Admin
Access the Policy Admin Page
About This Task
Procedure
Configure Execution History Retention Settings
About This Task
The Policy execution log can grow quickly and significantly impact the size of the APM database. You can control the size of the execution log by minimizing the time that the execution history is retained in the APM system and also by selecting an appropriate execution history setting for each policy.
By default, the Policy Execution History records are never deleted. This topic describes how to set a retention period and the time interval of an automated job that deletes these records after the retention period is over.
- These settings are applicable to all types of Policies and Policy Execution History records: Errors, Warnings (Action Taken), Warnings (No Action Taken), Success (Action Taken), and Success (No Action Taken).
- The most recent execution history of each instance associated with a Policy is retained even if it exceeds the specified retention duration.
- Depending on the number of old Policy Execution History records that exist when the retention settings are configured, it may take multiple iterations of the automated job to delete all the old execution history records.
Procedure
About API Node Credential Records
API Node Credential records are used to store the user names, authentication types, and display names for user accounts that will be used by the system when executing API nodes in Policy Designer.
When you create or update an API Node Credential, you must enter the user’s current password. The password not stored; it is only used to authorize permission to use that user account as an API Node Credential. If the API user’s password is changed you do not need to re-enter it through the Policy Admin page.
The user accounts that you specify in API Node Credential records must have the appropriate permissions to execute the APIs that you want to use in the API node. For information on supported APIs, see the API Node documentation.
Each API Node Credential must contain a unique value for display name. This is the name that will be displayed to Policy Designer users and should be descriptive to enable them to identify the correct user for the API they want to use. Policy Designer users will only see the display name and authentication type; they will not have access to the username or password.
You can set up any number of API Node Credentials as required. For example, you might want to set up different API Node Credentials for access to different APIs.