If one or more of the tools you'd like to connect to are On-prem (rather than cloud-based), Viz will require you to install an agent on a server behind your firewall. A virtual machine can be used for the server if desired.
The agent connects to your tools on-site and sends the data to Viz in the cloud. This easy deployment option is designed to ensure you do not have to punch open any incoming holes in your firewall.
Note: Viz does not support running multiple agents concurrently as it may negatively impact performance and cause errors.
Requirements for the server where the agent will run are below:
User Requirements |
Supported Operating Systems |
---|---|
The Viz agent requires an account with sufficient privileges on your server to access the projects and work items that you wish to generate Flow Metrics from.
|
The following 64-bit operating systems and versions are supported for the server where the agent will run:
Note: These requirements do not apply to the OS used to access the tools themselves (i.e., Jira). Java 8 must be installed on your operating system. |
Hardware Sizing Requirements |
Firewall Configuration |
We recommend the server have:
Note: The server where the agent is installed must be able to reach https://ingress.viz.tasktop.net/ |
If you have outbound firewall restrictions, you’ll need to open port 443 for https://viz.tasktop.net/ and https://ingress.viz.tasktop.net/ in order to access Planview Viz®. See additional information on Viz architecture and firewall configuration here. |
If you'd like to learn more about how to prepare your network for the Viz agent, click here.
Note that only admin users can download and install the agent. If you are not a Viz admin, you can skip this section.
Once your account has been authorized by Planview, you can sign into Viz and set up the agent for access to On-prem tools.
You can access the Download an Agent guide from the Resource Center in the lower right corner or view the steps below.
Note: The agent is approximately 100 MB.
First, navigate to the Org Settings screen from the main menu dropdown.
Note: You must download and install the agent on the server you prepared according to the system requirements here.
On the Org Settings screen, click the Tool Connections tab.
Next, click download to access the Agent Download screen.
Then, click the link to download the appropriate agent for your system.
Once the agent file is downloaded and unzipped, open the bin folder and run the following script:
* start-tasktop-agent.bat (on Windows)
* start-tasktop-agent (on Linux)
If you are using Viz to connect to Microsoft Azure DevOps Server, please see additional instructions below.
Note: If migrating the agent to a different host, please see the details below.
The agent should be configured to automatically start if the server is restarted. Below are instructions for enabling this on both Linux and Windows.
Note: A dedicated user and group should be created to run the agent as a service.
If connecting to ingress via a proxy, please see the details below.
cd C:\path\to\tasktop-agent\bin\
tasktop-agent.exe install
tasktop-agent.exe status
tasktop-agent.exe start
Check logs after starting to ensure the agent is running without errors
After downloading the agent and copying it to your host machine, ensure that the permissions and ownership are set correctly.
AGENT_JAVA_HOME
variable in your environment to match the location of your Java installation (e.g., export AGENT_JAVA_HOME="/opt/tasktop-agent/jre
)Create the following service in your systemD system folder (e.g., /etc/systemd/system/tasktop-agent.service
).
# Systemd unit file for tasktop agent [Unit] Description=Tasktop Agent After=syslog.target network.target [Service] WorkingDirectory=/path/to/tasktop-agent/bin/ ExecStart=/path/to/tasktop-agent/bin/start-tasktop-agent User=user Group=group [Install] WantedBy=multi-user.target
Do not make edits to lines of the .service
file except for WorkingDirectory
, ExecStart
, User
, and Group
.
Load the service by running the following:
systemctl daemon-reload
Enable the service to start at boot with the following:
systemctl enable tasktop-agent
Restart the machine to ensure it runs at start up.
Check logs after starting to ensure the agent is running without errors.
Add the following property to the agent.conf
file:
agent.proxy.isEncryptionModeOn = true
Remove the following password field from the agent.conf
file:
agent.proxy.password
Save your changes.
Run the new agent startup, which will now ask for a user input for the proxy password.
Enter the password.
The password should then be stored in the agent.conf
file in an encrypted format.
These instructions are only necessary if you are using an On-prem agent to connect to Microsoft Azure DevOps. If you are using other tools or a cloud agent, you can ignore this section.
The Microsoft Azure DevOps Server tool connection requires installing additional Microsoft libraries that Planview does not provide or support.
TFS-SDK-14.134.0.zip and TEE-CLC-14.134.0.zip may be obtained from here.
Place these files in the <agent installation>/third-party
directory and restart the agent to enable the tool connection.
After you've downloaded and installed your agent, you can view your agent details on the Tool Connections screen.
On the agent card, you can find the following details:
Note: Disabled agents are hidden from the agent card.
A working backup strategy is a critical element of disaster recovery since only backups can mitigate complete hardware failure and user error. Regular backups of the entire Viz agent folder are an essential part of your organization’s backup strategy. If the agent server goes down or is decommissioned, a backup is required to ensure duplicate data is not sent to Viz.
Note: The backup should not be done on the same server hosting the agent, and should be done while the agent is shut down.
In order to configure the agent to communicate with ingress via a proxy, you will need to add the proxy settings to /conf/agent.conf
Note: The format in the agent.conf file can contain JSON or Key-Value pairs.
Add the proxy settings to the agent enclosure in the .conf
file, as shown below:
Key-Value
agent.proxy.host = "squid.example.com" agent.proxy.port = 3128 agent.proxy.username = "username" agent.proxy.password = "password"
JSON
proxy { host = "squid.example.com" port = "3128" username = "username" password = "password" }
Use the following system properties:
Once completed, it should look like this:
Or, like this:
If the agent is migrated to a different host, ensure that the following files are moved to the corresponding location on the new host. If this step is skipped, you will risk generating inaccurate metrics due to duplicate events.
event-source.db.mv.db
event-source.db.trace.db
/conf/agent.conf
/third-party
(if using Microsoft Azure DevOps)Logs are provided to assist in agent troubleshooting. Logs can be found in the following location: [agent location]/logs/tasktop-agent.log
The most recent log file will be called tasktop-agent.log,
while previous log files will be called tasktop-agent.YYYY-MM-DD.log.zip.
To change the location of the logs, you can update the agent.conf
file. The key of the file is called log-path
and should be located under the agent enclosure.
agent { log-path = "/some/path/to/log/directory/" }
If you see an error message in the Agent logs saying, javax.net.ssl.SSLHandshakeException: General SSLEngine problem … Caused by: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target, this generally indicates that there is a proxy between the Tasktop agent and the Viz ingress service which serves a self-signed certificate.
To resolve this error you will need to import your proxy’s certificate chain into the Viz agent’s JRE keystore:
Stop your Viz agent
Obtain copies of the root certificate and all intermediate certificates used by your proxy, in a "DER encoded binary X.509 (CER)" format
Import each of these certificates into the Viz agent's JRE keystore using the following keytool command:
<agent install location>/jre/bin/keytool -import -trustcacerts -keystore <agent install location>/jre/lib/security/cacerts -file <path to certificates>/my_ca.cer -alias myca
the default password is: changeit
Start your Viz agent
Note that only admin users can upgrade the agent. If you are not a Viz admin, you can skip this section.
Planview periodically releases agent updates containing bug fixes and performance-enhancing features. If an updated version of the agent is available, a pop-up will appear in the Viz UI.
You can find out which version of the agent you are on by going to agent/conf/build.conf.
You can find out the version of the newest agent by downloading the agent (from the new Tool Connection panel). The version number will be in the file name.
To upgrade the agent, please follow the steps below:
Shut down the current agent:
If the agent is running as a Windows Service, follow the steps below to stop and uninstall the service:
cd C:\path\to\current\tasktop-agent\bin\
tasktop-agent.exe stop
tasktop-agent.exe uninstall
Open Control Panel\System
and Security\Administrative Tools\Task Scheduler
Right click on the agent and select end
Make a backup of the entire agent folder
event-source.db.mv.db
event-source.db.trace.db
/conf/agent.conf
/third-party
(if using Azure DevOps/TFS)Open Control Panel\System and Security\Administrative Tools\Task Scheduler
C:\path\to\new\tasktop-agent\bin\start-tasktop-agent.bat
C:\path\to\new\tasktop-agent\bin\
Note: If you have made certificate adjustments or added a new certificate to access your tools, you may need to also copy the jre\lib\security\cacerts
file or re-import the certificate (see troubleshooting instructions above).
sudo systemctl stop tasktop-agent
(assuming you using SystemD
as described above)event-source.db.mv.db
event-source.db.trace.db
/conf/agent.conf
/third-party
(if using Azure DevOps/TFS)sudo systemctl start tasktop-agent
sudeo journalctl -n 1000 -u tasktop- -n 1000 -u tasktop-agent
Note: If you have made certificate adjustments or added a new certificate to access your tools, you may need to also copy the jre\lib\security\cacerts
file or re-import the certificate (see troubleshooting instructions above).
After you've finished setting up your agent, your final step in Provisioning will be connecting to your tools.