group of
companies. All other trademarks are property of their respective owners.
Revision History
Release Date Changes
Upgrading System Center 2012 SP1 Orchestrator to System Center 2012 R2 ........................... 27
Tasks to Perform Before You Begin the Upgrade ...................................................................... 28
How to Upgrade System Center 2012 SP1 Orchestrator to System Center 2012 R2 ............... 29
Troubleshoot Your Orchestrator Installation .............................................................................. 30
How to Uninstall and Unregister an Integration Pack ................................................................ 32
Upgrading System Center 2012 - Orchestrator to System Center 2012 SP1 ............................... 33
Tasks to Perform Before You Begin the Upgrade ...................................................................... 34
How to Upgrade System Center 2012 – Orchestrator to System Center 2012 SP1 ................. 34
Troubleshoot Your Orchestrator Installation .............................................................................. 35
How to Uninstall and Unregister an Integration Pack ................................................................ 38
How to Configure Runbook Servers to Optimize Performance of .NET Activities ..................... 126
How to Use the Integration Toolkit to Extend Orchestrator Capabilities ..................................... 166
Using the Orchestration Console in System Center 2012 - Orchestrator ................................... 167
Runbooks..................................................................................................................................... 175
Preparing Windows Azure Pack and System Center Components for Service Reporting ......... 394
How to Configure Service Reporting for Windows Azure Pack and System Center ................... 405
Understanding Inventory and Usage Data from Windows Azure Pack and System Center ....... 411
About Service Reporting Data Aggregation and Data Cubes ..................................................... 412
Using Service Reporting Usage Data and Inventory Reports ..................................................... 422
List of Usage Data and Inventory Reports in Service Reporting ................................................. 423
How to View and Analyze Usage and Inventory Data in Reports ............................................... 424
How to install the Service Management Automation runbook worker ......................................... 435
Install Service Management Automation from a Command Prompt window .............................. 437
Establish trust between Service Management Automation and Service Provider Foundation ... 443
System Requirements for Service Provider Foundation for System Center 2012 SP1 .............. 478
How to Install Service Provider Foundation for System Center 2012 SP1 ................................. 482
Manage Certificates and User Roles in Service Provider Foundation ........................................ 494
Walkthrough: Creating a Certificate and User Roles for Service Provider Foundation ............... 496
Release Notes for Orchestrator in System Center 2012 SP1 ..................................................... 516
Getting Started with System Center 2012 -
Orchestrator
Orchestrator provides a workflow management solution for the data center. Orchestrator lets you
automate the creation, monitoring, and deployment of resources in your environment. This guide
describes the architecture of Orchestrator and includes definitions of key terms and concepts and
information about where to find additional resources. After reading this guide, you should have a
basic understanding of how Orchestrator works and where you can find more information.
14
What’s New
The following new features are added in this release:
You can install the Service Management Automation web service and up to three runbook
workers from System Center 2012 R2 Orchestrator Setup program. These can be used as
part of the Windows Azure Pack for Windows Server configuration or to enable you to run
runbooks and perform other automation tasks using Windows PowerShell cmdlets. For
evaluation purposes, you should install a single runbook worker on the same computer as the
web service.
Windows Server 2012 R2 is supported in this release.
In addition, in System Center 2012 R2, Orchestrator has the following new and updated
integration Packs (IPs):
What’s New
In System Center 2012 Service Pack 1 (SP1), Orchestrator has the following new and updated
integration Packs (IPs).
15
Integration Pack Guide for Orchestrator in
System Center 2012 SP1
Orchestrator Capabilities
IT administrators perform many tasks and procedures to keep the health of their computing
environment up-to-date and their business running. Tasks might include the following diverse
activities, for example, new employees require that accounts and resources are configured, a
business acquisition requires integrating a system from another vendor, and new hardware
requires provisioning. Individual tasks and subtasks are automated, but typically, not the whole
process. In addition, the administrators must maintain quality standards and system efficiency.
System Center 2012 - Orchestrator can tie disparate tasks and procedures together by using the
graphical user-interface Runbook Designer to create reliable, flexible, and efficient end-to-end
solutions in the IT environment.
By using Orchestrator, you can carry out the following tasks:
Automate processes in your data center, regardless of hardware or platform.
Automate your IT operations and standardize best practices to improve operational efficiency.
Connect different systems from different vendors without having to know how to use scripting
and programming languages.
Custom automation
Orchestrator provides tools to build, test, debug, deploy, and manage automation in your
environment. These automated procedures, called runbooks, can function independently or start
other runbooks. The standard activities defined in every installation of Orchestrator provide a
variety of monitors, tasks, and runbook controls with which you can integrate a wide range of
system processes. Each activity in a runbook publishes data that is available to any subsequent
16
activity in that runbook. You use this Published Data to provide dynamic, decision-making
capabilities, which can include creating emails, alerts, log files, accounts, and more.
Your IT organization can use Orchestrator to improve efficiency and reduce operational costs to
support cross-departmental objectives. Orchestrator provides an environment with shared access
to common data. By using Orchestrator, you can evolve and automate key processes between
groups and consolidate repetitive manual tasks. You can automate cross-functional team
processes and enforce best practices for incident, change, and service management by creating
runbooks that are customized for your requirements. Through automation, regularly recurring
tasks reduce the number of manual and error-prone activities in your environment. Orchestrator
helps you improve the reliability and predictability of your IT procedures.
Cross-platform integration
Orchestrator integrates with System Center, other Microsoft products, and non-Microsoft products
to enable interoperability across the data center. Orchestrator improves efficiency across multiple
tools, systems, and departments by eliminating or crossing technology and organizational
process structures. You can extend the capabilities of Orchestrator with integration packs that
include additional functionality for both Microsoft and non-Microsoft products and technologies.
Orchestrator activities and integration packs reduce unanticipated errors and shorten service
delivery time by automating the common tasks associated with enterprise tools and products.
End-to-end orchestration
Orchestration is the collective name for the automated arrangement, coordination, and
management of systems, software, and practices. It enables the management of complex cross-
domain processes. Orchestrator provides the tools for orchestration to combine software,
hardware, and manual processes into a seamless system. These tools let you connect and
automate workflows.
Just as manufacturing companies have automated common and repeatable tasks from their
production processes, you can adopt this same efficiency in the IT environment by using
Orchestrator to seamlessly perform and monitor your IT processes. Orchestrator can handle
routine tasks, process enforcement, and reliably meet the demands of the largest
enterprises. Orchestrator integrates seamlessly with other System Center products to integrate IT
administrative tasks from start to finish.
Extensible structure
If you have a custom in-house solution, Orchestrator provides extensible integration to any
system through the Orchestrator Integration Toolkit. You can create custom integrations that
allow Orchestrator to connect to any environment.
Orchestrator uses a Representational State Transfer (REST)-based web service that can perform
processes like start and stop runbook jobs and get reporting information in Open Data protocol
(OData) format. The web service lets you develop applications that can use live data from
Orchestrator.
17
See Also
Getting Started with System Center 2012 - Orchestrator
Orchestrator Architecture
This topic provides an overview of System Center 2012 - Orchestrator, including a description of
the system architecture, the internals of a typical runbook workflow, and the flow of a deployed
runbook.
18
Orchestrator feature Description
browser. For more information about using the
Orchestration console, see Using the
Orchestration Console in System Center 2012 -
Orchestrator.
Architectural diagram
The following diagram illustrates each of the Orchestrator features and the communication
between each.
19
The orchestration database is the center of the Orchestrator installation containing all runbooks,
configuration settings, and logs. The management server is required as a communication layer
between the Runbook Designer and the orchestration database. One or more runbook servers
communicate directly with the database to retrieve runbooks to run and store information about
the jobs created from the runbooks. The web service also communicates directly with the
orchestration database and provides a web browser connection for the Orchestration console.
Orchestrator Extensions
The following table shows multiple strategies available for extending the functionality provided by
a standard installation of Orchestrator. For additional information, see Deploying System Center
2012 - Orchestrator.
20
This runbook monitors an event log. When it detects the specified event, the runbook checks the
status of a particular process in Windows on a specific computer. If the process is found to be
running, it is stopped. The runbook then starts the process and sends an email as a notification of
the change of process state.
Each runbook activity finishes before proceeding to the next, and activities are available that
provide complex logic such as requiring that multiple activities are completed before the runbook
proceeds. By using a combination of logic on activities and smart links, you can implement
whatever logic your particular automation scenario requires.
21
Permissions
Access to Orchestrator is provided by adding user accounts to a security group that is created
during installation. This group can either be a domain group or a local group on the management
server. Users of this group have full access to the Runbook Designer to create and modify
runbooks and the Deployment Manager to deploy new Runbook Designers and runbook servers.
Operators who have to start and stop runbooks but not create them can be granted this
permission to individual runbooks and then use the Orchestration console.
Orchestrator Terminology
This topic provides terms and definition for System Center 2012 - Orchestrator and shows
changes of Opalis Integration Server 6.3 terms to Orchestrator terminology and their definitions.
See Also
Getting Started with System Center 2012 - Orchestrator
Term Definition
22
Term Definition
to another activity.
Orchestrator Integration Toolkit A set of software tools that you can use to
create custom integration packs.
runbook server The server that runs the service that manages
runbooks and communicates with the
orchestration database.
23
Term Definition
runbooks.
24
Opalis Integration Server 6.3 System Center 2012 - Orchestrator Definition
term term
containing configuration
information, runbooks, and
logs for Orchestrator.
25
Opalis Integration Server 6.3 System Center 2012 - Orchestrator Definition
term term
before deployment.
Orchestrator Resources
In addition to this online reference for System Center 2012 - Orchestrator, there are a number of
resources that can provide additional information about building runbooks, by using System
Center 2012 - Orchestrator SDK and applying best practices.
Resource Location
26
Resource Location
Orchestrator http://orchestrator.codeplex.com
Community
Releases on
CodePlex
Orchestrator http://social.technet.microsoft.com/Forums/category/systemcenterorchestr
Community Forums ator
on TechNet
See Also
Getting Started with System Center 2012 - Orchestrator
Warning
If you are planning to upgrade two or more System Center components, it is important to
start by reading the Upgrade Sequencing for System Center 2012 R2 topic.
The order in which you perform component upgrades is important. Failure to follow the
correct upgrade sequence might result in component failure for which no recovery
options exist. The affected System Center components are:
1. Orchestrator
2. Service Manager
3. Data Protection Manager (DPM)
4. Operations Manager
5. Configuration Manager
6. Virtual Machine Manager
7. App Controller
Tip
27
Because your data center must keep running while you upgrade System Center 2012
components one at a time, after you have upgraded the Orchestrator servers to System
Center 2012 SP1, you can run:
A System Center 2012 integration pack on a System Center 2012 component.
A System Center 2012 SP1 integration pack on a System Center 2012 SP1 component.
A System Center 2012 SP1 integration pack on a System Center 2012 R2 component
(except for Virtual Machine Manager).
A System Center 2012 R2 integration pack on a System Center 2012 R2 component (Virtual
Machine Manager).
No other configurations are supported.
See Also
Tasks to Perform Before You Begin the Upgrade
How to Upgrade System Center 2012 SP1 Orchestrator to System Center 2012 R2
Troubleshoot Your Orchestrator Installation
See Also
Upgrading System Center 2012 SP1 Orchestrator to System Center 2012 R2
28
How to Upgrade System Center 2012 SP1
Orchestrator to System Center 2012 R2
When you upgrade a server that runs System Center 2012 R2 Orchestrator, all features that are
installed on the server are upgraded. Before you begin the upgrade process, make sure that your
server meets the minimum supported configurations. For more information, see the System
Requirements topic in the Orchestrator library on TechNet.
29
Troubleshoot Your Orchestrator Installation
The latest troubleshooting information for System Center 2012 - Orchestrator is available in the
release notes under the Release Notes for System Center 2012 - Orchestrator topic in the
Orchestrator library on TechNet. The following information provides additional instructions and
caveats that you can use during installation to resolve problems you might experience.
Windows Firewall
When you deploy additional Runbook Designer applications to your environment, you might see a
failed installation message. To correctly install the Runbook Designer, enable the following
firewall rules as they apply to your operating system and deployment configuration.
Automated deployment
When a runbook server or Runbook Designer is installed behind a firewall, specific firewall rules
are required between the remote computers that are used to deploy the runbook server and
Runbook Designer. An additional rule is required for the remote connection between the Runbook
Designer and the runbook server to allow the Orchestrator management service to accept remote
connections. If you are using the Monitor WMI task, the runbook server requires a special firewall
rule on the computer that uses PolicyModule.exe.
Enable the following firewall rules on your computer:
30
Firewall rule between the Runbook Designer and the Orchestrator management server
Firewall rules between the runbook server and the computer that uses PolicyModule.exe
For more information about adding firewall rules, see Add or Edit a Firewall Rule.
31
server.. Typically, this can occur when the SQL server and the runbook server are installed on
the same computer.
To solve this problem. you can manually start the RunbookService, or configure the
RunbookService to make multiple attempts during startup to connect to database before failing.
Important
When you install an upgrade of an integration pack, you must first uninstall any earlier
version of the integration pack from all runbook servers and Runbook Designers. You
then register and deploy the upgrade of the integration pack. If you do not uninstall the
previous version of the integration pack prior to registering and deploying the upgrade
version, the upgrade version will fail.
32
the Orchestrator Management Server.
See Also
Upgrading System Center 2012 SP1 Orchestrator to System Center 2012 R2
Warning
If you are planning to upgrade two or more System Center components, it is important to
start by reading the guide Upgrade Sequencing for System Center 2012 SP1. The
order in which you perform component upgrades is important. Failure to follow the correct
upgrade sequence might result in component failure for which no recovery options exist.
The affected System Center components are:
1. Orchestrator
2. Service Manager
3. Data Protection Manager (DPM)
4. Operations Manager
5. Configuration Manager
6. Virtual Machine Manager
7. App Controller
Tip
Because your data center must keep running while you upgrade System Center 2012
components one at a time, after you have upgraded the Orchestrator servers to System
Center 2012 SP1, you can run:
A System Center 2012 integration pack on a System Center 2012 component.
A System Center 2012 SP1 integration pack on a System Center 2012 SP1 component.
No other configurations are supported.
See Also
Tasks to Perform Before You Begin the Upgrade
How to Upgrade System Center 2012 – Orchestrator to System Center 2012 SP1
Troubleshoot Your Orchestrator Installation
How to Uninstall and Unregister an Integration Pack
33
Tasks to Perform Before You Begin the Upgrade
Before you can upgrade Orchestrator to System Center 2012 Service Pack 1 (SP1), you must
prepare the environment by performing the following tasks:
1. Complete all runbooks running in the current Orchestrator installation. For information about
stopping runbooks, see the Running Runbooks topic in the Orchestrator library on TechNet.
2. Close any open programs and ensure that there are no pending restarts on the computer. For
example, if you have installed a server role by using Service Manager or have applied a
security update, you might have to restart the computer, and then log on to the computer with
the same user account to finish the installation of the server role or the security update.
3. Perform a full backup of the Orchestrator database. For information about backing up the App
Controller database, see the How to Back up Orchestrator topic in the Orchestrator library on
TechNet. You can also use tools provided by SQL Server to back up the VMM database. For
more information, see Back Up and Restore of SQL Server Databases.
4. Upgrade the hardware, operating system, and other software if necessary to meet the
requirements of Orchestrator in System Center 2012 SP1.
See Also
Upgrading System Center 2012 - Orchestrator to System Center 2012 SP1
34
Upgrading other System Center 2012 SP1 components
For more detailed instructions for upgrading System Center 2012 SP1 components, see the guide
Upgrade Sequencing for System Center 2012 SP1. Those instructions for each component
follow the following general outline:
1. Uninstall and unregister the integration pack for the component according to How to Uninstall
and Unregister an Integration Pack.
When you install an upgrade of an integration pack, you must first uninstall any earlier
version of the integration pack from all runbook servers and Runbook Designers. You then
register and deploy the upgrade of the integration pack. If you do not uninstall the previous
version of the integration pack prior to registering and deploying the upgrade version, the
upgrade version will fail.
2. Upgrade the component.
3. Install and register the System Center 2012 SP1 integration pack for the component.
4. Verify that Orchestrator is receiving data from the component.
Windows Firewall
When you deploy additional Runbook Designer applications to your environment, you might see a
failed installation message. To correctly install the Runbook Designer, enable the following
firewall rules as they apply to your operating system and deployment configuration.
35
If you are running Windows Server 2012 R2, enable the following rules to allow all Monitor Event
activities to function correctly:
Windows Management Instrumentation (Async-In)
Windows Management Instrumentation (DCOM-In)
Windows Management Instrumentation (WMI-In)
Automated deployment
When a runbook server or Runbook Designer is installed behind a firewall, specific firewall rules
are required between the remote computers that are used to deploy the runbook server and
Runbook Designer. An additional rule is required for the remote connection between the Runbook
Designer and the runbook server to allow the Orchestrator management service to accept remote
connections. If you are using the Monitor WMI task, the runbook server requires a special firewall
rule on the computer that uses PolicyModule.exe.
Enable the following firewall rules on your computer:
Firewall rule between the Runbook Designer and the Orchestrator management server
36
Firewall rules between the runbook server and the computer that uses PolicyModule.exe
For more information about adding firewall rules, see Add or Edit a Firewall Rule.
37
Other resources for this product
TechNet Library main page for System Center Orchestrator 2012
Deploying System Center 2012 - Orchestrator
Deployment Overview
Plan Your Orchestrator Deployment
Install Orchestrator
Perform Post-Installation Tasks
Important
When you install an upgrade of an integration pack, you must first uninstall any earlier
version of the integration pack from all runbook servers and Runbook Designers. You
then register and deploy the upgrade of the integration pack. If you do not uninstall the
previous version of the integration pack prior to registering and deploying the upgrade
version, the upgrade version will fail.
See Also
Tasks to Perform Before You Begin the Upgrade
Upgrading System Center 2012 - Orchestrator to System Center 2012 SP1
Troubleshoot Your Orchestrator Installation
38
Deploying System Center 2012 - Orchestrator
System Center 2012 - Orchestrator is a workflow management solution for the data center. It
enables you to automate the creation, monitoring, and deployment of resources in your
environment. This document describes System Center 2012 - Orchestrator planning and
deployment.
Deployment topics
Deployment Overview
Provides a brief overview of the steps to deploy Orchestrator.
Plan Your Orchestrator Deployment
Provides planning guidelines and best practices for your Orchestrator deployment.
Install Orchestrator
Provides step-by-step instructions to install Orchestrator.
Perform Post-Installation Tasks
Describes required and optional post-installation tasks.
Troubleshoot Your Orchestrator Installation
Provides guidance on common installation issues.
Deployment Overview
The procedures in the following sections describe how to plan your deployment and install
System Center 2012 - Orchestrator.
Use the following steps to install Orchestrator.
Task Information
39
Task Information
Note
This release supports only databases that are compatible with System Center 2012 -
Orchestrator. You cannot use the databases from Opalis 6.3 or the
System Center 2012 - Orchestrator beta version with this product.
40
System Requirements
The following sections describe the system requirements for System Center 2012 - Orchestrator,
Orchestrator in System Center 2012 Service Pack 1 (SP1), and System Center 2012 R2
Orchestrator, depending on your System Center 2012 version, your particular configuration, and
choice of features to install.
Note
Orchestrator is not supported when installed on the same computer as a domain
controller.
Hardware
The following minimum hardware configuration is required for a full installation of Orchestrator:
Minimum 1 gigabyte (GB) of RAM, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
41
Operating system
The following table lists the supported operating systems for a full installation of Orchestrator on a
single computer.
Runbook Designer
Runbook server
Software
The following software is required for a full installation of Orchestrator on a single computer:
Microsoft SQL Server 2008 R2 or Microsoft SQL Server 2012– Orchestrator requires only the
basic SQL Server features found in the Database Engine Service. No additional features are
required. Orchestrator supports SQL_Latin1_General_CP1_CI_AS for collation. The
installation wizard uses SQL_Latin1_General_CP1_CI_AS as the default collation to create
the orchestration database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
Microsoft Internet Information Services (IIS) – Orchestrator Setup enables IIS if it is not
enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
Microsoft .NET Framework 4.5 (which further requires WCF HTTP Activation)
To install .NET Framework 4.5 and HTTP Activation on Windows Server 2012
1. On the Windows Start screen, click the Server Manager tile.
2. On the Manage menu in the Server Manager console, click Add Roles and Features.
3. Go through the wizard until you reach the Features page.
4. Expand .NET Framework 4.5 Features.
5. Select .NET Framework 4.5 if it isn’t already selected.
6. Expand WCF Services.
7. Select HTTP Activation if it isn’t already selected.
8. Click Next and follow the prompts to finish the installation. If you have problems, check
the issues covered in Troubleshoot Your Orchestrator Installation.
We recommend the following software for a full installation of Orchestrator on a single computer:
Join the computer to an Active Directory domain.
42
Note
On first use of the Orchestration console, you are prompted to install Microsoft Silverlight
4 on the computer if it is not already installed.
Note
Orchestrator is not supported when installed on the same computer as a domain
controller.
Hardware
The following minimum hardware configuration is required for a full installation of Orchestrator:
Minimum 1 gigabyte (GB) of RAM, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for a full installation of Orchestrator on a
single computer.
43
Feature Operating system
Runbook Designer
runbook server
Software
The following software is required for a full installation of Orchestrator on a single computer:
Microsoft SQL Server 2008 R2 or Microsoft SQL Server 2012– Orchestrator requires only the
basic SQL Server features found in the Database Engine Service. No additional features are
required. Orchestrator supports SQL_Latin1_General_CP1_CI_AS for collation. The
installation wizard uses SQL_Latin1_General_CP1_CI_AS as the default collation to create
the orchestration database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
Microsoft Internet Information Services (IIS) – Orchestrator Setup enables IIS if it is not
enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
Microsoft .NET Framework 4.5 (which further requires HTTP Activation)
WCF HTTP Activation)
To install .NET Framework 4.5 and HTTP Activation on Windows Server 2012
1. On the Windows Start screen, click the Server Manager tile.
2. On the Manage menu in the Server Manager console, click Add Roles and Features.
3. Go through the wizard until you reach the Features page.
4. Expand .NET Framework 4.5 Features.
5. Select .NET Framewok 4.5 if it isn’t already selected.
6. Expand WCF Services.
7. Select HTTP Activation if it isn’t already selected.
8. Click Next and follow the prompts to finish the installation. If you have problems, check
the issues covered in Troubleshoot Your Orchestrator Installation.
We recommend the following software for a full installation of Orchestrator on a single computer:
Join the computer to an Active Directory domain.
Note
44
On first use of the Orchestration console, you are prompted to install Microsoft Silverlight
4 on the computer if it is not already installed.
Note
Orchestrator is not supported when installed on the same computer as a domain
controller.
Hardware
The following minimum hardware configuration is required for a full installation of Orchestrator:
Minimum 1 gigabyte (GB) of RAM, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for a full installation of Orchestrator on a
single computer.
Software
The following software is required for a full installation of Orchestrator on a single computer:
Microsoft SQL Server 2008 R2 – Orchestrator requires only the basic SQL Server features
found in the Database Engine Service. No additional features are required. Orchestrator
supports SQL_Latin1_General_CP1_CI_AS for collation. The installation wizard uses
45
SQL_Latin1_General_CP1_CI_AS as the default collation to create the orchestration
database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
Microsoft Internet Information Services (IIS) – Orchestrator Setup enables IIS if it is not
enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
Microsoft .NET Framework 4
We recommend the following software for a full installation of Orchestrator on a single computer:
Join the computer to an Active Directory domain.
Note
On first use of the Orchestration console, you are prompted to install Microsoft Silverlight
4 on the computer if it is not already installed.
46
Individual Feature Requirements for System Center 2012 - Orchestrator
Management Server Requirements for System Center 2012 - Orchestrator
Runbook Server Requirements for System Center 2012 - Orchestrator
Orchestrator Web Service Requirements for System Center 2012 - Orchestrator
Runbook Designer Requirements for System Center 2012 - Orchestrator
Important
These system requirements are for System Center 2012 R2 Orchestrator. To see the
system requirements for Orchestrator in System Center 2012 Service Pack 1 (SP1), see
Management Server Requirements for Orchestrator in System Center 2012 SP1. To see
the system requirements for System Center 2012 - Orchestrator, see Management
Server Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for an installation of the
Orchestrator Runbook Designer.
Hardware
The following minimum hardware configuration is required for the Orchestrator Runbook
Designer:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or faster
Operating system
The following table lists the supported operating systems for the Orchestrator Runbook Designer.
Software
The following software must be deployed and available to successfully install the Orchestrator
Runbook Designer:
47
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator Runbook
Designer:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for System Center 2012 R2 Orchestrator. To see the
system requirements for Orchestrator in System Center 2012 Service Pack 1 (SP1), see
Management Server Requirements for Orchestrator in System Center 2012 SP1. To see
the system requirements for System Center 2012 - Orchestrator, see Management
Server Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for an installation of the
Orchestrator web service.
Hardware
The following minimum hardware configuration is required for the Orchestrator web service:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or faster
Operating system
The following table lists the supported operating systems for the Orchestrator web service.
Software
The following must be deployed and available to successfully install the Orchestrator web service:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator web service:
Internet Information Services (IIS) 7.0 and enabled IIS role – Orchestrator Setup enables the
IIS role if it is not already enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
48
Microsoft .NET Framework 4.5 (which further requires HTTP Activation)
WCF HTTP Activation)
To install .NET Framework 4.5 and HTTP Activation on Windows Server 2012
1. On the Windows Start screen, click the Server Manager tile.
2. On the Manage menu in the Server Manager console, click Add Roles and Features.
3. Go through the wizard until you reach the Features page.
4. Expand .NET Framework 4.5 Features.
5. Select .NET Framewok 4.5 if it isn’t already selected.
6. Expand WCF Services.
7. Select HTTP Activation if it isn’t already selected.
8. Click Next and follow the prompts to finish the installation. If you have problems, check
the issues covered in Troubleshoot Your Orchestrator Installation.
Note
Microsoft Silverlight 4 is not required for the Orchestrator web service installation. It is
required for any computer that runs the Orchestration console.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for System Center 2012 R2 Orchestrator. To see the
system requirements for Orchestrator in System Center 2012 Service Pack 1 (SP1), see
Management Server Requirements for Orchestrator in System Center 2012 SP1. To see
the system requirements for System Center 2012 - Orchestrator, see Management
Server Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for installation of the Orchestrator
runbook server.
Hardware
The following minimum hardware configuration is required for an Orchestrator runbook server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or faster
Operating system
The following table lists the supported operating systems for an Orchestrator runbook server.
49
Feature Operating system
Software
The following software must be deployed and available to install the Orchestrator runbook server:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator runbook server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for System Center 2012 R2 Orchestrator. To see the
system requirements for Orchestrator in System Center 2012 Service Pack 1 (SP1), see
Management Server Requirements for Orchestrator in System Center 2012 SP1. To see
the system requirements for System Center 2012 - Orchestrator, see Management
Server Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for installation of the
System Center 2012 - Orchestrator management server.
Hardware
The following minimum hardware configuration is required for the Orchestrator management
server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator management
server.
50
Software
The following software must be deployed and available to install the Orchestrator management
server:
Microsoft SQL Server 2008 R2 or Microsoft SQL Server 2012- Orchestrator requires only the
basic SQL Server features found in the Database Engine Service. No additional features are
required. The instance of SQL Server can either be installed locally on the management
server or on a separate dedicated database server. Orchestrator supports
SQL_Latin1_General_CP1_CI_AS for collation. The installation wizard uses
SQL_Latin1_General_CP1_CI_AS as the default collation to create the orchestration
database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
The targeted computer requires the following software to install the Orchestrator management
server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Individual Feature Requirements
Important
These system requirements are for Orchestrator in System Center 2012 Service Pack 1
(SP1). To see the system requirements for System Center 2012 R2 Orchestrator, see
Runbook Designer Requirements for System Center 2012 R2 Orchestrator. To see the
system requirements for System Center 2012 - Orchestrator, see Runbook Designer
Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for an installation of the
System Center 2012 - Orchestrator Runbook Designer.
Hardware
The following minimum hardware configuration is required for the Orchestrator Runbook
Designer:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator Runbook Designer.
51
Feature Operating system
Software
The following software must be deployed and available to successfully install the Orchestrator
Runbook Designer:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator Runbook
Designer:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Orchestrator Web Service Requirements for Orchestrator in System Center 2012 SP1
Important
These system requirements are for Orchestrator in System Center 2012 Service Pack 1
(SP1). To see the system requirements for System Center 2012 R2 Orchestrator, see
Orchestrator Web Service Requirements for System Center 2012 R2 Orchestrator. To
see the system requirements for System Center 2012 - Orchestrator, see Orchestrator
Web Service Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for an installation of the
Orchestrator web service.
Hardware
The following minimum hardware configuration is required for the Orchestrator web service:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator web service.
Software
52
The following must be deployed and available to successfully install the Orchestrator web service:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator web service:
Internet Information Services (IIS) 7.0 and enabled IIS role – Orchestrator Setup enables the
IIS role if it is not already enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
Microsoft .NET Framework 4.5 (which further requires HTTP Activation)
WCF HTTP Activation)
To install .NET Framework 4.5 and HTTP Activation on Windows Server 2012
1. On the Windows Start screen, click the Server Manager tile.
2. On the Manage menu in the Server Manager console, click Add Roles and Features.
3. Go through the wizard until you reach the Features page.
4. Expand .NET Framework 4.5 Features.
5. Select .NET Framewok 4.5 if it isn’t already selected.
6. Expand WCF Services.
7. Select HTTP Activation if it isn’t already selected.
8. Click Next and follow the prompts to finish the installation. If you have problems, check
the issues covered in Troubleshoot Your Orchestrator Installation.
Note
Microsoft Silverlight 4 is not required for the Orchestrator web service installation. It is
required for any computer that runs the Orchestration console.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for Orchestrator in System Center 2012 Service Pack 1
(SP1). To see the system requirements for System Center 2012 R2 Orchestrator, see
Runbook Server Requirements for System Center 2012 R2 Orchestrator. To see the
system requirements for System Center 2012 - Orchestrator, see Runbook Server
Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for installation of the
System Center 2012 - Orchestrator runbook server.
Hardware
The following minimum hardware configuration is required for an Orchestrator runbook server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
53
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or better
Operating system
The following table lists the supported operating systems for an Orchestrator runbook server.
Software
The following software must be deployed and available to install the Orchestrator runbook server:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator runbook server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for Orchestrator in System Center 2012 Service Pack 1
(SP1). To see the system requirements for System Center 2012 R2 Orchestrator, see
Management Server Requirements for System Center 2012 R2 Orchestrator. To see the
system requirements for System Center 2012 - Orchestrator, see Management Server
Requirements for System Center 2012 - Orchestrator.
This topic describes the hardware and software requirements for installation of the
System Center 2012 - Orchestrator management server.
Hardware
The following minimum hardware configuration is required for the Orchestrator management
server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator management
server.
54
Feature Operating system
Software
The following software must be deployed and available to install the Orchestrator management
server:
Microsoft SQL Server 2008 R2 or Microsoft SQL Server 2012- Orchestrator requires only the
basic SQL Server features found in the Database Engine Service. No additional features are
required. The instance of SQL Server can either be installed locally on the management
server or on a separate dedicated database server. Orchestrator supports
SQL_Latin1_General_CP1_CI_AS for collation. The installation wizard uses
SQL_Latin1_General_CP1_CI_AS as the default collation to create the orchestration
database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
The targeted computer requires the following software to install the Orchestrator management
server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Individual Feature Requirements
Important
These system requirements are for System Center 2012 - Orchestrator. To see the
system requirements for System Center 2012 R2 Orchestrator, see Management Server
Requirements for System Center 2012 R2 Orchestrator. To see the system requirements
for Orchestrator in System Center 2012 Service Pack 1 (SP1), see Management Server
Requirements for Orchestrator in System Center 2012 SP1.
This topic describes the hardware and software requirements for installation of the
System Center 2012 - Orchestrator management server.
Hardware
The following minimum hardware configuration is required for the Orchestrator management
server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
55
Operating system
The following table lists the supported operating systems for the Orchestrator management
server.
Software
The following software must be deployed and available to install the Orchestrator management
server:
Microsoft SQL Server 2008 R2 - Orchestrator requires only the basic SQL Server features
found in the Database Engine Service. No additional features are required. The instance of
SQL Server can either be installed locally on the management server or on a separate
dedicated database server. Orchestrator supports SQL_Latin1_General_CP1_CI_AS for
collation. The installation wizard uses SQL_Latin1_General_CP1_CI_AS as the default
collation to create the orchestration database.
Note
Management servers and runbook servers installed on the same computer must use
the same database. The management server must run as a 32-bit application.
The targeted computer requires the following software to install the Orchestrator management
server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Individual Feature Requirements
Important
These system requirements are for System Center 2012 - Orchestrator. To see the
system requirements for System Center 2012 R2 Orchestrator, see Runbook Server
Requirements for System Center 2012 R2 Orchestrator. To see the system requirements
for Orchestrator in System Center 2012 Service Pack 1 (SP1), see Runbook Server
Requirements for Orchestrator in System Center 2012 SP1.
This topic describes the hardware and software requirements for installation of the
System Center 2012 - Orchestrator runbook server.
Hardware
The following minimum hardware configuration is required for an Orchestrator runbook server:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
56
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or better
Operating system
The following table lists the supported operating systems for an Orchestrator runbook server.
Software
The following software must be deployed and available to install the Orchestrator runbook server:
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator runbook server:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for System Center 2012 - Orchestrator. To see the
system requirements for System Center 2012 R2 Orchestrator, see Orchestrator Web
Service Requirements for System Center 2012 R2 Orchestrator. To see the system
requirements for Orchestrator in System Center 2012 Service Pack 1 (SP1), see
Orchestrator Web Service Requirements for Orchestrator in System Center 2012 SP1.
This topic describes the hardware and software requirements for an installation of the
Orchestrator web service.
Hardware
The following minimum hardware configuration is required for the Orchestrator web service:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigahertz (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator web service.
Software
The following must be deployed and available to successfully install the Orchestrator web service:
57
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator web service:
Internet Information Services (IIS) 7.0 and enabled IIS role – Orchestrator Setup enables the
IIS role if it is not already enabled.
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
Microsoft .NET Framework 4
Note
Microsoft Silverlight 4 is not required for the Orchestrator web service installation. It is
required for any computer that runs the Orchestration console.
See Also
Install Individual Orchestrator Features
Important
These system requirements are for System Center 2012 - Orchestrator. To see the
system requirements for System Center 2012 R2 Orchestrator, see Runbook Designer
Requirements for System Center 2012 R2 Orchestrator. To see the system requirements
for Orchestrator in System Center 2012 Service Pack 1 (SP1), see Runbook Designer
Requirements for Orchestrator in System Center 2012 SP1.
This topic describes the hardware and software requirements for an installation of the
System Center 2012 - Orchestrator Runbook Designer.
Hardware
The following minimum hardware configuration is required for the Orchestrator Runbook
Designer:
1 gigabyte (GB) of RAM minimum, 2 GB or more recommended
200 megabyte (MB) of available hard disk space
Dual-core Intel microprocessor, 2.1 gigabyte (GHz) or better
Operating system
The following table lists the supported operating systems for the Orchestrator Runbook Designer.
Software
The following software must be deployed and available to successfully install the Orchestrator
Runbook Designer:
58
A functional Orchestrator management server and database.
The targeted computer requires the following software to install the Orchestrator Runbook
Designer:
Microsoft .NET Framework 3.5 Service Pack 1 - Orchestrator Setup installs and enables
.NET Framework 3.5 SP1 if it is not installed and enabled.
See Also
Install Individual Orchestrator Features
Server Service
59
system resources. If you installed the runbook server after you already installed the management
server, or if you installed the runbook server on a different computer, you can use different
accounts.
The Orchestrator Management Service is responsible for maintaining the orchestration database,
communicating with the Runbook Designers, and communicating with the Deployment Manager.
The account used for the Orchestrator Management Service can be a local account on the
management server if the database is installed locally or if you are using SQL Server
authentication to communicate with the database (although this is not recommended). However,
this configuration might not allow access to other network resources. If the database is located on
another server, either the account must be joined to the Active Directory domain so it can access
the database server, or you must use SQL Server authentication. Use the latter option if your
database server is in a different domain than the management server.
This service account does not have to be an Administrator or a domain Administrator account.
Note, however, that the Deployment Manager requires administrator privileges.
The service account for the Management Server Service must have the following permissions:
Permission to log on to the management server as a service. This permission is automatically
granted during the installation process.
Member of the Microsoft.SystemCenter.Orchestrator.Admins role in the orchestration
database. The account is automatically added to this role during the installation process.
60
configured with alternate credentials if the service account does not have access to particular
resources.
Note
A member of the Orchestrator Users group can grant access to other users to view and
run runbooks from the Orchestration console without having to add those users to the
group. Those who only use the Orchestration console are referred to as operators. They
typically require the ability to run runbooks, but not to create them. For information about
setting permissions for individual runbooks, see Runbook Permissions in Using
Runbooks in System Center 2012 - Orchestrator.
61
Database roles
Securing SQL server connections
Encryption keys
Database roles
Security to the orchestration database is implemented through database roles in the supported
versions of Microsoft SQL Server. The table below lists the roles that are created in the
orchestration database and the permissions granted to each. These roles are configured and
populated with the required members during the installation process, so there is typically no
requirement to work directly with them. The information provided here is to help the administrator
better understand the security behind the configuration and prepare for possible custom
scenarios.
62
Role Permission Object
enter. [Microsoft.SystemCenter.Orchestrator].[AccessCheck],
Orchestrator.Oper [Microsoft.SystemCenter.Orchestrator].[ComputeAuthorization
ators Cache],
[Microsoft.SystemCenter.Orchestrator.Statistics.Internal].[Get
StatisticsSummary],
[Microsoft.SystemCenter.Orchestrator.Runtime].[CreateJob],
[Microsoft.SystemCenter.Orchestrator.Runtime].[CancelJob]
63
Role Permission Object
dbo.fn_GetPolicyInstanceStatus,
dbo.fn_NumFailedInstancesPerServer,
dbo.fn_NumInstancesPerServer,
dbo.fn_NumRunningInstancesPerServer,
[Microsoft.SystemCenter.Orchestrator.Cryptography].[Encrypt]
,
[Microsoft.SystemCenter.Orchestrator.Cryptography].[Decrypt]
,
[Microsoft.SystemCenter.Orchestrator.Internal].[RethrowError]
64
Role Permission Object
dbo.sp_CustomLogCleanup,
dbo.sp_GetLogEntriesForDelete_FilterByDays,
dbo.sp_GetLogEntriesForDelete_FilterByEntries,
dbo.sp_GetLogEntriesForDelete_FilterByEntriesAndDays,
dbo.sp_insertevent,
dbo.sp_PublishPolicy,
dbo.sp_UnpublishPolicy,
dbo.sp_UnpublishPolicyRequest,
dbo.fn_GetPolicyInstanceStatus,
dbo.fn_NumFailedInstancesPerServer,
dbo.fn_NumInstancesPerServer,
dbo.fn_NumRunningInstancesPerServer,
[Microsoft.SystemCenter.Orchestrator.Internal].AddUserToRol
e,
[Microsoft.SystemCenter.Orchestrator].[SetPermissions],
[Microsoft.SystemCenter.Orchestrator.Internal].[SetProductInf
o]
Security
When installing Orchestrator, ensure that the account used to connect to SQL server has
minimum privileges on the SQL server to avoid a potential elevation of privileges.
65
Encryption keys
As part of your security planning, you should plan for rotating your encryption keys at a regular
interval. The National Institute of Standards and Technology(NSIT) recommends that keys be
rotated at least once every two years. For more information about NSIT security standards, go to
NSIT Computer Security Division Computer Security Resource Center.
Runbook Security
All elements of a runbook are accessible to all Runbook Designers, as well as to any runbook
servers in your environment. You can modify the permissions for runbook elements (such as a
folder), but any permissions you set are not enforced.
66
In the default configuration of an Orchestrator deployment, web service calls are not logged. This
applies to requests made with the Orchestration console as well as the Orchestration Integration
Toolkit (OIT). The result is that a user can start a job and pass parameters into a runbook with no
record of who started the job.
To record all requests to your Orchestrator web service, you should enable audit trail logging with
atlc.exe. For more information about logging using atlc.exe, go to Audit Trail.
To enable access between the Runbook Designer and the management server
1. On the computer running the Management Server Service, add a firewall rule to allow
Runbook Designer or runbook server to access ManagementService.exe.
67
account has the Logon as service privilege.
64-bit %SystemRoot%\SysWOW64\OrchestratorRemotingService.exe
32-bit %SystemRoot%\System32\OrchestratorRemotingService.exe
For more information about adding firewall rules see Add or Edit a Firewall Rule.
68
Regardless of how a runbook is exported, the encrypted data contained in runbooks will be stored
securely in the resulting XML export file. This is accomplished by providing a password upon
export. When Orchestrator exports the runbooks and their related configuration, any encrypted
data contained in Runbooks is decrypted and encrypted again upon export using the provided
password.
Note
1. The encryption key used for the export is different from that used to store the data in the
Orchestrator database. Essentially, the "export" feature decrypts the encrypted data and re-
encrypts it in the export file. The export file contains the encrypted password.
2. The export process does not protect the runbook itself nor the non-encrypted data contained
in Runbooks. The export only protects encrypted data contained in Runbooks.
When an export file is re-imported the import requires a password be provided. If the password
matches then the encrypted data contained in export will be imported and re-encrypted for
storage in the Orchestrator database by using the encryption key.
Note
1. The Export/Import password feature does not support password complexity rules that may be
required by your organization. A blank value for the password is permitted, although not
recommended for exports that contain sensitive data that has been encrypted.
2. If the password for your export is lost one can still perform an import of the runbooks and
their related configuration. On the Import screen simply clear the Import Orchestrator
encrypted data option. Any Orchestrator platform-encrypted data will not be imported and
created with blank values in the Orchestrator database.
69
User Role Identified by Rights
Integration Packs
Note
Placing a user account in the Orchestrator Users group identifies this user account as
being an administrator of Orchestrator. All Orchestrator users are essentially equally-
privileged administrators with full access to Orchestrator and the data contained in the
database. This would include access to encrypt and decrypt data contained in the
Orchestrator database.
Orchestrator manages security through membership in two security groups created at installation
time. These are the Orchestrator Users group and the Orchestrator System group. Membership in
either or both of these groups identifies accounts that are considered administrators of
Orchestrator ("trusted personas"). Administrative rights include the ability to update runbooks and
their related configuration data, update the configuration of runbook servers, interact with external
systems via integration packs, install and deploy integration packs, interact programmatically with
the Orchestrator database, update the database configuration and encrypt/decrypt encrypted
data stored in the Orchestrator database.
Note
Membership in either or both of these groups grants full administrative access to
Orchestrator including access to all data contained in the Orchestrator database and full
encrypt/decrypt rights.
Orchestrator Users Group Runbook authors and anyone This security group defines
who deploys integration packs user accounts that will be able
to launch the Runbook
Designer, Deployment
Manager and Data Store
70
Security group Associated persona Security group purpose
Configuration utility.
Membership in this group
grants privileged access to the
Orchestrator database. This
would include the ability to read
and update the database
configuration as well as access
and decrypt encrypted data.
Orchestrator System Group None (used for service This security group defines the
accounts) service accounts that require
privileged access to the
Orchestrator database. This
would include the ability to read
and update the database
configuration as well as access
and decrypt encrypted data.
Data Store
Configuration
71
Security domain Context Cryptography Identified by Trusted
rights persona
72
and management server. Rights to these services are granted through membership in the
Orchestrator Users group or the Orchestrator System group.
Note
Orchestrator runbooks could contain data encrypted by an external encryption service
and used as runbook Published data. Orchestrator would not handle data from such an
external system any differently than any other piece of data.
Orchestrator uses encryption in the following product feature areas:
Runbook activities Any property masked out when one types in the
field is an encrypted property. This would
include passwords on the Security
Credentials tab but can include other
properties as well.
Note
Encrypted variables are intended to be used via subscription in properties that require an
encrypted value such as a password used in a runbook activity. If an encrypted variable
is subscribed to in a non-encrypted field the encrypted value will be provided. The plain-
text value is only available when used in an encrypted property.
73
Since the core cryptographic services reside in the Orchestrator database, access to the
database essentially defines access to the unencrypted data.
Runbook servers access the database directly. As such they directly access the crypto
services provided by SQL Server. Run Time access to the crypto services provided by SQL
Server are limited to members of the Orchestrator System Group.
Runbook Designers and the Runbook Tester access the database indirectly through the
management server. The management server offers a new service that services requests for
encryption/decryption from the Runbook Designer and Runbook Tester. The management
server passes through the security context of the runbook author and these credentials are
used to access the crypto services. Design Time access to the crypto services provided by
SQL Server are limited to members of the Orchestrator Users group.
Access to encrypted data from Orchestrator is managed by the Orchestrator Users group and the
Orchestrator Systems group. Members of these two security groups essentially have rich
administrative access to Orchestrator including rights to access the core cryptographic services
as well as decrypt data stored encrypted in the database.
74
Source Targeted computer Default port Configurable Notes
server 65535 Designer
communicates with
the management
server over DCOM.
By default, DCOM
communicates over
port 135 and
dynamically
allocates a port
between 1024 and
65535. For
information about
configuring DCOM
for a specific port
range, see
Configuring
Microsoft
Distributed
Transaction
Coordinator (DTC)
to work through a
firewall.
Web service
Activities Various targeted For information about individual integration packs, see
computers Integration Packs for System Center 2012 -
depending on Orchestrator.
activity
75
Other resources for this product
TechNet Library main page for System Center Orchestrator 2012
Deploying System Center 2012 - Orchestrator
Plan Your Orchestrator Deployment
System Requirements
Orchestrator Security Planning
Scale Planning
See Also
Plan Your Orchestrator Deployment
Integration Packs for System Center 2012 - Orchestrator
Scale Planning
This section describes planning considerations for designing a large-scale deployment of
System Center 2012 - Orchestrator. When planning your system requirements, you have to
consider how to use Orchestrator runbooks, the types and number of runbooks you plan to run,
the amount of required data logging, the systems you are integrating with, and the level of fault
tolerance you require.
Scale planning
Feature Performance Considerations
Describes the Orchestrator features and how their behaviors affect system performance.
Evaluate System Requirements
Provides guidance for evaluating your deployment tasks.
Deployment Recommendations
Provides recommendations for the number of systems to install in your Orchestrator
deployment.
76
Feature Performance Considerations
This section describes the Orchestrator processes that influence performance in a production
environment. The focus of this procedure is lies in identifying processes that occur during
runtime, in the web service, and during authoring. While many authoring activities occur outside a
production environment, considerations for setting up a production environment to test
performance should also include variances, for example, whether special requests by an
Orchestrator administrator are supported.
Runbooks
Despite the variance in their design and complexity, runbooks have a simple structure. They
perform three operations: they run activities, manage published data, and perform branch logic.
The following sections provide more details about these operations.
Activity internals
Runbook activities contain two types of code: platform code and domain code. Platform code is
built on a framework that is shared between all runbooks. Platform code manages Orchestrator
processes. Domain code refers to the code in a runbook activity that manages processes outside
Orchestrator. For example, the Invoke Web Service activity contains platform code to handle
processing in Orchestrator, such as publishing data, and domain code specific to invoking a web
service.
There is little processing variability between runbooks when you compare activities that run
similar platform code. Domain code depends on latency issues external to Orchestrator.
Potentially, domain code varies greatly between activities. To understand the domain code
dependencies and their impact on runbook performance, you must test the performance of
individual activities before you determine the requirements for the production environment.
Published Data
Runbooks in Orchestrator share data between activities. Every activity consumes Published Data
that earlier runbook activities created. How an activity uses the published data depends on the
domain code. All runbook activities publish a minimum set of run-time parameters called
Common Published Data. Domain code can, but is not required to, publish data. The Published
Data that the domain code creates is called Activity-Specific Published Data. The data that an
activity produces can contain data elements that are single or multi-valued. For example, every
activity produces a single record of single-value Common Published Data. Domain code can
produce multiple records of single and multi-value data.
Publishing data to the orchestration database is a resource-intensive activity. Runbook
performance depends on the amount of data that each activity publishes and the performance
and resiliency of the computer that hosts the orchestration database. As part of planning your
performance requirements, consider the amount of published data your runbooks require and the
performance of the computer that hosts your orchestration database.
Branching
Runbook activities create a branch if an activity requires data to pass at the same time to two or
more activities. When a runbook starts, processing consists of a single thread. When this thread
77
encounters a branch, a thread is created for each branch. Each thread references the published
data from all previous activities along the thread. The total number of threads in a runbook
depends on the number of branches used in a runbook. Multi-threaded runbooks require more
processing power than single threaded runbooks.
As part of assessing your runbook performance requirements, consider the number of branches
you plan to include in a runbook. Runbooks with lots of branches require more processing power
on the runbook servers than runbooks that contain no branches.
Operator experience
The operator experience occurs on the Orchestration console and the Orchestrator web service.
The Orchestration console is a Microsoft Silverlight-based web application that requires
Orchestrator web service to connect to the orchestration database. The Orchestration console
and the Orchestrator web service depend on the performance of the orchestration database and
the Internet Information Services (IIS) server that hosts the Orchestrator web service.
See Also
Scale Planning
Task Information
4: Estimate the number of running jobs per Determine total jobs running
hour.
78
Task Information
5: Identify the integration packs required for Identify required integration packs
your environment.
11: Identify your service and operations Service and operations requirements
requirements.
12: Determine the level of integration with other Integration with System Center
System Center products.
Identify tasks
What processes do you plan to automate? Map the processes you intend to automate to the
individual steps involved. This level of detail simplifies the task of authoring runbooks. You should
identify business-critical processes as requiring more validation effort before relying on the
runbook in a production environment.
79
Define individual workloads
For the processes you automate, determine how frequently you intend them to run. A runbook
that is started one time per day uses significantly fewer resources than a continuously running
runbook that is monitoring a system process. Consider both the workload on the Orchestrator
system and the automated process. A server that previously responded to manually input
requests can behave much differently when the request input occurs by automation.
Consider how much logging of Published Data is required in each of your runbooks. As logging
increases, network traffic and load on the server that is hosting the Orchestrator database
increases.
Fault tolerance
Determine the level of fault tolerance for your Orchestrator deployment. Depending on your
requirements, you can design your Orchestrator environment to be highly available in the case of
a single failure.
Resource requirements
Determine the requirements for your Orchestrator deployment, and any additional load that
increased requirements on processes impacted by automation create. Do you have adequate
80
runbook servers for the number of runbooks that can be running at a given time? Is the
Orchestrator database the appropriate size to handle all requests and log Published Data?
Network
Determine if additional bandwidth is required to support the increased traffic the runbook servers
and the Orchestrator database generate. Do you have to change any network port settings to
accommodate the Orchestrator web service?
Authoring
Determine where and how authoring of runbooks is carried out. Authoring of runbooks typically
occurs on computers isolated from production. However, your business requirements might
include the requirement to author runbooks when they were not planned.
Test environment
If you are authoring in isolation from your production environment, identify the necessary
resources to build and test new runbooks.
Pre-production environment
It is prudent to deploy high impact runbooks in a pre-production environment before introducing
the runbook into a production environment. Pre-production environments should closely
approximate the full-scale production environment.
See Also
Scale Planning
Deployment Recommendations
The following guidelines provide options in an Orchestrator deployment to improve high
availability and performance.
Management server
An Orchestrator deployment is limited to one management server. A management server does
not have to be available for runbook servers or runbooks to function. If the management server is
not available, you cannot connect the Runbook Designer to publish runbooks or start, monitor, or
stop runbooks. You can still start, monitor, and stop runbooks with the Orchestration console.
81
Orchestrator database
For high availability, you can deploy the Orchestrator database on a Microsoft SQL Server cluster
with a minimum of two nodes.
Runbook servers
For high availability, you should have at least two runbook servers. If the primary runbook server
for a runbook is unavailable, the runbook can run on another server. runbook servers are not
designed to run on a computer configured as a cluster node.
For more information about specifying the runbook servers for a runbook, see the Using
Runbooks in System Center 2012 - Orchestrator.
Runbooks
By default, runbook servers can run 50 runbooks simultaneously. The physical computer
resources and the complexity of the runbook limit the actual number of runbooks that a runbook
server can manage.
For the process to modify the number of runbooks that can run simultaneously, see How to
Configure Runbook Throttling.
See Also
Using Runbooks in System Center 2012 - Orchestrator
Install Orchestrator
This section provides details about how to install System Center 2012 - Orchestrator on a single
server, as an individual feature, and as a highly available deployment.
For information about how to install Orchestrator at the command prompt and details about the
available command line arguments, see the section Install with the Orchestrator Command Line
Install Tool.
Important
If you do not want to use the System Center 2012 - Orchestrator Setup Wizard to
install Orchestrator features because Server Message Block (SMB) is not permitted
through your firewall or you have concerns about SMB security, you can manually install
runbook servers and integration packs with the Orchestrator command line install tool.
82
For more information about the tool, see the topic Install with the Orchestrator Command
Line Install Tool.
Install Orchestrator
How to Install Orchestrator on a Single Computer
Provides detailed information about how to install Orchestrator on a single computer.
Install Individual Orchestrator Features
Provides detailed information about how to install each Orchestrator feature.
Install with the Orchestrator Command Line Install Tool
Provides options for installing Orchestrator from the command line.
Use Sysprep to Deploy Orchestrator
Provides details for installing Orchestrator with a Sysprep image.
Important
Before you begin setup, close any open programs and ensure that there are no
pending restarts on the computer. For example, if you have installed a server role
by using Service Manager or have applied a security update, you might have to
restart the computer, and then log on to the computer with the same user
account to finish the installation of the server role or the security update.
Note
If User Account Control is enabled, then you will be prompted to verify that you
want to allow the setup program to run. This is because it requires administrative
83
access to make changes to the system.
2. On the main setup page, click Install.
Warning
If Microsoft .NET Framework 3.5 Service Pack 1 is not installed on your
computer, a dialog box appears asking if you want to install .NET Framework 3.5
SP1. Click Yes to proceed with the installation.
3. On the Product registration page, provide the name and company for the product
registration, and then click Next.
Note
For this evaluation release, a product key is not required.
4. On the Please read this license agreement page, review and accept the Microsoft
Software License Terms, and then click Next.
5. On the Select features to install page, verify that all features are selected, and then
click Next.
Note
You can choose to remove individual features. The management server is
mandatory and is selected by default. The check boxes for the other features can
be cleared as required.
Tip
If you want to install only an individual feature after installing a management
server, use the information in Install Individual Orchestrator Features.
6. Your computer is checked for required hardware and software. If your computer meets all
of the requirements, the All prerequisites are installed page appears. Click Next and
proceed to the next step.
If a prerequisite is not met, a page displays information about the prerequisite that has
not been met and how to resolve the issue. Follow these steps to resolve the failed
prerequisite check:
a. Review the items that did not pass the prerequisite check. For some requirements,
such as Microsoft .NET Framework 4, you can use the link provided in the Setup
Wizard to install the missing requirement. The Setup Wizard can install or configure
other prerequisites, such as the Internet Information Services (IIS) role.
Warning
If you enable prerequisites during setup, such as Microsoft .NET Framework
4, your computer can require a restart. If you restart your computer, you must
run setup again from the beginning.
b. After you resolve the missing prerequisites, click Verify prerequisites again.
7. On the Configure the service account page, enter the user name and password for the
Orchestrator Management Service account. Click Test to verify the account credentials. If
the credentials are accepted, click Next.
84
Important
The Orchestrator Management Service account must be created before this step.
For more information about the Orchestrator Management Service account, see
Orchestrator Management Service account in Orchestrator Security Planning.
8. On the Configure the database server page, enter the name of the server and the
name of the instance and port number of the Microsoft SQL Server that you want to use
for Orchestrator. You can also specify whether to use Windows Authentication or SQL
Server Authentication, and whether to create a new database or use an existing
database.
9. Click Test Database Connection to verify the account credentials. If the credentials are
accepted, click Next.
10. On the Configure the database page, select an existing database or specify the name
of a new database, and then click Next.
11. On the Configure Orchestrator management group page, accept the default
configuration or enter the name of the user group to manage Orchestrator permissions,
and then click Next.
Note
For more information about the Orchestrator users group, see Orchestrator
Users Group.
12. On the Configure the port for the web service page, verify the port numbers for the
Orchestrator web service and the Orchestration console, and then click Next.
Note
For more information about the TCP ports, see TCP Port Requirements.
13. On the Select the installation location page, verify the installation location for
Orchestrator, and then click Next.
14. On the Microsoft Update page, optionally indicate whether you want to use the Microsoft
Update services to check for updates, and then click Next.
Note
If you have previously accepted Microsoft Update on this computer, this page is
skipped.
15. On the Help improve Microsoft System Center Orchestrator page, optionally indicate
whether you want to participate in the Customer Experience Improvement Program or
Error Reporting, and then click Next.
16. Review the Installation summary page, and then click Install.
The Installing features page appears and displays the installation progress.
17. On the Setup completed successfully page, optionally indicate whether you want to
start the Runbook Designer, and then click Close to complete the installation.
85
1. Follow the steps that are detailed in Web Service Installation
See Also
Install Individual Orchestrator Features
Orchestrator Security Planning
TCP Port Requirements
86
1. On the server where you want to install Orchestrator, start the System Center 2012 -
Orchestrator Setup Wizard.
To start the System Center 2012 - Orchestrator Setup Wizard, on your product media
or network share, double-click SetupOrchestrator.exe.
Important
Before you begin setup, close any open programs and ensure that there are no
pending restarts on the computer. For example, if you have installed a server role
by using Service Manager or have applied a security update, you might have to
restart the computer, and then log on to the computer with the same user
account to finish the installation of the server role or the security update.
Note
If User Account Control is enabled, then you will be prompted to verify that you
want to allow the setup program to run. This is because it requires administrative
access to make changes to the system.
2. On the main page of the System Center 2012 - Orchestrator Setup Wizard, click
Install.
Warning
If Microsoft .NET Framework 3.5 Service Pack 1 is not installed on your
computer, a dialog box appears asking if you want to install .NET Framework 3.5
SP1. Click Yes to proceed with the installation.
3. On the Product registration page, provide the name and company for the product
registration, and then click Next.
Note
For this evaluation release, a product key is not required.
4. On the Please read this license agreement page, review and accept the Microsoft
Software License Terms, and then click Next.
5. On the Select features to install page, ensure that Management Server is the only
feature selected, and then click Next.
6. Your computer is checked for required hardware and software. If your computer meets all
of the requirements, the All prerequisites are installed page appears. Click Next and
proceed to the next step.
If a prerequisite is not met, a page displays information about the prerequisite that has
not been met and how to resolve the issue. Use the following steps to resolve the failed
prerequisite check:
a. Review the items that did not pass the prerequisite check. For some requirements,
such as Microsoft .NET Framework 4, you can use the link provided in the Setup
Wizard to install the missing requirement. The Setup Wizard can install or configure
other prerequisites, such as the Internet Information Services (IIS) role.
Warning
87
If you enable prerequisites during setup, such as Microsoft .NET Framework
4, your computer can require a restart. If you restart your computer, you must
run setup again from the beginning.
b. After you resolve the missing prerequisites, click Verify prerequisites again.
c. Click Next to continue.
7. On the Configure the service account page, enter the user name and password for the
Orchestrator service account. Click Test to verify the account credentials. If the
credentials are accepted, then click Next.
8. On the Configure the database server page, enter the name of the server and the
name of the instance of Microsoft SQL Server that you want to use for Orchestrator. You
can also specify whether to use Windows Authentication or SQL Server Authentication,
and whether to create a new database or use an existing database. Click Test Database
Connection to verify the account credentials. If the credentials are accepted, click Next.
9. On the Configure the database page, select a database or create a new database, and
then click Next.
10. On the Configure Orchestrator management group page, accept the default
configuration or enter the name of the Active Directory user group to manage
Orchestrator, and then click Next.
11. On the Select the installation location page, verify the installation location for
Orchestrator, and then click Next.
12. On the Microsoft Update page, optionally indicate whether you want to use the Microsoft
Update services to check for updates, and then click Next.
13. On the Help improve Microsoft System Center Orchestrator page, optionally indicate
whether you want to participate in the Customer Experience Improvement Program or
Error Reporting, and then click Next.
14. Review the Installation summary page, and then click Install.
The Installing features page appears and displays the installation progress.
15. On the Setup completed successfully page, optionally indicate whether you want to
start Runbook Designer, and then click Close to complete the installation.
See Also
Install Individual Orchestrator Features
88
Note
Before you begin setup, close any open programs and ensure that there are no
pending restarts on the computer. For example, if you have installed a server role
by using Service Manager or have applied a security update, you might have to
restart the computer, and then log on to the computer with the same user
account to finish the installation of the server role or the security update.
2. On the main setup page, under Standalone installations, click Runbook server.
Warning
If Microsoft .NET Framework 3.5 Service Pack 1 is not installed on your
computer, a dialog box appears asking whether you want to install .NET
Framework 3.5 SP1. Click Yes to proceed with the installation.
3. On the Product registration page, provide the name and company for the product
registration, and then click Next.
Note
For this evaluation release, a product key is not required.
4. On the Please read this license agreement page, review and accept the Microsoft
Software License Terms, and then click Next.
5. Your computer is checked for required hardware and software. If your computer meets all
of the requirements, the All prerequisites are installed page appears. Click Next and
proceed to the next step.
If a prerequisite is not met, a page displays information about the prerequisite that has
not been met and how to resolve the issue. Use the following steps to resolve the failed
prerequisite check:
a. Review the items that did not pass the prerequisite check. For some requirements,
such as Microsoft .NET Framework 4, you can use the link provided in the Setup
Wizard to install the missing requirement. The Setup Wizard can install or configure
other prerequisites, such as the Internet Information Services (IIS) role.
Warning
If you enable prerequisites during setup, such as Microsoft .NET Framework
4, your computer can require a restart. If you restart your computer, you must
run setup again from the beginning.
b. After you resolve the missing prerequisites, click Verify prerequisites again.
c. Click Next to continue.
6. On the Configure the service account page, enter the user name and password for the
Orchestrator service account. Click Test to verify the account credentials. If the
credentials are accepted, click Next.
7. On the Configure the database server page, enter the name of the database server
associated with your Orchestrator management server. You can also specify whether to
use Windows Authentication or SQL Server Authentication, and whether to create a new
database or use an existing database. Click Test Database Connection to verify the
89
account credentials. If the credentials are accepted, click Next.
8. On the Configure the database page, select the Orchestrator database for your
deployment, and then click Next.
9. On the Select the installation location page, verify the installation location for
Orchestrator, and then click Next.
10. On the Microsoft Update page, optionally indicate whether you want to use the Microsoft
Update services to check for updates, and then click Next.
11. On the Help improve Microsoft System Center Orchestrator page, optionally indicate
whether you want to participate in the Customer Experience Improvement Program or
Error Reporting, and then click Next.
12. Review the Installation summary page, and then click Install.
The Installing features page appears and displays the installation progress.
13. On the Setup completed successfully page, optionally indicate whether you want to
start the Runbook Designer, and then click Close to complete the installation.
See Also
Install Individual Orchestrator Features
Note
Before you begin the installation of the Orchestrator web service, close any open
programs and ensure that there are no pending restarts on the computer. For
example, if you have installed a server role by using Service Manager or have
applied a security update, you might have to restart the computer, and then log
on to the computer with the same user account to finish the installation of the
server role or the security update.
2. On the main System Center 2012 - Orchestrator Setup Wizard page, click Install.
Warning
If Microsoft .NET Framework 3.5 Service Pack 1 is not installed on your
computer, a dialog box appears asking if you want to install .NET Framework 3.5
SP1. Click Yes to proceed with the installation.
3. On the Product registration page, provide the name and company for the product
registration, and then click Next.
90
Note
For this evaluation release, a product key is not required.
4. On the Please read this license agreement page, review and accept the Microsoft
Software License Terms, and then click Next.
5. Your computer is checked for required hardware and software. If your computer meets all
of the requirements, the All prerequisites are installed page appears. Click Next and
proceed to the next step.
If a prerequisite is not met, a page displays information about the prerequisite that has
not been met and how to resolve the issue. Use the following steps to resolve the failed
prerequisite check:
a. Review the items that did not pass the prerequisite check. For some requirements,
such as Microsoft .NET Framework 4, you can use the link provided in the Setup
Wizard to install the missing requirement. The Setup Wizard can install or configure
other prerequisites, such as the Internet Information Services (IIS) role.
Warning
If you enable prerequisites during setup, such as Microsoft .NET Framework
4, your computer can require a restart. If you restart your computer, you must
run setup again from the beginning.
b. After you resolve the missing prerequisites, click Verify prerequisites again.
c. Click Next to continue.
6. On the Configure the service account page, enter the user name and password for the
Orchestrator service account. Click Test to verify the account credentials. If the
credentials are accepted, click Next.
7. On the Configure the database server page, enter the name of the database server
associated with your Orchestrator management server. You can also specify whether to
use Windows Authentication or SQL Server Authentication, and whether to create a new
database or use an existing database. Click Test Database Connection to verify the
account credentials. If the credentials are accepted, click Next.
8. On the Configure the database page, select the Orchestrator database for your
deployment, and then click Next.
9. On the Configure the port for the web service page, verify the port numbers for the
Orchestrator web service and the Orchestration console, and then click Next.
10. On the Select the installation location page, verify the installation location for
Orchestrator, and then click Next.
11. On the Microsoft Update page, optionally indicate whether you want to use the Microsoft
Update services to check for updates, and then click Next.
12. On the Help improve Microsoft System Center Orchestrator page, optionally indicate
whether you want to participate in the Customer Experience Improvement Program or
Error Reporting, and then click Next.
13. Review the Installation summary page, and then click Install.
The Installing features page appears and displays the installation progress.
91
14. On the Setup completed successfully page, optionally indicate whether you want to
start the Runbook Designer, and then click Close to complete the installation.
See Also
Install Individual Orchestrator Features
How to Install the Runbook Designer for System Center 2012 - Orchestrator
Use the following steps to install the System Center 2012 - Orchestrator Runbook Designer on a
single computer.
Note
Before you begin the install of the Runbook Designer, close any open programs
and ensure that there are no pending restarts on the computer. For example, if
you have installed a server role by using Service Manager or have applied a
security update, you might have to restart the computer, and then log on to the
computer with the same user account to finish the installation of the server role or
the security update.
2. On the main System Center 2012 - Orchestrator Setup Wizard page, click Runbook
Designer.
Warning
If Microsoft .NET Framework 3.5 Service Pack 1 is not installed on your
computer, a dialog box appears asking if you want to install .NET Framework 3.5
SP1. Click Yes to proceed with the installation.
3. Your computer is checked for required hardware and software. If your computer meets all
of the requirements, proceed to the next step.
If a prerequisite is not met, a page displays information about the prerequisite that has
not been met and how to resolve the issue. Use the following steps to resolve the failed
prerequisite check:
a. Review the items that did not pass the prerequisite check. For some requirements,
such as Microsoft .NET Framework 4, you can use the link provided in the Setup
Wizard to install the missing requirement. The Setup Wizard can install or configure
other prerequisites, such as the Internet Information Services (IIS) role.
b. After you resolve the missing prerequisites, click Verify prerequisites again.
c. Click Next to continue.
4. On the Select the installation location page, verify the installation location for
92
Orchestrator, and then click Next.
5. Review the Installation summary page, and then click Install.
The Installing features page appears and displays the installation progress.
6. On the Setup completed successfully page, optionally indicate whether you want to
start the Runbook Designer, and then click Close to complete the installation.
Note
If the Runbook Designer is connected to another management server, the
Connect to a server icon is disabled. Click the Disconnect icon before you
connect to a different management server.
2. In the System Center Orchestrator 2012 Connection dialog box, enter the name of the
server that hosts your Orchestrator management server, and then click OK.
See Also
Install Individual Orchestrator Features
Option Description
93
Option Description
94
Option Description
DbNameNew.
See Also
Install Orchestrator
95
Prepare the Windows 2008 R2 image
Use the following steps to prepare the Windows 2008 R2 image.
<unattend xmlns="urn:schemas-microsoft-com:unattend">
96
<settings pass="oobeSystem">
<AutoLogon>
<Password>
<Value>password</Value>
<PlainText>true</PlainText>
</Password>
<LogonCount>1</LogonCount>
<Enabled>true</Enabled>
<Username>Administrator</Username>
</AutoLogon>
<FirstLogonCommands>
<SynchronousCommand wcm:action="add">
<CommandLine>cmd /c %systemdrive%\sco\install.bat</CommandLine>
<Order>1</Order>
<RequiresUserInput>false</RequiresUserInput>
</SynchronousCommand>
</FirstLogonCommands>
</component>
</settings>
<cpi:offlineImage
cpi:source="wim:c:/windowsenterprise/extracted/sources/install.wim#Windows Server 2008 R2
SERVERENTERPRISE" xmlns:cpi="urn:schemas-microsoft-com:cpi" />
</unattend>
This is a sample install.bat file that is referenced in the Orchestrator.xml unattend file for the
FirstLogonCommand. Create this batch file in the %systemdrive%\sco directory along with the
Orchestrator setup files. This file can be customized by using the command line install tool. For
more information, see Install with the Orchestrator Command Line Install Tool.
%systemdrive%\sco\setup\setup.exe /Silent /ServiceUserName:%computername%\administrator
/ServicePassword:password /Components:All /DbServer:%computername% /DbPort:1433
/DbNameNew:OrchestratorSysPrep /WebConsolePort:82 /WebServicePort:81 /OrchestratorRemote
/UseMicrosoftUpdate:1 /SendCEIPReports:1 /EnableErrorReporting:always
97
Perform Post-Installation Tasks
This section describes the tasks you can perform after a successful installation of
System Center 2012 - Orchestrator.
Post-installation tasks
How to Install an Integration Pack
Describes how to register and deploy Orchestrator integration packs.
How to Install GnuPG
Describes how to install GnuPG.
Migrate Opalis Policies to Orchestrator
Describes how to migrate Opalis Policies to Orchestrator runbooks.
How to Configure the Orchestrator Web Service to use HTTPS
Describes how to secure the Orchestrator web service by using HTTPS.
How to Uninstall and Unregister an Integration Pack
Describes how to remove integration packs from Orchestrator.
98
The following procedures contain general instructions that apply to most integration packs. See
the relevant integration pack guide for system requirements and any special installation
instructions for that integration pack.
Important
System Center 2012 - Orchestrator supports integration packs designed for
System Center 2012 - Orchestrator. Integrations packs for Opalis or pre-release versions
of System Center 2012 - Orchestrator are not supported.
Important
Orchestrator does not support a downgrade of integration packs. If you have an
integration pack that is currently registered or previously registered in Orchestrator,
installation fails if you attempt to install an earlier version of the same integration pack.
You should test integration packs and upgraded integration packs in a test environment
before you implement them in a production environment. If you require a downgrade of
an integration pack in a production environment, contact Microsoft Customer Support for
assistance.
Tip
Confirm that the file is not set to Read Only to prevent unregistering the
integration pack at a later date.
2. Start the Deployment Manager.
3. In the navigation pane of the Deployment Manager, expand Orchestrator Management
Server, right-click Integration Packs to select Register IP with the Management
Server. The Integration Pack Registration Wizard opens.
4. Click Next.
5. In the Select Integration Packs or Hotfixes dialog box, click Add.
99
6. Locate the .OIP file that you copied locally from step 1, click Open, and then click Next.
7. In the Completing the Integration Pack Wizard dialog box, click Finish.
8. On the End User Agreement dialog box, read the Microsoft Software License Terms,
and then click Accept.
The Log Entries pane displays a confirmation message when the integration pack is
successfully registered.
Warning
If you did not configure a deployment schedule, the integration pack deploys
immediately to the computers that you specified. If you configured a deployment
schedule, verify that the deployment occurred by verifying the event logs after the
scheduled time has passed.
100
On the management server, start the Deployment Manager, and then right click on
the deployed integration pack for each Runbook Server or Runbook Designer
computer and click Uninstall Integration Pack or Hotfix.
2. Register and deploy the upgraded integration pack as described above in “To register an
integration pack” and “Register and deploy the upgraded integration pack as described
above in To register an integration pack and To deploy an integration pack.
3. Deploy the integration pack upgrade as described above in To deploy an integration
pack.
See Also
Perform Post-Installation Tasks
To install GnuPG
1. Download gpg.exe and iconv.dll, version 1.4.10 or later, from GnuPG.
2. Save gpg.exe and iconv.dll to the <System drive>:\Program Files (x86)\Common
Files\Microsoft System Center 2012\Orchestrator\Extensions\Support\Encryption folder
on each runbook server and computer that is running the Runbook Designer.
See Also
Perform Post-Installation Tasks
101
Planning your Opalis Policy Migration
Describes issues to consider before you migrate your Opalis Polices.
How to Migrate Opalis Policies to Orchestrator
Describes how to migrate your Opalis Policies to Orchestrator.
Modify Migrated Orchestrator Runbooks
Describes required modifications for newly migrated Orchestrator runbooks.
How to Test Migrated Runbooks
Describes how to test your newly migrated Orchestrator runbooks.
Task Information
1. Plan your Opalis Policy Migration. Planning your Opalis Policy Migration
2. Migrate your Opalis Policies and import them How to Migrate Opalis Policies to Orchestrator
into Orchestrator.
4. Test your new runbooks with Orchestrator. How to Test Migrated Runbooks
See Also
Migrate Opalis Policies to Orchestrator
102
Topic Information
Summary of supported migration paths for Supported Opalis Policy Migration Paths
Opalis Policies.
Modify Opalis Policies that contain special Modify Opalis Policies that Contain Special
characters. Characters
See Also
Migrate Opalis Policies to Orchestrator
Opalis Integration Server 5.3, 5.4, 5.45, 5.5, Upgrade the earlier version of Opalis to Opalis
5.51, 5.52,5.6, 5.6.1, 5.6.2, 6.0, or 6.2 Integration Server 6.3 and then migrate an
Opalis Integration Server 6.3 Policy to
Orchestrator.
Opalis Integration Server 6.3 Export Policies from Opalis 6.3 and import
them into Orchestrator as runbooks.
For information about how to upgrade earlier versions of Opalis Integration Server to Opalis
Integration Server 6.3, see Opalis Integration Server 6.3.
See Also
Migrate Opalis Policies to Orchestrator
System Requirements
The operating systems supported for Orchestrator differ from the supported operating systems for
Opalis Integration Server 6.3. Although both products run on Windows Server 2008 R2, they
cannot be installed on the same system. There is no common database support for both
products.
103
Product Supported operating systems and software
Opalis Integration Server 6.3 Windows Server 2003 (32-bit) Service Pack 2
Windows Server 2003 R2 (32-bit) Service Pack
2
Windows Server 2008 (32-bit or 64-bit)
Windows Server 2008 R2
Microsoft SQL Server 2005
SQL Server 2008
Oracle Server versions 9.2, 10.x, and 11
See Also
Migrate Opalis Policies to Orchestrator
Policies.Name,
Objects.Name,
Objects.Description
FROM
Objects join
Policies
on Objects.ParentID=Policies.UniqueID
where
ASCII(Objects.Name) < 32
Policies.Deleted is NULL
104
See Also
Migrate Opalis Policies to Orchestrator
Tip
If exports take a long time to complete, they will take a long time to import.
Consider breaking up an export into several smaller exports by selecting groups
of Policies in the Opalis Integration Server 6.3 Client.
See Also
Perform Post-Installation Tasks
105
Legacy mode was retained in Opalis Integration Server 6.3 to provide backwards compatibility
with older versions of Opalis software. In Opalis Integration Server 6.3, the default policy mode
for new workflows is “pipeline.”
Orchestrator does not provide a runbook mode setting. The Policy Mode property of an Opalis
Policy is now the Job Concurrency property in Orchestrator. Runbooks in Orchestrator use a
data model compatible with Opalis Integration Server 6.3 pipeline mode.
You can import Opalis Integration Server 6.3 Policies that used legacy mode successfully into
Orchestrator. However, the legacy mode is not compatible with Orchestrator. You can identify
legacy mode runbooks by looking at the toolbar of the imported runbook. If the runbook is
Checked In, the runbook was an Opalis Integration Server 6.3 pipeline workflow. If the runbook is
Checked Out, the Opalis Integration Server 6.3 workflow was a legacy workflow.
The following table summarizes the Opalis Integration Server 6.3 workflow mode settings and
show how these workflows are treated when they are migrated to Orchestrator runbooks.
Unsupported structures
When you check in a runbook that was a legacy Policy in Opalis, the Runbook Designer shows a
warning if the runbook contains a structure that is not valid. You must resolve these warnings
before the runbook functions correctly.
Note
The check-in succeeds even if a warning is produced. Check out the runbook to correct
the structure that is not valid.
Multiple starting points
Runbooks can only contain one activity as a starting point. If the migrated runbook contains
multiple starting activities, check-in produces a warning.
Update the runbook to contain a single starting activity.
Cycles
Runbooks cannot contain smart links that originate with one runbook activity and reference an
earlier runbook activity. These runbook structures are called cycles. Cycles are supported in
Opalis Integration Server 6.3 legacy mode. Orchestrator does not support runbooks that contain
cycles. If you check in a runbook that contains a cycle, you receive a warning.
Update the runbook so it does not contain a cycle.
106
Opalis ROI setting
Opalis Integration Server 6.3 provided a Policy property to track return on investment (ROI). To
can view this runbook property, right-click a Policy tab in the Opalis Integration Server Client to
select Properties. The ROI settings for a given runbook are located on the ROI tab.
The ROI is not supported in Orchestrator. Orchestrator ignores these settings if they are present
in imported Opalis Integration Server 6.3 workflows.
107
Opalis legacy object Orchestrator activity or resource
108
From
[Policies] policies
on objects.[ParentID]=policies.[UniqueID]
Where
objects.objecttype = '2081B459-88D2-464A-9F3D-27D2B7A64C5E' or
objects.objecttype = '6F0FA888-1969-4010-95BC-C0468FA6E8A0' or
objects.objecttype = '8740DB49-5EE2-4398-9AD1-21315B8D2536' or
objects.objecttype = '19253CC6-2A14-432A-B4D8-5C3F778B69B0' or
objects.objecttype = '9AB62470-8541-44BD-BC2A-5C3409C56CAA' or
objects.objecttype = '292941F8-6BA7-4EC2-9BC0-3B5F96AB9790' or
objects.objecttype = '98AF4CBD-E30E-4890-9D26-404FE24727D7' or
objects.objecttype = '2409285A-9F7E-4E04-BFB9-A617C2E5FA61' or
objects.objecttype = 'B40FDFBD-6E5F-44F0-9AA6-6469B0A35710' or
objects.objecttype = '9DAF8E78-25EB-425F-A5EF-338C2940B409' or
objects.objecttype = 'B5381CDD-8498-4603-884D-1800699462AC' or
objects.objecttype = 'FCA29108-14F3-429A-ADD4-BE24EA5E4A3E' or
objects.objecttype = '7FB85E1D-D3C5-41DA-ACF4-E1A8396A9DA7' or
objects.objecttype = '3CCE9C71-51F0-4595-927F-61D84F2F1B5D' or
objects.objecttype = '96769C11-11F5-4645-B213-9EC7A3F244DB' or
objects.objecttype = '6FED5A55-A652-455B-88E2-9992E7C97E9A' or
objects.objecttype = '9C1DF967-5A50-4C4E-9906-C331208A3801' or
objects.objecttype = 'B40FDFBD-6E5F-44F0-9AA6-6469B0A35710' or
objects.objecttype = '829A951B-AAE9-4FBF-A6FD-92FA697EEA91' or
objects.objecttype = '1728D617-ACA9-4C96-ADD1-0E0B61104A9E' or
objects.objecttype = 'F3D1E70B-D389-49AD-A002-D332604BE87A' or
objects.objecttype = '2D907D60-9C25-4A1C-B950-A31EB9C9DB5F' or
objects.objecttype = '6A083024-C7B3-474F-A53F-075CD2F2AC0F' or
objects.objecttype = '4E6481A1-6233-4C82-879F-D0A0EDCF2802' or
objects.objecttype = 'BC49578F-171B-4776-86E2-664A5377B178'
See Also
Migrate Opalis Policies to Orchestrator
109
How to Test Migrated Runbooks
After you migrate and update your migrated runbooks, test the migrated runbooks to verify that
they function correctly. You test runbooks with the Runbook Tester, located in the Runbook
Designer. To perform testing successfully, your imported runbook must satisfy the following
criteria:
The runbook does not produce any warnings when checked in.
The runbook does not use any legacy or missing Opalis Integration Server 6.3 Policy objects.
The runbook does not contain an Invoke Runbook activity that has to run as part of testing.
Observe the runtime characteristics of the runbook. In most cases, the behavior is unchanged
from the behavior in Opalis Integration Server 6.3. If there are differences in behavior, these are
typically associated with differences in behavior between legacy mode and pipeline mode in
Opalis Integration Server 6.3.
See Also
Migrate Opalis Policies to Orchestrator
To configure the Orchestrator web service to use Secure Sockets Layer (SSL)
1. Request and install a certificate on the computer where you installed the Orchestrator
web service. For guidance about requesting and installing a certificate, see How to
implement SSL in IIS on the Microsoft Support website.
2. Configure SSL on the machine that hosts the web service and Orchestration console.
The default port for the web service is port 81, and the default port for the Orchestration
console is port 82. You should configure the ports as appropriate for your installation.
You can configure the bindings by performing the following steps:
a. Open Internet Information Services (IIS) Manager.
b. In the Connections pane, expand the Orchestrator web server, expand Sites, and
then click Microsoft System Center 2012 Orchestrator Web Service.
c. In the Actions pane, click Bindings.
d. In the Site Bindings dialog box, click Add.
e. In the Add Site Binding dialog box, in the Type box, select https and select your
SSL certificate.
f. Specify the Port to use. The default of 443 is recommended.
g. Click OK.
h. Click Close.
3. In the Microsoft System Center Orchestrator 2012 Orchestration Web Service pane,
under IIS, double-click SSL settings.
110
4. In the SSL Settings pane, select Require SSL.
5. Click Apply.
6. Repeat the procedure for Microsoft System Center 2012 Orchestrator Orchestration
Console using a different port. Port 444 is recommended.
For more information about securing Internet Information Services (IIS) 7, see
http://go.microsoft.com/fwlink/p/?LinkId=231416.
Note
If you used a port for the web service other than 443, then use that port number.
See Also
Perform Post-Installation Tasks
Windows Firewall
When you deploy additional Runbook Designer applications to your environment, you might see a
failed installation message. To correctly install the Runbook Designer, enable the following
firewall rules as they apply to your operating system and deployment configuration.
111
Windows Firewall with Advanced Security for Windows Server 2012 R2
By default, Windows Firewall with Advanced Security is enabled on all Windows Server 2008
R2 computers, and blocks all incoming traffic unless it is a response to a request by the host, or it
is specifically allowed. You can explicitly allow traffic by specifying a port number, application
name, service name, or other criteria by configuring Windows Firewall with Advanced Security
settings.
If you are running Windows Server 2012 R2, enable the following rules to allow all Monitor Event
activities to function correctly:
Windows Management Instrumentation (Async-In)
Windows Management Instrumentation (DCOM-In)
Windows Management Instrumentation (WMI-In)
Automated deployment
When a runbook server or Runbook Designer is installed behind a firewall, specific firewall rules
are required between the remote computers that are used to deploy the runbook server and
Runbook Designer. An additional rule is required for the remote connection between the Runbook
Designer and the runbook server to allow the Orchestrator management service to accept remote
connections. If you are using the Monitor WMI task, the runbook server requires a special firewall
rule on the computer that uses PolicyModule.exe.
Enable the following firewall rules on your computer:
Firewall rule between the Runbook Designer and the Orchestrator management server
112
Operating system Firewall rules
%SystemRoot%\System32\OrchestratorRemotingService.exe (for
a 32-bit operating system)
Firewall rules between the runbook server and the computer that uses PolicyModule.exe
For more information about adding firewall rules, see Add or Edit a Firewall Rule.
113
HTTP error 404.3 – Not Found: Ensure that both .NET Framework 4.5 and Windows
Communication Foundation (WCF) HTTP Activation are installed. You can find the
instructions in Single-Computer Requirements for System Center 2012 R2 Orchestrator.
HTTP error 404.17 – Not Found: Ensure that Windows Communication Foundation (WCF)
HTTP Activation is installed. You can find the instructions in Single-Computer Requirements
for System Center 2012 R2 Orchestrator.
In This Guide
Accessibility for People with Disabilities
Describes accessibility options in Orchestrator.
How to Change the Orchestrator Database
Describes how to change the location of the orchestration database.
How to Change the Orchestrator Users Group
Describes how to remove and add members to the Orchestrator Users Group.
How to Configure Orchestrator Database Connections
Describes how to use DBSetup to configure connections to an Orchestrator database.
How to Configure Runbook Servers to Optimize Performance of .NET Activities
Describes how to configure a runbook server to perform optimally with activities that require
Microsoft .NET libraries.
How to Configure Runbook Throttling
114
Describes how to use the Runbook Server Runbook Throttling tool to change the maximum
number of runbooks that can run on a runbook server.
How to View Orchestrator Data by Using PowerPivot
Describes how to view Orchestrator data by using Microsoft Excel PowerPivot.
Orchestrator Logs
Describes the types of logs available in Orchestrator and how to configure them.
Runbook Server Properties
Describes the runbook server properties.
How to Back up Orchestrator
Describes how to back up an Orchestrator database.
How to Use the Integration Toolkit to Extend Orchestrator Capabilities
Provides a link to the MSDN library content that helps you create new integration packs for
Orchestrator.
In This Section
Accessibility Features of Orchestrator
Describes the accessibility features of Orchestrator.
Accessibility Features of Orchestrator Help
Describes the accessibility features of the Orchestrator Help.
Accessibility Products and Services from Microsoft
Describes the accessibility products and services that are available from Microsoft.
115
See Also
Orchestrator Release Candidate
Note
The information in this section may apply only to users who license Microsoft products in
the United States. If you obtained this product outside of the United States, you can use
the subsidiary information card that came with your software package or visit the
Microsoft Accessibility website for a list of Microsoft support services telephone numbers
and addresses. You can contact your subsidiary to find out whether the type of products
and services described in this section are available in your area. Information about
accessibility is available in other languages, including Japanese and French.
116
To do this Use this keyboard shortcut
See Also
Accessibility for People with Disabilities
Change between tabs (for example, Contents, ALT + Underlined letter of the tab
Search, and Index) while in the navigation
pane.
117
To do this Use this keyboard shortcut
Hide All, hidden text, or hyperlink.
Hide or show the pane containing the ALT+O, and then press T
Contents, Search, and Index tabs.
Display the next topic in a previously displayed ALT+O, and then press F
sequence of topics.
Stop the Help window from opening a Help ALT+O, and then press S
topic (useful if you want to stop a Web page
from downloading).
Open the Internet Options dialog box for ALT+O, and then press I
Windows Internet Explorer, where you can
change accessibility settings.
Refresh the topic (useful if you have linked to a ALT+O, and then press R
Web page).
Print all topics in a book or a selected topic ALT+O, and then press P
only.
Procedures
To change the appearance of a Help topic
1. To customize the colors, font styles, and font sizes used in Help, open the Help window.
2. Click Options, and then click Internet Options.
3. On the General tab, click Accessibility. Select Ignore colors specified on Web pages,
Ignore font styles specified on Web pages, and Ignore font sizes specified on Web
pages. You also can choose to use the settings specified in your own style sheet.
4. To change the colors used in Help, see "To change the color of the background or text in
Help". To change the font, see "To change the font in Help."
118
2. Click Options, and then click Internet Options.
3. On the General tab, click Accessibility. Then, select Ignore colors specified on Web
pages. You also can choose to use the settings specified in your own style sheet.
4. To customize the colors used in Help, on the General tab, click Colors. Clear the Use
Windows Colors check box, and then select the font and background colors that you
want to use.
Note
If you change the background color of the Help topics in the Help window, the
change also affects the background color when you view a Web page in
Windows Internet Explorer.
Note
If you change the font of the Help topics in the Help window, the change also
affects the font when you view a Web page in Internet Explorer.
Note
The information in this section may apply only to users who license Microsoft products in
the United States. If you obtained this product outside of the United States, you can use
119
the subsidiary information card that came with your software package or visit the
Microsoft Accessibility website for a list of Microsoft support services telephone numbers
and addresses. You can contact your subsidiary to find out whether the type of products
and services described in this section are available in your area. Information about
accessibility is available in other languages, including Japanese and French.
Learning Ally (formerly Recording for the Blind & Dyslexic, Inc.)
20 Roszel Road
Princeton, NJ 08540
Web addresses can change, so you might be unable to connect to the website or sites mentioned
here.
121
servers are stored in an encrypted file called Settings.dat. If you change your orchestration
database settings, such as the port, user account access, or computer name, you must manually
uninstall and reinstall all runbook servers, and then re-run the Database Configuration utility on
the management server and all runbook servers.
To change the database settings for the management server and runbook servers
1. On the management server, click Start, point to All Programs, click Microsoft System
Center 2012, click Orchestrator, and then click Data Store Configuration.
2. In the Server box, enter the name of the server that is hosting the database by using the
format <server>\<instance>,<port>. You can click the ellipsis (...) button to select the
computer. You do not have to include the instance if the Orchestrator database is
installed on the default instance. You do not have to include the port if SQL Server is
usually installed on the default port 1433.
If the Orchestrator database is installed on an instance called MyInstance on a computer
named MySQLServer that is configured on port 12345, enter
MySQLServer\MyInstance,12345.
If the Orchestrator database is installed on an instance called MyInstance on a computer
named MySQLServer that is configured on port 1433, enter MySQLServer\MyInstance.
If the orchestration database is installed on the default instance on a computer named
MySQLServer that is configured on port 1433, enter MySQLServer.
3. Select the authentication method to use to connect to the SQL Server:
Windows Authentication Connect to the SQL Server by using Windows
Authentication.
SQL Server Authentication Connect to the SQL Server by using a SQL Server user
account. Type the User Name and Password of the SQL Server user account. This
account must have rights to create, write, and own a database and create, update,
and delete rows in the database.
4. Click Next.
5. In the Data Store pane, click Use an existing database.
6. In the Name list, select the database.
7. Click Finish.
Web Service
The web service supporting the Orchestration console does not use the Settings.dat file. To
change the database settings for the web service, you must modify the Web.config file on the
Internet Information Services (IIS) server. You can use IIS Manager to modify the file, but you
must first decrypt it by running the aspnet_regiis.exe executable file.
122
installed.
2. Open a Command Prompt window with administrator credentials.
3. Run the following command to decrypt the Web.config file:
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe -pdf
"connectionStrings" "C:\Program Files (x86)\Microsoft System Center
2012\Orchestrator\Web Service\Orchestrator2012"
4. To start the IIS Manager, click Start, point to Administrative Tools, and then click
Internet Information Services (IIS) Manager.
5. Expand the Sites node, and then click Microsoft System Center 2012 Orchestrator
Web Service.
6. In the Features View, double-click Connection Strings.
7. In the Connections String pane, double-click OrchestratorContext.
8. In the Custom box, scroll down to the portion of the string that includes the server name
(Data Source) and database name (Initial Catalog). Modify these values as required.
9. Click OK to close the dialog box.
10. Close IIS Manager.
11. Run the following command to encrypt the Web.config file:
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe -pef
"connectionStrings" "C:\Program Files (x86)\Microsoft System Center
2012\Orchestrator\Web Service\Orchestrator2012"
See Also
Administering System Center 2012 - Orchestrator
PermissionsConfig tool
You can change the Orchestrator Users group by using the PermissionsConfig tool, which is
located on the management server in <InstallDir>\Management Server. The syntax of this tool
is as follows:
PermissionsConfig–OrchestratorUsersGroupGroupName–OrchestratorUserUserName-
remote
123
Note that the PermissionsConfig tool does not send results to standard output. To view the
results of the command, check the %errorlevel% in the Orchestrator log file that is located at
C:\Users\SCXSVC\AppData\Local\SCO\LOGS. The results are 1 for failure, 0 for success.
You can get an explanation of the parameters for the PermissionsConfig tool by typing the
following command:
PermissionsConfig –help
Parameter Details
For example, to change the Orchestrator users group to a group that is named Orchestrator
Users in a domain that is named Contoso, use the following command:
PermissionsConfig –OrchestratorUsersGroup "Contoso\Orchestrator Users" -remote
Important
You must run the PermissionsConfig tool at a command prompt with administrative
credentials because it modifies group memberships. To do this, right-click the Command
Prompt icon to select Run as Administrator.
See Also
Orchestrator Security Planning
124
How to Configure Orchestrator Database
Connections
DBSetup allows you to secure an unsecured database. The common scenario is connecting to a
restored backup.
This utility provides two functions:
1. DBSetup allows you to change the database name or credentials that are used by the
management server or runbook servers to connect to the database.
2. DBSetup allows you to connect to a rebuilt database.
When connecting to a rebuilt database:
This procedure can only be performed against the same database server used during the
installation of the management server.
You must have database permissions to create the database.
In contrast, DBconfig only creates a new database; it does not configure the security for the
database. DBConfig configures the database schema in the database and creates the contents of
settings.dat, which contains the connection details for the management server and runbook
servers. For more information on running DBConfig, see How to Change the Orchestrator
Database.
See Also
How to Change the Orchestrator Database
125
How to Configure Runbook Servers to
Optimize Performance of .NET Activities
If a runbook contains an activity that references the .NET libraries, the first reference to the .NET
libraries takes additional time to initialize. This delay can be as much as 30 seconds. All
remaining activities that reference the .NET libraries run immediately. This delay can also occur
when a runbook is started on a computer without Internet access, because then Windows cannot
verify the Microsoft Authenticode signature for the .NET libraries, and this causes a delay during
the initialization of the activity.
The solution to removing the delay is to deactivate generatePublisherEvidence in
PolicyModule.exe or to create a profile for the service account.
See Also
Administering System Center 2012 - Orchestrator
126
To configure the maximum number of runbooks that a runbook server processes
1. Navigate to the folder where by default the Runbook Server Runbook Throttling tool is
stored: <System Drive>:\Program Files (x86)\Microsoft System Center
2012\Orchestrator\Management Server.
2. Type one of the following commands:
To apply the change to one runbook server:
aspt <RunbookServerName> <MaximumRunningRunbooks>.
For example, to set the maximum number of runbooks that RunbookServer1 runs to
40:
aspt RunbookServer1 40
To apply the change to all runbook servers:
aspt * <MaximumRunningRunbooks>.
For example, to set the maximum number of runbooks that all runbook servers run to
40:
aspt * 40
3. Restart the Orchestrator Runbook Service.
See Also
Administering System Center 2012 - Orchestrator
127
To install PowerPivot
1. Follow the instructions found at Install PowerPivot for Excel.
Use PowerPivot to configure a connection to Orchestrator web service. Orchestrator uses the
Open Data Protocol (OData), which PowerPivot can consume.
Note
The OData provider in PowerPivot does not support the data contained in the Runbook
Diagram box. Attempts to add a Runbook Diagram table will fail.
128
Note
For this example, the orchestration database must contain results from at least one
runbook for PowerPivot to import a table.
129
7. Right-click RunbookId to select Summarize by, and then click Count.
You can now modify the default labels and format your table for presentation.
For more information about the workflow of a runbook and an explanation of runbook jobs and
runbook instances, see Orchestrator Architecture in the Getting Started with System Center 2012
- Orchestrator.
For more information about PowerPivot for Excel, see Introducing PowerPivot for Excel.
See Also
Administering System Center 2012 - Orchestrator
Orchestrator Logs
This section provides information on common troubleshooting issues and the available tools that
can assist in identifying root problems.
Log files
In Orchestrator, different logs are available that provide information about Orchestrator runbooks
and servers. The following table lists the available types of log files, with links to the appropriate
sections that describe the logs in more detail.
Log File Topic or Contents Where data is stored Where data is viewed
Section
Real time log Live information about a Orchestration database Log tab in Runbook
section in Runbook running runbook instance Designer
Logs.
Historic Log section Historical information Orchestration database Log History tab in
in Runbook Logs. about instances of a Runbook Designer
runbook
Runbook Audit Audit information about Orchestration database Audit History tab in
History section in changes to a runbook Runbook Designer
Runbook Logs.
130
Log File Topic or Contents Where data is stored Where data is viewed
Section
Runbook logs
Every runbook generates a log when it is running. The Runbook Designer enables you to view
both real-time log information and historic logs.
Real-Time Log
You can view the real-time log of a runbook on the Log tab in the Log pane of the Runbook
Designer. The log has an entry for each running instance of the runbook and the time that it was
started. If you expand this entry, you can view the activity that is currently running. Double-click
the activity to view its details. If you have configured logging for the workbook to include
Published Data, this information is included in the activity’s details.
Historic Log
You can view the historic log of a runbook on the Log History tab in the Log pane of the
Runbook Designer. This log has an entry for each completed instance of the runbook with its start
and end times and completion status. If you double-click an entry, the Runbook Details dialog
box opens that includes each activity in the runbook and its completion status. Double-click each
activity to view its details. If you have configured logging for the workbook to include Published
Data, this information is included in the activity’s details.
131
Runbook Log Options
By default, the Runbook logs do not include Published Data for each activity. For standard
activities, refer to Standard Activities for a list of the Published Data items available for each. For
integration packs, refer to the specific integration pack guide. You can change the logging
properties for an individual runbook to include this information in the logs. You can include both or
either of the following two kinds of Published Data:
Activity-specific Published Data is Published Data that is specific to a particular activity.
Typically, this option should be enabled only for debugging purposes.
Common Published Data is a set of data items that are common to all activities. These are as
follows:
Activity Name
Activity Type
Activity ID
Activity End Time Year, Month, Day, Weekday, Hours, Minutes, Seconds
Activity Duration
Previous Activity
Previous Activity Name
Time Published Data
Caution
By default, logging options are disabled. Be aware that adding these items to the log
increases the size of the data store.
Note
132
When logs are purged, the data is deleted from Orchestration database and cannot be
recovered.
If you let the number of log entries grow indiscriminately, it can result in excessive storage
requirements for the Orchestration database. To maintain the health and performance of the
database, you should regularly purge old log entries. You can purge either them on an automatic
schedule or manually.
Time 2:00 AM
The default log purge job purges all but the last 500 log entries per runbook. This means that if an
Orchestrator deployment had 20 runbooks, the default purge would keep the last 500 log entries
for each runbook, for a maximum of 10,000 log entries for the database for all runbooks.
You can continue to use these defaults or change the settings by using the following process in
the Runbook Designer.
133
Manually Purging the Runbook Logs
Audit History logs are a special case because these logs canno bte purged with the Log Purge
feature. The audit history feature tracks the changes made to a runbook in the Runbook
Designer and cannot be deleted. The only way to delete Audit History logs is to delete the
runbook associated with them. However, data volumes for the Audit History logs for a given
runbook are generally small, even in large deployments storage will not require more than the
minimum system requirements.
There are two options to manually purge the runbook logs as shown in the following two
procedures. They are performed in the Runbook Designer.
134
The following process describes how to run this stored procedure by using the Microsoft SQL
Server Management Studio installed on the orchestration database server. You can perform this
process from any computer with this tool installed that has access to the orchestration database.
Note
If you used a different name for the Orchestrator database, select that name.
4. Expand Programmability, and then click Stored Procedures.
5. Right-click
Microsoft.SystemCenter.Orchestrator.Runtime.Internal.ClearOrphanedRunbookIns
tances to select Execute Stored Procedure.
6. In the Execute Procedure dialog box, click OK.
7. On the toolbar, click Execute.
8. When you receive a message at the bottom of the Logging pane that the query has
completed, close SQL Server Management Studio.
See Also
Orchestrator Logs
Activity Events
Each activity in an Orchestrator runbook has the ability to send an event whenever it fails to run
or is taking too long to run. These events are presented on the Events tab of the Runbook
Designer or can be configured to be delivered to a receiver as an SNMP trap. Runbook activity
events are only sent for those activities that you specifically configure to do so.
135
Receiving Events from SNMP
In addition to viewing the events on the Events tab in the Runbook Designer, you can send them
to an SNMP trap destination. This lets you monitor the health of the Orchestrator environment by
using other tools designed to provide proactive alerting. The only requirement for such a tool is
that it can receive SNMP traps. You can use the Orchestrator Event Delivery Configuration
Utility to add and configure SNMP trap destinations for Runbook events.
136
Receiving SNMP Traps
After you have configured an SNMP trap destination for Orchestrator event notifications, you can
receive them by using any tool that reads SNMP traps, or you can use the Monitor SNMP Trap
activity in a runbook to read the information. The content of SNMP traps is limited to the first 1000
characters if the content exceeds that length.
The variable bindings are listed in the following table.
Generic ID (6)
Specific ID (1)
See Also
Orchestrator Logs
Audit Trail
The Audit Trail is a collection of text log files that contain information about the interaction of a
runbook with external tools and systems. By using the Audit Trail, you can report on configuration
and change compliance of processes and identify changes made to a non-Microsoft system for
audit purposes or to remediate a change that causes service interruption.
Depending on how many runbooks you invoke and how many activities those runbooks contain,
the Audit Trail can consume a large amount of disk space on the computer that runs the
management server and runbook server. If you enable auditing, you should implement an
137
archiving procedure to move the files generated by the Audit Trail to another computer on a
regular basis.
138
Log File name Conten Computer Location
Type ts
Us
er
na
me
an
d
do
ma
in
tha
t
sta
rte
d
the
run
bo
ok
Na
me
of
the
co
mp
ute
r
wh
ere
the
run
bo
ok
ran
139
Log File name Conten Computer Location
Type ts
tha
t
act
ivit
y
ran
Na
me
of
run
bo
ok
ser
ver
tha
t
ran
the
act
ivit
y
ID
of
the
job
pro
ce
ss
tha
t
ran
the
act
ivit
y
Ob
jec
t
XM
140
Log File name Conten Computer Location
Type ts
L
co
de
tha
t
act
ivit
y
rec
eiv
ed
as
inp
ut
dat
a
When a file reaches 200 megabytes (MB) in size, a new file is created. The time stamp is
included in the file name to ensure that each file name is unique. Passwords and other encrypted
text fields are represented by five asterisks (*****) in the Audit Trail files.
Note
The ProgramData folder holding the audit files is often a hidden system folder.
See Also
Orchestrator Logs
Trace Logs
Orchestrator can create trace log messages on the management server to help you identify
problems in the environment. By default, trace log messages are only written when there is an
exception in the Orchestrator Management Service, but you can increase this level of logging by
modifying a registry setting. Trace log files are available in directories for each Orchestrator
feature under C:\ProgramData\Microsoft System Center 2012\Orchestrator. You can change
these log locations by changing the registry values for the different features.
Note
The C:\ProgramData directory is often a hidden system folder.
141
Modifying Trace Log Settings
Trace log settings are configured with registry values under the key
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\SystemCenter2012\Orches
trator\TraceLogger. Each of the Orchestrator services has a set of registry values as shown in
the following table.
The following table shows the values that are under each key. Modify these values as appropriate
to change the logging details for that feature.
142
Registry value name Default value Description
until a new log file is
created.
The following table provides the possible values that you can use for the log level.
7 Full logging.
See Also
Orchestrator Logs
See Also
Administering System Center 2012 - Orchestrator
143
Backup of the Orchestrator database.
File backup of the Orchestrator management server.
File backup of each Runbook server and Orchestrator web server.
System Center 2012 - Orchestrator supports Volume Shadow copy Service (VSS) for backup and
restore with System Center 2012 – Data Protection Manager (DPM). VSS is a framework that
allows volume backups to be performed while an application continues to run.
To register the Orchestrator database used by the local management server, run the following
command:
SCOExpressWriter /register
Orchestrator Servers
Orchestrator management server, Runbook servers, and web servers do not persist any data.
Runbooks and their settings are stored entirely in the Orchestrator database and accessed by
these servers as required. Management servers and Runbook servers have a settings.dat file that
includes configuration details to connect to the Orchestrator database. Orchestrator web servers
have a web.config file with this same information. These files are backed up with standard file
backups which are supported by DPM.
Orchestrator Database
The Orchestrator database is a standard SQL Server database that is supported by DPM. You
should make sure to backup the service master key and store it in a secure off-site location. For
more information see BACKUP SERVICE MASTER KEY (Transact-SQL).
Note
See http://go.microsoft.com/fwlink/?LinkId=246817 for information on using the Sqlcmd
utility.
Where ‘password’ is the password that will be used to protect the service master key in the file
that is created. If the password is lost, the service master key cannot be recovered from the file.
145
3. Click Script, and then click Script Action to New Query Window.
4. Click Execute to test the backup script.
5. Create a batch file with this script. Your batch file will be similar to the following:
Sqlcmd –Q ”BACKUP DATABASE Orchestrator TO
DISK=N'C:\BACKUP\OrchestratorDB.bak'”
146
Deploy Orchestrator components in environment
B
Deploy Orchestrator components (management server, Web features, runbook servers, and
Runbook Designers) using the silent install commands of Orchestrator setup. See Install with the
Orchestrator Command Line Install Tool for more information on deploying Orchestrator through
the command line.
The following example installs all of Orchestrator on a computer with SQL Server 2008 R2 and
.NET Framework 4:
%systemdrive%\sco\setup\setup.exe /Silent /ServiceUserName:%computername%\administrator
/ServicePassword:password /Components:All /DbServer:%computername% /DbPort:1433
/DbNameNew:OrchestratorSysPrep /WebConsolePort:82 /WebServicePort:81 /OrchestratorRemote
/UseMicrosoftUpdate:1 /SendCEIPReports:1 /EnableErrorReporting:always
147
Best Practices Analyzer
The Microsoft System Center 2012 - Orchestrator Best Practices Analyzer is a tool that looks at
the configuration data in an Orchestrator deployment and identifies settings that may cause
issues within your environment. It performs the following functions:
Gathers information about an Orchestrator deployment
Determines if the configurations are set according to the Microsoft recommended best
practices
Reports on collected configurations, indicating settings that differ from recommendations
Indicates potential problems in the deployment
Installation
The Orchestrator BPA must be installed on the Orchestrator Management server. It depends on
having the Microsoft Baseline Configuration Analyzer 2.1
(http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=16475) installed on the
Orchestrator Management Server prior to installation.
Install process:
1. Install Microsoft Baseline Configuration Analyzer 2.1
2. Run Microsoft.SystemCenter.2012.Orchestrator.BestPracticesAnalyzer.msi
Uninstall process:
1. Remove Microsoft System Center 2012 Orchestrator – Best Practices Analyzer (BPA) from
the Programs and Features panel within Windows Control Panel.
Usage
1. Run the Microsoft Baseline Configuration Analyzer 2.1 from the Start menu in windows.
Note
To learn how to run the Microsoft Baseline Configuration Analyzer scans from
PowerShell cmdlets, please see the MBCA 2.1 help file.
2. Select System Center 2012 – Orchestrator BPA from the product dropdown within the MBCA
2.1 user interface.
3. Click Start Scan.
4. Review the results and recommendations.
Orchestrator rules
System Center 2012 - Orchestrator configuration checks:
148
Orchestrator Rule Description
Component
Management Check log purge is set to This rule checks that the default log purging
Server the default value for Runbooks is set to the default values for
running every one day and to keep the last
five hundred entries. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239613
for more information about setting the purging
policy for Runbook logs.
Management Check the refresh interval This rule checks that the default refresh
Server for permissions in the interval for generating the cache that allows
Orchestration console access to runbooks from the Orchestration
Console is set to six hundred seconds. Please
refer to
http://go.microsoft.com/fwlink/?LinkID=239946
for more information on how the refresh cache
is set up.
Management Check logging on This rule checks that the default trace logging
Server ManagementService.exe on the ManagementService.exe is set to the
default of 1. This can impact performance if a
different value is configured. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239530
for more information on configuring trace logs.
Management Check logging on This rule checks that the default trace logging
Server PermissionsConfig.exe on the PermissionsConfig.exe is set to the
default of 1. This can impact performance if a
different value is configured. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239530
for more information on configuring trace logs.
Management Check memory on This rule checks that the memory allocated to
Server Management Servers the Management Server is greater than
2048MB. If the Management Server has less
than 2048MB you should monitor its
149
Orchestrator Rule Description
Component
performance to ensure it is meeting the
expected goals in the environment. Please
refer to
http://go.microsoft.com/fwlink/?LinkID=242545
for information on the Orchestrator
Management Pack.
Runbook Server Check that maximum This rule checks that the maximum number of
concurrent runbooks is set concurrent runbooks that are configured to run
to the default value of 50. on a Runbook Server is set to fifty. This can
impact performance if a different value is
configured. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239560
for more information on configuring Runbook
throttling.
Runbook Server Check logging for This rule checks that the default trace logging
PolicyModule.exe on the PolicyModule.exe is set to the default
of 1. This can impact performance if a
different value is configured. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239530
for more information on configuring trace logs.
Runbook Server Check logging for This rule checks that the default trace logging
RunbookService.exe on the RunbookService.exe is set to the
default of 1. This can impact performance if a
different value is configured. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239530
for more information on configuring trace logs.
Runbook Server Check memory on Runbook This rule checks that the memory allocated to
Servers the Runbook Servers is greater than 2048MB.
If the Runbook Server has less than 2048MB
you should monitor its performance to ensure
it is meeting the expected goals in the
environment.
Web components Check memory on the This rule checks that the memory allocated to
server hosting the the Orchestration Console server is greater
Orchestration Console than 2048MB. If the server has less than
2048MB you should monitor its performance
to ensure it is meeting the expected goals in
the environment. Please refer to
150
Orchestrator Rule Description
Component
http://go.microsoft.com/fwlink/?LinkID=242545
for information on the Orchestrator
Management Pack.
Web components Check users group This rule checks that the windows group that
managing runbook access is used to manage access to runbooks is
configured as a domain group if the web
components are not installed on the
Management Server. The group must be a
domain group in order for users to have
access through the web service and
Orchestration console when the web
components are installed on a separate server
than the Management Server. Please refer to
http://go.microsoft.com/fwlink/?LinkID=239561
for more information on configuring the
Orchestrator users group.
Designer Check memory on the This rule checks that the memory allocated to
computer hosting the the Orchestrator Designer is greater than
Orchestrator Designer 2048MB. If the computer has less than
2048MB you should monitor its performance
to ensure it is meeting the expected goals in
the environment. Please refer to
http://go.microsoft.com/fwlink/?LinkID=242545
for information on the Orchestrator
Management Pack.
How to Benchmark
Orchestrator runbook activities can be thought of as having two distinct types of code: platform
code and domain code. The term domain code is used to identify code within a runbook activity
that is typically not associated with the Orchestrator platform itself (with notable exceptions, such
as Invoke Runbook, Junction, and others). For example, the Invoke Web Service standard
activity would contain Orchestrator platform code (the “plumbing” of the activity) as well as
domain code unique to invoking a SOAP-based web service. The platform code will be very
similar for most activities, since it is built on a common framework. However, there will potentially
be great variation in domain code for different activities.
151
Data Logging
Another aspect of runbook performance is data logging. For the purpose of understanding
performance consider two logging configurations: Default logging and Common Published Data
logging. Default logging results in approximately 524 bytes of data being written to the
Orchestrator database each time an activity is run. Logging of common published data writes
approximately 6,082 bytes of data (12 times the default logging level). There is a notable
difference in performance between these logging levels.
Consider the scenario where the same runbook activity is run twice, once with data logging at the
default level and once with logging of common published data enabled. The domain code should
take the same amount of time to complete. However, the platform code will take longer to run with
common published data logging enabled. Essentially, the platform code has to support logging 12
times more data with common published data enabled than it did when running at the default
logging level.
The Standard Activity Compare Values can been used to create benchmarks of an Orchestrator
environment.
152
Data Center Logging Platform Code ms/Activity Scale Factor
Configuration Run Time
(seconds)
Notice the significant decrease in platform performance caused by logging of common published
data. The worst scenario appears to be logging of common published data at Location 2. On the
surface, this appears to be a clear and relevant conclusion.
However, it should be noted that these figures reflect the overhead of the platform code, not the
domain code. Domain code runtimes can be significantly longer. For example, the Create VM
from Template activity in the Virtual Machine Manager Integration Pack may run for several
minutes as the VM is created. Expanding on the previous example, consider the platform code
costs on a runbook activity that takes 1 minute to run (1 minute = 60,000 milliseconds) regardless
of location.
153
Data Center Logging Platform Code % Domain Code % Platform Code
Configuration Run Time
(seconds)
A clearer picture begins to emerge from the data. The scenario where logging of common
published data is enabled at Location 2 continues to be the worst performer. However, the
platform code and logging only accounts for 6% of the total runtime. While this is a significant
figure, the best-case scenario is 1.4%. Essentially, the time spent in the domain code in the
example far outweighs the time spent running platform code. To put this in perspective, if you
were able to completely eliminate the platform code costs, you would only see runbook
performance improvements in the range of 1.4 to 7.4%.
Of course most real-world scenarios will be different. Activity behavior may change depending on
what the domain code is told to do. For example, a Clone VM from Template activity may take
one minute to clone a VM from Server Template A, but take 5 minutes to clone a VM from Server
Template B. Also, Runbook Servers may reside on different networks with different performance
characteristics which can potentially impact both domain code performance as well as
Orchestrator data logging performance.
To summarize:
Make careful decisions about when to log published data.
Carefully consider the impact of logging common published data. Remember that the number
of times activities run determines the volume of logged data. A runbook with a small number
of activities run many times can result in more data logging than a larger runbook run a small
number of times.
Do not enable logging of activity specific published data in production environments.
Develop an understanding of how much time your runbooks spend running domain code
compared to running platform code.
Estimate platform code costs using the techniques outlined in this document. Use as a
reference in considering where to make improvements in runbook performance.
Use the techniques outlined in this document to gain a deeper understanding of the relative
performance of your different runtime environments. Identify opportunities for improvement by
making normalized comparisons of your measurements.
154
How to Recover a Database
The Orchestrator database can be backed up and restored using most standard MS SQL Server
database backup/restore mechanisms. This includes Microsoft SQL Server Backup, DPM SQL
Server backup, and others. Orchestrator provides a VSS Writer that will discover the database
server that is associated with the Management Server and back up the database when the
Management Server is backed up.
However, there are a few key considerations when restoring.
Orchestrator Cryptography
System Center 2012 Orchestrator provides a set of services for encryption and decryption of
runbook properties and published data. These services are based on Microsoft SQL Server 2008
R2 cell-level encryption. The Orchestrator database has a database encryption key that is
created during its installation. This key is generated using a random passphrase. When a full
database backup is performed, the key is backed up with the database. Likewise, the key is
restored when the database is restored.
However, the encryption services also depend on the MS SQL Server Service Master Key. The
service master key should be backed up and stored in a secure, off-site location. Creating this
backup should be one of the first administrative actions performed on the server. The procedure
for doing this is documented for Microsoft SQL Server 2012
(http://go.microsoft.com/fwlink/?LinkId=249148).
The database key is essentially paired with the service master key on the database server
targeted by the installer. If either the database key or the service master key is lost, encrypted
data stored in the data is likewise lost. This would include the license key, either entered by the
user or an automatically created trial license.
To perform a backup
1. Back up the Microsoft SQL Server service master key using the procedure for backing up
the service master key for Microsoft SQL Server 2012. This is a one-time operation. Note
"password" is the password that will be used to protect the service master key in the file
that is created. If the password is lost, the service master key cannot be recovered from
the file.
BACKUP SERVICE MASTER KEY TO FILE = ‘path_to_file’
ENCRYPTION BY PASSWORD = ‘password’
2. Back up the entire Orchestrator database. The backup may be performed when the
system is running, but it is best to perform the backup when all runbook authors have
checked in any pending changes to their runbooks. Pending changes are cached on the
Runbook Designer and are not backed up with a database backup.
155
1. If you are restoring to the same database server from which the backup was taken, and
the service master key has not changed, simply restore the backup.
2. If you are restoring to a different database server with a different service master key, or
you are restoring to the same database from which the backup was taken but the service
master key has changed, the service master key must be restored to match the one used
during the database backup. Use the procedure for restoring the service master key for
Microsoft SQL Server 2012 (http://go.microsoft.com/fwlink/?LinkId=249149).
BACKUP SERVICE MASTER KEY TO FILE =
‘c:\temp_backups\keys\service_master_key’
ENCRYPTION BY PASSWORD = ‘3dH85Hhk003GHk2597jheij4’
Note
If there are multiple databases using this service master key for encryption on
your Microsoft SQL Server, all of these databases could be affected by this
change. Consulting with your DBA before performing this administrative task is
strongly recommended.
3. Restore the database from the backup.
4. On the Orchestrator Management Server, run the Data Store Configuration utility from
the Start menu.
5. Provide the connection details to connect to the new database. Note: Do not use
"localhost" or ".". Explicitly specify the database server name and database name.
6. Restart the Management Service.
7. Run the Data Store Configuration utility on each Runbook Server. This utility is not
located in the Start menu on Runbook Servers. It can be found in
<SC2012OrchestratorInstallDir>\Microsoft System Center 2012\Orchestrator\Runbook
Server. Note: For Runbook Servers installed on the same server as the Management
Server one doesn't need to run the Data Store Configuration utility a second time.
Running it once will update the configuration for both the Management Server and
Runbook Server at the same time.
8. Restart the Runbook Server(s).
9. Follow the Web Components Recovery Process to update the Web Components to
connect to the new database.
156
Because the Runbook Designer communicates with the Orchestrator database (through the
management server), poor database performance will impede that communication.
The Orchestrator operator experience is based on two components: The Orchestration Console
and the Web Service. The Orchestration Console is a Silverlight-based application that
depends on the Web Service for its connection to the Orchestrator database. The Web Service is
an IIS application that connects to the database. Consequently, the Web Service and
Orchestration Console are both dependent on the performance of the Orchestrator database.
Additionally, while the Orchestration Console is dependent on the Web Service, it also has logic
unique to its function as a user interface and its own performance characteristics.
Key Concepts
Configuration Data and Log Data
At a high level the Orchestrator database contains two kinds of data:
Configuration Data
The Orchestrator infrastructure contains configuration data. This data is not a concern in the
context of database growth because the storage requirements for this type of data are small.
Log Data
Orchestrator creates different types of log data, all of which can be viewed and managed in
the Runbook Designer. The storage requirements for this data can vary in size and be large.
The following table lists the types of log data that can be stored in the Orchestrator database.
Orchestrator also stores data in separate log files (outside of the database) for audit trails and
tracing. For more information about all the types of log data, see Orchestrator Logs.
157
Runs a variety of tasks that are specific for the actions for each activity, that are typically not
associated with the Orchestrator platform itself. Potentially, there can be great variation
between platform code and domain code.
The logging data generated for a given activity can contain data elements that are single or
multi-valued. Every activity produces a single record of single-value data. Domain code can
produce multiple records of multi-value data and is therefore responsible for determining what
the activity does with the common published data it has received from prior activities.
Essentially, Orchestrator runbooks are designed to pass data between discrete elements of
domain code. Also, domain code can optionally generate Activity-specific Published Data.
All runbooks have core similarity in that they run activities that consist of domain code and
platform code, they loop workflows and they branch. Branching is when a runbook calls other
runbooks to do a specific task. When a runbook is first invoked it consists of a single thread.
When this thread encounters a runbook activity whose links require a branch, additional threads
are created, one for each branch. Each thread takes as input the common published data from
the activity that created the branch. This data is correlated back to the prior activities in the
runbook to update the common published data that the activities subscribe to.
Domain code potentially affects database performance more than multi-threading generated by
branching. This is because domain code can potentially generate large amounts of activity-
specific published data.
Logging Options
The Logging tab on the Properties for a runbook allows you to optionally store logging entries.
The term default logging refers to having neither of the two published data options selected,
which amounts to 524 bytes generated for each activity. The logging options provide for two
categories of common published data:
Common Published Data
The set of data items common to all activities. For a list, see the Runbook Log Options
section in Runbook logs.
This logging option generates 6082 bytes for each activity.
Activity-specific Published Data
The set of data that is specific to the activity that is optionally created by domain code.
This logging option generates 6082 bytes in addition to the bytes logged by specific activities.
Tip
This option is selected primarily for debugging purposes. Leave unchecked to limit
logging growth.
Setting logging options can significantly affect performance and increase database growth.
Consider the scenario where the same runbook activity is run twice, first with data logging at the
default level (no published data options selected) and then set with common published data
selected. The domain code should take the same amount of time to complete. However, the
158
platform code will take longer to run because it has to support 12 times the amount of common
published data logging than it does with just default logging.
Purging Logs
The default options specified for the Log Purge feature in the Runbook Designer is configured
to provide the best user experience for an out-of-the-box Orchestrator deployment. Changing
these values can change the performance characteristics of the environment, and should be
implemented gradually and high-watermarked, so that the impact of the change can be
evaluated.
For more information on automatic and manual purging of logs, see the Purging Runbook Logs
section of Runbook logs.
159
This runbook can be used to experiment with different configurations of Orchestrator. For
example, you can create the benchmark runbooks to determine the performance of four Runbook
Servers deployed to different data centers.
Data Center Logging Platform Code Run Milliseconds per Scale Factor
Configuration Time (milliseconds) Activity
Notice the significant decrease in platform performance caused by logging of common published
data. The worst scenario appears to be logging of common published data at Location 2. On the
surface, this appears to be a clear and relevant conclusion.
However, it should be noted that these figures reflect the overhead of the platform code, not the
domain code. Domain code runtimes can be significantly longer. For example, the Create VM
from Template activity in the Virtual Machine Manager Integration Pack may run for several
minutes as the VM is created. Expanding on the previous example, consider the platform code
costs on a runbook activity that takes 1 minute to run (1 minute = 60,000 milliseconds) regardless
of location.
Data Center Logging Platform Code Run % Domain Code % Platform Code
Configuration Time (milliseconds)
160
Data Center Logging Platform Code Run % Domain Code % Platform Code
Configuration Time (milliseconds)
published data
A clearer picture begins to emerge from the data. The scenario where logging of common
published data is enabled at Location 2 continues to be the worst performer. However, the
platform code and logging only accounts for 6% of the total runtime. While this is a significant
figure, the best-case scenario is 1.4%. Essentially, the time spent in the domain code in the
example far outweighs the time spent running platform code. To put this in perspective, if you
were able to completely eliminate the platform code costs, you would only see runbook
performance improvements in the range of 1.4 to 7.4%.
Of course most real-world scenarios will be different. Activity behavior may change depending on
what the domain code is told to do. For example, a Clone VM from Template activity may take
one minute to clone a VM from Server Template A, but take 5 minutes to clone a VM from Server
Template B. Also, Runbook Servers may reside on different networks with different performance
characteristics which can potentially impact both domain code performance as well as
Orchestrator data logging performance.
Default 1 1 Yes
Examples
Example 1
The following table describes the database sizing considerations for a deployment of
Orchestrator.
Runbook 2 25 Default 50
Using the database sizing described above, you can estimate the storage requirements for the
runbooks.
162
Runbook Bytes per Storage in MB Invocations per Storage in % of DB
Name Invocation Default Log Month MB storage after
Purge (500 One Month 30 Days
invocations) (Not Default
Log Purge)
This example clearly illustrates the importance of making sound decisions for data logging.
Runbook 4 contains only eight activities, but when configured at the Common Published Data
Logging level, it consumes most of storage in the database because of the high frequency of
invocation. Based on these results you may prefer to reduce the logging level of Runbook 4 to the
Default logging configuration.
Example 2
The following table describes the database sizing considerations for another deployment of
Orchestrator.
Runbook 2 25 Default 50
Recalculating the storage figures for the updated configuration produces significantly different
results.
163
Runbook Bytes per Storage in MB Invocations per Storage in % of DB
Name Invocation Default Log Month MB storage after
Purge (500 One Month 30 Days
invocations) (Not Default
Log Purge)
While there is very little change in the default logging configuration (500 log entries per runbook),
the 30-day storage requirements have changed greatly. Clearly the storage cost of using
Common Published Data logging for Runbook 4 should be carefully considered since this change
results in a 76% reduction in database storage requirements for 30 days of data.
Summary
Use the following guidelines to manage database sizing and performance:
Enable logging of Common Published Data only if needed.
Remember that the number of times activities run determines the volume of logged data. A
small runbook with a few of activities run several times can result in more data logging than a
larger runbook run a fewer number of times.
Do not enable logging of Activity-specific Published Data in production environments, and
should only be used for debugging purposes.
Develop an understanding of how much time your runbooks spend running domain code
compared to running platform code.
Estimate platform code costs using the techniques outlined in this document. Use as a
reference in considering where to make improvements in runbook performance.
Identify opportunities for improvement by making normalized comparisons of your
measurements.
See Also
Orchestrator Logs
Runbook logs
Orchestrator Architecture
164
How to Recover Web Components
The Web Service database reference does not get modified by the Database Configuration Utility
(only the installer performs this task). You will need to manually modify it.
167
Overview of Orchestration Console
The Orchestration console is comprised of a single webpage with multiple panes that are
described in the following sections.
Navigation pane
The navigation pane is the left pane in the Orchestration console where you can click the
workspace that you want to use. Depending on the workspace you click, you can view specific
data and use specific options. The following workspaces are available in the navigation pane.
Runbooks workspace
The Runbooks workspace lets you start and stop runbooks. You can also view information such
as the jobs and instances created for each runbook and their definition.
Summary
The Summary tab is displayed for any folder or runbook selected in the Runbooks workspace.
This tab displays summary information for the jobs and instances of the selected runbook or for
all of the runbooks in the selected folder. The statistics that are displayed are updated every 10
minutes so that activity performed within that time might not be reflected in the numbers until they
are updated.
Each column in the Summary displays the number of jobs and instances that finished with a
particular status (Succeeded, Warning, or Failed) within the last hour, the last day, and the last
week. For instances, the number of instances that are currently in progress are also displayed.
For jobs, the number of jobs that have been created and that are currently queued are also
displayed.
Runbooks
The Runbooks tab is displayed when you select a folder in the Runbooks workspace. It lists the
runbooks contained in the selected folder and specifies the status of any running jobs and
instances from each. To select one of these runbooks and control their actions, click an option in
the Actions pane. If you have a large number of runbooks, you can refine the list by specifying a
filter.
Jobs
The Jobs tab is displayed when you select a folder or runbook in the Runbooks workspace. This
tab lists the jobs created for a given runbook and the completion status. For a folder, it lists the
jobs created for all runbooks in the folder and their completion status. A job is a request for a
runbook server to run a runbook and is created every time a runbook receives a request to run. If
a runbook starts with a monitor, it creates a job that runs continuously until the runbook is
168
stopped. In this case, the status of the job shows an hourglass that indicates it is currently
running.
Instances
The Instances tab is displayed when if you select a folder or runbook in the Runbooks
workspace. For a runbook, this tab lists the instances that have been created for the runbook and
their completion status. For a folder, it lists the instances that have been created for all runbooks
in the folder and their completion status. An instance is a running copy of a runbook and is
created each time that a runbook runs. If a runbook starts with a monitor, it creates an instance
that continues to run until the monitor condition is met. In this case, the status for the instance
shows an hourglass. When the monitor condition is met, the instance continues with the
subsequent activities and then shows a completion status. The runbook then creates a new
instance that also runs until the monitor condition is met.
Jobs
The Jobs tab lists the jobs that have been run on the runbook server and their completion status.
A job is a request for a runbook server to run a runbook and is created every time a runbook
receives a request to run. If a runbook starts with a monitor, it creates a job that runs continuously
until the runbook is stopped. In this case, the status of the job shows an hourglass, which means
that it is currently running.
Instances
The Instances tab lists the instances that have been created on the runbook server and their
completion status. An instance is a running copy of a runbook and is created each time that a
runbook runs. If a runbook starts with a monitor, it creates an instance that continues to run until
the monitor condition is met. In this case, the status for the instance shows an hourglass. When
the monitor condition is met, the instance continues with the subsequent activities, and then
shows a completion status. The runbook then creates a new instance that also runs until the
monitor condition is met.
Events workspace
The Events workspace lets you view log events. By default, log events include all events for the
management server and all runbook servers. To limit the events, click Filter and provide criteria
to limit the events displayed. If an event is specific to a runbook server, it includes the name of
the server in the Source box. In this case, you can select the event, and then click View
169
Runbook Server in the Actions pane. Clicking View Runbook Server opens the Jobs tab in the
Runbook Servers workspace for that runbook server.
Stopping jobs
A job is a request for a runbook to run. A job is created only when you request a runbook to run. If
the first action in a runbook is a monitor, the job runs continuously until the runbook or job is
stopped. An hourglass indicates the status of a running job. An instance is a running copy of a
runbook.
You cannot start a job; you can only start a runbook.
When you view an instance, you can choose to stop the associated job. Stopping the job stops
the instance, the job, any other associated instances, and the runbook.
See Also
Orchestration Console Browser Requirements
How to Start the Orchestration Console
How to Work With Runbooks in the Orchestration Console
170
Authentication
The Orchestration console requires authentication by using your domain credentials so that it can
identify the runbooks and folders that you should have permission to access. If your browser is
configured for automatic logon, you are not prompted for a name and password. Your browser
supplies this information automatically each time you connect to the Orchestration console. If you
are using a browser that does not support automatic logon or if your browser is configured to not
perform automatic logon, you are prompted for a name and password each time that you connect
to the Orchestration console. You can continue to type your name and password each time, or
you can configure your browser to perform automatic logon.
Note
If the Require server verification (https:) for all sites in this zone is selected,
you have to specify https for the address, and your web server has to be
configured to support Secure Sockets Layer (SSL).
7. Click OK for this and the remaining dialog boxes.
See Also
Overview of Orchestration Console
How to Start the Orchestration Console
How to Work With Runbooks in the Orchestration Console
171
To start the Orchestration console in a browser
1. Open your browser.
2. In the address bar, type http://<computer name>:<port number> where computer
name is the name of the server where the web service is installed, and port is the port
number selected during configuration of the web service. By default, the port is 82.
Note
If the URL has not been set for the Orchestration console, you will receive an
error message. Use the following procedure to set the URL.
See Also
Overview of Orchestration Console
Orchestration Console Browser Requirements
How to Work With Runbooks in the Orchestration Console
172
Click the Value column for each runbook and type a value for the runbook to use.
6. If you want to run the runbook on a server other than its default, click a server in the
Available Runbook Server(s) pane, and then click the right arrow to add the server to
the Selected Runbook Server(s) pane.
Note
If you add multiple servers to the Selected Runbook Server(s) pane, the
runbook runs only on the first server if it is available. The other servers are
backup servers where the runbook runs only if the primary server is not available.
7. Click Start.
See Also
Overview of Orchestration Console
Orchestration Console Browser Requirements
Orchestration Console Browser Requirements
173
Using Runbooks in System Center 2012 -
Orchestrator
Welcome to the System Center 2012 - Orchestrator Runbook Guide. This document describes
Orchestrator runbooks. This document provides information about the tools available in
Orchestrator and guidance on how to automate tasks and processes for your IT environment.
Topics include how to write, test, and deploy a runbook with System Center 2012 - Orchestrator.
For more information on building custom solutions with Orchestrator in System Center 2012, see
System Center 2012 Integration Guide - Orchestrator.
Orchestrator Runbooks
Runbook Concepts
Provides basic information and terminology for runbooks, activities, and workflows.
Tools
Describes tools to build and start runbooks.
Design and Build Runbooks
Describes how to design and create a runbook.
Deploy and Start Runbooks
Describes how to deploy runbooks to your Orchestrator environment.
Runbook Samples
Provides samples and step-by-step guidance on how to build a runbook.
Runbook Concepts
The power of System Center 2012 - Orchestrator lies in providing runbooks and the individual
activities that make up a runbook. Runbooks contain the instructions for an automated task or
process. The individual steps throughout a runbook are called activities. Within the runbook,
174
additional controls provide information and instructions to control the sequence of activities in the
runbook. Runbooks, activities, and each runbook control have configurable properties. You
modify these properties to configure the behavior that your runbook requires.
The topics in this section provide detailed information about the attributes and features related to
runbooks.
Runbook Concepts
Runbooks
Provides configuration information for runbooks.
Activities
Describes categories of activities and their attributes.
Workflow Control
Describes tools to manage a runbook.
Runbooks
Runbooks let you use a wide range of customization options. This section provides details for all
properties and permission settings for runbooks.
Runbook Attributes
Runbook Properties
Provides configuration information for individual runbooks.
Runbook Permissions
Describes access rights and permissions for single and multiple runbooks.
175
Runbook Concepts
Activities
Workflow Control
Runbook Properties
A runbook is essentially a series of activities that are using data, performing tasks, and publishing
data for use by other activities in the runbook. Each runbook has a collection of configurable
properties. These properties let you customize the behavior of a runbook.
General
On the General tab of the Runbook Properties dialog box, you can customize a name and
description for the runbook. You can also associate a schedule with the runbook. After you
assigned a schedule to the runbook, the runbook only runs on the dates and times that you
specified in the schedule.
To create a schedule
1. In the Runbook Designer, in the Connections pane, expand the Global Settings folder.
2. Right-click the Schedules folder to select New to selectSchedule.
3. On the General tab of the New Schedule dialog box, in the Name box, enter a name for
the schedule.
4. On the Details tab of the New Schedule dialog box, select the date and time to start the
runbook.
176
Third, Fourth, and Last.
5. On the Exceptions tab of the New Schedule dialog box, add any date exceptions for the
runbook, and then click OK.
6. Click Finish.
Important
The scheduled date and time to start a runbook is based on the system clock of the
runbook server. This enables schedules to function in virtual machine environments and
to continue to run even when the system clock adjusts for daylight savings time.
Runbook Servers
This tab displays the list of runbook servers assigned to run this runbook. If the list is empty, the
runbook uses the setting defined in the Runbook Servers folder found in the Connections pane
177
of the Runbook Designer. If the runbook server that uses the Primary role is available, the
runbook runs on it. If the primary runbook server is not available, each runbook server that uses a
Standby role is checked until one is found that can run the runbook.
You can override the default behavior and assign a primary and any number of standby runbook
servers to a runbook. It is useful to assign a specific runbook server to a runbook if the runbook
requires access to a specialized resource, such as a backup device.
Logging
This feature controls what data is logged to the orchestration database. If stored in the
orchestration database, this data is visible in views such as the Log pane in the Runbook
Designer and in the Orchestration console. This information does not affect the availability of
Published Data in a running runbook.
Published Data includes data specific to each activity. For detailed information about the
Published Data available in each standard activity, see the Runbook Activity Reference for
System Center 2012 - Orchestrator. For detailed information about published data available in
integration packs, see System Center Orchestrator 2012 Integration Packs.
Common Published Data is a set of data items that are common to all activities. These items are
as follows:
Activity Name
Activity Type
Activity ID
Activity End Time Year, Month, Day, Weekday, Hours, Minutes, Seconds
Activity Duration
Previous Activity
Previous Activity Name
Caution
When you turn on logging, the size of the orchestration database increases.
178
Event Notifications
You can enable event notification for the runbook. Notifications appear in views such as the Log
pane in the Runbook Designer and in the Orchestration console.
If you want to be notified when a runbook runs for more than a specified length of time, enter a
value in the seconds box.
If you want to be notified if the runbook does not run, click the Runbook fails to run option.
For more information about Event Notifications, see Orchestrator Logs.
Job Concurrency
The job concurrency setting lets you set the maximum number of simultaneous jobs, so that you
can carry out multiple requests for the same runbook at the same time. This setting applies to the
individual runbook. A runbook server can run 50 runbooks at the same time. If you select a job
concurrency setting over 50, your environment requires more runbook servers or the requests to
start a runbook will queue.
The following limitations apply:
You cannot run simultaneous requests for runbooks that start with Monitoring activities. If you
try to change the maximum number of simultaneous requests for these runbooks, the
Runbook Designer resets the Maximum number of simultaneous jobs value to 1 and
displays an error message.
A runbook server runs simultaneous requests for runbooks up to the maximum processing
limit. To change the maximum processing limit, see How to Configure Runbook Throttling.
Do not create simultaneous requests for runbooks that contain Modify Counter activities.
When you run different copies of the same runbook at the same time that modify (set, reset,
increment, or decrement), a Counter can cause the Counter value to become unreliable. You
can read the value of Counters in runbooks that run at the same time.
Do not run simultaneous requests for runbooks that interact with a non-Microsoft product,
such as a ticketing or system-monitoring tool, unless you have a good understanding of how
the tool handles parallel processing. If the non-Microsoft application cannot handle parallel
processing, or if you do not know, leave the maximum number of simultaneous requests at a
value of 1.
Plan the use of multiple requests carefully. Before you change the maximum number of
simultaneous runbook requests, consider the tasks performed by the runbook. Verify that
each runbook instance can finish successfully. For example, if your runbook creates a folder,
copies files into it, and then deletes the folder when it is finished, one instance of the runbook
might delete the folder before other instances are finished with it. In this case, you should
keep the maximum number of simultaneous requests for this runbook a value of 1 to avoid
conflicts.
179
Returned Data
Returned Data defines the data that a runbook returns when it finishes. Each Returned Data
definition can contain either a single or multiple parameter values. To populate the data
definitions, end the workflow with a Return Data activity that contains the return values.
You access the Returned Data values through Published Data in one of several ways.
Invoke the runbook from another runbook by using the Invoke Runbook activity. The parent
runbook can access the child runbook’s Returned Data as Published Data from the Invoke
Runbook activity.
View the Published Data from the Runbook Designer or Orchestration console.
Use the Orchestrator web service to return the Published Data programmatically.
For more information about the standard activities Invoke Runbook, Initialize Data, and Return
Data, see the Runbook Activity Reference for System Center 2012 - Orchestrator.
To define the Returned Data for a runbook to return, use Add, Edit, and Remove to create each
parameter.
See Also
Runbook Activity Reference for System Center 2012 - Orchestrator
Orchestrator Logs
Runbook Permissions
Runbook access permissions are set through the Runbook Designer. By default, only users in the
Orchestrator Users Group have full access to a runbook. You give access to additional users to
run, start, stop, view, and change runbooks at either the folder level or the individual runbook
level.
180
5. To close the Permissions for Runbook dialog box and save any changes, click OK.
See Also
Runbook Concepts
Activities
In System Center 2012 - Orchestrator, activities are the building blocks of runbooks. In general,
individual activities perform three actions:
Access Published Data
Perform some action
Publish new data
All activities, regardless of origin or type, share common behaviors. This section describes the
types of activities available in Orchestrator and their common behaviors.
Activities
Standard Activities
Describes standard activities available in Orchestrator.
Monitoring Activities
Describes specialized activities that monitor environment states and event logs.
Customized Activities
Describes customization options available in Orchestrator.
Common Activity Properties
Describes configurable properties common to all activities.
181
Standard Activities
An installation of System Center 2012 - Orchestrator includes a set of standard activities. Using
these activities, you can create powerful workflows to automate tasks and processes.
For detailed reference information about each standard activity, see Standard Activities in
theRunbook Activity Reference for System Center 2012 - Orchestrator.
Standard activities are organized into categories to help you locate the appropriate activity for the
task that you want to perform. The following table shows the categories for standard activities.
See Also
Activities
Monitoring Activities
Monitoring activities are a specialized group of activities that are triggered by a state or event of a
task outside of a runbook. For example, a monitor can wait for a particular event to occur in an
event log, check the IP status of a certain computer, or run repeatedly on a predefined schedule.
An Orchestrator activity cannot trigger a monitoring activity. A monitoring activity is a start
condition within a runbook. The Monitor Folder activity waits for the files within a specified folder
182
to change. When a file changes, the Monitor Folder activity triggers the next activity in the
runbook workflow.
Runbooks that start with a monitoring activity load the monitoring activity and wait for the trigger
condition to occur. When the monitor activity detects the trigger condition, a runbook instance is
created to run the remaining activities. The monitor continues to run and waits for the trigger
event to reoccur. Runbooks that start with monitors continue to run until you stop them from the
Runbook Designer or the Orchestration console.
For a list of standard monitoring activities, see Monitoring in the Runbook Activity Reference for
System Center 2012 - Orchestrator.
See Also
Monitoring
Runbook Activity Reference for System Center 2012 - Orchestrator
Customized Activities
System Center 2012 - Orchestrator provides two options for extending standard activities.
Integration packs (IP) are Microsoft and products of other companies that contain additional
activities specific to a product or technology. For more information about the currently available
IPs, see System Center Orchestrator 2012 Integration Packs on Microsoft TechNet. If the
functionality that you require is not available in an IP, you have the alternative option of using the
Orchestrator Integration Toolkit. This toolkit lets you build an activity to meet your requirements.
For more information about the Orchestrator Integration Toolkit, see System Center 2012 –
Orchestrator SDK in the MSDN Library.
See Also
Activities
Details
This tab contains various properties specific to an activity. Many activities require you to at least
enter a computer name, IP address, file name, file path, or file folder location. Details on these
183
options are provided for each activity in the Runbook Activity Reference for System Center 2012 -
Orchestrator.
Run Behavior
This tab contains the properties that determine how the activity handles multi-value Published
Data. It also defines the notifications created if the activity fails or runs for an excessive period.
Note
The Flatten feature does not flatten data across multiple instances of the same activity. It
only flattens multiple values returned from a single instance of the activity.
Separate with line breaks Each item is on a separate line. This is the
format for the output text files.
Event Notifications
Some activities are expected to take a limited amount of time to finish. If the activity does not
finish within the specified period, the activity can be stalled or another issue prevents the activity
from finishing. You can define the number of seconds to wait for completion of the activity, after
which a platform event is sent to report the delay in completion. You can also choose whether to
generate a platform event if the activity returns a failure. For more information about event
notifications, see Orchestrator Logs.
Report when the activity runs for more than Enter the number of seconds of run time to
elapse before generating a notification.
Report if the activity fails to run Select this option to generate a run failure
184
Event notification setting Description
notification.
Security Credentials
The settings on the Security Credentials tab let you specify the account that runs the Runbook
Server Service. This is useful when the activity performs activities with resources on a remote
computer.
Important
Note that the account used to start the runbook must have permission on the local
computer to run successfully.
Important
If you use the Invoke Runbook activity and you modify Security Credentials, the account
you use must be a member of the Orchestrator System group to run successfully.
Caution
If permissions on the Orchestrator installation path are changed and the activity’s
Security Credentials has a custom user account that does not include Read/Execute
permissions to ExecutionData.dll on the runbook server, the activity will fail.
Option Behavior
Use the security of the account assigned to the Select this option to run the activity with the
service account used by the runbook server. For more
information, see Orchestrator Security
Planning.
See Also
Orchestrator Security Planning
Runbook Activity Reference for System Center 2012 - Orchestrator
185
Workflow Control
When you build runbooks in System Center 2012 - Orchestrator, it is important to understand the
underlying logic of the workflow engine. By using this logic, you can create workflows to automate
resource-based jobs and complex data processing tasks.
Workflow Control
The workflow control provides the following controls.
Starting Point
Smart Links
Embedded Loops
Starting Point
A runbook can only have one starting point. A starting point is an activity that automatically runs
when the runbook is started. Each activity in the runbook runs after the previous activity in the
workflow is completed.
If a runbook starts with any activity other than a monitor activity, the runbook begins processing
and attempts to run to completion. If the runbook starts with a monitoring activity, the monitor
loads and waits for the trigger condition. When the condition is met, a runbook instance is created
to run the remaining activities in the runbook. The monitor continues to run and waits for another
occurrence of the trigger condition. Runbooks that start with monitors continue to run until you
stop them from the Runbook Designer or Orchestration console.
See Also
Monitoring Activities
186
Smart Links
The links that connect individual activities in a runbook are called smart links. Smart links in
System Center 2012 - Orchestrator support precedence between two activities. Smart links
invoke the next activity in the runbook as soon as the previous activity finishes successfully.
Smart links also provide filtering capabilities for the data so you can limit the data passed to
subsequent activities in the workflow.
General Tab
In the Link Properties dialog box, on the General tab, you can add Name and Description
values to the smart link. These properties are not required, but are useful in identifying the
purpose of the smart link. These properties are not displayed unless you configure the runbook
option to show link labels.
187
To display smart link names in the runbook
1. On the Runbook Designer menu, click Options, and then click Configure to open the
Configuration dialog box.
2. Select Show link labels.
3. Click Finish.
Important
The rules of the smart link Exclude tab supersede the rules on the smart link Include
tab.
Important
The rules on each tab are joined by using an or condition. Only one of the conditions
defined on a tab must be true for the condition to be true.
Use the following procedure to add or remove a condition to a smart link.
Important
To change the values that make up the rule, you have to select each underlined
portion of the smart link condition.
2. Click the listed activity in the condition to open the Published Data dialog box.
3. Select the Show common Returned Data box to display properties that are common to
all activities.
4. Select a property from the Published Data and click OK. The criteria expression is
changed depending on the type of data that the property returns.
5. To change the different parts of the expression, select the underlined text, and then either
select or type in an appropriate value. For more information about criteria, see Smart Link
Criteria.
6. Click Finish.
188
To remove a smart link condition
1. In the Link Properties dialog box, click either the Include tab or Exclude tab.
2. To select the condition that you want to remove, click to the right of the link condition on
the word or, and then click Remove.
3. Click Finish.
Options Tab
In the Link Properties dialog box, on the Options tab, you can specify different link colors on
your branches to make them easier to read. For example, you can select green for the Pass
branch and red for the Fail branch to identify the difference logic paths.
On this tab, you can also specify a delay before the activity runs.
Use the following procedure to configure these settings.
189
Each time you create a new link, it creates a default criteria specifying that the activity’s
completion status must return success. If you want the next activity to run regardless of whether
the first activity successfully finished, you should delete or change criteria.
Binary Values
Some properties return a value of true or false. You can set a criteria of equals or does not
equal, and the value prompts you for the two possible values.
Text Values
Certain published data properties return text that you can compare to an expected value or
pattern. The following table shows the different criteria that can be used.
Condition Description
does not contain The specified text does not appear somewhere
in the value of the Published Data item.
ends with The value of the Published Data item ends with
the specified text.
does not match pattern The value of the Published Data item matches
the specific regular expression.
does not equal The value of the Published Data item does not
match the specified text.
Note
Text values are not case-sensitive.
Important
The regular expression criteria have a slightly different behavior than other regular
expressions when using the ^ character specifying the starting position in the text and the
$ character specifying the ending position in the text. You must specify a wildcard in
190
addition to these operators. For example, with the string “This is some sample text”, text$
returns a false, but .*text$ returns true. Similarly, ^This returns false, but ^This.* returns
true.
Numeric Values
Certain published data properties return numeric data that you can compare to an expected
value. The following table shows the different criteria that can be used.
Condition Description
does not equal The value of the Published Data item does not
equal the specified value.
is less than or equal to The value of the Published Data item is less
than or equal to the specified value.
is greater than or equal to The value of the Published Data item is greater
than or equal to the specified value.
See Also
Workflow Control
Embedded Loops
In System Center 2012 - Orchestrator, looping can be configured for any runbook. By using
loops, you can build automatic retries and monitor at any location in a runbook.
Each activity can create a loop so that you can retry operations if they fail or test the output
information of the activity for valid data. You can also use these mechanisms to build wait
conditions into your workflows.
191
When a loop is configured for an activity, it continues to run with the same input data until a
desired exit looping criteria is reached. The exit criteria is built in a similar way as smart link
configurations. You can use any published data item from the activity as part of the exit or do not
exit configuration. Included in the common published data are special data items such as Loop:
Number of attempts and Loop: Total duration that let you use information from the loop itself in
the looping conditions.
Loops run one time for each incoming piece of data that is passed to the activity. For example,
consider a runbook that uses a Query Database activity followed by Append Line. If the Query
Database activity returned three rows, the Append Line activity would run three times. If you
have a loop on the Append Line activity, it would run three separate loops. After the first data
item has looped through the Append Line activity, the next item goes through Append Line and
loops until it exits, and then the third begins. After all three items have been processed, the next
activity in the runbook runs.
Configuring Looping
Use the following procedure to configure looping.
To configure looping
1. Right-click an activity in the runbook to select Looping. The Looping Properties dialog
box opens.
2. On the General tab, click Enable.
3. In the Delay between attempts box, type the number of seconds to pause between each
attempt to run the activity.
Important
The rules on the Do Not Exit tab supersede the rules on the Exit tab.
The rules within each tab are joined by using an Or condition. Only one of the conditions on a tab
must be true for the entire tab to be true.
Use the following procedure to add or remove an Exit condition.
Important
To change the values that make up the rule, you have to select each underlined
192
portion of the link condition.
2. Click the listed activity in the condition to open the Published Data dialog box.
3. Check the Show common Returned Data box to display properties that are common to
all activities.
4. Select a property from the published data, and then click OK. The criteria expression is
changed depending on the type of data that the property returns.
5. To change the different parts of the expression, select the underlined text and either
select or type in an appropriate value. For more information about criteria, see Smart
Link Criteria.
6. Click Finish.
See Also
Workflow Control
Tools
To create and test a runbook in System Center 2012 - Orchestrator, use the Runbook Designer
and the Runbook Tester.
Runbook Designer
Create, manage, and run runbooks.
Runbook Tester
Step through a runbook to test its functionality.
193
Runbook Designer
The Runbook Designer is the tool that you use to create, manage, and run runbooks in
System Center 2012 - Orchestrator. The Runbook Designer is intended for users who must
create or modify runbooks. Users who only have to run runbooks and view their status should use
the Orchestration console which is documented in the Using the Orchestration Console in System
Center 2012 - Orchestrator.
Pane Description
194
File Management, Monitoring, Notification, Scheduling, System, Text File Management, and
Tools.
Use the following steps to sort activities by their activity name and category name.
Changing Icons
You can change the default size of each activity icon from small to large.
Use the following steps to change the icon size.
See Also
Tools
Runbook Tester
Runbook Tester lets you test runbooks in a debugging environment. You can run an entire
runbook, step through it one activity at a time, or add breakpoints to stop the simulation at any
activity you select. You start Runbook Tester from the toolbar above the central Design
workspace in the Runbook Designer. When you click the Runbook Tester button, the Runbook
Tester starts and loads the current runbook. The button is only enabled if the runbook is not
currently running. You must stop the runbook before you can test it.
Important
Runbook Tester actually performs each activity within the workflow. The steps are not
performed in a simulated or virtualized environment. All the connections referenced in the
runbook are live and fully functional, so any activities that modify or destroy data in
connected systems cause that data to be modified or destroyed. For example, if you use
195
the Query Database activity to DROP TABLE ImportantTable, it actually deletes the
ImportantTable from the instance of Microsoft SQL Server.
Important
Note that the account used to start the runbook must have permission on the local
computer to run successfully. These permission requirements also apply when testing the
runbook with the Runbook Tester. To successfully test your runbook, start the Runbook
Designer as Administrator. By association, the Runbook Tester runs as Administrator
and uses the higher-level security token.
Pane Description
Note
You cannot edit the information that
appears in the Design Time
Properties pane.
196
Pane Description
See Also
Tools
Runbooks
Designing a Runbook
Provides design guidance for building runbooks.
Building a Runbook
Describes how to create a runbook, how to add and link activities, and how to configure
runbook properties.
How to Test a Runbook
Describes how to test a runbook.
Designing a Runbook
When you plan a new runbook, you should start with a defined process that you want to
automate. This process determines your choice of runbook activities. Specifically, determine the
following:
197
When and how often is the runbook going to run?
What steps make up the workflow?
What activities reflect the steps in my workflow?
What type of data is required to begin the workflow?
What data are generated from each activity?
What results are produced at the end of the workflow?
How are the runbook results reported?
Consider the following points as you design your runbook:
1. Failure and Warning links - It is important to handle all results from an activity. An activity
provides a default success string, but does not provide a default failure case. Consider if you
should reverse an activity or write the result to a log file.
2. Replace the default strings - When you look at the workflow in a runbook, the labels should
identify what the individual activities are doing. Rename links and activities labels to a
descriptive name.
3. Link colors - Change the color of your links when there is a condition or branch. It is common
to use GREEN as success and RED for warning or failed. You should use standard
associations, but not use too many colors or you lose their descriptive purpose.
4. Limit the number of activities per runbook - Too many activities in a single runbook make it
difficult to administer and troubleshoot. Consider splitting a runbook into several subtasks and
create child runbooks for each of those subtasks. You can invoke the child runbooks from a
parent runbook. You can reuse these child runbooks in other workflows.
5. Runbook logs - By default, logging options are disabled for runbooks. When you
enable logging, the data significantly increases the size of your database. As an alternative,
you can log to an external system or file.
See Also
Design and Build Runbooks
Building a Runbook
This topic describes the basic process for building a System Center 2012 - Orchestrator runbook.
Note
For a list of topics that contain more details about the information covered here, see
Runbook data processing.
Step Description
198
Step Description
5. Check in the runbook. Save your changes and check in the runbook.
Note
For information about specific properties of standard activities, see the Runbook
Activity Reference for System Center 2012 - Orchestrator.
Note
For information about the properties of links, see the Runbook Activity Reference
for System Center 2012 - Orchestrator.
199
To define the properties of a runbook
1. Right-click the Runbook tab to select Properties. The Runbook Properties dialog box
opens.
2. Configure the settings on the General tab. The following tables provide the configuration
instructions.
3. Click Finish to save your settings.
Data Manipulation
With System Center 2012 - Orchestrator, you can manipulate string data from text files, returned
data, or other sources, and convert it into a usable form. You can also perform simple arithmetic
operations, such as calculating sums and differences, and performing division and multiplication
operations. For example, you can extract text from a text file by using a Text File Management
activity, trim leading and trailing spaces from the text, and then retrieve specific parts of the text
that you can pass to other activities as returned data items.
Data Manipulation
Computer Groups
Counters
Functions
Regular Expressions
Schedules
Variables
200
Other resources for this product
TechNet Library main page for System Center Orchestrator 2012
Using Runbooks in System Center 2012 - Orchestrator
Building a Runbook
Published Data
Computer Groups
System Center 2012 - Orchestrator is designed to interact with all of your data center systems.
Computer groups let you target selected activities against a set of similar computer systems
instead of a single computer. By configuring the activities in your runbook to use a computer
group, you have the flexibility to add computers dynamically by adding them to the computer
group.
You can create computer groups by using Active Directory queries, and you can manage the list
of computers in a group outside of Orchestrator. For example, if you have a computer group that
is created from an Active Directory query that retrieves all instances of Microsoft SQL Server,
when an instance of SQL Server is added to your Active Directory system, it is automatically
included in that group.
To create a folder
1. In the Connections pane in the Runbook Designer, click the Computer Groups folder or
a subfolder.
2. Right-click to select New, and then click Folder.
Use the following procedure to add a computer group. To add computers by using an Active
Directory query or a System Center 2012 Configuration Manager collection, use the Active
Directory Integration Pack or the Integration Pack for System Center 2012 Configuration
Manager.
201
Description boxes, type a name and description of the computer group.
4. Click the Contents tab. The list displays all the computer entries that make up this
computer group.
5. Click Add to open the Add Computer to Computer Group dialog box.
6. Enter the name of the computer that you are adding, or click the ellipsis (…) button next
to the Computer box, and then select the applicable computer. Click OK to add the
computer.
7. To add more computers to the group. repeat the previous two steps.
To modify settings
1. To modify the settings of an entry you added, click the entry on the Contents tab, and
then click Modify.
2. To remove an entry on the Contents tab, click the entry, and then click Remove.
See Also
Data Manipulation
Counters
When building runbooks in System Center 2012 - Orchestrator, you might find that there are
values that must be incremented, such as keeping track of the number of backup attempts that a
202
runbook made. Counters let you modify and check the status of a number that you can use to
keep track of important statistics. You create a counter in the Connections pane in the Runbook
Designer, and then get and modify it by using the Get Counter Value and Modify Counter
activities. Each of these activities presents the value of the counter as Published Data so that it
can be used by other activities and links.
Security
The access permissions for counters can be modified, but the Runbook server does not
enforce these permissions.
Warning
You cannot run multiple, simultaneous jobs for runbooks that contain Modify Counter
activities because simultaneous jobs of the same runbook that modify (set, reset,
increment, or decrement) a counter can cause the counter value to become unreliable.
You can, however, read the value of counters in runbooks that run simultaneously.
Important
Orchestrator does not support moving multiple counters with multiple-selection. To move
more than one counter to another folder, you must move each counter individually.
Use the following procedures to create a counter and to organize counters.
To create a counter
1. In the Connections pane, double-click the Global Settings folder, right-click the
Counters folder or a subfolder of the Counters folder to select New, and then click
Counter to open the New Counter dialog box.
2. In the Name box, type a name for the counter.
3. In the Description box, type a description that explains the purpose of the counter.
4. In the Default Value box, type the starting value of the counter. This value is the starting
value of the counter when it is created or reset.
5. To modify a counter, double-click the counter.
To remove a counter, right-click the counter to select Delete.
6. Click Finish.
To organize counters
1. You can group counters in folders to organize them. To create a folder, right-click the
Counters folder to select New, and then click Folder.
2. To move a counter to a different folder, right-click the counter to select Move to open the
Select a Folder dialog box.
3. Select the destination folder, and then click OK. The counter is moved to the new folder
203
location.
See Also
Get Counter Value
Modify Counter
Published Data
Functions
By using System Center 2012 - Orchestrator, you can manipulate string data from text files,
Published Data, or other sources, and convert it into a usable form. You can also perform simple
arithmetic operations, such as calculating sums and differences, and performing division and
multiplication operations. For example, you can extract text from a text file by using a Text File
Management activity, trim leading and trailing spaces from the text, and then retrieve specific
parts of the text that you can pass to other activities as returned data items.
For a complete list of the functions that you can perform, see the following Functions table.
When the activity runs, the text 'this will be inserted in uppercase' in the example is replaced with
'THIS WILL BE INSERTED IN UPPERCASE'.
Nested Functions
If you want to use a data manipulation function within another function, you do not have to
enclose the nested function in square brackets. For example, to nest the Field function, type:
[Field(Field('username=jsmith@abcompany.com','=',2),'@',1)]
Functions
Functions are case-sensitive. For example, Upper('Text') will be processed, but upper('Text') will
not.
204
Function and Usage Parameters Example
Definition
text to that is being uppercase') returns 'THIS WILL
uppercase. converted to BE CONVERTED TO
uppercase. UPPERCASE'
205
Function and Usage Parameters Example
Definition
that the result will
be rounded to.
Instr - returns the Instr ('SearchText', SearchText - the Instr('This is a string that is
position of first 'TextToFind') text that is being searched', 'string') returns 11
occurrence of searched.
text within TextToFind - the
another text. text that you are
searching for.
Right - returns a Right('Text', Length) Text - the full Right('Take from the right', 9)
subset of the text text. returns 'the right'
from the right Length - the
side of the full number of
text. characters from
the right side that
will be returned.
Left - returns a Left('Text', Length) Text - the full Left('Take from the left', 4) returns
subset of the text text. 'Take'
from the left side Length - the
206
Function and Usage Parameters Example
Definition
of the full text. number of
characters from
the left side that
will be returned.
Mid - returns a Mid('Text', Start, Text - the full Mid('Take from the middle', 5, 4)
subset of the text Length) text. returns 'from'
from the middle Start - the
of the full text. starting position
in the text where
you want to
begin returning
characters.
Length - the
number of
characters
starting from the
Start position
that will be
returned.
LTrim - trims LTrim('Text') Text - the text LTrim(' Remove the leading
leading spaces that is being spaces only. ') returns 'Remove
from text. trimmed of the leading spaces only. '
leading spaces.
RTrim - trims the RTrim('Text') Text - the text RTrim(' Remove the trailing
trailing spaces that is being spaces only. ') returns ' Remove
from text. trimmed of the trailing spaces only.'
trailing spaces.
Trim - trims Trim('Text') Text - the text Trim(' Remove leading and
leading and that is being trailing spaces. ') returns 'Remove
trailing spaces trimmed. leading and trailing spaces.'
from text.
Len - returns the Len('Text') Text - the text Len('Measure this text') returns 17
length of text. that is being
measured.
207
See Also
Data Manipulation
Regular Expressions
In System Center 2012 - Orchestrator, regular expressions let you match a string to a pattern.
The regular expression can contain a number of different elements that define the pattern. Smart
Link Properties use regular expressions to perform pattern matching.
Character Meaning
208
Character Meaning
or line. For example, "ab$" matches "I took a
cab" or "drab" but does not match "absolutely
not".
Examples
Expression Meaning
209
Expression Meaning
characters followed by a "y".
See Also
Data Manipulation
Schedules
System Center 2012 - Orchestrator uses schedules to define the times when runbooks can run.
For example, there are times when it is inappropriate to run some runbooks, such as backing up
a runbook on a main server during regular business hours. You can create a schedule that runs
according to a complex interval, such as the first and third Mondays and Thursdays of every
month, except when these days fall on a holiday.
Schedules use the system clock of the Runbook server that runs the runbook. This enables
schedules to function in virtual machine environments, and to continue running even when the
system clock is adjusted because of the move to or from daylight savings time.
Runbooks that start before a prohibited time run until finished, even if they are still processing
when the prohibited time arrives. They will not be interrupted after processing has started.
Security
The access permissions for schedules can be modified, but the runbook server does not
enforce these permissions.
Note
If a runbook is scheduled to start during an hour that is skipped when the system clock is
adjusted forward by one hour, that starting time is skipped, and the runbook starts at the
next scheduled time. If a runbook is scheduled to start during an hour that occurs two
times because the system clock is adjusted backward by one hour, the runbook starts
two times.
Note
Orchestrator does not support moving multiple schedules with multiple-selection. To
move more than one schedule to another folder, you must move each schedule
individually.
210
Conditional Links
In addition to assigning a schedule to a runbook, you can use a Check Schedule activity to use a
schedule for conditional logic in a runbook. This activity checks a particular schedule and returns
a published data item with a value of true or false specifying whether the current time is within the
schedule. This published data item can be used by a link to determine whether to run a particular
activity or to continue to the workflow.
To create a schedule
1. In the Connections pane, right-click the Schedules folder or a subfolder of the
Schedules folder, point to New, and then click Schedule to open the New Schedule
dialog box.
2. On the General tab, in the Name box, type a name for the schedule.
3. In the Description box, type a description that describes or explains the purpose of the
schedule.
4. Click the Details tab. Select the days that this schedule allows runbooks to run:
Days of week: Select this option and select the days of the week when this schedule
allows runbooks to run.
Occurrence: Select the weeks of the month when the schedule allows runbooks to run.
Days of month: Select this option and select the days of the month when this schedule
allows runbooks to run. Specify the days of the month by entering the number of the day.
You can use hyphens to describe ranges and commas to separate entries. For example,
typing 1,3 includes the first and third day of the month. Typing 1-21 includes the first
through to the twenty-first day of the month. You can combine both to create complex
descriptions of the days of the month. Type all to specify all days of the month. Type last
to specify the last day of the month.
You cannot use all and last as part of a range of days. Additionally, if you typed a range
of 5-31, this range works correctly for all months, including those with 28, 29, 30, and 31
days.
5. Click Hours to open the Schedule Hours dialog box.
6. Click and drag to select a group of hours in a week. The text at the bottom of the dialog
box shows the time period that you selected. Then select one of the following:
Permit (blue): assigns the time period that you selected as a time when runbooks are
allowed to run.
Denied (white): assign the time period that you selected as a time when runbooks are not
211
allowed to run.
7. Click OK.
8. Click the Exceptions tab. The list displays all the days that are exceptions to the rules
defined in the Details tab.
9. Click Add to open the Date dialog box.
10. Specify the date and select Allow or Disallow to allow or not allow the runbook to run on
that day, and then click OK. The entry appears in the list.
11. To modify an Exception entry, select it, and then click Modify. To remove the Exception
entry, select it, and then click Remove.
12. To modify a schedule, double-click the Schedule.
13. To remove a schedule, right-click the Schedule, and then select Delete.
14. Click Finish.
See Also
Published Data
Check Schedule
212
Variables
When building runbooks in System Center 2012 - Orchestrator, some settings are the same
across activities. Variables let you specify a value that activities use in any runbook.
Security
The access permissions for variables can be modified, but the runbook server does not
enforce these permissions.
Important
Be aware that in Orchestrator, variables that reference system variables, for example
%ProgramFiles%, return values from a 32-bit runtime environment. This is because
Orchestrator is a 32-bit application.
Note
Orchestrator does not support moving multiple variables with multiple-selection. To move
more than one variable to another folder, you must move each variable individually.
Use the following procedures to create, insert, and organize variables.
To create a variable
1. In the Connections pane in the Runbook Designer, expand the Global Settings folder,
and then click the Variables folder.
2. Right-click the Variables folder or a subfolder of the Variables folder to select New, and
then click Variable to open the New Variable dialog box.
3. In the Name box, type a name for the variable.
4. In the Description box, type a description that explains the purpose of the variable.
5. In the Value box, type the value of the variable. This value replaces the placeholder in
those activities where the variable is inserted.
6. If you want the variable to be encrypted (for example, to store a password for use in other
runbook activities), select the Encrypted Variable check box.
For more information about best practices for using encrypted variables, see Orchestrator
Data Encryption.
7. Click Finish.
Important
System Center 2012 - Orchestrator does not let you combine an encrypted variable with
plain text as a parameter value in a runbook.
To organize variables
1. You can group variables into folders to organize them. To create a folder, right-click the
Variables folder to select New, and then click Folder.
2. To move a variable to a different folder, right-click the variable, and then click Move to
open the Select a Folder dialog box.
3. Select the destination folder, and then click OK. The variable is moved to the new folder
location.
Special Variables
You can specify special formats of variables to provide dynamic information to your runbooks.
Specify the value of the variable to invoke this behavior.
NOW(): When the variable is resolved, it is set to the current date and time. You can pass
arguments to this function to return specific portions of the date or time. For example, NOW(hour)
returns the current hour. The following are the valid arguments for the NOW() function: day,
dayofweek, dayofyear, month, year, hour, minute, second, millisecond.
%ENVVAR%: This variable returns the value of the environment variable between the percent
(%) symbols. The environment variable is based on the runbook server computer where the
runbook is running, and it is not case-sensitive. All system variables can be resolved. Any user
variables are resolved in the context of the service account on the runbook server. If the
environment variable does not exist, the text specified within the variable is returned as-is (that is,
if you type %ENVVAR% and no environment variable named ENVVAR exists, the text
‘%ENVVAR%’ is returned).
See Also
Data Manipulation
Published Data
Published Data lets an activity use information from another activity in the same runbook. Each
activity has a specific set of Published Data items that it populates after it runs. Any other activity
that runs after it in the workflow has access to this data. In addition to data specific to each
activity, all activities publish a common set of data items that provide information such as the start
214
and stop time of the activity and its completion status. Link conditions also use Published Data to
add filtering and decision-making capabilities to runbooks.
For example, the runbook might use a Read Line activity to get information from a text file. A
Send Email activity later in the runbook has to use the information to include in the text of its
mail. The Send Email activity could use the Line Text Published Data item from the Read Line
activity to include in its mail message.
Data Types
The following table describes the categories of Published Data value types.
215
example. Data can be passed on as multiple individual outputs, which invoke the next activity as
many times as there are items in the output.
You also have the option of passing on data as a single output. For information about how to
configure Published Data with multiple values, see Common Activity Properties.
216
keyboard shortcut, CTRL+V, or right-click the insertion point, and then click Paste. The
Published Data item appears.
Name Description
217
Name Description
starts the runbook, and it is stopped when the
runbook is stopped. Each runbook runs in its
own job process executable program.
Activity duration The total time that the activity was running.
Activity end time (year) The year when the activity finished.
Activity end time (month) The month when the activity finished.
Activity end time (day) The day when the activity finished.
Activity end time (weekday) The day of the week when the activity finished.
Activity end time (hours) The hour when the activity finished.
Activity end time (minutes) The number of minutes past the hour when the
activity finished.
Activity end time (seconds) The number of seconds past the minute when
the activity finished.
Activity end time in UTC The time when the activity finished in UTC
format.
Activity end time in UTC (year) The year when the activity finished in UTC
format.
Activity end time in UTC (month) The month when the activity finished in UTC
format.
Activity end time in UTC (day) The day when the activity finished in UTC
format.
Activity end time in UTC (weekday) The day of the week when the activity finished
in UTC format.
Activity end time in UTC (hours) The hour when the activity finished in UTC
format.
Activity end time in UTC (minutes) The number of minutes past the hour when the
activity finished in UTC format.
Activity end time in UTC (seconds) The number of seconds past the minute when
the activity finished in UTC format.
218
Name Description
Activity start time in UTC The time when the activity started in UTC
format.
Loop: Delay between attempts The amount of time (in seconds) between each
loop attempt.
Loop: Loop error message The error message if the loop is not successful.
Loop: Number of attempts The number of iterations that the loop has been
through.
Loop: Total duration The total amount of time (in seconds) that the
looped activity ran.
See Also
Building a Runbook
To test a runbook
1. In the Runbook Designer, open the runbook, and on the menu bar, click Runbook
Tester.
2. If prompted, click Yes to check out the runbook.
3. To run through the runbook from beginning to end without stopping, click Run to
Breakpoint.
If you want to step through it one activity at a time, click Step.
4. View the Log pane to see the completion status of each activity. To view the details and
Published Data from an activity, select the activity, and click Show Details.
219
To set a breakpoint
1. Select the activity on which to set the breakpoint.
2. Click Toggle Breakpoint.
3. Click Run to Breakpoint.
Each activity up to the breakpoint runs. The runbook pauses before running the activity
with the breakpoint.
4. To continue through to the end of the runbook, click Run to Breakpoint again, or to step
through it one activity at a time, click Step.
See Also
Design and Build Runbooks
Using runbooks
Deploying Runbooks
Running Runbooks
Deploying Runbooks
There are tools available in Orchestrator to help you manage the versions of your runbooks.
These tools are described in the following sections.
220
Version Control
In System Center 2012 - Orchestrator, multiple users can create and update runbooks. However,
only one user at a time can make changes to a runbook. This protects your work from being
overwritten by someone else with the same permission level.
To edit a runbook, you must check it out. Another user cannot edit that runbook until you either
commit all changes by checking the runbook in or revert all changes by undoing the checkout.
Audit Log
When a runbook has been changed and is checked in by a user, an entry appears in the Audit
History log.
Tip
When a runbook has been altered to a state where it is no longer functioning, you can
select the Audit History tab at the bottom of the Runbook Designer to see the changes
that were made and then reverse them.
See Also
Deploy and Start Runbooks
221
Running Runbooks
This topic describes the process for starting runbooks, viewing the results, and stopping a job in
the Runbook Designer.
To start a runbook
1. In the Runbook Designer, in the Connections pane, click the Runbooks folder to see
the available runbooks.
2. In the Design workspace, click a runbook tab.
3. If the runbook is Checked Out, select the Check In button.
4. In the Design workspace, right-click the runbook tab and select Run.
5. In the Start Runbook dialog box, go to Available Runbook Server(s) box and select the
applicable server.
6. Click the Arrow button so that the server name is now in the Selected Runbook
Servers(s) box.
7. Click Start.
To find events
1. Click Start, point to All Programs, click Administrative Tools, and then click Event
Viewer to open a session.
2. On the Event Viewer menu, double-click Windows Logs, and then on the menu, click
Application.
See Also
Deploy and Start Runbooks
Runbook Samples
This topic provides instructions about how to build and test sample runbooks by using the
Standard Activities found in System Center 2012 - Orchestrator.
222
Samples
Creating and Testing a Sample Runbook
Provides step-by-step instructions about creating and testing a simple runbook.
Monitor a Folder within a Runbook
Provides instructions about how to create a runbook that monitors the activity in a folder.
To create a runbook
1. Click Start, point to All Programs, click Microsoft System Center 2012, click
Orchestrator, and then click Runbook Designer.
2. In the Connections pane, right-click Runbooks to select New, and then click Runbook.
A New Runbook tab appears at the top of the Runbook Designer Design workspace
with the name New Runbook.
3. Right-click the New Runbook tab to select Rename.
In the Confirm Check out dialog box, click Yes.
4. Type Append and Copy Workflow in the Input box, and then press Enter.
223
You have created a new runbook and are ready to begin adding and configuring activities.
224
populates the File property of the Copy File activity with the name of and path to the file
from the Monitor File activity.
4. In the destination Folder box, type C:\Copy.
5. Click Finish.
The Copy File activity is now configured to copy files from the source folder to the destination
folder.
225
4. To create a link from the Copy File activity to the Junction activity, click and drag the
right arrow of the Copy File activity to the Junction activity.
5. Right-click the Junction activity to select Properties.
6. Click the ellipse (…) button next to the Return data from box, and then select Copy File.
Click OK. This action configures the activity to return the same Published Data as the
Copy File activity.
7. Click Finish.
The Junction activity is configured to coordinate the workflow so that no further activities run
until both the Copy File activity and Append Line activity finish.
226
1. Create a folder on the runbook server called C:\Drop.
2. Create a folder on the runbook server called C:\Copy.
3. With the Append and Copy Workflow runbook selected in the Runbook Designer, on
the toolbar, click Runbook Tester.
4. Click Run To Breakpoint. The Monitor File activity is loaded and waits for a text file to
be created in the C:\Drop folder.
5. Open Notepad and type a few lines of text. Save the file as C:\Drop\File1.txt.
6. Wait a few moments for the other activities to run. Ensure that each of the activities is
completed successfully.
7. To view the Published Data and other details of an activity, click Show Details for the
activity.
8. Open the C:\Drop folder and ensure that the file has been removed.
9. Open the C:\Copy folder and ensure that the file has been copied. Also verify that the
MasterLog.txt file has the contents of the original file.
See Also
Runbook Samples
227
2. Right-click the New Runbook tab to select Rename.
3. In the Confirm Check out dialog box, click Yes.
4. Type a name for the runbook, such as Monitor Runbook, and then press Enter.
5. In the Activities pane, click File Management to expand the category, and then drag the
Monitor Folder activity into the Runbook Designer Design workspace.
6. In the Activities pane, click Notification to expand the category, and then drag the Send
Event Log Message activity into the Runbook Designer Design workspace, to the right
of the Monitor Folder activity.
7. In the Runbook Designer Design workspace, move your pointer over the right side of
the Monitor Folder activity to display the smart link arrow.
8. Click the smart link arrow, and then drag it to the Send Event Log Message activity.
9. In the Activities pane, click Runbook Control to expand the category, and then drag the
Invoke Runbook activity into the Runbook Designer Design workspace, to the right of
the Send Event Log Message activity.
10. In the Runbook Designer Design workspace, move your pointer over the right side of
the Send Event Log Message activity to display the smart link arrow.
11. Click the smart link arrow, and then drag it to the Invoke Runbook activity.
8. Click OK.
9. Select the Triggers tab.
10. Select the Number of files is option, set the value in the list to greater than, and then
type 0 in the edit box.
228
11. Click Finish.
12. In the Runbook Designer Design workspace, double-click the Send Event Log
Message.
13. In the Send Event Log Message Properties dialog box, on the Details tab, in the
Properties section, set the following:
a. In the Computer box, type the name of the computer to receive the Event
message.
This is typically the computer where you are running Runbook Designer.
b. In the Message box, type the message to display in the Event log, for example,
File Detected.
c. Leave the Severity level at Information.
14. Click Finish.
Note
In this sample, the Invoke Runbook activity is not configured. For more
information about configuring this activity, see the Invoke Runbook activity in the
System Center 2012 - Orchestrator Runbook Activity Reference.
229
To test the runbook
1. In the Runbook Designer Design workspace, select the Monitor Runbook tab.
2. On the toolbar above the Runbook Designer Design workspace, click Runbook Tester.
3. In the Confirm Check out dialog box, click Yes.
4. In Runbook Tester, on the toolbar, click Step Over to start stepping through the
runbook.
Tip
To increase the size of the Log pane, remove the Resource Browser pane by
selecting View on the menu, and then clearing the Resource Browser option.
5. In Windows Explorer, browse to the C:\Source folder.
6. Copy test.txt to C:\Monitor.
7. Close Windows Explorer.
8. On the Runbook Tester toolbar, click Next.
After a few moments, note that the Log pane entry updates and shows an event for the
Monitor Folder activity.
9. On the Log pane Click the Show Details link to see the contents of the data bus for that
runbook.
10. Scroll down the list of properties. Note that the activity status is success indicating that
the Monitor Folder activity detected the change in the folder.
11. On the Runbook Tester toolbar, click Next.
Notice that the Log pane changes and shows an event for the Send Event Log
Message activity.
12. Click the Show Details link and note that the activity status is success indicating that the
Send Event Log Message activity detected the change in the folder.
13. Close Runbook Tester.
14. On the Runbook Designer toolbar, click Check In.
See Also
Runbook Samples
230
Standard Activities
Standard Activities
Describes all of the Orchestrator Standard Activities.
Privacy
Orchestrator is committed to protecting your privacy, while delivering software that brings you the
performance, power, and convenience you want. For more information, see the Privacy
Statement for System Center 2012 - Orchestrator.
For more information about the Orchestrator Release Candidate, see Release Notes for System
Center 2012 - Orchestrator.
Standard Activities
Activities are organized into categories to help you find the appropriate activity for the task you
want to perform. The following table provides a brief description of tasks you can accomplish with
each activity category.
Tasks Categories
231
Tasks Categories
See Also
Common Activity Properties
Learn how to configure common tab settings.
Alphabetical List of Standard Activities
View all activities in alphabetical order.
233
P
PGP Decrypt File
PGP Encrypt File
Print File
Q
Query Database
Query WMI
Query XML
R
Read Line
Read Text Log
Rename File
Restart System
Return Data
Run .Net Script
Run Program
Run SSH Command
S
Save Event Log
Search and Replace Text
Send Email
Send Event Log Message
Send Platform Event
Send SNMP Trap
Send Syslog Message
Set SNMP Variable
Start/Stop Service
W
Write to Database
Write Web Page
234
standard activity, you must enable the ports between the runbook servers and resource as
indicated in the following table.
Map Activity
Network uses
Path Microsof
t
Window
s file
sharing.
Run Activity
Program uses
Microsof
t
Window
s file
sharing
and I/O
235
Standard Port on runbook server Port on resource server Notes
activity
pipes.
See Also
TCP Port Requirements
System
The following table provides a brief description of tasks you can accomplish when using each
System activity.
Run scripts that parse data or run functions Run .Net Script
against available APIs.
236
Tasks System Activities
Save entries from an event log so that they can Save Event Log
be used later.
Query a network device for the value of variable Get SNMP Variable
that is assigned to the Management Information
Base (MIB) address you specify.
Run Program
The Run Program activity runs any program or command on any computer in your domain in
interactive or background mode. Use this activity to run backup applications or a batch script that
runs a set of complex commands.
237
The command line argument or program that will run and which computer it will run on.
You also need to determine whether a user on the target computer will need to interact with
the program when it is run. The user account that will run the program or command must
have administrator rights to run programs on the target computer.
Use the following information to configure the Run .NET Script activity.
Details
Working folder Type the full path of the working folder that the
program or command will use. The command
or program will behave as if it was run from the
working folder.
238
Advanced
Wait for the completion of the program Select this option to cause the Run Program to
wait for the program or command to finish
running before moving to the next activity in the
runbook. If you have set the Execution mode
to Interactive, then the user must close the
program before the Run Program activity is
able to move to the next activity in the runbook.
239
Settings Configuration Instructions
Do not wait for the completion of the Select this option to cause the Run Program
program activity to run the program or command and not
wait for it to complete. When this option is
selected, the published data items generated
by the Run Program activity will not be
available to other activities.
Note
This user name only logs in to the
computer where the Run Program
activity runs, and uses the interactive
logon type. If the program that the Run
Program activity launches accesses
resources on other computers, the
same user name is used on the remote
computer, but with the network logon
type.
Published Data
The following table lists the published data items.
Item Description
240
Item Description
process ID of the Windows Command Prompt
application.
Program exit code The return code of the application that was run
by the Run Program activity.
Program output The text that was sent to the console when the
program was run.
Program output file The name of the local file where the program
output was saved.
UNC program output file The name of the file where the program output
was saved in UNC format.
Security
The Run Program activity is based on PsExec. PsExec lets you execute processes on other
systems, complete with full interactivity for console applications. For more information on PsExec,
go to PsExec.
The Run Program activity inherits certain security concerns from PsExec. Specifically, PsExec
uses named pipes. This can be a security concern, as credentials can be sent through this tool.
A work-around for customers concerned about security vulnerabilities is to create a mapped drive
to the server that is the target of the Run Program activity. This establishes a security context for
the Run Program activity.
241
The data you want to publish.
Use the following information to configure the Run .Net Script activity.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Details Tab
Script Type the code that will run when the activity
runs.
Advanced Tab
Published Data
Add the published data items that you want this activity to publish. Every published data item that
you add will be available on the Data bus. It is important to determine if a published data item will
be multi-valued. The Run .Net Script activity automatically correlates multi-valued data from
different items by aligning them. For example, if you choose to publish two items labeled “Name”
and “Email” as Collections, the Run .Net script will try to line up each item in the Name collection
with each item in the Email collection. If the collections are not equally sized, then the Run .Net
Script activity will create blank values for the collection that has fewer items. For a list of data
242
items and the corresponding description published by this activity, see the following Published
Data table.
Published Data
Item Description
243
Item Description
Script Language The language that was selected for the script.
End Process
The End Process activity ends processes that are running on the runbook server or on a remote
computer. The End Process activity can be used to shut down an application that is not
responding. The activity returns success if the named process is successfully ended or if the
name process is not running. This activity uses a satellite license.
Details Tab
End all instances Select to end all processes that match the
Process that you have specified when multiples
244
Settings Configuration Instructions
are found.
Fail if there is more than one instance Select to cause the end process to fail if it finds
more than one process matching the name you
specified.
Published Data
The following table lists the published data items.
Item Description
Start/Stop Service
The Start/Stop Service activity will start, stop, pause, or restart a Windows service. The Start/Stop
Service activity can be used to restart a service that has stopped responding or shut down a
service in preparation for a backup. This activity uses a satellite license.
Note
This depends on the service you are interacting with; it may not be required.
Use the following information to configure the Start/Stop Service activity.
245
Details Tab
Service Type the name of the service. You can also use
the ellipsis (...) button to browse for the service.
Browsing is only available if you have specified
a valid Computer.
Action must complete in less than Specify the maximum amount of time in which
the action must complete. After the time has
expired, the Start/Stop Service activity will
timeout and return a failure.
Published Data
The following table lists the published data items.
Item Description
246
Item Description
Service real name The name of the ran file that the service is
running.
Control Action The action that was taken on the service: Start,
Stop, Pause, or Restart.
Restart System
The Restart System activity will restart a computer on your network. The Restart System activity
can either wait for applications to shut down gracefully or you can configure the activity to
forcefully shut down any running applications. You also can send a message to notify your users
of the reason for the disruption.
Some applications may consume memory and hard disk space and will not relinquish them
without restarting the system. The Restart System activity can be used to restart these systems
during maintenance windows to maintain service during business hours.
Details Tab
247
Settings Configuration Instructions
for the computer.
Published Data
The following table lists the published data items.
Item Description
248
Configuring the Save Event Log Activity
Before you configure the Save Event Log activity, you need to determine the following:
The event log that you are saving from
The computer where it is located
The fields that you want to include
The format of the file
Note
If you require only specific entries to be saved and not the entire event log, you will need
to know what fields to filter against as well as what values to filter.
Use the following information to configure the Save Event Log activity.
Details Tab
Include Select all the event Log fields that you want to
save to the file. You have the option to select
Event ID, Source, Category, Description,
Type, Computer, and Date/time.
Filters Tab
Source Select and type the value that the Source field
of the event log entries will need to match.
249
Settings Configuration Instructions
Type Select and specify the value that the Type field
of the event log entries will need to match.
Date from Select and specify the ranges of dates that the
events will need to be from to be included.
Output Tab
File name Type the name of the file where the event log
entries will be saved. This file will be saved on
the computer where the event log resides.
If the file exists Select the action that you want to take if a file
with the same name already exists:
Create a file with a unique name: Select
to append a value to the filename to create
a unique name that does not conflict with
an existing name.
Append: Select to append the entries that
are being saved to the file.
Overwrite: Select to overwrite the existing
file with the file that is being created.
Fail: Select to cause the Save Event Log
activity to fail if the filename already exists.
File format Select the format that will be used to save the
event log entries to the file:
CSV Delimited: Select to use the CSV
format to write each log entry.
TAB Delimited: Select to separate fields in
each entry using the TAB character.
Custom Delimited: Select to separate
fields in each entry using a custom
character that you specify in the Delimiter
box.
250
Settings Configuration Instructions
Published Data
The following table lists the published data items.
Item Description
Event log name The name of the event log that was saved.
Name and path of the file where entries are The full path of the file where the event log was
saved saved.
Query WMI
The Query WMI activity will send a WMI query to a system that you specify and return the results.
This activity also can be used to check statistics on a remote server to create audit trails that can
be reviewed later.
Details Tab
251
Settings Configuration Instructions
running the WMI query against. You can also
use the ellipsis (...) button to browse for the
computer.
WMI query Type the WMI query that will be used to query
the Computer. For more information about
Windows Management Instrumentation, see
Windows Management Instrumentation
(http://go.microsoft.com/fwlink/?LinkId=221343).
Published Data
The following table lists the published data items.
Item Description
Computer where the WMI query is performed The name of the computer where the WMI
query was ran.
WMI Query The WMI query that was sent to the computer.
Details
Run Command Select this option and type the command that
you want to run on the SSH server after the
connection has been established.
Command Set File Select this option and specify a file that
contains a set of commands that will be run on
the SSH server when the connection has been
established. The command set file must use the
253
Settings Configuration Instructions
scripting language of the native shell on the
SSH server.
Accept Host Key Change Select this option to accept host key changes
when they occur.
Security
It is recommended that you do not use
this setting because it can cause a
runbook to accept any change in a
server, including any that are for
malicious purposes. By selecting this
option, you are instructing the activity to
connect to any server, regardless of the
host key. Only use this option for
testing purposes.
Advanced
254
Settings Configuration Instructions
Published Data
The following table lists the published data items.
Item Description
Command Set file The command set file that was used to run
commands on the SSH server. This option is
not available when the Run Command option
is selected.
Execution Result The text that was published as output from the
commands that were run on the SSH server.
Key file path The path of the key file that was used to
authenticate with the SSH server.
255
Configuring the Get SNMP Variable Activity
Before you configure the Get SNMP Variable activity, you need to determine the following:
The IP address of the device, as well as the port number, SNMP MIB, and SNMP version
The community string required to retrieve the variable.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Use the following information to configure the Get SNMP Variable activity.
Details Tab
Advanced Tab
256
Settings Configuration Instructions
the SNMP variable
Published Data
The following table lists the published data items.
Item Description
257
Version of SNMP that you are using
Source host IP address
Enterprise identifier of the device
Generic or specific identifier of the device that you are monitoring
Use the following information to configure the Monitor SNMP Trap activity.
Details Tab
Microsoft SNMP Trap Service (SNMPv1, Select this option to use the Microsoft SNMP
SNMPv2c) Trap Service. This service is only compatible
with SNMP versions SNMPv1 and SNMPv2c.
No dependency (SNMPv1, SNMPv2c, Select this option to monitor SNMP traps using
SNMPv3) a port rather than the Microsoft SNMP Trap
Service.
258
Settings Configuration Instructions
authenticationFailure(4): Select to filter for a
failed SNMP authentications to the network
device. This option has a numerical value of 4.
egpNeighborLoss(5): Select to filter for a lost
connection to an EGP neighbor. This option
has a numerical value of 5.
enterpriseSpecific(6): Select to filter based on
an enterprise specific ID. This option has a
numerical value of 6. You must specify this
option to filter based on a Specific identifier.
Published Data
The following table lists published data items.
Item Description
259
Send SNMP Trap
The Send SNMP Trap activity will raise an SNMP event that can be detected by a network
systems manager application. By using an enterprise identifier of a known network device, you
can send SNMP Traps on behalf of a network device in your system. Use the Send SNMP Trap
to create events for runbooks that need to be tracked using an SNMP monitoring product.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Use the following information to configure the Send SNMP Trap activity.
You can also add more information to the SNMP trap. Each item that you add becomes a
published data item.
Details Tab
260
Settings Configuration Instructions
linkDown(2): Select to signify a severed
connection to the network device. This option
has a numerical value of 2.
linkUp(3): Select to signify a re-established
connection to the network device. This option
has a numerical value of 3.
authenticationFailure(4): Select to signify a
failed SNMP authentications to the network
device. This option has a numerical value of 4.
egpNeighborLoss(5): Select to signify a lost
EGP peer connection to the network device.
This option has a numerical value of 5.
enterpriseSpecific(6): Select to specify an
enterprise specific id. This option has a
numerical value of 6. You must specify this
option to specify a specific identifier.
Advanced Tab
261
Settings Configuration Instructions
agent that sends the SNMP trap information,
type the agent address in the box. Otherwise,
leave the box blank. The activity will use the
agent address of the runbook server that runs
the runbook. This setting can only be used with
version SNMPv1.
Published Data
The following table lists the published data items.
Item Description
SNMP Version The SNMP version that was specified for this
trap. This value can be SNMPv1 or SNMPv2c.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Use the following information to configure the Set SNMP Variable activity.
Details Tab
Object value Type the new value of the variable you are
changing. Make sure that the new value
matches the constraints that are set out by
device manufacturer. This field is case-
sensitive and supports only alphanumeric
characters.
Advanced Tab
263
Settings Configuration Instructions
retries is specified in the Retry box.
Published Data
The following table lists the published data items.
Item Description
MIB identifier The MIB identifier of the variable that was set.
MIB value The new value of the variable that was set.
Scheduling
The following table provides a brief description of tasks you can accomplish when using each
Scheduling activity.
264
Tasks Scheduling Activities
time.
Monitor Date/Time
The Monitor Date/Time activity invokes runbooks at a time or interval that you specify. Use the
Monitor Date/Time activity to invoke your runbooks at a specific time once a day, week, or month.
You can also schedule runbooks to be invoked when a specific number of seconds have passed
since it was last invoked, or immediately after the runbook is deployed.
The Monitor Date/Time activity uses the system clock of the operating system on the computer
that runs the runbook server, not Coordinated Universal Time (UTC), to verify the runbook’s
launch time. This enables the Monitor Date/Time activity to function in virtual machine
environments, and to continue running even when the system clock is adjusted because of the
move into or out of Daylight Saving Time. However, if a runbook is scheduled to start during an
hour that is skipped when the system clock is adjusted forward by one hour, that starting time is
skipped, and the runbook starts at the next scheduled time. If a runbook is scheduled to start
during an hour that occurs twice because the system clock is adjusted backwards by one hour,
the runbook launches twice.
Depending on the practices in your time zone, the usual official time to change the system clocks
at the start or finish of Daylight Saving Time is 2:00 A.M., or 02:00. We recommend that you
configure a schedule to prevent your runbooks from being skipped or processed twice when the
system clock changes.
The Monitor Date/Time activity becomes inactive when the schedule does not allow the runbook
to run.
The Monitor Date/Time activity is best suited for scenarios where you need to run routines
regularly that do not rely on events in other systems. For example, nightly backup procedures or
periodically reading and processing mail in a customer service inbox.
Details Tab
Every [x] days [y] hours [z] minutes Select to specify intervals of days, hours, and
minutes for the runbook to run.
Starting: Select to specify the number of
minutes past the hour to invoke the runbook.
This option is only available if you have
specified 0 minutes and at least 1 Day or 1
hour .
At time slices within the hour: Select to
invoke the runbook at times that are multiples
of minutes you have specified. This option is
only available when 0 days and 0 hours are
specified. For example, if minutes is set to 15
then the Monitor Date/Time activity will invoke
at 0, 15, 30, 45 minutes past each hour.
Trigger immediately: Select to invoke the
runbook immediately after deploying.
The Monitor Date/Time activity accepts the following inputs when configuring times and intervals:
Seconds 5 - 300
266
Unit Accepted Input
Published Data
This activity does not generate published data items.
Check Schedule
The Check schedule activity verifies that a runbook is allowed to run at the current time according
to the permitted times or interval configured in a schedule. To use this activity, you can create a
schedule and configure the permitted times, denied times, or interval at which the runbook can
run. Then you can insert the activity into a runbook following a Monitor Date/Time activity and
configure it to check the schedule to verify whether a runbook is allowed to run at the current
time. You can also use the Check Schedule activity in a runbook that monitors systems for
availability. If a problem is encountered, the Check Schedule activity can verify whether the
current time is during business hours, or in or out of a maintenance window.
Published Data
The following table lists published data items.
267
Item Description
Monitoring
The following table provides a brief description of tasks you can accomplish when using each
Monitoring activity.
Invoke a runbook when new events that match Monitor Event Log
a filter appear in the Windows Event Log.
Retrieve the current amount of available disk Get Disk Space Status
space.
Check the availability of a Web, Email (POP3 Get Internet Application Status
or SMTP), FTP, DNS, or custom server.
268
Tasks Monitoring Activities
received as a result of the WMI event query
you specified.
Details Tab
269
Settings Configuration Instructions
that computer.
Event log Type the name of the Windows Event Log that
you are monitoring. You can also browse for
the Windows Event Log using the ellipsis (...)
button. Windows includes three Event Logs by
default: Application, Security, and System. The
computer that you are connecting to may
contain other Event Logs.
Message filters The list shows all the filters that have been
configured to filter the events that are
generated in the log that you have specified. To
edit or remove an item in the list, select it and
click Edit or Remove as applicable.
270
Settings Configuration Instructions
to filter for such as Error, Warning,
Information, Success Audit, or
Failure Audit.
Published Data
The following table lists the published data items.
Item Description
Event log name The name of the Windows Event Log being
monitored.
Log entry description The text that is contained in the Event Log
entry description.
Monitor Service
The Monitor Service activity invokes runbooks when a service has been started or stopped. You
can use the Monitor Service activity to monitor services on any remote computer. Use the Monitor
Service activity to create runbooks that take corrective actions when services unintentionally shut
down. For example, if a SQL Server service that hosts critical data stops responding, you can use
a Monitor Service activity with a Start/Stop Service activity to automatically restart the service.
271
Which service you want to monitor
Whether the runbook will run when the service is started or stopped
Use the following information to configure the Monitor Service activity.
Details Tab
Published Data
The following table lists the published data items.
272
Item Description
Service real name The name of the file that the service is running.
Details Tab
273
Settings Configuration Instructions
to monitor the services on that computer.
Published Data
The following table lists the published data items.
Item Description
Service real name The name of the ran file that the service is
running.
Monitor Process
The Monitor Process activity invokes runbooks when a process has been started or stopped. A
process is any executable file that is running. You can use the Monitor Process activity to monitor
processes on any remote computer.
The Monitor Process activity can be used to create runbooks that take corrective actions when a
process has been started but has not stopped. For example, if an application that has a tendency
to stop responding and remain resident in memory even though it has completed, it can be shut
down automatically by using a Monitor Process activity in a runbook with a Get Process Status
activity to retrieve the status of the process and an End Process activity to shut it down.
274
Use the following information to configure the Monitor Process activity.
Details Tab
Published Data
The following table lists the published data items.
Item Description
Number of instances for the process The number of running occurrences of the
process.
275
Item Description
invoked if the process is stopped.
Important
The Get Process Status activity returns a status of failed if the named process is not
running. If the activity returns failed, the overall status of the runbook is set to warning or
failed, depending on the number of activities in the runbook.
Details Tab
Published Data
The following table lists the published data items.
276
Item Description
Number of instances for the process The number of running occurrences of the
process.
Monitor Computer/IP
The Monitor Computer/IP activity will send a ping to a remote computer or IP address and wait for
a response. You can configure the Monitor Computer/IP activity to invoke your runbook if the
computer is either reachable or unreachable. The Monitor Computer/IP activity can be used to
invoke runbooks that will automatically notify administrators when a vital system has become
unreachable on the network.
Important
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Use the following information to configure the Monitor Computer/IP activity.
Details Tab
277
Settings Configuration Instructions
monitoring cannot be reached using a ping.
Published Data
The following table lists the published data items.
Item Description
Important
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Use the following information to configure the Get Computer/IP Status activity.
278
Details Tab
Published Data
The following table lists the published data items.
Item Description
Test frequency example: Monitor Disk Space activity is set to test every 30 seconds
279
Time All Disks are Passed Threshold? Result
Published Data
The following table lists the published data items.
Item Description
Percentage of Space available The percentage of the entire drive capacity that
is available.
Details Tab
280
Settings Configuration Instructions
checking. You can also use the ellipsis (...)
button to browse for the computer.
Published Data
The following table lists the published data items.
Item Description
Percentage of Space available The percentage of the entire drive capacity that
is available.
281
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
General Tab
Check that the page contains this string Select and type a string to search for when the
page is retrieved from the web server. When
this option is selected, the server is only
282
Settings Configuration Instructions
considered available if the string can be found
on the page that is specified by the URL.
Search is case sensitive Select to make the string search case sensitive.
Send test email Select to send a test email using the SMTP
server. When this option is selected, the server
is only considered available if the email can be
sent to the server.
283
Settings Configuration Instructions
without a response, the server will be
considered unavailable.
284
Settings Configuration Instructions
Username that you have specified.
Test DNS table IP Address Select to specify a computer name and the IP
address that should be associated with that IP
address. When this option is selected, the
server is only considered available if the IP
address is assigned to the computer that you
specify.
Advanced Tab
Published Data
The following table lists the published data items.
285
Item Description
Web page The HTML of the web page that was retrieved
when in Web (HTTP) mode.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
General Tab
286
Settings Configuration Instructions
you want to monitor. The options include the
following:
Web (HTTP)
E-mail (SMTP)
E-mail (POP3)
FTP
DNS
Custom
Configuration instructions for each Details tab
Type are listed in the following tables.
Check that the page contains this string Select and type a string to search for when the
page is retrieved from the web server. When
this option is selected, the server is only
considered available if the string can be found
on the page that is specified by the URL.
Search is case sensitive Select to make the string search case sensitive.
287
Settings Configuration Instructions
Send test email Select to send a test email using the SMTP
server. When this option is selected, the server
is only considered available if the email can be
sent to the server.
288
FTP Details Tab
Test DNS table IP address Select to specify a computer name and the IP
address that should be associated with that IP
address. When this option is selected, the
server is only considered available if the IP
address is assigned to the computer that you
289
Settings Configuration Instructions
specify.
Tip
Click the Up or Down buttons to
change the order of the actions. Click
Remove to remove an action. Click
Edit to edit an action.
Open port Type the port number and the computer where
the Internet application resides.
Send data Type the data that you will send to the Internet
application. To specify a file that contains the
data you want to send, click Send data from
file.
You can use a sequence of actions to test a custom Internet application that is not part of the
predefined list. You can perform actions such as opening and closing a port as well as
communicating with the Internet application by sending and receiving information.
Published Data
The following table lists the published data items.
290
Item Description
Web page The HTML of the web page that was retrieved
when in Web (HTTP) mode.
291
Monitor WMI
The Monitor WMI activity invokes a runbook when a WMI event is received as a result of the WMI
event query that you specify. You can check for changes in devices that are attached to the
server and invoke runbooks that take corrective action when errors occur.
Warning
A WMI event query differs from a standard WMI query.
Use the following information to configure the Monitor WMI activity.
Details Tab
WMI query Type the WMI event query that will be used to
query the computer that you specified in the
Computer box.
Syntax Examples
Here is the syntax of a simple notification query: SELECT * FROM [EventClass] WITHIN [interval]
WHERE TargetInstance ISA [object]
When you submit this WMI query, you are submitting a job to be notified of all occurrences of the
event represented by [EventClass]. The WITHIN clause denotes how the test is performed, which
is at an interval of seconds denoted by [interval]. The WHERE clause is used to narrow down
your query and can include activities, properties of embedded activities and condition statements.
Monitor for the Addition of a Modem: The following query submits a notification job to monitor
for the addition of a modem and will cause the WMI event to invoke if a modem is added. The test
is performed at an interval of every 10 seconds. SELECT * FROM __InstanceCreationEvent WITHIN
10 WHERE TargetInstance ISA "Win32_POTSModem"
292
Monitor for the Deletion of a Modem: The following query submits a notification job to monitor
for the deletion of a modem and will cause the WMI event to invoke if a modem is deleted. The
test is performed at an interval of every 50 seconds. SELECT * FROM __InstanceDeletionEvent
WITHIN 50 WHERE TargetInstance ISA "Win32_POTSModem"
Monitor for the Modification of a Display Configuration: The following query submits a
notification job to monitor for the modification of a display configuration and will cause the WMI
event to invoke if the display frequency is greater than 70. The test is performed at an interval of
every 20 seconds. SELECT * FROM __InstanceModificationEvent WITHIN 20 WHERE TargetInstance
ISA "Win32_DisplayConfiguration" AND TargetInstance.DisplayFrequency > 70
Monitor for a Modification in a Processor value: The following query submits a notification job
to monitor for a modification in a Processor value and will cause the WMI event to invoke if the
CPU utilization is greater than 50. The test is performed at an interval of every 5 seconds. SELECT
* FROM __InstanceModificationEvent WITHIN 5 WHERE TargetInstance ISA "Win32_Processor"
AND TargetInstance.LoadPercentage > 50
Tip
A query can be rejected by WMI if it is too complex or becomes resource-intensive for
evaluation.
Published Data
The following table lists the published data items.
Item Description
Computer where the WMI query is performed The name of the computer where the WMI
query was ran.
WMI Query The WMI query that was sent to the computer.
File Management
The following table provides a brief description of tasks you can accomplish when using each File
Management activity.
293
Tasks File Management Activities
Caution
If permissions on the Orchestrator installation path are changed and the activity’s
Security Credentials has a custom user account that does not include Read/Execute
permissions to ExecutionData.dll on the Runbook server, the activity will fail.
Compress File
The Compress File activity compresses files into zip archives. You can use the Compress File
activity to archive log files before storage or before sending them to another location using FTP or
email.
294
Details Tab
Include files in sub-folders Select this option to include any files that are
found within sub-folders of the folder that you
specified.
Store relative path in archive Select this option to store the files within the
same sub-folders that they were found in.
When this option is unselected, the files will be
added to the archive with the full path. For
example:
Selected: ..\subfolder1\file.txt, and
..\subfolder1\subfolder2\file.txt
Unselected: C:\files\subfolder1\file.txt, and
C:\files\subfolder1\subfolder2\file.txt
If the destination archive already exists Select the action that you want to take if a file
with the same name as the archive being
created already exists in the destination folder:
Add files to the existing archive: Select this
option to add the files that you specified to the
existing archive.
Overwrite the existing archive: Select this
option to overwrite the existing file with the
archive that you are creating.
Fail if the archive exists: Select this option to
cause the Compress File activity to fail if the
filename already exists.
Create a unique named archive: Select this
option to append a value to the filename to
295
Settings Configuration Instructions
create a unique filename that does not conflict
with the existing filename.
Published Data
The following table lists the published data items.
Item Description
Archive name and path The name and path of the archive file that was
created.
Number of files within archive The number of files inside the archive file.
Copy File
The Copy File activity copies a file from one directory to another. You can also copy files to
network shares that are available using UNC paths. Use the Copy File activity to copy important
files that have been created or modified in a folder that is being monitored by the Monitor Folder
activity to a backup location.
296
Details Tab
File Type the path and name of the file that you
want to copy. You can use the * and ?
wildcards to specify the file name or path.
These wildcards behave the same way as in
the Windows Command Prompt.
Include sub-folders Select this option to copy any files within the
sub-folders of the path you have specified that
match the filename that you have specified.
Folder Type the path of the folder where you want the
files to be copied to.
If the destination exists Select the action that you want to take if a file
with the same name already exists in the
destination folder:
Overwrite: Select this option to overwrite the
existing file with the file that is being copied.
Fail: Select this option to cause the Copy File
activity to fail if the filename already exists.
Create a file with a unique name: Select this
option to append a value to the filename to
create a unique name that does not conflict
with an existing name.
Advanced Tab
days Enter the number of days that you will use with
the File age measure.
Date of transfer Set the date of the file at the destination to the
date when it was copied to the folder.
Same as original Set the date of the file at the destination to the
date of the original file.
297
Published Data
The following table lists the published data items.
Item Description
Origin folder The path of the base folder where the file was
copied from.
Destination folder The destination folder where the file was copied
to.
Total number of files to be transferred The number of files that matched the criteria
that you specified.
Number of successful file operations The number of files that were successfully
copied.
Number of failed file operations The number of files that failed to copy.
Name and path of the file relative to the origin The relative path of the file starting from the
folder origin folder.
File age date options The option that was selected to evaluate the file
age.
Modified date option The option that was selected for the date to be
assigned to the destination file.
Name and path of the destination file The name and path that the file was copied to.
Name and path of the origin file The name and path that the file was copied
from.
Origin folder The path of the base folder where the file was
copied from.
298
Item Description
Destination folder The destination folder where the file was copied
to.
Total number of files to be transferred The number of files that matched the criteria
that you specified.
Number of successful file operations The number of files that were successfully
copied.
Number of failed file operations The number of files that failed to copy.
Name and path of the file relative to the origin The relative path of the file starting from the
folder origin folder.
File age date options The option that was selected to evaluate the file
age.
Modified date option The option that was selected for the date to be
assigned to the destination file.
Name and path of the destination file The name and path that the file was copied to.
Name and path of the origin file The name and path that the file was copied
from.
Create Folder
The Create Folder activity creates a new folder on the local file system or a network location
specified using a UNC path. Use the Create Folder activity to create folders dynamically with
names that represent the context in which they were created. For example, on August 25 you can
create "C:\backupfolderAug25".
299
Configuring the Create Folder Activity
Before you configure the Create Folder activity, you need to know the name of the folder that you
are creating.
Use the following information to configure the Create Folder activity.
Published Data
The following table lists the published data items.
Item Description
Decompress File
The Decompress File activity decompresses the files contained in a zip archive file. You can
extract files from zip archives that are downloaded using email or FTP.
Details Tab
File Type the path of the archive file that you want
to extract files from.
Files to extract Type the name of the file that you want to
extract. You can use the * and ? wildcards to
specify the file name. These wildcards behave
in the same way as in the Windows Command
Prompt.
300
Settings Configuration Instructions
same relative paths that they were saved in. To
use this feature, the relative paths must have
been stored in the zip archive when it was
created.
If the destination file exists Select the action that you want to take if a file
with the same name as the file being extracted
exists in the destination folder:
Create a file with a unique name: Select this
option to append a value to the filename to
create a unique filename that does not conflict
with an existing filename.
Overwrite: Select this option to overwrite the
existing file with the file that you are extracting.
Fail: Select this option to cause the
Decompress File activity to fail if the file name
already exists.
Published Data
The following table lists published data items.
Item Description
Archive name and path The name of the archive file that was
decompressed.
Number of files within archive The total number of files that are inside the
archive file.
Size of the decompressed files The total size of the files decompressed.
Delete File
The Delete File activity deletes files from the local file system or from a network location specified
using a UNC path. You can purge a folder that contains old log files.
301
Configuring the Delete File Activity
Before you configure the Delete File activity, you need to know which files you are deleting.
Use the following information to configure the Delete File activity.
Details Tab
Path Type the path and name of the file that you
want to delete. You can use the * and ?
wildcards to specify the file name. These
wildcards behave in the same way as the
Windows Command Prompt.
Delete files from sub-folders Select this option to delete any files within the
sub-folders of the path you have specified that
match the file name that you have specified.
days Type the number of days that you will use with
the file age measure.
Published Data
The following table lists the published data items.
Item Description
File age option The option that was selected to evaluate the file
age.
Name and path of the file The name and path of the file that was deleted.
Name and path of the file relative to the origin The relative path of the file starting from the
folder origin folder.
302
Item Description
Origin folder The path of the base folder where the file was
deleted from.
Number of failed file operations The number of files that were not deleted.
Number of successful file operations The number of files that were successfully
deleted.
Total number of files The number of files that matched the file that
you specified.
Delete files from sub-folders Indicates whether the Delete files from sub-
folders check box was selected.
Delete Folder
The Delete Folder activity deletes a folder, sub-folders, or the entire folder tree of a directory on
the local file system or a network location specified using a UNC path. You can delete temporary
folders that were created when a runbook runs or you can use this activity to purge data that has
been recently archived.
Details Tab
Delete the folder only if it is empty Select this option to delete the folder only if
there are no files or sub-folders in it.
Delete all files and sub-folders Select this option to delete the specified folder
and all sub-folders and files contained in that
303
Settings Configuration Instructions
folder.
Published Data
The following table lists the published data items.
Item Description
Folder pattern to match The pattern used to find the sub-folder that was
deleted.
Base Folder to start deletion from The Path that was specified on the Details tab.
Delete folder options The option that you selected for the delete
folder operation.
Name and path of the folder The name and path of the folder that was
deleted.
Details Tab
File Type the name and path of the file that you are
checking the status of, or click the ellipsis (...)
button and browse for it.
Include sub-folders Select this option to copy any files within the
304
Settings Configuration Instructions
sub-folders of the path you have specified that
match the filename that you have specified.
days Type the number of days that you will use with
the File age measure.
Published Data
The following table lists the published data items.
Item Description
Date and time the file was created The local date and time on which the file was
created.
UTC date and time the file was created The UTC date and time on which the file was
created.
Modified date option The option that was selected to search for files
according to a date range.
File folder The folder that the file was found in.
Name and path of the origin file The file name and path that was provided.
Last accessed date and time The date and time on which the file was
created in localized format.
Last accessed UTC date and time The date and time on which the file was
created in UTC format.
Last modified date and time The date and time on which the file was
305
Item Description
created in localized format.
Last modified UTC date and time The date and time on which the file was
created in UTC format.
Encoding type (text files only) The file encoding format used by the file, if the
file is a text file.
Monitor File
The Monitor File activity invokes a runbook when files that you specify in folders and sub-folders
have changed. You can monitor a file that indicates the completion of a transaction. For example,
there are nightly transfers sent to your runbook server, and when the transfer is complete a file
with the name "Complete" is written to the folder. This activity can automatically invoke a runbook
that processes all the files in the folder when the "Complete" file is created.
Details Tab
Include sub-folders Select this option to copy any files within the
sub-folders of the path you have specified that
match the filename that you have specified.
306
Settings Configuration Instructions
dialog box.
2. From the Name drop-down list, select
the criteria that you want to use. The
Relation and Value menu options
present custom options according to
the criteria that you select from the
Name list.
3. Select options from the Relation and
Value items.
4. Click OK.
Triggers Tab
Trigger if one of the files was Select a condition to invoke the activity if the
condition in the monitored file is true.
Trigger if file properties changed Select a condition to invoke the activity if the
condition in the monitored file is true.
Authentication Tab
Published Data
The following table lists the published data items.
Item Description
Name and path of the file The name and path of the file that was
monitored.
307
Item Description
box was selected.
Origin Folder The folder that the monitored file was stored in.
Notify if file attributes changed Indicates that the Attributes check box was
selected.
Notify if file creation time changed Indicates that the Creation time check box was
selected.
Notify if file last access time changed Indicates that the Last access time check box
was selected.
Notify if file last write time changed Indicates that the Last write time check box
was selected.
Notify if file security changed Indicates that the Security check box was
selected.
Monitor Folder
The Monitor Folder activity invokes a runbook when the folder that you specified has changed, or
if the files within that folder have been changed. You can monitor the size of log files in a folder. If
the files grow too large, the Monitor Folder activity can invoke a runbook that will archive, backup,
and then purge the log files to clean up the folder.
308
What condition invokes the runbooks.
Optionally, you may need to know what file types you want to monitor.
Use the following information to configure the Monitor Folder activity.
Details Tab
File Filters Create filters with custom criteria for the files
that you want to monitor. Perform the following
for each filter that you want to create:
Triggers Tab
Total file size is Select this option to invoke the Monitor Folder
activity if the total file size of the folder is
greater than or less than the value that you
309
Settings Configuration Instructions
provide. Select the criteria from the first drop-
down list, type the value in the field, and select
the unit of measure from the last drop-down list.
Authentication Tab
Published Data
The following table lists the published data items.
Item Description
Trigger if number of files changed Indicates that the Number of files is check box
was selected.
Trigger if total file size changed Indicates that the Total file size is check box
was selected.
Number of files relation The relation that was used to evaluate the
Number of files is option.
Total file size measure The unit of measure selected to evaluate the
Total file size is option.
Total file size relation The relation that was used to evaluate the
Total file size is option.
310
Item Description
Total file size number The number given to evaluate the Total file
size is option.
Move File
The Move File activity moves a file from one directory to another. You can move files to network
shares that are available using UNC paths. You can also move files from a local or publicly
available network folder, such as an FTP location, to an internal folder.
Details Tab
File Type the path and name of the file that you
want to move. You can use the * and ?
wildcards to specify the filename and path.
These wildcards behave the same way as in
the Windows Command Prompt.
Include sub-folders Select this option to move any files within the
sub-folders of the path you have specified that
match the filename that you have specified.
Folder Type the path of the folder where you want the
files to be moved to.
If the destination exists Select the action that you want to take if a file
with the same name already exists in the
destination folder:
Overwrite: Select this option to overwrite the
existing file with the file that is being moved.
Fail: Select this option to cause the Move File
311
Settings Configuration Instructions
activity to fail if the filename already exists.
Create a file with a unique name: Select this
option to append a value to the filename to
create a unique name that does not conflict
with an existing name.
Advanced Tab
days Enter the number of days that you will use with
the File age measure.
Date of transfer Set the file date at the destination to the date
when it was copied to the folder.
Same as original Set the date of the file at the destination to the
date of the original file.
Published Data
The following table lists the published data items.
Item Description
Origin folder The path of the base folder where the file was
moved from.
Total number of files to be transferred The number of files that matched the file that
you specified.
Number of successful file operations The number of files that were successfully
moved.
Number of failed file operations The number of files that failed to move.
312
Item Description
succeeded or failed.
Name and path of the file relative to the origin The relative path of the file starting from the
folder origin folder.
File age date option The option that was selected to evaluate the file
age.
Modified date option The option that was selected for the date to be
assigned to the destination file.
Name and path of the destination file The name and path that the file was moved to.
Name and path of the origin file The name and path that the file was moved
from.
Move Folder
The Move Folder activity moves a folder and its sub-folders from one directory to another. You
can also move folders to network shares that are available using UNC paths. In addition, you can
take files from a local or network folder that are made publicly available as an FTP location and
move them to an internal folder.
Details Tab
313
Settings Configuration Instructions
for it. The Move Folder activity does not support
the * and ? wildcards.
Destination Type the path and name that you want to move
the folder to, or click the ellipsis (...) button to
browse for it.
Published Data
The following table lists the published data items.
Item Description
Origin name of the folder The path of the original folder that was moved.
Destination name of the folder The destination folder where the folder was
moved to.
New folder path The new path of the folder that was moved.
Details Tab
314
Settings Configuration Instructions
specify the files that you are decrypting. This
field will only accept characters from the current
system locale. If you use other characters, the
activity will fail.
Include sub-directories Select this option to find all files that match the
file name that you specified in all sub-
directories under the folder that you specified in
the path.
Output folder Type the path of the folder where you want the
decrypted files to be stored.
Create unique name Select this option to give the decrypted file a
unique name if a file with the same name
already exists.
Advanced Tab
Published Data
The following table lists the published data items.
Item Description
Keyring folder The path of Keyring folder that contains the key
used to decrypt the files.
315
Item Description
Output folder The path of the folder where the decrypted files
were saved.
Important
This activity supports DSS and RSA4 keys.
RSA keys are not supported by this activity.
Details
316
Settings Configuration Instructions
that you want to encrypt. This field only accepts
characters from the current system locale.
Include sub-directories Select this option to find all the files that match
the filename that you specified in all the
subfolders of the folder that you specified in the
path.
Output folder Type the path of the folder where you want the
encrypted files to be stored.
Create unique name Select this option to give the encrypted file a
unique name if a file with the same name
already exists.
File extension Type the file name extension that you want to
appended to the file name when it is encrypted.
The default extension is gpg.
Advanced
Key file Type the location of the PGP key file that you
will use to encrypt the files. If you leave this
field blank, the PGP Encrypt File activity uses
the file that you specify in the Keyring folder
field. Files can have any file name extension,
but *.asc is the standard.
Keyring folder Type the location of the folder that contains the
keyring that you will use to encrypt the files.
The public keyring file (*.pkr) may be renamed
with a *.gpg file name extension.
Important
The PGP Encrypt File activity creates
files in the keyring folder. The
Orchestrator Runbook Service account,
317
Settings Configuration Instructions
or the user account used to run the
runbook, requires read and write
permissions on the keyring folder.
Published Data
The following table lists the published data items.
Item Description
Key file The path of the key file used to encrypt the
files.
Keyring folder The path of keyring folder that contains the key
used to encrypt the files.
Output folder The path of the folder where the encrypted files
were saved.
318
Item Description
Print File
The Print File activity prints text files to a printer that you specify. You can use this activity to print
log files for paper filing before the data is moved or deleted from a server.
Details Tab
File Type the path and name of the file that you
want to print.
Printer Type the path of the printer that will print the
file.
days Enter the number of days that you will use with
the Age measure.
Published Data
The following table lists the published data items.
Item Description
Origin folder The path of the base folder where the file was
printed from.
Number of successful file operations The number of files that were successfully
printed.
319
Item Description
Number of failed file operations The number of files that failed to print.
Name and path of the file The path of the file that was printed.
Name of the printer The printer that was used to print the file.
Rename File
The Rename File activity renames files on the local file system or on a network location specified
using a UNC path. You can automatically rename files to a standard format according to your
data center procedures.
Details Tab
Destination This list displays all the file names that will be
renamed when this activity runs. To add a
filename, click Add to open the Rename
Properties dialog box, and specify the Old
name and then specify the file New name.
To edit the list of file names, click Edit. To
remove file names, click Remove.
320
Advanced Tab
days Type the number of days that you will use with
the File age measure.
Date of rename Select this option to set the date of the file at
the destination to the date when it was
renamed.
Same as original Select this option to set the date of the file at
the destination to the date of the original file.
Destination already exists Select the action that you want to take if a file
with the same name already exists in the folder:
Overwrite: Select this option to overwrite the
existing file with the file that is being renamed.
Fail: Select this option to cause the Rename
File activity to fail if the filename already exists.
Create a file with a unique name: Select this
option to append a value to the filename to
create a unique name that does not conflict
with an existing name.
Published Data
The following table lists the published data items.
Item Description
If destination exists The option that was selected for handling the
filename if the file existed in the destination
folder.
321
Item Description
Modified date option The option that was selected for assigning a
modified date to the file in the destination
folder.
File age days The number of days used in the File age filter.
Total number of files to be renamed The number of files that were renamed by the
operation.
Number of failed file operations The number of failed operations that occurred.
Name and path of the destination file The name and path of the destination file.
Name and path of the file relative to the origin The relative path of the file, relative to the origin
folder folder.
Name and path of the origin file The name and path of the origin file.
Pattern that matched file The pattern that the user entered that matched
the file or files that were found.
Pattern file renamed to The pattern that the file or files were renamed.
Email
The following table provides a brief description of tasks you can accomplish when using an Email
activity.
322
Send Email
The Send Email activity sends an email message using the standard SMTP protocol or an
Exchange server. You can use this activity to notify an administrator of problems that have
occurred with a system.
Important
If you put more than 1 MB of text directly into the message body, the activity can fail
during initialization. To avoid this issue, enter no more than 1 MB of text directly into the
message body or save the text to a file, and provide the file name as the message you
want to send.
Details
323
Settings Configuration Instructions
Format on the Advanced tab.
File: Type the name of the file that contains the
message body. To browse for the file name,
click the ellipsis (...) button next to the
Message box.
Task fails if an attachment is missing Select this box to cause the Send Email activity
to fail if any of the attachments cannot be found
when the email is being sent.
Advanced
Note
Some SPAM filters may not allow Rich
Text or HTML email.
324
Connect
Email address Type the email address that will be inserted into
the From: field of the email.
Published Data
The following table lists the published data items.
Item Description
Subject of the email The subject of the email that was sent.
The email message Recipient The address of the recipient of the email.
Name and path of the attached file The full path of the file that was attached.
Email account The SMTP account that was used to send the
email.
Outgoing mail server (SMTP) The name of the SMTP server used to send the
email.
Outgoing mail server port number The port used to communicate with the SMTP
server.
Outgoing mail server SSL enabled Indicates whether the mail server has SSL
enabled.
325
Notification
The following table provides a brief description of tasks you can accomplish when using each
Notification activity.
Details Tab
326
Settings Configuration Instructions
this event.
You can select Information, Warning, or
Error.
Published Data
The following table lists the published data items.
Item Description
Details Tab
327
Published Data
The following table lists the published data items.
Item Description
Activity Properties
Details Tab
Warning
328
The Runbook Designer does not warn you when you configure this activity and you
exceed the limits for the Summary or Details settings . If you exceed these limits, the
Runbook Designer does not allow you to check-in the runbook and a generic error is
shown. The runbook server generates an error if it attempts to process data that exceeds
these limits.
Published Data
Item Description
Utilities
The following table provides a brief description of tasks you can accomplish when using each
Utilities activity.
329
Tasks Utilities Activities
Run a web service with XML parameters you Invoke Web Services
specify.
Apply XSLT
The Apply XSLT activity enables you to transform the content of an XML file according to the
rules in an XSLT file that you specify. You can use the Apply XSLT activity to transform the
content of an XML file to an HTML file.
Details Tab
Input XML file Type the path and file name of the XML file that
330
Settings Configuration Instructions
you want to transform, or click the ellipsis
button (...) and browse for it.
Output XML file Type the path, filename, and file name
extension for the file that will hold the results of
the transformation. Alternatively, click the
ellipsis button (...) and browse for the folder
where you will save the file. From the Windows
Open dialog box, enter the file name and file
name extension in the File name box.
XSLT file Type the path and name of the XSLT file that
you want to use to transform the input XML file,
or click the ellipsis button (...) and browse for it.
Published Data
The following table lists the published data items.
Item Description
Input XML The path and file name of the XML file that will
be transformed.
Output XML The path and file name of the XML file that will
contain the result of the transformation.
XSLT file The path and file name of the XSLT file used to
transform the input XML file.
Query XML
The Query XML activity is used to perform an XPath query on an XML file. You can use this
activity to search for a string in an XML file.
331
Details Tab
XML File Select either this option or the XML Text option.
Type the path or URL of the XML file that you
want to search in, or click the ellipsis button (...)
and browse for it.
XML Text Select either this option or the XML File option.
Type the name of the element in the XML text
that you want to search in.
Published Data
The following table lists the published data items.
Item Description
Escaped XML Attributes The attributes found in the element tag of the
query result.
The input XML file The name of the XML file that you are
searching in. This item is blank if you used the
Block of XML option.
The input XML text The XML text that you searched in. This item is
blank if you used the XML File option.
The XPath query. The XPath query that was used in the search.
332
When you place this activity in a runbook, you must place it after the activities that create the
Published Data items that you want to transform, and you must place it before activities that will
use the new transformed items. . If you use the Map Published Data activity to transform variable
items, you can place it at the beginning of the runbook.
Mapping rules
Output Published Data Type the name that you want to assign to the
new Published Data item that you are creating.
333
Settings Configuration Instructions
Add, Edit, Remove If you want to add more rules, click Add and
repeat the Pattern and Map To configuration
instructions. On the Mapping rules tab, you will
see a list of all transformations you created.
To remove items from the rules list, click
Remove. To edit an item in the rules list, click
Edit.
Examples
The following examples describe how to use the Map Published Data activity.
Single Published Data or variable item
The Read Line activity creates a Published Data item called File and path name. If the path in
this item is expressed as a drive letter, you can create a mapping to convert it to a UNC path.
To convert the numbers expressed by one software program to the words used by
another
1. In the Source data field, insert the Published Data item for the severity level from the
software program that expresses severity levels in numbers.
2. In the Pattern field, type 1.
3. In the Map to field, type High.
4. Click Add.
5. Repeat for each severity level, such as 2, 3, and 4, match the appropriate word to
each numeric value.
334
6. Click OK.
To transfer severity levels to the software program that expresses them in words, insert the
Published Data item that you created in the field. Items from the originating software program
with a severity level of 1 are placed into the receiving software program with a severity level
of High.
Wildcards
You can replace strings of words with wildcards combined with words. For example, a
Published Data item can describe Windows Server 2008 R2 inconsistently, as either
Win2K8R2, or W2K8R2.
There are two wildcards available:
* - use the asterisk to search for any number of characters after your alpha-numeric search
character. For example, a* will produce aa, aaa, aaaa, aaabbb, and so on.
? - use the question mark to find a specified number of characters after your alpha-numeric
search character. For example, a?? will produce aaa, abb, abc, aac, but not aaaa or aaabbb,
and so on.
335
Published Data
This activity only generates Published Data that you specify.
Compare Values
The Compare Values activity compares two text values or two numerical values and then
determines whether or not they are equal. This activity can also be used to test error messages
or numbers against known issues and automatically route the runbook to the appropriate activity.
General Tab
Test Type the first text, select how you want the first
to be compared to the second text, and then
type the second text. From the drop-down
menu, when selecting the matches the pattern
or does not match pattern comparisons, use
the wildcards ? and * to specify the pattern.
336
Settings Configuration Instructions
sensitive.
Test that Type the first number, select how you want the
first to be compared to the second number, and
then type the second number.
Published Data
The following table lists the published data items.
Item Description
String to compare The first string that was entered for the
comparison. This published data is only
available when Compare Strings is selected
on the General tab.
String to compare to The second string that was entered for the
comparison. This published data is only
available when Compare Strings is selected
on the General tab.
Value to compare The first value that was entered for the
comparison. This published data is only
available when Compare Numeric Values is
selected on the General tab.
Value to compare to The second value that was entered for the
comparison. This published data is only
available when Compare Numeric Values is
selected on the General tab.
337
Write Web Page
The Write Web Page activity will create or add information to an HTML file. When creating new
web pages with the Write Web Page activity, you can use templates that can contain any of the
formatting that you require. When using the Write Web Page activity to create web pages, all
occurrences of the tags <DOC-TITLE> and <DOC-TEXT> will be replaced by the title and text
that you specify, respectively.
When using the Write Web Page activity to append to an existing web page, you will specify an
HTML tag that will mark the position where the page will be appended. The Write Web Page
activity will append the text above the HTML tag that you have specified.
The Write Web Page activity can be used to output the entire audit log of a runbook that was run
to correct a problem on the network. You can also use the Write Web Page activity to keep a
constant update of what maintenance runbooks are running and their status.
General Tab
Title Type the title of the web page. If you are using
a template, this value will replace <DOC-
TITLE> anywhere it appears in the template
file. If you are not using a template, this value
will be used within the <TITLE> tag in the
338
Settings Configuration Instructions
header of the HTML file.
Text Type the text of the web page. If you are using
a template, this value will replace <DOC-
TEXT> anywhere it appears in the template file.
If you are not using a template, this value will
be used within the <BODY> tag in the header
of the HTML file.
Template Type the path and file name of the template file
that you are using. You can also use the ellipsis
(...) button to browse for the file.
Folder Type the path of the folder where you want the
web page to be created.
File name Select to specify the file name of the web page
that will be created.
Create a file with a unique name Select to automatically generate a unique name
for the web page when it is created. This file
will have the extension .html.
Tag Type the tag that will mark the point where the
page will be appended. It is recommended to
use the default tag <OP-TAG-APPEND-WEB>.
Web page Type the path and file name of the web page
file that you are appending. You can also use
the ellipsis (...) button to browse for the file.
Published Data
The following table lists the published data items.
Item Description
Full path and name of Web Page The full path of the HTML file that was created
339
Item Description
or appended.
Source text of the web page created The text contained within the HTML file.
Title to add to the created web page The title that was added to the web page. This
published data is only available when Create
Web Page is selected on the General tab.
Text to add to the web page The text that was added to the web page. This
value is determined by the Text field in both the
Create Web Page and Append to Web Page
modes.
Important
For the Read Text Log activity to work correctly, every line in the text log file must begin
with a timestamp.
Details Tab
File Select and type the name of the log file that will
be read. You can also use the ellipsis (...)
button to browse for the file.
The most recent file in this folder Select and type the folder where the most
recent file that matches the pattern that you
specify will be read. You can also use the
340
Settings Configuration Instructions
ellipsis (...) button to browse for the folder.
Matching this pattern Type the file name pattern that will be used to
find the log file that will be read. You can use
the * and ? wildcards to specify the pattern.
These wildcards behave in the same way as
the Windows Command Prompt.
Read Select and specify the dates that the lines you
are reading are from:
lines between the dates…: Select and specify
the begin date and end date that make up the
range that will be read. The dates that you
specify must match the Timestamp format.
lines more recent than…: Select and specify
the oldest date of the logs that will be read. The
date that you specify must match the entered
Timestamp format.
new lines: Select to read all the logs that have
not previously been read by the Read Text Log
activity.
Code Description
341
Code Description
represented as '13'
Here are some examples of dates and their corresponding timestamp format.
Date Format
Published Data
The following table lists the published data items.
Item Description
Full path and name of the log file The full path of the log file that is being read.
Number of lines matching the condition The number of lines that were read.
Full line matching the filter, including timestamp The entire line as it appears in the log file.
Timestamp of matching line The timestamp of the line that was read.
Message of matching line The log message of the line that was read.
Write to Database
The Write to Database activity writes a row into a database table. This activity interacts with the
following databases:
Access
ODBC
Oracle
SQL Server
342
The Write to Database activity can be used to replicate important Windows Event Log Events to a
database table that is able to be queried and maintained.
Details Tab
Table name Type the name of the database table that you
are adding the row to.
Data The list displays all the fields in the table that
will be set. To add a field, click Add and enter
the Field name and Value. To remove a field,
select it and click Remove. To edit a field,
double-click the field name.
Connection Tab
343
Settings Configuration Instructions
that is associated with this database.
User name Type the user name for the workgroup file.
344
Timeout Tab
Use the security of the account assigned to Select this option if you want to run the Query
the service Database activity using the same account that
the runbook server uses.
Note
If you specify an invalid user name or
password, the account assigned to the
runbook server will be used to run the
activity.
Published Data
The following table lists the published data items.
Item Description
Table name The name of the table that was written to.
345
Item Description
data will only be available when ODBC is
selected on the Connection tab.
Oracle Service Name The service name. This published data will only
be available when Oracle is selected on the
Connection tab.
Access workgroup information file The Access workgroup file that is associated
with the Access database file. This published
data will only be available when Access is
selected on the Connection tab.
Query Database
The Query Database activity queries a database and returns the resulting rows as published
data. This activity supports the following database types:
Access
ODBC
Oracle
SQL Server
The Query Database activity can be used to query a database for the detailed description of an
error code that has appeared on one of the systems in the data center and then that description is
sent to an administrator in an email message.
Details
346
Warning
The Query Database activity does not support queries that return data as XML, such as
queries that use the FOR XML clause in SQL Server.
Connection
Important
When Orchestrator is installed on a non-English operating system, and you set the
Connection for Database type to SQL Server, the Server input value cannot be
localhost. You must use the actual computer name.
Configuration instructions for each Connection tab Database type are listed in the following
tables.
Access Connections
User name Type the user name for the workgroup file.
ODBC Connections
347
Settings Configuration Instructions
Oracle Connections
Timeout
Security Credentials
Use the security of the account assigned to Select this option if you want to run the Query
the service Database activity using the same account that
348
Settings Configuration Instructions
the runbook server uses.
Note
If you specify an invalid user name or
password, the account assigned to the
runbook server will be used to run the
activity.
Published Data
The following table lists the published data items.
Item Description
Numeric return value of the query When a query that returns a numeric value is
used, this will be the value. For example,
"Select COUNT(*) where FirstName=John"
Oracle Service Name The service name. This published data will only
be available when Oracle is selected on the
Connection tab.
349
Item Description
Access is selected on the Connection tab.
Access workgroup information file The Access workgroup file that is associated
with the Access database file. This published
xata will only be available when Access is
selected on the Connection tab.
Full line as a string with fields separated by ; The entire the row that was published with each
field in the row separated by a semi-colon (;).
Use the Field data manipulation function to
obtain the values of a field within the row
Monitor Counter
The Monitor Counter activity invokes a runbook when a counter has reached a value that you
specify. Each Monitor Counter activity monitors one counter.
Use the Monitor Counter activity to monitor a counter that counts the number of times that a
runbook has attempted to start a service. When that number reaches the number that you
configure in the Monitor Counter activity, the Monitor Counter activity can invoke a Send Email
activity to notify an administrator to investigate the problem.
Warning
Before you can use this activity, you must configure a Counter.
The value that will invoke the runbook
Use the following information to configure the Monitor Counter activity.
Published Data
The following table lists the published data items.
Item Description
350
Get Counter Value
The Get Counter Value activity retrieves the value of a counter and returns it as a published data
item. Wherever you need to use the value of a counter, use the published data that is published
by the Get Counter Value to retrieve that value.
Warning
Before you can use this activity, you must configure a Counter. To modify a counter, use
the Modify Counter activity
Use the following information to configure the Get Counter Value activity.
Details Tab
Published Data
The following table lists the published data items.
Item Description
Modify Counter
The Modify Counter increments and decrements a counter, as well as resets it to its default value.
It also sets it to a value you specify. Wherever you need to update the value of a counter, use the
Modify Counter activity to update its value.
The current value of a counter is specific for every runbook that uses that counter. The first time a
counter is used, the default value that has been specified in the counters configuration will be
used. You can only modify the value of counters in a runbook using the Modify Counter activity.
351
Configuring the Modify Counter Activity
Before you configure the Modify Counter activity, you need to determine the following:
The counter you are updating.
The type of update that will be made.
Use the following information to configure the Modify Counter activity.
Details Tab
Published Data
The following table lists the published data items.
Item Description
352
Configuring the Invoke Web Services Activity
Before you configure the Invoke Web Services activity, you need to determine the following:
WSDL file of the web service
Web service method name
Input SOAP message body format
Output SOAP message body format
Use the following information to configure the Invoke Web Services activity.
Details
XML Request Payload Type the parameters that you are sending to
the web service method. Make sure that the
format matches what is described in the WSDL
document.
Advanced
353
Security
User name Type the user name to access the secured web
service.
Details
354
Accept certificates from trusted hosts Details
Accept certificates from trusted hosts Specifies the hosts you want to accept the
certificates from.
1. Click Add to open the Trusted Host dialog
box.
2. Type the trusted host name in the Value
box, and click OK. The host is then added
to the list.
To edit hosts, click Edit.
To remove hosts, click Remove.
Published Data
The following table lists the published data items.
Item Description
Web Service protocol The protocol that the web service uses.
355
Format Date/Time
The Format Date/Time activity enables you to transform existing date and time formats into
custom formats that you create.
Details Tab
356
To specify a date/time format, you must enter the codes that represent each part of the date and
time.
Code Description
Note
This format is only supported for the
output format.
357
Code Description
Note
This format is only supported for the
output format.
358
Here are some examples of dates and times and their corresponding format:
Format Date
Published Data
The following table lists the published data items.
Item Description
Format Result without adjustments The formatted result, but without any
adjustments made to it.
Input Format The format of the date and time that was
entered as the input time.
Output Format The format of the date and time that was
entered as the output time.
Details Tab
359
Settings Configuration Instructions
the string to include, for example, 45.
Text Contents Select the options for the items that you want
the Generate Random Text activity to include in
the random text string. In the Minimum Quantity
field for each option that you select, type the
minimum number of these characters that you
want to include in the string. The total of all
Minimum Quantity fields must not be more than
the number you typed in the Text Length field.
Lower-Case Characters
Upper-Case Characters
Numbers
Symbols
Published Data
The following table lists the published data items.
Item Description
Random text length The length of the text that was generated.
360
Details Tab
Network path Type the network path that you want to connect
to in UNC format (\\servername\foldername), or
click the ellipsis button (...) and browse for it.
Verify that the network path that you want to
map does not already exist.
User account Type the user account that you need to access
the network path.
Published Data
The following table lists the published data items.
Item Description
User account The user account that you used to access the
network path.
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
361
Use the following information to configure the Disconnect Network Path activity.
Details Tab
Network path Type the name of the network path that you
want to disconnect, or click the ellipsis button
(...) and browse for it.
Published Data
The following table lists the published data items.
Item Description
Note
You cannot set individual security credentials for this activity. It will run under the service
account configured for the Runbook Service on the Runbook server where the instance
of the activity is running. This account must have the authority to access the resources
and perform the actions required by this activity.
Connection Tab
Dial-up or VPN entry Type the name of the entry as entered in the
address book, or click the ellipsis (…) button
and select the entry from the Remote Access
Phone Book.
362
Published Data
The following table lists the published data items.
Item Description
Connect/Disconnect Dial-up
The Connect/Disconnect Dial-up activity connects or disconnects a dial-up connection or VPN.
The connection must be configured on the Runbook server before the activity can use it. For
more information on creating a network connection in Windows Server 2008, see Establish
Network Connections
Connection Tab
Dial-up or VPN entry Type the name of the entry as entered in the
address book, or click the ellipsis (…) button
and select the entry from the Remote Access
Phone Book.
363
Authentication Tab
Published Data
The following table lists the published data items.
Item Description
Domain name credential The domain name used by the activity when
establishing a connection
User name credential The user name used by the activity when
establishing a connection
Caution
If permissions on the Orchestrator installation path are changed and the activity’s
Security Credentials has a custom user account that does not include Read/Execute
permissions to ExecutionData.dll on the Runbook server, the activity will fail.
364
Tasks Text File Management Activities
Insert lines into a text file on a line number you Insert Line
specify.
Search for and replaces text in a file. Search and Replace Text
Append Line
The Append Line activity appends a line of text into a text file. Use the Append Line activity to
append lines to a log file to create audits trails of runbooks.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
Details Tab
File Type the path and name of the file that you
want to append the text to, or click the ellipsis
button (...) and browse for it.
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format. If the file uses a
different encoding format, the activity fails.
Text Type the text that you want to append to the file
365
Settings Configuration Instructions
that you specified.
Published Data
The following table lists the published data items.
Item Description
File path The path and file name of the text file to which
the line is appended.
Line text The text of the line that was appended to the
text file.
Line number The line number where the text was appended.
Delete Line
The Delete Line activity deletes lines from a text file. Use the Delete Line activity to delete
outdated lines of text from a text file.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
Details Tab
File Type the path and name of the file that you
want to delete the text from, or click the ellipsis
button (...) and browse for it.
366
Settings Configuration Instructions
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format. If the file uses a
different encoding format, the activity fails.
Line numbers Type the line numbers of the text that you want
to delete from the file that you specified.
To specify a range of lines, use a hyphen: 1-3.
This deletes lines 1 to 3.
To specify specific lines, use a comma: 5,7,9.
This deletes lines 5, 7, and 9.
Combine the range and specific lines: 1-3,5,7,9.
This deletes lines 1 to 3, and lines 5, 7, and 9.
To specify from a specific line to the last line of
the file, type the line number, hyphen, and
END: 4-END. This deletes lines 4 to the last
line of the file.
To specify from a specific line to a line relative
to the last line of the file, type the line number,
hyphen, the less-than sign, and the line number
relative to the end line: 4-END<3. If the file has
20 lines, this deletes lines 4 to 17 from the file.
<3 represents the third line from the end.
To specify the last number of lines, type
LASTLINES, colon, and the last number of lines
that you want to delete: LASTLINES:10. This
deletes the last 10 lines of the file.
Combine different types of operations: 1-5, 8,
10-END<20, LASTLINES:10. This deletes lines
1 to 5, line 8, line 10 to the 20th line from the
end, and the last 10 lines. Do not overlap lines
or line ranges when combining operations. For
example, 5-END, LASTLINES:10 fails because
the 5-END operation already deletes to the
end, so the LASTLINES:10 operation cannot
succeed because the lines are already deleted,
and the activity fails.
Important
Do not specify lines numbers that do
367
Settings Configuration Instructions
not exist in the file, and do not specify a
line number more than once, or the
activity fails.
Published Data
The following table lists the published data items.
Item Description
File name The file name of the text file from which the line
is deleted.
Line number The line number of each line that was deleted.
A Published Data item is created for each line
that was deleted.
Line numbers The line number range that the user typed in
the field.
Deleted text The text that was deleted from the file.
Find Text
The Find Text activity finds lines in a text file. Use the Find Text activity to find according to a
search string that you specify.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
368
Details Tab
File Type the path and name of the file that you
want to find the text in, or click the ellipsis
button (...) and browse for it.
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format: if the file uses a
different encoding format, the activity fails.
Search text Type the text that you are searching for in the
file.
Case sensitive Select this option to search only for lines where
the case of the words matches the text from the
Search text field exactly.
Published Data
The following table lists the published data items.
Item Description
File name The name of the file that was searched for text.
Return first line or all lines Indicates whether the Only the first line that
matches the text will be published or All lines
that match the text will be published option was
369
Item Description
selected.
Line number of match The line number where matching text was
found.
Number of lines matched The number of lines where matching text was
found.
Original line The entire line that contains the matching item.
Search text The search string that was used for the search.
Get Lines
The Get Lines activity gets multiple lines from a text file according to criteria that you specify. You
can use the Get Lines activity to get specific lines from any location in a text file.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
Details Tab
File Type the path and name of the file that you
want to get the text from, or click the ellipsis
370
Settings Configuration Instructions
button (...) and browse for it.
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format. If the file uses a
different encoding format, the activity fails.
Lines Click Add to open the Add Line dialog box and
create filters for the lines that you want to get
from the file:
Name: Search for lines by their name.
Range: Search for lines by their range.
Published Data
The following table lists the published data items.
Item Description
File path The filename and path of the file that the lines
were taken from.
#Name# line text For each item that you add in the lines list of
the dialog, a new published data item is
created. This item displays the line text of each
item in the Lines list. #Name# represents the
name that you assigned in the Name field.
#Name# line numbers For each item that you add in the Lines list of
the dialog, a new published data item is
created. This item displays the line numbers
where text was found from each item in the
Lines list. #Name# represents the name that
you assigned in the Name field.
Total Number of Lines in the Ranges Specified The total number of lines that were found in the
ranges that were specified.
371
Insert Line
The Insert Line activity inserts lines into a text file on a line number that you specify.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
Details Tab
File Type the path and name of the file that you
want to insert the text into, or click the ellipsis
button (...) and browse for it.
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format. If the file uses a
different encoding format, the activity fails.
Text Type the text that you want to insert into the
file.
Line number Type the line number where the text will be
inserted.
Published Data
The following table lists the published data items.
Item Description
File name The name of the file that the text was inserted
into.
372
Item Description
Line number The line number that was inserted, if only one
line was inserted.
Read Line
The Read Line activity reads lines from a text file. You can use the Read Line activity to read
lines from a text file and pass them to another activity using published data.
This activity replaces functionality in the Manage Text File legacy activity from Opalis 6.3.
Details Tab
File Type the path and name of the file that you
want to read the text from, or click the ellipsis
button (...) and browse for it.
File encoding Click the ellipsis button (...) and select the
format that the file is encoded in from the File
encoding drop-down list. Verify that you select
the correct encoding format. If the file uses a
different encoding format, the activity fails.
Line numbers Type the line numbers of the text that you want
to read from the file that you specified.
To specify a range of lines, use a hyphen:
1-3. This reads lines 1 to 3.
To specify specific lines, use a comma:
5,7,9. This reads lines 5, 7, and 9.
Combine the range and specific lines: 1-
3,5,7,9. This reads lines 1 to 3, and lines 5,
7, and 9.
To specify from a specific line to the last
line of the file, type the line number,
hyphen, and END: 4-END. This reads lines
4 to the last line of the file.
373
Settings Configuration Instructions
To specify from a specific line to a line
relative to the last line of the file, type the
line number, hyphen, the less-than sign,
and the line number relative to the end line:
4-END<3. If the file has 20 lines, this reads
lines 4 to 17 from the file. <3 represents the
third line from the end.
To specify the last number of lines, type
LASTLINES, colon, and the last number of
lines that you want to delete:
LASTLINES:10. This reads the last 10 lines
of the file.
Combine different types of operations: 1-5,
8, 10-END<20, LASTLINES:10. This reads
lines 1 to 5, line 8, line 10 to the 20th line
from the end, and the last 10 lines. Do not
overlap lines or line ranges when
combining operations. For example, 5-
END, LASTLINES:10 fails because the 5-
END operation already reads to the end, so
the LASTLINES:10 operation cannot
succeed because the lines are already
read, and the activity fails.
Important
Do not specify lines numbers that do
not exist in the file, and do not specify a
line number more than once, or the
activity will fail.
Published Data
The following table lists the published data items.
Item Description
File name The file name of the text file that was read.
374
Item Description
Line number The line number of the text that was read. A
published data item is created for each line that
was read.
Line numbers The line number range that the user typed in
the field.
Details Tab
File Type the path and name of the file that you
want to read the text from, or click the ellipsis
button (...) and browse for it.
File encoding Click the ellipsis button (...) to open the File
Encoding dialog box and select the format that
the file is encoded in from the File Encoding
drop-down list. Verify that you select the correct
encoding format: if the file uses a different
encoding format, the activity fails.
Search text Type the text that you are searching for in the
file.
Case sensitive Select this option to search only for lines where
the case of the words matches the text from the
375
Settings Configuration Instructions
Search text field exactly.
Replacement text Type the text that you want to replace the
search text with.
Published Data
The following table lists the published data items.
Item Description
File name The name of the file that was searched for text.
Line number of match The line number where matching text was
found.
Modified line The entire line of text as it was written after the
replace operations occurred.
Number of lines matched The number of lines where matching text was
found.
Replace text The text that was used to replace the search
text.
Search text The search string that was used for the search.
376
Runbook Control
The following table provides a brief description of tasks you can accomplish with each activity.
Tasks Activity
See Also
Standard Activities
Invoke Runbook
The Invoke Runbook activity launches a runbook that you have specified. You can transfer data
to runbooks by configuring an Initialize Data activity in the invoked runbook. You can return data
from the invoked runbook by configuring a Return Data activity.
You can use the Invoke Runbook activity to invoke generic runbooks that only perform specific
actions that do not depend on how the runbook is invoked. For example, you can create a
runbook that calls separate runbooks to perform a backup maintenance procedure that in turn
calls a runbook to shut down services, another runbook to back up data, and then a final runbook
to restart the services.
Important
If you modify the folder name or location of a runbook, you must also re-configure any
Invoke Runbook activity that references the modified runbook.
377
Details
Important
Do not invoke a runbook that starts with
a Monitor activity.
Important
Do not select Wait for completion if
any return data in the invoked runbook
is also return data in the invoking
runbook.
Runbook Servers Type the list of runbook servers that will run this
runbook. Separate each name with a semi-
colon (;). The order in which the runbook
servers are listed will be the order used for
failover and load balancing of the runbook. The
runbook server names must correspond to the
names that are displayed within the runbook
server’s tree in the Orchestrator Deployment
Manager. Leave this field blank to use the
runbook or global defaults for the runbook
378
Settings Configuration Instructions
server assignment.
Published Data
The following table lists the published data items from the Invoke Runbook activity.
Item Description
The Invoke Runbook activity returns any data that the invoked runbook has defined in the
Returned Data tab of the runbook properties. The values of these properties must be populated
using Return Data activity in that workflow. If the current runbook needs to return data from the
invoked runbook, then it must have its own Return Data activity that includes these values.
Credentials
If you use the Invoke Runbook activity and you use Security Credentials, the account you use
must be a member of the Orchestrator System group to run successfully.
See Also
Initialize Data
Return Data
Security Credentials
Initialize Data
The Initialize Data activity is a starting point for runbooks that require parameters from an Invoke
Runbook activity. The Initialize Data activity is invoked by an Invoke Runbook activity. You can
use the Initialize Data activity to launch generic runbooks that only perform specific actions. For
example, use the Initialize Data activity to specify the files to back up in a runbook that performs
backup operations. To return data to the invoking runbook, end the runbook’s workflow with a
Return Data activity.
379
Configuring the Initialize Data activity
Before you configure the Initialize Data activity, you need to know the parameters that you want
to use within your runbook.
Use the following information to configure the Initialize Data activity.
Published Data
Each parameter that you have configured is available as published data to the other activities in
the runbook while the runbook is running. To pass data back to the invoking runbook, use the
Return Data activity.
See Also
Invoke Runbook
Return Data
Junction
The Junction activity allows you to wait for multiple branches in a runbook to complete before
continuing past the junction. This activity can also publish data again from any branch so that
downstream activities past the Junction activity can consume the data. Data from different
branches than the one you selected will not be available.
You can choose to propagate no data from any of the branches previous to the Junction activity.
When you select an activity, the junction runs once, regardless of the data provided in previous
activities. For example, a Monitor File activity waits for files to be added to a folder. When the files
are added, two branches in the runbook will copy the file to a new location and at the same time,
read the lines of the files and add them to master file. The Junction activity waits for all these to
complete and then propagates the data from the Copy File branch and the Delete File activity will
delete the original files.
Details Tab
Return data from Click the ellipsis (...) button and select the
activity whose data you want to publish again to
380
Settings Configuration Instructions
the activities that follow the junction. From the
Select an Activity dialog box, choose <None>
to propagate no data to the activities following
the junction.
Published Data
The following table lists the data items published by this activity.
Item Description
Selected branch The activity that was selected to have its data
published.
See Also
Standard Activities
Return Data
The Return Data activity allows you to return data from the current runbook to a runbook that
invoked the runbook. You configure the runbook data by configuring the data parameters in the
Runbook Properties dialog box.
Published Data
The available published data items depend on the defined data elements.
See Also
Invoke Runbook
Initialize Data
381
Service Reporting in System Center 2012 R2
Service Reporting in System Center 2012 R2 enables administrators at IT hosting providers to
view tenant consumption of virtual machines, resources (computation, network, and storage), and
operating system inventory in their infrastructure.
Setup
The setup program for Service Reporting installs the component and creates the Service
Reporting data warehouse.
Data sources
Service Reporting obtains computation resource usage and inventory data from System
Center 2012 – Operations Manager and from Windows Azure Pack for Windows Server. After
you run the setup program, you edit and run Windows PowerShell® scripts to configure Service
Reporting to retrieve data from source systems.
Microsoft Update
During Service Reporting setup, you can choose to enable Microsoft Update if you want to
automatically update Service Reporting when an update is available.
See Also
Getting Started with Service Reporting
Service Reporting in System Center 2012 R2
383
Overview of Service Reporting
Administrators for hardware and server operating systems and hosting providers are often asked
to produce detailed reports about the consumption of virtual machine resources and to do billing
for their tenants. Collecting the data to create the reports typically requires using many disparate
tools, and determining the allocation and consumption of tenant resources is often time-
consuming. Internally developed custom tools often do not satisfy all the needs of a hosting
provider.
When collected and reported data is inconsistent, a hosting provider’s revenue can be
underreported and tenants might be overbilled. Providing incorrect consumption information can
damage the profitability of a business and harm relationships with tenants.
A hosting provider can use the reporting information in Service Reporting to deliver transparent
and accurate usage data to managers and tenants.
Benefits
After you deploy the Windows Server 2012 operating system, Windows Azure Pack for Windows
Server, and System Center 2012 R2, you have all the tools that you need to understand your
tenants' consumption of virtual machine resources and Windows Azure Pack services. Then, you
can generate reports that you can use to:
Create detailed views, for each tenant, of the consumption of the computational, memory,
storage, and networking resources for virtual machines and for Windows Azure Pack
services.
Add accuracy in the billing process and reduce underreporting.
Reduce time and costs of managing and developing a usage tracking system.
Help your business offer services to tenants that other businesses might not offer.
By using Service Reporting, you can easily view and run monthly reports to share with tenants.
You can provide detailed information to managers. You can emphasize areas where incorrect or
incomplete tracking data contributes to revenue loss, and call attention to areas that are most
profitable.
Architecture
Service Reporting is installed as an optional component of System Center 2012 R2. You can
install it by using the initial setup page for System Center 2012 R2 Orchestrator. After you install
Service Reporting, you can use Windows PowerShell® scripts to configure it. The scripts
establish a connection from the Service Reporting data warehouse to the Windows Azure Pack
Usage endpoint and to System Center 2012 – Operations Manager. However, Virtual Machine
Manager data from Operations Manager is available only when its agents monitor System Center
2012 R2 Virtual Machine Manager.
384
After Service Reporting is configured, users open the sample Microsoft Excel files and modify the
connection information to point to the Microsoft SQL Server Analysis Services database that is
part of the Service Reporting data warehouse.
The Service Reporting data warehouse gathers information from the following sources:
Windows Azure Pack for usage data about its VM clouds
Operations Manager agents for information about fabric capacity data, which is gathered from
System Center 2012 R2 Virtual Machine Manager
However, the inventory component of Service Reporting does not depend on Windows Azure
Pack, so Service Reporting can provide inventory reporting for the environment even if Windows
Azure Pack is not installed.
SSIS jobs
The SQL Server Agent job in Service Reporting schedules SQL Server Integration Services
(SSIS) package execution periodically. It gathers data from Windows Azure Pack and then
processes the data. Then, it gathers data from Operations Manager and processes that data.
Occasionally, you must use Windows PowerShell cmdlets to change credentials, such as
passwords, that the SSIS jobs use.
Reports
The sample reports highlight the capability of online analytical processing (OLAP) data cubes and
show usage and capacity data from virtual machines. These reports also show an inventory of
operating systems that tenants use. Service Reporting collects data for the reports hourly and
stores the data until database grooming occurs.
The sample reports are stored in a file share when Service Reporting is installed.
See Also
Getting Started with Service Reporting
Service Reporting in System Center 2012 R2
Support topics
Release Notes for System Center 2012 R2 - Service Reporting
Contains information about issues that you should be aware of before you install Service
Reporting.
System Requirements for Service Reporting
Describes the hardware and software requirements for Service Reporting.
385
Troubleshooting Service Reporting
Contains information that you can use to troubleshoot common problems with Service
Reporting.
Known issues
386
Workaround: To avoid this situation, exit Setup when it fails to detect prerequisites. Correct the
deficiency, and then run Setup again.
See Also
Service Reporting in System Center 2012 R2
Support for Service Reporting
Hardware
Service Reporting Setup requires 100 gigabytes (GB) of free disk space. After installation, the
majority of disk space that Service Reporting uses is reserved for the data warehouse databases.
Initially, the size of the databases is small. After data is collected over time, the databases grows
but usually does not exceed 60 GB. However, the maximum possible total size of the databases
is 100 GB.
Note
The data warehouse online analytical processing (OLAP) instance in Service Reporting
can use an extensive amount of RAM.
Software
The setup program verifies that the software is installed on the server where you install Service
Reporting. If any prerequisites are missing, Setup cannot finish successfully.
Operating systems
Service Reporting supports the following server operating systems:
Windows Server® 2012 R2
Service Reporting supports Enterprise and Standard editions, although we recommend the
Enterprise edition. Regardless of the edition that you use, you can use a Server Core
installation.
Windows Server 2012
Service Reporting supports all editions, although we recommend the Enterprise edition.
Regardless of the edition that you use, you can use a Server Core installation.
387
Running Service Reporting on Windows Azure virtual machines
Service Reporting runs on Windows Azure just as it does on physical computer systems. It is
recommended on Windows Azure for the primary purpose of Service Reporting, which is the
collection and reporting of usage and inventory data gathered from System Center 2012 R2
Operations Manager and Windows Azure Pack for Windows Server endpoints.
Service Reporting was tested by Microsoft by installing and using it in a Windows Azure virtual
machine. The testing concluded that Service Reporting was fully functional by it operating exactly
the same as on physical hardware.
Stability and performance benchmarks inside a Windows Azure virtual machine were at a level
where no special considerations were needed.
388
Service Provider Foundation is a component of System Center 2012 R2, and it provides an
extensible OData web service that interacts with VMM. This enables service providers and
hosting providers to design and implement multitenant self-service portals that integrate IT as
a service (IaaS) capabilities that are available in System Center 2012 R2. You can read more
about installing Service Provider Foundation at How to Install Service Provider Foundation
2012 R2.
Note
Service Provider Foundation Setup is a part of System Center 2012 R2 Orchestrator.
4. Windows Azure Pack for Windows Server
You do not need Windows Azure Pack to view information about inventory reporting or virtual
machine fabric from Operations Manager. However, to view usage data for virtual machines,
you can use Windows Azure Pack as an optional, but important, source of usage data about
hosted services that Service Reporting can report on. You can read more about installing and
configuring Windows Azure Pack at Deploy Windows Azure Pack for Windows Server.
Later, after you install Service Reporting, you create the connection to the Windows Azure
Pack Management database by using the information at How to Configure Service Reporting
for Windows Azure Pack and System Center.
After you install and configure all the System Center 2012 R2 components and Windows Azure
Pack requirements, you have all the systems in place for Service Reporting installation.
SQL Server
Service Reporting supports the following versions of Microsoft SQL Server software.
Note
Service Reporting supports the Standard edition for Microsoft SQL Server 2012 and
SQL Server 2008 R2, and that edition provides acceptable performance behavior.
However, some of the advanced features of SQL Server are constrained in the Standard
edition.
SQL Server 2012 Enterprise and Standard editions. Configuration requirements are as
follows:
You must configure SQL Server services by using a domain account to ensure that SQL
Server Analysis Services, SQL Server (MSSQLSERVER), and SQL Server Agent
(MSSQLSERVER) start by using the domain account credentials. You cannot use Local
System for SQL Server services with Service Reporting because a remote server that is
running SQL Server cannot access the InstallationDrive:\Program Files\Microsoft System
Center 2012 R2\Service Reporting\SSISPackages folder share. The account must have
read access to the Operations Manager database for retrieval of source data.
Service Reporting supports SQL Server 2012 AlwaysOn availability groups. For more
information about SQL Server 2012 AlwaysOn failover clustering, see SQL Server 2012
AlwaysOn: Multisite Failover Cluster Instance.
Service Reporting requires the SQL Server Integration Services (SSIS) role on the server
or servers where you want to install the Service Reporting data warehouse databases.
389
During Service Reporting installation, respective SSIS packages are created in the
servers. These packages use functions that SSIS provides for processing in the data for
the Service Reporting data warehouse.
Service Reporting requires the SQL Server Analysis Services role on the server or
servers where you want to install the Service Reporting OLAP databases. During Service
Reporting installation, a SQL Server instance is created that hosts the SQL Server role.
Service Reporting requires SQL Server 2012 Analysis Management Objects on the
server where you are installing Service Reporting.
SQL Server 2008 R2 Enterprise and Standard editions. SQL Server 2008 R2 has the same
configuration requirements as SQL Server 2012.
390
Data warehouse OLAP instance in Service Reporting
During Service Reporting installation, the SQL Server Analysis Services instance of the Service
Reporting data warehouse is created with the following configuration (shown with minimal
hardware):
16 GB of RAM
2 CPUs
UsageAnalysisDB database, in a size that is determined by the data volume in the data
warehouse
Note
This SQL Server instance can use an extensive amount of RAM.
Chinese Chinese_Simplified_Pinyin_100_CI_AS
Czech Czech_100_CI_AS
Danish Danish_Norwegian_CI_AS
Finnish Finnish_Swedish_100_CI_AS
French French_100_CI_AS
Greek Greek_100_CI_AS
Hungarian Hungarian_100_CI_AS
Japanese Japanese_XJIS_100_CI_AS
Korean Korean_100_CI_AS
Norwegian Norwegian_100_CI_AS
Polish Polish_100_CI_AS
Russian Cyrillic_General_100_CI_AS
Spanish Modern_Spanish_100_CI_AS
391
Language Windows collation
Swedish Finnish_Swedish_100_CI_AS
Turkish Turkish_100_CI_AS
Excel 2010
Service Reporting requires Microsoft Excel 2010 or Excel 2013 for viewing usage and inventory
reports. You can install Excel on any computer that has network connectivity to the Service
Reporting data warehouse. Excel Viewer is not supported because it does not support viewing
data cubes.
After you install Service Reporting, Excel workbooks that contain the Service Reporting reports
are installed in the following folder:
InstallationDrive:\Program Files\Microsoft System Center 2012 R2\Service Reporting\Reports
See Also
Service Reporting in System Center 2012 R2
Support for Service Reporting
Release Notes for System Center 2012 R2 - Service Reporting
392
No data appears in the Service Reporting reports
Description: After you have installed Service Reporting, no information appears in reports.
Action: Enable logging to see if you can identify the problem. Keep in mind that logging only
occurs when Windows Azure Pack for Windows Server calls the usage endpoint. To enable and
review Analytic and Debug logging, perform the following steps.
1. Log on to the server running Service Provider Foundation and run Eventvwr.msc.
2. Enable the Microsoft/Service Provider Foundation/Core/The Analytic Channel for the SPF
Core log.
3. Filter the log for warning and critical error events to determine if the problem was logged.
Action: Verify that the app pool account is configured for the Service Provider Foundation Usage
endpoint has connect and query access to both the Operations Manager data warehouse and the
Service Provider Foundation database.
Action: Verify that account used to access the Service Provider Foundation Usage endpoint from
Windows Azure Pack is a member of the SPF_Usage group on the server that hosts the Service
Provider Foundation Usage endpoint.
Action: Ensure that you have registered the Service Provider Foundation Usage endpoint with
Windows Azure Pack. Verify that the correct URL was specified properly.
See Also
Support for Service Reporting
Service Reporting in System Center 2012 R2
System Requirements for Service Reporting
Planning topics
Preparing Windows Azure Pack and System Center Components for Service Reporting
Provides preparatory information about Windows Azure Pack for Windows Server and
System Center 2012 R2 components for use with Service Reporting.
393
Support for Service Reporting
Deploying Service Reporting
Operating Service Reporting
394
3. Data is analyzed by Service Reporting and stored long-term.
a. Service Reporting uses ETL (Extract, Transfer Load) to collect data.
b. The extract process contacts the Windows Azure Pack Usage REST API to extract data.
c. Windows Azure Pack REST API queries the Collector database and returns the data to
the extract process.
d. The Service Reporting data warehouse stores the data indefinitely and it is transferred to
a data cube and loaded for analysis.
e. You can analyze the data in Excel or SharePoint Performance Point.
The following diagram depicts this process.
395
7. Click No.
8. On the Operations Manager management server, navigate to the folder where you copied
the Management Pack folder previously.
9. Select all files and then click Open.
10. Select Install.
11. Select the Monitoring workspace.
12. Verify that the following views appear in the monitoring views:
Microsoft System Center Virtual Machine Manager
Microsoft System Center Virtual Machine Manager PRO
To ensure that Operations Manager and Virtual Machine Manager can exchange information,
both components need to have administrative access to each other. To verify that the service
accounts have the correct access, perform the following procedure.
396
3.1.6011.0 or higher.
6. Open the Operations Manager console as an administrator.
7. Select Monitoring, click Monitoring, and then click Virtual Machine Manager Views.
8. When the diagram view is fully displayed, expand Managed Resources and then expand
All Clouds.
9. You should see an expanded view of clouds.
To verify that data is being stored in the Operations Manager data warehouse
1. Open SQL Management Studio.
2. Connect to the SQL instance that hosts the Operations Manager data warehouse
database.
3. Select the OperationsManagerDW database.
4. In the Object Explorer pane, expand the database and expand the Tables folder.
5. Select the Perf.PerfHourly_ table.
6. Right-click Perf.PerfHourly_ table then click Select Top 1000 rows.
7. In the results pane, verify that records are displayed.
To register the SPF usage metering endpoint with the Operations Manager operational
database
1. Log on to the Service Provider Foundation server as the Usage App Pool account.
2. Verify that the App Pool account for the Usage web endpoint is running as a domain
account.
397
3. Ensure that the Usage App Pool account is added to the SQL Login and granted execute
permission to where the SCOM Data Warehouse database is installed.
4. Open PowerShell with administrative privilege.
5. Type Import-module spfadmin
6. Save the following PowerShell script as RegistrespfwOMDW.ps1 on the Service
Provider Foundation server.
# Provide server name to the OM DW instance
$OMDWSqlServer = <OMDWConnectionString>
# Provide server name to the OM instance
$OMServer = <OMManagementServerName>
# Provide the account for Windows Azure Pack to access the
SPF usage web endpoint
$UsageUser = <Domain\Username>
# Register the SCOM Data Warehouse instance to SPF usage
metering
$server = New-SCSPFServer -Name $OMServer -ServerType OMDW
$setting = New-SCSPFSetting -Name $OMDWSqlServer -
SettingString "Data Source=$OMDWSqlServer;Initial
Catalog=OperationsManagerDW;Integrated Security=True" -
SettingType DatabaseConnectionString –Server $server
# Ensure the caller account can access the SPF usage web
endpoint
Net.exe localgroup SPF_Usage /add $UsageUser
7. Update variables in the script that resemble <Variable> with those needed for your
environment.
8. Run the script on the Service Provider Foundation server by typing
./RegistrespfwOMDW.ps1
To register the SPF Metering Endpoint in the Windows Azure Pack Administration Portal
1. Log on to the Windows Azure Pack Administration Portal as an administrator.
2. Select VM Clouds.
3. Select Register Service Reporting Provider.
4. Specify the URL of the Service Provider Foundation Usage Metering web endpoint that
you configured previously. For example,
https://<ServiceProviderFoundationServiceRoot>:8090/Usage/ Note the /usage/
portion of the URL.
5. Provide credentials to access the Service Provider Foundation Usage endpoint, which
398
you configured previously.
6. Verify that the registration completes successfully.
399
See Also
Service Reporting in System Center 2012 R2
Planning for Service Reporting
Deploying topics
How to Install Service Reporting
Describes how to install Service Reporting by using a wizard or a command prompt.
How to Uninstall Service Reporting
Describes how to uninstall Service Reporting by using a wizard or a command prompt.
How to Configure Service Reporting for Windows Azure Pack and System Center
Describes how to configure Service Reporting after you install it so that it can gather data
from source systems.
400
Upgrading Service Reporting
Provides information about upgrading Service Reporting.
Note
The Service Reporting Setup wizard does not have an option to install or to configure
Service Reporting by using credentials that you can specify. Consequently, Setup installs
Service Reporting by using the credentials of the logged-on user. After Setup finishes,
you can change the SQL Server account credentials that Service Reporting uses to
extract Operations Manager data, as described in How to Configure Service Reporting for
Windows Azure Pack and System Center.
If you want to install Service Reporting programmatically, you can do so by using a text-based
response file from the command prompt. The command-line parameters that Service Reporting
setup supports can be queried using the following command:
Setup.exe -?
You can use the –Slient parameter to install silently with a text file that contains required
parameters and use the –Uninstall parameter to uninstall Service Reporting.
Note
401
The Service Reporting Setup wizard can help you prevent installation failure by running a
prerequisite checker. Running Setup by using a command prompt does not run the
prerequisite checker.
402
Parameter Description Example
exists, or that Setup
will create
Note
Ensure that you use a domain account for the SQL Server and SQL Server
Agent services, and update the RunAs account information.
403
7. On the Configure Analysis Server page, Setup displays information about the existing
server that is running SQL Server Analysis Services, if one is found. Or, Setup displays
default information about the SQL Server Analysis Services database that it will create.
On this page, you can change the analysis database to install to, choose an existing
SQL Server instance, and modify the name of the analysis database that Service
Reporting will create. Click Next.
8. On the Customer Experience Improvement Program page, choose whether you want
to participate in the program, and then choose whether you want to use Microsoft Update
to update Microsoft software that is installed on the server, including Service Reporting.
Then, click Next.
9. On the Installation Summary page, Setup displays the choices that you have made
about the installation folder, details about the data warehouse, and details about analysis
services that it will install. Click Install.
10. On the Install page, Setup displays the progress of the Service Reporting components
that it installs. When Setup finishes, the Finished page appears and shows links to
Service Reporting documentation. If you have previously chosen to use Microsoft
Update, you can check for updates by clicking Initiate machine wide Automatic
Update. Click Close to complete Setup.
See Also
Service Reporting in System Center 2012 R2
Deploying Service Reporting
How to Uninstall Service Reporting
How to Configure Service Reporting for Windows Azure Pack and System Center
Upgrading Service Reporting
404
2. In the System Center 2012 R2 Service Reporting Setup wizard, click Uninstall.
3. On the Summary page, click Uninstall.
4. On the Finished page, click Close.
See Also
Service Reporting in System Center 2012 R2
Deploying Service Reporting
Note
In the following procedure, you edit an XML file in the InstallationDrive:\Program Files
folder. Windows File Protection helps protect this folder tree. Normally, you cannot
manually edit and save files in the folder tree. You can, however, run an XML editor of
your choice by using administrative credentials and then edit and save files in the folder
tree. If you run your XML editor without using administrative credentials, you must save
the edited file to a temporary location and then replace the original file by copying it to its
original location.
405
To edit Service Reporting connection information for your Operations Manager and
Windows Azure Pack data sources
1. Start Windows Explorer and browse to InstallationDrive:\Program Files\Microsoft System
Center 2012 R2\Service Reporting\Maintenance.
2. Edit the MaintenanceConfig.xml file and update the section of the file that resembles
<OperationsManagerSQLServers>Server1;Server2\SQLInstanceName</OperationsManagerSQL
Servers> to update the values for Server1 and SQLInstanceName by using the name of
the server that is running SQL Server and the name of the SQL Server instance where
your Operations Manager operational database is stored. If you have only one server that
is running SQL Server in your environment, you can remove any references to other
servers that are running SQL Server but are not used.
3. Edit the section of the file that resembles
<OperationsManagerDB>OMDB1;OMDB2</OperationsManagerDB> and update the value for
OMDB1 by using the name of the Operations Manager operational database that is used
in your environment. If you have only one Operations Manager operational database in
your environment, you can remove the semicolon separator and any references to other
databases.
4. If you do not have servers that are running Windows Azure Pack in your environment,
skip this step. If you do have servers that are running Windows Azure Pack in your
environment, edit the section of the file that resembles
<WAPUsageServiceURI>https://www.WAPCloud.com:111/usage?</WAPUsageServiceURI> and
replace the value of the URI with the URI that is used in your environment. Update the
port number, if necessary.
5. Save and close the file.
To add updated connection information and specify user credentials for Service
Reporting
1. On the server running the Windows Azure Pack Management Portal, open Windows
PowerShell as an administrator and type Unprotect-MgmtSvcConfiguration
UsageService.
2. Navigate to InstallationDrive:\inetpub\MgmtSvc-Usage\ and open web.config, and then
verify that the following entry exists in the file:
<add key="Username" value="UsageClient" />
406
and replace the UserName and Password values with the credentials that are used to
connect to Windows Azure Pack. Then, press Enter.
If the script is successful, it displays progress for Windows Azure Pack and Operations
Manager registration, along with information about the data warehouse module. Exit
Windows PowerShell.
7. If you are not using Windows Azure Pack, type
.\RegisterSystemCenterComponents.ps1 and then press Enter.
If the script is successful, it displays progress for Operations Manager registration, along
with information about the data warehouse module. Exit Windows PowerShell.
To configure your Windows Azure Pack data source for each clustered SQL Server
node or remote server that is running SQL Server
1. At each clustered SQL Server node or remote server that is running SQL Server where
the Service Reporting data warehouse databases are installed, start Windows
PowerShell as an administrator.
2. Type \\RemoteComputerName\ServiceReporting\Maintenance\
PostDeploymentConfig.ps1 –User UserName -Password Password and replace the
UserName and Password values with the credentials that are used to connect to
Windows Azure Pack. Then, press Enter.
See Also
Deploying Service Reporting
Service Reporting in System Center 2012 R2
407
To upgrade Service Reporting on a Windows-based server that has a GUI
1. Use administrative credentials to log on to the Windows-based server that is running
Service Reporting.
2. Open the final version of the release media that contains the Service Reporting software.
3. Run Setup.exe and in the in the Service Reporting Setup wizard, click Upgrade.
4. On the Getting Started page, read the license terms, select I have read, understood
and agree to these license terms, and then click Next.
5. On the Configuration page, a summary of the upgrade is displayed. To continue, click
Upgrade.
6. On the Install page, Setup displays the progress of the Service Reporting components
that it installs. When Setup finishes, the Finished page appears and shows links to
Service Reporting documentation. If you have previously chosen to use Microsoft
Update, you can check for updates by clicking Initiate machine wide Automatic
Update. Click Close to complete Setup.
7. Edit the MaintenanceConfig.xml file, as described at How to Configure Service Reporting
for Windows Azure Pack and System Center.
8. Run the PostDeploymentConfig.ps1 Windows PowerShell script, as described at How to
Configure Service Reporting for Windows Azure Pack and System Center.
408
for Windows Azure Pack and System Center.
6. Run the PostDeploymentConfig.ps1 Windows PowerShell script, as described at How to
Configure Service Reporting for Windows Azure Pack and System Center.
See Also
Service Reporting in System Center 2012 R2
Deploying Service Reporting
Operating topics
Monitoring Service Reporting by Using Operations Manager
Provides detailed information about the configuration that you create so that System Center
2012 R2 Operations Manager can monitor the IT infrastructure that Service Reporting uses.
Understanding Inventory and Usage Data from Windows Azure Pack and System Center
Provides detailed information about data that Service Reporting aggregates from source
systems.
Using Service Reporting Usage Data and Inventory Reports
Provides information about the reports that are available in Service Reporting and explains
how to use them.
How to Back Up and Restore Service Reporting Databases
Describes how to back up and restore Service Reporting databases in case of failure.
409
Other resources for this component
Service Reporting in System Center 2012 R2
Getting Started with Service Reporting
Support for Service Reporting
Planning for Service Reporting
Deploying Service Reporting
Operating Service Reporting
Addressing prerequisites
Install the following management pack files on the System Center 2012 R2 Operations Manager
server, if they are not already installed. These management pack files are in the System Center
Management Pack for SQL Server.
Microsoft.SQLServer.Library.mp
Microsoft.SQLServer.2012.Discovery.mp, if Service Reporting uses Microsoft
SQL Server 2012
Microsoft.SQLServer.2008.Discovery, if Service Reporting uses Microsoft
SQL Server 2008 R2
Configure the following accounts with Run As profiles by using an account that has read access
to the Service Reporting SQL Server databases:
SQL Server Discovery Account
SQL Server Monitoring Account
410
2. Use the Operations Manager console to import the following management pack files that
you installed from the management pack:
Microsoft.SystemCenter.ServiceReporting.Discovery.mp
Microsoft.SystemCenter.ServiceReporting.Library.mp
Microsoft.SystemCenter.ServiceReporting.Monitoring.mp
Microsoft.SystemCenter.ServiceReporting.Views.mp
3. If you need localized views, import the localized management pack files from the
Localized Management Packs subfolder of the installation folder.
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
411
Describes the data that Windows Azure Pack for Windows Server services collects.
Hourly 90 days
Monthly Indefinitely
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Understanding Inventory and Usage Data from Windows Azure Pack and System Center
412
About VMM Monitored Data from Operations
Manager
Service Reporting collects data from System Center 2012 R2 Operations Manager about the
virtual machines that System Center 2012 R2 Virtual Machine Manager (VMM) hosts for your
environment. The following tables describe the data that Service Reporting collects.
Note
All the data that the following tables show for managed entities is collected and stored in
the Service Reporting data warehouse. However, only the display name appears in the
attribute list of the corresponding entity dimensions in the online analytical processing
(OLAP) cube.
Host-group data
Service Reporting collects the following data about host groups.
Data Description
Hyper-V host
Service Reporting collects the following data about Hyper-V hosts.
Data Description
413
Data Description
Number of cores Total number of CPU cores that the host uses
Private cloud
Service Reporting collects the following data about hosted private clouds.
Data Description
Maximum virtual CPU count Maximum number of virtual CPUs in the hosted
private cloud
414
Data Description
User role
Service Reporting collects the following data about user roles.
Data Description
Display name Names of the users who are in the user role
User-role quota
Service Reporting collects the following data about user-role quotas.
Data Description
Use VM count default Specifies whether the user-role quota uses the
default number of virtual machines
Use memory MB default Specifies whether the user-role quota uses the
default amount of memory, in megabytes
Use storage GB default Specifies whether the user-role quota uses the
default storage space value, in gigabytes
415
Data Description
quota defines
Data Description
Virtual machine
Service Reporting collects the following data about virtual machines.
Data Description
Total size of virtual disks Total size of the virtual disks in the virtual
machine, in bytes
416
Data Description
domain\username format
Deployment location Folder path of the file for the virtual machine
Number of virtual disk drives Number of virtual disk drives in the virtual
machine
Total virtual disk size MB Total virtual disk size of the virtual machine, in
megabytes
417
Data Description
Data Description
Data Description
418
Virtual network adapter
Service Reporting collects the following data about virtual network adapters.
Data Description
MAC address type Type of MAC address that the virtual network
adapter uses
Host volume
Service Reporting collects the following data about host volumes.
Data Description
419
Virtual machine host disk
Service Reporting collects the following data about virtual machine host disks.
Data Description
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Understanding Inventory and Usage Data from Windows Azure Pack and System Center
Data Description
Start Time Date and time that the virtual machine started
420
Data Description
running
End Time Date and time that the virtual machine stopped
running
CPU Allocation Count – Average Average number of CPUs that are allocated to
the virtual machine
CPU Allocation Count - Median Median number of CPUs that are allocated to
the virtual machine
CPU Allocation Count – Sum Sum of all CPUs that are allocated to the virtual
machine
421
Data Description
machine has been running
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Understanding Inventory and Usage Data from Windows Azure Pack and System Center
About Service Reporting Data Aggregation and Data Cubes
About VMM Monitored Data from Operations Manager
422
List of Usage Data and Inventory Reports in
Service Reporting
Service Reporting provides the following reports:
Usage Report.xls
Server Inventory Report.xls
By default, these reports are installed to InstallationDrive:\Program Files\Microsoft System Center
2012 R2\Service Reporting\Reports.
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Using Service Reporting Usage Data and Inventory Reports
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Using Service Reporting Usage Data and Inventory Reports
423
How to View and Analyze Usage and
Inventory Data in Reports
You can use the following procedure to view and analyze an online analytical processing (OLAP)
data cube from Service Reporting by using Microsoft Excel. You can also save your workbooks
locally and share them with others. By using the PivotTable field list, you can drag fields from the
cube into the workbook. For more information about using Excel slicers, see Creating and Using
Excel Slicers.
To use the following procedure, you must have Microsoft Excel 2010 or Excel 2013 installed on
your computer.
Note
The first time that you analyze a cube by using Excel, the cube can take a few minutes to
load.
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
Using Service Reporting Usage Data and Inventory Reports
424
How to Back Up and Restore Service
Reporting Databases
The databases in a System Center 2012 R2 Service Reporting environment are as follows:
UsageDatawarehouseDB
UsageETLRepositoryDB
UsageStagingDB
UsageAnalysisDB
If a computer that hosts a database fails, all you need for recovery is the ability to restore the
database to a computer that has the same name as the original computer. You should base your
disaster recovery strategy for the Service Reporting databases on procedures for general
Microsoft SQL Server disaster recovery. For more information, see Back Up and Restore of SQL
Server Databases.
When you back up a database, security information such as SQL Server users and roles are
backed up with the database. If user’s domain credentials are used by SQL Server users and
roles and they differ on the computer that you restore to, you must manually update the domain
credentials by using SQL Server Management Studio for the database that is restored.
You can restore Service Reporting databases as an optional step when you install Service
Reporting, or you can restore databases by overwriting existing databases. After you have
restored databases and updated SQL Server users and roles (if necessary), you can register
Service Reporting data source systems, including System Center 2012 R2 Operations Manager
and Windows Azure Pack for Windows Server, to reestablish connections to the data source
systems.
In the event of Windows Azure Pack for Windows Server Usage database restoration, you must
ensure that Service Reporting usage data is synchronized with Windows Azure Pack. To ensure
that data is synchronized between the two systems, ensure that you perform the “To synchronize
restored Windows Azure Pack usage data with Service Reporting” procedure below.
To synchronize restored Windows Azure Pack usage data with Service Reporting
1. Stop the Windows Azure Pack Usage and UsageCollector services to prevent any new
usage events from being added to the system during the failure recovery.
2. Restore the Windows Azure Pack data from a saved backup.
3. Make note of the last usage event ID by running the following SQL query against the
Windows Azure Pack Usage database.
SELECT MAX([RecordId])
FROM [Microsoft.MgmtSvc.Usage].[usage].[Records]
4. Synchronize the recorded usage event ID by running the following SQL query against the
Service Reporting UsageETLRepositoryDB database.
DECLARE @LastWAPEventId INT = <EventId>
DECLARE @CurrEventId INT
SELECT @CurrEventId = InputString
FROM [UsageETLRepositoryDB].[dbo].[ProcessModuleInput]
WHERE InputName = '@StartEventId'
Replace <EventId> in the above query with the value that you made note of from step 3.
426
5. Start the Windows Azure Pack Usage and UsageCollector services.
See Also
Service Reporting in System Center 2012 R2
Operating Service Reporting
427
What’s in Automation?
Automation uses the following three underlying components that are connected to Windows
Azure Pack through the Service Management Automation service endpoint:
Web service
Connects to Windows Azure Pack
Distributes runbook jobs to runbook workers
Supports HTTPS
Enables security group to control access
Runbook worker
Executes runbook jobs
Runs under a service account
PowerShell module
Enables Automation management by using Windows PowerShell cmdlets
428
Architecture for Automation in Windows Azure Pack
The Automation web service communicates with Windows Azure Pack and authenticates
users.
The SQL Server databases store and retrieve runbooks, runbook assets, activities,
integration modules, and runbook job information.
Runbook workers run the runbooks, and they can be used for load balancing.
The management portal in Windows Azure Pack is where you author, debug, and start and
stop runbooks.
429
Deploy Service Management Automation
Service Management Automation is a workflow management solution for Windows Azure Pack
for Windows Server. It enables you to automate the creation, monitoring, and deployment of
resources in your environment. This document describes Service Management Automation
deployment.
Deployment topics
System requirements for Service Management Automation
Provides an overview of the hardware, software, and security requirements to deploy Service
Management Automation.
How to install the Service Management Automation web service
Provides step-by-step instructions to install the Service Management Automation web
service.
How to install the Service Management Automation runbook worker
Provides step-by-step instructions to install a Service Management Automation runbook
worker.
How to install the Service Management Automation PowerShell module
Provides step-by-step instructions to install a Service Management Automation PowerShell
module.
Install Service Management Automation from a Command Prompt window
Provides complete documentation of the available command-line options for installing Service
Management Automation.
Post-installation tasks for Service Management Automation
Provides instructions to use after you install Service Management Automation.
How to uninstall Service Management Automation
Provides step-by-step instructions to install for uninstalling Service Management Automation.
Hardware requirements
The following recommended configurations should be used.
430
Performance component Recommendation
Note
One month of data under heavy load
(12 jobs per minute for a month) results
in 20 GB of disk space usage. Job
purging should be used to keep this
usage from growing beyond this
amount.
Software requirements
The following software must be installed for each role.
Role Prerequisites
431
Before installing the web service, use the following procedure to install .NET Framework 4.5 and
HTTP Activation on Windows Server 2012 R2:
Security Requirements
The following ports must be opened for each role.
Role Requirement
432
Role Requirement
433
2. Under Service Management, click Web Service, and then click Install.
3. Complete the product registration information, and then click Next.
4. Review and accept the license terms, and then click Next.
5. Select Service Management Automation Web Service, and then click Next.
This will launch the prerequisite check.
6. Review the results of the check. If all items are installed, click Next.
Note
If you see an X next to any of the prerequisite software, you must install the item,
and then run the prerequisite check again. You cannot complete installation of
the service endpoint until you pass the prerequisite check.
7. Provide the following information for the database the endpoint to use, and then click
Next.
Port number Enter the port number that you want to use
for the database. The default is 1433.
8. Provide the following information to configure the Internet Information Settings (IIS) for
the web service, and then click Next.
Domain security group or users with Enter a security group or one or more
access users who can grant access to the web
service.
434
application pool. These are the credentials
that the web service will run under.
9. Enter the port number for the web service to use. By default, this is 9090.
10. Choose the security certificate to use to encrypt communication between Windows Azure
Pack and the Service Management Automation web service endpoint.
You can have the installer generate a self-signed certificate to use, or you can select an
existing certificate in your local certificate store.
Click Next.
11. Review the location for the web service files. You can accept the default or specify a
different location. Click Next.
12. Indicate whether you want to participate in the Customer Experience Improvement
Program (CEIP) and whether you want to use Microsoft Update to keep your software up-
to-date. Click Next.
13. Review the installation summary, and then click Install.
After the installation is complete, install a runbook worker as described in How to install
the Service Management Automation runbook worker.
435
from the System Center 2012 R2 Orchestrator installation software. Install the runbook worker on
a physical or virtual machine that has access to the same SQL Server instance that the Service
Management Automation web service is using.
436
3. Follow the instructions in the Setup wizard.
Note
The installation options must be entered at a command prompt. An answer file is not
supported.
437
pool
438
“45C324C02318F48D4A9C4FC832B2CDCC”
If logging is desired, use the Msiexec.exe command and specify the log path. For example, you
could use the following command (be sure to use the name of your SQL Server instance).
msiexec.exe /i WebServiceInstaller.msi /L*v C:\Andreas\WebServiceInstaller.log
CREATEDATABASE=“Yes” SQLSERVER="localhost" DATABASEAUTHENTICATION="Windows"
SQLDATABASE="SMA123"
439
SQL Server database SQLUSER String
If logging is desired, use the Msiexec.exe command and specify the log path. For example, you
could use the following command (be sure to use the name of your SQL Server instance).
msiexec.exe /i WorkerInstaller.msi /L*v C:\Andreas\WorkerInstaller.log
CREATEDATABASE=“Yes” SQLSERVER="localhost" DATABASEAUTHENTICATION="Windows"
SQLDATABASE="SMA123"
Note
If you install additional runbook workers, you must run the Windows PowerShell cmdlet
New-SmaRunbookWorkerDeployment to properly configure the runbook worker.
440
1. Stop the Runbook server service (RunbookService.exe) on each computer on which a
runbook worker is installed.
2. Run the following Windows PowerShell command:
New-SmaRunbookWorkerDeployment -<ComputerName> –<WebServiceEndpoint>
3. Restart the Runbook server service on each computer on which a runbook worker is
installed.
See also
Install Service Management Automation
441
Panel.
2. Under Programs, click Uninstall a program.
3. Under Name, double-click System Center 2012 R2 Service Management Automation
Web Service.
4. Follow the prompts, and the Uninstalling features page appears and uninstallation
progress is displayed.
Administration topics
Scaling Service Management Automation up or down
Describes how to approach and implement adding runbook workers and web services to or
removing them from Service Management Automation.
How to purge the Service Management Automation database
442
Describes how to approach and implement to install a Service Management Automation
PowerShell module.
Establish trust between Service Management Automation and Service Provider Foundation
Provides an overview of how to establish trust relationships between other Windows Azure
Pack components and Service Management Automation.
Extending Service Management Automation with runbooks
Describes the default runbooks that ship with Service Management Automation and how to
add additional runbooks.
443
Scaling Service Management Automation up
or down
Use the guidance in this section to scale out a machine tier in a service that is deployed in
Service Management Automation. You can add runbook workers and web services to add
additional capacity for runbook processing.
Initial recommendations
The recommended configuration is 3 virtual machines, each with an installed a runbook worker
and web service. The incoming web traffic should be load balanced. The machines should each
be at least each two cores and contain a minimum of 4 GB of RAM, along with 60 GB of storage.
Only one PowerShell module should be installed.
444
To enable the automatic database purge, you must enable the SQL Server Agent
(MSSQLSERVER) service for Automatic start. The service is not turned on by default, but it is
frequently started by SQL Server database administrators for other tasks.
If the SQL Server Agent service is not running, the purge will not occur and eventually the
customer will experience performance issues, first in the portal. and then with the back end.)
The job task that performs purge can be set up in the installer even if the customer is not running
the SQL Server Agent service. But it will not do anything until the service is enabled.
The database purge job is automatic, but it can be regulated by the Service Management
Automation administrator.
By default, the database purge job runs every 15 minutes, and it runs only if there are records
to purge.
Records are purged only if they are older than the default duration of 30 days. This time is
configurable by using the Set-SmaAdminConfiguration cmdlet and setting the –
PurgeJobsOlderThanCountDays parameter.
If the total job record count exceeds the MaxJobRecords parameter set by the same Set-
SmaAdminConfiguration cmdlet, then more job records will be purged. The default value
for this parameter is 120,000 records.
Extension topics
Authoring Runbooks in Service Management Automation
Describes how to create runbooks to implement and extend your business processes in
Service Management Automation.
Service Management Automation sample runbooks
Describes the runbooks that are targeted toward hosting service processes in Service
Management Automation.
Service Management Automation system runbooks
Describes the runbooks that are used to govern internal processes in Service Management
Automation.
445
Authoring Runbooks in Service Management
Automation
Runbooks in Service Management Automation are Windows PowerShell workflows that run on
Automation Worker servers. They provide the ability to automate administrative processes for
managing and deploying cloud servers or any other function that a Windows PowerShell script
can perform.
The additional services provided by Automation for working with Windows PowerShell Workflows
include the following:
Centralized storage and management of runbooks with the Automation database and
Windows Azure Pack management portal.
Scalable architecture for scheduling and running runbooks with multiple Worker servers.
Global resources that are centrally managed and available to all runbooks.
User interface for authoring and testing runbooks.
Set of cmdlets for managing and starting runbooks.
Runbook Concepts
Runbooks in Automation are implemented as Windows PowerShell workflows. This section
provides a brief overview of critical features of workflows that are common to Automation
runbooks. Complete details on workflows are available in Getting Started with Windows
PowerShell Workflow.
Runbook Execution
Requests to start a runbook are performed by the Service Management Automation web service
using either the Service Management Portal or the Start-SmaRunbook Windows PowerShell
cmdlet. The web service writes this request to the Automation database where it is retrieved by
446
one of the Automation Worker servers. You do not have control over which Worker server will
service the request.
The runbook will run on the Worker server that services the request and remotely accesses any
computers or other resources that it will work with. This requires the cmdlets in the runbook to be
able to remotely access these resources. Alternatively, the runbook can include an InlineScript
command in order to use PowerShell Remoting to run commands locally on a target computer.
This concept is illustrated in the following diagram.
Permissions
In order for a runbook to perform its required actions, it must have permissions to access the
resources that it works with. Runbooks always run in the context of the service account of the
Automation Runbook Service. If this account does not have required permissions, then you can
use either a Credentials or a Connections global resource in your runbook to run required
commands using credentials with the required permissions. These credentials can either be used
with a cmdlet that accepts credentials through a parameter or with InlineScript to run a block of
code using alternate credentials.
Basic Structure
A Windows PowerShell Workflow starts with the Workflow keyword followed by the body of the
script enclosed in braces. The name of the workflow follows the Workflow keyword as shown in
the following syntax. The name of the workflow matches the name of the Automation runbook.
Workflow Test-Runbook
447
<Commands>
To add parameters to the workflow, use the Param keyword as shown in the following syntax.
The Service Management Portal will prompt the user to provide values for these parameters
when they start the runbook. This sample uses the optional Parameter attribute which specifies
whether or not the parameter is mandatory.
Workflow Test-Runbook
Param
[Parameter(Mandatory=<$True | $False>]
[Type]$<ParameterName>,
[Parameter(Mandatory=<$True | $False>]
[Type]$<ParameterName>
<Commands>
Naming
The name of the workflow should conform to the Verb-Noun format that is standard with Windows
PowerShell. You can refer to Approved Verbs for Windows PowerShell Commands for a list of
approved verbs to use. The name of the workflow must match the name of the Automation
runbook. If the runbook is being imported, then the filename must match the workflow name and
must end in .ps1.
Activities
An activity is a specific task in a workflow. Just as a script is composed of one or more
commands, a workflow is composed of one or more activities that are carried out in a sequence.
Windows PowerShell Workflow automatically converts many of the Windows PowerShell cmdlets
to activities when it runs a workflow. When you specify one of these cmdlets in your runbook, the
corresponding activity is actually run by Windows Workflow Foundation. For those cmdlets
without a corresponding activity, Windows PowerShell Workflow automatically runs the cmdlet
within an InlineScript activity. There is a set of cmdlets that are excluded and cannot be used in a
workflow unless you explicitly include them in an InlineScript block. For further details on these
concepts, see Using Activities in Script Workflows.
448
Workflow activities share a set of common parameters to configure their operation. For details
about the workflow common parameters, see about_WorkflowCommonParameters.
Integration Modules
An Integration Module is a package that contains a Windows PowerShell Module and can be
imported into Automation. Windows PowerShell Modules contain cmdlets and workflows that can
be used in Automation runbooks. Products such as Operations Manager and Virtual Machine
Manager have modules that include cmdlets specific to their operation. For a Windows
PowerShell workflow to use a cmdlet that is defined in a module, the module must be installed on
the computer where the script is running.
Integration Modules that are imported into Automation are automatically installed on all Worker
servers so they are available to all runbooks. Since Automation is based on Windows PowerShell
4.0, it supports auto loading of modules meaning that cmdlets from installed modules can be
used without importing them into the script with Import-Module.
Any Windows PowerShell module can be imported into Automation as long as all of its
dependencies can be located in a single folder. If the module depends on registry settings or files
not in the default path, then it can be imported, but it will most likely not work because Automation
will not be able to locate its dependencies.
Modules with external dependencies can still be used in a runbook but must be manually installed
on each Worker server or accessed on another host using an InlineScript script block. While the
cmdlets in these modules can be used in runbooks, they will not be discovered by Automation to
support such features as the Insert Activity wizard. In order to use this feature, you can create a
Portable module using the New-SmaPortableModule cmdlet. This cmdlet creates a module that
includes a stub for each of its cmdlets and can be imported into Automation. When a runbook
uses one of those cmdlets, the stub redirects the call to the actual cmdlet in the external module.
That module must be installed on each Worker server or the call will fail.
Parallel Execution
One advantage of Windows PowerShell Workflows is the ability to perform a set of commands in
parallel instead of sequentially as with a typical script. This is particularly useful in runbooks since
they may perform multiple actions that take a significant time to complete. For example, a
runbook might provision a set of virtual machines. Rather than performing each provisioning
process in sequence with one another, the actions could be performed simultaneously increasing
overall efficiency. Only when all are complete would the runbook continue.
You can use the Parallel keyword to create a script block with multiple commands that will run
concurrently. This uses the syntax shown below. In this case, Activity1 and Activity2 will start at
the same time. Activity3 will start only after both Activity1 and Activity2 have completed.
Parallel
<Activity1>
449
<Activity2>
<Activity3>
You can use the ForEach -Parallel construct to process commands for each item in a collection
concurrently. The items in the collection are processed in parallel while the commands in the
script block run sequentially. This uses the syntax shown below. In this case, Activity1 will start at
the same time for all items in the collection. For each item, Activity2 will start after Activity1 is
complete. Activity3 will start only after both Activity1 and Activity2 have completed for all items.
ForEach -Parallel ($<item> in $<collection>)
<Activity1>
<Activity2>
<Activity3>
The Sequence keyword is used to run commands in sequence within a Parallel script block. The
Sequence script block runs in parallel with other commands, but the commands within the block
run sequentially. This uses the syntax shown below. In this case, Activity1, Activity2, and Activity3
will start at the same time. Activity4 will start only after Activity3 has completed. Activity5 will start
after all other activities have completed
Parallel
<Activity1>
<Activity2>
Sequence
<Activity3>
<Activity4>
<Activity5>
Checkpoints
A checkpoint is a snapshot of the current state of the workflow that includes the current value for
variables and any output generated to that point. It is saved to the Automation database so that
450
the workflow can resume even in the case of an outage on the Worker server. The checkpoint
data is removed once the runbook job is complete.
You can set a checkpoint in a workflow with the Checkpoint-Workflow activity. When you
include this activity in a runbook, a checkpoint is immediately taken. If the runbook is suspended
by an error, when the job is resumed, it will resume from the point of the last checkpoint set.
In the following sample code, an error occurs after Activity2 causing the runbook to suspend.
When the job is resumed, it starts by running Activity2 since this was the last checkpoint set.
<Activity1>
Checkpoint-Workflow
<Activity2>
<Error>
<Activity3>
You should set checkpoints in a runbook after activities that may be prone to error and should not
be repeated if the runbook is resumed. For example, your runbook may create a virtual machine.
You could set a checkpoint both before and after the commands to create the virtual machine. If
the creation fails, then the commands are repeated when the runbook is resumed. If the creation
succeeds but the runbook later fails, then the virtual machine will not be created again when the
runbook is resumed.
For more information about checkpoints, see Adding Checkpoints to a Script Workflow.
Suspending a Runbook
You can force a runbook to suspend itself with the Suspend-Workflow activity. This activity will
set a checkpoint and cause the workflow to immediately suspend. Suspending a workflow is
useful for runbooks that may require a manual step to performed before another set of activities
are run.
For more information about suspending a workflow, see Making a Workflow Suspend Itself.
InlineScript
The InlineScript activity runs a block of commands in a separate, non-workflow session and
returns its output to the workflow. While commands in a workflow are sent to Windows Workflow
Foundation for processing, commands in an InlineScript block are processed by Windows
PowerShell. The activity uses the standard workflow common parameters including
PSComputerName and PSCredential which allow you to specify that the code block be run on
another computer or using alternate credentials.
InlineScript uses the syntax shown below.
InlineScript
<Script Block>
451
} <Common Parameters>
The most common use for InlineScript in a runbook is to run a block of code on another
computer. This is required when cmdlets in your runbook are not installed on the Worker servers
or if the action only has permissions to be performed locally on the target computer. This is
illustrated in the following diagram.
In order to run the code block on another computer, the PSComputer and PSCredential
parameters are used with the InlineScript activity. A global resource such as a Credential or
Connection is typically used in a runbook to provide values for these parameters. The following
sample code runs a set of commands on a computer represented by a connection called
MyConnection.
$con = Get-AutomationConnection -Name 'MyConnection'
InlineScript
<Commands>
While InlineScript activities may be critical in certain runbooks, they should only be used when
necessary for the following reasons:
You cannot use checkpoints from within an InlineScript block. If a failure occurs within the
block, it must be resumed from the beginning.
InlineScript affects scalability of the of the runbook since it holds the Windows PowerShell
session on the Worker server for the entire length of the InlineScript block.
Activities such as Get-AutomationVariable and Get-AutomationPSCredential are not
available in an InlineScript block. You can pass values into the script though with the $Using
scope modifier. See about_InlineScript for further detail.
If you do need to use an InlineScript, you should minimize its scope. For example, if your
runbook iterates over a collection while applying the same operation to each item, the loop should
occur outside of the InlineScript. This will provide the following advantages:
452
1. You can Checkpoints the workflow after each iteration. If the job is suspended or interrupted
and resumed, the loop will be able to resume.
2. You can use ForEach –Parallel to handle collection items concurrently.
For further details on using InlineScript, see Running Windows PowerShell Commands in a
Workflow.
To return data from a child runbook so that it can be used by a parent runbook, the child runbook
needs to write its output to the standard output stream using cmdlets such as Write-Output. Any
output from a cmdlet that is not directed into a variable will also be written to the standard output
stream available to the parent. The parent runbook typically assigns this value to a variable where
it can be used. All runbooks installed in Automation are available to be used from all other
runbooks.
Note
If a runbook includes a call to another runbook that is not yet published in Automation,
the calling runbook will need to be opened in draft mode and published again after the
runbook being called has been published. This is because Automation creates a
reference to any runbooks being called by the current runbook when it is published. If
those runbooks don’t yet exist, then the references cannot be created. By publishing the
parent runbook again, the references can then be created.
See Also
Authoring Runbooks in Service Management Automation
Runbook and Module Operations
Global Resources
453
Creating a Runbook
Creating a Runbook with the Windows Azure Pack management
portal
When you create a runbook with the management portal for administrators, you first create an
empty runbook and then later edit it with the Automation editor to create the script. With Windows
PowerShell, you import an existing script file to create the runbook.
454
The Tag property cannot be modified for an existing runbook with Windows PowerShell but can
only be set when the runbook is created with Import-SMARunbook.
To edit runbook properties with the Windows Azure Pack management portal
1. Select the Automation workspace.
2. At the top of the window, click Runbooks.
3. Locate the runbook to edit and click on its name.
4. At the top of the window, click Configure.
5. Set any properties that should be changed.
6. Click Save when your edits are complete.
Editing a Runbook
One a runbook has been created, you can edit the draft version of its workflow. You later
Publishing a Runbook the Draft version so that it is available to be run in production.
The management portal for administrators includes an editor that you can use to view and edit
runbooks. In addition to providing text editing capabilities, the editor provides the ability to
automatically insert code for Global Settings, Activities, and Runbooks.
The Automation editor includes a feature to insert code for Activities, Settings and Runbooks into
a runbook. Rather than typing in the code yourself, you can select from a list of available assets
and have the appropriate code inserted into the runbook.
455
5. Click Draft.
6. Perform the required editing.
7. Click Save when your edits are complete.
456
runbook, but if they are not imported into SMA, then the editor has no knowledge of them. For
further details, see the Modules section of this guide.
Testing a Runbook
You can test the Draft version of a runbook before publishing it. This allows you to validate its
operation before making it available in production by overwriting the existing Published version.
When you test the runbook, the Draft version is run and any output sent to the Output Pane in
the management portal for administrators.
When a runbook is tested, its output is written more quickly to the Automation database than a
production run of the runbook since it is assumed that an administrator is interacting with the test
457
version. Also, Debug, Verbose, and Progress streams are disabled for test runs regardless of
their settings in the runbook configuration. You can turn them on in the script by setting the
appropriate Preference variable.
Publishing a Runbook
Each runbook has a Draft and a Published version. Only the Published version is available to be
run, and only the Draft version can be edited. The Published version is unaffected by any
changes to the Draft version. When the Draft version should be made available, then you publish
it which overwrites the Published version with the Draft version.
458
Publish-SMARunbookDefinition –WebServiceEndpoint $webServer –
Port $port –Name $runbookName
"ConnectionFields": [
"IsEncrypted": false,
"IsOptional": false,
"Name": "ComputerName",
"TypeName": "System.String"
},
459
{
"IsEncrypted": false,
"IsOptional": true,
"Name": "Username",
"TypeName": "System.String"
},
"IsEncrypted": true,
"IsOptional": false,
"Name": "Password",
"TypeName": "System.String"
}],
"ConnectionTypeName": "DataProtectionManager",
"IntegrationModuleName": "DataProtectionManager"
Folder Files
MyModule MyModule.psd1
MyModule-Automation.json
Importing a Module
A module is a compressed file with a .zip extension that contains a folder which includes one of
the following file types:
A module (psm1 file)
A module manifest (psd1 file)
460
To Import a Module using Windows PowerShell
The following sample commands show how to import a module.
$webServer = 'https://MyWebServer'
$port = 9090
$modulePath = 'C:\Modules\MyModule.psm1'
Import-SMAModule –WebServiceEndpoint $webServer –Port $port –
Path $modulePath
To Get a List of Activities in a Module using Windows Azure Pack management portal
1. Select the Automation workspace.
2. At the top of the window, click Assets.
3. Locate the module and select it.
4. Scroll to the bottom of the Module Details screen and inspect its activities.
5. Optionally, click the magnifying glass icon to filter for particular activities.
461
$modules | foreach {$_.Activities} | sort Name,ModuleName |
ft Name,ModuleName,Description
See Also
Authoring Runbooks in Service Management Automation
Runbook Concepts
Global Resources
Global Resources
Global Resources are stored in the Service Management Automation database and available to
all runbooks in an Automation environment. You create and configure them using either the
Automation workspace in the Windows Azure Pack management portal or with the appropriate
cmdlets in Windows PowerShell. From a runbook, you can retrieve and set values for global
resources with activities in the RunbookConstructs module. The Windows PowerShell cmdlets
are available to use in runbooks, but the activities are recommended as they are more efficient.
Credentials
An Automation Credential is either a username and password that can be used with Windows
PowerShell commands or a certificate that is uploaded to the server. The properties for a
credential are stored securely in the Automation database and can be accessed in the runbook
with either the Get-AutomationPSCredential or Get-AutomationCertificate activity.
Cmdlets Description
462
Cmdlets Description
a .pfx.
Runbook Activities
The activities in the following table are used to access credentials in a runbook.
Activities Description
Note
You should avoid using variables in the –Name parameter of Get-
AutomationPSCredential and Get-AutomationCertificate since this can complicate
discovering dependencies between runbooks and Automation variables.
To create a new PowerShell credential with Windows Azure Pack management portal
1. Select the Automation workspace.
2. At the top of the window, click Assets.
3. At the bottom of the window, click Add Setting.
4. Click Add Credential.
5. In the Credential Type dropdown, select PowerShell Credential.
6. Type a name for the credential in the Name box.
7. Click the right arrow.
8. Type in values for each property.
9. Click the check mark to save the credential.
463
4. Click Add Credential.
5. In the Credential Type dropdown, select Certificate.
6. Type a name for the certificate in the Name box.
7. Click the right arrow.
8. Click Browse for File and navigate to either a .cer or .pfx file.
9. If you selected a .pfx file, then provide its password.
10. Click the check mark to save the certificate.
464
To use a PowerShell credential in a runbook
The following sample commands show how to use a PowerShell credential in a runbook.
In this example, the credential is used with an InlineScript activity to run a set of
commands using alternate credentials.
$myCredential = Get-AutomationPSCredential -Name
'MyCredential'
InlineScript {
<Commands>
} -PSComputerName $ServerName -PSCredential $SampleCredential
Connections
An Automation Connection contains the information required to connect to a service or
application from a runbook. This information is defined in the module for the application and
typically includes such information as the username and password and the computer to connect
to. Other information may also be required such as a certificate or a subscription Id. The
properties for a connection are stored securely in the Automation database and can be accessed
in the runbook with the Get-AutomationConnection activity.
Cmdlets Description
465
Runbook Activities
The activities in the following table are used to access credentials in a runbook.
Activities Description
466
Using a connection in a runbook
Use the Get-AutomationConnection activity to use a connection in a runbook. This activity
retrieves the values of the different fields in the connection and returns them as a hashtable
which can then be used with the appropriate commands in the runbook.
For more information about hash tables, see about_Hash_Tables.
Variables
Automation variables are values that are available to all runbooks. They can be created,
modified, and retrieved from the Windows Azure Pack management portal, Windows PowerShell,
or from within a runbook. Automation variables are useful for the following scenarios:
Share a value between multiple runbooks.
Share a value between multiple jobs from the same runbook.
Manage a value from the Windows Azure Pack management portal or from the Windows
PowerShell command line that is used by runbooks.
Automation Variables are persisted in the Automation database so that continue to be available if
a Worker server is restarted. This also allows a value to be set by one runbook that is then used
by another, or is used by the same runbook the next time that it is run.
When a variable is created, you must specify its data type from the following list. You can only
assign a value of the correct type to a variable.
String
Integer
Boolean
Datetime
When a variable is created, you can specify that it be stored encrypted. When a variable is
encrypted, it is stored securely in the SMA database, and its value cannot be retrieved from the
467
Get-SMAVariable cmdlet. The only way that the value can retrieved is from the Get-
AutomationVariable activity in a runbook. You can store multiple values of the defined type to a
single variable by creating a hashtable.
Cmdlets Description
Runbook Activities
The activities in the following table are used to access credentials in a runbook.
Activities Description
Note
You should avoid using variables in the –Name parameter of Get-AutomationVariable
since this can complicate discovering dependencies between runbooks and Automation
variables.
468
8. Type in a value for each property.
9. Click the check mark to save the variable.
Schedules
Automation Schedules are used to schedule runbooks to run automatically. This could be either
a single date and time for the runbook to run once. Or it could be a recurring schedule to start the
runbook multiple times. Schedules are typically not accessed from runbooks.
469
Windows PowerShell Cmdlets
The cmdlets in the following table are used to create and manage variables with Windows
PowerShell.
Cmdlets Description
$port = 9090
$startTime = (Get-Date).Date.AddHours(12)
$expiryTime = $startTime.AddYears(1)
470
Set-SMASchedule –WebServiceEndpoint $web –Port $port –Name $scheduleName –ScheduleType
OneTimeSchedule –StartTime $startTime –ExpiryTime $expiryTime –DayInterval 1
See Also
Authoring Runbooks in Service Management Automation
Runbook Concepts
Runbook and Module Operations
System Runbooks
DiscoverAllLocalModules
Runs immediately after a runbook worker is installed
Discovers all native modules on the Windows Server system where the runbook worker has
been installed, and extracts activities and activity metadata for these modules so that their
activities can be used when authoring runbooks in Windows Azure Pack.
SetAutomationModuleActivityMetadata
Runs immediately after a module is imported into Service Management Automation
Extracts activities and activity metadata from a newly imported module so that its activities
can be used when authoring runbooks in Windows Azure Pack.
Sample runbooks
471
Runbook name Description
473
Runbook name Description
imported module.
474
What's New in Service Provider Foundation
Summarizes key new features and improvements in the current versions.
Deploying Service Provider Foundation
Provides system requirements, installation, and other deployment guidance topics.
Administering Service Provider Foundation
Describes how to use the capabilities and features of Service Provider Foundation.
Cmdlets in System Center 2012 - Service Provider Foundation
Provides a reference for Service Provider Foundation Windows PowerShell cmdlets.
Overview
The following illustration provides a high-level view of how Service Provider Foundation operates.
The tenant represents a hoster's customer, and the tenant has assets on the hoster's system.
Each tenant has their own administrators, applications, scripts, and other tools.
The hoster provides tenants with the environment, which can include virtual machines. The hoster
has an existing front-end portal, which all tenants can use. On the back end, the hoster has a
475
collection of resources, which is called the fabric. The hoster allocates those resources into
discrete groups according to the hoster’s needs. Each of these groups is known as a stamp. The
hoster can then assign the tenant’s resources to stamps in whatever manner is appropriate to the
hoster. The resources may be divided across several stamps, according to the hoster’s business
model scheme. Service Provider Foundation makes it possible for the hoster to present a
seamless user experience to the tenant by aggregating the data from each stamp and allowing
the tenant to use the Service Provider Foundation application programming interfaces (APIs) to
access that data.
A stamp in Service Provider Foundation is a logical scale unit designed for scalability that
provides an association between a server and its System Center 2012 Service Pack 1 (SP1)
components. As tenant demand increases, the hoster provides additional stamps to meet the
demand. Note that Service Provider Foundation System Center 2012 SP1 supported only one
type of stamp; that is a single server that has Virtual Machine Manager (VMM) installed.
Service Provider Foundation does not configure clouds; instead, it manages their resources.
Virtual machines are set to clouds, for example, when they are created for VMM or when they are
created by the T:Microsoft.SystemCenter.VirtualMachineManager.Cmdlets.New-
SCVirtualMachine cmdlet.
The hoster can have a portal client, which faces the tenant, that provides access to the
infrastructure that the hoster has granted. The portal uses an extensible representational state
476
transfer (REST) API to communicate with the web service by using the OData protocol. The
claims-based authentication verifies the tenant’s identity and associates it with the user role that
the hoster assigns.
Service Provider Foundation uses a database to aggregate the tenant resources, which are
managed with Windows PowerShell scripts and Orchestrator runbooks. This makes it possible for
the hoster to distribute tenant resources among management stamps in whatever way it decides,
while to the tenant the resources are easy to access and appear contiguous.
See Also
Deploying Service Provider Foundation
Administering Service Provider Foundation
Integrating Service Management Portal and API with System Center 2012 SP1
Cloud Resource Management with System Center 2012 Service Pack 1 (SP1) – Orchestrator and
Service Provider Foundation
Cmdlets in System Center 2012 - Service Provider Foundation
Service Provider Foundation Developer's Guide
In this section
Security Planning for Service Provider Foundation
Provides security guidance information for Service Provider Foundation.
System Requirements for Service Provider Foundation for System Center 2012 SP1
Lists the prerequisites to install the first version of Service Provider Foundation.
System Requirements for Service Provider Foundation 2012 R2
Lists the prerequisites to install the current version of Service Provider Foundation.
Capacity Planning for Service Provider Foundation
Provides hardware and database storage recommendations.
How to Create an SSL Certificate for Testing Service Provider Foundation
Describes how to create a testing certificate for installing Service Provider Foundation
System Center 2012 SP1. You can skip this topic if you are installing the current version.
How to Install Service Provider Foundation for System Center 2012 SP1
Provides a detailed procedure for installing the first version of Service Provider Foundation.
How to Install Service Provider Foundation 2012 R2
477
Provides a detailed procedure for installing the current version of Service Provider
Foundation.
Upgrading to Service Provider Foundation for System 2012 R2
Provides important information to consider before installing the current version of Service
Provider Foundation.
Setup Command-Line Options for Service Provider Foundation
Provides the commands for automating Service Provider Foundation installations.
Post-Installation Tasks for Service Provider Foundation
Describes essential tasks after you install Service Provider Foundation.
How to Uninstall Service Provider Foundation
Describes how to uninstall Service Provider Foundation from the Control Panel.
Release Notes for Service Provider Foundation for System Center 2012 SP1
Provides the release notes for Service Provider Foundation System Center 2012 SP1.
Release Notes for Service Provider Foundation 2012 R2
Provides the release notes for Service Provider Foundation System Center 2012 R2
See Also
Architecture Overview of Service Provider Foundation
Administering Service Provider Foundation
Cmdlets in System Center 2012 - Service Provider Foundation
Service Provider Foundation Developer's Guide
478
Hardware Minimum required and recommended values, per
web service
Secure Sockets Layer (SSL) server certificate Obtain or create an SSL server certificate
for the Service Provider Foundation website before installation. Applicable certificates will
appear in the Service Provider Foundation
setup wizard on the Specify a location for the
SPF files page. Any preselected certificate
may or may not be the most applicable
certificate for your environment. You can obtain
a certificate in the following ways:
Purchase and import a certificate from a
certification authority.
Import an Active Directory Certificate.
Create a self-signed certificate. For more
information, see How to Create an SSL
Certificate for Testing Service Provider
Foundation.
Microsoft ASP.NET Model View Controller Install from the Microsoft Download Center.
(MVC) 4
Windows Communication Foundation (WCF) Install from the Microsoft Download Center.
Data Services 5.0 for Open Data Protocol
(OData) V3
System Center 2012 – Install from the Microsoft System Center Virtual
Virtual Machine Manager (VMM) Console Machine Manager 2012 Setup Wizard; see
479
Software Action required
Although you do not need to install the full How To Install the VMM Console.
Virtual Machine Manager (VMM), you will need This is required so that Setup can install the
to make references to a server that has Virtual VMM web service.
Machine Manager running and that can be
accessed by supplied credentials.
Management OData Internet Information Add this feature in Windows Server 2012
Services (IIS) Extension Server Manager.
Windows Process Activation service. This Add this feature in Windows Server 2012
features includes: Server Manager.
Process Model
Configuration application programming
interfaces (APIs)
Web Server (IIS). This server role includes: Add this role in Windows Server 2012 Server
IIS Management Scripts and Tools Role Manager if not already installed.
Service
IIS Security Basic Authentication
IIS Application Deployment ASP.NET 4.5
IIS Security Windows Authentication
Internet Server API (IASPI) extensions and
filters
ASP.NET 4.5 Role Service
Microsoft .NET Framework 3.5. This feature None. Installed with Windows Server 2012.
includes:
ASP.NET 3.5
Common Language Runtime 2.0
.NET Framework 4.5. This feature includes: None. Installed with Windows Server 2012.
ASP.NET 4.5
WCF services HTTP Activation
Common Language Runtime 4.5
See Also
Capacity Planning for Service Provider Foundation
How to Install Service Provider Foundation for System Center 2012 SP1
Deploying Service Provider Foundation
480
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
Security features
Service Provider Foundation provides a tightly coordinated implementation of Windows and
Internet Information Services (IIS) security features. Note that credentials in a domain in the
Active Directory must be used.
Service Provider Foundation relies on IIS to authenticate users. Starting with System Center 2012
R2, Service Provider Foundation accepts only the Secure Sockets Layer (SSL) requests protocol
from its provider endpoints using the default port of 8090. Only HTTPS requests are accepted.
Typically, the request should have the security context of the user who is logged on to the make
the request.
When the setup wizard installs a web service, it creates a local security group on the computer
that runs the web service. You can specify users or groups that have access to each web service.
The wizard assigns those users or groups to a local security group. Service Provider Foundation
checks that the user who sends the request belongs to the appropriate local security group.
In addition the wizard creates application domains pools in Internet Information Services (IIS) for
each web service. You can specify the Network Service account or an account that also belongs
to the security group.
The wizard creates the following security groups application pools as shown on the following
table.
SPF_Admin Admin
SPF_Provider Provider
SPF_VMM VMM
SPF_Usage Usage
481
After you install Service Provider Foundation, you must verify that the credentials for
System Center 2012 – Virtual Machine Manager and the other service providers are configured
correctly, as described in Managing the Service Provider Foundation Web Services.
See Also
Capacity Planning for Service Provider Foundation
How to Install Service Provider Foundation for System Center 2012 SP1
Setup Command-Line Options for Service Provider Foundation
Deploying Service Provider Foundation
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
482
Orchestrator Setup Wizard.
Note
We recommend that you run setup as Administrator. Doing so allows Customer
Experience and Microsoft Update choices to be retained later in the setup.
2. On the main Setup page, click Service Provider Foundation.
3. On the Service Provider Foundation Setup page, click Install.
4. On the License Terms page, review the license agreement. If you agree with the terms,
select the I have read, understood, and agree with the terms of the license
agreement check box, and then click Next.
5. On the Select the web services to install page, select the check box for System
Center Virtual Machine Manager 2012 Web Service, and then click Next.
6. On the Prerequisites page, wait for the wizard to complete the prerequisite verification,
and then review the results. If any of the prerequisites are missing, install the missing
prerequisites, and then click Check prerequisites again.
When all of the prerequisites are met, click Next.
7. On the Configure the database server page, in the server text box, enter the name of
the server that hosts SQL Server, or accept the default localhost. In Port Number, type
the port number that accesses the database, or accept the default of 1433, and then click
Next.
8. On the Specify a location for the SPF files page, accept or change the location for the
web service files by using the Change Folder button. Optionally, change Website name.
In the Port Number section, enter the Internet Information Services (IIS) port number
that you want to use, or accept the default of 8090.
Note
If you want to change the IIS port that you assign during the installation of
Service Provider Foundation, you must uninstall or reinstall Service Provider
Foundation.
The certificate store and name refers to the certificate that was used to configure the site
bindings for the Service Provider Foundation website in Internet Services Information
(IIS) Manager. The currently selected certificate may or may not be the most applicable
certificate for your environment. For more information, see How to Create an SSL
Certificate for Testing Service Provider Foundation.
Click Next.
9. On the Configure the Admin web service page, in the Domain security groups or
users text box, type the domain and user name of each security group or user who will
use this web service. Use the format domain\user name, and use a semicolon to
separate multiple entries, for example, CONTOSO\JohnDoe; CONTOSO\TestGroup.
For application pool credentials, select the type of account that you want to use:
To use an internal system account, select Network Service.
If you select Network Service, the machine account must be a
System Center 2012 – Virtual Machine Manager (VMM) administrator, or it must have
483
enough permissions to perform the Service Provider Foundation requests.
To use a different account, select Service Account, and then type the domain name,
user name, and password of the account that you want the application pool to use.
Make sure that the application pool account exists in the domain and that it has
sufficient permissions to manage the server.
Click Next.
10. In the same manner, specify the settings for Configure the Provider web service, and
then click Next.
11. In the same manner, specify the settings for Configure the VMM web service, and then
click Next.
12. Choose the desired options on the Help improve Microsoft System Center Service
Provider Foundation and Microsoft Update page, and then click Next.
Choices made on this page are not retained unless setup was run as Administrator.
13. On the Installation summary page, review your selections, and then do one of the
following:
Click Previous to change any selections.
Click Install to install Service Provider Foundation.
After you click Install, the installation progress indicator appears.
14. Click Close when the message “Setup is complete” appears.
Repeat this procedure for each installation, such as for a web farm.
484
See Also
Setup Command-Line Options for Service Provider Foundation
How to Uninstall Service Provider Foundation
Post-Installation Tasks for Service Provider Foundation
Deploying Service Provider Foundation
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
Option Description
486
Option Description
[-ScvmmPassword <ScvmmPassword>] The password credential for the IIS setting for
[-ScadminPassword <scadminPassword>] the VMM, Admin, Provider, or Usage web
service.
[-ScproviderPassword
<scproviderPassword>] Omit this option if you are specifying true for
the Network Service option.
[-ScusagePassword <scusagePassword>]
[-ScvmmDomain <ScvmmDomain>] The domain credential for the IIS setting for the
487
Option Description
[-ScadminDomain <scadminDomain>] VMM, Admin, Provider, or Usage web service.
[-ScproviderDomain <scproviderDomain>] Omit this option if you are specifying true for
[-ScusageDomain <scusageDomain>] the Network Service option.
[-ScusageNetworkServiceSelected
<true|false>]
Troubleshooting
If you get the following error:
Error 0x80070003: Failed to write state to file: C:\ProgramData\Package
Cache\{97585be5-93f3-41eb-8b19-34f5fe52879d}\state.rsm
Create a directory named "{97585be5-93f3-41eb-8b19-34f5fe52879d}" in the
C:\ProgramData\Package Cache\ directory and run the setup command again.
See Also
How to Install Service Provider Foundation 2012 R2
How to Uninstall Service Provider Foundation
Deploying Service Provider Foundation
Administering Service Provider Foundation
488
Architecture Overview of Service Provider Foundation
PS C:\> # Create a stamp. A stamp is a logical container for a tenant's association with
one or more servers.
489
PS C:\> # Associate the stamp to the tenant. You can set the stamp to the tenant and also
to a different server if needed.
See Also
Deploying Service Provider Foundation
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
Integrating Service Management Portal and API with System Center 2012 SP1
490
removed successfully page, click Close.
See Also
How to Install Service Provider Foundation 2012 R2
Setup Command-Line Options for Service Provider Foundation
Deploying Service Provider Foundation
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
Known Issues
491
A new virtual machine is unusable if it is created
without a guest operating system
Description: You can create a new virtual machine from a template by using a blank virtual hard
disk (VHD). However, a 13206 error appears in the summary page. The virtual machine will be
unusable if it is created with a VHD that contains no guest operating system.
Workaround: Create the virtual machine with a guest operating system.
492
PS C:\> $stamps = Get-SCSPFStamp -Tenant $tenant
See Also
Deploying Service Provider Foundation
Administering Service Provider Foundation
Architecture Overview of Service Provider Foundation
Administering topics
Recommended Administrator Capabilities in Service Provider Foundation
Specifies recommended permissions for Service Provider Foundation administrators,
database administrators, and application pool users.
493
Manage Web Services and Connections in Service Provider Foundation
Provides a comprehensive overview of the web services, credentials, and connectivity
required to administer Service Provider Foundation .
Manage Certificates and User Roles in Service Provider Foundation
Provides an overview of how multi-tenant security is implemented in Service Provider
Foundation. This section contains a walkthrough topic with procedures on creating and
managing a tenant's certificate and defining tenant administrator and tenant self-service user
roles. In addition, topics describe recommended administrator capabilities and an example of
a token authentication.
Portals in Service Provider Foundation
Describes how client and portal applications can communicate with and obtain services from
Service Provider Foundation. This section also contains procedures for configuring App
Controller and Windows Azure Pack for Windows Server and API.
Usage Metering in Service Provider Foundation
Describes how Service Provider Foundation provides usage metering data of virtual machine
usage by tenants.
Extensibility in Service Provider Foundation
Describes how to have an runbook in System Center 2012 - Orchestrator invoked by Service
Provider Foundation.
494
Hoster administrators can use the Service Provider Foundation OData services to create the
required infrastructure. For more information, see the Service Provider Foundation Developer's
Guide.
A typical on-boarding tenant scenario is as follows:
1. A prospective tenant investigates a hoster's services by evaluating the offered plans.
2. The prospective tenant subscribes to a plan (offer objects in Service Provider Foundation),
which generates a new subscription in a portal application and creates a new tenant in the
Service Provider Foundation database.
During this process, a tenant uploads the public key for their certificate file. This lets the host
to register the tenant and configure user security roles in Virtual Machine Manager.
3. The portal applications and hoster administrators configure a tenant's connections to the
hoster’s service by using the service OData protocol URLs and tokens verified with the
tenant's certificate that contains the private key.
Hoster administrators can also use the IDs generated by Service Provider Foundation cmdlets
that create tenant or tenant user roles as the ID values for the corresponding VMM cmdlets that
create actual user roles. The Service Provider Foundation cmdlets do the following:
Generate the ID for a Tenant Administrator User Role when a tenant is created by using the
T:Microsoft.SystemCenter.Foundation.Cmdlet.New-SCSPFTenant cmdlet.
Generate the ID for a Tenant Self-Service User Role when a tenant user role is created by
using the T:Microsoft.SystemCenter.Foundation.Cmdlet.New-SCSPFTenantUserRole
cmdlet.
Multi-tenancy is additionally aided by new feature capabilities that are available in Windows
Server 2012 such as Network Virtualization.
495
Walkthrough: Creating a Certificate and User
Roles for Service Provider Foundation
This walkthrough shows how to administer important tasks for managing both certificates and
user roles in Service Provider Foundation. To start, we show how to generate a self-signed
certificate if you are not already working with an issuer's signed certificate. Next, we show how to
obtain the certificate's public key, and how to use that key to create the tenant in Service Provider
Foundation and user roles in System Center 2012 – Virtual Machine Manager (VMM).
This walkthrough is organized into the following sections and procedures. The procedures are
designed to be performed sequentially, although they contain the information that you need to run
them individually as needed. These procedures are tasks for the hoster administrator to perform.
Section Procedures
Create the tenant and its user roles To create a tenant with the certificate's public
key
To create a tenant administrator role in VMM
To create a tenant self-service user role
Create a certificate
The following procedure describes how to create a certificate for a tenant by using makecert.exe
(Certificate Creation Tool).
496
1. On the Start screen, type certmgr.msc and then in the Apps results click certmgr.msc.
2. In the certmgr window, click Certificates - Current User, open the Personal folder, and
then open the Certificates folder to view the certificate that you just generated.
497
1. You can obtain the public key directly from an exported public key certificate file (.CER)
by using the .NET Framework cryptography classes. Run the following commands to
obtain the key from the certificate's public key file that you exported in the To export the
public key procedure.
PS C:\> $path = "C:\Temp\tenant4D.cer"
The next procedure uses the $key variable that you just created.
498
1. Enter the following command and agree to this elevation for the Windows PowerShell
command shell:
PS C:\> Set-Executionpolicy remotesigned
2. Enter the following command to import the Virtual Machine Manager module:
PS C:\> Import-Module virtualmachinemanager
3. Use the Windows PowerShell
T:Microsoft.SystemCenter.VirtualMachineManager.Cmdlets.New-SCUserRole
cmdlet to create the user role. This command assumes the $tenant variable was created
as described in the To create a tenant with the certificate's public key procedure.
PS C:\> $TARole = New-SCUserRole -Name contoso.cloudspace.com
-ID $tenant.Id -UserRoleProfile TenantAdmin
Caution
Note that if the user role was previously created by using the VMM
Administration Console, its permissions would be overwritten by those specified
by the New-SCSUserRole cmdlet.
4. Verify that the user role was created by verifying that it is listed in the User Roles in
Settings workspace in the VMM Administration Console.
5. Define the following for the role by selecting the role and clicking Properties on the
toolbar:
On the Scope tab, select one or more clouds.
On the Resources tab, add any resources such as templates.
On the Actions tab, select one or more actions.
Repeat this procedure for every server assigned to the tenant.
The next procedure uses the $TARole variable that you just created.
3. Verify that the user role was created by verifying that it is listed in the User Roles in
Settings workspace in the VMM Administration Console. Notice that the parent of the
499
role is the tenant administrator.
Repeat this procedure as needed for the tenant.
See Also
Manage Certificates and User Roles in Service Provider Foundation
Administering Service Provider Foundation
Recommended Administrator Capabilities in Service Provider Foundation
Configuring Portals for Service Provider Foundation
Permissions Purpose
Select with Grant, Update with Grant, Delete To grant these permissions to application
with Grant, Insert with Grant users.
500
Roles for Service Provider Foundation
administrators
A Service Provider Foundation administrator is the user responsible for installing Service Provider
Foundation, and should have administrative rights on the server where Service Provider
Foundation is to be installed.
There are two database scenario configurations:
Install Service Provider Foundation by using a connection to an existing database.
The Service Provider Foundation administrator must verify that the permissions were granted
by the database administrator as described in the previous section.
Create a new database.
The database administrator must create the database (SCSPFDB) and then the Service
Provider Foundation administrator must install Service Provider Foundation and have
permission to configure the database as needed such as to add tables. Service Provider
Foundation administrators must create the Service Provider Foundation Application Pool in
Internet Information Services (IIS) and create a database user for an Application Pool User
with the following permissions:
Permission Purpose
Create the SQL Server logon for Application To be able to log on to SQL Server and
Pool User with default database set to access this database.
SCSPFDB.
See Also
Manage Certificates and User Roles in Service Provider Foundation
Administering Service Provider Foundation
Walkthrough: Creating a Certificate and User Roles for Service Provider Foundation
501
Configuring Portals for Service Provider Foundation
502
Property ID
Id : 4ce5713a-50a1-434b-b47a-87caad75ba72
Copy the ID.
2. Using the browser, connect to the App Controller management portal.
3. Sign in by using your Windows credentials.
4. Under Settings, click Connections, click Connect, then select Service Provider
Foundation.
5. In the Add an External Provider Connection dialog box, specify the following values:
Connection name:
This is the name of the product or service that is used by the tenant.
Description:
This description is optional.
Service location:
This is the Service Provider Foundation OData protocol URI for the VMM service, as
shown the following example. The URI ends with tenant's ID:
https://contoso.muchspace.com:8090/SC2012R2/vmm/Microsoft.Management.Odata.svc
/4ce5713a-50a1-434b-b47a-87caad75ba72
If you are using Service Provider Foundation System Center 2012 SP1, remove the
'R2' from SC2012R2.
Certificate file:
This is the location that you specified for the exported certificate (typically with a .pfx
extension). For information about how to export the private key from a certificate for
this step, see the To export the private key procedure in Walkthrough: Creating a
Certificate and User Roles for Service Provider Foundation.
Password:
This is the password that was set in the steps to export the private key certificate.
For more information about how to connect a hosting provider to App Controller, see How to
Connect to a Hosting Provider in System Center 2012 SP1
See Also
Portals in Service Provider Foundation
Administering Service Provider Foundation
503
Privacy Statement for System Center 2012 -
Orchestrator
Microsoft is committed to protecting your privacy, while delivering software that brings you the
performance, power, and convenience you desire in your personal computing. This privacy
statement explains many of the data collection and use practices of Microsoft System Center
2012 - Orchestrator Release to Manufacturing (“Orchestrator”).
System Center 2012 - Orchestrator Release to Manufacturing empowers IT Pros to easily
develop Runbooks for Microsoft System Center that interoperate with 3rd party systems to
automate data center workloads. Runbooks are created and tested in the Runbook Designer, a
rich drag-and-drop style user interface optimized for use by IT Pros. These Runbooks bring
Microsoft System Center products and 3rd party systems together to automate data center
workloads through the use of a unique and powerful Publish/Subscribe mechanism. Once created
these Runbooks are deployed to distributed Runbook Servers where they can be managed using
the Orchestration Console, a rich Microsoft Silverlight application that allows the IT Pro to identify
Runbook issues, start and stop runbooks and explore the runtime environment.
504
Microsoft may access or disclose information about you, including the content of your
communications, in order to: ( a ) comply with the law or respond to lawful requests or legal
process; ( b ) protect the rights or property of Microsoft or our customers, including the
enforcement of our agreements or policies governing your use of the services; or ( c ) act on a
good faith belief that such access or disclosure is necessary to protect the personal safety of
Microsoft employees, customers, or the public. We may also disclose personal information as
part of a corporate transaction such as a merger or sale of assets.
Information that is collected by or sent to Microsoft by Orchestrator may be stored and processed
in the United States or any other country in which Microsoft or its affiliates, subsidiaries, or
service providers maintain facilities. Microsoft abides by the safe harbor framework as set forth by
the U.S. Department of Commerce regarding the collection, use, and retention of data from the
European Union, the European Economic Area, and Switzerland.
505
implementing the change or by directly sending you a notification. We encourage you to
periodically review this statement to be informed of how Microsoft is protecting your information.
Specific Features
The remainder of this document will address the following specific features:
Use of information:
This information is not sent outside of the Enterprise.
Choice/Control:
To enable or disable this feature:
1. In the Runbook Designer, in the Connections pane, click the Runbooks folder.
2. If the runbook is stored in a folder, select the appropriate folder under Runbooks.
3. In the Design workspace of Runbook Designer, right-click the tab of a runbook to select
Properties.
4. On the Logging tab of the Runbook Properties dialog box:
506
a. Select the Store Activity-Specific Published Data check box to enable this feature.
Clear the check box to disable the feature.
b. Select the Store Common Published Data check box to enable this feature. Clear the
check box to disable the feature.
5. To close the Runbook Properties dialog box, click Finish.
Important information
Workflows have a revision history associated with them. This history is stored in the database
along with the Active Directory SID of the user that created the changes. This feature cannot be
disabled.
Workflow Exports
What this Feature Does:
The Enterprise can export policies and other Orchestrator configuration information into an XML-
formatted file intended to be used as a policy export/import mechanism.
Use of information:
This information is not sent outside of the Enterprise.
Choice/Control
The export/import feature is only present in the Orchestrator Run Book Designer (the “Designer”)
and you may opt not to use this feature.
507
Information collected, processed, or transmitted:
Orchestrator does not collect or send any such data, however third party systems might.
Orchestrator may interact with third party systems such as to cause them to send information
outside the Enterprise.
Use of information:
Orchestrator does not send any information outside the enterprise. Such information would be
sent by a third party system in response to activity driven by Orchestrator.
Choice/Control:
Review the privacy features and policies of the third party systems that are interacting with
Orchestrator. If a third party system does in fact transmit this sort of information as part of
interacting with Orchestrator, consult the privacy statement as well as other documentation
provided by the third party system vendor for instructions on how to disable such transmission.
Use of information:
We use this information to improve the quality, reliability, and performance of Microsoft software
and services.
Choice/Control:
You are offered the opportunity to participate in CEIP during setup. You can change this setting
after install through the Runbook Designer Help/About where an opt-in/opt-out is available.
508
Microsoft Error Reporting
What this feature does:
Microsoft Error Reporting provides a service that allows you to report problems you may be
having with Orchestrator to Microsoft and to receive information that may help you avoid or solve
such problems.
Use of information:
We use the error reporting data to solve customer problems and improve our software and
services.
Choice/Control:
You will be offered the opportunity to participate in Microsoft Error Reporting during install only.
We also offer you the ability to queue reports prior to sending. You can change this setting after
install through the Runbook Designer Help/About where an opt-in/opt-out is available.
When you choose to enable it, Microsoft Error Reporting will automatically report problems you
encounter to Microsoft. When Microsoft needs additional data to analyze the problem, you will be
prompted to review the data and choose whether or not to send it.
Important information:
Enterprise customers can use Group Policy to configure how Microsoft Error Reporting behaves
on their computers. Configuration options include the ability to turn off Microsoft Error Reporting.
If you are an administrator and wish to configure Group Policy for Microsoft Error Reporting,
technical details are available at http://go.microsoft.com/fwlink/?LinkID=228751.
Microsoft Update
What this feature does:
Microsoft Update is a service that provides Windows updates as well as updates for other
Microsoft software.
509
Information collected, processed, or transmitted:
For details about what information is collected and how it is used, see the Update Services
Privacy Statement at http://go.microsoft.com/fwlink/?LinkID=228752 .
Use of information:
For details about what information is collected and how it is used, see the Update Services
Privacy Statement at http://go.microsoft.com/fwlink/?LinkID=228752.
Choice/Control:
Microsoft Update is not turned on as a default. It is controlled by a choice you make during the
setup. You may later change it by accessing the Microsoft Update client under your Control
Panel to turn updates on or off.
Use of Information:
For details about what information is collected and how it is used, refer to the privacy statement of
the third party who provided the integration pack.
Choice/Control:
For details about what information is collected and how it is used, refer to the privacy statement of
the third party who provided the integration pack.
510
Release Notes for System Center 2012 -
Orchestrator
The following release notes apply to the appropriate version of Orchestrator in System Center
2012, and they contain descriptions and workarounds for known issues.
There are three versions of these release notes:
Release Notes for System Center 2012 - Orchestrator
Release Notes for Orchestrator in System Center 2012 SP1
Release Notes for Orchestrator in System Center 2012 R2
See Also
Orchestrator
Known Issues
You receive a database validation error when you use a remote
computer that is running SQL Server
Description: If you are using a remote computer that is running Microsoft SQL Server and that
server has named pipes enabled (as opposed to TCP/IP), you cannot successfully install
Orchestrator. Instead, you receive a database validation error during the last phase of installation.
Workaround: Enable TCP/IP for any Orchestrator installations that use a remote computer that
is running SQL Server.
511
You must uninstall older versions of Orchestrator before you
install the System Center 2012 - Orchestrator runbook server
Description: If you try to install or deploy a System Center 2012 - Orchestrator runbook server
on a computer that has the Opalis Action Server, the Orchestrator 2012 Beta, or the Orchestrator
2012 Release Candidate runbook server installed, it leaves the runbook server in an unusable
state. You must revert the deployment of the previous version by using the Deployment
Manager, or in Control Panel, uninstall it by using Programs and Features before you install the
new version.
You must also manually remove the OpalisRemotingService executable program by using the
following procedure:
512
runbook or runbook folder changes until the cache is refreshed. After 10 minutes, you can refresh
the Orchestration console and see the changes.
Workaround: It is not recommended to reduce the refresh interval of the authorization cache
table because of the time required to re-compute the cache. If you require assistance in modifying
the refresh interval of the authorization cache table, please contact customer support.
Important
The variable string for the date/time format is case sensitive. If you use yyyy-MM-
ddThh:mm:ss as the variable string, the wrong date/time is output.
Workaround: Use the format yyyy-MM-ddTHH:mm:ss.
513
The date/time format displayed in a property textbox is not
always displayed in the locale-specific format
Description: Changes to the formatting of the date/time string can cause the date/time format in
a property textbox to use a different format from the locale-specific format.
This occurs because an Orchestrator deployment can have a span of control that crosses
different locales. You can choose to display dates using your locale-specific format. However,
internally, Orchestrator uses a static format to ensure that the proper dates and times are used
for activity property values.
The standard date/time format used by Orchestrator is a 24-hour time format displayed as yyyy-
MM-ddTHH:mm:ss. This date/time format conforms with ISO 8601.
Example: You set your formatting to United Kingdom with a date format of DD/MM/YY. When you
click the ellipsis button next to a date/time property in an activity, the date displayed is in
DD/MM/YY format. When you click OK to save your changes, the date/time information displayed
in the property is in the format YYYY-MM-DDTHH:MM:SS.
Workaround: If you have a runbook that contains activity properties configured with the older
date/time formatting of MM/DD/YYYY HH:MM:SS AM, Orchestrator uses the old format. The
runbook is properly interpreted by Orchestrator when the activity runs. If you change a property
from the default date/time format, the date/time format changes to the new format.
514
An integration pack must be registered and deployed before
importing a runbook that uses it.
Description: If you import a runbook that uses an activity from an integration pack that is not
registered and deployed, the activities from that integration pack will be marked with a question
mark (?). Even after the integration pack is installed and registered, the activities will not work
correctly.
Workaround: Import the runbook again after the integration pack is deployed and registered.
See Also
Orchestrator
515
Release Notes for Orchestrator in System
Center 2012 SP1
These release notes contain information that is required to successfully install Orchestrator in
System Center 2012 Service Pack 1 (SP1). They contain information that is not available in the
product documentation.
Before you install and use Orchestrator, read these release notes. These release notes apply to
Orchestrator in System Center 2012 SP1.
If you are looking for the Release Notes for the original release of System Center 2012 -
Orchestrator, see Release Notes for System Center 2012 - Orchestrator.
Known Issues
516
When running Orchestrator on Windows Server 2012, the Run
Program activity doesn't work in Interactive mode
Description: For example, on a runbook server that is running Windows Server 2012, start a
runbook containing a Run Program activity that has been configured to run notepad.exe in
Interactive mode. Notepad.exe is started as a background process instead of as a foreground
process.
Workaround: In the registry key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows, the value for the
NoInteractiveServices subkey defaults to 1, which means that no service is allowed to run
interactively, regardless of whether it has SERVICE_INTERACTIVE_PROCESS. When
NoInteractiveServices is set to a 0, services with SERVICE_INTERACTIVE_PROCESS are
allowed to run interactively. Change the value of the NoInteractiveServices subkey to 0, and then
restart the computer.
See Also
Orchestrator
517