0% found this document useful (0 votes)
4 views15 pages

Day 2 - Archer DataFeedRules

The document outlines essential rules for managing data feeds in RSA Archer, emphasizing the importance of understanding data, user accounts, and performance considerations. It provides guidelines for troubleshooting, community resources, and the limitations of real-time integrations. Additionally, it highlights the significance of testing and learning from failures to improve processes.

Uploaded by

reddyvariapple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views15 pages

Day 2 - Archer DataFeedRules

The document outlines essential rules for managing data feeds in RSA Archer, emphasizing the importance of understanding data, user accounts, and performance considerations. It provides guidelines for troubleshooting, community resources, and the limitations of real-time integrations. Additionally, it highlights the significance of testing and learning from failures to improve processes.

Uploaded by

reddyvariapple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Dell Customer Communication - Confidential

RSA ARCHER
DATA FEED RULES

1
Dell Customer Communication - Confidential

AGENDA
 Rules of Data Feeds

 Post Install Actions / Validations


 Questions

2
Dell Customer Communication - Confidential

THE BASICS

3
Dell Customer Communication - Confidential

RULE #1 – KNOW YOUR DATA


• Data feeds are automatic ingestion of data
• If you don’t know what you’re bringing in, you’ll have issues –
and they can get big fast!
• Add Unknown Values
• Key Field Definitions
• Populate When Empty
• Archival Options

4
Dell Customer Communication - Confidential

RULE #2: REALLY, KNOW YOUR DATA


 What goes where????
 Know the data you’re
working with
 Data Organization
 Data Types
 Data Requirements

 Know if you need to do


anything to it.

5
Dell Customer Communication - Confidential

RULE #3: KNOW YOUR USER ACCOUNTS


 General Tab
 Feed Information
 Unique for forensic / audit capabilities
(Archer Service Account)
 Transport Tab
 Security
 This is for URL Access
 Transport Tab
 Transport Configuration (AWS)
(Archer User Account)
 For running report
 Session Collision
 Password Expiration

6
Dell Customer Communication - Confidential

RULE #3: KNOW YOUR USER ACCOUNTS (2)

7
Dell Customer Communication - Confidential

RULE #4: CHECK THE COMMUNITY


 Archer-to-Archer Data Feeds and XSLT
 https://community.rsa.com/docs/DOC-41243
 RSA Archer Video Series: Data Feeds
 https://community.rsa.com/docs/DOC-29545
 Data Feed Debugger
 https://community.rsa.com/message/867472
 Data Feed Tokens
 https://community.rsa.com/docs/DOC-17868
 Encoding in Data Feed Source File Tip Sheet
 https://community.rsa.com/docs/DOC-17867
 FFTH Data Feed Performance
 https://community.rsa.com/docs/DOC-20475
 And More – Just search!

8
Dell Customer Communication - Confidential

QUESTION: HOW FAST IS THIS THING?


What do you think is good throughput? (Records per minute – RPM)
a) About a dollar (I have no idea)
b) 50 RPM
c) 100 RPM
d) 500+ RPM

9
Dell Customer Communication - Confidential

RULE #5: PERFORMANCE MATTERS


 Changeset only
 Single key per level
 Do the work in the query or transform
 Notifications off
 Orient your data for minimal touch

 Data Feed Unleashed (Community AND Summit!)


 https://community.rsa.com/docs/DOC-23661

10
Dell Customer Communication - Confidential

RULE #6: DON’T FAKE REAL-TIME


 Feeds are NOT real-time integrations.
 Password changes can take 10-minutes; establish an SLA
 Running it every 2 minutes still requires
intervention.
 Can advanced workflow help?
 Do you actually need real-time?
Check the API’s (WS and REST)!

11
Dell Customer Communication - Confidential

RULE 7: YOU CAN DO WHAT???


 JavaScript Transport
 You can do anything in a JS Feed!
 RSA Environments only allow RSA Signed JavaScript
 Allows you to do things in other systems.
 XSLT 3.0
 Automated conversion of JSON
 Powerful tools for manipulating data
 Attachments
 A2A handles attachments natively.
 Data Feed Monitor Utility
 Outsource the polling
 https://community.rsa.com/docs/DOC-95943

12
Dell Customer Communication - Confidential

RULE #8: FAIL FORWARD (IN TEST!)


 Failure in Prod is bad!
 Failure in Test is a defect.
 Failure in Dev is a learning opportunity.

 Knowing what can happen (and how to


respond) is powerful.
 Knowing boundaries is important.

“A person who never made a mistake


never tried anything new.”
~ Albert Einstein

13
Dell Customer Communication - Confidential

RSA ENVIRONMENT “SPECIALS”


When introducing data feeds in SaaS / Hosted, there are a few constraints:
 A2A / https /RSS
 Whenever you need to "go out of the bubble" you need to configure it to use system proxy
 Even though Archer is "in the bubble" job engines go "out" to the URL and need the proxy
 https transports are "going out" and need it as well.
 FTP feeds
 URI [for feed] is ftp://ftp01 that is the internal resolution.
 Because it is staying "inside the bubble" it uses No Proxy
 Only accessible FTP is ftp://ftp01
 Currently (March 2020) SSL option does *not* work
 JavaScript
 Requires "proxy" (lower-case) be added as a custom parameter with a value of
http://tempworkaround:8118/
 Yes, kind of snarky name...
 We *only* add the RSA thumbprints at this point. No other vendor signatures are added.

14
Dell Customer Communication - Confidential

QUESTIONS

15

You might also like