Table of Contents
Serena Release Automation provides deployment- and security-type reports:
-
Deployment reports contain historical information about deployments. Data can be filtered in a variety of ways and reports can be printed and saved. In addition, you can save search criteria for later use. See the section called “Deployment Reports”
-
Security reports provide information about user roles and privileges. See the section called “Security Reports”
For information about saving and printing reports, see the section called “Saving and Printing Reports”
The following tables summarize the out-of-the-box reports.
Table 31. Deployment Reports
Report | Description |
---|---|
Deployment Detail | Provides information about deployments executed during a user-specified reporting period. Each report row represents a deployment that executed during the reporting period and matched the filter conditions. See the section called “Deployment Detail Report”. |
Deployment Average Duration | Average deployment times for applications executed during a user-specified reporting period. See the section called “Deployment Average Duration Report”. |
Deployment Total Duration | Total deployment times for applications executed during a user-specified reporting period. See the section called “Deployment Total Duration Report”. |
Deployment Count | Provides information about the number of deployments executed during a user-specified reporting period. See the section called “Deployment Count Report”. |
Table 32. Security Reports
Report | Description |
---|---|
Application Security | Provides information about user roles and privileges defined for Serena Release Automation-managed applications. See the section called “Application Security Report”. |
Component Security | Information about user roles and privileges defined for components. See the section called “Component Security Report”. |
Environment Security | Information about user roles and privileges defined for environments. See the section called “Environment Security Report”. |
Resource Security | Information about user roles and privileges defined for resources. See the section called “Resource Security Report”. |